Professional Documents
Culture Documents
ZTE University
Network Management Basics
Content
2
Network Management Basics
Development Trends
3
Network Management Basics
Distributed Computer-
Assisted Management
Manual
Management
4
Network Management Basics
5
Network Management Basics
6
Network Management Basics
7
Network Management Basics
Business
Management
Layer
Service
Management Layer
8
Network Management Basics
9
Network Management Basics
Security Fault
Management Management
Performance Configuration
Management Management
Accounting
Management
10
Network Management Basics
Managed Object
11
Network Management Basics
12
Network Management Basics
Summary
Four Logical Layers
The TMN can be simply Business Management
summarized into the Service Management
following three aspects: Network Management
Four-Layer Architecture Element Management
FCAPS
Q3
FCAPS
Q3 (Five Management Areas)
GDMO - Object Definitions (Classes) Fault
CMIP - Management Operations (Methods) Configuration
OSI - Communications Protocol (Transport) Accounting
Performance
Security
13
Network Management Basics
14
Network Management Basics
15
Network Management Basics
16
Network Management Basics
17
Network Management Basics
Content
18
Network Management Basics
Networking Modes
19
Network Management Basics
20
Network Management Basics
Networking Modes
Centralized Networking
Domain-Based Networking
Distributed Networking
Cascade Networking
21
Network Management Basics
DCN
… …
Client-1 Client-2
EMS Server in
EMS Server in DCN Management
Management EMS Domain 2
Domain 1 Server-1 EMS
Server-2
Management Management
Domain 1 Domain 2
… …
Client-1 Client-2
23
Network Management Basics
DCN
… …
Client-1 Client-2
24
Network Management Basics
DCN
… …
Client-1 Client-2
25
Network Management Basics
NE
Lower-
Level EMS
Lower-Level DCN Server
EMS Server EMS
Server-1 EMS
Server-2
Management Management
Domain 1 Domain 2
… …
Client-1 (Management Client-2 (Management
Domain 1) Domain 2)
NE1 NE2 … NEn NEa NEb … NEm
26
Network Management Basics
MML Client
Client Types:
GUI
MML
WEB WEB Client
27
Network Management Basics
LAN/WAN
Server
Router
TCP/IP Network
Local Client
Local NE
In this access mode, the local client and the server locate in the
same LAN. The local client access mode is the most typical access
mode featuring convenience, security and high efficiency.
28
Network Management Basics
X.25/Frame
LAN/WAN Remote Client
Server Relay/DDN
Router Router
TCP/IP Network
Local Client
Local NE
TCP/IP Network
LAN 2 LAN 3
This remote access mode is called return client access, in which the
clients locate in the LAN where NEs locate but not the LAN where the
server locates.
30
Network Management Basics
32
Network Management Basics
Advantage Drawback
33
Network Management Basics
Advantage Drawback
Advantage Drawback
35
Network Management Basics
Analysis of Q3 Interface
Designed on the base of Open System Interconnection
(OSI), a set covering seven layers of the OSI model
Contents Features
36
Network Management Basics
37
Network Management Basics
38
Network Management Basics
SNMPV3 was
SNMPV2C is a released in 1998,
revision of SNMPV2 which inherits the
SNPMV2, released in system architecture as
1993, supports released in 1996. It
provides enhanced well as all functions of
SNMPV1, released distributed network SNMPV1 and
in May.1990, management, extends functions without
improving the SNMPV2. It introduces
supports monitoring the data types, a new security
and managing improves the security
performance. mechanism, which
computer networks. processing efficiency of supports
It becomes the large amounts of data, SNMPV2C still uses
the user authentication and
factual industry diversifies the fault encryption. In addition,
standard. processing capability, authentication mode
based on plaintext SNMPV3 specifies a
adds the sum set of network security
processing function, key specified in
SNMPV1. and access control
and improves the data rules.
deification language.
SNMPV1 SNMPV2 SNMPV2C SNMPV3
39
Network Management Basics
41
Network Management Basics
42
Network Management Basics
44
Network Management Basics
45
Network Management Basics
46
Network Management Basics
47
Network Management Basics
Content
48
Network Management Basics
49
Network Management Basics
50
Network Management Basics
51
Network Management Basics
Critical Major
Minor Warning
52
Network Management Basics
Clear Unacknowledged,
Unacknowledged,
Uncleared Cleared
Negative Negative
Acknowledgement
Acknowledgemen Acknowledgemen Acknowledgement
t t
Clear Acknowledged,
Acknowledged,
Uncleared Cleared
53
Network Management Basics
Rack Map
Alarm Filtering Before
Topology Management
Putting Alarms into
Alarm Box the Database
Alarm Forwarding
NE
Alarm Query and Count
Alarm Masking
54
Network Management Basics
Correlation Analysis
Alarm Suppression
When an alarm with high severity level occurs, only this major alarm is
reported while the lower-level alarms related to this alarm are not
reported.
Alarm Timing
It is used for defining the action when an alarm exists for a long time,
for example, changing the alarm to a higher severity level or
generating a new alarm.
Alarm Merging
The alarms of the same type merge into one alarm, which is reported
as a representative.
Alarm Counting
A new user-defined alarm is generated when the count of the same
alarm occurring during a unit time reaches the specified value.
55
Network Management Basics
Alarm Forwarding
Destinations
NMS
SMS
Email
Alarm Box
Software Alarm Box
Hardware Alarm Box
56
Network Management Basics
57
Network Management Basics
Upper-Level
Access for Configuration (Command Line/GUI)
Management System Configuration Data
Processing in NE
MML/
CORBA Foreground System
Offline
CommandMML Configuration Server Configuration
Line NE DB
Subsystem Other
User Configuration
Management/ Subsystems
Internal Online of NE
Configuration
GUI Processing Support
F interface Platform
messages Subsystem
Internal Interface
Database
58
Network Management Basics
59
Network Management Basics
61
Network Management Basics
63
Network Management Basics
Performance Collect various performance data from the foreground NEs, i.e. perform the
Data operations required by corresponding performance tasks
Collection
Performance Put the performance data into the database, back up the data, transfer the
Data data to another place, archive the data or delete the data
Management
64
Network Management Basics
66
Network Management Basics
Transmission
Authentication
Encrypted
Authentication Server
Access Intrusion
Control Detection
Encrypted
Transmission
Host
Client
Resource
67
Network Management Basics
0 ..*
0 ..*
0 ..* 0 ..*
User Role
0 ..*
0 ..* 0 ..*
1 0 ..* 0 ..*
User Group Command Set Resource
Centralized
Account Account
Centralized
Audit
Authentication 4A Audit
Centralized
Authentication
Authorization
Centralized
Authorization
69
Network Management Basics
70
Network Management Basics
71