Telecom Network Management Notes - F
Telecom Network Management Notes - F
1
CONTENTS 2
Overview of Network
Management
5
1.1. INTRODUCTION 6
1.1 Introduction
The phenomenal success of IT and Telecommunication would not have been
possible without any effective management framework. The management tech-
nologies have also been maturing with evolution of IT & Telecom. Besides
having efficient networks a major task for any organization is to manage these
networks efficiently. This involves upkeep of various networking component. In-
ternet which is a network of networks is becoming increasingly complex. It has
become a part of almost every sphere of society, from technology to life style,
from business to politics, its every where but given all these advantages, it has
also resulted in more complex and more heterogeneous network. Different type
of networks makes it even more difficult to have a single management policy
in place to take care of all possible networks. This need gives rise to Telecom
Network Management (TMN).
TMNs provide the means used to transport, store and process information
used to support the management of telecommunication networks and services.
TMNs can be used for the management of telecommunication networks oper-
ated by Administrations, Recognized Operating Agencies (ROAs), customers, or
other organizations and individuals. When these telecommunication networks
are connected with each other, their TMNs provide the means of exchanging
information required to manage end-to-end telecommunication services.
All types of telecommunication networks and network elements such as
analogue networks, digital networks, public networks, private networks, switch-
ing systems, transmission systems, telecommunication software, and logical re-
sources of the network (such as a circuit, path, or telecommunication services
supported by these resources) are candidates for management by a TMN. TMN
can be considered as a network within the telecommunication network responsi-
ble for upkeep, administration and maintenance of the telecommunication net-
work. There is in principle no limit to the fields of application.
The term TMN is introduced by the ITU-T as an abbreviation for ‘Telecom-
munications Management Network’. The concept of a TMN is defined by
Recommendation M.3010. M.3010 is the document specifying the standards
that have to be used by any organization or individual trying to implement
a TMN. TMN has a strong relationship with OSI management, and defines a
number of concepts that have relevance for Internet Management.
According to ITU-T recommendation “TMN is a conceptually separate net-
work that interfaces a telecommunications network at several different points”.
This implies that TMN components will have their own connections with TMN
entities. These entities will be responsible for management of the network, but
they in no way will assist or carry out any task that is related to transmission of
user data. This implies that there will be a clear distinction between TMN and
the Data Network. Figure 1.1 shows the conceptual relation between a TMN
and a data network.
According to the image, TMN interfaces with telecommunication network at
multiple places, this interfacing is used to collect important information about
status of the network. The status is then processed by an operating system,
establish policy by creating a Service Level Agreement (SLA) for the users.
This SLA will vary depending upon the type of services. SLA is more stringent
for critical services which may need to run uninterrupted 24 x 7. Network
management will not only involve technical aspects but also business aspect
where policy decisions have to be taken with a view of making profit. From a
business administration point of view, network management involves strategic
and tactical planning of engineering, operations and maintenance of network
and network services for current and future needs at a minimum over all cost.
Network management consists of three major groups that take care of overall
network management activities.
1. Network Provisioning
2. Network Operations
• Configuration Management
Network Configuration Management is the process of organizing
and maintaining information about all components of a computer
network. When a network needs repair, modification, expansion or
upgrading the administrator refers the network configuration man-
agement database. The database contains location and network ad-
dresses of all hardware devices as a well as information about pro-
grams, versions and updates installed in the network components.
There are three types of configurations, ‘static configuration’ (per-
manent configuration), this is the configuration from which the net-
work would start if its started from an idle status. Second configura-
tion is ‘current configuration’ this is the configuration on which
the network is currently running. It is not necessary that current
running configuration is same as static configuration. Third type
of configuration is the ‘planned configuration’, this refers to the
configuration to which the network will be upgraded in future.
The NOC has a display that reflects the dynamic configuration of
network and its status. Any changes in the configuration are reflects
in the NMS tool used by administrators. In case of a service fail-
ure some temporary changes may be added to a components, these
dynamic change are reflected in NMS tool.
• Security Management
Security management can cover a wide range of aspects which in-
cludes physically securing network components as well as securing
access to information to authorized users. a security database is
maintained by NOC for access to the network and network infor-
mation. Other aspects of security management involves maintain-
ing firewalls and using cryptography for encrypting user information
while using public networks.
• Performance Management For optimum performance NOC main-
tains up to date information about the network. Data gathered is
used to tune the network for optimum performance. The network
statistics include data on traffic, network availability and network
delay. Traffic data is made available in various formats where it can
evaluated based on its nature e.g. web traffic, voice traffic, e-mail and
network management traffic. Traffic statistics are helpful in predict-
ing trends and planning future needs. Performance data available on
delay and availability can be used for tuning the network to increase
reliability and improve response time.
• Accounting Management
NOC decides the cost and allocates the use of the network. Metrics
are established to measure the usage of these e-resources and services.
(I&M) takes care of all maintenance and repair work that is carried out
under the process of network management. This group takes orders and
directives from NOC to perform any physical maintenance such as instal-
lation of components and fixing troubles of network operations. Tickets
generated for any service breakdown or maintenance is handed over to
(I&M) for resolution.
1. Functional Components:
This component defines that functions which can be performed by a net-
work management architecture. Five functions have been defined by ITU
recommendation these are fault management, security, accounting, per-
formance management and configuration management.
2. Information Component:
A classical view of network management architecture consists of a network
management system which communicates with an agent which in turn will
communicate with the managed devices. These devices are called managed
devices and the NMS creates a view or image of these managed devices
based using information provided by the agent. Information component
specifies the type and structure of information that can be collected to
create a representation of managed devices. This image is called Infor-
mation Model.
3. Communication Component:
This component is responsible for providing reliable communication be-
tween entities of network management architecture. This level defines
various protocol that are used for establishing such reliable communica-
tion.
Summary
This module of Telecom Network Mangement presents an overview of various
terms and terminologies that form the idea of TNM. Apart from technical as-
pects the module also covers management and business related aspects of the
practice of network management. Various qualities necessary to be an IT man-
ager give a brief idea of the skill set necessary for being a successful IT manager.
Also the module summarizes that network management is a collective activity
requiring wide range of practices like research, data analysis carried out by en-
gineering group, maintenance activities planned and proposed by NOC and the
installation and repair work done by I&M team. Next module talks about OSI
management protocol that was developed for network management providing
details about various network management standards and model implement in
actual corporate networks.
19
2.1. INTRODUCTION 20
2.1 Introduction
Network Management has become an integral activity for any corporate net-
work. The previous chapter ‘Overview of Network Management’ intro-
duced general idea about the process of network management. This chapter fo-
cuses of understanding various network management standards developed over
the course of time as well as understand in detail various components of network
management architecture.
Traditionally the management frameworks were designed keeping in view
the demands of specific technology or network. Network management systems
were developed for vendor specific components which created interoperability
issues. Managing heterogeneous network systems is a difficult task because each
of these networks has its own management system. These networks usually are
constructed on independent management protocols which are not compatible
with each other. This results in the coexistence of many management systems
with different managing functions and services across enterprises. Incompati-
bility of different management systems makes management of whole system a
very complex and often complicated job.
The emergence of next generation networks & services has ushered in a
new era of technological advancement. At this time, the focus was to have
some technology-independent and completely autonomous management
framework for networks and its related services. As the need for network man-
agement increased there was a need to standardize the process. Keeping this
view in mind various standards were developed for network management. These
standard tried to address the problem of interoperability between different NMS
and at the same time create a technology independent network management
standard. Having a standard process for network management made it possible
to have distributed management systems.
Two leading models of network management are the Internet Model and OSI
model. Internet model is more widely used because of its simplicity. OSI model
on the other hand is based on object- oriented methodology and is complex in
its implementation. Although complex in implementation OSI based models are
gaining greater importance due to emergence of heterogeneous networks with
components from different vendors. Some of the latest management protocols
and models are based on OSIs object oriented methodology. These standard
are described in greater details in the next sections.
agement system to get a definite status of managed devices while hiding other critical infor-
mation.
2 Inheritance: allows OSI model to reuse existing components of the Network mangement
architecture.
3 Routers, access servers, switches, hubs and printers etc can be termed as managed devices.
OSI model is one the most structured and well defined model for network
management. All the four components mentioned below are present and well
defined in OSI model for network management. Other standards have a subset of
Also the agent can send some alarm to the manager in case of some failure of
fault with the managed devices. The manager receives management data (sta-
tus/ data other than communication data) and takes necessary action. This
data is stored in Management Database (MDB).
Figure 2.4 shows a three tier management model where in large number of
devices need to be managed by a single manager. This three tier model is an
extension of two tier network management model. Here an intermediate device
acts as a manger/agent and stored status and data related to various managed
device within its scope of monitoring. This data is then sent to a manager
which resides about the intermediate device. This manager can use the data for
statistical analysis.
The above two models represent the interaction of network manager with
local devices and with other managers. In case the managed network is spread
over a geographically wide area for e.g. a corporation with local offices spread
over different cities there is a need for distributed network management pro-
cess. This process involves communication between various Managers as well
as communication between agents running different types of Network Manage-
ment Systems. This scenario is explained by Figure 2.5 that shows a network
management operation model with a MoM(Manager of Managers) and multiple
managers with their agents running different type of NMS.
This model is similar to the extension of Dumbbell architecture seen in
section 1.3. An agent generally runs a process in form of a network management
system. This management system has the capability of communication with
managers.
In the above description two important aspects are taken into consideration.
First is that resources to be managed are referred to as objects. The manage-
ment model will create an object of managed resource. This object contains
all necessary information about the managed resource, which may be used by
agents for management functions. Second part is the relevance of information.
A single managed device will generate a lot of information, out of which only
a small set of data may be needed by an agent for performing mangement fuc-
tions. So a model creates an object corresponding to a managed device with
only the information that is needed by the agent. This process of creating an
object with relevant data is called Information Modeling.
Information of network components is passed between agents and mangers
for various functions. Information model specifies the information base to de-
scribe managed object and their relationships. This relationship is defined us-
ing Structure of Mangement Information which defines the syntax of informa-
tion(the structure to represent information). This along with Management In-
formation Base help create the information model. MIB(see section 2.3) defines
the semantics of information (what exactly does the information convey.)
MIB is used both by agent and manger for exchange of information. The
MIB associated with agent is called Agent MIB and the MIB associated with a
manager is called Manager MIB. MIBs in both the cases represent a repository
of data describing an object being manged. Information contained in MIBs may
defer based on the type of MIB. A manager MIB contains information about all
the components it manages while an agent MIB contains only local information.
Figure 2.6 shows a network management model where a manager is associ-
ated with a MIB. Along with MIB an additional entity management databas(MDB)
is added to the network model. MDB is a real database containing configuration
information about managed devices. This information is different from infor-
mation stored in MIB. Configuration data refers to actual information about
the status of device which may include details like IP configuration, version
of firmware on device and other network related configuration. This network
related configuration can be used by manager to know the type of managed
device.
mode (request/response mode). Manager can request agent for any specific
information on any managed device under the scope of agent or can issue a
configuration change request where the agent performs certain on any of the
managed devices. Once the action is completed agent acknowledges the request
with a suitable response. In some cases even the agent can initiate a commu-
nication with the manager in form of notification or traps to raise alarm about
any of the managed devices. This represents the commands and responses used
in communication model.
Figure 2.8 shows the communication protocol used to transfer information
between managed objects and managing process, as well as between manage-
ment processes. The OSI uses Common Management Information Protocol
(CMIP) and Common Management Information Services (CMIS). While inter-
net model uses Simple Network Management Protocol(SNMP) for communi-
cation. For transport protocols OSI can use both connection oriented as well
as connectionless transport protocols. Figure 2.8 gives a detailed structure of
protocols used by network management systems at various levels.
standard there is another categorization that is classifies services that are com-
mon to all network management process, they are categorized under the section
Common Function Management.
• Configuration Management:
This functional area includes functions that allow a management system to
provision resources and services, monitor and control the state of various
managed devices within the network. It address the functions related to
changing the configuration of various network components. Information
related settings and configurations of managed devices are stored in Man-
agement Database (MDB). This information can be retrived by managers
and can be used to change the configuration of managed devices.
Configuration Management is responsible for setting various parameter in
network components. In case of a failure component management per-
forms the task of informing the team responsible for provisioning that
service. Such failure are recorded and maintained in a database which
can later be reviewed for analysis. This configuration data is stored in
Network Management Systems at the Network Operation Centre (NOC).
• Fault Management:
Fault management includes functions that address alarm surveillance, test-
ing, and fault isolation. Alarm surveillance, as the name implies, allows
reporting alarms with different levels of severity along with the possible
cause of alarm. It also provides a summary of the alarms that are out-
standing, and permits the manager to retrieve the alarm information. As
part of OSI management, generic alarms that may be associated with
various resources are defined.
NMS implements fault management by constantly monitoring the network
for any service or device failures. In case of failure an alert is displayed
in the application. Service has to be restored as soon as possible. This
may involve changing some configuration. In several failure situations
the network could automatically detect the problem and perform trouble
shooting procedures for restoration of service. Such networks are called
self-healing networks.
In case the self healing feature cannot resolve the issue there will be a
ticketing system in place that will issue a trouble ticket, which is carefully
reviewed and followed up until service is not restored. NMS have to ca-
pability of tracking any pending trouble tickets and raise periodic alarms
in case some issues are left un resolved. A record of all such tickets are
mantained in the database which can be used later for analysis of patterns
in which fault occur.
• Performance Management:
The performance management area includes functions to monitor perfor-
mance parameters such as errored seconds, number of bad messages, col-
lecting traffic statistics, and applying control to prevent traffic congestion.
Monitoring and controlling the quality of service is another example of a
performance management function. As part of this area, threshold values
may be assigned for the parameters, and when the threshold is exceeded,
events may be generated to inform the management system.
Up-to-date information of traffic statics should be maintained by NOC
for performance analysis. Along with traffic statistics, any updates in the
configuration changes must be updated with a database in NOC. Perfor-
mance management helps identify trends as well as take policy decisions
related to network management. NMS have the capability to gather in-
formation at all protocol layers. The data gathering feature may also be
used to perform analysis on application specific traffic like e-mail traffic,
web browsing traffic, file transfers and voice calls. Performance data on
delay and availability will help improve response time.
• Security Management:
Security management defines a broad range of activities to be performed
for securing the network. This involves the following aspects
• Accounting Management:
This functional area includes collecting usage data for the resources used
in providing a service and then generating a bill, applying, for example, the
tariff associated with the service. Here again, depending on the service, the
usage information will vary. For example, a phone service often determines
the length of time the connection was used versus a packet service which
collects data on the number of packets sent. A general mechanism that can
be specialized for a specific service is available as part of the OSI systems
management standards. It is to be expected that while collecting the usage
information and reporting on the values is subject to standardization, the
generation of bills and application of tariffs in generating the bills are
considered outside the scope of standardization.
Transfer syntax on the other hand deals with encoding mechanism. The data
generated using abstract syntax is then encoded using any standard encoding
format defined by transfer syntax. BER (Basic Encoding Rule) is a preferred
format for encoding data bits.
The complier interprets this code and provides a run-time code that will be
understood by the machine.
2.8.1 Module
The fundamental unit of ASN.1 is the module. The sole purpose of a module is
to name a collection of type definitions and/or value definitions (assignments)
that constitute a data specification. A type definition is used to define and name
a new type by means of a type assignment and a value definition is used
to define and name a specific value, when it is necessary, by means of a value
assignment. The only format constraint on type and/or value assignments in a
module is that each must be on a new line. ASN.1 makes use of formal syntax
to describe objects, as an example a simple definition in ASN.1 is given as
<name>::= <definition>
where name defines the entity and ::= symbol is interpreted as “is defined as”.
As a simple example of a student it can be defined as
neha Student::=
{Name=‘‘Neha P.’’,
Age= ‘‘25’’,
Registration-Number= ‘‘11’’,
}
The above example has a name of student as neha which is an object of
module Student. Attributes like name, age and registration number are added
as per the definitions of module Student. In general any module can be defined
as
<module name> DEFINITIONS::= BEGIN
<name>::=<definition>
END
where name may be any data type included within the module module name.
BEGIN and END are necessary to ascertain the boundary of definition of a
module.
Summary
This chapter provides an introduction to various network management stan-
dards developed by ISO, ITU and other standard making organizations. Net-
work management as an activity has various aspects to it and they are formally
categorized in different models, like Information Model, Organization Model,
Internet Management
(SNMP)
37
3.1. INTRODUCTION 38
3.1 Introduction
A large part of being a system administrator is collecting accurate information
about your servers and infrastructure. There are a number of tools and options
for gathering and processing this type of information. Many of them are built
upon a technology called SNMP. SNMP stands for Simple Network Management
Protocol.
SNMP is also referred to as Internet Management. SNMP is a protocol that
is implemented on the application layer of the networking stack. The protocol
was created as a way of gathering information from very different systems in a
consistent manner. Although it can be used in connection to a diverse array
of systems, the method of querying information and the paths to the relevant
information are standardized. SNMP was initially developed only for manag-
ing internet, with advancement its scope of management has extended beyond
internet. Now it aims at managing intranet and telecommunication networks.
SNMP based systems are primarily TCPI/IP based systems, but SNMP can
also be used to monitor non TCP/IP based networks through proxy agents.
SNMP has some very specific roles in network management. It defines the
format of the packet to be sent from a manager to an agent and vice versa.
It also interprets the result and creates statistics (often with the help of other
management software). The packets exchanged contain the object (variable)
names and their status (values). SNMP is responsible for reading and changing
these values.
SNMP based systems are simple to implement and this simplicity makes it
the first choice of network administrators while designing any network manage-
ment systems or applications. Many network components have built-it agents
(applications) that can respond to SNMP messages. This adds to the ease of
setting up network management systems. When a new device capable of com-
municating with SNMP based Network Management Systems (NMS) they are
discovered automatically. SNMP commands allow collection of great deal of
information about any managed devices. This makes it easy to design Network
Management Systems that are self healing. The ease of adding a new device
adds to the popularity of SNMP as a tool for network management.
Initially SNMP protocol was developed as a standardization effort by ITU
in response to ISOs OSI network management stack. OSI standard being the
ultimate standard in network management, SNMP was designed to become
similar to OSI standard but that was not realized. With due course of time
various versions of SNMP were released and the first version came to be named
as SNMPv1. SNMPv2 an SNMPv3 followed this initial standard. Figure 3.1
shows the hierarchy of various protocols used in the TCP/IP stack. SNMP is an
application level protocol that helps NMS from various vendors communicate.
Also it is important to note that SNMP messages and protocol is independent
of the protocols that are implemented in the physical layer. A NMS based
on SNMP will use connectionless UDP in the transport layer while IP in the
network layer for dissemination of information. Data link layer and physical
layer can implement any protocol based on the requirement of the network.
• SNMP Manager:
An SNMP manager is a computer that is configured to poll SNMP agent
for information. The manager can be any machine that can send query
requests to SNMP agents with the correct credentials. Sometimes, this
is implemented as part of a monitoring suite, while other times this is
an administrator using some simple utilities (commands) to craft a quick
request.
Functions performed by a Manger are
1. Queries agents
2. Gets responses from agents
3. Sets variables in agents
• SNMP Agents:
SNMP agents do the bulk of the work. They are responsible for gathering
information about the local system and storing them in a format that
can be queried.updating a database called the “management information
base”, or MIB. The agent computer configures which managers should
have access to its information. It can also act as an intermediary to report
information on devices it can connect to that are not configured for SNMP
traffic. This provides a lot of flexibility in getting your components online
and SNMP accessible. Some important functions performed by SNMP
agents are
1. Consistency in administration
2. Standardized process in managing networks
3. Automated management in case of self healing networks
4. Centralized control provided to administrators in the NOC
protocols shown in figure 3.3 are used. The protocol at data link layer and
physical layer change depending upon the transmission medium used. SNMP
mainly uses UDP (connectionless) for transmitting commands. This is one
major drawback as connectionless protocol affects reliability1 of communication.
Figure 3.3 also shows the list of all commands that are exchanged between
SNMP manager and agents. Most important aspect of SNMP is its simplicity is
shown in the fact that there are only 5 protocol messages exchanged between
manager and agent. Out of these 5 protocol messages 3 are initiated by the
manger and the remaining two are initiated by the agents. These protocol
messages are
Also later versions of SNMP v1 and v2 try to over come this drawback
• GetBulkRequest:
The GetBulkRequest PDU is sent from the manager to the agent to re-
trieve a large amount of data. It can be used instead of multiple Ge-
tRequest and GetNextRequest PDUs. So when the manager is aware of
that it has to retrieve an entire table from the agent instead of sending
sequential GetReuest, manager simply makes use of GetBulkRequest.
same managed device. This organization model is shown in Figure 3.5 where
multiple managers(mostly from different vendors) communicate with a single
agent.
NMS are generally developed for vendor specific devices, although there are
NMS that can collect information from devices from other vendors the scope of
information is limited. In case of vendor specific NMS the detail of information
collected can be to a greater depth and this helps in faster resolution of faults.
Thus it is common practice to use an NMS to monitor network of multiple
vendor product and several vendor’s NMS to respective network elements.
In the two tier models described above the managers receive raw unprocessed
data, in many cases the managers may want processed data directly from the
agent and use it for taking decisions or for fault finding. The manager cannot
continuously probe the managed device for this data. To avoid this intermediate
devices are inserted that probe the managed device and their agents, collect data
(unprocessed), process the data from various agents and send processed data to
manager. Such intermediate devices are agents that perform the task of data
processing and are called Remote Monitoring Agents (RMON). This creates a
three tier architecture and is shown in Figure 3.6.
In practical managed network all the devices are not managed. SNMP man-
agers cannot manage devices that do not have an SNMP agent running on
them. These applications may be legacy telephone systems and wireless de-
vices with no agent running on them. Such devices are managed using PROXY
SERVERS. These servers collect the information in a central fashion and com-
municate with SNMP managers using suitable protocol messages. Figure 3.7
shows such a managed network with a proxy server.
A SNMP management system can behave as an agent as well as a manager.
This is similar to a client/server architecture, where a host may behave like a
client for one part of communication and behave like an agent for the some other
communication. In the two tier architecture shown in Figure 3.6 RMON proble
or agent collects data from various managed devices. Here RMON functions as
a manager but the same device while communicating with a manger will func-
tion like an agent. This shows that both the agent and the manager processes
(programs) are running on mangers. Another case of dual nature of managers
is when NMS from two different vendors communicate to create a holistic pic-
ture of manged network. In this case the NMSs will act like both manager and
agent. So organization model of SNMP shows the following features on a SNMP
managed network
1. SNMP model can be two-tier or three tier.
2. Intermediate processing of data can be done by devices called RMON
probes.
3. Non Managed devices and application than cannot run SNMP processes
on them can be managed by using proxy servers.
4. Manager has dual roles. It can function as manger as well as an agent
based on the type of communication.
1. Generic traps
2. Specific traps
3. Time stamp
Each of the trap types are further classified into subtypes. Generic traps
have following types
• coldStart
• warmStart
• linkUp
• linkDown
• authenticationFailure
• egpNeighborLoss
• enterpriseSpecific
Each of these traps is responsible for raising alarm for specific types of event.
Specific traps are used in case enterprise specific traps are not available. Time-
stamp trap is used to find the time elapsed between the initialization (turning
on) and generation of trap for a particular device.
In view to keep communication simple SNMP architecture makes use of
connectionless UDP protocol at the transport layer. It is important to realize
that SNMP is an application layer protocol, it is made such that is independent
of the protocols implemented in the lower layers. UDP is a connectionless
protocol which helps reduce complexity as well as the amount of data that is
communicated. Although UDP is used at the transport layer SNMP is a flexible
protocol and can be used with a wide range of lower layer protocols.
3 alerts and message generated when certain event occurs
Some terms that are used in understanding administrative model of SNMP are
Figure 3.9 shows different access modes, there are four access modes shown
in the figure. These can be mapped to the communication protocol messages
that are exchanged between manager, agent and device.
• Read-Only Access Mode: This mode enables agents to monitor data from
a particular device. Most of the standard information about a device is
always read only. In this case the operations that are possible are get,
response and trap.
• Write Mode: In this mode the manager can send set requests to the device
and change the configuration of a device.
The next term used in SNMP administration model is SNMP Access Pol-
icy. SNMP MIB view when combined with access mode will result in SNMP
access policy. This access policy gives a complete picture about the views avail-
able to protocol entities and their privileges. All the terms put together (Proto-
col Entity, Application Entity, Community, MIB View Access mode and Access
Policy) define the administration model of SNMP. Figure 3.10 shows a visual
description of SNMP Access Policy with a single community and two community
profiles.
Figure 3.11 shows a complete view of access policy where there are three
communities sharing devices, managers and agents. Different agents have dif-
ferent view (community profiles) and that combined with the community view
gives the SNMP access policy. As described in earlier sections a single man-
ager will have ability to communicate with different agents as well as different
mangers. This is shown in the Figure 3.11 where manager 3 can communicate
with devices and agents from community1 and community 2.
messages is structured in a definite format and passed along the protocol stack where each
layer will add its corresponding header and trailer.
Figure 3.13 shows a basic SNMP PDU that is used to construct a message.
Each term involved in the PDU is constructed using a ASN.1 definition. This
definition specifies the message that is carried by the block within the PDU.
• RequestID:
5 incase some other protocols are implemented at the lower layer, the definition of transport
ASN.1 Definition
RequestID ::=
INTEGER
RequestIDs are used to distinguish among outstanding requests. By use
of the RequestID, an SNMP application entity can correlate incoming
responses with outstanding requests. In cases where an unreliable data-
gram service is being used, the RequestID also provides a simple means
of identifying messages duplicated by the network.
• ErrorStatus:
ASN.1 Definition
ErrorStatus ::=
INTEGER {
noError(0),
tooBig(1),
noSuchName(2),
badValue(3),
readOnly(4)
genErr(5)
}
A non-zero instance of ErrorStatus is used to indicate that an exception
occurred while processing a request.
• ErrorIndex:
ASN.1 Definition
ErrorIndex ::=
INTEGER
In case of a non-zero ErrorStatus, ErrorIndex may provide additional in-
formation by indicating which variable in a list caused the exception.
• VarBind:
ASN.1 Definition
VarBind ::=
SEQUENCE {
name,
ObjectName,
value
ObjectSyntax
}
A managed device is associated with a manged object, this object is termed
as a variable.(different managed objects will have different values). A vari-
able binding, or VarBind, refers to the pairing of the name of a variable
to the variable’s value. A VarBindList is a simple list of variable names
and corresponding values.
2. It then passes this ASN.1 object along with a community name its source
transport address and the destination transport address, to the service
which implements the desired authentication scheme.
4. The protocol entity then constructs an ASN.1 Message object, using the
community name and the resulting ASN.1 object.
5. This new ASN.1 object is then serialized, using the basic encoding rules of
ASN.1, and then sent using a transport service to the peer protocol entity.
3. The protocol entity then passes the community name and user data found
in the ASN.1 Message object, along with the datagram’s source and des-
tination transport addresses to the service which implements the desired
authentication scheme (security measures).
6. If the parse fails, it discards the datagram and performs no further actions.
Otherwise, using the named SNMP community, the appropriate profile is
selected, and the PDU is processed accordingly.
• Proactive Monitoring
Given the resources available on the monitor, it is potentially helpful for
it continuously to run diagnostics and to log network performance. The
monitor is always available at the onset of any failure. It can notify the
management station of the failure and can store historical statistical infor-
mation about the failure. This historical information can be played back
by the management station in an attempt to perform further diagnosis
into the cause of the problem.
• Multiple Managers
An organization may have multiple management stations for different
units of the organization, for different functions (e.g. engineering and
operations), and in an attempt to provide disaster recovery. Because en-
vironments with multiple management stations are common, the remote
network monitoring device has to deal with more than own management
station, potentially using its resources concurrently.
• statistics
• control
• history
• alarm
• host
• hostTopN
• matrix
• filter
• packet capture
• event
These group forms the basic unit of RMON MIB. They are used to implement
different functions. When a group is used to implement any particular functions
all the objects within that group have to be used. The use of each of these groups
is
• Statistics Group
The statistics group contains statistics measured by the probe for each
monitored Ethernet interface on this device. This group consists of the
etherStatsTable. In the future other groups will be defined for other media
types including Token Ring and FDDI. These groups should follow the
same model as the ethernet statistics group.
• Control Group
The history control group controls the periodic statistical sampling of
data from various types of networks. This group consists of the histo-
ryControlTable.
• History Group
The ethernet history group records periodic statistical samples from an
ethernet network and stores them for later retrieval. This group consists
of the etherHistoryTable. In the future, other groups will be defined for
other media types including Token Ring and FDDI.
• Alarm Group
The alarm group periodically takes statistical samples from variables in
the probe and compares them to previously configured thresholds. If the
monitored variable crosses a threshold, an event is generated.
• Host Group
The host group contains statistics associated with each host discovered
on the network. This group discovers hosts on the network by keeping
a list of source and destination MAC Addresses seen in good packets
promiscuously received from the network.
• HostTopN Group
The hostTopN group is used to prepare reports that describe the hosts
that top a list ordered by one of their statistics. The available statis-
tics are samples of one of their base statistics over an interval specified
by the management station. Thus, these statistics are rate based. The
management station also selects how many such hosts are reported.
• Matrix Group
The matrix group stores statistics for conversations between sets of two
addresses. As the device detects a new conversation, it creates a new entry
in its tables.
• Filter Group
The filter group allows packets to be matched by a filter equation. These
matched packets form a data stream that may be captured or may generate
events.
• Event Group
The event group controls the generation and notification of events from
this device. This group consists of the eventTable and the logTable.
• Statistics Generation
• Filtering Packets
• Alarm and Alerts Generation
The function of statistics generation is used to provides varied types of statis-
tics, this includes statistics for the ethernet and token ring network being moni-
tored. This also includes providing statistics of data that flows between various
hosts on the network. All these functions are depicted in Figure 3.16.
Ethernet statistics block is the group of statistical data associated with eth-
ernet network. This includes the history block that RMON objets will use for
providing proactive monitoring it contains data gathered from various networks.
Similar analysis is done for token ring networks that are a part of managed net-
work. The first 9 groups mentioned in the list of MIB groups will be used for
providing statistics and management of ethernet networks. The block related to
Host and conversation statistics will maintain data statistics of data transferred
between various hosts. RMON will make use of objects from Host-Top-N group
and Matrix group to provide this data.
Packet filtering group performs the task of monitoring every packet to de-
termine it nature and type. This is done using a set of complicated filters6 .
Finally the function of alarm generation and event logging is provided by the
alarm generation block. For this objects from the group of alarm is used.
• SMI:
Network management process makes use of objects for changing the val-
ues of various network elements. These objects should have names that
are globally unique. SMI defines the rules for naming an object. It is
important to stress on the fact that SMI only defines the rules, it DOES
NOT create any object. In summary SMI functions are
• MIB:
Once the rules for naming an object are clearly defined another protocol
namely the MIB is used to create an object. These objects act as the in-
terface for any network management application to manipulate properties
of network elements.
indicates that the data contained in the value field is an integer. Length tag
specifies the number of bytes in the data field. Since INTEGER type data need
4 bytes, the length tag will then have the corresponding binary representation
of 4. Finally the value field contain binary equivalent of INTEGER 14.
• Access control: Verifying that the user has access to the objects that
are requested.
Bilingual Manager
Bilingual manager is a device that contains modules that can interpret both
SNMPv1 as well as SNMPv2 messages. These modules are called interpreter
module. Along with interpreter module bilingual manager has a database that
contains information about the versions currently running on various agents.
This is shown in Figure 3.26
The bilingual manager does common functions of network management, this
process makes use of the version field in the SNMP message PDU to identify the
version of message. This arrangement is expensive to implement and maintain.
A suitable option for the same is provided by the proxy server.
7 Manager or device capable of understanding and translating both SNMPv1 and SNMPv2
messages
1. Authenticating messages.
2. Encrypting/decrypting messages for privacy.
9 Version of an SNMP message is identified by the version field in the header
10 These additional models may be enterprise specific or future standards.
Summary
This module of Telecom Network Management summarizes the internet model
for network management. Internet model was another standard similar to OSI
network management model. The main advantage of internet based SNMP
model for network management is that it is light weight and easy to implement.
This has made SNMP a preferred choice as a network management protocol.
This module descried the various components of internet model. This descrip-
tion includes SNMP architecture and SNMP protocol specifications.
Followed by the description of the model, SNMP PDU is explained which
provides an overview of how a SNMP message is created and transmitted using
layer 3 protocols. Figure 3.29 gives all the PDUs of SNMPv1 in an organized
manner. Although SNMP is simple and easy to implement, it lacks proactive
behaviour where is can predict any faults before they happen. This is improved
by using RMON which provides data analaysis capacity. Another drawback
with SNMP protocol was the lack of security which is improved upon by later
versions namely SNMP v3. The module also covers important aspects and
improvements brought about by later modification of SNMP namely SNMPv2
and SNMPv3. The architecture of SNMP is briefly described providing an
overview of functions performed by different components. In all this modules
summaries the important aspects of internet management model and charts the
evolution of SNMP network management protocol.
Broadband Network
Management
75
4.1. INTRODUCTION 76
4.1 Introduction
Broadband network can broadly be classified in to two categories, Wide Area
Network (WAN) and access network. WAN networks are used for connecting
network that are separated by a large geographical distance. The implemen-
tation of WAN generally relies on having high speed technologies like ATM or
some form of fiber optic based technology (SONET or SDH). These technologies
are instrumental in providing high speed and high capacity data communication
which characterize broadband networks.
Telecommunication networks consists of WAN section and a local loop sec-
tion. This local loop is responsible for connecting the end user to a network.
The technology that generally form my access network is based on LAN. Which
can be implemented using cable modem, digital subscriber loop or wireless tech-
nologies.
With evolution of communication technology, boundaries between data traf-
fic, voice traffic and video traffic started fading. With advent of Integrated
Digital Subscribers Network (ISDN), the integration of these data types was
made complete. Here a single telecommunication line could carry all three
types of traffic. This led to creation of B-ISDN (Broadband ISDN). The term
broadband network has several interpretations. One such interpretation is a
network that can carry voice data and video over the same medium. One sim-
ple misconception is often that high speed data networks are called broadband
networks1 .
Improvements in the broadband networks have led to significant advances
in technologies like Asynchronous Transfer Mode (ATM), Synchronous Optical
Network (SONET), Synchronous Digital Hierarchy (SDH). ATM is one major
technology that is used for broadband networks, but this technology can be used
for any high speed network implementation. ATM is a favorable technique as it
makes use of virtual circuit switching which is essentially a packet switched tech-
nique which uses connection oriented procedures of circuit switched techniques.
Figure 4.1 shows how broadband services are used for WAN implementation
and for connecting several local loops(local networks).
• Provide high data rate. This involves using optical fiber communication
systems for providing high speed communication.
1 The term broad refers to the mediums capability to carry signals having a large bandwidth
• Asynchronous TDM:
Data packets from individual users are separated into cells of identical size
and multiplexed using Time Division Multiplexing Scheme (TDM). Figure
4.2 shows how data from three users A, B and C are divided into smaller
cells and transmitted over a common channel using TDM scheme.
• Virtual Connection:
Information sent over the ATM network makes use of a common channel
as depicted in Figure 4.2. Connection between two points in the network is
accomplished with the help of Virtual Paths(VP), Virtual Circuit(VC) and
transmission path. Transmission path is the actual physical connection
between two points in the network. This connection is the cable or the
physical medium used for connecting end devices.
ATM makes use of virtual circuit switching technique, where each trans-
mission path is further divided into logical paths called virtual paths. Vir-
tual paths are used to carry data between nodes that belong to the same
geographical location or to nodes that are a part of the same network.
Finally each virtual path is then further divided into logical connections
called Virtual Circuits(VC). Again these circuits are not real they are log-
ical division on the virtual path that help differentiate between data from
two different user. All cells belonging to a single message follow the same
virtual circuit and remain in their original order until they reach their
destination.
Figure 4.3 shows the relation between Transmission Path, Virtual Path
and Virtual Circuits. Here the same transmission path is divided into
two virtual paths. Each virutal path is then divided into large number
of virual circuits. To facilitate virtual circuit switching, the PDU contain
two identifiers namely Virtual Path Identifier (VPI) and Virtual Circuit
Identifier (VCI). Each connection between two end users is differentiated
by using two VPI and VCI. In Figure 4.3 TP is divided into two VPI
numbered 14 and 18 and VPI 14 is further divided into VCI numbered
21, 32 and 45. A single communication stream between two end users is
identified by a combination of (VPI,VCI).
• ATM Layers:
ATM is a WAN communication technology that enables long distance
communication. This makes it imperative to incorporate different tech-
nologies and different protocols at the application layer. Data from these
applications is then converted to a fixed data size of 53 bytes and is then
transmitted over the physical network. To allow this flexibility ATM in-
corporates ATM Application Adaptation Layers (AAL). There are 4 types
of adaptation layers shown in Figure 4.4. ATM defined 3 layers where the
top most layer is AAL. The application adaptation layer (AAL) is used
only by the end points.
Next layer used by ATM is the ATM layer, this layer provides routing,
traffic management, switching, and multiplexing services. It processes
outgoing traffic by accepting 48-byte segments from the AAL sublayer.
The addition of a 5-byte header transforms the segment into a 53-byte
cell. A cell is 53 bytes in length with 5 bytes allocated to header and 48
bytes carrying payload (user data may be less than 48 bytes). Most of the
header is occupied by the VPI and VCI. Figure 4.5 shows the functions
performed by ATM layer where the data received from the upper layers is
segmented into cells of equal size.
• ATM Packet:
In the ATM hierarchy, AAL receives data from different applications and
protocols and converts it into a form that can be used by the ATM layer.
ATM layer converts the data received from AAL into segments of 48 bytes
each and then attaches a header of 5 bytes. This header is shown in Figure
4.6. Header contains the information about VPI and VCI. A combination
of VPI and VCI is used to identify a unique data stream over a transmis-
sion path.
– GFC(Generic Flow Control): This bit is used to provide flow
control and congestion control to all the data segments that are trans-
mitted.
– Virtual Path Identifier(VPI): The 8 bits of VPI are used to divide
a physical transmission path into logical paths. Each path is then
identified by a number.
– Virtual Circuit Identifier(VCI): 16 bit field of the VCI helps
distinguish different data-stream on the same virtual path. Each
VPI refers to a connection between two end devices.
– Payload Type(PT): Payload type is used to distinguish of provide
information about the type of data that is being carried by the cell.
– Header Error Control: These bits are added by the ATM layer to
provide error protection to the transmitted information.
• The ability to run all existing LAN applications over ATM without change.
The immediate benefit is that users do not have to reinvest in applications.
• The ability to interconnect ATM equipment and networks to existing
LANs, and to link logically separate LANs via one ATM backbone. The
advantage is that ATM equipment only has to be introduced where it is
needed.
LAN Emulation is being defined by the ATM Forum in the LAN Emulation
workgroup. Note LAN Emulations greatest advantage is also its greatest dis-
advantage: it hides the ATM layer from the application. This means that
applications running over LAN Emulation cannot use the additional benefits of
an ATM network: support for multiple kinds of data, a specifiable Quality of
Service, priority and congestion management and more.
• Communication needs ATM address (20 Bytes) while LAN relies on phys-
ical address on the NIC.
As shown in Figure 4.7 LANE (LAN Emulation) layer is above AAL which
allows interfacing of LAN applications with the underlying ATM network. AAL
is followed by ATM and physical layer. As shown in the Figure 4.7 lower three
layers namely physical, ATM and AAL represent the base ATM architecture on
which the LAN architecture3 is implemented with the help of LAN Emulation
Layer.
The ATM adaptation layer interfaces LAN with ATM and allows LAN to
run varied types of applications. LUNI (LAN Emulation User Network Inter-
face) is specified by ATM Forum. LUNI provides interface between the user
and the LAN emulation layer. Before understanding LANE, it is necessary to
understand some terms used to describe various network elements. They are
described in the next section.
3 Network Layer, LLC are a part of LAN.
While the ATM Forum specifies that the are three separate logical compo-
nents to the LAN Emulation service (the LES, LECS and BUS), it deliberately
does not specify whether they are physically separate or united. This decision
is left to the vendors. Many vendors merge the LES, LECS and BUS into a
single physical unit. This implementation is shown in Figure 4.8 where all the
components are implemented on a single device.
Four functions are performed by the LUNI interface shown in Figure 4.8
namely (a) Initialization (b) registration (c) address resolution and (d) data
transfer.
4 Address Resolution Protocol: Protocol used over LAN for finding the physical address
corresponding to an IP address.
• Initialization:
Initialization involves obtaining ATM addresses of LAN Emulation Server
that are available on the network. This is the server that is running the
application that enables LANE. Second function involves joining/leaving
a particular ATM network.
• Registration:
Registration informs the LES of the individual MAC addresses that the
LEC will communicate with or those LEs who will use the services of LEC.
• Address Registration:
As explained in the previous sections ATM makes use of 20 Byte ATM
Address where as LAN relies on physical address for routing and data
delivery. Address registration enables correct resolution of LAN address
onto ATM addresses.
• Data Transfer:
Data transfer involves transmission of data between source and destina-
tion. This is done by converting data into frames and then encapsulating
them as ATM frames. AAL-55 is the protocol used to perform LAN Em-
ulation. Transmitted data is then decapsulated at the receiving end.
implementing LANE.
The other stations remain connected via Ethernet and thus retain their original
network cards.
Figure 4.10 shows a typical ATM LAN Emulation network which makes use
of different components of LANE and communicates with legacy systems like
Ethernet.
In the Figure 4.10 when the ATM workstation wants to communicate with
LAN it functions as LEC (LAN Emulation Client) and interfaces with the LAN
through LUNI(LAN User to Network Interface). On the LAN side interfacing
of LAN part of the network with ATM is done through bridge. The bridge that
has both technologies: a LAN port towards the legacy LAN and an ATM port
towards the newer ATM network.
The LEC requires various services to function correctly in LANE environ-
ment. These services are provided by components namely LES, BUS and LECS.
Though they are three different components their implementation can be done
on a single network device(switch). There are two types of connections estab-
lished in ATM communication namely Data Connection and Control Connection
(shown in Figure 4.10).
Any communication happening in ATM happens via virtual circuit, which
is a connection oriented service. The same is not applicable for LAN or con-
ventional Ethernet LAN. To facilitate this communication one LEC(ATM side)
communicates to a device situated on LAN with the help of LAN Emulation
Server(LES). In ATM devices are identified using 20 byte ATM address while
on the LAN side of the network devices are identified using a 6 Byte MAC
address. This address translation is enabled by LES. Clients have to register
with LES, so while communicating with other devices the correct ATM/MAC
address can be resolved and a connection oriented communication can be estab-
lished. This communication can happen between various hosts, in-case the host
on LAN it may send an Ethernet or Token Ring packet. To facilitate commu-
6 Source and destination are first connected via a virtual circuit, that remains dedicated to
• VLANs enhance security greatly. Some of the users that wish to have high
level of security can be logically grouped into a single VLAN.
• VLAN groups users logically based on the functions or services that they
want. This grouping makes them independent of physical or geographical
location.
The five key interfaces that enable communication between different NMS
• M3: The management interface the private management system and the
public management system.
• M4: The management interface between the switches in the public man-
agement system and the public ATM network.
Each of these interfaces are used for management of different aspects of ATM
network (covered in later sections).
Summary
This section describes the basics of Broadband Network Management tech-
niques. Broadband network consists of various interacting technologies like
LAN at the local network and ATM/SONET/SDH for implementing WAN.
Since ATM is one prime technology used for implementing WAN, this module
revolves around management of ATM networks. In the first few sections, basics
of ATM communication are introduced. Where ATM is a connection oriented
communication technique. Main advantage of ATM is the high speed communi-
cation provided with the help of underlying physical layer implementations like
SONET and SDH. To leverage the advantages of ATM for Local LANs the con-
cept of ATM LAN Emulation is introduced. Finally the ATM reference model
and its interfaces are described to sum up to broadband management process
Network Management
Applications
In the previous few chapters the concept or the idea of network management
revolved around managing the communication network. This involved manage-
ment of network elements and the interconnections between various networks.
This module adds another dimension to the concept of network management.
The model of network management is extended to include Business manage-
ment and Service management. Figure 5.1 presents this integration of busi-
ness management and service management. In this figure the highest level of
management is in form of business management. These functions are the activi-
ties related to running an enterprise (educational institutes, Telecommunication
service providers, IT organizations). These activities rely of a second level of
management which is the service management. Service management involves
managing various aspects of services provided by the enterprise. These services
refer to the communication related service provided by the enterprise. Figure
5.2 shows the relation between service management and various lower layer on
Telecom Management Network.
These management activities will in turn rely on a third level of service called
network management and system management. Network management and Sys-
tem management aggregate data obtained from the lowest layer of of actual
network elements (devices) and system resources. This module deals with net-
work management applications as defined by Functional Model of OSI Network
management model. These application are the functions performed by a net-
work management systems i.e. Fault Management, Configuration Management,
Accounting Management, Performance Management and Security Management
(FCAPS). A brief introduction of FCAPS is presented in section 2.7. (refer that
section before further study)
Network management and service management are not only related to tech-
nical aspects of a telecom network, but they also have a bearing on the formula-
tion of business decisions and policy making procedures. Based on the statistics
97
5.1. CONFIGURATION MANAGEMENT 98
and analysis performed in the process of Network management and service man-
agement policies are created. This policies are create measures and metrics for
measuring the performance of a network and in extension the services provided
by the service provider.
• Fault Detection
• Fault Location
• Service Restoration
• Problem Resolution
These three security concerns shape various policies and procedures instituted
under the process of security management. This section talk about such policies
and procedures that are implemented to ensure secure communication for all the
users. Along with policies and procedures this section also gives an introduction
on the equipments needed to implement these security measures.
5.3.2 Firewall
Firewalls are just another tool in the quest for system security. They provide a
certain level of protection and are, in general, a way of implementing security
policy at the network level. The level of security that a firewall provides can
vary as much as the level of security on a particular machine. There are the
traditional trade-offs between security, ease of use, cost, complexity, etc.
Main task of a firewall is to protect a network from external threats. It
monitors and controls traffic flowing through the network. Firewall functions
can be implemented on a router or a gateway. Same functionalities can be
achieved using a stand alone device. In corporate network firewalls are located
at the border of the network, where the private network meets the internet.
Along with hardware components, firewall functionalities are also implemented
on hosts in form of software application that protects the hosts from malwares.
Telecommunication
Management Network
The term TMN is introduced by the ITU-T (the former CCITT) as an abbrevi-
ation for Telecommunications Management Network. The concept of a TMN is
defined by Recommendation M.3010. TMN has a strong relationship with OSI
management, and defines a number of concepts that have relevance for Internet
Management.
According to recommendation M.3010 Telecommunication Network Manage-
ment (TMN) is a conceptually different network from the communication net-
work. This management network interfaces with the communication network
at multiple places and helps manage the underlying communication network
efficiently. Figure 1.1 shows the relation between TMN and communication
network (the same fig presented here for ease of reference).
According to Figure 6.1, the interface points between the TMN and the
telecommunication network are formed by Exchanges and Transmission systems.
For the purpose of management, these Exchanges and Transmission systems
are connected via a Data Communication Network to one or more Operations
Systems. The Operations Systems perform most of the management functions;
these functions may be carried out by human operators but also automatically.
A TMN provides management functions for telecommunication networks and
services and offers communications between itself and the telecommunication
networks, services and other TMNs. The basic concept behind a TMN is to
provide an organized architecture to achieve the interconnection between various
types of Operations Systems (OSs) and/or telecommunications equipment for
the exchange of management information using an agreed architecture with
standardized interfaces including protocols and messages.
The objective for the TMN specifications is to provide a framework for
telecommunications management. By introducing the concept of generic net-
work models for management, it is possible to perform general management
of diverse equipment, network and services using generic information models
105
6.1. DIFFERENCE BETWEEN TMN AND COMMUNICATION
NETWORKS 106
• Functional Architecture
• Physical Architecture
• Informational Architecture
• qx: Interface between mediation function such as RMON and agent in the
network element
• f: Interface to the workstation
Operations System, for example, may be used to implement multiple OSFs, but
may also be used to implement an OSF, MF and a WSF. In the case a building
block implements multiple function blocks of different types, ”the choice on the
building blocks name is determined by the predominate usage of the block”.
A special kind of building block is the Data Communication Network (DCN).
As opposed to the others, this building block does not implement any TMN func-
tion block. In fact, the DCN is used by other building blocks for the exchange
of management information; the DCNs task is to act as a transport network.
Figure 6.9 shows how any managed entity is described in using TMN informa-
tional architecture.
• measuring the resources that are being used, like CPU-time, buffer space,
queue length etc.,
• updating firmware.
• creation of dedicated paths through the network to support the QoS de-
mands of end users,
• detection of faults.
• Accounting,
• Address assignment,
The Business Management layer is responsible for the management of the whole
enterprise. This layer has a broad scope; communications management is just
a part of it. Business management can be seen as goal setting, rather than
goal achieving. For this reason business Management can better be related to
strategical and tactical management, instead of operational management, like
the other management layers of TMN.
Summary
This module introduces the general idea of Telecommunication Management
Networks. Here TMN is a standard that aims to go beyond simple network
management. TMN aims to achieve business management and to do this various
standardization process are adopted. The module introduces the concept of
TMN architecture and describes various functional blocks involved in TMN
architecture. Finally provides a introduction of the layered architecture and
various ways to implement TMN for efficient business management.
119
LIST OF FIGURES 120