Chapter13 Network Management Applications The management of networked information services involves both network and system resources.OSI defines network management as a five-layer architecture.We extended the model to include system management and present the integrated architecture in Figure 13.1: L5 business management L4 Service management L3 network management or system management L2 element management or resource management LI network elements and system resources
Chapter13 Network Management Applications The management of networked information services involves both network and system resources. OSI defines network management as a five-layer architecture. We extended the model to include system management and present the integrated architecture in Figure 13.1: L5 business management L4 Service management L3 network management or system management L2 element management or resource management L1 network elements and system resources
13.1 Configuration Management Configuration management in network management is normally used in the context of discovering network topology, mapping the network,and setting up configuration parameters in management agents and management systems.Network management in the broad sense also includes network provisioning,which includes network planning and design. Network provisioning is considered to be part of configuration management
13.1 Configuration Management Configuration management in network management is normally used in the context of discovering network topology, mapping the network, and setting up configuration parameters in management agents and management systems. Network management in the broad sense also includes network provisioning, which includes network planning and design. Network provisioning is considered to be part of configuration management
13.1.1 Network Provisioning Network provisioning,also called circuit provisioning in the telephone industry,is an automated process.A trunk (circuit from the originating switching center to the destination switching center)and a special service circuit (customized to meet customer specifications)are designed by application programs written in operation systems,Planning and inventory systems are integrated with design systems to build an overall system.Thus a circuit designed for the future automatically derives its turn-on date from the planning system and ensures that the components are available in the inventory system
13.1.1 Network Provisioning Network provisioning, also called circuit provisioning in the telephone industry, is an automated process. A trunk (circuit from the originating switching center to the destination switching center) and a special service circuit (customized to meet customer specifications) are designed by application programs written in operation systems, Planning and inventory systems are integrated with design systems to build an overall system. Thus a circuit designed for the future automatically derives its turn-on date from the planning system and ensures that the components are available in the inventory system
13.1.2 Inventory Management An efficient database system is an essential part of an inventory management system.We need to be aware of the specification details associated with various components.The data should be accessible by means of different indices. Some of the obvious indices or access keys are the component description or part number,components that match a set of characteristics,components in use and in spare,and components to be freed-up for future use
13.1.2 Inventory Management An efficient database system is an essential part of an inventory management system. We need to be aware of the specification details associated with various components. The data should be accessible by means of different indices. Some of the obvious indices or access keys are the component description or part number, components that match a set of characteristics, components in use and in spare, and components to be freed-up for future use
13.1.3 Network Topology Network management is based on knowledge of network topology.As a network grows, shrinks,or otherwise changes,network topology needs to be updated automatically. Such updating is done by the discovery application in the network management system.However,the scope of the discovery process needs to be constrained.For example, the arp command can discover any network component that responds with an IP address, which can then be mapped by the network management system.If the response includes workstations that are turned on only when they are in use,the network management system would indicate failure whenever they are off.Obviously,that is not desirable
13.1.3 Network Topology Network management is based on knowledge of network topology. As a network grows, shrinks, or otherwise changes, network topology needs to be updated automatically. Such updating is done by the discovery application in the network management system. However, the scope of the discovery process needs to be constrained. For example, the arp command can discover any network component that responds with an IP address, which can then be mapped by the network management system. If the response includes workstations that are turned on only when they are in use, the network management system would indicate failure whenever they are off. Obviously, that is not desirable
Chapter13 Network Management Applications Autodiscovery can be done by using the broadcast ping on each segment and following up with further SNMP queries to gather more details on the system.A more efficient method is to look at the ARP cache in the local router.The ARP cache table is large and contains the addresses of all the hosts and nodes used in recent communications.Use of this table also allows subsequent ARP queries to be sent to other routers.This process is continued until the desired information is obtained on all IP addresses defined I by the scope of the autodiscovery procedure
Chapter13 Network Management Applications Autodiscovery can be done by using the broadcast ping on each segment and following up with further SNMP queries to gather more details on the system. A more efficient method is to look at the ARP cache in the local router. The ARP cache table is large and contains the addresses of all the hosts and nodes used in recent communications. Use of this table also allows subsequent ARP queries to be sent to other routers.This process is continued until the desired information is obtained on all IP addresses defined by the scope of the autodiscovery procedure
Hub 1 Port A Segment A Router Port B Segment B 口口 Hub 2 source of th se B2 Figure 13.2 LAN Physical Configuration
A1 (hub 1) A2(hub 2) B50908) Router Switch baviso9T jon 916 asanodasT 9viuogano B1 (hub 1) B2(hub 2) Figure 13.5 Logical Configuration of Two VLAN Segments
13.3 Performance Management Network performance is a nebulous term,which is hard to define or quantify in terms of global metrics.Performance management actually is (data) traffic management.It involves following data monitoring,problem isolation,performance tuning, analysis of statistical data for recognizing trends, and resource planning. 13.3.1 Performance Metrics The parameters that can be attributed to defining network performance on a global level are throughput,response time,network availability, and network reliability.The metrics of these parameters depend on what,when,and where the measurements are made
13.3 Performance Management Network performance is a nebulous term, which is hard to define or quantify in terms of global metrics. Performance management actually is (data) traffic management. It involves following data monitoring, problem isolation, performance tuning, analysis of statistical data for recognizing trends, and resource planning. 13.3.1 Performance Metrics The parameters that can be attributed to defining network performance on a global level are throughput, response time, network availability, and network reliability. The metrics of these parameters depend on what, when, and where the measurements are made
13.3.2 Data Monitoring Data monitoring in the network for abnormal performance behavior,such as a high collision rate in an Ethernet LAN and excessive packet drop because of overload,are detected by traps generated by agents and RMON.Performance-related issues are detected primarily with trap messages generated by RMON probes.Thresholds are s set for important SNMP parameters in the RMON,which then generate alarms when the preset thresholds are crossed.For example,the parameters in the alarm group and the event group in the RMON MIB [RFC 1757]may be set for the object identifier to be monitored.The time interval over which the data are to be collected for calculation and the rising and falling thresholds are specified
13.3.2 Data Monitoring Data monitoring in the network for abnormal performance behavior, such as a high collision rate in an Ethernet LAN and excessive packet drop because of overload, are detected by traps generated by agents and RMON. Performance-related issues are detected primarily with trap messages generated by RMON probes. Thresholds are set for important SNMP parameters in the RMON, which then generate alarms when the preset thresholds are crossed. For example, the parameters in the alarm group and the event group in the RMON MIB [RFC 1757] may be set for the object identifier to be monitored. The time interval over which the data are to be collected for calculation and the rising and falling thresholds are specified