You are on page 1of 6

Session T3D

NETWORK MANAGEMENT: A CAPSTONE DESIGN EXPERIENCE


Roger H. Brown1

Abstract  This paper describes a graduate course in Network Management in the context of a 3-credit, 15-
Network Management and its capstone project/design week, graduate course must be more constrained. It is
experience. First the paper introduces the objectives of impossible to cover everything. The course and project work
Network Management and presents the characteristics and described herein applies to a course offered a Rensselaer At
culminating features of the course assignments. We believe Hartford within the Computer Science and Computer
the network management project/design assignment is a
valuable synthesizing opportunity and makes this a worthy Engineering graduate programs. The course has been offered
capstone course in the Graduate Certificate program in for the past decade and has gone through several changes.
Computer Network Communications. The Network We have changed because the protocols and the industry
Management course is offered by Rensselaer At Hartford have changed and we have made changes to address the
and focuses on the essential aspects of monitoring, needs of the students. We have changed texts. In the past we
controlling and managing a significantly large enterprise have used Black [1], Feit [3], Hegering [4], Lieinwand and
network. The course encourages the computer science or Fang [5], Miller [6], Rose [7], Stallings [8], Terplan [10],
engineering student to look at the bigger operational issues and most recently we have selected Subramanian [9].
of network configuration, fault, performance, accounting Currently the course covers the operations management of
and security management. The course and its design project
span the disciplines of computer science, computer the popular Internet or TCP/IP based networks more
engineering, information technology and management. completely, while setting aside the management of the
Second, the paper presents the project/design proposal telecommunication (voice) networks.
requirements. Each student, working in groups of 2-4 The course is offered to computer science, computer
students, is expected to prepare a proposal for network engineering, and information technology graduate students.
management systems and services for a hypothetical They have satisfied the prerequis ite courses - a minimum of
company that has medium-to-large size LANs and WAN the basic Computer Communication Networks course which
networks. The requirements are open ended, and as a is based on the 7 layer OSI model, and at least one additional
resulting benefit, the student teams explore contemporary follow-on advanced graduate course. Several advanced
management solutions as well as newer frontiers of object-
graduate courses are offered each year, giving the students
oriented, web-based enterprise management. The paper
concludes with an evaluation of the effectiveness of the the opportunity to have some background in local area
project/design proposal assignment. networks (LANs), broadband or wide area networks
(WANs), network analysis and design; or network security
Index Terms  capstone course, culminating experience, before embarking on a course in network management.
network management, project, proposal). While database is a critical part of managing information
there is no expectation of background knowledge in
INTRODUCTION relational or object oriented databases. Nor is there a
prerequisite for software design or programming skills.
Network Management in the context of real world
telecommunications and digital networks is immense. In the Define the Problem
telecommunications arena we have global or wide area
Network management deals with the application of
network (WAN) infrastructures, made up of copper, fiber,
theories and principles of electrical engineering, computer
satellite, and cellular or wireless communication channels,
engineering, computer science and information technology.
providing broadband data and voice services for many
customers. WANs are international in scope and extent. Network management is not just limited to the data traffic of
local and wide area networks, it also has roots in
Within the corporate or business environment we have local
telecommunications, i.e. voice traffic. It is a broad subject.
area networks (LANs) allowing each employee shared
Many students are very new to concepts of managing a
access to internal file servers, databases, application servers,
network and investigating the business or operational side of
email, etc. The LANs are connected to the WANs and
everybody is connected to the “big I” Internet. It has been an enterprise network. The students will be challenged to
broaden their knowledge of engineering and science, to
said that traditional companies known for voice and video
include operations management.
communications are moving towards data communications.
To understand and to have some degree of comfort and
And at the same time, traditional data communication and
computer companies are moving towards voice and video. It confidence with the functions, tasks and operations of
network management, it is essential that a student read as
is a large, evolving, high technology field. The demands for
much as possible. So in essence, how can the course be
network management systems and services are obvious.
structured that encourages reading without being dry and

1
Roger H. Brown, Rensselaer At Hartford, Dept. of Engineering & Science, 275 Windsor St, Hartford, CT, 06120, rhb@rh.edu
0-7803-7444-4/02/$17.00 © 2002 IEEE November 6 - 9, 2002, Boston, MA
32 nd ASEE/IEEE Frontiers in Education Conference
T3D-13
Session T3D

unappealing. In addition, how can we structure assignments Five Functional Areas


to allow each student to demonstrate their understanding of a
The Open Systems Interconnet (OSI) Reference model
newly acquired body of knowledge.
gave us a seven layer structure for organizing and defining a
Possible Solutions basic course in computer communication networks.
Similarly, the International Organization for Standardization
We could ask that students write a term paper on some
(ISO) for the OSI environment defines the following
aspect of network management, perhaps exploring a text
functional areas of network management.:
chapter in more depth and integrating recent results found in
ACM or IEEE journals or conference proceedings. While • Fault Management
this would be a worthy assignment, perhaps traditional, it • Configuration (and Name) Management
would not cause the student to study the topic of network • Accounting Management
management evenly or broadly. It would be an assignment • Performance Management
with depth rather than breadth. • Security Management
Idealy if we (students and faculty) could have a The functional areas define the scope or topic areas of
reasonably sized LAN coupled with a WAN, a network operational management that we wish to cover in our course
managment system console, many remote agents, with active in network management. As we explore each functional area
traffic on the network, all at our finger tips, we could have we highlight the appropriate tools, applications, and
quite the experience. However, such an “hands-on” supporting standards and protocols.
opportunity is not the case on our campus. Our technical
The Managed Object
support staff do not want faculty or students managing,
monitoring, controlling, adjusting, or fixing anything on the As we begin, we define the concepts of a Managed
campus-wide network. Having a “crashable system” to Object (MO). A network may be managed by representing
experimentally manage is just not yet a realistic solution. network resources as managed objects. Each MO is a data
Give the students more quizes or exams in hopes that variable representing one aspect of the managed resource
they will read and study more? Doubtful. If everybody is to e.g. on/off status, number of packets sent, etc. A collection
take the same quiz or exam, then everybody must read the of MOs is called the MIB (Management Information Base),
same set of articles, internet standards, and texts. Too much that is, a collection of access points at the agent(s) for the
structure and not enough independent investigation. network management system (NMS). Monitoring equates to
Our choice is to assign a semester long project – a retrieving values from MIB objects in agents. Controlling
network management design experience We ask the students equates to setting values within the MIB objects in agents.
to work in groups of 2, 3, or 4 to investigate an “enterprise MOs are standardized across systems. The Structure of
wide” networking infrastructure that is in need of network Management Information (SMI) defines syntax (format) and
management systems and services (their problem) and semantics (meaning) of management information stored in
propose a comprehensive solution. The project scope or the Management Information Base (MIB). Abstract Syntax
specifications are constructed to encourage the following One (ASN.1) is a formal language standardized by ITU-T
behaviors: (X.208 and X.680) and ISO 8824 that clarifies how data are
• reading beyond assigned text chapters; arranged , what meaning they have and the expected data
• reading and application of internet standards documents; type. The transfer syntax is how data must be transformed
• reading network vendor documentation; followed by before it is transferred over the network to/from agent and
• writing and presenting a carefully thought out solution. manager. The standard transfer syntax is Basic Encoding
In the sections that follow we present the content of the Rules (BER). Perhaps one of the more challenging tasks in
graduate level course in Network Management, the student the course is to give the student reading and writing
design of a hypothetical enterprise network, followed by the experience in ASN.1 documentation.
scope and res ponsibilities of the Network Management Simple Network Management Protocol (SNMP)
Systems and Services Proposal that each project team will
prepare and submit at the end of the semester. SNMP management, often called Internet management,
is the mo st widely used network managment system [9]. The
NETWORK M ANAGEMENT: COURSE CONTENT protocol(s) have matured and evolved into three revisions
(SNMPv1, SNMPv2, SNMPv3) and is capable of managing
Terplan [10] provides an excellant definition of network more than just the Internet, as it is implemented in most
management. He writes “Network management means network components in an enterprise network system.
deploying and coordinating resources in order to plan, SNMP is the protocol to transfer messages to/from the
operate, administer, analyze, evaluate, design, and expand agents and the managers. SNMPv1 and SNMPv2 is called
communication networks to meet service level objectives at “community based” with trivial security. It is used in many
all times, at a reasonable cost, and with optimal capacity.” real networks as a read-only monitoring solution. We spend
The definition sets the stage for the course and applies very little time on the international ISO and OSI standards in
equally to an internet-based networking infrastructure as network management. Rather we spend more time on the
well as a “voice plus data” telecommunications network. study of the popular SNMP protocols and put more focus on
0-7803-7444-4/02/$17.00 © 2002 IEEE November 6 - 9, 2002, Boston, MA
32 nd ASEE/IEEE Frontiers in Education Conference
T3D-14
Session T3D

the security enhanced version 3 of SNMP. In version 3 we “software entites” that are installed in routers, switches,
can truly authenticate and secure the exchange of messages hosts, servers, interfaces, and other network elements that
to/from the manager and the agent. One inportant advantage are responsible for maintaining the local MIB, i.e. the many
is that the standard documentation for these standards, as managed objects (MOs) and their current values. Simple
shown in Table I, is readily availble, on the Internet, free of architectures have the manager polling the agents
charge. (GetRequests) and agents providing (Get Responses)
TABLE I management data when asked. To reduce the burden of
REQUEST FOR COMMENT (RFC): SNMP V3 STANDARDS polling all network managment information, a policy of trap
RFC Title Date directed polling is implemented in the simple architecture.
2571 An Architecture for Describing SNMP 1999 Traps are unsolicited messages from the agents to the
Management Frameworks manager when conditions warrant special notification. More
2572 Message Processing and Dispatching 1999 complicated distributed architectures are possible using a
for SNMP hierarchy of agents, managers, and manager-of-managers.
2573 SNMPv3 Applications 1999 Independant systems of remote monitoring using the RMON
2574 User-Based Security Model for 1999 MIB can be added to capture events, collect data, for further
SNMPv3 off-line analysis.
2575 View-Based Access Control Model 1999 Other Directions in Network Management
(VACM) for SNMP
To explore all of the material discussed above requires a
full semester. Many other topics exist within the realm of
Remote Monitoring (RMON)
network management. We have tried to broaden the scope of
The RMON task or system is primarily a set of managed the course and include the ISO standards of network
objects or MIBs and a methodology for monitoring the management: Common Management Information Protocol
behavior of intranets, local area networks, traffic at the (CMIP), Common Management Information Services
boundarie between LANs and WANs. RMON is a powerful (CMIS) and the corresponding object-oriented model of
tool for performance management where collected data can managed objects, Common Information Model (CIM).
be presented in histograms and graphs to pictorial represent In the last lecture, we introduce the concepts of desktop
the network behavior. In addition, types of data traffic can management and the Web-based Enterprise Management
monitored, answering the question: “which applications architecture. This leads to the introduction of Java
generate the most traffic?” Management Extensions. Regrettably more time is required
TABLE II to do justice to this new and expanding topic area.
REQUEST FOR COMMENT (RFC): RMON 1 AND RMON 2 STANDARDS
RFC Title Date ROLE-PLAY: STUDENTS DEFINE AND
1757 Remote Network Monitoring Feb DESIGN A NETWORK
Management Information Base 1995
(RMON MIB) Within the first two weeks of the semester each team is
2021 Remote Network Monitoring Jan required to define an enterprise network for a large
Management Information Base Version 1997 company. The company might have several divisions (each
2 (RMON2 MIB) using SMIv2 with an internal LAN) and at different locations (requiring
wide area network connectivity). At one or more locations
the company would have a connection to the Internet (global
Hardware / Software Management Tools connectivity) and a web server to support their customer
Management tools are necessary for troubleshooting a base. A simple “top-level” topology is shown in Figure 1.
network. Engineers and operations personnel involved in The more adventurous team might include wireless
fault management use tools on a daily basis. Some examples communications, satellite communications, dial-up remote
of tools discussed in class include: access, “voice over IP, ” and/or virtual private networks
(VPNs) with external vendors, clients, or partners.
• Bit Error Rate Testing
They must select the technologies used for local area
• UNIX Status monitoring (ifconfig, ping, nslookup, dig)
networks (e.g. 10M 100M and/or 1000M Ethernet) and for a
• Route Monitoring (netstat, traceroute) wide area network (e.g. ATM, Frame Relay). The network
• SNMP MIB browsers protocol stack of choice is TCP/IP since it is an open
• Protocol analyzers and network sniffers. standard and supported by many vendors and computer
Network Management Architecture platforms. TCP/IP is the practical choice when one looks
ahead and sees that their managment solution will be SNMP-
Starting with SNMPv1 protocol, the expected based.
architecture of a Network Management System (NMS) is The local sites must have several hundred users (clients)
one manager and many agents. The manager is the and/or servers (files, applications, database) such that the
centralized point of monitoring and control. The agents are internal LAN design would require switches or internal

0-7803-7444-4/02/$17.00 © 2002 IEEE November 6 - 9, 2002, Boston, MA


32 nd ASEE/IEEE Frontiers in Education Conference
T3D-15
Session T3D

routers. Each local site would maintain connections with sites (e.g. Cisco) or by searching the web. The topology
their external divisions (remote locations) via a wide area should not be trivial, rather it should be reasonably
network service or dedicated leased lines and satellite challenging and in need of a comprehensive network
connections. The students are encouraged to specify the flow management solution. That is, the proposed network design
of data (data, voice, multimedia, etc) within the divisions, must be extensive, both local and wide, and utilize at least
division to division, and with external global customers, three different physical layer technologies. Yet, not so
vendors, or partners. When students assert the flow and complicated that it would require many different tools,
throughput of data on their hypothetical enterprise network extensive databases, and many MIBs.
then each team is more likely to design a more realistic
Hypothetical Management Consulting Company
network. In addition, each team must give some thought to
scalability, we suggest that the company might “buy up” a Here is where the project group takes on the role of a
small company and asked to integrate additional users and consulting company. Project teams of 2 to 4 students assume
their subnets, file servers, applications, etc. that the network they have defined and designed needs to be
effectively managed. Students are asked to prepare a
comprehensive proposal for Network Management Systems
Division A Division B and Services ( i.e. "managing") for a hypothetical company
which has medium-to-large size LAN and WAN network.
What is expected is a total network management
solution. Focusing on tasks to be performed from the five
functional areas, hardware systems, tools and software
applications rather than the cost of the proposed solution.
That is, I do not believe that many project teams, certainly
not every team, would be able to get enough costing
information to put a bottom line cost figure on the proposal.
I have seen students try to contact vendors with hopes of
getting pricing information, but once the “real-world”
vendor realizes they are talking to a student and that there is
no hope of a s ale – silence follows and the phone goes dead.

SCOPE OF THE PROPOSAL


Private WAN Internet
The project teams are presented with a topical outline for
their Network Management Systems and Services Proposal.
The benefits are twofold. First, the students are given a clear
idea, setting the expectations, of the basic structure of the
proposal. Students are encouraged to add more subheadings
and expand the Appendices as needed. Secondly, the outline
structure provides a checklist for grading the ultimate project
report.
As stated ealier, students are asked to form 2, 3, or 4
person teams. We strive for the ideal combination of talents
and experience. That is, there is diversity in prerequisite
knowledge, some students have taken the advanced graduate
Division C Division D course on LANs while others have taken the course on
FIGURE. 1 Broadband Networks. Some have taken the course on
T OP - LEVEL T OPOLOGY OF AN ENTERPRISE NETWORK Network Security and others have taken the Network
Analysis and Design course.

Define the Extent and Size Division of Responsibilities


Each team submits their network topology design for If the project team is a 2-person team then the following
review and evaluation at the end of the second week of the division of labor or responsibilities are suggested:
semester. We look at each design and assess whether the • Students A and B hold joint responsibility for the
proposed topology can be easily managed using the SNMP network design, topology, technology selection, and
protocols, standard MIBs and RMON. That is, we wish to Configuration Management
avoid proposing a relatively obscure technology, or a very • Student A is the responsible lead for Fault and Security
new technology with a limited customer base. We want to be Management
sure that the team will likely find management resource • Student B is the responsible lead for Performance and
definitions in the text, in the Internet standards, at vendor Accounting Management
0-7803-7444-4/02/$17.00 © 2002 IEEE November 6 - 9, 2002, Boston, MA
32 nd ASEE/IEEE Frontiers in Education Conference
T3D-16
Session T3D

A 2-person team has the most obvious advantage that o Estimate percent bandwidth requirements just for
they cannot meet and leave another team member out of the network management traffic.
conversation or decisions. If this course is offered by o Staffing requirements and organizational structure
distance education, then a two person team is easily set up • Accounting Management
and if necessary, a single student working alone can o Traffic Monitoring and capacity analysis
complete a little more than half of the proposal, as Student A o Hardware vs. software implementations
or B, and be graded accordingly. o RMON Stations
If the project team is a 4-person team then the following o MIBs implemented for Accounting
division of labor or responsibilities are suggested: o Service level agreements and monitoring and
• All team members hold joint responsibility for the Reporting
network design, topology, technology selection, and o Staffing requirements and organizational structure
Configuration Management and Appendices/Examples. • Appendices
• Student A is responsible for Fault Management o Standard MIBs installed at network management
• Student B is responsible for Security Management stations and at typical agents
• Student C is responsible for Performance Management o Vendor MIBs installed at various agents/stations
• Student D is responsible for Accounting Management • Examples
o MIB Table management (e.g. Adding/deleting rows)
Network Management System and Services Outline o Data collection of both scalars and tables using, GET,
Get-Next, and the Get-Bulk commands.
• Introduction and Company Overview
o Typical PDU field assignemnts and transfer syntax
• Configuration Management
BER
o Network Topology
o System Architecture EVALUATION AND INTROSPECTION
§ Location of NM Managers
§ Location of Agents When we examine the Network Management course, as
o Configuration Databases offered at Rensselaer At Hartford, we truly see a capstone
o Standard vs. private MIBs course. Clearly students who attempt the course without the
o Distributed and/or Centralized prerequisite knowledge are ill-prepared to contribute to the
o Data storage requirements. What is stored? Frequency project and we would expect that their fellow team members
of updates? Histories? are dissapointed with that student’s ability to discuss wisely
o NM Application Software and GUI Displays the design and management of a significant network
o Staffing requirements and organizational structure infrastructure. The catalog description merely states that the
• Fault Management basic course in computer network communications is a
o Monitoring Policy, e.g. Traps vs. Polling prerequisite. However, word of mouth (i.e the students
o Required MIBs for Fault Management agree) and faculty advisors know that at least one additional
o Use of RMON for Fault Prediction, Detection and/or advanced graduate elective in the field of networking is
Event Notification. strongly desired.
o Alarm filtering and correlation techniques. In addition, Network Management is listed as the last
o Trouble-ticket systems/software course to be taken in the Graduate Certificate in Computer
o Staffing requirements and organizational structure Network Communications [2]. A Graduate Certificate is a
• Security Management 12-credit focused studies program.
o Securing Network Access Points & Security Policies
Things Done Well
o Client/server authentication
o Manager/agent authentication and confidentiality There are many things that are done well in this course
Using SNMPv3 on network management as indicated from course
§ Context and Access control. evaluations and dicussions with students who have
§ MIB views: Read and/or Read/Write Access completed the network certificate program. Included in the
o Required MIBs for Security Management list of things done well are:
o Key and password management • An appreciation and respect for the SNMP
o Staffing requirements and organizational structure protocols. Although simple, they are sold on the
• Performance Management strength of the SNMPv3 archtitecture and protocols.
o RMON Stations and Probes • ASN.1 language. Students have working knowledge of
o MIBs implemented.for Performance Management ASN.1 as it is used to define the many managed objects
o Baseline monitoring and trend analysis and MIB modules.
o Network Availability and Usage. • A distributed network management system
o Alarms and exception reporting architecture. Students appreciate the inter-relationships
o Planning for growth: Capacity, utilization, trends, etc. of managers, agents, and RMON probes.

0-7803-7444-4/02/$17.00 © 2002 IEEE November 6 - 9, 2002, Boston, MA


32 nd ASEE/IEEE Frontiers in Education Conference
T3D-17
Session T3D

• A better appreciation of the business side of network The primary focus on an SNMP-based network with
management. Rather than just lust learning and RMON has been successful. Students are able to get to the
evaluating the fastest or newest network technologies, standards information since it is readily available on the
the student is now more aware of the needs of the user Internet and integrate the standard protocols with the five
(service oriented goals) and needs of the business to functional area of operational management.
have efficient or effective netweork (utilization and In previous years, the broader approach, covering both
availability goals). the Internet-centric networks and the telecommunication
• Newly found sources of information about their networks has proven to be difficult. Neither the students nor
world of networking. Students, while researching and the instructor have been able to give both a balanced
compiling information for their proposal, have come in treatment. And there is natural leaning towards SNMP since
contact with more of the scholarly literature, more of the more resources are available for their studies and for the
trade and commercial literature, and sources of project assignment.
standards. As an area for further course development, the concepts
• Use of the standards within commercial network of case-based learning should be explored. Case studies may
management products. not replace the successful project/proposal, rather we could
consider more intereaction during class time to discuss real-
• Network management is put into a positive light.
Students preparing a proposal must focus on the positive world examples. We could gain experience through the lives
advantages of their network management solution. I of others in the field of network management.
think many students complete the course with a positive
REFERENCES
outlook on management.
• Opens new job opportunities. Several students have [1] Black, U., Network Management Standards: SNMP, CMIP, TMN,
made use of their resulting project proposal as an MIBs and Object Libraries, 2nd ed. New York: McGraw-Hill, (1995).
“engineer or scientists” portfolio. They have carried a [2] Brown, R.H., “A Graduate Certificate in Computer Network
copy of their report with them to a job interview and Communications,” 30th ASEE/IEEE Frontiers in Education
have used it successfully as a topic of discussion with Conference, Kansas City, MO, October 2000.
their potential new employer. [3] Feit, S., SNMP: A Guide to Network Management. New York:
McGraw-Hill, (1995).
Things That Need More Attention
[4] Hegering, H.-G., S. Abeck, and B. Neumair, Integrated Management
If the class is dominated by younger students without of Networked Systems. San Francisco, CA: Morgan Kaufmann,
the real-world work experience, then most project teams (1999).
struggle with the scope of a network management [5] Leinwand, A. and K. Fang Conroy, Network Management: A
“proposal.” They ask, what do we put into a proposal? Practical Perspective, 2nd ed. Reading, MA: Addison-Wesley,
Although the propsal outline is given, putting the meat on (1996).
the project remains a challenge. [6] Miller, M. A., Managing Internetworks with SNMP, 2nd ed. New
To make the project experience more efficient, the York: M&T Books, (1997).
course web page should grow to include links to newly [7] Rose, M. T., The Simple Book: An Introduction to Management of
discovered resources of network management information. TCP/IP Based Internets, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall,
For example, vendor specific MIBs, network management (1994).
applications software, graphical user interface information, [8] Stallings, W., SNMP, SNMPv2, SNMPv3 and RMON 1 and 2, 3rd ed.
data presentation techniques should be added to the list of Reading, MA: Addison-Wesley, (1999).
hot links. [9] Subramanian, M., Network Management: Principles and Practice.
If the course should make use of WebCT [11] then Reading, MA: Addison-Wesley, (2000).
more guidance should be given to its navigation, use of chat [10] Terplan, K., Communications Network Management, 2nd ed.
rooms, and team interaction. Englewood Cliffs, NJ: Prentice-Hall, (1992).
[11] ______, “WebCT: e-Learning Solutions,” www.webct.com, 2002
CONCLUSIONS AND FUTURE WORK
By asking the students to role-play as network management
consultants and prepare a comprehensive management
proposal for a sizeable enterprise network, their reading
outside of class has become more focused and beneficial.
Students now read with a goal in mind; the project gives
purpose to their reading. Since the students are really in
control of the content of the proposal they can selectively
read to fill their assignments. Compare this to the general
notion of “Here read all of this and I (the teacher) will ask
exam questions based on those readings.”

0-7803-7444-4/02/$17.00 © 2002 IEEE November 6 - 9, 2002, Boston, MA


32 nd ASEE/IEEE Frontiers in Education Conference
T3D-18

You might also like