Level Of Management Protocols - SNMP Tutorial

30.2 The Level Of Management Protocols

  Originally, many wide area networks included management protocols as part of their link level protocols. If a packet switch began misbehaving, the network manager could instruct a neighboring packet switch to send it a special control packet. Control packets caused the receiver to suspend normal operation and respond to commands from the manager. The manager could interrogate the packet switch to identify problems, examine or change routes, test one of the communication interfaces, or reboot the switch. Once managers repaired the problem, they could instruct the switch to resume normal operations. Because management tools were part of the lowest level protocol, managers were often able to control switches even if higher level protocols failed.

  Unlike a homogeneous wide area network, a TCPm intemet does not have a single link level protocol. Instead, the internet consists of multiple physical networks interconnected by IP routers. As a result, internet management differs from network management. First, a single manager can control heterogeneous devices, including IP routers, bridges, modems, workstations, and printers. Second, the controlled entities may not share a common link level protocol. Third, the set of machines a manager controls may lie at arbitrary points in an internet. In particular, a manager may need to control one or more machines that do not attach to the same physical network as the manager‘s computer. Thus, it may not be possible for a manager to communicate with machines being controlled unless the management software uses protocols that provide end-to-end connectivity across an internet. As a consequence, the internet management protocol used with TCP/IP operates above the transport level:

  In a TCP/IP internet, a manager needs to examine and control routers and other network devices. Because such devices attach to arbitrary networks, protocols for internet management operate at the application level and communicate using TCP/IP transport-level protocols.

  Designing internet management software to operate at the application level has several advantages. Because the protocols can be designed without regard to the underlying network hardware, one set of protocols can be used for all networks. Because the protocols can be designed without regard to the hardware on the managed machine, the same protocols can be used for all managed devices. From a manager‘s point of view, having a single set of management protocols means uniformity -- routers respond to exactly the same set of commands. Furthermore, because the management software uses IPfor communication, a manager can control the routers across an entire TCP/IP internet without having direct attachment to every physical network or router.

  Of course, building management software at the application level also has disadvantages. Unless the operating system, IP software, and transport protocol software work correctly, the manager may not be able to contact a router that needs managing. For example, if a router‘s routing table becomes damaged, it may be impossible to correct the table or reboot the machine from a remote site. If the operating system on a router crashes, it will be impossible to reach the application program that implements the internet management protocols even if the router can still field hardware interrupts and route packets.

Abstract from Internetworking With TCP/IP Vol I: Principles, Protocols, and Architecture Fourth Edition,

DOUGLAS E. COMER,

Department of Computer Sciences Purdue University, West Lafayette, IN 47907,

PRENTICE HALL,

Upper Saddle River, New Jersey 07458

时间: 2024-12-28 19:05:45

Level Of Management Protocols - SNMP Tutorial的相关文章

Structure Of Management Information - SNMP Tutorial

30.6 The Structure Of Management Information In addition to the standards that specify MIB variables and their meanings, a separate standard specifies a set of rules used to define and identify MIB variables. The rules are known as the Structure of M

SNMP Tutorial

Applications: Internet Management (SNMP) 30.1 Introduction 30.2 The Level Of Management Protocols 30.3 Architectural Model 30.4 Protocol Framework 30.5 Examples of MIB Variables 30.6 The Structure Of Management Information 30.7 Formal Definitions Usi

Structure And Representation Of MIB Object Names - SNMP Tutorial

30.8 Structure And Representation Of MIB Object Names We said that ASN.1 specifies how to represent both data items and names. However, understanding the names used for MIBvariables requires us to know about the underlying namespace. Names used for M

Summary - SNMP Tutorial

30.13 Summary Network management protocols allow a manager to monitor and control routers and hosts. A network management client program executing on the manager's workstation contacts one or more servers, called agents, running on the devices to be

Protocol Framework - SNMP Tutorial

30.4 Protocol Framework TCP/IP network management protocols2 divide the management problem into two parts and specify separate standards for each part. The first part concerns communication of information. A protocol specifies how client software run

Examples of MIB Variables - SNMP Tutorial

30.5 Examples of MIB Variables Versions 1 and 2 of SNMP each collected variables together in a single large MIB, with the entire set documented in a single RFC. After publication of the second generation, MIB-II, the IETF took a different approach by

SNMP Message Format - SNMP Tutorial

30.10 SNMP Message Format Unlike most TCP/IP protocols, SNMP messages do not have fixed fields. Instead, they use the standard ASN.1 encoding. Thus, a message can be difficult for humans to decode and understand. After examining the SNMP message defi

Introduction - SNMP Tutorial

30.1 Introduction In addition to protocols that provide network level services and application programs that use those services, an internet needs software that allows managers to debug problems, control routing, and find computers that violate proto

Example: Encoded SNMP Message - SNMP Tutorial

30.11 Example Encoded SNMP Message The encoded form of ASN.1 uses variable-length fields to represent items. In general, each field begins with a header that specifies the type of object and its length in bytes. For example, each SEQUENCE begins with