Architecture of Network Management Tools for Heterogeneous System

Architecture of Network Management Tools for Heterogeneous System

(IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009 Architecture of Network Management Tools for Heterogeneous System Rosilah Hassan, Rozilawati Razali, Shima Mohseni, Ola Mohamad and Zahian Ismail Department of Computer Science, Faculty of Information Science and Technology Universiti Kebangsaan Malaysia, Bangi, Selangor, Malaysia . Human: where human manager defines the policy and organization approaches. Abstract— Managing heterogeneous network systems is Methodology: defines the architectural a difficult task because each of these networks has its own curious management system. These networks framework and the functions to be usually are constructed on independent management performed. protocols which are not compatible with each other. Instrumentation: the actual operational This results in the coexistence of many management aspects that establish the procedures, systems with different managing functions and services methods and algorithms for data collection, across enterprises. Incompatibility of different processing and reporting, and analysis of management systems makes management of whole problems, their repair, prediction or system a very complex and often complicated job. forecasting of service levels and probable Ideally, it is necessary to implement centralized meta- level management across distributed heterogeneous improvements to enhance performance. systems and their underlying supporting network systems where the information flow and guidance is S&NM aims to provide network managers a provided via a single console or single operating panels complete view of the whole network through a which integrates all the management functions in spite visualized Network Management Tool (NMT). The of their individual protocols and structures. This paper International Organization for Standards (ISO) [1] attempts to provide a novel network management tool has categorized five main management functions that architecture which supports heterogeneous can be managed by such tools: Fault, Configuration, managements across many different architectural Accounting, Performance, and Security (FCAPS), as platforms. Furthermore, an architectural approach to integrate heterogeneous network is proposed. This simplified in Table 1. architecture takes into account both wireless fixed and To illustrate how these functions are interrelated, mobile nodes. an example of simple S&NM applications is shown in Fig. 1. It can be seen that a user interface is used to Keywords-component; Network Tools Architecture; manage the functions, which are originated from Services Management; Heterogeneous System; various software, hardware, firmware, and end-users. Most of the existing S&NM systems are developed I. INTRODUCTION in an individual fashion, where each system is System and Network Management (S&NM) is designed to operate within its own defined area or concerned with observing, monitoring, testing, scope.s This creates a number of incompatibilities configuring, and troubleshooting the different and lack of integration does not allow a common network components, services, systems and users. view of the system and networks to be managed. The management process wraps all the network Also, this causes lack of data flows between these system elements starting from the end-users, through incompatible systems, resulting in inconsistencies of the applications and supporting data, the end data, event correlation and maintenance of the system’s network connectivity edge and deep into the different data bases. It may also cause many systems network infrastructures themselves. Typically, with low level of inter and intra communications S&NM comprises the following aspects: among them. 31 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009 TABLE I. ISO SPECIFIED FCAPS FUNCTIONS Following are the most used protocols in network Category of Task management systems: Management Fault Management Recognizing problem situation, Simple Network Management Protocol. (FM) isolating the problem to the Telecommunication Management Network. source, Providing notification to Fault, Configuration, Accounting, the appropriate person, and tracking problems through Performance, and Security (FCAPS) resolution A. Simple Network Management Protocol Configuration Management Controlling the health of network (CM) by keeping regular scheduled configuration back ups and having Simple Network Management Protocol (SNMP) is careful controlled implementation an Internet Engineering Task Force (IETF) de facto and also changing the procedures standard known as Requests For Commands (RFC) Accounting Management Measuring the usage statistics and [2]. SNMP is a framework for managing Internet (AM) allocation of costs associated with devices or network elements using the TCP/IP billing for time and services protocol suite [3]. The SNMP management model contains a management station. The actual Performance Management Concerned with gathering management process takes place in this management (PM) network and system statistics station. Other managed devices and available including utilization, errors, network peripherals communicate via a network response time are valuable tools in network trends management agent embedded inside the device with management station. The SNMP model of a managed network consists of four components: Managed Security management Controlling access rights, usually nodes (Agent), Network Management stations (SM) network infrastructure and access to network hardware components (NMS), Managed information (MIB), and a management protocol (SNMP), as shown in Fig. 2. The manager and managed agent style is used in SNMP where the manager monitors a group of agents. The dialogue relationship between manager and agent is shown in Fig. 3. A manager can check the agent behavior through a set of parameters; also it can force agent to behave in a certain way by resetting value of those parameters. Agents can send Network management Application all or correlated alarms to the manager of any faulty situation. Different network managers can exchange User Interface information about each other’s networks using SNMP. SNMP works in cooperation with a Structure of Management Information (SMI) and Management Information Base (MIB), as well as the underlying supporting S&NM protocol suite. SMI is responsible for defining the general rules for naming objects Fault Configuration Accounting performance Security (hardware and system, non-physical such as management management management management management programs, and administrative information), defining objects types, and show how to encode objects and values [4]. MIB is a conceptual database that can be distributed on different sites or assembled in a single location. It creates the objects needed and names Hardware Software Firmware Users them according to SMI rules. Then, it assigns them to their proper object types. For each entity such as a Network componants device, a set of defined objects will be created and kept in the database. Fig. 4 shows the ISO MIB that Figure 1. Network management application components consists of the data which reflect the FCAPS that are requested by different network management architectures. 32 http://sites.google.com/site/ijcsis/ ISSN 1947-5500 (IJCSIS) International Journal of Computer Science and Information Security, Vol. 6, No. 3, 2009 NMS B. Telecommunication Management Network Managing Agent entity data The Telecommunication Management Network Managed node (TMN) was defined by the International Telecommunication Union – Telecommunication Agent Standardization Sector (ITU-T) [5]. It is a framework SNMP data to achieve communication between heterogeneous protocol Managed node telecommunication networks. TMN defines a standard interface for network elements that handle Agent the communication process. In this way, network Agent data data elements can be managed by a single network Managed node management system regardless of their different Managed node manufacturers. The framework identifies four logical layers of network management [5]: Figure 2. SNMP management model components Network Management Layer (NML): Enables telecom operators to perform integrated fault management and service provisioning in multi- vendor multi-platform environments. Request for information Service Management Layer (SML): is where Telecom operators have sought to differentiate s r Reply to manager request e g t a themselves by purchasing numerous applications r n n e e a g g a m A n for managing service usage, activation and s a k r M Reseat parameters values o w assurance. t e N r e Element Management Layer (EML): Contains h t Unusual situation alarm O individual network elements handling functions. Enables capabilities related to network monitoring, inventory management, service NM information exchange assurance, and network provisioning. Business Management Layer (BML): Performs functions related to business aspects, analyzes trends and quality issues provide a basis for Figure 3. Manager Agent Request Response Exchange Protocol billing and other financial reports. Operations System Service Helpdesk Telecommunications technology architectures are Manager Planer Engineer Manager typically expressed in a more simplified palette using the TMN model in Fig. 5. L M B MIB SML NML EML Configuration Security Accounting Perfomance Fault subsystem NEL subsystem subsystem subsystem subsystem

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    10 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us