+ All Categories
Home > Documents > Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Date post: 12-Jan-2016
Category:
Upload: jeffry-short
View: 223 times
Download: 4 times
Share this document with a friend
38
Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management
Transcript
Page 1: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 1

15-441 Computer Networking

Network Management

Page 2: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 2

Introduction

We have spent a lot of time on network protocols This lecture is about network What come to your mind when you think of

networks? - Devices (switches, routers, repeaters)

- Links (WiFi, Sonet, Ethernet, T1 etc)

- Interface cards

- Topology

Page 3: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 3

What Does a “Device” Look Like?

Fan and Filter Trays

Fan Tray

Power Modules

Switching Shelf Area

Port CardsFabric cardsSCPs

Page 4: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 4Network Architecture 4

Switching Shelf Components

SCP

Switching Fabric

Port Cards

Page 5: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 5Network Architecture 5

Switch Control Processor (SCP)

RS-232 serial port

NMI / RESET buttons

Power LEDs

Ethernet port

NEXT / SELECT buttons

Display LED

System LEDs

Page 6: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 6

Logical Diagram of the Switch

1A/B

1C/D

1 A

1 B

1 2 3 4 5 6

2A/B

2C/D

Fab

ric

#1

Fab

ric

#2

7 8 9 10 11 12 13 14Physical Slots

SCP X SCP Y

Fab

ric

#3

Fab

ric

#4

3A/B

3C/D

4A/B

4C/D

4 C

4 D

1

2

3

4

Page 7: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 7

Maybe you’ve asked, “How do you keep track of it all?”...

Document, document,

document…

Documentation

Page 8: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 8

Basics, such as documenting your switches...- What is each port connected to?- Can be simple text file with one line for every port in a

switch:• health-switch1, port 1, Room 29 – Director’s office

• health-switch1, port 2, Room 43 – Receptionist

• health-switch1, port 3, Room 100 – Classroom

• health-switch1, port 4, Room 105 – Professors Office

• …..

• health-switch1, port 25, uplink to health-backbone

- This information might be available to your network staff, help desk staff, via a wiki, software interface, etc.

- Remember to label your ports!

Documentation

Page 9: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 9

Nice…

Documentation: Labeling

Page 10: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 10

Example Backbone Network Architecture

EdgeRouter

EdgeRouter

EdgeRouter

EdgeRouter

Back-bone

Router

Back-bone

Router

Back-bone

Router

Back-bone

Router

ATM

EdgeSwitch

EdgeSwitch

EdgeSwitch

EdgeSwitch

EdgeSwitch

EdgeSwitch

EdgeSwitch

EdgeSwitch

Page 11: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 11

Why Multiple Types of Devices?

Core routers are much more expensive than edge routers A router port is much more expensive than a switch port How to achieve the same network goal by minimizing the

number of expensive devices? - Edge switches aggregate traffic to share edge router access port

- Core switches reduce # of core router ports and still achieve a fully logically connected mesh

- Edge routers hold less # number of routes than core routers

Page 12: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 12Network Architecture 12

Page 13: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 13

Management Network

• A completely separate network from “production” network that provides a means of monitoring and controlling “production” network without using it.

• A “backdoor” to all network devices• Serial Connections (T1’s)• Ethernet (Telnet directly to device)• Console (Telnet through MC router)

Page 14: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 14

Management Network

UUNETFairfax(FFX)

WILPAKWCOMFRAMERELAY

MT1 (7204)S2

S1

2001

Dialup Modem Hub Phone #

HUB1

MC1 (3640)

HUB2

MC1 (3640)

HUB3

S3

Page 15: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 15

Network Management Example

A typical problem- people are complaining that Netflix performance was bad last night

Where do you begin?-Where is the problem?

-What is the problem?

-What is the solution?

You may have different perspectives depending on who you are

-Netflix engineer

-Comcast engineer

-A user a home

Page 16: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 16

Where to Start?

With proper management tools and procedures in place, you may already have the answer

Consider some possibilities 1. What configuration changes were made overnight? 2. Have you received a device fault notification indicating the

issue? 3. Have you detected a security breach? 4. Has your performance baseline predicted this behavior on

an increasingly congested network link?

Page 17: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 17

An accurate database of your network’s topology, configuration, and performance

A solid understanding of the protocols and models used in communication between your management server and the managed devices

Methods and tools that allow you to interpret and act upon gathered information

What Do You Need?

Page 18: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 18

FCAPS: Five Areas of Network Management

Fault management Configuration management Accounting management Performance management Security management

Page 19: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 19

Fault Management

When a fault occurs- Determine “exactly” where the fault is

- Isolate the rest of the network from the failure

- Reconfigure or modify the network to minimize the impact of operation

- Repair or replace the failed components

Page 20: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 20

Configuration Management

Configuration management is concerned with - Initializing a network

- Gracefully shutting down part or all of the network

- Maintaining, adding, and updating the relationships among components and the status of components themselves during network operation

Page 21: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 21

Accounting Management

Network managers track the use of network resources by end user or end-user class

- An end user or group of end users may be abusing its access privileges and burdening the network at the expense of other users

- End users may be making inefficient use of the network, and network manager can assist in changing procedures to improve performance

- The network manager is easier to plan for network growth if end user activity is known in sufficient detail

Page 22: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 22

Performance Management

What is the level of capacity utilization? Is there excessive traffic? Has throughput been reduced to unacceptable

levels? Are there bottlenecks? Is response time increasing?

Page 23: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 23

Security Management

Managing information protection, and access control facilities

- Generating, distributing and storing encryption keys

- Passwords, authorization or access control information must be maintained and distributed

Monitoring and controlling access to computer networks and to all or part of the network management information

- SM involves with the collection, storage, and examination of audit records and security logs

- the enabling and disabling of these logging facilities

Page 24: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 24

Differences of Network Management from Network Control

Human operator as the user of the network management Stable storage is the fundamental building blocks for network management

- Configuration files

- Log files or databases

• What to measure and then log?

• What granularity?

• How much overhead?

Page 25: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 25

Simple Network Management Protocol (SNMP)

A set of standards for network management- a protocol

- a data base schema or structure specification

- a set of data objects

• throughput, pkt counts, errors, CPU load, temperature, ..

for multi-vender, interoperable network management- used across a broad spectrum of device types: end

systems, bridges, switches, routers and telecommunications equipment

- TCP/IP based

Hundreds of tools built on top of SNMP protocol

Page 26: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 26

Network Management Systems (NMS)

NMS is a collection of tools for network monitoring and control

- Designed to view the entire network as a unified architecture• addresses and labels assigned to each point

• specific attributes of each element and link known to the system

- Single operator interface with a powerful but user-friendly set of commands

- a minimal amount of separate equipment (hardware/software) is necessary

• NMS software resides in the host computers and communications processors (bridges, routers)

Page 27: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 27

Unifieduser

Interface

Presentation of network managementInformation to users

MIBaccessmodule

Communicationsprotocol

stack

NetworkManagementapplication

NetworkManagementapplication

Applicationelement

Applicationelement

Applicationelement

Network management data transport service

. . .

. . .

NetworkManagementapplication

NetworkManagementapplication

Applicationelement

Applicationelement

Applicationelement

Network management data transport service

. . .

. . .

Unifieduser

Interface

Presentation of network managementInformation to users

MIBaccessmodule

Communicationsprotocol

stack

NetworkManagementapplication

NetworkManagementapplication

Applicationelement

Applicationelement

Applicationelement

Network management data transport service

. . .

. . .

NetworkManagementapplication

NetworkManagementapplication

Applicationelement

Applicationelement

Applicationelement

Network management data transport service

. . .

. . .

Managementinformation

base

Managed networks

Unifieduser

Interface

Presentation of network managementInformation to users

MIBaccessmodule

Communicationsprotocol

stack

NetworkManagementapplication

NetworkManagementapplication

Applicationelement

Applicationelement

Applicationelement

Network management data transport service

. . .

. . .

NetworkManagementapplication

NetworkManagementapplication

Applicationelement

Applicationelement

Applicationelement

Network management data transport service

. . .

. . .

Unifieduser

Interface

Presentation of network managementInformation to users

MIBaccessmodule

Communicationsprotocol

stack

NetworkManagementapplication

NetworkManagementapplication

Applicationelement

Applicationelement

Applicationelement

Network management data transport service

. . .

. . .

NetworkManagementapplication

NetworkManagementapplication

Applicationelement

Applicationelement

Applicationelement

Network management data transport service

. . .

. . .

Managementinformation

base

Managed networksManaged networks

Architectural model of NMS

Page 28: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 28

Network Monitoring

Course grain monitoring - Counters as aggregate statistics

• # of packets on a link

• # of bytes on a link

• # errors on a link

- Keep packet-level statistics

- Used in SNMP

Fine grain monitoring - Exam (and potentially log) each packet and its timing

- Challenge to control the overhead

• Hard to store, transfer, and process every packet over the entire duration of network operation

- Various techniques have been invented

Page 29: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 29

Flow Monitoring

Flow monitoring (e.g., Cisco Netflow)- Statistics about groups of related packets (e.g., same

IP/TCP headers and close in time)

- Recording header information, counts, and time

More detail than SNMP, less overhead than every packet capture

Page 30: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 30

Cisco Netflow

Basic output: “Flow record”- Most common version is v5- Latest version is v10 (RFC 3917)

Current version (10) is being standardized in the IETF (template-based)

- More flexible record format- Much easier to add new flow record types

Collection and Aggregation

Collector

(PC)

Approximately 1500 bytes20-50 flow records

Sent more frequently if traffic increases Silde Courtesy of Nick Feamster

Page 31: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 31

Flow Record Contents

Source and Destination, IP address and port Packet and byte counts Start and end times ToS, TCP flags

Basic information about the flow…

…plus, information related to routing• Next-hop IP address

• Source and destination AS• Source and destination prefix

Silde Courtesy of Nick Feamster

Page 32: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 32

Sampled Netflow

Packet sampling before flow creation - 1-out-of-m sampling of individual packets (e.g., m=100)

- Create of flow records over the sampled packets

Reducing overhead- Avoid per-packet overhead on (m-1)/m packets

Accuracy? - Missing many of the small flows

Page 33: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 33

Sampled Netflow

1613111

Flow reports1

11316111131611

12

Sample packets at random, aggregate into flows

FlowId CounterFlow = Packets with same patternSource and Destination Address and Ports

Estimate: FSD, Entropy, Heavyhitters, Changes, SuperSpreaders ….

Page 34: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 34

Hash-Based Flow Sampling

1613111

Flow memory(flow, counter #pkts)

3

[3,10]Hash range

6

Pick flows at random; not biased by flow sizeGood for “communication” patterns

1131611

Compute hash, log if in range

Version IHL TOS LengthIdentification Flags Offset

TTL Protocol ChecksumSource IP address

Destination IP address ……

SourcePort DestinationPort

Hash

Flowid [0,Max]

1131611

Pa

cke

t hea

der

1

1

Page 35: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 35

Sample and Hold

1613111

Flow memory

(flow, #pkts)1

6

Accurate counts of large flowsGood for “volume” queries

1131611

AlgorithmIf flow is already logged updateSample packet with probability p

If new flow create counter

1131611

1

1

234

Page 36: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 36

What do network operators care about?

Network Operations

Center

Applications

Flow reports

21

3

12

12

12 Respect resource constraints

High flow coverage

Provide network-wide goals

Low data mgmt overhead

flow = same src-dst, ports, protoflow report = flow + pkt/byte counters

Page 37: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 3737

Not A Solved Problem

Routers cannot record every packet/flow- Constraints: CPU, Memory, Bandwidth

Resource constraints don’t go away!- Network demands scale even as routers become more

powerful

Page 38: Hui Zhang, Fall 2012 1 15-441 Computer Networking Network Management.

Hui Zhang, Fall 2012 3838

Summary of Key Concepts

Two keywords in network management- Network: not just the protocols

- Management: human being has goals to achieve

First step in network management - Modeling and documenting all details of the network

Key difference from network control- Files and databases are fundamental building blocks

Five key areas of network management- FCAPS

SNMP and Netflow are just starting points Many challenges remain

- Opex dominates Capex

- More scientific/systematic approach needed


Recommended