Sie sind auf Seite 1von 8

A Telecom Network

NCC 2009 Tutorial


SDH Mux

Network Management for Telecom Operators: 1. Basics


Prof. Timothy A. Gonsalves TeNeT Group Dept. of CS&E, IIT-Madras
TeNeT Group IIT-M

Fibre backbone

RT Main XChg
C O T

corDECT ... ...


1
TeNeT Group IIT-M

optiMA FiLL RT

RT ..

...

...

DSLAM ... ...


3

16 Jan 2009

Promise of Telecom
Basic infrastructure that provides: voice + FAX + Internet That promises: Widespread access to knowledge reduce have/have-not divide by leap-frogging ! must be affordable and reliable

Network Storms
Rapid escalation of cascading failures Example: Noise on a link ! packet loss ! link-level ARQ ! queue buildup ! source retransmits ! congestion on other links

TeNeT Group IIT-M

noise
TeNeT Group IIT-M

Storm in a Voice Network


TX = trunk exchange LE = local exchange LE LE TX LE TX1 TX2 LE LE 0.1 Trunk line fails ! alarms at TX1 and TX2 Call failure rate exceeds threshold at several LEs ! alarms at many LEs
5

Affordability

LE TX Cost

1 10 100 Distance, km

1000

Cost of bandwidth increases with distance => install minimal required capacity including growth factor
TeNeT Group IIT-M

TeNeT Group IIT-M

Storm in a Voice Network


! alarms

Service Level Agreements

at many LEs
Service Level Agreement (SLA) = binding contract between Service provider and customer, with guaranteed service levels, penalties for non-compliance

- LE operator ignores alarms - network operator sees long list of alarms, important ones may be missed ! need integrated network management system - only relevant alarms to the right person
TeNeT Group IIT-M

TeNeT Group IIT-M

SLA: Leased line


CPE A 64 kb/s digital pipe CPE B

Network Management System


Why? Manage monitor and control heterogeneous, graphically-distributed elements What? Configuration Faults Accounting Security Performance
9
TeNeT Group IIT-M

SLA Parameters Availability (MTBF, MTTR) Bit error rate Timing - clock skew Delay of used for video or audio
TeNeT Group IIT-M

identify and control managed objects detect, isolate, repair charges for resource usage limits on resource usage protect access to objects authentication, manage keys, logs gather statistics analyze and plan

FCAPS

11

SLA: DSL Access to Internet Content

Network Management
Managed Object Management Station

Network Element

Agent

Protocol

Manager

Object
1. 2. 3. 4.

Network

TeNeT Group IIT-M

Multiple SLAs between: CSP - ISP ISP - TSP TSP - Customer

10

attributes - name, uptime, load, operations - create/delete, get, set, actions. (reboot,) notifications - unusual events (load > threshold,) behaviour - how it reacts to operations MIB or MOL = collection of managed objects management information base TeNeT Group IIT-M managed object library

12

Network Management System


Protocol messages (PDUs) for operations and notifications Data representation ASN.1: encodes as a sequence of bytes machine-independent Standards SNMP simple network management protocol widely used in IP networks CMIP common management information protocol based on OSI stack used in TMN (telecom management network) TeNeT Group IIT-M
itu-t 0 std 0 dod 6 internet 1 mgmt 2 mib 1 system 1 sysDesc 1 sysUptime 3 interfaces 2 Exp 3 iso 1 joint-iso-itu-t 2

MIB Tree
org 3

Private 4

13

Human-readable names: {iso.reg.org.dod.internet.mgmt.mib.system.sysUptime} {mib 1,3} TeNeT Group IIT-M Used in PDUs: {1,3,6,1,2,1,1,3}

15

MIB Tree Structure of Management Information (SMI)


Agent names: DNS domain naming system e.g. lantana.tenet.res.in cordect53.hfcl.co.in Object names: Hierachical naming tree globally unique
TeNeT Group IIT-M

Sub-tree of the registration hierarchy: MIB view/group/module Standard MIB views: MIB-II: all network elements Ethernet MIB: all Ethernet devices FDDI MIB: all FDDI devices RMON MIB: remote network monitoring Object Types: IP Address Time Ticks Gauge 32-bit counter, no wraparound Counter 0..232-1, with wraparound TeNeT Group IIT-M Opaque any octet string0

14

16

System Group (mib-21)


sysDescr (1) sysObjectID (2) sysUpTime (3) sysContact (4) sysName (5) sysLocation (6) sysServices (7) -------descriptive text vendors id for this mgmt subsystem in 10 ms ticks administrative contact person name of the managed node physical location of this node 7-bit integer indicating the OSI layers of this nodes primary services

SNMP
Versions V1: simple, most widely-used drawbacks esp. security V2c: fixed many drawbacks of V1, more complex V3: good security, not yet widely-used SNMP objects attributes operations: get, set notifications traps behaviours Uses UDP/IP Maximum PDU size = 468 bytes (V3 allows 232 - 1) Get, set port 161 Traps port 162 TeNeT Group IIT-M

TeNeT Group IIT-M

17

19

Network Management System


interfaces 2

SNMP
Messages
Agent Manager Get, GetNext V1 Set GetResponse Trap Manager

ifNumber 1 ifTable 2 2 1 ifEntry 1 0 ifIndex 1 ifDescr 2 ifType 3

V2
18

GetBulk

InformReq InformResp

TeNeT Group IIT-M

TeNeT Group IIT-M

20

SNMP GetRequest

...SNMP GetNextRequest
Read a table without knowing the size of the table
GetNext Parameter interfaces.ifTable interfaces.ifTable.1.1.1 interfaces.ifTable.1.1.2 interfaces.ifTable.1.2.1 interfaces.ifTable.1.2.2 interfaces.ifTable.1.3.1 Returned value ifTable.1.1.1 = 1 -- index ifTable.1.1.2 = 2 ifTable.1.2.1 = "lo0" -- descr ifTable.1.2.2 = "eth0" ifTable.1.3.1 = softwareLoopback ifTable.1.3.2 = ethernet-csmacd -- type type(3) ... ifSpecific(22) softwareLoopback ethernet-csmacd

Atomic: all values returned, or none In case of error, errorIndex indicates which variable binding has errorStatus
TeNeT Group IIT-M

Table is read column-wise


1 2 index(1) descr(2) 1 lo0 2 eth0

21

TeNeT Group IIT-M

23

SNMP GetNextRequest
Given varible name N, returns the value of the lexicographically next variable in MIB view
GetNext(system) !system.sysDescr.0 = "Linux ..." GetNext(system.sysDescr) ! system.sysDescr.0 = "Linux ..." GetNext(system.sysDescr.0) ! system.sysObjectID.0 =OID: ...ucdSnmpAgent.linux

SNMP SetRequest

Atomic: all values set and returned, or none In case of error, errorIndex indicates which variable binding has errorStatus

Traverse a sub-tree without knowing names


GetNext(icmp.27.0) ! tcp.tcpRtoAlgorithm.0 = other(1) Get(icmp.27.0) ! Error: (noSuchName) icmp.27
TeNeT Group IIT-M

22

TeNeT Group IIT-M

24

SNMP Trap
From agent to manager Manager registers with agent for traps of interest No response to guarantee receipt, agent must periodically retransmit until manager takes action
25

SNMP v2c
Key Concepts revised OBJECT definitions
counter64 type

improved tables
unambiguous row selection procedures for creation and deletion of rows augmenting of tables

Notification definition Manager-manager communication


TeNeT Group IIT-M

TeNeT Group IIT-M

27

SNMP Authentication
Plain text community string Agent accepts read community and write community Default is often public and private!
Security subsystem Authentication and privacy services Multiple security models
standard - very secure custom

SNMPv3

Access control subsystem Authorisation services that can be used to check access rights Fine-grained access control to individual variables based on who, how, where
26
TeNeT Group IIT-M

TeNeT Group IIT-M

28

Summary
Management of a telecom network is difficult Manager-Agent model for NMS MIB hierachical collection of objects SNMP get, getnext, set, trap SNMP v2c
GetBulk for efficiency InformRequest for manager-manager

SNMP v3 good security


TeNeT Group IIT-M

29

Das könnte Ihnen auch gefallen