INFO241 Network Management Module (1)
INFO241 Network Management Module (1)
36 HOURS
Network Management Fundamentals
In the modern world all most all organizations have good IT infrastructure
such as E-mail solutions, central database systems, web servers,
developer environments, test environments, employee workstations, for
its success. All these assets are all running in the server of the
organization’s network. Since network is a key business aspect of any
organization, it is very important to monitor the network.
(i) Operation deals with keeping the network and the services that the
network provides, up and running smoothly. It includes monitoring the
network to spot problems as soon as possible, ideally before a user is
affected.
Network Management
NETWORK
Figure 1.1
1.3 characteristics of NM
1. Network automation
2. Network administration
3. Network Operation
4. Network assurance
Modern network management
systems frequently come with
network assurance features. The
security, customer experience,
and network performance are all
enhanced by these characteristics.
Network analytics, application
analytics, policy analytics,
together with AI and ML, are all
made possible by assurance
systems.
5. Network provisioning
6. Network maintenance
7. Network analytics
- Easy to use
2. Increased Efficiency
3. Reduced Downtime
When it comes to the expenses of downtime, we've all heard the statistics.
Relying on a reputable network partner for network management
operations removes the concern of network issues. You can be sure that a
network outage won't result in any unforeseen costs or public relations
catastrophes.
4. Increased Flexibility
• Improve automation.
• Restore capabilities.
• Registering users.
• Management station
• Management agent
1. NMS (Network
Management Server)
4. Managed device
Inside NMS on the data collection end, two kinds of activities occur within
a management utility or facility, called a management entity, whose job is
to provide access to management data, controls, and behavior. A function
of management entity is given below.
6. Network Management
Protocol
*****
Questions
A) NMS
B) MIB
C) Agent
• T1– Committee T1
The following table gives the list of protocols given by standard bodies.
All areas of network management follow roughly four basic stages. They
are as follows.
4. Control. This phase implements the action plans from the analysis
stage to correct the behavior of the network.
2.5 Manual, Facilitated, and Automated Management
1. Manual management
2. Facilitated management
3. Automated management
• Organization
• Information
• Communication
• Functional
Fig2.1 OSI reference Network Management architecture model
Manager
• Monitors alarms
• Houses applications
Agent
Managed object
Consider the two tier architecture given in the figure2.2. Agent is built into
network element. For example: Managed hub, managed router An agent
can manage multiple elements such as Switched hub, ATM switch etc. MDB
is a physical database. The manager communicates with the agent in the
managed element. Database is in the manager but not in the agent. The
manager queries the agent and receives the management data, processes
it and stores in MDB
MDB Manager
MDB Management
Database
Managed objects
Agent process
Unmanaged objects
Figure2.2 Two-Tier
Network management
Organizational model
MDB Management
Database
Managed objects
Agent process
Consider the fig 2.4 Here there are two network domains. Such network
domains are managed locally and a global view of networks is monitored
by managers of managers. Agent NMS manages the domain.
2.7.4 Peer-NMS
o Syntax
o Semantics
Access: read-only
Status: mandatory
Operations /
Requests
• Performance management
• Configuration management
• Accounting management
• Fault management
• Security management
*****
Questions
Unit 1
FACPS Model
• Fault Management
• Configuration Management
• Performance Management
• Accounting Management
• Security Management
OSI
Functional Model
This model is called as FCAPS model. The following section provides more
details about each area because it sets the foundation for network
management functional area.
Fault Management
Network fault management, a key part of the today Network Management
architecture, covers functions such as detect, isolate, determine the cause
and correct malfunctions in a network. Faults typically manifest
themselves as transmission errors or failures in the equipment or
interface. Faults result in unexpected downtime, performance degradation
and loss of data. Generally, fault conditions need to be resolved as quickly
as possible. The objectives of doing fault management are to increase
network availability, reduce network downtime and restore network failure
quickly.
Configuration
Management
Configuration management is a set of activities aimed at discovering and
documenting (information about) all network and system devices,
highlighting changes and deviations from pre-defined standards or
baselines and reporting on the status of the network at any given time.
The “configuration” is composed of all the hardware, software, interfaces,
and communications circuits associated with network and system devices,
local and distributed. Networks are continually adjusted when devices are
added, removed, reconfigured, or updated. These changes may be
intentional, such as adding a new server to the network, or path related,
such as a fiber cut between two devices resulting in a rerouted path. If a
network is to be turned off, then a graceful shutdown in a prescribed
sequence is performed as part of the configuration management process.
The process of configuration management involves identifying the network
components and their connections, collecting each device's configuration
information, and defining the relationship between network components.
In order to perform these tasks, the network manager needs topological
information about the network, device configuration information, and
control of the network component. It provides the means for central
storage of information about the devices and therefore forms the basis for
fault-, security-, performance- and accounting management. It is
absolutely crucial in providing high availability networks and system
environments.
• Resource initialization
• Network provisioning
• Auto-discovery
• Problem reporting
• Capacity planning
• Performance report generation
• Accounting limit
• Usage quotas
• Audits
• Fraud reporting
Security Management
• Cryptography (encryption)
• Access logs
• Data privacy
ASN.1
1.1 Introduction
ASN.1 is the acronym for Abstract Syntax Notation One, a language for
describing structured information; typically, information intended to be
conveyed across some interface or communication medium. ASN.1 has
been standardized internationally. It is widely used in the specification of
communication protocols. Prior to ASN.1, information to be conveyed in
communication protocols was typically specified by bits and bytes in
protocol messages. With ASN.1, the protocol designer can view and
describe the relevant information and its structure at a high level and
need not be unduly concerned with how it is represented while in
transmission. Compilers can provide run-time code to convert an instance
of user or protocol information to bits on the line. ASN.1 is, in effect, a
data definition language, allowing a designer to define the parameters in a
protocol data unit without concern as to how they are encoded for
transmission.ASN.1 can be defined as ASN.1 is a language used for
network communication. It addresses both syntax and semantics.
1. BER
BER (Basic Encoding Rules) was created in the early 1980s and is used in a
wide range of applications, such as Simple Network Management Protocol
(SNMP) for management of the Internet; Message Handling Services (MHS)
for exchange of electronic mail and TSAPI for control of
telephone/computer interactions.
2. DER
3. CER
4. PER
PER (Packed Encoding Rules)is more recent than the above sets of
encoding rules and is noted for its efficient algorithms that result in faster
and more compact encodings than BER. PER is used in applications that
are bandwidth or CPU starved, such as air traffic control and audiovisual
telecommunications.
5. XER
XER (XML Encoding Rules) allow you to encode a message that has been
defined via ASN.1 using XML. You can now add visibility to your
ASN.1described messages via XML.
6. E-XER
Though ASN.1 would seem to be obscure, it is actually being used till date.
Every call placed on a cellular telephone in North America, Europe, and
Japan results in protocol messages. These messages, described using
ASN.1 and encoded using one of its predefined encoding rules (e.g., Basic
Encoding Rules (BER)), go flying through the air to establish the call. For
example useris calling the phone number1234 , ASN.1 messages are
exchanged between the switching machine and the network database to
route the call to the correct common carrier and local phone number to
which the 1234-number maps. And when user opts for ISDN or non-ISDN
supplementary services, such as reverse charging, closed user groups, and
international calling card verification, user is associated with encoded
ASN.1 messages. ASN.1 is also used in applications as diverse as parcel
tracking, power distribution and biomedicine, its most extensive use
continues to be in telecommunications.
Stage 1: Specification
Development
Most ASN.1 specifications are much more complicated than our previous
simple example. Such specifications, when being drafted, often contain
typographical and other syntax errors which need to be corrected. Finding
and correcting such errors in long and complex ASN.1 specification
manually can be an arduous task. Quality ASN.1 compilers can pinpoint
such errors allowing the application developer to quickly resolve them.
Once such errors are fixed, the ASN.1 specification can be fed again into
the ASN.1 compiler to produce data structures and related code for
inclusion into the user's application program. The target language in which
the data structures and code are produced varies according to the
capabilities of the ASN.1 compiler in use.
Stage 3: Writing Application
In the application code, we can use the data structures produced by the
ASN.1 compiler much in the same way as we would use data structures
written by us. Additionally, we can use vendor provided runtime library
functions (e.g., the OSS-provided ossEncode() and ossDecode() functions)
to encode, decode, and perform various other functions on application
data. It is found that using such pre-prepared library functions will both cut
down on the time needed to develop the application. This also increases
applications final reliability and correctness.
Once application is debugged and tested, we can put it into use to send
and receive ASN.1 encoded messages.
1. Abstract syntax
2. Transfer syntax
1.7 Symbols
ASN.1 uses various symbols. Some of the symbols and their meaning is
given below .
Symbol Meaning
.. range
ASN.1 is based on Backus system and uses the formal syntax language
and grammar of Backus-Nauer Form (BNF).To denote an entity we use
symbol “<>”.The rule for representation is given below.
Here the symbol “|” represents “or”.The operation entity “ op“ can be
defined in the following way.
Definitions on the right hand side are called primitives. Using these
primitives we can construct more entities. An entity <numbe> can be
constructed form the primitive <digit>.
For example:
• number 9 is digit 9
ASN.1 has built-in types that are simple and structured. A simple type is
one for which values are mentioned directly. For example we can define a
page of a book as Page Number of simple type, which can take any integer
value. This can be written as
ASN.1 structured data type contains multiple data .Data types within as
structured data type are called as Component types.
Consider an example of structure .
• Simple
Here page number and chapter number are simple data types.
BookPageNumber is a structure defined by a SEQUENCE construction of
ChapterNumber, and PageNumber component data types. Separator is a
VisibleString data type with the value”-“. Values for structured type can be
represented as 1-2, 2-3, 3-5.. etc.
Type SET takes values that are unordered lists of component types. The
type and value notations for SET are similar to SEQUENCE, except that
the type of each component must be distinct from all others and the
values can be in any order. For example,
name IA5String,
age INTEGER,
female BOOLEAN
}.
Are three representations of the same instance where name= Mary, age
= 4, female= TRUE.
1.10 Modules
END
BEGIN
{
partnumber IA5String,
quantity INTEGER,
wholesaleprice REAL,
saleprice REAL
}
StoreLocation ::= ENUMERATED
{
Baltimore (0),
Philadelphia (1),
Washington (2)
END
1.11 Macro
BEGIN
END
“ACCESS" Access
"STATUS" Status
Object-Type Example
sysName OBJECT-TYPE
ACCESS read-write
STATUS mandatory
::= { system 5 }
Marco Example 2
END
Object-Type Example
Camry CAR
BRAND Toyota
CC 2000, 2400,
3000 STYLE Sedan
YEAR 2006
::= {toyota 3}
1.12 Recursion
label IA5String,
value CHOICE
}
Figure: Instance of a linked list of linked lists.
label "L",
value node
{label "B3",
value node
{
{label "B31", value nodevalue 48},
******
Questions
1) Define ASN.1
UNIT 1
SNMP Basics
2.1 Introduction
The Internet Engineering Task Force (IETF) is responsible for defining the
standard protocols that governs Internet traffic, including SNMP. The IETF
publishes Requests for Comments (RFCs), which are specifications for
many protocols. Protocol documents become Standards in the following
way. Initially when protocol documents prepared it is first considered as
proposed standards, then it moves to draft status. When a final draft is
eventually approved, the RFC gives standard status for that protocol.
Currently, there are three versions of SNMP defined: SNMP v1, SNMP v2
and SNMP v3. Both versions 1 and 2 have a number of features in
common, but SNMPv2 offers enhancements, such as additional protocol
operations. SNMP version 3 (SNMPv3) adds security and remote
configuration capabilities to the previous versions. A brief description of
the SNMP versions is given below.
1. SNMP Version one (SNMP v1) is the initial implementation of the SNMP
protocol. SNMPv1 operates over protocols such as User Datagram Protocol
(UDP), Internet Protocol (IP), OSI Connectionless Network Service (CLNS).
SNMPv1 is widely used and is the de facto network-management protocol
in the Internet community. There are typically three communities in
SNMPv1: read-only, read-write, and trap.
2.9 Benifits
2.10 Limitations
As with most good things, SNMP has its drawbacks. The drawbacks found
in SNMP include the simplistic nature of its transmission protocol and its
security.
Security has been a big concern with SNMPv1 and SNMPv2. Neither
provides adequate security features such as management message
authentication and encryption. With these holes in security, an
unauthorized user could execute network management functions.
Networks can be brought to a crawl if a malicious user carries out these
actions. Deficiencies such as these have led many operations to have
read-only capability. SNMPv3 addresses these issues and provides security
enhancements in this area.
*****
Questions
1) What is SNMP?
2.1 Introduction
SNMP manager needs the MIB in order to process messages from its
devices. Without the MIB, the message is just a meaningless string of
numbers. SNMP manager imports the MIB through a software function
called compiling. Compiling converts the MIB from its raw ASCII format
into a binary format the SNMP manager can use.
A MIB file is just ASCII text, so that it can be viewed in any word processor
or text editor, such as Microsoft Notepad. Some manufacturers provide
precompiled MIBs in binary format, but those aren’t readable. In such
situation, raw ASCII version of the MIB file is required. MIB files are
sometimes provided as Unix text files. UNIX text format is significantly
different from DOS/Windows text format. If we want to view MIB files on a
Windows PC, we have to get from vendor a DOS-formatted version, or
conversion utility software can be used to convert between text formats.
The MIB is written in ASN.1 notation (Abstract Syntax Notation1) ASN.1 is a
standard notation maintained by the ISO (International Organization for
Standardization) and used in everything from the World Wide Web to
aviation control systems. For our purposes, there are only a few things to
understand about ASN.1:
1. It’s human-readable.
DisplayString FROM
RFC1213-MIB
OBJECT-TYPE
FROM RFC-1212
enterprises
FROM RFC1155-SMI;
ACCESS read-only
STATUS mandatory
::= {tmonIdent 1}
tmonIdentModel OBJECT-TYPE
SYNTAX DisplayString
ACCESS read-only
STATUS mandatory
root
ccitt (0) iso (1) joint-iso-ccitt (3)
org (3)
dod (6)
The OID is a kind of address. It locates this particular element within the
entire SNMP universe. The OID describes a tree structure, as shown in
Figure 3.1 and each number separated by a decimal point represents a
branch on that tree. The first few numbers identify the domain of the
organization that issued the OID, followed by numbers that identify objects
within the domain .Each OID begins at the root level of the OID domain
and gradually becomes more specific. Each element of the OID also has a
human-readable text designation. The root of the OID tree has no label.
Currently, there are three children of the root, ccitt(0), iso(1), and joint-iso-
ccitt(2). The ISO node has many children, one of which is org(3), which is
allocated for international organizations. Under org(3) is the U.S.
Department of Defense, dod(6), which has the child internet(1). The name
{ iso org dod internet } is a symbolic representation for the integer series
1.3.6.1. Both refer to the object identifier of the Internet subtree. In
practice, 1.3.6.1 can simply be referred to as ``internet''. The terms { iso
org dod internet }, 1.3.6.1, and internet are all different ways of
identifying the same object. Internet has four children. The fourth child of
internet is called private and is given for private organizations. Under
private the first node is business enterprise. Our object dpstelecom is
situated below the business enterprise.The facts are summarized below.
6 (dod): U.S. Department of Defense, the agency originally responsible for the Internet.
3.5 SMI
There are two versions of SMI. They are SMIv1 and SMIv2. SMIv1 is defined
by RFC1155, RFC1212, and RFC1215 and the SMIv2 is defined by
RFC1902, RFC1903, and RFC1904.
The SMI is divided into three parts: module definitions, object definitions
and notification definitions.
The SMI specifies that all managed objects should have a name, a syntax,
and an encoding. The name is the object ID, which was discussed in the
preceding section. The syntax defines the object's data type (for example,
"integer" or "string"). A subset of ASN.1 definitions are used for the SMI
syntax. The encoding describes how the information associated with the
managed object is formatted as a series of data items for transmission on
the network. Another ISO specification, called the Basic Encoding Rules
(BERs), details SMI encodings. SMI data types are divided into three
categories: simple types, application-wide types and simply constructed
type.
Application-wide data types refer to special data types defined by the SMI:
• Network addresses -- Represent an address from a particular
protocol family.
Simply constructed types include two ASN.1 types that define multiple
objects in tables and lists:
Datatype Description
Datatype Description
*****
Questions:
1. What is MIB?
UNIT 1
SNMP V1
1.1 Introduction
SNMP does not manage the network by itself but instead provides a
tool for the manager to manage the corresponding devices.
SNMPV2
SNMPv3
The SNMPv1 SMI specifies that all managed objects have a certain subset
of Abstract Syntax Notation One (ASN.1) data types associated with them.
Three ASN.1 data types are required: name, syntax, and encoding. The
name serves as the object identifier (object ID). The syntax defines the
data type of the object (for example, integer or string). The SMI uses a
subset of the ASN.1 syntax definitions. The encoding data describes how
information associated with a managed object is formatted as a series of
data items for transmission over the network.
The SNMPv1 SMI defines highly structured tables that are used to group
the instances of a tabular object (that is, an object that contains multiple
variables). Tables are composed of zero or more rows, which are indexed
in a way that allows SNMP to retrieve or alter an entire row with a single
Get, GetNext, or Set command.
• Get Next Request: Used after the initial get request to retrieve the
next object instance from a table or list.
message
PDU
header
Protocol Data Unit (PDU) : Indicates SNMP operation and variable bindings.
In the next section PDU is explained in detail.
SNMPv1 PDUs contain a specific command (Get, Set, and so on) and
operands that indicate the object instances involved in the transaction.
SNMPv1 PDU fields are variable in length, as prescribed by Abstract
Syntax Notation One (ASN.1). Figure illustrates the fields of the SNMPv1
PDU.
VarBindList Pairs
Figure illustrates the fields of the SNMPv1 Trap PDU which consists of
eight fields.
PDU Type: An integer value that indicates the PDU type, which is 4 for a
Trap-PDU message.
Agent Address: The IP address of the SNMP agent that generated the
trap. This is of course also in the IP header at lower levels but inclusion in
the SNMP message format allows for easier trap logging within SNMP.
Also, in the case of a multihomed host, this specifies the preferred
address.
Time Stamp: The amount of time since the SNMP entity sending this
message last initialized or reinitialized. Used to time stamp traps for
logging purposes
Variable Bindings: A set of name-value pairs identifying the MIB objects
in the PDU.
1.7 Limitations OF
SNMPv1
• Documented Rules
• Limited Notifications
• Limited Performance
• Transport Dependence
• Lack of security
Questions
1. Define SNMPV1
2.1 Introduction
The SNMPv2 SMI is described in RFC 1902. It makes certain additions and
enhancements to the SNMPv1 SMI-specific data types, such as including
bit strings, network addresses, and counters. Bit strings are defined only in
SNMPv2 and comprise zero or more named bits that specify a value.
Network addresses represent an address from a particular protocol family.
SNMPv1 supports only 32-bit IP addresses, but SNMPv2 can support other
types of addresses as well. Counters are non-negative integers that
increase until they reach a maximum value and then return to zero. In
SNMPv1, a 32-bit counter size is specified. In SNMPv2, 32-bit and 64-bit
counters are defined.
The SNMPv2 SMI also specifies information modules, which specify a group
of related definitions. Three types of SMI information modules exist:
MIB modules, compliance statements, and capability statements. MIB
modules contain definitions of interrelated managed objects. Compliance
statements provide a systematic way to describe a group of managed
objects that must be implemented for conformance to a standard.
Capability statements are used to indicate the precise level of support that
an agent claims with respect to a MIB group. An NMS can adjust its
behavior toward agents according to the capabilities statements
associated with each agent.
The Get, GetNext, and Set operations used in SNMPv1 are exactly the
same as those used in SNMPv2. SNMPv2, however, add and enhance some
protocol operations. The SNMPv2 Trap operation, for example, serves the
same function as that used in SNMPv1. It however uses a different
message format and is designed to replace the SNMPv1 Trap.SNMPv2 also
defines two new protocol operations: GetBulk and
Inform request.
4. This new ASN.1 object is then encoded, using the basic encoding rules
(BER), and passed to the transport service.
The format of protocol data units in SNMPv2 is described in RFC 1905, and
is similar to that of SNMPv1. The format for all PDUs in SNMPv2 is the
same, except for the GetBulkRequest-PDU message. This is explained
below.
message
PDU
header
• Header contains:
PDU Type: It is an integer value that indicates PDU type. This is as shown
below.
Error Index: When Error Status is non-zero, this field contains a pointer that
specifies which object generated the error. Always zero in a request
PDU Type: An integer value that indicates the PDU type, which is 5 for a
GetBulkRequest-PDU message.
• The NMS sends the SNMP message to the SNMPv2 proxy agent.
• The proxy agent forwards Get, GetNext, and Set messages to the
SNMPv1 agent unchanged.
Questions
1. Define SNMPV 2
Unit 1 SNMP V3
1.1 Introduction
• Each SNMP entity contains one SNMP engine one or more SNMP
applications.
These new concepts are important because they define architecture rather
than simply a set of messages. The architecture helps to separate
different pieces of the SNMP system in a way that makes a secure
implementation possible.
1. To verify that each received SNMP message has not been modified
during its transmission through the network.
• modification of information
• masquerade
• disclosure (optionally)
The USM uses MD5 (Message Digest Algorithm) and the Secure Hash
Algorithm to provide data integrity, to directly protect against data
modification attacks, to indirectly provide data origin authentication, and
to defend against masquerade attacks. It also uses Data Encryption
Standard (DES) to protect against disclosure.
SNMP entity
Message Access
Security
Dispatcher Processing Control
Subsystem Subsystem
Subsystem
Application(s)
Proxy
Command Notification
Forwarder
Generator Receiver
Subsystem
Global/ Security
Header Plaintext / Encrypted
Version Parameters Whole Message
scopedPDU Data
Data
Security Parameters
• msgID - This field contains the SNMP message identifier. This is the
unique ID associated with the message. The msgID field is different
from the reqID field available in the PDU. It is possible that a received
PDU that is part of a message cannot be decoded due to security
parameters between the SNMP entities. The msgID is used to relate the
request with a response during a transaction.
• msgMaxSize - This field gives the maximum size of the message which
the requesting SNMP entity can accept.
• msgFlags - This field contains the message security level. The bit 0 of
msgFlags indicates whether a message is authenticated. The bit 1
indicates whether a message uses privacy. The bit 2 indicates whether
a report PDU is expected for the message (in case the message is
dropped or a response cannot be generated).
• pdu - The SNMP PDU (Protocol Data Unit) is used for communication
between the SNMP entities. PDU encapsulates the SNMP request ID,
error status, variable bindings, and so on. There are different types
of PDUs, such as GetRequest-PDU,
GetNextRequest-PDU, GetBulkRequest-PDU, Response-PDU,
SetRequest-PDU, Trap-PDU, InformRequest-PDU, SNMPv2-Trap-
PDU, and Report-PDU. The exact format of the PDU depends on the
type of the PDU.
*****
Questions
1. Define SNMPV3
7. SNMP applications
UNIT 2:
RMON
2.1 Introduction
In the previous chapters we have learnt that SNMP messages goes across
a network between a manager and an agent. A tool is available in SNMP
that “sniffs” every packet going across a LAN, opens it and analyses it. It is
a passive operation and nothing to do to the packet which continues on
their destinations. This approach is called monitoring the network or
probing and the device that performs this function is called network
monitor or probe. Probe has two components. They are
LAN
FDDI Probe
Router with RMON
FDDI
Backbone Network
Router Bridge
Local LAN
Router
NMS Ethernet
Remote Token Ring LA
N Probe
Token Ring
Probe
• Number of packets
• Packet sizes
• Broadcasts
• Network utilization
• Monitors and analyzes locally and relays data. Hence less load on
the network.
• Needs no direct visibility by NMS. More reliable information is
provided.
• A RMON compliance console can collect MIB data and analyses them
locally without sending all of the data to NMS that helps to reduce
network traffic.
RMON –MIB
SNMP Remote Network Monitoring (RMON) was created to enable the
efficient management of networks using dedicated management devices
such as network analyzers, monitors, or probes. RMON is often called a
protocol. RMON really is not a separate protocol at all—it defines no
protocol operations. RMON is actually part of SNMP, and the RMON
specification is simply a management information base (MIB) module that
defines a particular set of MIB objects for use by network monitoring
probes. Architecturally, it is just one of the many MIB modules that
compose the SNMP Framework. It is actually an MIB module for SNMP that
describes objects that permit advanced network management capabilities.
Hence it is called as RMON MIB.
Since RMON is a MIB module, it consists descriptions for MIB objects. All
the objects within RMON group are arranged in hierarchical order. The
RMON group is a node 16 under MIB II tree. This tree is having object
number 1.3.6.1.2.1. So, all RMON objects have identifiers starting with
1.3.6.1.2.1.16. This single RMON group is broken down into several lower-
level groups that provide more structure for the RMON objects
defined by the specification. Figure shows this structure.
rmonConformance (20)
statistics (1) probeConfig (19)
history (2) usrHistory (18)
alarm (3) a1Matrix (17)
host (4) a1Host (16)
Figure1.3 RMON Group
RMON contains total twenty groups. The first nine groups (rmon1 to rmon
9) and one token ring extension group (rmon10) belongs to RMON version
one denoted as RMON V1. The last ten groups (rmon11 to rmon 20)
belong to RMON version two denoted as RMONV2. When one object in a
group is implemented, all objects inside the same group must also be
implemented. RMONV1 and RMONV2 are explained in detail in the
following sections.
RMON Standards
RMON 1
Table 1.1 describes each of the RMON 1 groups, showing its name, group
code (which is used as the prefix for object descriptors in the group), and
RMON group number and SNMP object hierarchy identifier. The
explanation of the each group is given below.
4. Hosts— the Hosts group maintains statistics for each host on the
network segment; it learns about these hosts by examining the source
and destination physical addresses within datagrams.
5. Host top n— The Host Top n group is used to generate reports based
on statistics for the top defined number of hosts in a particular
category. For instance, a network manager might want to know which
hosts appear in the most datagrams, or which hosts are sending the
6. Matrix— The Matrix group constructs a table that includes the source
and destination physical address pairs for every datagram monitored
on the network. These address pairs define conversations between two
addresses.
7. Filter— the Filter group allows the generation of a binary pattern that
can be used to match, or filter, datagrams from the network.
9. Event— The Event group works in conjunction with the Alarm group to
generate events that notify the network manager when a threshold of
a monitored object has been exceeded.
RMON 2
certain types of packets and identify their protocol type at multiple levels.
The protocol directory presents an inventory of those protocol
types the probe is capable of monitoring, and allows the addition, deletion,
and configuration of protocol types in this list.
This function controls the collection of packet and octet counts for any or
all protocols detected on a given interface. An NMS can use this table to
quickly determine bandwidth allocation utilized by different protocols.
This function counts the amount of traffic sent from and to each network
address discovered by the probe.
Network Layer Matrix Group
This function counts the amount of traffic sent between each pair of
network addresses discovered by the probe.
This function counts the amount of traffic, by protocol, sent from and to
each network address discovered by the probe.
User History
This function allows an NMS to request that certain variables on the probe
be periodically polled and for a time-series to be stored of the polled
values. This builds a user-configurable set of variables to be monitored
Probe Configuration