ATM TRMPAPPPER

download ATM TRMPAPPPER

of 7

Transcript of ATM TRMPAPPPER

  • 7/31/2019 ATM TRMPAPPPER

    1/7

  • 7/31/2019 ATM TRMPAPPPER

    2/7

  • 7/31/2019 ATM TRMPAPPPER

    3/7

    The main functions ofnetwork management include:

    Network and network-element provisioning

    In order to allocate bandwidth throughout a network, each network element must be configured.

    Although this can be done locally, through a craft interface, it is normally done through a network

    management system (sitting at a higher layer) that in turn operates through the SONET/SDH

    network management network.

    Software upgrade

    Network-element software upgrades are done mostly through the SONET/SDH management

    network in modern equipment.

    Performance management

    Network elements have a very large set of standards for performance management. The

    performance-management criteria allow not only monitoring the health of individual network

    elements, but isolating and identifying most network defects or outages. Higher-layer network

    monitoring and management software allows the proper filtering and troubleshooting of network-

    wide performance management, so that defects and outages can be quickly identified and resolved.

    SONET/SDH network management protocols

  • 7/31/2019 ATM TRMPAPPPER

    4/7

    SONET equipment is often managed with theTL1protocol. TL1 is a telecom language for managing

    and reconfiguring SONET network elements. The command language used by a SONET network

    element, such as TL1, must be carried by other management protocols, such asSNMP,CORBA, or

    XML. SDH has been mainly managed using the Q3 interface protocol suite defined in ITU

    recommendations Q.811 and Q.812. With the convergence of SONET and SDH on switching matrix

    and network elements architecture, newer implementations have also offered TL1.

    1) SNMP

    ->SNMP is the most popular network management protocol in

    the TCP/IP protocol suite. Sui->It is a simple request/response protocol that communicates

    management information between two types of SNMP software entities:

    SNMP applications (also called SNMP managers) and SNM.

    P ageThe SNMP protocol was designed to provide a "simple" method of centralizing the

    management of TCP/IP-based networks plain and simple. If you want to manage devices from a

    central location, the SNMP protocol is what facilitates the transfer of data from the client portion of

    the equation (the device you are monitoring) to the server portion where the data is centralized in

    logs for centralized viewing and analysis. Many application vendors supply network management

    software: IBMs Tivoli, Microsofts MOM and HP Openview are three of over 100+ applications

    available today to manage just about anything imaginable. The protocol is what makes this happen.

    The goals of the original SNMP protocols revolved around one main factor that is still in use today:

    Remote Management of Devices. SNMP is commonly used to manage devices on a network.

    http://en.wikipedia.org/wiki/TL1http://en.wikipedia.org/wiki/TL1http://en.wikipedia.org/wiki/TL1http://en.wikipedia.org/wiki/Simple_Network_Management_Protocolhttp://en.wikipedia.org/wiki/Simple_Network_Management_Protocolhttp://en.wikipedia.org/wiki/Simple_Network_Management_Protocolhttp://en.wikipedia.org/wiki/CORBAhttp://en.wikipedia.org/wiki/CORBAhttp://en.wikipedia.org/wiki/CORBAhttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/XMLhttp://en.wikipedia.org/wiki/CORBAhttp://en.wikipedia.org/wiki/Simple_Network_Management_Protocolhttp://en.wikipedia.org/wiki/TL1
  • 7/31/2019 ATM TRMPAPPPER

    5/7

    SNMP Operation

    SNMP design is pretty simple. There are two main players in SNMP. The manager and theagent. The manager is generally the main station such as HP Openview. The ag ent would be

    the SNMP software running on a client system you are trying to monitor.

    The manager is usually a software program running on a workstation or larger computer thatcommunicates with agent processes that run on each device being monitored. Agents can be

  • 7/31/2019 ATM TRMPAPPPER

    6/7

    found on switches, firewalls, servers, wireless access points, routers, hubs, and even users'

    workstationsthe list goes on and on. As seen in the illustration, the manager polls the

    agents making requests for information, and the agents respond when asked with the

    information requested.

    N

    SNMP STANDARDS:

    NMP standards are defined in a series of documents, called request for comments or RFCs(Requests

    for Comments ), proposed by the Internet Engineering Task Force (IETF). A list ofRFCs for SNMPv1,

    SNMPv2, and SNMPv3is available.

    SNMPv2 and SNMPv3

    With all TCP/IP related protocols, its a well known fact that anything dating before the

    creation of IPv6 (or IPng) has security weaknesses such as passwords sent in cleartext.SNMP in its original form is very susceptible to attack if not secured properly, messages sent

    in cleartext exposing community string passwords, or default passwords of public and private

    being guessed by anyone who knew how to exploit SNMP beyond its inherent

    weaknesses SNMP in its original implementation is still very simple to use and has been

    widely used throughout the industry. SNMP in its first version lacked encryption or

    authentication mechanisms. So, now that SNMP in its first version was good enough, work

    began to make it better with SNMPv2 in 1994. Besides for some minor enhancements, the

    main updates to this protocol come from the two new types of functionality, where traps can

    be sent from one NMS to another NMS as well as a get-bulk operation that allows larger

    amounts of information to be retrieved from one request. SNMPv3 still being worked on and

    is incorporating the best of both versions and enhanced security as well. SNMPv3 providessecure access to devices by a combination of authenticating and encrypting packets over the

    http://www.snmp.com/protocol/snmp_rfcs.shtmlhttp://www.snmp.com/protocol/snmp_rfcs.shtmlhttp://www.snmp.com/protocol/snmp_rfcs.shtmlhttp://www.snmp.com/protocol/snmp_rfcs.shtmlhttp://www.snmp.com/protocol/snmp_rfcs.shtmlhttp://www.snmp.com/protocol/snmp_rfcs.shtml
  • 7/31/2019 ATM TRMPAPPPER

    7/7

    network. The security features provided in SNMPv3 are message integrity which ensures that

    a packet has not been tampered with while in transit, authentication which is determining the

    message is from a valid source and encryption, which is the securing of the packet by

    scrambling its contents.

    ts.