Professional Documents
Culture Documents
and Management
Lecture 10 - Develop Management Strategies
1
Overview
2
Outline
3
Network
Management
Design
4
Network management design
5
Proactive network management
6
Network management processes
7
Fault management
8
Syslog level
9
Configuration management
10
Accounting management
11
Performance management
12
Types of performance
● End-to-end performance
○ measure availability, capacity, utilization, delay, delay variation, throughput,
reachability, response time, errors, and the burstiness of traffic
● Component performance
○ measure performance of individual links or devices
○ monitor routers and switches for throughput (packets per second), memory
and CPU usage, and errors
13
Performance management (conti.)
14
Security management
15
Network
Management
Architecture
16
Three major components in network management architecture
● A managed device
○ collects and stores management information (routers, servers, switches, end
systems, or printers…)
● An agent
○ software resides in a managed device
○ tracks local management information and uses a protocol such as SNMP to
send information to NMSs
● A network management system (NMS)
○ display management data, monitor and control managed devices, and
communicate with agents
○ NMS is typically located in a network operations center (NOC)
17
18
Considerations
19
In-band vs. Out-of-band monitoring
● In-band monitoring:
○ network management data travels across an internetwork using the same
paths as user traffic
○ easy to develop but harder to troubleshoot the problems.
○ it is beneficial to use management tools even when the internetwork is
congested, failing, or under a security attack.
● Out-of-band monitoring:
○ network design more complex and expensive
○ there are security risks associated with adding extra links between NMSs
and agents
20
Centralized vs. Distributed monitoring
● Centralized monitoring architecture
○ all NMSs reside in one area of the network, often in a corporate NOC
○ agents are distributed across the internetwork and send data such as ping and SNMP
responses to the centralized NMSs
● Distributed monitoring:
○ NMSs and agents are spread out across the internet work
○ a hierarchical distributed arrangement can be used whereby distributed NMSs send data to
sophisticated centralized NMSs using a manager-of-managers (MoM) architecture
○ a centralized system that manages distributed NMSs is sometimes called an umbrella NMS.
■ distributed NMSs can filter data before sending it to the centralized stations → reducing
the amount of network management data that flows on the internetwork
○ Advantage: can often gather data even when parts of the internetwork are failing
○ Disadvantage:
■ architecture is complex and hard to manage
■ more difficult to control security, contain the amount of data that is collected and stored,
and keep track of management devices.
● A simple network management architecture that does not complicate the
job of managing the network is generally a better solution
21
Selecting Network
Management Tools
and Protocols
22
Selecting tools for network management
● Management tools should support numerous features that can be used for performance,
fault, configuration, security, and accounting management
● At a minimum, should include tools for isolating, diagnosing, and reporting problems to
facilitate quick repair and recovery.
● Ideally, the system should also incorporate intelligence to identify trends that can predict a
potential failure so that a network manager can take action before a fault condition occurs.
● Consider the flexibility of the tools and the varied audiences that may interface with them.
→ having both a browser interface and command-line interface (CLI) is beneficial
● If the tools allow dynamic configuration of devices, configuration changes should take
effect without requiring a reboot of the device
○ management software should also check the validity of any configuration changes and automatically restore
operation to the last known configuration or software image in case of error
○ .management software that supports the dynamic configuration of devices should require authentication to
avoid an unauthorized user making changes
23
Selecting network management protocol
25