Network Management Mod2
Network Management Mod2
Module- 2
Basic Foundations: Standards, Models, and Language
Many Network Management Standards are developed by various organisations. The major
standards are given in the following table.
In contrast to the CMIP protocol, the Simple Network Management Protocol (SNMP) prescribed in
the above table is truly simple as its name indicates. It started as an industry standard and has since
become very much like standard specifications of a standards organization. The Internet Engineering
Task Force(IETF) is responsible for all Internet specifications including network management. The
managed objects are defined as scalar objects in SNMP. It was primarily intended to manage Internet
components but is now used to manage WAN and telecommunications systems. It is easy to
implement and most widely used today.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
The third model is TMN model. It is designed to manage the telecommunication network and is
oriented toward the needs of telecommunications service providers. TMN is ITU-T (international
Telecommunications Union – Telecommunication) standard and is based on OSI CMIP / CMIS
specifications. TMN extends the concept of management beyond managing networks and network
components.
Enhanced Telecommunications Operations Map(eTOM) is a guidebook for business processes in the
telecommunication industry. It is an extension of TMN. The TMN is a bottom up approach that has
been developed from networks and network equipment, whereas eTOM is a top-down approach. The
eTOM framework has been incorporated within the TMN framework as a set of standards.
The IEEE standards for Local Area Network(LAN) and Metropolitan Area Network (MAN)
specifications shown in the above table 1 are only concerned with OSI physical layer and Data Link
layer. These specifications are structured similar to OSI specifications. Both OSI / CMIP and Internet
/ SNMP protocols use IEEE standards for the lower layers. The IEEE 802.x series of specifications
define the standards for the various physical media and data link protocols. IEEE 802.1 specifications
present overview, architecture, and management. The IEEE 802.2 standard specifies the Logical Link
Control(LLC) layer.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
ORGANIZATION MODEL
The organization model describes the components of network management & their relationships.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
Network Management Systems can also be configured on a peer – to – peer relationship as shown in
figure 5. This is the dumbbell architecture. This is similar to the client – server architecture where a
host serves both a client and a server. An example of such situation is two network service providers
needing to exchange management information between them. From the user’s point of view, the
information traverses both networks and needs to be monitored end – to – end.
INFORMATION MODEL
An information model is concerned with the structure and storage of information. let us consider,
how information is structured and stored in a library and is accessed by all. A book is uniquely
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
The difference between MIB and MDB can very well be shown by discussing a scenario. Assume
that all hubs in a network are from a single vendor, say CISCO. The manager, shown in figure 6 has
knowledge about the CISCO hub and its parameters in its MIB. The values associated with these
parameters are in its MDB. Suppose we now add another CISCO hub to the network, the manager
would discover the newly added hub during its next discovery (pinging) process. Since new hub is
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
another instance of the hub with new IP address, and its MIB information are available, all its
parameters will be added by the manager. Suppose, if any new hub from different vendor is added
to the network, the manager cannot add its parameters as its MIB information will not be available
with the manager.
Internaationally adopted OSI MIT is shown in figure 8. The root node does not have an explicit
designation. The root has three nodes in the layer beneath it – iso, ccitt (itu), and iso – ccitt, (iso –
itu). Thhe iso defined the international Standards Organization and ccitt or itu defines the
Internationaal Telecommunications Union. The two standards organizations are on the first layer
defining managing objects under them. The joint iso – itu node is for management objects jointly
defined by the two organizations. The number in each circle identifies the designation of the object
in each layer. Thus iso os designated as 1, org as 1.3, dod, Department of Defense, as 1.3.6, and the
internet as 1.3.6.1. All Internet – managed objects will be that number followed by more dots and
numbers. It is to be noted that the names of the nodes are all in lowercase letters as a convention.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
Figure 8 shows the OSI MIT. The root node does not have an explicit designation. The root has
three node in the layer under it, iso, ccitt(itu) and iso – ccitt, (iso – itu).
• iso International Standards Organization
itu International Telecommunications Union
dod Department of Defense
• Designation:
• iso 1
• org 1.3
• dod 1.3.6
• internet 1.3.6.1
The number in circles identifies the designation of the respective object in various layers. For
example, iso is designated as 1, org as 1.3, dod as 1.3.6 and the internet as 1.3.6.1. Any Internet –
managed objects will have their designation as 1.3.6.1 followed by more dots and numbers.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
For example, the object Packet Counter can be defined as shown in the below table:
Internet Persepective
Object Type Packet Counter
Syntax Counter
Access Read Only
Status Mandatory
Description Counts number of packets
OSI Perspective
Object Class Packet Counter
Attributes Single – valued
Operations Get, Set
Behaviour Retrieves or resets values
Notifications Generates notifications on new value
In OSI persepective, the operation that can be done on the object attrbutes can be defined. Also, the
behaviour and the when the object will generate notifications are also included in the OSI model.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
COMMUNICATION MODEL
In communication model, the applications in the manger module initiate requests to the agent in the
Internet Model. It is the part of the operations in the OSI model. The agent executes the request on
the network element (managed object) and returns responses to the manager. The following figure 11
shows the communication model.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
ASN. I is such a language. It is old and well proven language. ASN.I is a formal language developed
jointly by CCITT (now ITU-T) and ISO for use with application layers far data transfer between
systems. It is also applicable within the system for clearly separating the abstract syntax and the
transfer syntax at the presentation layer. Abstract syntax is the set of rules used to specify data types
and structure for storage of information. The transfer syntax represents the set of rules for
communicating information between systems. The abstract syntax in ASN.1 makes it independent of
the lower-layer protocols. ISO 8824/X.208 standards-specify ASN.I. The algorithm to convert the
textual ASN.I syntax to machine-readable code is called Basic Encoding Rules (BER) and it is
defined in ISO 88251X.209 standards.
ASN.1 CONVENTIONS
ASN.1 is based on the Backus system & uses the formal syntax language & grammar of the
BNF (Backus-Nauer Form) ,which looks like
<name>::=<definition>
where the notation <entity> denotes an "entity" and the symbol ::=
represents "defined as" e.g.: <BooleanType>::= BOOLEAN
<BooleanType>:= TRUE | FALSE
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
"T" last
"smith"
}
Here "person-name" is the name of the module which is a data type. "Person-Name" is a
module
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
ChapterNumber::=INT
EGER
Structured Type
• A data type is a structured type when it contains other type.
• Types that are within a structured type are called component types. For example ,we can define
all the pages of the book as a collection of individual pages.
i.e.BookPages::=SEQUENCE OF
{
SEQUENCE {ChapterNumber , Separator ,PageNumber}
}
• SET is distinguished from SEQUENCE in 2 respects:
1) The data types should all be distinct and
2) The order of values in SET is of no consequence whereas it is critical in the SEQUENCE
construct.
Tagged Type
• Tagged type is a type derived from another type that is given a new tag id.
• A tagged type is defined to distinguish types within an application.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
ENCODING STRUCTURE
The ASN.1 syntax that contains the management information is encoded using the BER
defined for the transfer syntax.
The ASCII text data is converted to bit-oriented data.
Example of encoding structure is TLV which denotes type, length & value components of
structure (Figure 14).
The type has 3 subcomponents: class, P/C & tag number (Figure 15).
P/C specifies whether the structure is a primitive, or simple, type or a construct.
This is encoded as a one byte (an octet) field.
The value of P/C is 0 for primitive & 1 for construct.
MACROS
The data types and values that discussed so far use ASN.I notation of syntax directly and explicitly,
ASN.I language permits extension of this capability to define new data types and values by defining
ASN.l macros. The ASN.I macros also facilitate grouping of instances of an object or concisely
defining various characteristics associated with an object. The structure of a macro shown below:
<macroname> MACRO :=
BEGIN
TYPE NOTATION :: = <syntaxOfNewType>
VALUE NOTATION ::= <syntaxOfNewValue>
<auxiliaryAssignments>
End
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.
Regulation – 2018 18CS742 – NETWORK MANAGEMENT
FUNCTIONAL MODEL
The functional model component addresses the user-oriented applications, which are
formally specified in the OSI model (Figure: 16).
The functional model consists of 5 sub-models: configuration management, fault
management, performance management, security management and accounting
management.
Prepared by: GURUPRASATH V A, AP, CSE Sri Sairam College of Engineering, Anekal.