中国高校课件下载中心 》 教学资源 》 大学文库

福州大学:《计算机网络管理》课程PPT教学课件(英文)Chapter 13 Network Management Applications

文档信息
资源类别:文库
文档格式:PPT
文档页数:33
文件大小:5.96MB
团购合买:点击进入团购
内容简介
福州大学:《计算机网络管理》课程PPT教学课件(英文)Chapter 13 Network Management Applications
刷新页面文档预览

Chapter13 Network Management Applications The management of networked information services involves both network and system resources.OSI defines network management as a five-layer architecture.We extended the model to include system management and present the integrated architecture in Figure 13.1: L5 business management L4 Service management L3 network management or system management L2 element management or resource management LI network elements and system resources

Chapter13 Network Management Applications The management of networked information services involves both network and system resources. OSI defines network management as a five-layer architecture. We extended the model to include system management and present the integrated architecture in Figure 13.1: L5 business management L4 Service management L3 network management or system management L2 element management or resource management L1 network elements and system resources

13.1 Configuration Management Configuration management in network management is normally used in the context of discovering network topology, mapping the network,and setting up configuration parameters in management agents and management systems.Network management in the broad sense also includes network provisioning,which includes network planning and design. Network provisioning is considered to be part of configuration management

13.1 Configuration Management Configuration management in network management is normally used in the context of discovering network topology, mapping the network, and setting up configuration parameters in management agents and management systems. Network management in the broad sense also includes network provisioning, which includes network planning and design. Network provisioning is considered to be part of configuration management

13.1.1 Network Provisioning Network provisioning,also called circuit provisioning in the telephone industry,is an automated process.A trunk (circuit from the originating switching center to the destination switching center)and a special service circuit (customized to meet customer specifications)are designed by application programs written in operation systems,Planning and inventory systems are integrated with design systems to build an overall system.Thus a circuit designed for the future automatically derives its turn-on date from the planning system and ensures that the components are available in the inventory system

13.1.1 Network Provisioning Network provisioning, also called circuit provisioning in the telephone industry, is an automated process. A trunk (circuit from the originating switching center to the destination switching center) and a special service circuit (customized to meet customer specifications) are designed by application programs written in operation systems, Planning and inventory systems are integrated with design systems to build an overall system. Thus a circuit designed for the future automatically derives its turn-on date from the planning system and ensures that the components are available in the inventory system

13.1.2 Inventory Management An efficient database system is an essential part of an inventory management system.We need to be aware of the specification details associated with various components.The data should be accessible by means of different indices. Some of the obvious indices or access keys are the component description or part number,components that match a set of characteristics,components in use and in spare,and components to be freed-up for future use

13.1.2 Inventory Management An efficient database system is an essential part of an inventory management system. We need to be aware of the specification details associated with various components. The data should be accessible by means of different indices. Some of the obvious indices or access keys are the component description or part number, components that match a set of characteristics, components in use and in spare, and components to be freed-up for future use

13.1.3 Network Topology Network management is based on knowledge of network topology.As a network grows, shrinks,or otherwise changes,network topology needs to be updated automatically. Such updating is done by the discovery application in the network management system.However,the scope of the discovery process needs to be constrained.For example, the arp command can discover any network component that responds with an IP address, which can then be mapped by the network management system.If the response includes workstations that are turned on only when they are in use,the network management system would indicate failure whenever they are off.Obviously,that is not desirable

13.1.3 Network Topology Network management is based on knowledge of network topology. As a network grows, shrinks, or otherwise changes, network topology needs to be updated automatically. Such updating is done by the discovery application in the network management system. However, the scope of the discovery process needs to be constrained. For example, the arp command can discover any network component that responds with an IP address, which can then be mapped by the network management system. If the response includes workstations that are turned on only when they are in use, the network management system would indicate failure whenever they are off. Obviously, that is not desirable

Chapter13 Network Management Applications Autodiscovery can be done by using the broadcast ping on each segment and following up with further SNMP queries to gather more details on the system.A more efficient method is to look at the ARP cache in the local router.The ARP cache table is large and contains the addresses of all the hosts and nodes used in recent communications.Use of this table also allows subsequent ARP queries to be sent to other routers.This process is continued until the desired information is obtained on all IP addresses defined I by the scope of the autodiscovery procedure

Chapter13 Network Management Applications Autodiscovery can be done by using the broadcast ping on each segment and following up with further SNMP queries to gather more details on the system. A more efficient method is to look at the ARP cache in the local router. The ARP cache table is large and contains the addresses of all the hosts and nodes used in recent communications. Use of this table also allows subsequent ARP queries to be sent to other routers.This process is continued until the desired information is obtained on all IP addresses defined by the scope of the autodiscovery procedure

Hub 1 Port A Segment A Router Port B Segment B 口口 Hub 2 source of th se B2 Figure 13.2 LAN Physical Configuration

A1 (hub 1) A2(hub 2) B50908) Router Switch baviso9T jon 916 asanodasT 9viuogano B1 (hub 1) B2(hub 2) Figure 13.5 Logical Configuration of Two VLAN Segments

13.3 Performance Management Network performance is a nebulous term,which is hard to define or quantify in terms of global metrics.Performance management actually is (data) traffic management.It involves following data monitoring,problem isolation,performance tuning, analysis of statistical data for recognizing trends, and resource planning. 13.3.1 Performance Metrics The parameters that can be attributed to defining network performance on a global level are throughput,response time,network availability, and network reliability.The metrics of these parameters depend on what,when,and where the measurements are made

13.3 Performance Management Network performance is a nebulous term, which is hard to define or quantify in terms of global metrics. Performance management actually is (data) traffic management. It involves following data monitoring, problem isolation, performance tuning, analysis of statistical data for recognizing trends, and resource planning. 13.3.1 Performance Metrics The parameters that can be attributed to defining network performance on a global level are throughput, response time, network availability, and network reliability. The metrics of these parameters depend on what, when, and where the measurements are made

13.3.2 Data Monitoring Data monitoring in the network for abnormal performance behavior,such as a high collision rate in an Ethernet LAN and excessive packet drop because of overload,are detected by traps generated by agents and RMON.Performance-related issues are detected primarily with trap messages generated by RMON probes.Thresholds are s set for important SNMP parameters in the RMON,which then generate alarms when the preset thresholds are crossed.For example,the parameters in the alarm group and the event group in the RMON MIB [RFC 1757]may be set for the object identifier to be monitored.The time interval over which the data are to be collected for calculation and the rising and falling thresholds are specified

13.3.2 Data Monitoring Data monitoring in the network for abnormal performance behavior, such as a high collision rate in an Ethernet LAN and excessive packet drop because of overload, are detected by traps generated by agents and RMON. Performance-related issues are detected primarily with trap messages generated by RMON probes. Thresholds are set for important SNMP parameters in the RMON, which then generate alarms when the preset thresholds are crossed. For example, the parameters in the alarm group and the event group in the RMON MIB [RFC 1757] may be set for the object identifier to be monitored. The time interval over which the data are to be collected for calculation and the rising and falling thresholds are specified

刷新页面下载完整文档
VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
相关文档