Become Masters in Computer Network. Anybody Can Master Computer Hardware and Maintenance," the ultimate destination for individuals seeking to gain expertise in computer hardware components and maintenance techniques. Whether you're a beginner looking to expand your knowledge or a seasoned professional aiming to enhance your skills, this website is designed to cater to all levels of expertise
SNMP Security
SNMP Management
SNMP and Data Representation
SNMP Basic Commands
- The read command is used by an NMS to monitor managed devices. the NMS examines different variable that are maintained by managed devices.
- The write command is used by an NMS to control managed devices. The NMS changes the values of variable stored within managed devices.
- The trap command is used by managed devices to asynchronously report events to the NMS. When certain types of events occur, a managed device sends a trap to the NMS.
- Traversal operations are used by the NMS to determine which variables a managed device supports and to sequentially gather information in variable tables, such as a routing table.
SNMP Version 2
SNMP Version 1
Simple Network Management Protocol (SNMP)
- SNMP version 1 (SNMPv1)
- SNMP version 2 (SNMPv2)
An SNMP-managed network consists of three key components: managed devices, agents and network-management systems (NMSs). A managed device is a network node that contains an SNMP agent and that resides on a managed network. Managed devices collect and store management information and make this information available to NMSs using SNMP. Managed devices, sometimes called network elements, can be routers and access servers, switches and bridges, hubs, computer hosts or printers.
An agent is a network-management software module that resides in a managed device. An agent has local knowledge of management information and translates that information into a form compatible with SNMP. An NMS executes application that monitor and control managed devices. NMSs provide that bulk of the processing and memory resources required for network management. One or more NMSs must exist on any managed network.
Accounting Management
Security Management
- Authentication: Authentication is the process of identifying users, including login and password dialog, challenge and response and messaging support. Authentication is the way a user is identified prior to being allowed access to the router or switch. There is a fundamental relationship between authentication and authorization. The more authorization privileges a user receives, the stronger the authentication should be.
- Authorization: Authorization provides remote access control, including one-time authorization and authorization for each service that is requested by the user. On a Cisco router, the authorization level range for users is 0 to 15 with 0 being the lowest level and 15 the highest.
- Accounting: Accounting allows for the collecting and sending of security information used for billing, auditing, and reporting, such as user identities, start and stop times and executed commands. Accounting enables network managers to track the services that users are accessing as well as the amount of network resources they are consuming.
Performance Management
Fault Detection and Notification
Troubleshooting Infrastructure
Network Management Platforms
- Network discovery
- Topology mapping of network elements
- Event handler
- Performance data collector and grapher
- Management data browser.
Network management platforms can be viewed as the main console for network operations in detecting faults in the infrastructure. The ability to detect problems quickly in any network is critical. Network operations personnel can rely on a graphical network map to display the operational states of critical network elements such as routers and switches.
Network management platforms such HP OpenView, Computer Associates Unicenter and SUN Solstice can perform a discovery of network devices. Each network device is represented by a graphical element on the management platform's console. Different colors on the graphical elements represent the current operational status of network devices. Network devices can be configured to send notifications, called SNMP traps, to network management platforms. Upon receiving the notifications, the graphical element representing the network device changes to a different color depending on the severity of the notification received. The notification, usually called an event, is placed in a log file.
A number of network management platforms are capable of managing multiple geographically distributed sites. This is accomplished by exchanging management data between management consoles at remote sites with a management station at the main site. The main advantage of a distributed architecture is that it reduces management traffic, thus, providing a more effective usage of bandwidth. A distributed architecture also allows personnel to locally manage their networks from remote sites with systems.
A recent enhancement to management platforms is the ability to remotely management network elements using a web interface. This enhancement eliminates the need for special client software on individual user stations to access a management platform.
A typical enterprise is comprised of different network elements. However, each device normally requires vendor-specific element management systems in order to effectively manage the network elements. Therefore, duplicate management stations may be polling network elements for the same information. The data collected by different systems is stored in separate databases, creating administration overhead for users. This limitation has prompted networking and software vendors to adopt standards such as Common Object Request Broker Architecture (CORBA) and Computer-Integrated Manufacturing (CIM) to facilitate the exchange of management data between management platforms and element management systems. With vendors adopting standards in management system development, users can expect interoperability and cost savings in deploying and managing the infrastructure.
Fault Management
Configuration Management
Each network device has a variety of version information associated with it. An engineering workstation, for example, may be configured as follows:
- Operating system, Version 3.2
- Ethernet interface, Version 5.4
- TCP/IP software, Version 2.0
- NetWare software, Version 4.1
- NFS software, Version 5.1
- Serial communication controller, Version 1.1
- X.25 software, Version 1.0
- SNMP software, Version 3.1
Configuration management subsystems store this information in a database for easy access. When a problem occurs, this database can be searched for clues that may help solve the problem.
Internet and IEEE Network Management Standards
IEEE has developed a set of network standards. They include:
Overview of OSI - Layer Model
Consider the following example:
Overview of OSI
Traditionally, layer diagrams are drawn with Layer 1 at the bottom and Layer 7 at the top. The remainder of this article describes each layer, starting from the bottom and explains some of the devices and protocols that may be found in the data centre operating at this layer.
Hubs
Routers
Bridges
The advantages of bridges are:
- increase the number of attached workstations and network segments.
- since bridges buffer frames, it is possible to interconnect different segments which use different MAC protocols.
- since bridges work at the MAC layer, they are transparent to higher level protocols.
- by subdividing the LAN into smaller segments, this increases overall reliability, and makes the network easier to maintain.
The disadvantages of bridges are
- the buffering of frames introduces network delays.
- bridges may overload during periods of high traffic.
- bridges which combine different MAC protocols require the frames to be modified before transmission onto the new segment. This causes delays.
Transparent bridges (also known as spanning tree IEEE 802.1D) make all routing decisions. The bridge is said to be transparent (invisible) to the workstations. The bridge will automatically initialize itself and configure its own routing information after it has been enabled.
Bridges are ideally used in environments where there a number of well defined workgroups, each operating more or less independent of each other, with occasional access to servers outside of their localized workgroup or network segment. Bridges do not offer performance improvements when used in diverse or scattered workgroups, where the majority of access occurs outside of the local segments.
The two separate network segments can be connected via a bridge. Note that each segment must have a unique network address number in order for the bridge to be able to forward packets from one segment to the other.
Ideally, if workstations on network segment A needed access to a server, the best place to locate that server is on the same segment as the workstations, as this minimizes traffic on the other segment and avoids the delay incurred by the bridge.
Repeaters
Network Management Components
Approaches to Network Management
Introduction to Network Management
Mail Server
- Accept the message and store it in the expected mailbox.
- Forward the message somewhere else, usually to a place specified by the owner of the mailbox,but possibly to a mailing list.
- Reject the message as undeliverable, either because the mailbox does not exist or because the mailbox is full or because the server is facing some temporary problems.
There are basically two kinds of mail servers based on the protocol. They are:
- Basic Simple Mail Transfer Protocol (SMTP) delivery. The server translates the mailbox name into a local file name and appends the message to the file.
- Post Office Protocol (POP) delivery. The server still stores messages somewhere, in a place derived from the mailbox name. However, it allows mail-receiving connections from other Internet sites. The mail agent on the recipient's site knows to open an Internet connection to the POP server, request contents of particular messages and (optionally) remove messages from the server's mailbox.
POP service is newer than SMTP service; it has the large advantage that the mail can be accessed from anywhere on the Internet, without logging into the server.
Electronic Mail
Electronic communication, because of its speed and broadcasting ability, is fundamentally different from paper-based communication. Because the turnaround time can be so fast, email is more conversational than traditional paper-based media.
Most e-mail systems include a rudimentary text editor for composing and editing messages. A message is sent to the recipient by specifying the recipient's address. An address is a text string of the form mailbox@site. The second part is a string identifying a particular site on the Internet; the first part is a string identifying a particular mailbox at that site. For example, consider a mail id like abc_def@yahoo.com. In this case, abc_def is the username and yahoo.com is the website.
Network Security
- Denial of service: This occurs when a hostile entity uses a critical service of the computer system in such a way that no service or severely degraded service is available to others. Denial of service is a difficult attack to detect and protect against. An example of denial of service is an Internet attack, where an attacker requests a large number of connections to an Internet server. Through the use of an improper protocol, the attacker can leave a number of the connections half open. Most systems can handle only a small number of half-open connections before they are no longer able to communicate with other systems on the net. The attack completely disables the Internet server.
- Compromising the integrity of the information: Most people consider that the information stored on the computer system is accurate. If the information loses its accuracy, the consequences can be extreme. For example, if competitors hacked in to a company's data base and deleted customer records, a significant loss of revenues could result. Users must be able to trust that data are accurate and complete.
- Disclosure of information: Probably the most serious attack is disclosure of information. If the information taken off a system is important to the success of an organization, it has considerable value to a competitor. Corporate espionage is real threat, especially from foreign companies, where the legal reprisals are much more difficult to enforce. Insiders also pose a significant threat. Limiting user access to the information needed to perform specific jobs increases data security dramatically.
However, most secure systems are difficult to work with and require extra development time. Networks connect large numbers of users to share information and resources, but network security depends heavily on the corporation of each user. Security is a strong as the weakest link.
Organizations should have a security program to assure that each automated system has a level of security that is commensurate with the risk and magnitude of the harm that could result from the loss, misuse, disclosure or modification of the information contained in the system. Each system's level of security must protect the confidentiality, integrity and availability of the information. Specifically, this would require that the organization has appropriate technical personnel, administrative, environmental and telecommunications safeguards;a cost-effective security approach, adequate resources to support critical functions and to provide continuity of operation in the event of a disaster.
Companies continue to flock to the Internet in ever-increasing numbers, despite the fact that the overall and underlying environment is not secure. To further complicate the matter, vendors, standards bodies, security organizations and practitioners cannot agree on a standard, compliant and technically available approach. As a group of investors concerned with the success of the Internet for business purposes, it is critical to pull the collective resources and work together to quickly establish and support interoperable security standards; open security interfaces to existing security products and security products and security control mechanisms within other program products; and hardware and software solutions within heterogeneous operating systems which will facilitate smooth transitions.
Having the tools and solutions available within the marketplace is beginning, but strategies and migration paths are also needed to accommodate and integrate Internet, intranet and World Wide Web (WWW) technologies into the existing IT infrastructure. While there are always emerging challenges, introduction of newer technologies, and customers with challenging and perplexing problems to solve, this approach should enable in maximizing the effectiveness of the existing security investments, while bridging the gap to the long awaited and always sought after perfect solution.
Security solutions are slowly emerging, but interoperability, universally accepted security standards, application programming interfaces (APIs) for security, vendor support and cooperation and multi platform security products are still problematic. Where there are products and solutions , they tend to have niche applicability , be vendor-centric or only address one of larger set of security problems and requirements. For the most part, no single vendor or even software/vendor consortium has addressed the overall security problem within "open" systems and public networks. This indicates that the problem is very large.
It is important to keep in mind, as with any new and emerging technology, Internet, intranet and WWW technologies do not necessarily bring new and unique security concerns, risks and vulnerabilities, but rather introduce new problems, challenges and approaches within the existing security infrastructure.
Security requirements, goals and objectives remain the same, while the application of security, control mechanisms and solution sets are different and require the involvement and cooperation of multi disciplined technical and functional area teams. As in any distributed environment, there are more players and it is more difficult to fine or interpret the overall requirements or even talk to anyone who sees or understands the big picture. More people are involved than ever before, emphasizing the need to communicate both strategic and tactical security plans broadly and effectively throughout the entire enterprise. The security challenges and the resultant problems larger and more complex in this environment. Management must be kept up-to-date and thoroughly understand overall risk to the corporation's information assets with the implementation or decisions to implement new technologies. They must also understand, fund and support the influx of resources required to manage the security environment.