Network Management Protocol Overview

network management week 11 n.w
1 / 17
Embed
Share

Explore the role of protocols like Syslog and Netconf in network management, understanding their deployment, message exchange, configuration management capabilities, and operational functions.

  • Network Management
  • Protocol Management
  • Syslog
  • Netconf
  • Configuration

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Network Management week 11 PROTOCOL PROTOCOL MANAGEMENT MANAGEMENT Aisyatul Karima, 2015

  2. Outline Syslog Netconf Netflow IPFIX

  3. Syslog propose : to write the system message on log Syslog design similarity with CLI Part of syslog : Header Message body

  4. Example syslog

  5. Syslog protocol Syslog message

  6. Syslog deployment Two roles are distinguished with respect to the systems that are involved in the exchange of syslog messages: The syslog sender sends the syslog messages. The syslog receiver is the recipient of syslog messages.

  7. Netconf Netconf is one such management protocol. It is geared specifically toward managing the configuration of data- networking devices. Netconf is best positioned in the configuration management space, it can fill the void left by SNMP, as explained earlier, and by CLI, It is geared more to human users It is not easily accessible to management applications.

  8. Netconf Datastore As a protocol, Netconf provides the operations that are necessary to manage those datastores. For example, Netconf offers operations that allow a manager to change the contents of what a particular datastore contains

  9. Netconf Architecture

  10. Netconf Operation Netconf offers the following management operations : Get-config Get Edit-config Copy-config Delete-config Lock and unlock

  11. In addition to those management operations, Netconf offers two operations to terminate a Netconf session: close session is the graceful variant that allows operations that are already in progress to end before the session is torn down, whereas kill-session aborts the session abruptly.

  12. Netflow Netflowwas first introduced by Cisco and is geared toward collecting data about networking traffic from a device. You can use this data to answer questions such as the following: Who are the top talkers in the network ? How much traffic is being exchanged between two destinations? How are links in the network being used? Where are the traffic bottlenecks in the network

  13. IPFlows Netflow communicates statistical information about IP-based data traffic that flows over a router A flow is uniquely identified by the following pieces of information (in database parlance, they would be considered keys): Source address Source port Destination address Destination port Protocol type (for example, whether the IP packet carries TCP or UDP) Type of Service (TOS) byte (a byte in IP that identifies the type of service, used to differentiate different categories of traffic) Input logical interface

  14. Netflow Protocol

More Related Content