Network Management Architecture
Network Management Architecture
1
Network Management Tasks
• Two basic functions: transport of management info, and the
management of elements
• Tasks:
– Monitoring for event
notification
• Generally events are associated with alarm triggers (security, performance,
failures, etc.)
– Monitoring for metrics and planning
• Trend analysis in order to determine long term behaviours and trends (For
example for your design you had to capture user data)
– Configuration of network parameters
• Setting parameter in network devices.
– Troubleshooting the network
• Determining what caused the fault.
2
Management Mechanisms
• Done through utilities (ping, tracert, …) and
protocols (SNMP, CMIP, CMOT)
– Utilities are used in service metric instrumentation
and collection
– Protocols allow us to retrieve, change, and
transport management data across the network.
• Three categories of mechanisms:
– Monitoring mechanisms
– Instrumentation mechanisms
– Configuration mechanisms
Monitoring Mechanisms
• Monitoring: obtaining values for end-to-end, per-link and per-element
characteristics.
• Usually collected through polling involving a management protocol,
such as SNMP.
• Gathered data may not necessarily reflect the characteristics: that has
to be extracted can calculated.
• Data and alarms needs to be displayed (logs, graphs, …) Design
considerations
• Data and events also need to be stored.
– Can be done in multiple steps: primary, secondary, and tertiary storage.
3
Monitoring for Event Notification
• Event: something that occurs in the network that is noteworthy.
Most of the time this is a problem or a failure in a network
element.
• Threshold may be set on end-to-end or element characteristics
for notification of events. This is know as real time analysis.
• Real time analysis
usually involves
short polling intervals:
capacity, CPU,
memory, storage
needed.
• Traffic not
insignificant!
Prof. Shervin Shirmohammadi CEG 4185 12-7
Traffic Example
• A network has 100 routers, each with 4 interfaces, each with 8
characteristics. Polling is every 5 seconds. How much is the
monitoring overhead traffic?
100 network elements x 4 interfaces / network device x 8
characteristics = 3200 characteristics.
Assume Each characteristic = 8 bytes of data + 60 bytes of
overhead. (why so much overhead?)
Total traffic = 3200 x (8 + 60) = 217.6 KB = 1.74 Mb
If we poll every 5 seconds ~ 1.74Mb / 5s = 384 Kbps. (not likely!)
More likely it is a bursty rush of 1.74 Mbps every 5 seconds.
Over a period of a day we have:
1.74Mbps * 720 polls per hour* 24 hours per day
=30 Gb of traffic
and we have 3200 * 8 * 720 * 24 = 442 MB of data are stored per
day.
Prof. Shervin Shirmohammadi CEG 4185 12-8
4
Monitoring for Trend Analysis
• Trend analysis: determines long-term network behaviour and
trends.
• Mostly uses the same end-to-end, per-link and per-element
characteristics.
• Helpful for planning for future network growth.
Instrumentation Mechanisms
• Instrumentation: set of utilities and tools needed to probe the
network.
– Instruments (h/w or s/w) that do the monitoring
• SNMP, ping, traceroute, etc.
• Example, we need monitoring for the Interface MIB ifTable:
ifInOctets Number of bytes received
ifOutOctets Number of bytes sent
ifInUcastPkts Number of unicast packets received
ifInNUcastPkts Number of mul/broas packets received Used for short term
event monitoring, and
ifOutNUcastPkts Number of mul/broas packets sent
long term trend analysis
ifInErrors Number of erroneaous packets received
ifOutErrors Number of packets that could not be sent
plus
IfOperStatus State of an interface (up, down, testing) availability
5
Instrumentation Considerations
• Instruments need to be dependable, specially during
crashes or problem situations.
– Many of today’s networks don’t have robust and dependable
instrumentation.
• How?
– Physically separate management components
– Replicate management components
• Instrumentation needs to produce accurate results:
– E.g., taking alternate measurements of the same parameter at
different points in the network should give the same answer.
Configuration Mechanisms
• Configuration: setting parameters in network devices
for operations and control of the element.
• Can be done through:
– SNMP set command
– telnet or command line interface (CLI)
– HTTP
– CORBA
– FTP
6
Architectural Considerations
• The Network Management process, as part of the overall network
architecture process, consists of:
1. choosing which characteristics of which end host / link / device to monitor /
configure
2. Instrumenting the network devices, or adding collection devices, to collect the
data
3. Processing the data for display, storage, reporting
4. display of results’ subset
5. storing and archiving of data subsets
• All aspects of network management are covered (FCAPS):
– Fault Management, Configuration Management, Accounting Management,
Performance Management, Security Management
• The following must be considered in this architecture:
– In-band and out-of-band management
– Centralized, distributed, and hierarchical management
– Scaling network management traffic
– Checks and balances
– Managing network management data
– MIB selection
– Integration into OSS
Prof. Shervin Shirmohammadi CEG 4185 12-13
7
In-Band and Out-of-Band (2/2)
• In-band cons:
– troubleshooting is adversely affect if data flows are delayed or blocked, which
can happen during “trouble” times.
– Event monitoring when the network is under stress, such as during congestion,
can also be impacted negatively.
• Out-of-band cons:
– Extra equipment and networking resources are needed.
– Speed of monitoring might not be the same as the speed of the actual network
(specially if costs were reduced in the installation of the management network)
– A separate method to
check availability of
the management
network is needed
• Compromise: Hybrid
approach.
Prof. Shervin Shirmohammadi CEG 4185 12-15
8
Hierarchical Management
• Hierarchical: monitoring, display, storage, and processing are
separated and placed on separate devices. Advantages:
– Can substantially reduce management traffic overhead: localized monitoring
devices can process and filter data, sending only relevant data
– Redundancy is easier and cheaper, since it’s at the component level
9
Checks and Balances
• Refers to methods to duplicate measurements in order to verify
and validate management data.
• It obviously adds overhead, but it’s advisable to have more than
one method of collecting management data, particularly for data
considered vital to the proper operation of the network.
• Objective: to locate and identify:
– Errors in recording or presenting data
– Rollovers of counters, returning a counter value to zero without proper
notification
– Changes in MIB variable from one version to the other.
• Example, do direct SNMP polling of a device, and double-check
against RMON polling.
10
Managing Network Management Data (2/3)
• Rule 2: Selective copying of data: A dual role data (event and trend) consider
copying every Nth iteration of that parameter for archival purposes, where N is
small enough to allow for terns analysis yet is large enough to keep the storage size
reasonable.
• Rule 3: Metadata: information about the data itself, such as references to data
types, time stamps, and pointers. These should be stored too to make it easier for
searching and indexing.
11
MIB Selection and OSS Integration
Exercise
How much storage capacity is required for the following network
management configuration?
12