Network Management Protocols and Applications - PowerPoint PPT Presentation

1 / 16
About This Presentation
Title:

Network Management Protocols and Applications

Description:

Most widely used network management protocol. Designed in 1988 based on SGMP ... Decodes over 60 network protocols, including: TCP. UDP. IP. IPv6 ... – PowerPoint PPT presentation

Number of Views:19
Avg rating:3.0/5.0
Slides: 17
Provided by: unkn1115
Learn more at: https://askit.ttu.edu
Category:

less

Transcript and Presenter's Notes

Title: Network Management Protocols and Applications


1
Network Management Protocols and Applications
  • Cliff Leach
  • Mike Looney
  • Danny Mar
  • Monty Maughon

2
Simple Network Management Protocol
  • a.k.a. SNMP
  • Most widely used network management protocol
  • Designed in 1988 based on SGMP
  • Router management protocol
  • Allows management of network devices

3
What Does SNMP need?
  • Managed Networking Devices
  • Routers, Switches, UPS, and Servers
  • Devices must support SNMP
  • Typically manageable devices support SNMP
  • Operating Systems have SNMP services available

4
How Does SNMP Work?
  • Agents
  • Collects data about the network device.
  • Manager
  • Processes the collected data and stores it in a
    database called Management
  • Information Base (MIB)
  • Protocol Data Unit
  • The data that is collected and transferred
    between Agents and Managers

5
Common Management Interface Protocol
  • Used by Large Companies
  • Supports all layers of the OSI model
  • Costly to implement and takes more time
  • Has More control than SNMP

6
Remote Monitoring Protocol
  • Standard MIB for monitoring network usage and
    network
  • troubleshooting
  • First defined in 1992 by IETF called RFC 1271
  • Replaced by RFC 1757 standard in 1995
  • Define objects and statistics for network
    administrators to analyze
  • network
  • Console managers and probes on the network must
    be RMON compliant

7
RMON Grouping Elements
  • Organized into nine optional groups that rely on
    each other
  • Although they are optional, few of the groups
    need support from other groups in order to
    function
  • Some groups can stand alone, but others depend
    on other groups
  • Nine Groups
  • Statistics, History, Alarm, Host, HostTopN,
    Matrix, Filters, Packet Capture, and Events

8
Multi-Router Traffic Grapher
  • Network Management Application
  • Works on UNIX, Windows, and MAC OS 10.1
  • systems
  • First Published in 1995

9
How does MRTG work?
  • Consists of a PERL script
  • Uses SNMP to read traffic counters and C program
    to log network traffic
  • Creates Graphs in GIF format
  • Represents the traffic monitored on a network
    connection
  • Embedded into web pages and can be viewed by any
    web browser

10
How does MRTG work?
  • Creates visual representations of network
    traffic
  • Logs its data to an ASCII file
  • Log file is constantly being consolidated

11
Other Advantages
  • Not just limited to monitoring network traffic
  • Monitors system loads, login sessions, modem
  • availability

12
Problems
  • Scalability and Portability
  • Released Version 2.0 in January 1997
  • Faster and more user-friendly
  • Maintains its log files more efficiently

13
Issues with MRTG 2.0
  • Had performance and flexibility problems
  • People are monitoring non-traffic sources
  • Led to the development of Version 3.0

14
LANWatch 32
  • Well suited for basic analysis, however more
  • complex tasks are difficult
  • Monitors network traffic in real time

15
Features
  • Easy-to-use interface with pull-down menus
  • Graphic display of detailed network statistics
  • Decodes over 60 network protocols, including
  • TCP
  • UDP
  • IP
  • IPv6
  • Provides over 400 filters to isolate network
    traffic
  • Software-based, easily portable to remote sites

16
Sample Screenshot
Write a Comment
User Comments (0)
About PowerShow.com