TMN Lecture
TMN Lecture
TMN Lecture
LECTURE OUTLINE NETWORK MANAGEMENT GOALS , ORGANIZATION & FUNCTIONS MANAGEMENT FUNCTIONAL AREAS TMN FUNCTIONAL, INFORMATION AND PHYSICAL ARCHITECTURES TMN LAYERED ARCHITECTURE TMN RECOMMENDATIONS AND PRODUCT STATUS
KKM-TSEC
KKM-TSEC
Network Management
Network Maintenance
Fault /Trouble MGMT Network Installation Network repairs Facilities installation Routine tests & Maintenance
Users
Network
Configuration Data Trouble Ticket Restoration
Fault TT
Installation
KKM-TSEC
Network Management can be best illustrated by an Analogy of To Others Telephone Network Model Regional Cente Sectional Cente
Regional center Class 1 switch Regional center Class 1 switch
Sectional center Class 2 switch Primary center Class 3 switch Toll center Class 4 switch End Office Class 5 switch
Sectional center Class 2 switch Primary center Class 3 switch Toll center Class 4 switch End Office Class 5 switch
KKM-TSEC
Voice
Voice
KKM-TSEC
KKM-TSEC
Lecture 2
KKM-TSEC
Services are made available by the Common Management Information Service Element (CMISE) to allow management of network elements ===Management operation services=== * M-CREATE Create an instance of a managed object * M-DELETE Delete an instance of a managed object * M-GET Request managed object attributes (for one object or a set of objects) * M-CANCEL-GET Cancel an outstanding GET request * M-SET Set managed object attributes
* M-ACTION Request an action to be performed on a managed
KKM-TSEC
CMIS initially defined management association services but it was later decided these services could be provided by Association Control Service Element [[ACSE]] and these services were removed. Below is a list of these services which were subsequently removed from ISO 9595: * M-INITIALIZE Creates an association with (i.e. connects to) another CMISE * M-TERMINATE Terminates an established connection * M-ABORT Terminates the association in the case of an abnormal connection termination
KKM-TSEC
Application layer
The Internet protocol suite (TCP/IP) and the Open Systems Interconnection model (OSI model) of computer networking each specify a group of protocols and methods identified by the name application layer. In TCP/IP, the application layer contains all protocols and methods that fall into the realm of process-to-process communications across an Internet Protocol (IP) network. Application layer methods use the underlying transport layer protocols to establish host-to-host connections. In the OSI model, the definition of its application layer is narrower in scope, explicitly distinguishing additional functionality above the transport layer at two additional levels, the session layer and the presentation layer. OSI specifies strict modular separation of functionality at these layers and provides protocol implementations for each layer.
KKM-TSEC
The following protocols are explicitly mentioned in RFC 1123 (1989), describing the application layer of the Internet protocol suite.
Remote login category File transfer category Electronic mail category Support services category
RFC 1123
RFC is one of a pair that defines and discusses the requirements for Internet host software. This RFC covers the application and support protocols; its companion RFC-1122 covers the communication protocol layers: link layer, IP layer, and transport layer.
KKM-TSEC
KKM-TSEC
RFC 854
RFC 854 specifies a standard for the ARPA Internet community. Hosts on the Advanced Research Projects Agency (ARPA), Internet are expected to adopt and implement this standard.
KKM-TSEC
KKM-TSEC
KKM-TSEC
Electronic mail servers and other mail transfer agents use SMTP to send and receive mail messages, user-level client mail applications typically only use SMTP for sending messages to a mail server for relaying. For receiving messages, client applications usually use either the Post Office Protocol (POP) or the Internet Message Access Protocol (IMAP) or a proprietary system (such as Microsoft Exchange or Lotus Notes/Domino) to access their mail box accounts on a mail server.
KKM-TSEC
Email is submitted by a mail client (MUA, mail user agent) to a mail server (MSA, mail submission agent) using SMTP on TCP port 587. Most mailbox providers still allow submission on traditional port 25. From there, the MSA delivers the mail to its mail transfer agent (MTA, mail transfer agent). Often, these two agents are just different instances of the same software launched with different options on the same machine. Local processing can be done either on a single machine, or split among various appliances; in the former case, involved processes can share files; in the latter case, SMTP is used to transfer the message internally, with each host configured to use the next appliance as a smart host. Each process is an MTA in its own right; that is, an SMTP server.
services such
Simple Network Management Protocol (SNMP) Common Management Information Protocol (CMIP)
The Domain Name System (DNS) is a hierarchical distributed naming system for computers, services, or any resource connected to the Internet or a private network. It associates various information with domain names assigned to each of the participating entities. Most importantly, it translates domain names meaningful to humans into the numerical identifiers associated with networking equipment for the purpose of locating and addressing these devices worldwide.
KKM-TSEC
Reverse Address Resolution Protocol (RARP) is an obsolete computer networking protocol used by a host computer to request its Internet Protocol (IPv4) address from an administrative host, when it has available its Link Layer or hardware address, such as a MAC address. Bootstrap Protocol, or BOOTP, is a network protocol used by a network client to obtain an IP address from a configuration server. The BOOTP protocol was originally defined in RFC 951 Simple Network Management Protocol (SNMP) is an "Internet-standard protocol for managing devices on IP networks. Devices that typically support SNMP include routers, switches, servers, workstations, printers, modem racks, and more." The Internet protocol suite (TCP/IP) and the Open Systems Interconnection model (OSI model) of computer networking each specify a group of protocols and methods identified by the name application layer. In TCP/IP, the application layer contains all protocols and methods that fall into the realm of process-to-process communications across an Internet Protocol (IP) network. Application layer methods use the underlying transport layer protocols to establish host-to-host connections. In the OSI model, the definition of its application layer is narrower in scope, explicitly distinguishing additional functionality above the transport layer at two additional levels, the session layer and the presentation layer. OSI specifies strict modular separation of functionality at these layers and provides protocol implementations for each layer.
KKM-TSEC
Thanks
KKM-TSEC
Lecture 3
KKM-TSEC
CMISE-MODEL
Two Aspects Operations & Notifications Operations command interface to the manages resources. Notifications gets asynchronous reports from managed resources
Request
Managed Objects
Agent Performer
Invoker
Responses Operation Model
CMISE-MODEL (Contd)
Management Notifications is used for notifications initiated by the management system. A managed object represents the manageable properties of resource.
Acknowledgement
Managed Objects
Agent Invoker
Performer
Notifications Notification Model
Managed objects with the same properties are instances of a managed object Class Ex. Network element, log & Alarm record.
KKM-TSEC
CMISE MODEL
What is Invoker & performer. In operation Model Invoker role is assumed by a managing system & the performer role by the agent system. In notification model roles are reversed. First a request is issued by a managing system in the invoker role. The agent system in the performer role receives the request & the result of operation (success/error) is returned in the response. Performer side has two concepts 1. agent & set of managed objects. Each object that performs the request returns a response. Notifications are a remote operation invoked by the agent system. As a notification it may or may not be acknowledged hence dotted Lines are used.
KKM-TSEC
Service Definitions
Service
M-EVENT-REPORT M-GET M-SET
Type
CONFIRMED / UNCONFIRMED confirmed Confirmed / Un confirmed Confirmed / Un confirmed confirmed confirmed confirmed
Description
Report an occurrence of an event To another open system Retrieve attribute and their Values from managed objects Modify attributes values of managed objects Request an open system to perform An action on managed object
M-ACTION
M-CREATE M-DELETE M-CANCEL-GET
Request an open system to create a new Object (Only one instance /request) Request an open system to delete Managed objects. Request to cancel a previously Invoked M-GET service .
KKM-TSEC
ACSE
The Association Control Service Element (ACSE) is used to establish and release associations between application entities. Before any management operations can be performed using CMIP, it is necessary for the two application entities involved to form an association. Either the manager or the agent can initiate association establishment. ACSE allows the manager and agent to exchange application entity titles for the purpose of identification and application context names to establish an application context. An application context defines what service elements (for instance, ROSE and CMISE) may be used over the association. After the association is established, ACSE is not used again until the association is released by the manager or agent.
KKM-TSEC
ROSE
The Remote Operation Service Element (ROSE) is the ISO equivalent of remote procedure call. ROSE allows the invocation of an operation to be performed on a remote system. The Remote Operation protocol contains an invoke identifier for correlating requests and responses, an operation code, and an argument field for parameters specific to the operation. ROSE can only be invoked once an application association has been established. CMIP uses the transaction-oriented services provided by ROSE for all its requests and responses. CMIP also uses the error response facilities provided by ROSE.
KKM-TSEC
CMISE is a user of both ROSE and ACSE. The CMISE provides both confirmed and unconfirmed services for reporting events and retrieving and manipulating management data. These services are used by manager and agent application entities to exchange management information. Table below provides a list of the CMISE services. In addition, the CMISE also provides the ability to issue a series of (multiple) linked replies in response to a single request. Service M-INITIALISE | M-TERMINATE M-ABORT M-EVENT-REPORT M-GET M-SET M-ACTION M-CREATE M-DELETE Type confirmed confirmed | non-confirmed confirmed/non-confirmed confirmed confirmed/non-confirmed confirmed/non-confirmed confirmed confirmed
KKM-TSEC
KKM-TSEC
Tutorial-1 Define CMISE model & service definitions. Explain in detail management association services and information transfer services With the help of a diagram explain network management system based on the CMIP/CMIS:
KKM-TSEC
KKM-TSEC
The major advantages of CMIP over SNMP are: CMIP variables not only relay information, but also can be used to perform tasks. This is impossible under SNMP. CMIP is a safer system as it has built in security that supports authorization, access control, and security logs. CMIP provides powerful capabilities that allow management applications to accomplish more with a single request. CMIP provides better reporting of unusual network conditions Access to managed information in the managed objects is provided by the Common Management Information Service Element (CMISE) that uses CMIP (Common Management Information Protocol) to issue requests for management services. The management services provided by CMIP/CMISE can be organized into two distinct groups, management operation services initiated by a manager to request that an agent provide certain services or information, and notification services, used by the management agents to inform the managers that some event or set of events have occurred.
KKM-TSEC
Lecture -4
Rationale of INFORMATION MODELLING OF TMN Management of Information Model
KKM-TSEC
KKM-TSEC
KKM-TSEC
Modeling Requirements
Logical and Intuitive Representation of the Resources
The Managed Object Classes (MOCs) defined should present a view of the resources, their behavior, and the relationships between these resources that is logical and intuitive to a person who understands the resources themselves.
KKM-TSEC
KKM-TSEC
Specification Requirements
Completeness
All aspects of a managed object class that are necessary for communication across the interoperable interface must be specified. This includes specification of all "visible" attributes, operations, notifications, and especially, behaviors of the managed object class. If this is not done, different interpretations by different communicating parties may prevent or hinder interoperability.
Precision
Only one interpretation of a specification must be possible to ensure interoperability.
Reusability
Specifications and components of specifications must be reusable, to
encourage greater productivity and greater consistency.
KKM-TSEC
Testability
It must be possible to verify that a system correctly meets a specification. Where possible, it is desirable that these tests be standardized.
Abstractness
It is necessary, in some cases, to produce abstract specifications which are applicable to a wide variety of implementations.
Self-descriptiveness
Information Models are self-descriptive if a reader of the Managed Object Classes can easily understand why they have been designed, (i.e., MOCs should be well documented and have meaningful names for attributes and methods).
KKM-TSEC
Documentation Quality
Specifications are well documented if a person can easily access information about the specification design and capabilities, and if the information is understandable and complete. This is realized by the inclusion of relevant, informative comments about the reasons a particular part of the model has been included and/or text which provides a common sense meaning for technical terms.
KKM-TSEC
Thanks
KKM-TSEC
Lecture -5
Object Class Definition
KKM-TSEC
KKM-TSEC
KKM-TSEC