Network Management Essentials

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

In computer networks, what broad areas do network management activities encompass?

  • Operation, administration, and maintenance only.
  • Operation and administration only.
  • Provisioning and maintenance only.
  • Operation, administration, maintenance, and provisioning. (correct)

Which of the following is MOST accurate regarding network management?

  • It primarily focuses on software updates.
  • It centers exclusively on hardware maintenance.
  • It involves commanding and controlling practices essential for networked systems. (correct)
  • It applies only to wired networks.

When considering network management, which aspect involves configuring resources in the network to support a given service?

  • Operation
  • Maintenance
  • Administration
  • Provisioning (correct)

Which of the following mechanisms is used to gather data for network management?

<p>Agents installed on infrastructure. (B)</p>
Signup and view all the answers

Performance management is now a key component of an IT team's role. What factor has MOST directly driven this shift?

<p>The rising importance of IT for global organizations. (D)</p>
Signup and view all the answers

Why is software assistance considered essential for managing today's large networks?

<p>Because a large network cannot be managed without software assistance. (C)</p>
Signup and view all the answers

The Simple Gateway Monitoring Protocol (SGMP) is an early network management protocol. In what year was it introduced?

<p>1987 (A)</p>
Signup and view all the answers

What was the key objective behind Marshall T. Rose leading the SNMP working group in 1989?

<p>To create a common network management framework for SGMP and CMOT. (A)</p>
Signup and view all the answers

Which event occurred in June 1989 regarding the development of network management protocols?

<p>The IAB decided to let SNMP and CMOT develop separately. (D)</p>
Signup and view all the answers

Which of the following technologies is considered an accessory method to support network and network device management, alongside SNMP?

<p>Custom XML (D)</p>
Signup and view all the answers

What is a primary goal in using a standardized protocol for network management?

<p>To minimize the complexity of management functions. (C)</p>
Signup and view all the answers

What three key standards compose SNMP for network management?

<p>Application layer protocol, database schema, and set of data objects. (B)</p>
Signup and view all the answers

What is the role of a 'Manager' in SNMP architecture?

<p>To contact an SNMP agent to query or modify the database at the agent. (A)</p>
Signup and view all the answers

What best describes the function of a Network Management Station (NMS)?

<p>Monitors and controls managed devices using applications. (A)</p>
Signup and view all the answers

What critical piece describes all of the managed objects within an SNMP managed device?

<p>Management Information Base (MIB) (B)</p>
Signup and view all the answers

What is the role of network management applications (NMAs) in network management?

<p>Monitoring and controlling network elements. (B)</p>
Signup and view all the answers

Within a Management Information Base (MIB), what does each Object Identifier (OID) uniquely identify?

<p>A variable that can be read or set via SNMP (B)</p>
Signup and view all the answers

What specification defines how MIBs should be formatted?

<p>Structure of Management Information Version 2 (SMIv2) (C)</p>
Signup and view all the answers

On which layer does the SNMP protocol operate?

<p>Application Layer (C)</p>
Signup and view all the answers

Which UDP port does an SNMP agent typically use to send notifications or 'traps'?

<p>162 (B)</p>
Signup and view all the answers

What is the role of the VarBindList when sending a request?

<p>To construct an appropriate PDU based on the operation type. (B)</p>
Signup and view all the answers

What method is used to serialize the message when sending it to the SNMP agent?

<p>BER encoding scheme (C)</p>
Signup and view all the answers

What is the function of the GetRequest PDU type in SNMP?

<p>To retrieve the value of a variable or list of variables from an agent. (B)</p>
Signup and view all the answers

During the processing of an incoming request, when is the SNMP version number verified?

<p>After the message is de-serialized and the ASN.1 message is constructed. (B)</p>
Signup and view all the answers

What information is used to construct a Response PDU when sending a response?

<p>The saved request-id value, error-status, error-index and VarBindList. (A)</p>
Signup and view all the answers

If a GetRequest to an agent yields a 'noSuchName' error, this indicates:

<p>The specified instance of management information is not accessible. (D)</p>
Signup and view all the answers

What action can a manager take if a getRequest operation causes an error?

<p>Try the operation multiple times. (D)</p>
Signup and view all the answers

The GetNextRequest PDU type is most useful when you need to:

<p>Discover available variables and their values on an agent. (D)</p>
Signup and view all the answers

Which Request PDU supports retrieving a large amount of data in a single request, working as an optimized version of GetNextRequest?

<p>GetBulkRequest (D)</p>
Signup and view all the answers

If you need to modify the current configuration on a managed device, which PDU would you dispatch to the Agent?

<p>SetRequest (A)</p>
Signup and view all the answers

Which type of SNMP PDU is used for asynchronous notifications from an agent to the manager, alerting the manager of a significant event?

<p>Trap (C)</p>
Signup and view all the answers

An SNMP agent sends a coldStart trap. Of what is this indicating?

<p>The agent is reinitializing and its configuration may be altered. (D)</p>
Signup and view all the answers

With respect to SNMP notifications, what is the term for the periodic gathering of data from agents by a manager?

<p>Polling (A)</p>
Signup and view all the answers

Which SNMP version was criticized for having poor security?

<p>SNMPv1 (B)</p>
Signup and view all the answers

Which of the following is a limitation specific to SNMPv1?

<p>Limited data types and error codes. (A)</p>
Signup and view all the answers

What key improvement was introduced in SNMPv2 to address limitations in SNMPv1?

<p>The GetBulkRequest operation. (C)</p>
Signup and view all the answers

What security mechanisms does SNMPv3 offer?

<p>Authentication and encryption (C)</p>
Signup and view all the answers

In SNMPv3, what are the two fundamental components of an SNMP Entity?

<p>SNMP engine and SNMP applications (D)</p>
Signup and view all the answers

Which component in SNMPv3's architecture examines the version number of an incoming message?

<p>Dispatcher (D)</p>
Signup and view all the answers

What is the primary function of the Security Subsystem within the SNMP Engine?

<p>Authenticates and encrypts messages. (B)</p>
Signup and view all the answers

Flashcards

Network Management

Activities, methods, procedures, and tools pertaining to the operation, administration, maintenance, and provisioning of networked systems.

Network Operation

Keeping the network and services up and smoothly running

Network Administration

Keeping track of resources in the network and how they are assigned.

Network Maintenance

Performing repairs and upgrades to the network.

Signup and view all the flashcards

Network Provisioning

Configuring resources in the network to support a given service.

Signup and view all the flashcards

SNMP Definition

A protocol for managing devices on IP networks.

Signup and view all the flashcards

SNMP Manager

An application program that contacts an SNMP agent to query or modify the database at the agent.

Signup and view all the flashcards

SNMP Agent

Software that runs on a piece of network equipment and maintains information about its configuration and current state in a database.

Signup and view all the flashcards

Network Management Station (NMS)

Executes applications that monitor and control managed devices.

Signup and view all the flashcards

Management Information Base (MIB)

Describes the structure of management data in a device subsystem and uses a hierarchical namespace containing object identifiers.

Signup and view all the flashcards

SNMP Protocol

Operates in the Application Layer through UDP ports 161 for requests and 162 for notifications.

Signup and view all the flashcards

SNMP GetRequest

A manager-to-agent request to retrieve the value of a variable or list of variables, returning current values in a Response.

Signup and view all the flashcards

SNMP Response

Returns variable bindings and acknowledgement from agent to manager for GetRequest or any other request message type.

Signup and view all the flashcards

SNMP GetNextRequest

A manager-to-agent request to discover available variables and their values, returning a Response with the lexicographically next variable in the MIB.

Signup and view all the flashcards

SNMP GetBulkRequest

An optimized version of GetNextRequest that Retrieves multiple iterations of GetNextRequest.

Signup and view all the flashcards

SNMP SetRequest

A manager-to-agent request to change the value of a variable or list of variables

Signup and view all the flashcards

SNMP Trap

Asynchronous notification from agent to manager of significant events by way of an unsolicited SNMP message.

Signup and view all the flashcards

Cold Start Trap

The sending protocol entity is reinitializing itself so that the agent's configuration or the protocol entity implementation can be altered.

Signup and view all the flashcards

Link Down Trap

The sending protocol entity recognizes a failure in one of the communication links represented in the agent's configuration.

Signup and view all the flashcards

Authentication Failure Trap

The sending protocol entity is the addressee of a protocol message that is not properly authenticated.

Signup and view all the flashcards

Enterprise Specific Trap

The sending protocol entity recognizes that some enterprise-specific event has occurred.

Signup and view all the flashcards

Polling

Periodic gathering of data by managers.

Signup and view all the flashcards

Pushing

An agent notifying a management station of significant events by way of an unsolicited SNMP message.

Signup and view all the flashcards

SNMPv1

SNMP version 1, initial implementation of the SNMP protocol.

Signup and view all the flashcards

SNMPv2

Revises version 1 and includes improvements in performance, security, and manager-to-manager communications.

Signup and view all the flashcards

SNMPv3

Primarily added security and remote configuration enhancements to SNMP.

Signup and view all the flashcards

SNMPv1 Limitations

SNMP version 1 limitations.

Signup and view all the flashcards

Too Big Error

The size of the response would exceed a local limitation.

Signup and view all the flashcards

No Such Name Error

A specified instance of the management information is not available to be accessed.

Signup and view all the flashcards

Gen Error

A specified instance of the management information is not available due to some other reason.

Signup and view all the flashcards

Error indication

GET operation is to be tried multiple times before retimed with no error.

Signup and view all the flashcards

Non-Repeater

The non-repeater of the VarBind list is being treated as GETNEXT Request Operation

Signup and view all the flashcards

SNMPv2 Limitations

SNMP version 2 limitations include complexity, overshoot issue and security.

Signup and view all the flashcards

SNMP dispatcher

Traffic manager that sends and receives messages and responsible for dispatching PDUs to applications

Signup and view all the flashcards

SNMP security subsystem

Authenticate and encrypt messages and may generate an authentication code

Signup and view all the flashcards

Three SNMP security sub modules

Consists of three sub modules: community based security model, user based security model

Signup and view all the flashcards

SNMP Access Control

Determines whether access to a managed object should be allowed

Signup and view all the flashcards

Command Generators

Generate SNMP commands to collect or set management data.

Signup and view all the flashcards

Notification originators

Generate trap or inform messages.

Signup and view all the flashcards

Pravicy

Ensure that a message cannot be read by unauthorized.

Signup and view all the flashcards

plain text community string

Plain text community strings for authentication as plain text without encryption

Signup and view all the flashcards

Study Notes

Network Management

  • Network management involves activities, methods, procedures, and tools for the operation, administration, maintenance, and provisioning of networked systems.
  • It is essential for command and control practices and is typically carried out from a network operations center.
  • Operation deals with maintaining the network and its services in a smooth, running state.
  • Administration handles resource tracking within the network and their assignments.
  • Maintenance involves performing necessary repairs and upgrades.
  • Provisioning configures network resources to support specific services.
  • Data for network management is acquired via agents on infrastructure, synthetic monitoring simulating transactions, logs of activity, sniffers, and real user monitoring.

Need for Network Management Tools

  • In the early Arpanet days, name services were managed by distributing a single file with all network IP addresses; today it would be DNS.
  • As networks grow, they become more important to organizations.
  • Network size increase means there are more potential issues, leading to disabled or poor performance.
  • Managing a large modern network requires software assistance.

SNMP & Network Management History

  • In 1983, TCP/IP replaced ARPANET at the U.S. Dept. of Defense, marking the birth of the Internet.
  • The first network management model was HEMS (High-Level Entity Management System) Based on RFCs 1021, 1022, 1024, 1076.
  • In 1987, ISO OSI proposed CMIP (Common Management Information Protocol) and ​​​​​​​CMOT (CMIP over TCP) for network management.
  • November 1987 saw ​​​​​​​SGMP (Simple Gateway Monitoring protocol) - RFC 1028.
  • In 1989, Marshall T. Rose formed an ​​​​​​​SNMP working group to develop a common network management framework compatible with both ​​​​​​​SGMP and CMOT to allow transition to ​​​​​​​CMOT.
  • August 1989 saw the definition of the "Internet-standard Network Management Framework" based on RFCs 1065, 1066, and 1067.
  • April 1989, ​​​​​​​SNMP gained recommended status as the de facto TCP/IP network management framework (RFC 1098).
  • June 1989 the ​IAB committee decided that ​​​​​​​SNMP and CMOT would develop separately.
  • IAB promoted ​​​​SNMP to a standard protocol with recommended status in May 1990 (RFC 1157).
  • March 1991 defined the format of MIBs and traps (RFCs 1212, 1215).
  • Creation of ​​​​​​​SNMPv1 from the revised TCP/IP MIB definition (RFC 1213).

Technologies

  • A standardized protocol is necessary for heterogeneous environments as it prevents network engineers spending too much time developing customized management tools.
  • Access methods for network and device management include:
    • ​​​​​​​SNMP
    • command-line interface
    • custom XML
    • ​​​​​​​CMIP
    • Windows Management Instrumentation (WMI)
    • Transaction Language 1
    • CORBA
    • NETCONF
    • Java Management Extensions (JMX)

Use of Standardized Protocol

  • The goals are to:
    • Minimize complexity in management functions.
    • Provide flexibility and extensibility.
    • Ensure independence from specific host and gateway architectures and mechanisms.

SNMP

  • It is an "Internet-standard protocol for managing devices on IP networks."
  • It enables local and remote management of network items, servers, workstations, routers, switches, and other managed devices.
  • It is comprised of standards for network management, including a database schema, an application layer protocol, and a set of data objects.

Key Components

  • Manager: An application program which queries or modifies the database in an ​​​​​​​SNMP agent.
  • Agent: Software installed on network equipment (like hosts, routers, and printers) which keeps configuration, and the current state in a database.
  • Network Management Station (NMS): Executes applications to monitor and control managed devices and provides the resources needed for network management. One or more NMSs can exist on a network.
  • Management Information Bases (MIBs): Describe the database information.
  • SNMP Protocol: The application layer protocol used by ​​​​​​​SNMP agents and managers for data exchange.

Network Management Station (NMS)

  • Executes network management applications (NMAs) that monitor and oversee network elements (NE) such as hosts, gateways, and terminal servers
  • Network elements employ a management agent (MA) to execute the network management tasks requested by the network management stations.

Management Information Base (MIB)

  • It structures management data of a device subsystem, using a hierarchical namespace including object identifiers (OID).
  • Each OID allows for reading or modifications via ​​​​​​​SNMP.
  • MIBs rely on standard notation, Structure of Management Information Version 2 (SMIv2, RFC 2578), a subset of ASN.1 (Abstract Syntax Notation One).

SNMP Protocol

  • It is found in the Application Layer and has three versions: ​​​​​​​SNMPv1, ​​​​​​​SNMPv2, and ​​​​​​​SNMPv3.
  • SNMP Managers send requests using UDP port 161.
  • SNMP Agents send notifications on UDP port 162.
  • ​​​​​​​SNMPv1 specifies five core protocol data units (PDUs), with SNMPv2 adding two more which are carried over to ​​​​​​​SNMPv3.

Sending a Request

  • Form the right PDU according to the operation type and VarBindList.
  • The PDU, agent identity and security data go into a security mechanism for authentication/encryption, community strings and also creates an ​​​​​​​SNMP message.
  • The message goes using UDP transport, to the ​​​​​​​SNMP agent. Serialization happens using the BER encoding scheme.

PDU Type Used: GetRequest

  • It is a manager-to-agent request to retrieve the value of one or more variables; specifying which variables in variable bindings, returning retrieval as an atomic operation. A ​​​​​​​Response with values is then returned.

Receiving a Request

  • The incoming message is de-serialized to construct an ASN.1 message.
  • The version number is verified.
  • The security mechanism authenticates input from the community name, and security information in the ​​​​​​​SNMP message.
  • An ASN.1 object is built which correlates to an ​​​​​​​SNMP PDU object.

Sending a Response

  • Construct a Response PDU using the saved request-id value and the values for error-status, error-index and VarBindList from the request.
  • Security mechanism, via community string and SNMP message, secures the PDU with security information and agent identity.
  • Sender serializes and sends the message back to the manager.

Pdu Type Used: Response

  • Returns the variable bindings and acknowledgment from agent to manager for a GetRequest or any similar request.
  • Error reporting uses error-status and error-index fields.
  • This PDU was called GetResponse in ​​​​​​​SNMPv1, but was used as a response to both gets and sets.

Receiving a Response

  • The incoming message is de-serialized.
  • The PDU version is verified.
  • The security community name, security information and data from the ​​​​​​​SNMP message goes to the security mechanism.
  • The ASN.1 object is parsed.

GetRequest/GetResponse Errors

  • tooBig happens when the response is too large, exceeding device limits.
  • noSuchName happens when the request references a non-existent management instance or violates access restrictions.
  • genErr refers to when an identified instance of management information is unavailable due to some reason.

Other Request PDU Types: GetNextRequest

  • The GetNextRequest is a manager-to-agent request to discover available variables and their values, returning the subsequent variable binding lexicographically found in the MIB with a suitable response.
  • The entire MIB of an agent can be walked by iteratively applying GetNextRequest starting at OID 0.

Other Request PDU Types: GetBulkRequest

  • Built from GetNextRequest, this is a manager-to-agent request that optimizes multiple iterations of requests and provides increased performance for network monitoring.
  • GetBulkRequest gives a Response with multiple variable bindings and uses non-repeaters and max-repetitions to control the response behavior.

Other Request PDU Types: SetRequest

  • The SetRequest is a manager-to-agent request that is made to change variables, performed in the body of a request. When changes happen, a Response including modified values is returned.

SetRequest/GetResponse Errors

  • badValue occurs when the field won't comply with data types or standards.
  • noSuchName occurs when the information isn't accessible, control access or because of an instance.
  • genErr The management information isn't available, due to some reason.

Other PDU Types: Trap

  • A Trap constitutes asynchronous notification from agent to manager, where an agent can alert the management station to notable events by sending an unsolicited ​​​​​​​SNMP message.
  • They also contain the current sysUpTime , an OID for trap type, and optional variable bindings. A response is not expected.

TRAP Types

  • coldStart occurs when a protocol entity restarts and reinitializes, possibly altering its configuration or implementation.
  • warmStart is similar, but the protocol entity restarts without changing its configuration or implementation.
  • linkDown signals when one communication link represented in the agent's configuration has failed.
  • linkUp indicates that one communication link represented in the agent's configuration has successfully come up.
  • authenticationFailure is received when the protocol entity can't validate a given message.
  • egpNeighorLoss, when an EGP neighbor has has been marked down or no longer exists.
  • enterpriseSpecific is for enterprise events.

Use of Events

  • Agents give certain data after being asked by managers.
    • This is called "polling."
  • The time it takes the manager to understand the event is the "event detection latency".
  • In one management model, agents in manage systems make responses to managers.
    • This is called "Traps (pushing)".
      • If communication fails, the manager can't know the event

SNMP Versions

  • SNMPv1 is the initial version, but it has poor security because it uses a simple "community string" for authentication.
  • SNMPv2 aims to improve in areas of performance, security, etc, by introducing GetBulkRequest
  • SNMPv3 adds security, remote configuration, as well as all its functionality of previous versions.

SNMPv1: Limitations

  • Limited data types.
  • Some increase in complexity of MIB understanding and design exists.
  • Limited performance.
  • Inefficient for large retrievals, such as entire MIBs or tables.
  • Limited error codes.
  • No hierarchies.
  • Inherently centralized.
  • Lack of security (relying on community strings).

​​​​​​​SNMPv2

  • There are more data types.
  • It is more complex.
  • It tries to bypass ​​​​​​​SNMPv1 problems by giving the community security, ​​​​​​​SNMPv2 and ​​​​​​​SNMPv1 can function simultaneously.

SNMPv2: Features

  • Adds new data types
  • Is community-based, so much like SNMPv1.
  • GET & GETNEXT operation is same for SNMPv1.
  • SET Request operate in two phases.
  • Expansions for the protocol operations take places.
    • Also adds INFROM Request and GETBULK Request.

GETBULK Request

  • It is efficient if you have to get many VarBinds for getting so, two parameters have to be called:
    • Non-repeaters: the first "N" lists are called with a GETNEXT operation.
    • max-repetitions: other lists act in the operation, having the number of GETNEXT Request operations.

INFORM Request

  • Unlike SNMPv1, it sends no trap messages. There is no trap, but no message is sent.
  • As a result, ​SNMPV2 introduces the INFORM operation.
    • In other words, it is a trap that is confirmed.
      • it is to inform a higher level manager.
  • If there is error, tooBig results.

​​​​​​​SNMPv2: Feautures

  • Exceptions added, such as noSuchObject or noSuchInstance
  • GETNEXT gets errors like endofMibView
  • The coded exceptions are placed in VarBinds, so there will be no Error Status and Index raised.

​​​​​​​SNMPv2: Limitations

  • Too complex
  • GETBULK doesn't stop during the end of a table - the overshoot problem.
  • Its complex that it overshoted SNMPv1, so a basic system was used instead for SNMPv2: community-based security.

SNMPv3: Features

  • Better in remote configuration capabilities.
  • Adds ability to control agents via a specific management MIB.
  • Contains of function from both and ​​​​​​​SNMPv1 and ​​​​​​​SNMPv2.
  • Incorporates ​​​​​​​SNMPv2 data types

SNMPv3: Entities

  • Both Manager and Agency are SNMP.
    • Which are both defined by ​​​​​​​SNMP engine and ​​​​​​​SNMP appications.

SNMPv3

  • SNMP manager uses the command dispatcher to send getRequest and getNextRequest to the SNMP GetBulk
    • At the SNMP agent; then checks the parameters, the local database, then returns to the SNMP manager,

SNMP Engine: Dispatcher

  • The dispatcher is a traffic manager that sends and receives messages.
  • For incoming messages, the dispatcher establishes the version number, which then leads to the correct message processing model.
  • The dispatcher picks and choose the right ports for outgoing signals and will dispatch PDU.

SNMP Engine: Message Processing Subsystem

  • For the outgoing message section, it receives the PDU and wraps their message.
  • The dispatcher get the incoming signals.
    • And if it has the right version, it would support and contain separate modules and each version

SNMP Engine: Security Subsystem

  • It checks the right encrypted messages by the message processing subsystem.
    • It relies if its safe via PDU and messages.
      • It can make authenticaited codes and insert the message by the message handling, then it provides after the after-encryption messages.

​​​​​​SNMP Engine: Security System

  • The incomming message has information.
    • This allows the right authentication for description.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

More Like This

IP Telephony Operations and Management
10 questions
Pengenalan MikroTik RouterOS
11 questions
Windows Server Overview and Features
13 questions
Use Quizgecko on...
Browser
Browser