Professional Documents
Culture Documents
1.Protocol: NETCONF is a network management protocol defined by the Internet Engineering Task
Force (IETF) in RFC 6241. It operates over a secure transport protocol such as SSH (Secure Shell) or
Transport Layer Security (TLS).
2.Operations: NETCONF provides a set of operations to manage network devices, including
capabilities negotiation, retrieving device configuration, modifying configuration, executing RPCs, and
subscribing to event notifications.
3.Data Encoding: NETCONF uses XML as the data encoding format. XML provides a structured way of
representing data and configurations exchanged between network devices and management systems.
4.Transport: NETCONF typically uses SSH as the transport protocol for secure communication with
network devices. It can also use TLS for secure transport.
5.Security: NETCONF includes built-in security mechanisms for authentication, authorization, and
encryption. It supports various authentication methods such as username/password, public key, and
digital certificates.
Details about YANG
1.Language: YANG is a data modeling language used to define the structure, hierarchy, and semantics
of data exchanged between network devices and management systems. It is defined by the IETF in
RFC 7950.
2.Hierarchical Structure: YANG models data in a hierarchical structure using modules, statements,
and data types. It allows for defining containers, lists, leaf nodes, and other elements to represent the
data structure and attributes of network devices.
3.Data Types: YANG provides various data types, including string, Boolean, integer, decimal, identity,
enumeration, and more. These data types help define the characteristics and constraints of the data
being modeled.
4.Relationships: YANG supports defining relationships between data elements using references,
grouping, and augmentations. It enables the reuse of common data structures and facilitates modular
and extensible data models.
5.Constraints and Validations: YANG allows specifying constraints and validations on data elements
using features such as range, length, pattern, and mandatory statements. This helps ensure the
integrity and validity of the data exchanged between devices and management systems.
NETCONF and YANG
NETCONF and YANG together provide a standardized way of managing network devices,
enabling automation, configuration consistency, and interoperability between different
vendors and management systems. YANG defines the structure and semantics of the data,
while NETCONF provides the protocol and operations for exchanging that data between
network devices and management systems.
RPC (Remote Procedure Call)
RPC (Remote Procedure Call) is a communication protocol that enables a client
program to execute procedures or functions on a remote server as if they were
locally executed. It abstracts the communication details between the client and
server, allowing them to interact seamlessly over a network. Here are the key
details about RPC:
1.Procedure/Function Invocation
2.Client-Server Communication
3.Parameter Marshalling
4.Remote Procedure Execution
5.Result Transmission
6.Transparent Interface
7.Communication Protocols
8.Error Handling
Outline
Cisco offers a range of IoT management and automation tools that can help simplify
management tasks, improve visibility, and scale seamlessly 1. These tools can help you
design, provision, update, and enable policy from a single dashboard. You can also gain full
visibility of your network and connected equipment at the edge 1. Additionally, Cisco’s
cloud-delivered OT services can help drive security, simplicity, and scale for your industrial
networks.
IBM also provides IoT solutions that enable businesses to monitor, manage, and automate
their operations more efficiently and with more control 2. IBM’s IoT solutions can help you
connect devices, collect data, analyze insights, and take action to optimize your operations
Need for IoT Systems Management
1. Automating Configuration: IoT system management allows for automating system
configurations. Management interfaces provide predictable and easy-to-use capabilities,
enabling the automation of system configuration. This is particularly important when
dealing with multiple devices or nodes to ensure consistent configurations and avoid
errors.
2. Monitoring Operational & Statistical Data: Management systems help in monitoring
operational data (related to system parameters during runtime) and statistical data
(describing system performance). This data can be used for fault diagnosis, prognosis, and
performance optimization.
3. Improved Reliability: A management system that validates system configurations before
implementation improves system reliability. By ensuring that configurations are error-
free, the system is less prone to failures or issues.
4. System Wide Configuration: When an IoT system consists of multiple devices or nodes, it is
crucial to ensure system-wide configuration for proper functioning. Configuring each device
separately can lead to inconsistencies, where some devices operate on an old configuration
while others have a new one. System-wide configuration ensures changes are applied
uniformly to all devices, avoiding undesirable outcomes.
5. Multiple System Configurations: In certain cases, IoT systems may require multiple valid
configurations that are applied at different times or under specific conditions. The
management system should support such flexibility.
6. Retrieving & Reusing Configurations: Management systems that can retrieve configurations
from devices facilitate the reuse of configurations for other devices of the same type. This is
useful when adding new devices to an IoT system, as the same configuration can be applied
by retrieving it from an existing device.
Break
Simple Network Management Protocol (SNMP)
• SNMP is stateless in nature and each SNMP request contains all the
information to process the request. The application needs to be intelligent
to manage the device.
• SNMP is a connectionless protocol which uses UDP as the transport protocol,
making it unreliable as there was no support for acknowledgement of
requests.
• MIBs often lack writable objects without which device configuration is not
possible using SNMP.
• It is difficult to differentiate between configuration and state data in MIBs.
• Retrieving the current configuration from a device can be difficult with
SNMP.
• Earlier versions of SNMP did not have strong security features.
1. Network Infrastructure: Network operators build, deploy, and maintain the physical infrastructure
required for communication networks. This infrastructure includes fiber optic cables, transmission
towers, data centers, switching equipment, routers, and other networking devices.
2. Network Services: Network operators offer a range of services to their customers, which can
include voice services (telephone calls), data services (internet access), video services (television),
and other value-added services. These services are delivered over their network infrastructure.
3. Connectivity Provision: Network operators provide connectivity solutions that enable users to
connect to their network and access the services they offer. This can be through wired connections
(such as fiber optic or copper cables) or wireless connections (such as cellular networks or Wi-Fi).
4. Network Management: Network operators are responsible for managing and optimizing their
network infrastructure to ensure reliable and efficient service delivery. This includes tasks such as
monitoring network performance, troubleshooting issues, capacity planning, and network security.
A network operator cont..
5. Service Quality and Reliability: Network operators strive to provide high-quality and reliable
services to their customers. They invest in network redundancy, backup systems, and disaster
recovery mechanisms to minimize service disruptions and ensure continuous availability.
6. Regulatory Compliance: Network operators must comply with regulatory requirements set by
government authorities or regulatory bodies. These regulations may include licensing, spectrum
allocation, data privacy, consumer protection, and other obligations to ensure fair and lawful
operations.
7. Customer Support: Network operators typically offer customer support services to address
customer inquiries, troubleshoot issues, and provide assistance with service-related matters. This
can include call centers, online support portals, and field technicians.
8. Interconnection and Peering: Network operators establish interconnections and peering
agreements with other operators to facilitate the exchange of traffic between their networks. This
enables seamless communication and connectivity across different networks and enhances the
reach of their services.
Network Operator Requirements
• YANG is a data modeling language used to model configuration and state data
manipulated by the NETCONF protocol
• YANG modules contain the definitions of the configuration data, state data, RPC calls that
can be issued and the format of the notifications.
• YANG modules defines the data exchanged between the NETCONF client and server.
• A module comprises of a number of 'leaf' nodes which are organized into a hierarchical
tree structure.
• The 'leaf' nodes are specified using the 'leaf' or 'leaf-list' constructs.
• Leaf nodes are organized using 'container' or 'list' constructs.
• A YANG module can import definitions from other modules.
• Constraints can be defined on the data nodes, e.g. allowed values.
• YANG can model both configuration data and state data using the 'config' statement.
• Management System
• Management API
• Transaction Manager
• Rollback Manager
• Data Model Manager
• Configuration Validator
• Configuration Database
• Configuration API
• Data Provider API