Professional Documents
Culture Documents
Network Management A Capstone Design Exp
Network Management A Capstone Design Exp
Abstract This paper describes a graduate course in Network Management in the context of a 3-credit, 15-
Network Management and its capstone project/design week, graduate course must be more constrained. It is
experience. First the paper introduces the objectives of impossible to cover everything. The course and project work
Network Management and presents the characteristics and described herein applies to a course offered a Rensselaer At
culminating features of the course assignments. We believe Hartford within the Computer Science and Computer
the network management project/design assignment is a
valuable synthesizing opportunity and makes this a worthy Engineering graduate programs. The course has been offered
capstone course in the Graduate Certificate program in for the past decade and has gone through several changes.
Computer Network Communications. The Network We have changed because the protocols and the industry
Management course is offered by Rensselaer At Hartford have changed and we have made changes to address the
and focuses on the essential aspects of monitoring, needs of the students. We have changed texts. In the past we
controlling and managing a significantly large enterprise have used Black [1], Feit [3], Hegering [4], Lieinwand and
network. The course encourages the computer science or Fang [5], Miller [6], Rose [7], Stallings [8], Terplan [10],
engineering student to look at the bigger operational issues and most recently we have selected Subramanian [9].
of network configuration, fault, performance, accounting Currently the course covers the operations management of
and security management. The course and its design project
span the disciplines of computer science, computer the popular Internet or TCP/IP based networks more
engineering, information technology and management. completely, while setting aside the management of the
Second, the paper presents the project/design proposal telecommunication (voice) networks.
requirements. Each student, working in groups of 2-4 The course is offered to computer science, computer
students, is expected to prepare a proposal for network engineering, and information technology graduate students.
management systems and services for a hypothetical They have satisfied the prerequis ite courses - a minimum of
company that has medium-to-large size LANs and WAN the basic Computer Communication Networks course which
networks. The requirements are open ended, and as a is based on the 7 layer OSI model, and at least one additional
resulting benefit, the student teams explore contemporary follow-on advanced graduate course. Several advanced
management solutions as well as newer frontiers of object-
graduate courses are offered each year, giving the students
oriented, web-based enterprise management. The paper
concludes with an evaluation of the effectiveness of the the opportunity to have some background in local area
project/design proposal assignment. networks (LANs), broadband or wide area networks
(WANs), network analysis and design; or network security
Index Terms capstone course, culminating experience, before embarking on a course in network management.
network management, project, proposal). While database is a critical part of managing information
there is no expectation of background knowledge in
INTRODUCTION relational or object oriented databases. Nor is there a
prerequisite for software design or programming skills.
Network Management in the context of real world
telecommunications and digital networks is immense. In the Define the Problem
telecommunications arena we have global or wide area
Network management deals with the application of
network (WAN) infrastructures, made up of copper, fiber,
theories and principles of electrical engineering, computer
satellite, and cellular or wireless communication channels,
engineering, computer science and information technology.
providing broadband data and voice services for many
customers. WANs are international in scope and extent. Network management is not just limited to the data traffic of
local and wide area networks, it also has roots in
Within the corporate or business environment we have local
telecommunications, i.e. voice traffic. It is a broad subject.
area networks (LANs) allowing each employee shared
Many students are very new to concepts of managing a
access to internal file servers, databases, application servers,
network and investigating the business or operational side of
email, etc. The LANs are connected to the WANs and
everybody is connected to the “big I” Internet. It has been an enterprise network. The students will be challenged to
broaden their knowledge of engineering and science, to
said that traditional companies known for voice and video
include operations management.
communications are moving towards data communications.
To understand and to have some degree of comfort and
And at the same time, traditional data communication and
computer companies are moving towards voice and video. It confidence with the functions, tasks and operations of
network management, it is essential that a student read as
is a large, evolving, high technology field. The demands for
much as possible. So in essence, how can the course be
network management systems and services are obvious.
structured that encourages reading without being dry and
1
Roger H. Brown, Rensselaer At Hartford, Dept. of Engineering & Science, 275 Windsor St, Hartford, CT, 06120, rhb@rh.edu
0-7803-7444-4/02/$17.00 © 2002 IEEE November 6 - 9, 2002, Boston, MA
32 nd ASEE/IEEE Frontiers in Education Conference
T3D-13
Session T3D
the security enhanced version 3 of SNMP. In version 3 we “software entites” that are installed in routers, switches,
can truly authenticate and secure the exchange of messages hosts, servers, interfaces, and other network elements that
to/from the manager and the agent. One inportant advantage are responsible for maintaining the local MIB, i.e. the many
is that the standard documentation for these standards, as managed objects (MOs) and their current values. Simple
shown in Table I, is readily availble, on the Internet, free of architectures have the manager polling the agents
charge. (GetRequests) and agents providing (Get Responses)
TABLE I management data when asked. To reduce the burden of
REQUEST FOR COMMENT (RFC): SNMP V3 STANDARDS polling all network managment information, a policy of trap
RFC Title Date directed polling is implemented in the simple architecture.
2571 An Architecture for Describing SNMP 1999 Traps are unsolicited messages from the agents to the
Management Frameworks manager when conditions warrant special notification. More
2572 Message Processing and Dispatching 1999 complicated distributed architectures are possible using a
for SNMP hierarchy of agents, managers, and manager-of-managers.
2573 SNMPv3 Applications 1999 Independant systems of remote monitoring using the RMON
2574 User-Based Security Model for 1999 MIB can be added to capture events, collect data, for further
SNMPv3 off-line analysis.
2575 View-Based Access Control Model 1999 Other Directions in Network Management
(VACM) for SNMP
To explore all of the material discussed above requires a
full semester. Many other topics exist within the realm of
Remote Monitoring (RMON)
network management. We have tried to broaden the scope of
The RMON task or system is primarily a set of managed the course and include the ISO standards of network
objects or MIBs and a methodology for monitoring the management: Common Management Information Protocol
behavior of intranets, local area networks, traffic at the (CMIP), Common Management Information Services
boundarie between LANs and WANs. RMON is a powerful (CMIS) and the corresponding object-oriented model of
tool for performance management where collected data can managed objects, Common Information Model (CIM).
be presented in histograms and graphs to pictorial represent In the last lecture, we introduce the concepts of desktop
the network behavior. In addition, types of data traffic can management and the Web-based Enterprise Management
monitored, answering the question: “which applications architecture. This leads to the introduction of Java
generate the most traffic?” Management Extensions. Regrettably more time is required
TABLE II to do justice to this new and expanding topic area.
REQUEST FOR COMMENT (RFC): RMON 1 AND RMON 2 STANDARDS
RFC Title Date ROLE-PLAY: STUDENTS DEFINE AND
1757 Remote Network Monitoring Feb DESIGN A NETWORK
Management Information Base 1995
(RMON MIB) Within the first two weeks of the semester each team is
2021 Remote Network Monitoring Jan required to define an enterprise network for a large
Management Information Base Version 1997 company. The company might have several divisions (each
2 (RMON2 MIB) using SMIv2 with an internal LAN) and at different locations (requiring
wide area network connectivity). At one or more locations
the company would have a connection to the Internet (global
Hardware / Software Management Tools connectivity) and a web server to support their customer
Management tools are necessary for troubleshooting a base. A simple “top-level” topology is shown in Figure 1.
network. Engineers and operations personnel involved in The more adventurous team might include wireless
fault management use tools on a daily basis. Some examples communications, satellite communications, dial-up remote
of tools discussed in class include: access, “voice over IP, ” and/or virtual private networks
(VPNs) with external vendors, clients, or partners.
• Bit Error Rate Testing
They must select the technologies used for local area
• UNIX Status monitoring (ifconfig, ping, nslookup, dig)
networks (e.g. 10M 100M and/or 1000M Ethernet) and for a
• Route Monitoring (netstat, traceroute) wide area network (e.g. ATM, Frame Relay). The network
• SNMP MIB browsers protocol stack of choice is TCP/IP since it is an open
• Protocol analyzers and network sniffers. standard and supported by many vendors and computer
Network Management Architecture platforms. TCP/IP is the practical choice when one looks
ahead and sees that their managment solution will be SNMP-
Starting with SNMPv1 protocol, the expected based.
architecture of a Network Management System (NMS) is The local sites must have several hundred users (clients)
one manager and many agents. The manager is the and/or servers (files, applications, database) such that the
centralized point of monitoring and control. The agents are internal LAN design would require switches or internal
routers. Each local site would maintain connections with sites (e.g. Cisco) or by searching the web. The topology
their external divisions (remote locations) via a wide area should not be trivial, rather it should be reasonably
network service or dedicated leased lines and satellite challenging and in need of a comprehensive network
connections. The students are encouraged to specify the flow management solution. That is, the proposed network design
of data (data, voice, multimedia, etc) within the divisions, must be extensive, both local and wide, and utilize at least
division to division, and with external global customers, three different physical layer technologies. Yet, not so
vendors, or partners. When students assert the flow and complicated that it would require many different tools,
throughput of data on their hypothetical enterprise network extensive databases, and many MIBs.
then each team is more likely to design a more realistic
Hypothetical Management Consulting Company
network. In addition, each team must give some thought to
scalability, we suggest that the company might “buy up” a Here is where the project group takes on the role of a
small company and asked to integrate additional users and consulting company. Project teams of 2 to 4 students assume
their subnets, file servers, applications, etc. that the network they have defined and designed needs to be
effectively managed. Students are asked to prepare a
comprehensive proposal for Network Management Systems
Division A Division B and Services ( i.e. "managing") for a hypothetical company
which has medium-to-large size LAN and WAN network.
What is expected is a total network management
solution. Focusing on tasks to be performed from the five
functional areas, hardware systems, tools and software
applications rather than the cost of the proposed solution.
That is, I do not believe that many project teams, certainly
not every team, would be able to get enough costing
information to put a bottom line cost figure on the proposal.
I have seen students try to contact vendors with hopes of
getting pricing information, but once the “real-world”
vendor realizes they are talking to a student and that there is
no hope of a s ale – silence follows and the phone goes dead.
A 2-person team has the most obvious advantage that o Estimate percent bandwidth requirements just for
they cannot meet and leave another team member out of the network management traffic.
conversation or decisions. If this course is offered by o Staffing requirements and organizational structure
distance education, then a two person team is easily set up • Accounting Management
and if necessary, a single student working alone can o Traffic Monitoring and capacity analysis
complete a little more than half of the proposal, as Student A o Hardware vs. software implementations
or B, and be graded accordingly. o RMON Stations
If the project team is a 4-person team then the following o MIBs implemented for Accounting
division of labor or responsibilities are suggested: o Service level agreements and monitoring and
• All team members hold joint responsibility for the Reporting
network design, topology, technology selection, and o Staffing requirements and organizational structure
Configuration Management and Appendices/Examples. • Appendices
• Student A is responsible for Fault Management o Standard MIBs installed at network management
• Student B is responsible for Security Management stations and at typical agents
• Student C is responsible for Performance Management o Vendor MIBs installed at various agents/stations
• Student D is responsible for Accounting Management • Examples
o MIB Table management (e.g. Adding/deleting rows)
Network Management System and Services Outline o Data collection of both scalars and tables using, GET,
Get-Next, and the Get-Bulk commands.
• Introduction and Company Overview
o Typical PDU field assignemnts and transfer syntax
• Configuration Management
BER
o Network Topology
o System Architecture EVALUATION AND INTROSPECTION
§ Location of NM Managers
§ Location of Agents When we examine the Network Management course, as
o Configuration Databases offered at Rensselaer At Hartford, we truly see a capstone
o Standard vs. private MIBs course. Clearly students who attempt the course without the
o Distributed and/or Centralized prerequisite knowledge are ill-prepared to contribute to the
o Data storage requirements. What is stored? Frequency project and we would expect that their fellow team members
of updates? Histories? are dissapointed with that student’s ability to discuss wisely
o NM Application Software and GUI Displays the design and management of a significant network
o Staffing requirements and organizational structure infrastructure. The catalog description merely states that the
• Fault Management basic course in computer network communications is a
o Monitoring Policy, e.g. Traps vs. Polling prerequisite. However, word of mouth (i.e the students
o Required MIBs for Fault Management agree) and faculty advisors know that at least one additional
o Use of RMON for Fault Prediction, Detection and/or advanced graduate elective in the field of networking is
Event Notification. strongly desired.
o Alarm filtering and correlation techniques. In addition, Network Management is listed as the last
o Trouble-ticket systems/software course to be taken in the Graduate Certificate in Computer
o Staffing requirements and organizational structure Network Communications [2]. A Graduate Certificate is a
• Security Management 12-credit focused studies program.
o Securing Network Access Points & Security Policies
Things Done Well
o Client/server authentication
o Manager/agent authentication and confidentiality There are many things that are done well in this course
Using SNMPv3 on network management as indicated from course
§ Context and Access control. evaluations and dicussions with students who have
§ MIB views: Read and/or Read/Write Access completed the network certificate program. Included in the
o Required MIBs for Security Management list of things done well are:
o Key and password management • An appreciation and respect for the SNMP
o Staffing requirements and organizational structure protocols. Although simple, they are sold on the
• Performance Management strength of the SNMPv3 archtitecture and protocols.
o RMON Stations and Probes • ASN.1 language. Students have working knowledge of
o MIBs implemented.for Performance Management ASN.1 as it is used to define the many managed objects
o Baseline monitoring and trend analysis and MIB modules.
o Network Availability and Usage. • A distributed network management system
o Alarms and exception reporting architecture. Students appreciate the inter-relationships
o Planning for growth: Capacity, utilization, trends, etc. of managers, agents, and RMON probes.
• A better appreciation of the business side of network The primary focus on an SNMP-based network with
management. Rather than just lust learning and RMON has been successful. Students are able to get to the
evaluating the fastest or newest network technologies, standards information since it is readily available on the
the student is now more aware of the needs of the user Internet and integrate the standard protocols with the five
(service oriented goals) and needs of the business to functional area of operational management.
have efficient or effective netweork (utilization and In previous years, the broader approach, covering both
availability goals). the Internet-centric networks and the telecommunication
• Newly found sources of information about their networks has proven to be difficult. Neither the students nor
world of networking. Students, while researching and the instructor have been able to give both a balanced
compiling information for their proposal, have come in treatment. And there is natural leaning towards SNMP since
contact with more of the scholarly literature, more of the more resources are available for their studies and for the
trade and commercial literature, and sources of project assignment.
standards. As an area for further course development, the concepts
• Use of the standards within commercial network of case-based learning should be explored. Case studies may
management products. not replace the successful project/proposal, rather we could
consider more intereaction during class time to discuss real-
• Network management is put into a positive light.
Students preparing a proposal must focus on the positive world examples. We could gain experience through the lives
advantages of their network management solution. I of others in the field of network management.
think many students complete the course with a positive
REFERENCES
outlook on management.
• Opens new job opportunities. Several students have [1] Black, U., Network Management Standards: SNMP, CMIP, TMN,
made use of their resulting project proposal as an MIBs and Object Libraries, 2nd ed. New York: McGraw-Hill, (1995).
“engineer or scientists” portfolio. They have carried a [2] Brown, R.H., “A Graduate Certificate in Computer Network
copy of their report with them to a job interview and Communications,” 30th ASEE/IEEE Frontiers in Education
have used it successfully as a topic of discussion with Conference, Kansas City, MO, October 2000.
their potential new employer. [3] Feit, S., SNMP: A Guide to Network Management. New York:
McGraw-Hill, (1995).
Things That Need More Attention
[4] Hegering, H.-G., S. Abeck, and B. Neumair, Integrated Management
If the class is dominated by younger students without of Networked Systems. San Francisco, CA: Morgan Kaufmann,
the real-world work experience, then most project teams (1999).
struggle with the scope of a network management [5] Leinwand, A. and K. Fang Conroy, Network Management: A
“proposal.” They ask, what do we put into a proposal? Practical Perspective, 2nd ed. Reading, MA: Addison-Wesley,
Although the propsal outline is given, putting the meat on (1996).
the project remains a challenge. [6] Miller, M. A., Managing Internetworks with SNMP, 2nd ed. New
To make the project experience more efficient, the York: M&T Books, (1997).
course web page should grow to include links to newly [7] Rose, M. T., The Simple Book: An Introduction to Management of
discovered resources of network management information. TCP/IP Based Internets, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall,
For example, vendor specific MIBs, network management (1994).
applications software, graphical user interface information, [8] Stallings, W., SNMP, SNMPv2, SNMPv3 and RMON 1 and 2, 3rd ed.
data presentation techniques should be added to the list of Reading, MA: Addison-Wesley, (1999).
hot links. [9] Subramanian, M., Network Management: Principles and Practice.
If the course should make use of WebCT [11] then Reading, MA: Addison-Wesley, (2000).
more guidance should be given to its navigation, use of chat [10] Terplan, K., Communications Network Management, 2nd ed.
rooms, and team interaction. Englewood Cliffs, NJ: Prentice-Hall, (1992).
[11] ______, “WebCT: e-Learning Solutions,” www.webct.com, 2002
CONCLUSIONS AND FUTURE WORK
By asking the students to role-play as network management
consultants and prepare a comprehensive management
proposal for a sizeable enterprise network, their reading
outside of class has become more focused and beneficial.
Students now read with a goal in mind; the project gives
purpose to their reading. Since the students are really in
control of the content of the proposal they can selectively
read to fill their assignments. Compare this to the general
notion of “Here read all of this and I (the teacher) will ask
exam questions based on those readings.”