09 Chapter 4
09 Chapter 4
INTERNET MANAGEMENT
Internet Management
Internet Management
This chapter discusses and analyses the management approach that is standardized
by the Internet Engineering Task Force (IETF). This approach is also known as the
Simple Network Management Protocol (SNMP) or the TCP/IP management
approach.
In the second half o f the past decade the Internet grew to a size that management of
the Internet could no longer be provided on an ad hoc basis: a structured and
standardized approach to Internet management was required. In 1987 three
management proposals therefore appeared. One of these, the High-level Entity
Management System / Protocol (HEMS / HEMP)[ RFC 1021-1022: "High-level
Entity Management System (HEMS)", Partridge C., Trewitt G., October 1987] was
withdrawn soon, so only two remained: the Simple Network Management Protocol
(SNMP) and Common Management Over TCP/IP (CMOT). At the March 1988
meeting of the Internet board, the decision was made to use SNMP in the short-term
and CMOT in the long-term.[ RFC 1052: "IAB recommendations for the
development of Internet network management standards", Cerf V.G., April 1988 ]
CMOT was an attempt to use OSI systems management standards (such as CMIP)
in the Internet environment. CMOT faced the same problems as OSI management:
the specifications did not appear in time, there were virtually no implementations and
operational experience could not be obtained. As a result, the support for CMOT
slowly diminished. In 1992 all work on CMOT was stopped.
SNMP [RFC 1157: "Simple Network Management Protocol (SNMP)", Case J.D.,
Fedor M., Schoffstall M.L., Davin C., May 1990] is actually a further development
of SGMP (Simple Gateway Monitoring Protocol)[Case J.D., Davin J.R., Fedor M.S.,
Schoffstall M.L.: "Introduction to the Simple Gateway Monitoring Protocol", in:
IEEE Network, page 43-49, March 1988] . SGMP was aimed at management of
Intermediate Systems (gateways). Because SGMP appeared to be a success, it was
decided to extend its scope and include management of End Systems. To reflect this
change, the protocol was renamed into SNMP.
An interesting difference between the IETF and ISO is that the IETF takes a more
pragmatic and result driven approach than ISO. In the IETF it is for instance unusual
to spent much time on architectural discussions; people prefer to use their time on
the development of protocols and implementations.
This different attitude explains why no special standards have been defined for the
Internet management architecture; only protocols and MIBs have been standardized.
Fortunately many articles and books have been written (even by the editors of the
standards) that describe the principles behind Internet management [e.g.
Case J.D., Davin J.R., Fedor M.S., Schoffstall M.L.: "Network management and the
design of SNMP", in: Connexions, the Interoperability Report, page 22-26,March
1989
Case J.D., Davin J.R., Fedor M.S., Schoffstall M.L.: "Internet network management
using the Simple Network Management protocol", in Proceedings of the 14th IEEE
Conference on Local Computer Networks, page 156-159, Oct.1989
Case J.D., Davin J.R., Fedor M.S., Schoffstall M.L.: "Keeping it simple (network
management)", in Unix Review, Vol. 8, No. 3, page 60-66, March 1990
Rose M.T., "Network management is Simple, you just need the right framework", in:
Proceedings of the IFIP TC6/WG 6.6 Second International Symposium on Integrated
Network Management, page 9-25, North-Holland, 1991 ]
Apparently SNMP was the right solution at the right time. Already a few years after
Publication of the standard most data communication equipment could be managed
via SNMP; SNMP had become the de facto standard for management of data
communication networks. Still SNMP has some deficiencies. In 1992 work was
therefore started to develop an improved version of SNMP; this new version was
called SNMPv2.
In this chapter both protocol versions will be presented. Section 4.1 discusses the
original SNMP protocol, while SNMPv2 will be discussed in Section 4.2. It should
be noted that both protocols only define how management information should be
exchanged; they do not define which management information exists. Such
information is defined by the various MIB standards; Section 4.3 discusses some of
the most important ones. Section 4.4 provides an analysis of Internet management.
The ideas behind SNMP are relatively straightforward and easy to understand. In
fact, there is little difference between the ideas behind SNMP and the ideas that
existed in ISO around 1987, thus before ISO adopted the Object Oriented approach
for management. Examples of such common ideas are the manager agent concept,
the idea to use the managed functions also for the exchange of management
information, the idea to use GET and SET PDUs for operations on management
information, the idea to use ASN. 1 for the definition of management information and
the idea of a MIB.
rasrapar agent
>■SNMP
With SNMP, a single manager may control many agents. As shown in Figure 4.1. the
SNMP protocol is built upon the User Datagram Protocol (UDP), which is a
connectionless transport protocol [RFC 768: "User Datagram Protocol", Postel, J.B.,
August 1980 ]. Since the Internet management information as well as the formats of
SNMP PDUs are defined according to (a subset of) the ASN.l syntax, encoding
functions are needed immediately on top of UDP. These functions operate according
to the Basic Encoding Rules (BER). Five types of SNMP PDUs are defined:
GetRequest, GetNextRequest, SetRequest, Response and Trap. The SNMP protocol
standard does not address the functions that are specific for managers or agents; the
SNMP standard is thus restricted to the functions below the dotted line (Figure 4.1).
This implies that the scope of SNMP is equivalent to the one of CMIP; as opposed to
CMIP no standard exists, however, which defines the service that is provided on top
of SNMP.
The IETF has not (yet) defined manager specific functions; further work in this area
is therefore urgently needed[Rose M.T.: "The Simple Book - Second edition",
Prentice-Hall International Editions, 1994]. The lack of manager specific functions
sharply contrasts to the overwhelming number of agent specific functions (primarily
MIBs) that have been defined. Section 4.3 gives an overview of these MIBs.
The choice to operate SNMP over the connectionless UDP has several implications.
In the first place UDP is unreliable, which means that user data may get lost. The
decision to use an unreliable transport service provider, has been taken deliberately.
The reason is that even in case of repeated provider failures, it should still be
possible to exchange some part of the management information. With a reliable
(connection-oriented) provider this may not be possible. Connection- oriented
providers are designed according to an 'all or nothing' approach: either all data will
be delivered or nothing will be delivered. If data can not be delivered, the connection
will be released. Connectionless providers are designed according to an 'best-effort'
approach: even in case of failures some of the data may amve at the destination.
Management may therefore still be possible, although in a limited way.
It is interesting to see that the SNMP protocol does not itself perform
retransmissions. The responsibility to detect data loss and initiate retransmission is
left to the manager, because it is assumed that managers are usually better equipped
to determine whether and when retransmissions are required.
Although SNMP is intended to operate over UDP, there are also RFCs that define
how to operate SNMP on top of other protocols (e.g. Ethernet, IPX or even OSI).
GetR quest
GetN :xtRequest Set Request
x
X
Response ^ Response
Response -
SNMP does not describe how to relate the various Get, Set and Trap interactions.
What to do after reception of a Trap is, for example, not defined by SNMP.
Instead, determination of this relationship is considered to be a responsibility
of the manager specific functions.
manager agent
side side
4.2 SNMPv2
Since publication o f the original SNMP protocol, several proposals have been
presented to improve SNMP. In 1992 it was decided to collect these proposals and
produce a new standard: SNMPv2. Unfortunately SNMPv2 became far more
complex than the original SNMP[ Pras A.: "TMN - Introduction and Interpretation”,
TIOS 92-16, Memoranda Informatica 92-40]; whereas the description of the original
SNMP protocol required, for example, only 35 pages, the description of SNMPv2
required about 250 pages.
The main achievements of SNMPv2 are the improved performance (Subsection
4.2.1), the better security (Subsection 4.2.2) and the possibility to build a hierarchy
of managers (Subsection 4.2.3).
4.2.1 Performance
As explained on page 64, the original SNMP protocol includes a rule which states
that if the response to a Get or GetNext request would exceed the m aximum size of a
packet, no information will be returned at all. Since managers can not determine the
precise size of response packets in advance, they usually take a conservative guess
and request per PDU just a small amount. To obtain all information, managers may
be required to issue a large number of consecutive requests.
4.2.2 Security
The original SNMP protocol had, except for a simple mechanism which involved the
exchange of passwords (the term 'community string' was used to denote this
password), no security features. To solve this deficiency, SNMPv2 introduced a full-
fledged security mechanism. This mechanism is based upon the use of 'parties' and
'contexts'; two concepts that can not be found in other management approaches.
Although the SNMPv2 standards include definitions of both concepts, these
definitions are difficult to understand. This subsection presents a somewhat
simplified view o f these concepts.
Parties have some resemblance to protocol entities. Usually multiple parties are
active in a single SNMPv2 subsystem and these various parties will be configured in
different ways. One party may, for instance, be configured such that it is prepared to
communicate with every other party in every other system. These numbers do not
include the pages describing the Structure of Management Information.
Mother party may be configured such that it is only prepared to interact with one
Particular remote party. In such case, the MD5 authentication mechanism is used to
ensure the authentication of the other party. Finally parties may be confipired in a
way that they are only prepared to interact with particular remote parties and in
addition require that all management information is encrypted according to the DES
algorithm. 6
UDP
o control access to the various parts of a MIB, SNMPv2 has introduced the context
concept. Each context refers a specific part of a MIB. In the example of Figure 4.4,
context Cl and context C2 refer to the two dotted areas in the MIB. Contexts may be
overlapping and are dynamically configurable, which means that contexts may be
created, deleted or modified during the network's operational phase. Different
contexts may be configured for different systems.
Practical experience with the original SNMP protocol showed that in many cases
managers are unable to manage more than a few hundred agent systems [3]. The
cause for this restriction is in SNMP's polling nature: the manager must periodically
poll every system under his control, which takes time. To solve this problem,
SNMPv2 introduced the idea of intermediate level managers.
variables must be polled in which agents. Besides, the top le v e l manager tells the
intermediate
intermediate level
level managers
managers o f the events he wants to be informed about. After the
intermediate level managers are configured, they start polling. In case an
intermediate level manager detects in a particular agent an event about which the top
level managers wanted to be informed, a special Inform PDU is generated.
After reception o f this PDU, the top level manager directly operates upon the agent
that caused the event.
4.3 MIBs
To ensure the unique identification of each management variable, the SMI introduces
the concept of a naming tree. The leaves of this tree represent the actual management
information.
4.4 Analysis
The concepts that cause most of the problems, are parties and contexts. Although the
interpretation o f these concepts given in this thesis (Subsection 4.2.2) may be
sufficient to understand most parts of the SNMPv2 standards certain parts of the
standards are based upon some other interpretation. A goo ^ examp e o s c
alternative interpretation can be found in the standards that e e ow
intermediate level managers.
According to these standards a context does not only refer to the specific part of a
MIB, but also identifies one of the agents that is controlled by the intermediate level
manager.
Now that thousands of management variables have been defined, the lack of a good
functional structure to classify these variables has become a problem. Without such
structure, managers will be confronted with large lists of management variables. To
determine which variables must be watched and which modifications must be made,
managers must understand the precise meaning of many variables.
Internet management standards do not describe any of these actions. Instead, Internet
management provides only a general approach to read and modify individual
management variables.