SlideShare uma empresa Scribd logo
1 de 48
1
Upon completion you will be able to:
Network Management:
SNMP
• Understand the SNMP manager and the SNMP agent
• Understand the roles of SMI and MIB in network management
• Be familiar with SMI object attributes and encoding methods
• Know how an MIB variable is accessed
• Be familiar with the SNMP PDU and format
Objectives
2
CONCEPT
SNMP defines a manager, usually a host,
that controls and monitors a set of agents,
usually routers.
The topics discussed in this section include:
Managers and Agents
3
Figure SNMP concept
4
MANAGEMENT COMPONENTS
SNMP requires the use of two other protocols: Structure of
Management Information (SMI) and Management
Information Base (MIB). Network management on the
Internet is done through the cooperation of SNMP, SMI, and
MIB.
The topics discussed in this section include:
Role of SNMP
Role of SMI
Role of MIB
An Analogy
An Overview
5
Components of network management on the
Internet
6
SNMP defines the format of packets
exchanged between a manager and an
agent. It reads and changes the status
(values) of objects (variables) in
SNMP packets.
Note:
7
SMI defines the general rules for naming
objects, defining object types (including
range and length), and showing how to
encode objects and values. SMI defines
neither the number of objects an entity
should manage, nor names the objects to
be managed nor defines the association
between the objects and their values.
Note:
8
MIB creates a collection of named
objects, their types, and their
relationships to each other in an entity
to be managed.
Note:
9
We can compare the task of network
management to the task of writing a
program.
❏ Both tasks need rules. In network management
this is handled by SMI.
❏ Both tasks need variable declarations. In network
management this is handled by MIB.
❏ Both tasks have actions performed by statements.
In network management this is handled by SNMP.
Note:
10
Figure Management overview
11
SMI
SMI is a component used in network
management. It names objects, defines the
type of data that can be stored in an object,
and shows how data can be encoded for
transmission over the network
The topics discussed in this section include:
Name
Type
Encoding Method
12
Figure Object attributes
13
Figure Object identifier
14
All objects managed by SNMP are
given an object identifier.
The object identifier always starts with
1.3.6.1.2.1.
Note:
15
Figure Data type
16
Table Data types
17
Figure Conceptual data types
18
Figure Encoding format
19
Table 21.2 Codes for data types
20
Figure 21.9 Length format
21
Figure 21.10 shows how to define INTEGER 14.
Example 1
See Next Slide
22
Figure 21.10 Example 1, INTEGER 14
23
Example 2
See Next Slide
Figure 21.11 shows how to define the OCTET STRING
“HI.”
24
Figure 21.11 Example 2, OCTET STRING “HI”
25
Figure 21.12 shows how to define ObjectIdentifier
1.3.6.1 (iso.org.dod.internet).
Example 3
See Next Slide
26
Figure 21.12 Example 3, ObjectIdentifier 1.3.6.1
27
Figure 21.13 shows how to define IPAddress
131.21.14.8.
Example 4
See Next Slide
28
Figure 21.13 Example 4, IPAddress 131.21.14.8
29
21.4 MIB
MIB is a component used in network management. Each agent has its
own MIB, a collection of all the objects that the manager can manage.
The topics discussed in this section include:
Accessing MIB Variables
Lexicographic Ordering
30
Figure 21.14 mib-2
31
Figure 21.15 udp group
32
Figure 21.16 udp variables and tables
33
Figure 21.17 Indexes for udpTable
34
Figure 21.18 Lexicographic ordering
35
21.5 SNMP
SNMP is an application program that allows 1) a manager to retrieve the
value of an object defined in an agent; 2) a manager to store a value in
an object defined in an agent; and 3) an agent to send an alarm message
about an abnormal situation to the manager
The topics discussed in this section include:
PDUs
Format
36
Figure 21.19 SNMP PDUs
37
Figure 21.20 SNMP PDU format
38
Table 21.3 Types of errors
39
21.6 MESSAGES
A message in SNMP is made of four elements: version, header, security
parameters, and data (which includes the encoded PDU).
40
Figure 21.21 SNMP message
41
Table 21.4 Codes for SNMP messages
42
In this example, a manager station (SNMP client) uses the
GetRequest message to retrieve the number of UDP datagrams
that a router has received. There is only one VarBind entity.
The corresponding MIB variable related to this information is
udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0.
The manager wants to retrieve a value (not to store a value), so
the value defines a null entity. Figure 21.22 shows the
conceptual view of the packet showing the hierarchical nature
of sequences. We have used white and color boxes for the
sequence and a gray one for the PDU.
Example 5
See Next Slide
43
The VarBind list has only one VarBind. The variable is of type
06 and length 09. The value is of type 05 and length 00. The
whole is a sequence of length 0D (13). The VarBind list is also
a sequence of length 0F (15). The GetRequest PDU is of length
1D (29). Now we have three OCTET STRINGs related to
security parameter, security model, and flags. Then we have
two integers defining maximum size (1024) and message ID
(64). The header is a sequence of length 12, which we left
blank for simplicity. There is one integer, version (version 3).
The whole message is a sequence of 52 bytes. Figure 21.23
shows the actual message sent by the manager station (client)
to the agent (server).
Example 5
See Next Slide
44
Figure 21.22 Example 5
45
Figure 21.23 GetRequest message
46
21.7 UDP PORTS
SNMP uses the services of UDP on two well-known ports, 161 and 162.
The well-known port 161 is used by the server (agent), and the well-
known port 162 is used by the client (manager).
47
Figure 21.24 Port numbers for SNMP
48
21.8 SECURITY
The main difference between SNMPv3 and SNMPv2 is the enhanced
security. SNMPv3 provides two types of security: general and specific.
SNMPv3 provides message authentication, privacy, and manager
authorization.

Mais conteúdo relacionado

Mais procurados

VLAN на Mikrotik: принципы работы и стыковка с другими свичами
VLAN на Mikrotik: принципы работы и стыковка с другими свичамиVLAN на Mikrotik: принципы работы и стыковка с другими свичами
VLAN на Mikrotik: принципы работы и стыковка с другими свичамиmikrotik-training
 
IoT Toulouse : introduction à mqtt
IoT Toulouse : introduction à mqttIoT Toulouse : introduction à mqtt
IoT Toulouse : introduction à mqttJulien Vermillard
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsRowell Dionicio
 
01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansiNader Elmansi
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networksabdulquyyum
 
Tutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slidesTutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slidesVinayagam D
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Role of Internet Exchange Points (IXP)
Role of Internet Exchange Points (IXP)Role of Internet Exchange Points (IXP)
Role of Internet Exchange Points (IXP)Internet Society
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networksRushin Shah
 
An introduction to Wireless Small Cell Networks
An introduction to Wireless Small Cell NetworksAn introduction to Wireless Small Cell Networks
An introduction to Wireless Small Cell NetworksMehdi Bennis
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from JuniperNam Nguyen
 
Security for 5G presentation.pptx
Security for 5G presentation.pptxSecurity for 5G presentation.pptx
Security for 5G presentation.pptxAmr Said
 
Beginners: 5G Terminology (Updated - Feb 2019)
Beginners: 5G Terminology (Updated - Feb 2019)Beginners: 5G Terminology (Updated - Feb 2019)
Beginners: 5G Terminology (Updated - Feb 2019)3G4G
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networksGokuldhev mony
 

Mais procurados (20)

VLAN на Mikrotik: принципы работы и стыковка с другими свичами
VLAN на Mikrotik: принципы работы и стыковка с другими свичамиVLAN на Mikrotik: принципы работы и стыковка с другими свичами
VLAN на Mikrotik: принципы работы и стыковка с другими свичами
 
IoT Toulouse : introduction à mqtt
IoT Toulouse : introduction à mqttIoT Toulouse : introduction à mqtt
IoT Toulouse : introduction à mqtt
 
Using BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet ConnectionsUsing BGP To Manage Dual Internet Connections
Using BGP To Manage Dual Internet Connections
 
Network Slicing overview_v6
Network Slicing overview_v6Network Slicing overview_v6
Network Slicing overview_v6
 
01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi
 
Mobile Ad Hoc Network.pdf
Mobile Ad Hoc Network.pdfMobile Ad Hoc Network.pdf
Mobile Ad Hoc Network.pdf
 
NGN Next Generation Networks
NGN Next Generation NetworksNGN Next Generation Networks
NGN Next Generation Networks
 
Tutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slidesTutorial ns 3-tutorial-slides
Tutorial ns 3-tutorial-slides
 
5G Network Slicing
5G Network Slicing5G Network Slicing
5G Network Slicing
 
Network monitoring system
Network monitoring systemNetwork monitoring system
Network monitoring system
 
Aruba instant iap setup rev3
Aruba instant iap setup rev3Aruba instant iap setup rev3
Aruba instant iap setup rev3
 
Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Role of Internet Exchange Points (IXP)
Role of Internet Exchange Points (IXP)Role of Internet Exchange Points (IXP)
Role of Internet Exchange Points (IXP)
 
Basics of Wireless sensor networks
Basics of Wireless sensor networksBasics of Wireless sensor networks
Basics of Wireless sensor networks
 
An introduction to Wireless Small Cell Networks
An introduction to Wireless Small Cell NetworksAn introduction to Wireless Small Cell Networks
An introduction to Wireless Small Cell Networks
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 
Security for 5G presentation.pptx
Security for 5G presentation.pptxSecurity for 5G presentation.pptx
Security for 5G presentation.pptx
 
Beginners: 5G Terminology (Updated - Feb 2019)
Beginners: 5G Terminology (Updated - Feb 2019)Beginners: 5G Terminology (Updated - Feb 2019)
Beginners: 5G Terminology (Updated - Feb 2019)
 
Wireless sensor networks
Wireless sensor networksWireless sensor networks
Wireless sensor networks
 

Destaque

Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
Network Management
Network ManagementNetwork Management
Network ManagementVivek Garg
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMPAhmar Hashmi
 
Linux: Beyond ls and cd
Linux: Beyond ls and cdLinux: Beyond ls and cd
Linux: Beyond ls and cdjacko91
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker ProjectPraveen Mathews
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringLaili Aidi
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolNilantha Piyasiri
 
IPv6 Theory by Cisco
IPv6 Theory by CiscoIPv6 Theory by Cisco
IPv6 Theory by CiscoFebrian ‎
 
Linux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileLinux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileKenny (netman)
 

Destaque (20)

Snmp
SnmpSnmp
Snmp
 
SNMP
SNMPSNMP
SNMP
 
Introduction to SNMP
Introduction to SNMPIntroduction to SNMP
Introduction to SNMP
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Network Management
Network ManagementNetwork Management
Network Management
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
Protocolo SNMP
Protocolo SNMPProtocolo SNMP
Protocolo SNMP
 
Linux: Beyond ls and cd
Linux: Beyond ls and cdLinux: Beyond ls and cd
Linux: Beyond ls and cd
 
SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force SNMP & The Dark Side of the Force
SNMP & The Dark Side of the Force
 
SNMP Network Tracker Project
SNMP Network Tracker ProjectSNMP Network Tracker Project
SNMP Network Tracker Project
 
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using ClusteringSNMP Project: SNMP-based Network Anomaly Detection Using Clustering
SNMP Project: SNMP-based Network Anomaly Detection Using Clustering
 
SNMP
SNMPSNMP
SNMP
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
Snmp protocol
Snmp protocolSnmp protocol
Snmp protocol
 
SNMP
SNMPSNMP
SNMP
 
Inter as vpn option c
Inter as vpn option c Inter as vpn option c
Inter as vpn option c
 
IPv6 Theory by Cisco
IPv6 Theory by CiscoIPv6 Theory by Cisco
IPv6 Theory by Cisco
 
Linux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileLinux fundamental - Chap 03 file
Linux fundamental - Chap 03 file
 
Chap 22 www http
Chap 22 www httpChap 22 www http
Chap 22 www http
 

Semelhante a Network Management: Understanding SNMP

CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptserne
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptuseonlyfortech140
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1MOHD ARISH
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmpjorlugon
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7jignash
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCEassinha
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibilityHamdamboy (함담보이)
 
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery BoardProgramming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery BoardGaurav Verma
 

Semelhante a Network Management: Understanding SNMP (20)

Ch28
Ch28Ch28
Ch28
 
Chapter 28
Chapter 28Chapter 28
Chapter 28
 
ch28 (1).ppt
ch28 (1).pptch28 (1).ppt
ch28 (1).ppt
 
CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.ppt
 
ch28.ppt
ch28.pptch28.ppt
ch28.ppt
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Ch23
Ch23Ch23
Ch23
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Introduction tosnmp
Introduction tosnmpIntroduction tosnmp
Introduction tosnmp
 
Snmp
SnmpSnmp
Snmp
 
I010315760
I010315760I010315760
I010315760
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
Chapter 9 v6.0
Chapter 9 v6.0Chapter 9 v6.0
Chapter 9 v6.0
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
001 implementation nms_software
001 implementation nms_software001 implementation nms_software
001 implementation nms_software
 
SNMP.pptx
SNMP.pptxSNMP.pptx
SNMP.pptx
 
Network Management System and Protocol usibility
Network Management System and Protocol usibilityNetwork Management System and Protocol usibility
Network Management System and Protocol usibility
 
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery BoardProgramming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
Programming the ARM CORTEX M3 based STM32F100RBT6 Value Line Discovery Board
 

Mais de bhavanatmithun

Mais de bhavanatmithun (13)

Code optimisation presnted
Code optimisation presntedCode optimisation presnted
Code optimisation presnted
 
computer networks
computer networkscomputer networks
computer networks
 
Deadlock
DeadlockDeadlock
Deadlock
 
krisibhavan site
krisibhavan sitekrisibhavan site
krisibhavan site
 
User server interaction
User server interactionUser server interaction
User server interaction
 
Types of cn, protocols and standards
Types of cn, protocols and standardsTypes of cn, protocols and standards
Types of cn, protocols and standards
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
HTTP
HTTPHTTP
HTTP
 
FTP
FTPFTP
FTP
 
DNS
DNSDNS
DNS
 
application layer protocols
application layer protocolsapplication layer protocols
application layer protocols
 
Group communication
Group communicationGroup communication
Group communication
 
Group communication
Group communicationGroup communication
Group communication
 

Último

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 

Último (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 

Network Management: Understanding SNMP

  • 1. 1 Upon completion you will be able to: Network Management: SNMP • Understand the SNMP manager and the SNMP agent • Understand the roles of SMI and MIB in network management • Be familiar with SMI object attributes and encoding methods • Know how an MIB variable is accessed • Be familiar with the SNMP PDU and format Objectives
  • 2. 2 CONCEPT SNMP defines a manager, usually a host, that controls and monitors a set of agents, usually routers. The topics discussed in this section include: Managers and Agents
  • 4. 4 MANAGEMENT COMPONENTS SNMP requires the use of two other protocols: Structure of Management Information (SMI) and Management Information Base (MIB). Network management on the Internet is done through the cooperation of SNMP, SMI, and MIB. The topics discussed in this section include: Role of SNMP Role of SMI Role of MIB An Analogy An Overview
  • 5. 5 Components of network management on the Internet
  • 6. 6 SNMP defines the format of packets exchanged between a manager and an agent. It reads and changes the status (values) of objects (variables) in SNMP packets. Note:
  • 7. 7 SMI defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values. SMI defines neither the number of objects an entity should manage, nor names the objects to be managed nor defines the association between the objects and their values. Note:
  • 8. 8 MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed. Note:
  • 9. 9 We can compare the task of network management to the task of writing a program. ❏ Both tasks need rules. In network management this is handled by SMI. ❏ Both tasks need variable declarations. In network management this is handled by MIB. ❏ Both tasks have actions performed by statements. In network management this is handled by SNMP. Note:
  • 11. 11 SMI SMI is a component used in network management. It names objects, defines the type of data that can be stored in an object, and shows how data can be encoded for transmission over the network The topics discussed in this section include: Name Type Encoding Method
  • 14. 14 All objects managed by SNMP are given an object identifier. The object identifier always starts with 1.3.6.1.2.1. Note:
  • 19. 19 Table 21.2 Codes for data types
  • 21. 21 Figure 21.10 shows how to define INTEGER 14. Example 1 See Next Slide
  • 22. 22 Figure 21.10 Example 1, INTEGER 14
  • 23. 23 Example 2 See Next Slide Figure 21.11 shows how to define the OCTET STRING “HI.”
  • 24. 24 Figure 21.11 Example 2, OCTET STRING “HI”
  • 25. 25 Figure 21.12 shows how to define ObjectIdentifier 1.3.6.1 (iso.org.dod.internet). Example 3 See Next Slide
  • 26. 26 Figure 21.12 Example 3, ObjectIdentifier 1.3.6.1
  • 27. 27 Figure 21.13 shows how to define IPAddress 131.21.14.8. Example 4 See Next Slide
  • 28. 28 Figure 21.13 Example 4, IPAddress 131.21.14.8
  • 29. 29 21.4 MIB MIB is a component used in network management. Each agent has its own MIB, a collection of all the objects that the manager can manage. The topics discussed in this section include: Accessing MIB Variables Lexicographic Ordering
  • 32. 32 Figure 21.16 udp variables and tables
  • 33. 33 Figure 21.17 Indexes for udpTable
  • 35. 35 21.5 SNMP SNMP is an application program that allows 1) a manager to retrieve the value of an object defined in an agent; 2) a manager to store a value in an object defined in an agent; and 3) an agent to send an alarm message about an abnormal situation to the manager The topics discussed in this section include: PDUs Format
  • 37. 37 Figure 21.20 SNMP PDU format
  • 38. 38 Table 21.3 Types of errors
  • 39. 39 21.6 MESSAGES A message in SNMP is made of four elements: version, header, security parameters, and data (which includes the encoded PDU).
  • 41. 41 Table 21.4 Codes for SNMP messages
  • 42. 42 In this example, a manager station (SNMP client) uses the GetRequest message to retrieve the number of UDP datagrams that a router has received. There is only one VarBind entity. The corresponding MIB variable related to this information is udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0. The manager wants to retrieve a value (not to store a value), so the value defines a null entity. Figure 21.22 shows the conceptual view of the packet showing the hierarchical nature of sequences. We have used white and color boxes for the sequence and a gray one for the PDU. Example 5 See Next Slide
  • 43. 43 The VarBind list has only one VarBind. The variable is of type 06 and length 09. The value is of type 05 and length 00. The whole is a sequence of length 0D (13). The VarBind list is also a sequence of length 0F (15). The GetRequest PDU is of length 1D (29). Now we have three OCTET STRINGs related to security parameter, security model, and flags. Then we have two integers defining maximum size (1024) and message ID (64). The header is a sequence of length 12, which we left blank for simplicity. There is one integer, version (version 3). The whole message is a sequence of 52 bytes. Figure 21.23 shows the actual message sent by the manager station (client) to the agent (server). Example 5 See Next Slide
  • 46. 46 21.7 UDP PORTS SNMP uses the services of UDP on two well-known ports, 161 and 162. The well-known port 161 is used by the server (agent), and the well- known port 162 is used by the client (manager).
  • 47. 47 Figure 21.24 Port numbers for SNMP
  • 48. 48 21.8 SECURITY The main difference between SNMPv3 and SNMPv2 is the enhanced security. SNMPv3 provides two types of security: general and specific. SNMPv3 provides message authentication, privacy, and manager authorization.