3b716 nms 1

35
NETWORK MANAGEMENT NETWORK MANAGEMENT SYSTEM SYSTEM

Upload: vandana-jagdish

Post on 09-Aug-2015

70 views

Category:

Engineering


2 download

TRANSCRIPT

Page 1: 3b716 nms 1

NETWORK NETWORK MANAGEMENT SYSTEMMANAGEMENT SYSTEM

Page 2: 3b716 nms 1

NETWORK MANAGEMENT SYSTEMNETWORK MANAGEMENT SYSTEMFOCUS NM 2100 nmFOCUS NM 2100 nm

Focus NM 2100 Network Manager Software is Focus NM 2100 Network Manager Software is an open Telecommunication Management an open Telecommunication Management Network Programme capable of managing both Network Programme capable of managing both Telecommunication Networks as well as the Telecommunication Networks as well as the Telecommunication Equipments (Network Telecommunication Equipments (Network Elements) with in it. Elements) with in it.

Page 3: 3b716 nms 1

NETWORK MANAGEMENT NETWORK MANAGEMENT SYSTEM - PRODUCT VERSIONSYSTEM - PRODUCT VERSION

CHECK ‘FOCUS NM 2100 NM SOFTWARE CHECK ‘FOCUS NM 2100 NM SOFTWARE VERSION’ TO MAKE SURE THAT THIS VERSION’ TO MAKE SURE THAT THIS CORRESPONDS TO YOUR NETWORK. CORRESPONDS TO YOUR NETWORK.

Focus AC-1 – with Embedded Software Focus AC-1 – with Embedded Software Version 1.0, 2.0,3.0 and 4.8. Version 1.0, 2.0,3.0 and 4.8.

Focus AC-4 – with Embedded Software Focus AC-4 – with Embedded Software Version 2.0, 3.0, 4.0 and 4.8. Version 2.0, 3.0, 4.0 and 4.8.

Page 4: 3b716 nms 1

NETWORK MANAGEMENT NETWORK MANAGEMENT SYSTEMSSYSTEMS

TYPES: Three .TYPES: Three .

Local Craft Terminal (LCT) – NM 2100 ctLocal Craft Terminal (LCT) – NM 2100 ct Element Manager (EM) _ NM 2100 emElement Manager (EM) _ NM 2100 em Network Manager (NM) _ NM 2100 nmNetwork Manager (NM) _ NM 2100 nm

Page 5: 3b716 nms 1

ELEMENT MANAGERELEMENT MANAGERASSUMPTION MADE ABOUT YOUR ASSUMPTION MADE ABOUT YOUR

KNOWLEDGEKNOWLEDGE

Focus NM 2100 em Software is a window NT Focus NM 2100 em Software is a window NT based programme. Users of this software are based programme. Users of this software are assumed to have a basic knowledge of window assumed to have a basic knowledge of window based programme. based programme.

Page 6: 3b716 nms 1

MAIN MODULESMAIN MODULES IN IN

NETWORK & ELEMENT MANAGER NETWORK & ELEMENT MANAGER SOFTWARE SOFTWARE

Topology Manager ModuleTopology Manager Module Alarm Handler Module Alarm Handler Module Element Access Manager Module Element Access Manager Module

Page 7: 3b716 nms 1

TOPOLOGY MANAGER MODULETOPOLOGY MANAGER MODULE

This module manages all information about a This module manages all information about a

network topology.network topology. for example- the hierarchies and the regions for example- the hierarchies and the regions

in a network and the NEs contained within in a network and the NEs contained within them and maintains a data based with this them and maintains a data based with this information. information.

Page 8: 3b716 nms 1

ALARM HANDLER MODULEALARM HANDLER MODULE

Which manages the alarms received from all the Which manages the alarms received from all the NEs, and creates and maintains a database with NEs, and creates and maintains a database with this information. this information.

Page 9: 3b716 nms 1

ELEMENT ACCESS MANAGER MODULEELEMENT ACCESS MANAGER MODULE

Each module enables you to communicate Each module enables you to communicate with and thereby manage a particular type of with and thereby manage a particular type of NE in your network. An Element Access NE in your network. An Element Access Manager Module exist for each type of NE Manager Module exist for each type of NE that can be manage by Element Manager that can be manage by Element Manager Software. Software.

Element Access Manager Modules may exists Element Access Manager Modules may exists in several versions. Each version is capable of in several versions. Each version is capable of managing NEs running a specific version of managing NEs running a specific version of embedded softwareembedded software

Page 10: 3b716 nms 1

Focus NM 2100 ct - CRAFT Focus NM 2100 ct - CRAFT TERMINAL SOFTWARETERMINAL SOFTWARE

Works on a windows NT based platform. Works on a windows NT based platform.

It is normally run on a personal computer & is It is normally run on a personal computer & is used by installation, services & maintenance used by installation, services & maintenance personnel to directly access configuration, personnel to directly access configuration, performance & alarms data for one NE at a performance & alarms data for one NE at a time during the commissioning & then time during the commissioning & then subsequent service & maintenance of NEs. subsequent service & maintenance of NEs.

Page 11: 3b716 nms 1

Focus NM 2100 em- ELEMENT Focus NM 2100 em- ELEMENT MANAGER SOFTWAREMANAGER SOFTWARE

Works on a window NT based platform.Works on a window NT based platform. A Telecommunication N/W managed by this A Telecommunication N/W managed by this

software can be configured as a fully software can be configured as a fully distributed multi user system working on a distributed multi user system working on a number of computers that appear to work as a number of computers that appear to work as a single computer. single computer.

The software enables constant surveillance & The software enables constant surveillance & continuous management of all N/W element in continuous management of all N/W element in a N/W. It provides element management , alarm a N/W. It provides element management , alarm handling & access on line help. handling & access on line help.

Page 12: 3b716 nms 1

Focus NM 2100 nm- NETWORK Focus NM 2100 nm- NETWORK MANAGEMENT SYSTEM SOFTWAREMANAGEMENT SYSTEM SOFTWARE

Focus NM 2100 nm Network Management Focus NM 2100 nm Network Management Software, it works on a Software, it works on a UnixUnix platformplatform. This . This product is capable of managing thousands of product is capable of managing thousands of NEs. It provides a number of basic NEs. It provides a number of basic management services. It enables you to setup management services. It enables you to setup trails & optimize choices of trails without trails & optimize choices of trails without having to perform manual operations on having to perform manual operations on individual transmission Equipment. Provides individual transmission Equipment. Provides advanced N/W management functions. advanced N/W management functions.

Page 13: 3b716 nms 1
Page 14: 3b716 nms 1
Page 15: 3b716 nms 1
Page 16: 3b716 nms 1
Page 17: 3b716 nms 1
Page 18: 3b716 nms 1
Page 19: 3b716 nms 1
Page 20: 3b716 nms 1

The following points shall be discussed:The following points shall be discussed: What is Network Management.What is Network Management. A historical Perspective.A historical Perspective. Network Management Architecture.Network Management Architecture. ISO Network Management Model.ISO Network Management Model. Performance Management.Performance Management. Configuration Management.Configuration Management. Fault Management.Fault Management. Accounting Management.Accounting Management. Security Management.Security Management.

NETWORK MANAGEMENT SYSTEM

Page 21: 3b716 nms 1

NETWORK MANAGEMENT SYSTEMNETWORK MANAGEMENT SYSTEM It means different things to different people. In some It means different things to different people. In some

cases it involves a solitary network consultant cases it involves a solitary network consultant Monitoring activity with an outdated Protocol Monitoring activity with an outdated Protocol Analyzer.Analyzer.

In other cases NMS involves a distributed Data Base, In other cases NMS involves a distributed Data Base, Auto polling of N/W devices and high end work Auto polling of N/W devices and high end work station, Generating real time Graphical view of N/W station, Generating real time Graphical view of N/W Topology changes and traffic.Topology changes and traffic.

NMS in general is a service that employs a variety of NMS in general is a service that employs a variety of tools, applications and devices to assist human tools, applications and devices to assist human Network Managers in monitoring and maintaining the Network Managers in monitoring and maintaining the N/W.N/W.

Page 22: 3b716 nms 1

HISTORICAL PERSPECTIVEHISTORICAL PERSPECTIVE The early 80,s saw tremendous expansion in The early 80,s saw tremendous expansion in

the area of Network deployment.the area of Network deployment. As companies realized the cost benefits and As companies realized the cost benefits and

Productivity gains created by N/W topology.Productivity gains created by N/W topology. They began to add N/Ws and expand the They began to add N/Ws and expand the

existing networks almost as rapidly as new existing networks almost as rapidly as new N/W topologies and Products were introduced.N/W topologies and Products were introduced.

By mid 80,s certain companies were By mid 80,s certain companies were experiencing growing pains from deploying experiencing growing pains from deploying many different and some times incompatible many different and some times incompatible N/W technologies.N/W technologies.

Page 23: 3b716 nms 1

HISTORICAL PERSPECTIVEHISTORICAL PERSPECTIVE The problem associated with N/W expansion effect The problem associated with N/W expansion effect

both Day to Day N/W operation management and both Day to Day N/W operation management and Strategic N/W growth planning.Strategic N/W growth planning.

Each new technology required its own set of experts.Each new technology required its own set of experts. Early 80”s, the requirement was of Managers, who Early 80”s, the requirement was of Managers, who

could manage large heterogeneous networks.could manage large heterogeneous networks. But it created crisis for many organizations .But it created crisis for many organizations . The urgent need was for automated network The urgent need was for automated network

management (including what is typically called management (including what is typically called network capacity planning which is integrated across network capacity planning which is integrated across diverse environments.diverse environments.

Page 24: 3b716 nms 1

NMS ARCHITECTURENMS ARCHITECTURE The most Network Management Architecture use the The most Network Management Architecture use the

same basic structure and a set of relationships.same basic structure and a set of relationships. End stations (Managed devices) such as computer End stations (Managed devices) such as computer

system and other N/W devices, run software that system and other N/W devices, run software that enables them to send alerts when they recognize enables them to send alerts when they recognize problems (for example when one or more user problems (for example when one or more user determined thresholds are exceeded.)determined thresholds are exceeded.)

Upon receiving these alerts, management entities are Upon receiving these alerts, management entities are programmed to react by executing one, several or a programmed to react by executing one, several or a group of stations, including operator notification, group of stations, including operator notification, event logging, system shut down and automatic event logging, system shut down and automatic attempts at system repair.attempts at system repair.

Page 25: 3b716 nms 1

Cont-Cont- Management entities can also poll end stations to Management entities can also poll end stations to

check the values of certain variables.check the values of certain variables. Polling can be automatic or user initiated, but Agents Polling can be automatic or user initiated, but Agents

in the managed devices respond to all polls.in the managed devices respond to all polls. Agents are software modules that first compile Agents are software modules that first compile

information about the managed devices in which they information about the managed devices in which they reside, then store this information in a management reside, then store this information in a management Data Base and finally provide it to management Data Base and finally provide it to management entities within NMS via a Network Management entities within NMS via a Network Management Protocol.Protocol.

A well known Network Management Protocols A well known Network Management Protocols include the Simple Network Management Protocol include the Simple Network Management Protocol (SNMP) and Common Information Protocol (CMIP)(SNMP) and Common Information Protocol (CMIP)

Page 26: 3b716 nms 1

PERFORMANCE MANAGEMENTPERFORMANCE MANAGEMENT The Goal of Performance Management is to measure The Goal of Performance Management is to measure

and make available various aspects of network and make available various aspects of network performance, so that interwork Performance can be performance, so that interwork Performance can be maintained at an acceptable level.maintained at an acceptable level.

Examples of performance variables that might be Examples of performance variables that might be provided include network throughput, user response provided include network throughput, user response times and line utilization.times and line utilization.

Three main steps of Performance Management :Three main steps of Performance Management : Performance Data is gathered on variables of interest Performance Data is gathered on variables of interest

to Network Administrators.to Network Administrators. Data is analyzed to determine the normal levels.Data is analyzed to determine the normal levels. Appropriate performance thresholds are determined Appropriate performance thresholds are determined

to each important variables, so that exceeding theseto each important variables, so that exceeding these

Page 27: 3b716 nms 1

Thresholds indicate a N/W problem worthy of Thresholds indicate a N/W problem worthy of attention.attention.

Management System continually monitor Management System continually monitor performance variables.performance variables.

When the performance threshold is exceeded an alert When the performance threshold is exceeded an alert is generated and sent to the NMS.is generated and sent to the NMS.

When Performance becomes unacceptable because of When Performance becomes unacceptable because of the user defined threshold, the system reacts by the user defined threshold, the system reacts by sending a message.sending a message.

Performance Management permits the pro-active Performance Management permits the pro-active methods.methods.

Network simulation can be used to project how N/W Network simulation can be used to project how N/W

Page 28: 3b716 nms 1

Growth will effect performance metrics.Growth will effect performance metrics. Such simulation can alert administration to impending Such simulation can alert administration to impending

problems, so that counter active measures can be taken.problems, so that counter active measures can be taken.

CONFIGURATION MANAGEMENTCONFIGURATION MANAGEMENT The Goal of Configuration Management is to monitor The Goal of Configuration Management is to monitor

network and system configuration information. So that network and system configuration information. So that the effects on N/W operation of various versions of the effects on N/W operation of various versions of hardware and software elements can be tracked and hardware and software elements can be tracked and managed.managed.

Each N/W device has a variety of version information Each N/W device has a variety of version information associated with it.associated with it.

Page 29: 3b716 nms 1

The Engineering work station- for example can be The Engineering work station- for example can be configured as follows:configured as follows:

Operating System version 3.2Operating System version 3.2 Ethernet Interface version 5.4Ethernet Interface version 5.4 TCP/IP Software V 2.0TCP/IP Software V 2.0 N/W Software V 4.1N/W Software V 4.1 NFS Software V 5.1NFS Software V 5.1 Serial Communication Controller V 1.1Serial Communication Controller V 1.1 X.25 Software V 1.0X.25 Software V 1.0 SNMP Software V 3.1SNMP Software V 3.1 Configuration Management store this information in Configuration Management store this information in

a Data Base. This Data Base can be searched for a Data Base. This Data Base can be searched for clues when the problem occurs. clues when the problem occurs.

Page 30: 3b716 nms 1

ACCOUNTING MANAGEMENTACCOUNTING MANAGEMENT The Goal of this management is to measure N/W The Goal of this management is to measure N/W

utilization Parameters, so that the individuals or group utilization Parameters, so that the individuals or group uses of the N/W can be regulated appropriately.uses of the N/W can be regulated appropriately.

Such regulations minimize the N/W problems and Such regulations minimize the N/W problems and maximizes the fairness of network access across all maximizes the fairness of network access across all users.users.

The first step towards appropriate Accounting The first step towards appropriate Accounting Management is to measure the utilization of all Management is to measure the utilization of all important N/W resources.important N/W resources.

Analysis of the results provides insight into current Analysis of the results provides insight into current usage patterns and usage Quota can be set at this point.usage patterns and usage Quota can be set at this point.

Some correction will be required to reach optional Some correction will be required to reach optional access practice. access practice.

Page 31: 3b716 nms 1

From this point ongoing measurement of resources use From this point ongoing measurement of resources use can yield billing information as well as information used can yield billing information as well as information used to access continued fair and optional resource utilization.to access continued fair and optional resource utilization.

FAULT MANAGEMENTFAULT MANAGEMENT The Goal of Fault Management is to- Detect, Log & The Goal of Fault Management is to- Detect, Log &

Notify users of and (to the extent possible) Notify users of and (to the extent possible) automatically fix N/W Problems to keep the N/W automatically fix N/W Problems to keep the N/W running effectively.running effectively.

The fault can cause downtime or degradation of the N/W The fault can cause downtime or degradation of the N/W which will be un-acceptable.which will be un-acceptable.

Fault Management is perhaps the most widely Fault Management is perhaps the most widely implemented of the ISO Network Management implemented of the ISO Network Management Elements.Elements.

Page 32: 3b716 nms 1

Fault Management involves first determining Fault Management involves first determining Symptoms and Isolating the problems. Symptoms and Isolating the problems.

Finally the Detection and Resolution of the Problems Finally the Detection and Resolution of the Problems is recorded.is recorded.

SECURITY MANAGEMENTSECURITY MANAGEMENT The Goal of Security Management is to control The Goal of Security Management is to control

access to N/W resources keeping in view the local access to N/W resources keeping in view the local guidelines, so that the N/W is not sabotaged guidelines, so that the N/W is not sabotaged intentionally or un-intentionally and sensitive intentionally or un-intentionally and sensitive information can not be accessed by thos with out information can not be accessed by thos with out proper authorization.proper authorization.

Security Management subsystem can monitor userSecurity Management subsystem can monitor user

Page 33: 3b716 nms 1

Logging on to a N/W resource and can refuse access Logging on to a N/W resource and can refuse access to those who enter inappropriate access CODES.to those who enter inappropriate access CODES.

We partition the N/W into authorized and un-We partition the N/W into authorized and un-authorized areas.authorized areas.

Because for some users access to any N/W resource is Because for some users access to any N/W resource is inappropriate, mostly because such users are mostly inappropriate, mostly because such users are mostly company outsiders.company outsiders.

For others (Internal N/W Users) access to information For others (Internal N/W Users) access to information originating from a particular department is originating from a particular department is inappropriate.inappropriate.

Access to human resource files for example is in Access to human resource files for example is in appropriate for most users outside the Human appropriate for most users outside the Human Resource Department.Resource Department.

Page 34: 3b716 nms 1

Security Management Sub-System perform several Security Management Sub-System perform several functions.functions.

They identify sensitive N/W resource including They identify sensitive N/W resource including systems, files and other entities and determine systems, files and other entities and determine mapping between Sensitive N/W Resources and user mapping between Sensitive N/W Resources and user sets.sets.

They also monitor access points to sensitive network They also monitor access points to sensitive network resources.resources.

Page 35: 3b716 nms 1