Beruflich Dokumente
Kultur Dokumente
WHAT IS LDAP
LDAP IS LIGHT WEIGHT SUFFICIENT STRAIGHT FORWARD EASY TO IMPLEMENT AS AGAINST X.500 DAP WHICH IS HEAVY WEIGHT
LDAP
DIRECTORY BECAUSE DATA IS ORGANISED IN THE FORM OF TREE MUCH LIKE UNIX FILE SYSTEM USES SIMPLIFIED SET OF ENCODING RUNS DIRECTLY ABOVE TCP/IP USES STRING TO REPRESENT DATA
LDAP
LDAP SECURITY MODEL : DEFINES HOW INFORMATION CAN BE PROTECTED FROM UNAUTHORISED ACCESS
LDAP
LDAP API THERE ARE SEVERAL LDAP API APPLICATION PROGRAMMING INTERFACE OLDEST ONES WRITTEN IN C NOW A DAYS LDAP API S ARE AVAILABLE IN OTHER PROGRAMMING LANGUAGES LIKE PERL JAVA
LDAP BACKENDS
THE BASIC DAEMON PROCESS THAT RUNS ON THE LDAP SERVER CALLED SLAPD COMES WITH THREE DIFFERENT BACKEND DATABASES WE ASSUME THAT IN OUR CASE WE USE LDBM THE MOST USED ONE
Definition of MIME
MIME, stand for Multi-purpose Internet mail
Extensions, is a freely available specification that offers a way to interchange text in languages with different character sets, and multimedia e-mail among many different computer system that use Internet mail standards.
Introduction
MIME extends the format of Internet mail to allow nonUS-ASCII textual messages, non-textual messages, multipart message bodies, and non-US-ASCII information in message headers. MIME provides Internet mail users with functionality similar to that of MS-Mail for LAN-based internal mail. MS-Mail and MIME allow the attachment of files and other objects, as does MIME. Unfortunately, Microsofts method of handling these attachments is undertaken through a proprietary format and MS-Mail does not provide compliance with the MIME open standard.
Cont
Internet messages with MIME attachments send to MSMail will transfer the appropriate text portions of the message, but MS-Mail will generally forward the attachments as encoded text, which may then be saved to a file and decoded. Conversely, messages sent from MS-Mail with attachments to an Internet MIME mail system will transfer the text portions and send the attachments as encoding text, but use a different method of encoding from the used by MIME and without the information needed for processing the message attachment by the recipient. Email messages arriving at the National Library with MIME attachments are likely to be corrupted.
Cont
MIME is a specification for enhancing the capabilities of standard Internet e-mail. It offers a simple standardized way to represent and encode a wide variety of media types of transmission via Internet mail. It is defines extensions to SMTP to support binary attachments of arbitrary format. The designers of MIME have learned a lot from the old SMTP protocol and its mailers. MIME is here to stay and it works.
Cont
When using the MIME standard, messages can contain the following types: Text message in US-ASCII Character set other than US-ASCII Multiple objects in a single messages Multimedia; Image, Audio, and Video messages Multi-front messages Messages of unlimited length Binary files
Cont
MIME is defined to be completely backwards compatible, yet flexible and open to extensions. Therefore, it builds on the older standard by defining additional fields for the mail message header, that describes new content types, and a distinct organization of the message body.
Cont
Uses a new binary encoding scheme called BASE 64 New SMTP headers describe the attached document User agents read the header to figure out how to interpret the message
The Content-transfer-Encoding
Base64 encoding algorithm is used to encode binary data in 7bit ASCII data Quoted-printable is for text-only messages A few others 7bit No encoding Case insensitive 8bit No encoding Binary No encoding X-token No encoding Example
Summary
MIME has been designed to avoid problems caused by additional restrictions imposed by some Internet mail transport mechanisms. The Multipart and Message content types allow mixing and hierarchical structuring of objects of different types in a single message. Further content types provide a mechanism for tagging messages or body parts as audio, image, or other kinds of data. Finally, a number of useful content types are defined for general use by consenting user agents, notably Text/Richtext, Message/Partial, and Message/External-Body.
POP
POP supports simple download-and-delete requirements for access to remote mailboxes (termed maildrop in the POP RFC's). Although most POP clients have an option to leave mail on server after download, e-mail clients using POP generally connect, retrieve all messages, store them on the user's PC as new messages, delete them from the server, and then disconnect. POP (POP1) is specified in RFC 918 (1984), POP2 by RFC 937 (1985). The original specification of POP3 is RFC 1081 (1988). Its current specification is RFC 1939, updated with an extension mechanism, RFC 2449 and an authentication mechanism in RFC 1734.
POP
Usually, mailboxes are kept on a dedicated machine. Computer with mailboxes runs POP server. User runs POP client on local computer. POP client can access and retrieve messages from mailbox. Requires authentication (password). Local computer uses SMTP for outgoing mail.
27
POP
28
30
POP3
Stands for Post Office Protocol Version 3 RFC in 1993 POP3 is intended to permit a workstation to dynamically access a maildrop on a server host in a useful fashion. Usually, this means that the POP3 protocol is used to allow a workstation to retrieve mail that the server is holding for it.
POP3
Doesnt provide extensive mail operations on the server Normally mail is downloaded, then deleted Deletion doesnt really occur until QUIT Uses port 110
RMON
What is RMON?
RMON is the common abbreviation for Remote Monitoring, a system defined by the IETF that allows you to monitor the traffic of LANs or VLANs remotely.
RMON (Remote Network Monitoring) provides standard information that a network administrator can use to monitor, analyze, and troubleshoot a group of local area networks (LANs) from central location. Remote Monitoring (RMON) is an extension to the SNMP MIB, and includes two versions RMON and RMON 2. MIB - A Management Information Base (MIB) is a collection of information that is organized hierarchically. MIBs are accessed using a network-management protocol such as SNMP. They are comprised of managed objects and are identified by object identifiers.
Goals of RMON
RMON, primary goal is to provide information relating to network errors and utilization. RMON data is gathered as part of ten different monitoring groups.
RMON
Offline Operation: There are sometimes conditions when a management station will not be in constant contact with its remote monitoring devices. Probes will perform diagnostics and to collect statistics continuously, even when communication with the management station may not be possible or efficient Proactive Monitoring : Continuously run diagnostics and log network performance and notify the management station of the failure and store historical statistical information about the failure.
RMON
Problem Detection and Reporting : The monitor can be configured to recognize conditions, most notably error conditions, and to continuously check for them. When one of these conditions occurs, the event may be logged, and management stations may be notified in a number of ways. Value Added Data : Highlighting those hosts on the network that generate the most traffic or errors, the probe can give the management station precisely the information it needs to solve a class of problems.
Version of RMON
RMON was originally developed to address the problem of managing LAN segments and remote sites from a Central Location. There are two versions of RMON, RMON 1 & RMON 2: RMON1It defines 10 MIB groups for basic monitoring. It allows network monitoring at MAC layer or below RMON1 was only capable of providing information up to the MAC level, RMON2This is an extension of RMON 1 that focuses on higher layers of traffic above the MAC layer It has an emphasis on IP traffic and application level traffic It allows network management applications to monitor packets on all network layers. RMON 2 is capable of monitoring traffic up to the application level.
Working of RMON
Working of the RMON Setup: FDDI Backbone network with a local Ethernet LAN, two remote LANS, one is a token ring LAN and the other an FDDI Lan. NMS is on the the local Ethernet LAN Monitoring Ethernet Local LAN is monitored by the Ethernet probe on the LAN. The FDDI backbone is monitored by an FDDI probe via the bridge and Ethernet LAN. Token Rink is monitored by the token ring probe The FDDI LAN is monitored by the built in probe on the router. Both the remote LANs communicate with the NMS via the routers, the WAN and the backbone network, Working RMON devices monitors the local network segment & does the necessary analyses and informs the NMS only when there are exceptions or NMS requests for some info. This reduces the traffic especially on the segment in which the NMS resides, as all the monitoring traffic would otherwise converge there. Alarm Group Set thresholds on a variety of items affecting network performance When the thresholds are crossed, events are reported. In general, the values of thresholds are determined according to past experience
Advantages of RMON
It improves your efficiency -Using RMON probes allows you to remain at one workstation and collect information from widely dispersed LAN segments or VLANs. This means that the time taken to reach a problem site, set up equipment, and begin collecting information is largely eliminated. It allows you to manage your network in a more proactive manner- If they are configured correctly, RMON probes deliver information before problems occur. This means that you can take action before they affect users. It reduces the load on the network and the management workstation Traditional network management involves a management workstation polling network devices at regular intervals to gather statistics and identify problems or trends. As network sizes and traffic levels grow, this approach places a strain on the management workstation and also generates large amounts of traffic. An RMON probe, however, autonomously looks at the network on behalf of the management workstation without affecting the characteristics and performance of the network. The probe reports by exception, which means that it only informs the management workstation when the network has entered an abnormal state. Increases Productivity for administrators. Permits monitoring on a more frequent basis and hence faster fault diagnosis. Needs no direct visibility by NMS; more reliable information
Disadvantages of RMON
The amount of information it provides is insufficient for network managers and administrators who need to solve complex problems, often at a distance. The mechanism employed for data retrieval to a central management console are slow and very bandwidth inefficient. RMON values are stored in 32 bit registers which limit the count value to 4,294,967,295. Although a seemingly large value, this is actually quite small. In a 100 Mbps fast Ethernet network running at just 10% loading, the counters will be reset to zero after just one hour of acitivity. Full RMON support in hardware typically requires dedicated RISC processor technology and this is achievable in sub -$1,000 routers, hubs etc.
SNTP Client
When Simple Network Time Protocol (SNTP) is configured as a client, the i5/OS operating system retrieves a time value from an external time source. You can specify from which sources (up to three) to retrieve the time value. This external time value is compared to the system time. If the system time value does not match the external time source, a time adjustment begins. The system time is adjusted until the required time value is reached. You can configure the i5/OS operating system as the SNTP client to poll a Network Time Protocol (NTP) or an SNTP server to find the time. The SNTP client updates the system clock. Most applications use the system clock as their time source. By updating the system clock, applications reflect the synchronized time obtained from the time server.
SNTP Server
When you configure the i5/OS operating system as an SNTP server, your system acts as a time server for other devices. Other SNTP clients check time by polling your SNTP server. If a clients time values do not match the SNTP server time, a time adjustment begins. The clients system time is adjusted until the required time value is reached. This is useful for maintaining time within a network.
Fault Management
Dealing with problems and emergencies in the network (router stops routing, server loses power, etc.)
Performance Management
How smoothly is the network running? Can it handle the workload it currently has?
Versions
Two major versions SNMPv1, SNMPv2
SNMPv1 is the recommended standard SNMPv2 has become split into:
SNMPv2u - SNMPv2 with user-based security
SNMPv2* - SNMPv2 with user-based security and additional features SNMPv2c - SNMPv2 without security
What is SNMP?
SNMP is a tool (protocol) that allows for remote and local management of items on the network including servers, workstations, routers, switches and other managed devices. Comprised of agents and managers
Agent - process running on each managed node collecting information about the device it is running on. Manager - process running on a management workstation that requests information about devices on the network.
Ethernet Frame
IP Packet
UDP Datagram
SNMP Message
CRC
Nodes
Items in an SNMP Network are called nodes. There are different types of nodes. Managed nodes
Typically runs an agent process that services requests from a management node
Management nodes
Typically a workstation running some network management & monitoring software
Nodes can be both managed nodes and a management node at the same time (typically this
is the case, since you want to be able to manage the workstation that your management application is running on.)
Community Names
Community names are used to define where an SNMP message is destined for. They mirror the same concept as a Windows NT or Unix domain. Set up your agents to belong to certain communities. Set up your management applications to monitor and receive traps from certain community names.
SNMP Agents
Two basic designs of agents
Extendible Agents
Open, modular design allows for adaptations to new management data and operational requirements
Monolithic Agents
GetNext Retrieves the next value of the next lexical MIB variable Set Changes the value of a MIB variable Trap An unsolicited notification sent by an agent to a management application
(typically a notification of something unexpected, like an error)
Traps
Traps are unrequested event reports that are sent to a management system by an SNMP agent process
When a trappable event occurs, a trap message is generated by the agent and is sent to a trap destination (a specific, configured network address)
Many events can be configured to signal a trap, like a network cable fault, failing NIC or Hard Drive, a General Protection Fault, or a power supply failure Traps can also be throttled -- You can limit the number of traps sent per second from the agent Traps have a priority associated with them -- Critical, Major, Minor, Warning, Marginal, Informational, Normal, Unknown
Trap Receivers
Traps are received by a management application. Management applications can handle the trap in a few ways:
Poll the agent that sent the trap for more information about the event, and the status of the rest of the machine. Log the reception of the trap.
Languages of SNMP
Structure of Management Information (SMI) specifies the format used for defining managed objects that are accessed via the SNMP protocol Abstract Syntax Notation One (ASN.1) used to define the format of SNMP messages and managed objects (MIB modules) using an unambiguous data description format Basic Encoding Rules (BER) used to encode the SNMP messages into a format suitable for transmission across a network
SMIv1
Structure of Management Information SMIv1 is described in RFCs 1155, 1212, 1215 These RFCs describe: How MIB modules are defined with CCITT X.208 ASN.1 data description language The subset of the ASN.1 language that is used in MIBs
The addition of the APPLICATION data type to ASN.1, specifically for use with SNMP MIBs
All ASN.1 constructs are serialized using the CCITT X.209 BER for transmission across the wire definition of the high-level structure of the Internet branch (iso(1).org(3).dod(6).internet(1)) of the MIB naming tree the definition and description of an SNMP managed object
SMIv2
Structure of Management Information SMIv2 is described in RFCs 1442, 1443, 1444 These RFCs describe:
ASN.1
Abstract Syntax Notation One ASN.1 is nothing more than a language definition. It is similar to C/C++ and other programming languages. Syntax examples:
-- two dashes is a comment -- The C equivalent is written in the comment MostSevereAlarm ::= INTEGER -- typedef MostSevereAlarm int;
circuitAlarms MostSevereAlarm ::= 3 -- MostSevereAlarm circuitAlarms = 3; MostSevereAlarm ::= INTEGER (1..5) -- specify a valid range ErrorCounts ::= SEQUENCE { circuitID OCTET STRING, INTEGER,
erroredSeconds
unavailableSeconds INTEGER } -- data structures are defined using the SEQUENCE keyword
BER
Basic Encoding Rules
The relationship between ASN.1 and BER parallels that of source code and machine code.
DisplayString (SIZE (0..255)) read-write mandatory -- or read-write, write-only, not-accessible -- or optional, deprecated, obsolete
Chris Francois
cfrancois@acm.org (360)650-0000 ::= { system 4 }
Message Preamble
PDU Body
Message Length Message Version Community String PDU Type PDU Length Enterprises MIB OID Agent IP Address Standard Trap Type Specific Trap Type
Time Stamp
PDU Header
Length of Variable Bindings Length of First Binding OID of First Binding Type of First Binding Value of First Binding
PDU Body
http://www.compaq.com/products/servers/management/ Compaq Insight Manger http://www.redpt.com/ http://www.empiretech.com/ ftp://ftp.cinco.com/users/cinco/demo/ http://www.netinst.com/html/snmp.html http://www.netinst.com/html/Observer.html Observer Gordians SNMP Agent Castle Rock Computing Advent Network Management SimpleAgent, SimpleTester SnmpQL - ODBC Compliant Empire Technologies Cinco Networks NetXray SNMP Collector (Win9X/NT)
Full bilingual support for SNMPv1 and SNMPv2c ability to map SNMPv2c requests to SNMPv1 for processing by extension agents better synchronization of MIB variables a new extension agent framework (backward compatible with original
framework, but with MS add-ons)
RFC Description
SNMP
RFCs
1065 1066 1067 1098 1155 1156 1157 1158 1212 1213 1215 1351 1352 1353 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910
SMIv1 SNMPv1 MIB SNMPv1 SNMPv1 SMIv1 SNMPv1 MIB SNMPv1 SNMPv1 MIB-II SNMPv1 MIB definitions SNMPv1 MIB-II SNMPv1 traps Secure SNMP administrative model Secure SNMP managed objects Secure SNMP security protocols Introduction to SNMPv2 SMIv2 Textual conventions for SNMPv2 Conformance statements for SNMPv2 SNMPv2 administrative model SNMPv2 security protocols SNMPv2 party MIB SNMPv2 protocol operations SNMPv2 transport mapping SNMPv2 MIB Manger-to-manger MIB Coexistence of SNMPv1 and SNMPv2 Community-Based SNMPv2 SMIv2 Textual conventions for SNMPv2 Conformance statements for SNMPv2 Protocol operations for SNMPv2 Transport mapping for SNMPv2 SNMPv2 MIB Coexistence of SNMPv1 and SNMPv2 Administrative infrastructure for SNMPv2 User-based security for SNMPv2
If one wants to implement ISO applications in a TCP/IP based network without constrains, the ITOT mechanisms (specified in RFC 2126) should be used
Protocol Structure - LPP: Lightweight Presentation Protocol The service provider is in one of the following states: IDLE, WAIT1, WAIT2, DATA, WAIT3, or WAIT4 The possible events are: PS-user P-CONNECT.REQUEST P-CONNECT.RESPONSE P-RELEASE.REQUEST P-RELEASE.RESPONSE P-DATA.REQUEST P-U-ABORT.REQUEST network TCP closed or errored(*) receive ConnectRequest PDU receive ConnectResponse PDU receive ReleaseRequest PDU receive ReleaseResponse PDU receive UserData(*) or CL-UserData(**) (*) tcp-based service only (**) udp-based service only
PDU receive user-initiated Abort PDU receive provider-initiated Abort PDU timer expires(**) The possible actions are: PS-user P-CONNECT.INDICATION P-CONNECT.CONFIRMATION P-RELEASE.INDICATION P-RELEASE.CONFIRMATION P-DATA.INDICATION P-U-ABORT.INDICATION P-P-ABORT.INDICATION network open TCP(*) close TCP(*) send ConnectRequest PDU send ConnectResponse PDU send ReleaseRequest PDU send ReleaseResponse PDU send UserData(*) or CL-UserData(**) PDU send user-initiated Abort PDU send provider-initiated Abort PDU set timer(**)