SlideShare uma empresa Scribd logo
1 de 39
Chapter 28 Network Management: SNMP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
28-1  NETWORK MANAGEMENT SYSTEM We can say that the functions performed by a network management system can be divided into five broad categories: configuration management, fault management, performance management, security management, and accounting management. Configuration Management Fault Management Performance Management Security Management Accounting Management Topics discussed in this section:
Figure 28.1  Functions of a network management system
28-2  SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) The Simple Network Management Protocol (SNMP) is a framework for managing devices in an internet using the TCP/IP protocol suite. It provides a set of fundamental operations for monitoring and maintaining an internet. Concept Management Components Structure of Management Information (SMI) Management Information Base (MIB) SNMP Topics discussed in this section:
Figure 28.2  SNMP concept
Figure 28.3  Components of network management on the Internet
SNMP defines the format of packets exchanged between a manager and an agent. It reads and changes the status (values) of objects (variables)  in SNMP packets. Note
SMI defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values. SMI does not define the number of objects an entity should manage or name the objects to be managed or define the association between the objects and their values. Note
MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed. Note
We can compare the task of network management to the task of writing a program. ❏   Both tasks need rules. In network   management this is handled by SMI. ❏   Both tasks need variable declarations. In   network management this is handled by MIB. ❏   Both tasks have actions performed by   statements. In network management this is handled by SNMP. Note
Figure 28.4  Management overview
Figure 28.5  Object attributes
Figure 28.6  Object identifier
All objects managed by SNMP are given an object identifier. The object identifier always starts with 1.3.6.1.2.1. Note
Figure 28.7  Data type
Table 28.1  Data types
Figure 28.8  Conceptual data types
Figure 28.9  Encoding format
Table 28.2  Codes for data types
Figure 28.10  Length format
Figure 28.11 shows how to define INTEGER 14. Figure 28.11  Example 28.1, INTEGER 14 Example 28.1
Figure 28.12 shows how to define the OCTET STRING “HI”. Figure 28.12  Example 28.2, OCTET STRING “HI” Example 28.2
Figure 28.13 shows how to define ObjectIdentifier  1.3.6.1 (iso.org.dod.internet). Figure 28.13  Example 28.3, ObjectIdentifier 1.3.6.1 Example 28.3
Figure 28.14 shows how to define IPAddress 131.21.14.8.. Figure 28.14  Example 28.4, IPAddress 131.21.14.8. Example 28.4
Figure 28.15  mib-2
Figure 28.16  udp group
Figure 28.17  udp variables and tables
Figure 28.18  Indexes for udpTable
Figure 28.19  Lexicographic ordering
Figure 28.20  SNMP PDUs
Figure 28.21  SNMP PDU format
Table 28.3  Types of errors
Figure 28.22  SNMP message
Table 28.4  Codes for SNMP messages
In this example, a manager station (SNMP client) uses the GetRequest message to retrieve the number of UDP datagrams that a router has received. There is only one VarBind entity. The corresponding MIB variable related to this information is udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0. The manager wants to retrieve a value (not to store a value), so the value defines a null entity. Figure 28.23 shows the conceptual view of the packet and the hierarchical nature of sequences. We have used white and colored boxes for the sequences and a gray one for the PDU. The VarBind list has only one VarBind.  Example 28.5
The variable is of type 06 and length 09. The value is of type 05 and length 00. The whole VarBind is a sequence of length 0D (13). The VarBind list is also a sequence of length 0F (15). The GetRequest PDU is of length ID (29). Now we have three OCTET STRINGs related to the security parameter, security model, and flags. Then we have two integers defining maximum size (1024) and message ID (64). The header is a sequence of length 12, which we left blank for simplicity. There is one integer, version (version 3). The whole message is a sequence of 52 bytes. Figure 28.24 shows the actual message sent by the manager station (client) to the agent (server). Example 28.5 (continued)
Figure 28.23  Example 28.5
Figure 28.24  GetRequest message
Figure 28.25  Port numbers for SNMP

Mais conteúdo relacionado

Mais procurados

Transport layer
Transport layerTransport layer
Transport layer
rosmida
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
cbtvid
 

Mais procurados (20)

Session Layer
Session LayerSession Layer
Session Layer
 
Ch24
Ch24Ch24
Ch24
 
Dcn ppt by roma
Dcn ppt by romaDcn ppt by roma
Dcn ppt by roma
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Chapter 19
Chapter 19Chapter 19
Chapter 19
 
the transport layer
the transport layerthe transport layer
the transport layer
 
Chapter 15
Chapter 15Chapter 15
Chapter 15
 
01 Overview of Data Communication and Networking
01 Overview of Data Communication and Networking01 Overview of Data Communication and Networking
01 Overview of Data Communication and Networking
 
Transport layer
Transport layerTransport layer
Transport layer
 
Transport layer
Transport layer Transport layer
Transport layer
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
Snmp
SnmpSnmp
Snmp
 
What is XMPP Protocol
What is XMPP ProtocolWhat is XMPP Protocol
What is XMPP Protocol
 
Chapter 32
Chapter 32Chapter 32
Chapter 32
 
Chapter 2
Chapter 2Chapter 2
Chapter 2
 
Distance Vector Routing
Distance Vector RoutingDistance Vector Routing
Distance Vector Routing
 
Network Models in Networking.
Network Models in Networking.Network Models in Networking.
Network Models in Networking.
 
Chapter 20: Internet Protocol
Chapter 20: Internet ProtocolChapter 20: Internet Protocol
Chapter 20: Internet Protocol
 
TCP Model
TCP ModelTCP Model
TCP Model
 
Chapter 2: Network Models
Chapter 2: Network ModelsChapter 2: Network Models
Chapter 2: Network Models
 

Destaque (14)

Chapter 25
Chapter 25Chapter 25
Chapter 25
 
Chapter 27
Chapter 27Chapter 27
Chapter 27
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Chapter 17
Chapter 17Chapter 17
Chapter 17
 
Chapter 29
Chapter 29Chapter 29
Chapter 29
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Chapter 31
Chapter 31Chapter 31
Chapter 31
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
Chapter 22
Chapter 22Chapter 22
Chapter 22
 
Chapter 24
Chapter 24Chapter 24
Chapter 24
 
Chapter 30
Chapter 30Chapter 30
Chapter 30
 
Lecture 44
Lecture 44Lecture 44
Lecture 44
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 

Semelhante a Chapter 28

FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
useonlyfortech140
 
A simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gtsA simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gts
wissem hammouda
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH
 

Semelhante a Chapter 28 (20)

ch28 (1).ppt
ch28 (1).pptch28 (1).ppt
ch28 (1).ppt
 
CN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.pptCN UNIT 5 -SNMP.ppt
CN UNIT 5 -SNMP.ppt
 
ch28.ppt
ch28.pptch28.ppt
ch28.ppt
 
28 Network Management_SNMP
28 Network Management_SNMP28 Network Management_SNMP
28 Network Management_SNMP
 
Snmp
SnmpSnmp
Snmp
 
Ch23
Ch23Ch23
Ch23
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.pptFALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
FALLSEM2023-24_BCSE308L_TH_VL2023240100841_2023-07-10_Reference-Material-II.ppt
 
Snmpv3
Snmpv3Snmpv3
Snmpv3
 
Snmp
SnmpSnmp
Snmp
 
A simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gtsA simulation model of ieee 802.15.4 gts mechanism and gts
A simulation model of ieee 802.15.4 gts mechanism and gts
 
Network Management
Network ManagementNetwork Management
Network Management
 
Network Management System and Protocol
Network Management System and Protocol Network Management System and Protocol
Network Management System and Protocol
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
Snmp chapter7
Snmp chapter7Snmp chapter7
Snmp chapter7
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Snmp
SnmpSnmp
Snmp
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
 
Simple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtapSimple Network Management Protocol by vikas jagtap
Simple Network Management Protocol by vikas jagtap
 
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
Wired and Wireless Computer Network Performance Evaluation Using OMNeT++ Simu...
 

Mais de Faisal Mehmood (20)

Indoor Comfort Index Monitoring System using KNN algorithm
Indoor Comfort Index Monitoring System using KNN algorithmIndoor Comfort Index Monitoring System using KNN algorithm
Indoor Comfort Index Monitoring System using KNN algorithm
 
Raspberry pi and Google Cloud
Raspberry pi and Google CloudRaspberry pi and Google Cloud
Raspberry pi and Google Cloud
 
Raspberry pi and Azure
Raspberry pi and AzureRaspberry pi and Azure
Raspberry pi and Azure
 
Raspberry pi and AWS
Raspberry pi and AWSRaspberry pi and AWS
Raspberry pi and AWS
 
Raspbian Noobs
Raspbian NoobsRaspbian Noobs
Raspbian Noobs
 
Lecture 37 cond prob
Lecture 37 cond probLecture 37 cond prob
Lecture 37 cond prob
 
Lecture 20 combinatorics o
Lecture 20 combinatorics oLecture 20 combinatorics o
Lecture 20 combinatorics o
 
Lecture 36 laws of prob
Lecture 36 laws of probLecture 36 laws of prob
Lecture 36 laws of prob
 
Lecture 36
Lecture 36 Lecture 36
Lecture 36
 
Lecture 35 prob
Lecture 35 probLecture 35 prob
Lecture 35 prob
 
Lecture 27
Lecture 27Lecture 27
Lecture 27
 
Lecture 26
Lecture 26Lecture 26
Lecture 26
 
Lecture 25
Lecture 25Lecture 25
Lecture 25
 
Lecture 24
Lecture 24Lecture 24
Lecture 24
 
Lecture 22
Lecture 22Lecture 22
Lecture 22
 
Lecture 21
Lecture 21Lecture 21
Lecture 21
 
Lecture 20
Lecture 20Lecture 20
Lecture 20
 
Lecture 19 counting
Lecture 19 countingLecture 19 counting
Lecture 19 counting
 
Lecture 18 recursion
Lecture 18 recursionLecture 18 recursion
Lecture 18 recursion
 
Lecture 17 induction
Lecture 17 inductionLecture 17 induction
Lecture 17 induction
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
ssuserdda66b
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Último (20)

Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdfVishram Singh - Textbook of Anatomy  Upper Limb and Thorax.. Volume 1 (1).pdf
Vishram Singh - Textbook of Anatomy Upper Limb and Thorax.. Volume 1 (1).pdf
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 

Chapter 28

  • 1. Chapter 28 Network Management: SNMP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
  • 2. 28-1 NETWORK MANAGEMENT SYSTEM We can say that the functions performed by a network management system can be divided into five broad categories: configuration management, fault management, performance management, security management, and accounting management. Configuration Management Fault Management Performance Management Security Management Accounting Management Topics discussed in this section:
  • 3. Figure 28.1 Functions of a network management system
  • 4. 28-2 SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) The Simple Network Management Protocol (SNMP) is a framework for managing devices in an internet using the TCP/IP protocol suite. It provides a set of fundamental operations for monitoring and maintaining an internet. Concept Management Components Structure of Management Information (SMI) Management Information Base (MIB) SNMP Topics discussed in this section:
  • 5. Figure 28.2 SNMP concept
  • 6. Figure 28.3 Components of network management on the Internet
  • 7. SNMP defines the format of packets exchanged between a manager and an agent. It reads and changes the status (values) of objects (variables) in SNMP packets. Note
  • 8. SMI defines the general rules for naming objects, defining object types (including range and length), and showing how to encode objects and values. SMI does not define the number of objects an entity should manage or name the objects to be managed or define the association between the objects and their values. Note
  • 9. MIB creates a collection of named objects, their types, and their relationships to each other in an entity to be managed. Note
  • 10. We can compare the task of network management to the task of writing a program. ❏ Both tasks need rules. In network management this is handled by SMI. ❏ Both tasks need variable declarations. In network management this is handled by MIB. ❏ Both tasks have actions performed by statements. In network management this is handled by SNMP. Note
  • 11. Figure 28.4 Management overview
  • 12. Figure 28.5 Object attributes
  • 13. Figure 28.6 Object identifier
  • 14. All objects managed by SNMP are given an object identifier. The object identifier always starts with 1.3.6.1.2.1. Note
  • 15. Figure 28.7 Data type
  • 16. Table 28.1 Data types
  • 17. Figure 28.8 Conceptual data types
  • 18. Figure 28.9 Encoding format
  • 19. Table 28.2 Codes for data types
  • 20. Figure 28.10 Length format
  • 21. Figure 28.11 shows how to define INTEGER 14. Figure 28.11 Example 28.1, INTEGER 14 Example 28.1
  • 22. Figure 28.12 shows how to define the OCTET STRING “HI”. Figure 28.12 Example 28.2, OCTET STRING “HI” Example 28.2
  • 23. Figure 28.13 shows how to define ObjectIdentifier 1.3.6.1 (iso.org.dod.internet). Figure 28.13 Example 28.3, ObjectIdentifier 1.3.6.1 Example 28.3
  • 24. Figure 28.14 shows how to define IPAddress 131.21.14.8.. Figure 28.14 Example 28.4, IPAddress 131.21.14.8. Example 28.4
  • 25. Figure 28.15 mib-2
  • 26. Figure 28.16 udp group
  • 27. Figure 28.17 udp variables and tables
  • 28. Figure 28.18 Indexes for udpTable
  • 29. Figure 28.19 Lexicographic ordering
  • 30. Figure 28.20 SNMP PDUs
  • 31. Figure 28.21 SNMP PDU format
  • 32. Table 28.3 Types of errors
  • 33. Figure 28.22 SNMP message
  • 34. Table 28.4 Codes for SNMP messages
  • 35. In this example, a manager station (SNMP client) uses the GetRequest message to retrieve the number of UDP datagrams that a router has received. There is only one VarBind entity. The corresponding MIB variable related to this information is udpInDatagrams with the object identifier 1.3.6.1.2.1.7.1.0. The manager wants to retrieve a value (not to store a value), so the value defines a null entity. Figure 28.23 shows the conceptual view of the packet and the hierarchical nature of sequences. We have used white and colored boxes for the sequences and a gray one for the PDU. The VarBind list has only one VarBind. Example 28.5
  • 36. The variable is of type 06 and length 09. The value is of type 05 and length 00. The whole VarBind is a sequence of length 0D (13). The VarBind list is also a sequence of length 0F (15). The GetRequest PDU is of length ID (29). Now we have three OCTET STRINGs related to the security parameter, security model, and flags. Then we have two integers defining maximum size (1024) and message ID (64). The header is a sequence of length 12, which we left blank for simplicity. There is one integer, version (version 3). The whole message is a sequence of 52 bytes. Figure 28.24 shows the actual message sent by the manager station (client) to the agent (server). Example 28.5 (continued)
  • 37. Figure 28.23 Example 28.5
  • 38. Figure 28.24 GetRequest message
  • 39. Figure 28.25 Port numbers for SNMP