1.1
| Introduction   1
|
1.2
| The Internet And Network Management   1
|
1.3
| Internet Structure   2
|
1.4
| Managing An Entity   2
|
1.5
| Internal And External Policies   3
|
1.6
| The State Of Network Management   3
|
1.7
| Network Management In The Gartner Model   4
|
1.8
| Benefits Of Automation   4
|
1.9
| The Lack Of Industry Response   5
|
1.10
| Impact On Business   5
|
1.11
| Distributed Systems And New Abstractions   6
|
1.12
| Remainder Of The Text   7
|
1.13
| Summary   7
|
2.1
| Introduction   11
|
2.2
| Network Devices And Network Services   11
|
2.3
| Network Elements And Element Management   12
|
2.4
| Effect Of Physical Organization On Management   12
|
2.5
| Examples Of Network Elements And Services   13
|
2.6
| Basic Ethernet Switch   14
|
2.7
| VLAN Switch   15
|
2.8
| Access Point For A Wireless LAN   15
|
2.9
| Cable Modem System   16
|
2.10
| DSL Modem System And DSLAM   17
|
2.11
| CSU\^/\^DSU Used In Wide Area Digital Circuits   18
|
2.12
| Channel Bank   19
|
2.13
| IP Router   19
|
2.14
| Firewall   20
|
2.15
| DNS Server   20
|
2.16
| DHCP Server   21
|
2.17
| Web Server   22
|
2.18
| HTTP Load Balancer   22
|
2.19
| Summary   23
|
3.1
| Introduction   25
|
3.2
| What Is Network Management?   25
|
3.3
| The Scope Of Network Management   26
|
3.4
| Variety And Multi-Vendor Environments   27
|
3.5
| Element And Network Management Systems   28
|
3.6
| Scale And Complexity   29
|
3.7
| Types Of Networks   31
|
3.8
| Classification Of Devices   31
|
3.9
| FCAPS: The Industry Standard Definition   32
|
3.10
| The Motivation For Automation   33
|
3.11
| Why Automation Has Not Occurred   33
|
3.12
| Organization Of Management Software   34
|
3.13
| Summary   36
|
4.1
| Introduction   39
|
4.2
| Intuition For Configuration   39
|
4.3
| Configuration And Protocol Layering   40
|
| 4.3.1
| Topology And Layer 2   40
|
| 4.3.2
| Logical Subnets And Layer 3   41
|
| 4.3.3
| Access And Layer 4   41
|
| 4.3.4
| Applications And Layer 5 (or Layer 7)   42
|
4.4
| Dependencies Among Configuration Parameters   43
|
4.5
| Seeking A More Precise Definition Of Configuration   44
|
4.6
| Configuration And Temporal Consequences   44
|
4.7
| Configuration And Global Consistency   45
|
4.8
| Global State And Practical Systems   46
|
4.9
| Configuration And Default Values   46
|
4.10
| Partial State, Automatic Update, And Recovery   47
|
4.11
| Interface Paradigm And Incremental Configuration   48
|
4.12
| Commit And Rollback During Configuration   49
|
4.13
| Automated Rollback And Timeout   50
|
4.14
| Snapshot, Configuration, And Partial State   50
|
4.15
| Separation Of Setup And Activation   51
|
4.16
| Configuring Multiple Network Elements   52
|
4.17
| Summary   52
|
5.1
| Introduction   55
|
5.2
| Network Faults   55
|
5.3
| Trouble Reports, Symptoms, And Causes   56
|
5.4
| Troubleshooting And Diagnostics   56
|
5.5
| Monitoring   57
|
5.6
| Baselines   58
|
5.7
| Items That Can Be Monitored   59
|
5.8
| Alarms, Logs, And Polling   59
|
5.9
| Identifying The Cause Of A Fault   60
|
5.10
| Human Failure And Network Faults   62
|
5.11
| Protocol Layering And Faults   62
|
5.12
| Hidden Faults And Automatic Correction   63
|
5.13
| Anomaly Detection And Event Correlation   64
|
5.14
| Fault Prevention   64
|
5.15
| Summary   65
|
6.1
| Introduction   67
|
6.2
| Business Model And Network Charges   67
|
6.3
| Service Level Agreements (SLAs)   68
|
6.4
| Service Fees   68
|
6.5
| Accounting For Flat-Rate Service   69
|
6.6
| Accounting For Use-Based Service   69
|
6.7
| Tiered Levels Of Service   70
|
6.8
| Exceeding Quotas And Penalties   70
|
6.9
| Assessing Financial Penalties   71
|
6.10
| Traffic Policing And Strict Enforcement Of Limits   71
|
6.11
| Technologies For Limiting The Rate Of Traffic   72
|
6.12
| Priorities And Absolute Guarantees   73
|
6.13
| Absolute Bandwidth Guarantees And MPLS   73
|
6.14
| Relative Bandwidth Guarantees And Priorities   73
|
6.15
| Priorities And Types Of Traffic   74
|
6.16
| Peering Agreements And Accounting   74
|
6.17
| Summary   75
|
7.1
| Introduction   77
|
7.2
| Aspects Of Performance   77
|
7.3
| Items That Can Be Measured   78
|
7.4
| Measures Of Network Performance   78
|
7.5
| Application And Endpoint Sensitivity   79
|
7.6
| Degraded Service, Variance In Traffic, And Congestion   80
|
7.7
| Congestion, Delay, And Utilization   81
|
7.8
| Local And End-To-End Measurements   81
|
7.9
| Passive Observation Vs. Active Probing   82
|
7.10
| Bottlenecks And Future Planning   83
|
7.11
| Capacity Planning   83
|
7.12
| Planning The Capacity Of A Switch   84
|
7.13
| Planning The Capacity Of A Router   84
|
7.14
| Planning The Capacity Of An Internet Connection   85
|
7.15
| Measuring Peak And Average Traffic On A Link   86
|
7.16
| Estimated Peak Utilization And 95\v'-.35m'\s-4t\s0\v'+.35m'\v'-.35m'\s-4h\s0\v'+.35m' Percentile   87
|
7.17
| Relationship Between Average And Peak Utilization   87
|
7.18
| Consequences For Management And The 50/80 Rule   88
|
7.19
| Capacity Planning For A Complex Topology   89
|
7.20
| A Capacity Planning Process   89
|
| 7.20.1
| Forecasting Future Load   89
|
| 7.20.2
| Measuring Existing Resource Use   90
|
| 7.20.3
| A Load Model Based On A Traffic Matrix   90
|
| 7.20.4
| Flows And Aggregates   92
|
| 7.20.5
| Deriving Estimates And Validation   93
|
| 7.20.6
| Experimenting With Possible Changes   93
|
7.21
| Route Changes And Traffic Engineering   94
|
7.22
| Failure Scenarios And Availability   94
|
7.23
| Summary   95
|
8.1
| Introduction   97
|
8.2
| The Illusion Of A Secure Network   97
|
8.3
| Security As A Process   98
|
8.4
| Security Terminology And Concepts   98
|
8.5
| Management Goals Related To Security   99
|
8.6
| Risk Assessment   100
|
8.7
| Security Policies   101
|
8.8
| Acceptable Use Policy   102
|
8.9
| Basic Technologies Used For Security   102
|
| 8.9.1
| Encryption Technologies   102
|
| 8.9.2
| Perimeter Control Technologies   103
|
| 8.9.3
| Content Control Technologies   104
|
8.10
| Management Issues And Security   105
|
8.11
| Security Architecture: Perimeter Vs. Resources   105
|
8.12
| Element Coordination And Firewall Unification   106
|
8.13
| Resource Limits And Denial Of Service   107
|
8.14
| Management of Authentication   107
|
8.15
| Access Control And User Authentication   108
|
8.16
| Management Of Wireless Networks   109
|
8.17
| Security Of The Network   110
|
8.18
| Role-Based Access Control   111
|
8.19
| Audit Trails And Security Logging   112
|
8.20
| Key Management   112
|
8.21
| Summary   113
|
9.1
| Introduction   117
|
9.2
| The Principle Of Most Recent Change   117
|
9.3
| The Evolution Of Management Tools   118
|
9.4
| Management Tools As Applications   118
|
9.5
| Using A Separate Network For Management   119
|
9.6
| Types Of Management Tools   120
|
9.7
| Physical Layer Testing Tools   121
|
9.8
| Reachability And Connectivity Tools (ping)   122
|
9.9
| Packet Analysis Tools   123
|
9.10
| Discovery Tools   124
|
9.11
| Device Interrogation Interfaces And Tools   126
|
9.12
| Event Monitoring Tools   127
|
9.13
| Triggers, Urgency Levels, And Granularity   127
|
9.14
| Events, Urgency Levels, And Traffic   129
|
9.15
| Performance Monitoring Tools   129
|
9.16
| Flow Analysis Tools   132
|
9.17
| Routing And Traffic Engineering Tools   133
|
9.18
| Configuration Tools   133
|
9.19
| Security Enforcement Tools   134
|
9.20
| Network Planning Tools   134
|
9.21
| Integration Of Management Tools   135
|
9.22
| NOCs And Remote Monitoring   136
|
9.23
| Remote CLI Access   137
|
9.24
| Remote Aggregation Of Management Traffic   138
|
9.25
| Other Tools   140
|
9.26
| Scripting   141
|
9.27
| Summary   141
|
10.1
| Introduction   143
|
10.2
| The Remote Management Paradigm And Applications   143
|
10.3
| Management Functions And Protocol Definition   144
|
10.4
| The Read-Write Paradigm   145
|
10.5
| Arbitrary Operations And Virtual Items   146
|
10.6
| Standards For Network Management Protocols   146
|
10.7
| SNMP Scope And Paradigm   147
|
10.8
| Basic SNMP Commands And Optimizations   148
|
10.9
| Asynchronous Traps And Event Monitoring   148
|
10.10
| Traps, Polling, Bandwidth, And CPU Cycles   149
|
10.11
| Management Information Base (MIB) And Variables   150
|
10.12
| A Hierarchy Of MIB Variable Names   151
|
10.13
| Advantages And Disadvantages Of A Hierarchy   153
|
10.14
| Complex Data Aggregates And MIB Tables   154
|
10.15
| Granularity Of Aggregate Access   155
|
10.16
| Transport Protocols And Interaction   155
|
10.17
| Updates, Messages, And Atomicity   156
|
10.18
| The Remote Monitoring MIB (RMON)   157
|
10.19
| A Manager's View Of MIB Variables   158
|
10.20
| Security And The Community String   159
|
10.21
| Summary   160
|
11.1
| Introduction   163
|
11.2
| Basic Traffic Analysis   163
|
11.3
| The Flow Abstraction   164
|
11.4
| The Two Types Of Flows   165
|
11.5
| The Purpose Of Flow Analysis   166
|
11.6
| Levels Of Flow Aggregation   167
|
11.7
| Online And Offline Flow Analysis   168
|
11.8
| Examples Of Flow Data Analysis   169
|
11.9
| Flow Data Capture And Filtering   171
|
11.10
| Packet Inspection And Classification   173
|
11.11
| Capture For Online And Offline Analysis   174
|
11.12
| Flows Using Packet Content   175
|
11.13
| Flows And Optimized Forwarding   175
|
11.14
| Flow Data Export   177
|
11.15
| Origin Of NetFlow Technology   178
|
11.16
| Basic NetFlow Characteristics   178
|
11.17
| Extensibility And Templates   179
|
11.18
| NetFlow Message Transport And Consequences   180
|
11.19
| Effect Of Configuration Choices   181
|
11.20
| Summary   182
|
12.1
| Introduction   185
|
12.2
| Definitions Of Forwarding And Routing   185
|
12.3
| Automation And Routing Update Protocols   186
|
12.4
| Routing Basics And Route Metrics   186
|
| 12.4.1
| Shortest Paths And Route Metrics   187
|
| 12.4.2
| Types And Scope Of Routing   188
|
12.5
| Example Routing Update Protocols   188
|
12.6
| Management Of Routes   189
|
12.7
| The Difficulty Of Route Management   189
|
12.8
| Use Of Routing Metrics To Enforce Policy   190
|
12.9
| Overcoming Automation   191
|
12.10
| Routing And Management Of Quality-of-Service   192
|
12.11
| Traffic Engineering And MPLS Tunnels   193
|
12.12
| Precomputation Of Backup Paths   193
|
12.13
| Combinatorial Optimization And Infeasibility   195
|
12.14
| Precomputation And Fast Convergence For IP Routing   196
|
12.15
| Traffic Engineering, Security, And Load Balancing   196
|
12.16
| Overhead, Convergence, And Routing Protocol Choices   197
|
12.17
| OSPF Areas And The Principle Of Hierarchical Routing   198
|
12.18
| Management Of Routing And Hidden Problems   199
|
12.19
| The Global Nature Of Routing   200
|
12.20
| Summary   201
|
| For Further Study   202
|
13.1
| Introduction   205
|
13.2
| Limits Of Configuration   205
|
13.3
| Iterative Improvement Using The Upgrade Paradigm   206
|
13.4
| Extending Functionality Without An Upgrade Cycle   207
|
13.5
| The Traditional Concept Of Scripting   207
|
13.6
| Scripts And Programs   208
|
13.7
| Stand-Alone Management Scripts   209
|
13.8
| CLI, The Unix Expect Program, And Expect Scripts   210
|
13.9
| Example Expect Script   211
|
13.10
| Management Scripts, Homogeneity, And Expect   212
|
13.11
| An Example Stand-Alone Script With Graphical Output   214
|
13.12
| Using Scripts As An Extension Mechanism   223
|
13.13
| Example Server With Scripting Extensions   223
|
13.14
| Example Of Server Extension Points   225
|
13.15
| Script Interface Functionality   226
|
13.16
| Example Server Extension Script   227
|
13.17
| Example Script That Manipulates A Reply   230
|
13.18
| Handling Multiple Tasks With A Single Script   232
|
13.19
| Script Timing, External Access, And Overhead   233
|
13.20
| Summary   234
|
| For Further Study   235
|
14.1
| Introduction   239
|
14.2
| Network Automation   240
|
14.3
| Dividing The Problem By Network Type   241
|
14.4
| Shortcomings Of Existing Automation Tools   242
|
14.5
| Incremental Automation Vs. A Blank Slate   243
|
14.6
| Interface Paradigm And Efficiency   244
|
14.7
| The Goal Of An Automated Management System   246
|
14.8
| Desiderata For An Automated Management System   248
|
14.9
| Multiple Sites And Managers   250
|
14.10
| Authority Domains And Role-Based Access Control   250
|
14.11
| Focus On Services   251
|
14.12
| Policies, Constraints, And Business Rules   251
|
14.13
| Correlation Of Multiple Events   253
|
14.14
| Mapping From Logical To Physical Locations   253
|
14.15
| Autonomy, Manual Override, And Policy Changes   254
|
14.16
| Summary   255
|
15.1
| Introduction   257
|
15.2
| Paradigms For Management System Design   258
|
15.3
| Characteristics Of A Top-Down Approach   258
|
15.4
| Characteristics Of A Bottom-Up Approach   259
|
15.5
| Selecting Any Or All In A Bottom-Up Design   260
|
15.6
| Weaknesses of The Two Design Paradigms   260
|
15.7
| A Hybrid Design Methodology   261
|
15.8
| The Critical Need For Fundamental Abstractions   262
|
15.9
| An Analogy To Operating Systems   263
|
15.10
| Separation Of Management From Elements   264
|
15.11
| Mapping From Abstractions To Network Elements   264
|
15.12
| Northbound And Southbound Interfaces   265
|
15.13
| A Set Of Architectural Approaches   266
|
| 15.13.1
| Monolithic Architecture   266
|
| 15.13.2
| Extensible Framework   268
|
| 15.13.3
| Software Backplane   268
|
| 15.13.4
| Tiered Hierarchy   270
|
| 15.13.5
| Database-Centric   272
|
15.14
| Useful Implementation Techniques   273
|
15.15
| Late Binding Of A Programmatic Interface   275
|
15.16
| Validation Of External Expectations   276
|
15.17
| An Architecture Of Orthogonal Tools   278
|
15.18
| Summary   279
|
16.1
| Introduction   283
|
16.2
| Data For Management Software   283
|
16.3
| The Issue Of Data Representation   284
|
16.4
| Internal Representation And Programming Language   286
|
16.5
| The Effect Of Programming Paradigm On Representation   286
|
16.6
| Objects And Object-Based Representation   287
|
16.7
| Object Representation And Class Hierarchy   288
|
16.8
| Persistence, Relations, And Database Representation   288
|
16.9
| Representations At Various Points And Times   289
|
16.10
| Translation Among Representations   290
|
16.11
| Heterogeneity And Network Transmission   291
|
16.12
| Serialization And Extensibility   292
|
16.13
| The Need For Semantic Specification   293
|
16.14
| Semantic Validity And Global Inconsistency   293
|
16.15
| Information Models And Model-Driven Design   294
|
16.16
| Information And Data Models   295
|
16.17
| Class Hierarchies In An Object-Oriented Model   296
|
16.18
| Multiple Hierarchies   298
|
16.19
| Hierarchy Design And Efficiency   299
|
16.20
| Cross-Hierarchy Relationships And Associations   300
|
16.21
| Prescriptive Models And Generality   301
|
16.22
| Purpose Of Models And Semantic Inference   303
|
16.23
| Standardized Information Models   303
|
16.24
| Graphical Representation Of Models (UML)   304
|
16.25
| The Issue Of Complexity   306
|
16.26
| Mapping Objects To Databases And Relations   307
|
16.27
| Representation And Storage Of Topology Information   307
|
16.28
| Ontology And Data Mining   309
|
16.29
| Summary   309
|
18.1
| Introduction   323
|
18.2
| Fundamental Abstractions For A Management System   323
|
18.3
| Separation Of Control And Validation   324
|
18.4
| Boundary Between A Network And End Systems   324
|
18.5
| Taxonomy Of Network Management Architectures   325
|
18.6
| Extent Of Functionality Offered By Existing Systems   325
|
18.7
| Management Of Routing And Traffic Engineering   325
|
18.8
| Automated Address Assignment   325
|
18.9
| Analysis Of Routing   326
|
18.10
| Security Policy Enforcement   326
|
18.11
| Infrastructure Redesign For Automated Management   326
|
18.12
| Peer-To-Peer Propagation Of Management Information   327
|
18.13
| Routing Failure Analysis   327
|
18.14
| Limits Of Automated Topology Discovery   327
|
18.15
| Data Mining Of NetFlow Data   327
|
18.16
| Storage Of Network State   328
|
18.17
| Anomaly Detection Using Bayesian Filtering   328
|
18.18
| Cost Of Protection In Scripting   328
|
18.19
| Late-Binding Interface Management Applications   328
|
18.20
| Boundary Between Management System And Elements   329
|
18.21
| Summary   329
|