SNMPV 1

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 13

1.

Describe in details SNMPv1

SNMPv1- Simple Network Management Protocol Version 1.

SNMP is a management protocol commonly used for monitoring network devices and

networking support on end client platforms.

It is a standard protocol defined by the Internet Engineering Task Force (IETF). It is an

application level protocol which has implementations running over both UDP and TCP, the two

most commonly used transport protocols in the Internet.

The operations in SNMP protocol are closely tied to the representation of management data in

the MIB format. A management information base (MIB) is a Simple Network Management

Protocol (SNMP) flat-file, non-relational database that describes devices being monitored.

Network management platforms monitor nodes by reading the value of the managed resources in

the MIB

Management of data in MIBs are represented as a hierarchy of management information entry,

and each entry has a unique identifier.

The SNMP protocol has been defined in three versions:

SNMPv1: The first version of SNMP was standardized in 1990 and supported four basic

operations: Get, GetNext, Set, and Trap. The Get operation is used to read the value of a MIB

entry by specifying its identifier, and the Getnext command could get the next entry on from a

table of entries. The Set command was used to assign values to a specific MIB entry, and Trap
command was used by agents to send a notification to an agent, e.g., a manager can use the Set

command to establish a threshold in a MIB entry, and the agent can send a trap to the manager

when a counter exceeded that threshold.

SNMP v1 used a simple request response model and each Get operation could effectively read a

single entry, leading to a rather chatty protocol for reading the entire management information.

SNMP v1 did not make any provisions for security, leading to most administrators using it only

for monitoring of MIB variables and not for setting any configuration parameters.

SNMP Version 1 (SNMPv1) Message Format

The SNMP General message format was, of course, first used to define the format of messages in

the original SNMP Protocol, SNMP version 1 (SNMPv1). This first version of SNMP is

probably best known for its relative simplicity, compared to the versions that followed it. This is

reflected in its message format, which is quite straight-forward.

The general message format in SNMPv1 is a “wrapper” consisting of a small header and an

encapsulated PDU. Not very many header fields were needed in SNMPv1 because the

community-based security method in SNMPv1 is very rudimentary. Thus, the short overall

format for SNMPv1 messages shown in these tables.


QUESTION 3

OpenNMS and SNMP MIB browsers are two tools commonly used in network management to

monitor and manage network devices. Here's a brief overview of how these tools can be used:

OpenNMS: OpenNMS is a network management platform that can be used to monitor and

manage network devices. It supports a variety of protocols, including SNMP, ICMP, and JMX,

and provides a range of features, including event management, performance monitoring, and

service level agreement (SLA) reporting.

To use OpenNMS, you first need to install and configure the platform. Once you've done that,

you can add the devices you want to monitor by configuring their SNMP settings. OpenNMS

will then use SNMP to collect information from these devices, such as their status, performance

metrics, and configuration settings. You can view this information through the OpenNMS user

interface, which provides a range of dashboards, reports, and alerts to help you manage your

network.

SNMP MIB browsers: SNMP MIB browsers are tools that can be used to explore the

Management Information Base (MIB) of a network device. The MIB is a database of objects that

SNMP can monitor and control, and it provides a standardized way of organizing and describing

network resources.

To use an SNMP MIB browser, you need to connect to the device you want to explore and enter

its SNMP community string, which is a password-like string that provides access to the device's

SNMP agent. Once you've done that, you can use the MIB browser to navigate through the

device's MIB tree and view information about its objects. This information can include
performance metrics, configuration settings, and other parameters that can be monitored and

controlled using SNMP.

Overall, OpenNMS and SNMP MIB browsers are two important tools in network management

that can be used together to monitor and manage network devices. OpenNMS provides a

centralized platform for managing devices, while SNMP MIB browsers provide a way to explore

the MIB of individual devices and access their SNMP capabilities.

5. Using relevant examples, illustrate the importance of the

following laws in network management Utilization’s Law,

Little’s Law, Forced Flow Law.

Utilization Law

In Network Management, utilization Law is a principle that states the amount of traffic a network

can handle is directly related to the amount of available bandwidth.

Utilization law is important in network management because it ensures that resources are used in

the most efficient way possible. It is accomplished by ensuring that prices reflect the true cost of

using a resource.

For instance, if there is a shortage of bandwidth on a network, the price of bandwidth will

increase which will encourage people to use the resource more efficiently.

Little’s Law
Little’s Law states that the average number of customers in a system is equal to the average

number of customers leaving the system per unit of time.

This law is important in network management because it helps to ensure that the network is able

to handle the amount of traffic that is being sent through it by understanding how the number of

customers in a system change over time, network managers can make sure that the network

managers can make sure that the network is able the current load and plan for future growth.

An example of how little’s law can be used in network management is to predict the number of

customers that will be in a system during a given time period thus the information can be used to

plan for network resources that will be needed to handle the expected traffic.

Forced Flow Law

The Forced Flow Law states that the network traffic will flow through the path of least

resistance.

The Forced Flow Law is important in network management because it helps to ensure that data is

sent through the network in an efficient and timely manner. Through enforcing the Forced Flow

Law, network administrators can help to ensure that data is sent through the network in an

orderly and timely fashion thus this can help improve network performance and prevent

congestion from occurring.

An example of this in network management can be seen in the case of large company that is

using a network to connect its office around the world, if the network is not properly managed,

data may not flow through the network in an efficient manner hence leading to congestion and

slow network performance. Through enforcing the forced flow law network administrators can
help to ensure that data packets are sent through the network efficiently therefore improving

network performance.

QUESTION 6: Describe in detail the role of fault

management in network management

Fault management is the component of network management concerned with detecting, isolating

and resolving problems. Network fault management can keep connectivity, applications and

services running at an optimum level, provide fault tolerance and minimize downtime.

Fault management relies on a variety of tools and protocols to monitor network devices and

traffic, identity problems, take corrective actions too. When faults are detected, fault

management systems send alerts to network administrators, who can then take action to resolve

the issue.

Fault management is a critical component of network management. Fault management helps

ensure the reliability and availability of the network services.

Key roles fault management in network management include;

1. Fault Detection: Fault detection is the first step of fault management. It involves

monitoring the network for any changes that can indicate a fault. This can include
changes in bandwidth usage, latency, packet loss, etc. It also involves monitoring the

network devices for any hardware or software errors. The first step in fault management

includes this detection of faults or errors in the network.

2. Fault Isolation: Once a fault has been detected, fault management involves isolating the

source of the fault to determine its basis. This requires a systematic approach to

troubleshooting that involves the collection of information analyzing the logs and

identifying the network elements or systems that are affected.

3. Fault Diagnosis: Fault diagnosis is the second step of fault management. Once a fault has

been detected, its cause must be determined. Fault diagnosis involves analyzing the

symptoms of the fault, such as packet loss or latency, and determining the root cause. The

underlying cause and appropriate remedial action is determined through fault diagnosis.

Network protocols are analyzed, hardware and software configurations and other factors

that may be contributing to the fault.

4. Fault Resolution: Fault resolution is the third step of fault management. Once the cause

of the fault has been determined, the necessary corrective action must be taken. This may

involve reconfiguring the network or replacing faulty hardware or software. After

identifying the cause of the story corrective action to stop the fault is therefore taken.

Repairing and replacing faulty network components is done. Reconfiguring network

settings or implementing software patches or updates. It also requires collaboration

between different teams or vendors, depending on the complexity of the fault.


5. Fault Prevention: Fault prevention is the fourth and final step of fault management. Once

the fault has been resolved, it is important to take steps to prevent similar faults from

occurring in the future. This may involve implementing proactive monitoring tools or

changing network policies. To prevent similar faults from occurring in the future, you

implement best practices for network designs, configurations management, and security.

Regular network monitoring and maintenance to detect and address potential issues

before they become more serious.

In conclusion, fault management is a critical component of network management. It helps ensure

the reliability and availability of the network services and helps reduce downtime. Fault

management has also ensured that one has taken proactive approach to network as well as

maintenance.

7. Describe the following techniques adopted to reduce

configuration challenges in heterogeneous network

environment.

script based configuration

Script-based configuration is a type of computer system configuration in which a script is used to

set up and configure a computer. This type of configuration typically involves the use of a

software program that is designed to run scripts written in a programming language such as

Python, JavaScript, or Bash. The scripts can be used to perform a variety of tasks such as setting
up user accounts, configuring software, and configuring system settings. Script-based

configuration can be used to automate the installation and configuration of software and

hardware, as well as to provide a more efficient way of managing system configurations.

reusing configuration setting in a network

Reusing configuration settings in a network can help to improve efficiency and reduce errors. It

can also help to save time when making changes to the network. For example, if a network

administrator is setting up a new network, they can reuse the same configuration settings from a

previously created network. This can save time in the setup process and ensure that the new

network is set up correctly. Additionally, reusing configuration settings can help to reduce errors,

as the same settings are used across multiple networks, reducing the chances of mistakes being

made.

model based configuration management

Model-based configuration management (MBCM) is a system used to manage configurations of

networking devices. It is an automated process that enables the efficient and consistent

management of network configuration data. MBCM uses a model of the network infrastructure

and its components to ensure that all devices are configured correctly and consistently. It also

provides a centralized platform for monitoring, controlling, and maintaining network

configurations. MBCM enables the configuration of a large number of network components in an

automated fashion. It can also be used to detect configuration drift, which is when network

devices are not configured according to the desired configuration. MBCM can be used to track

changes in configurations, and even alert administrators of any unauthorized changes. In

addition, MBCM provides a centralized platform for managing and auditing configuration data.
This helps ensure that all devices are configured properly and in accordance with security

policies. MBCM can also provide valuable insights into network performance, allowing

administrators to quickly make adjustments if needed.

configuration workflows in the configuration of a more complex environment

1. Establish the scope of the project: Determine the goals, objectives, and timeline for the

project.

2. Gather requirements: Identify the stakeholders and their requirements for the project.

3. Develop the architecture: Design the solution architecture, including the hardware, software,

and network components required.

4. Configure the environment: Configure the hardware, software, and network components

according to the architecture.

5. Test the system: Test the system to ensure that it meets the requirements. 6. Deploy the

system: Deploy the system to the production environment.

7. Monitor and maintain the system: Monitor the system for performance and maintain it

according to best practices.

QUESTION 8

"FastEthernet5/4 is up, line protocol is up": This indicates that the interface is physically

connected and the line protocol is active.


"Hardware is Fast Ethernet, address is 0012.7f8e.e820 (bia 0012.7f8e.e820)": This displays the

type of hardware and the MAC address of the interface.

"Description: Example Interface": This is a user-defined description of the interface.

"MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec": This shows the Maximum Transmission

Unit (MTU) size, bandwidth (in Kbps), and delay (in microseconds) of the interface.

"reliability 255/255, txload 1/255, rxload 1/255": These values represent the reliability of the

interface, as well as its transmit and receive loads.

"Encapsulation ARPA, loopback not set": This displays the encapsulation method used on the

interface, as well as whether or not loopback is enabled.

"Keepalive set (10 sec)": This indicates the keepalive timer is set to 10 seconds.

"Full-duplex, 10Mb/s, media type is 10/100BaseTX": This shows the current duplex setting,

speed, and media type of the interface.

"input flow-control is off, output flow-control is unsupported": This displays the current flow

control settings for input and output.

"ARP type: ARPA, ARP Timeout 04:00:00": This displays the Address Resolution Protocol

(ARP) type and timeout value.

"Last input 00:00:01, output 00:00:01, output hang never": These values show the last time data

was input and output on the interface, and whether or not there have been any output hangs.

"Last clearing of 'show interface' counters never": This displays the last time the counters were

cleared for this interface.


"Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0": This shows the current

input queue status, as well as the total number of output drops.

"Queueing strategy: fifo": This indicates the queuing strategy being used for the interface.

"Output queue: 0/40 (size/max)": This shows the current output queue status.

"5 minute input rate 1000 bits/sec, 2 packets/sec": These values show the average input rate over

the past 5 minutes.

"5 minute output rate 1000 bits/sec, 2 packets/sec": These values show the average output rate

over the past 5 minutes.

"10000 packets input, 1000000 bytes, 0 no buffer": This displays the total number of packets

and bytes received on the interface, as well as the number of packets that were not buffered.

"Received 10000 broadcasts (0 multicasts)": This shows the number of broadcast and multicast

packets received on the interface.

"0 runts, 0 giants, 0 throttles": These values indicate the number of runts, giants, and throttles on

the interface.

"0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored": These values indicate the number of

input errors, CRC errors, framing errors, overruns, and ignored packets on the interface.

"0 watchdog, 0 multicast, 0 pause input": These values indicate the number of watchdog

timeouts, multicast packets, and pause frames

You might also like