Structure Of Management Information

Sample essay topic, essay writing: Structure Of Management Information - 1393 words

Computer Network & ManagementAssignmentTitle: Structure of Management Information (SMI) Structure of Management Information (SMI):In the context of network management, for the Structure of Management Information (SMI):a) Name its three hierarchical layers. The Structure of Management Information (SMI) standard is responsible for defining the rules for how the Management Information Base (MIB) objects are structured, described and organized. SMI is a data definition language allows dissimilar devices to communicate by ensuring that they use a universal data representation for all management information. SMI is needed to ensure the syntax and semantics of the network management data are well defined and unambiguous.[TCP/IP Guide]The three hierarchical layers of the Structure of Management Information are the base data types, object-type and module-identity. b) Explain the function of each layer. The Base Data Type layer is use in the SYNTAX clause of the OBJECT-TYPE macro that must be present. It defines the abstract data structure corresponding to the object. It includes the following eleven basic data types: INTEGER, Integer32, Unsigned32, OCTET STRING, OBJECT IDENTIFIER, IPaddress, Counter32, Counter64, Gauge32, TimeTicks, and Opaque.

Any restriction on size, range or enumerations specified in this SYNTAX clause represents the maximal level of support which makes 'protocol sense'.[RFC2578]The OBJECT-TYPE layer is use to specify the data type, status, and the semantics of managed objects. It has basic of five mandatory characteristics namely, OBJECT-NAME, SYNTAX, MAX ACCESS, STATUS, and DESCRIPTION, optionally with OPTIONAL-CHARACTERISTICS. The OBJECT-NAME is obviously. The SYNTAX clause specifies the basic data type of the object. The MAX-ACCESS clause specifies the managed object either can be read-create, read-write, read-only, accessible for notify only, or not accessible

The STATUS clause specifies the object is current, obsolete or deprecated. The DESCRIPTION clause contains a textual definition of the object. [RFC2578][RFC2013]The MODULE-IDENTITY layer is used to express concisely the semantics of an information module. It groups related object into a Management Information Base (MIB) module. Each MODULE-IDENTITY contains a number of clauses like the LAST-UPDATED clause, ORGANIZATION clause, CONTACT-INFO clause, DESCRIPTION clause and REVISION clause. Theses clauses document the date of last updated, the organization and contact information of the author of the module, and a textual description of the module, and the revision information such as the date of revision and the revision description.[RFC2012][TCP-IP Guide]c) For each layer, give four examples of defined entities. Four examples of Base Data Types1.

Integer/Integer32 [RFC2578]Integer/Integer32 is a 32-bit signed integer in two!|s complement notation, capable of holding a value between! V2,147,483,648 and +2,147,483,647.2. Network Address/IpAddress [RFC2578] It is an IP address, encoded as a 4-byte octet string.3. TimeTicks [RFC2578] Time Ticks is a 32-bit unsigned integer that indicates the number of hundredths of seconds since some arbitrary start date. Used for time stamping and to compute elapsed time.4. Counter64 [RFC2578]Counter64 is a counter of 64 bits wide, allowing a value between 0 to 18,446,744,073,709,551,615.

Four examples of Object Type1) Total number of input datagrams successfully delivered ipInDelivers OBJECT-TYPESYNTAX Counter32MAX-ACCESS read-onlySTATUS currentDESCRIPTION'The total number of input datagrams successfully deliveredto IP user-protocols (including ICMP).'::= { ip 9 }[RFC2011]2) TCP Maximum number of connectionstcpMaxConn OBJECT-TYPESYNTAX Integer32 (-1 | 0.2147483647)MAX-ACCESS read-onlySTATUS currentDESCRIPTION'The limit on the total number of TCP connections the entitycan support. In entities where the maximum number ofconnections is dynamic, this object should contain thevalue -1.'::= { tcp 4 }[RFC4022]3) UDP Local port numberudpLocalPort OBJECT-TYPESYNTAX INTEGER (0.65535)MAX-ACCESS read-onlySTATUS currentDESCRIPTION'The local port number for this UDP listener.'::= { udpEntry 2 }[RFC2013]4) Object counter on total number of packets counted on this priority levelsmonPrioStatsPkts OBJECT-TYPESYNTAX Counter32UNITS 'packets'MAX-ACCESS read-onlySTATUS currentDESCRIPTION'The total number of packets counted on this priority level.'::= { smonPrioStatsEntry 2 }[RFC2613]Four examples of Module Identity1) Internet Protocol MIBipMIB MODULE-IDENTITYLAST-UPDATED '9411010000Z'ORGANIZATION 'IETF SNMPv2 Working Group'CONTACT-INFO' Keith McCloghriePostal: Cisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USPhone: +1 408 526 5260Email: kzm@cisco. com'DESCRIPTION'The MIB module for managing IP and ICMP implementations, but excluding their management of IP routes.'REVISION '9103310000Z'DESCRIPTION'The initial revision of this MIB module was part of MIB-II.'::= { mib-2 48}[RFC2011]2) Transmission Control Protocol MIBtcpMIB MODULE-IDENTITYLAST-UPDATED '2012 02180000Z' -- 18 February 2012 ORGANIZATION'IETF IPv6 MIB Revision Teamhttp://www. ietf. org/html. charters/ipv6-charter .html'CONTACT-INFO'Rajiv Raghunarayan (editor)Cisco Systems Inc.170 West Tasman DriveSan Jose, CA 95134Phone: +1 408 853 9612Email: Send comments to 'DESCRIPTION'The MIB module for managing TCP implementations. Copyright (C) The Internet Society (2012 ). This versionof this MIB module is a part of RFC 4022; see the RFCitself for full legal notices.'REVISION '2012 02180000Z' -- 18 February 2012 DESCRIPTION'IP version neutral revision, published as RFC 4022.'REVISION '9411010000Z'DESCRIPTION'Initial SMIv2 version, published as RFC 2012.'REVISION '9103310000Z'DESCRIPTION'The initial revision of this MIB module was part ofMIB-II.'::= { mib-2 49 }[RFC4022]3) User Datagram Protocol MIBudpMIB MODULE-IDENTITYLAST-UPDATED '9411010000Z'ORGANIZATION 'IETF SNMPv2 Working Group'CONTACT-INFO' Keith McCloghriePostal: Cisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USPhone: +1 408 526 5260Email: kzm@cisco. com'DESCRIPTION'The MIB module for managing UDP implementations.'REVISION '9103310000Z'DESCRIPTION'The initial revision of this MIB module was part of MIB-II.'::= { mib-2 50 }[RFC2013]4) MIB module for managing Remote Monitoring device implementations for Switched NetworksswitchRMON MODULE-IDENTITYLAST-UPDATED '9812160000Z'ORGANIZATION 'IETF RMON MIB Working Group'CONTACT-INFO'IETF RMONMIB WG Mailing list: rmonmib@cisco. comRich WatermanAllot Networks Inc. Tel: +1-408-559-0253Email: rich@allot. comBill LahayeXylan Corp. Tel: +1-800-995-2612Email: lahaye@ctron. comDan RomascanuLucent TechnologiesTel: +972-3-645-8414Email: dromasca@lucent. comSteven WaldbusserInternational Network Services (INS)Tel: +1-650-318-1251Email: waldbusser@ins. com'DESCRIPTION'The MIB module for managing remote monitoring deviceimplementations for Switched Networks'-- revision historyREVISION '9812160000Z' -- 16 Dec 1998 midemightDESCRIPTION 'Initial Version, published as RFC 2613.'::= { rmon 22 }[RFC2613]Reference List[Bradley]Tony Bradley, VPN!|s: IPSec vs. SSL, http://netsecurity. about. com/cs/generalsecurity/a/ aa111703 p. htm, 2012 [DCCP] E. Kohler, M. Handley & S. Floyd, Datagram Congestion Control Protocol, Internect Engineering Task Fore, November 2004[Ixia, IPv6] Dean Lee, Elliott Stewart, Internet Protocol version 6 (IPv6) Conformance and Performance Testing, White Paper, Ixia, 2004[Ixia, IPSec] Ixia, IPSec Virtual Private Networks Conformance and Performance Testing, White Paper, Ixia, 2003[Kurose & Ross] James F Kurose & Keith W Ross, Computer Networking! V A Top Down Approach Featuring the Internet, (2nd Edition), Addision-Wesley, ISBN: 0 321 17644-8 (the International Edition), ISBN 0-201-97699-4.[Netilla 1] Netilla Networks Inc, A Comparison of VPN Solutions: SSL VS IPSec: A Netilla Networks White Paper, 2003[Netilla 2] Netilla Networks Inc, A Functional and Cost Comparison of VPN Solutions: SSLvs. IPSec, 2002[Perkins] Colin Perkins, Building Adaptive Applications: On The Need For Congestion Control, Dec 2004[POP3] POP3, http://searchexchange. techtarget. com/sDefinition/0 ,290660,sid43 gci212805,00.html[RFC768] J.

Postel, User Datagram Protocol, RFC768, Aug 1980[RFC1752] S. Bradner & A. Mankin, The Recommendation for the IP Next Generation Protocol, RFC1752, January 1995[RFC1939] J. Myers, Carnegie Mellon & M. Rose, Post Office Protocol - Version 3, RFC1939, May 1996[RFC2011] K.

McCloghrie, SNMPv2 Management Information Base for the Internet Protocol using SMIv2, RFC2011, November 1996[RFC2013] K. McCloghrie, SNMPv2 Management Information Base for the User Datagram Protocol using SMIv2, RFC2013, November 1996[RFC2131] N R. Droms, Dynamic Host Configuration Protocol, RFC2131, March 1997[RFC2401] S. Kent, R. Atkinson, Security Architecture for the Internet Protocol, November 1998[RFC2460]S. Deering, Internet Protocol, Version 6 (IPv6), RFC2460, December 1998[RFC2578] K.

McCloghrie, D. Perkins, J. Schoenwaelder, Structure of Management Information Version 2 (SMIv2), RFC2578, April 1999[RFC2579] K. McCloghrie, D. Perkins, J. Schoenwaelder, Textual Conventions for SMIv2, RFC2579, April 1999[RFC2580] K.

McCloghrie, D. Perkins, J. Schoenwaelder, Conformance Statements for SMIv2, RFC2580, April 1999[RFC2613] R. Waterman, B. Lahaye, D. Romascanu, S. Waldbusser, Remote Network Monitoring MIB Extensions for Switched Networks Version 1.0, RFC2613, June 1999[RFC4022] R.

Raghunarayan, Transmission Control Protocol (TCP), RFC4022, Mar 2012 [Router]Curt Franklin, How Routers Work? http://computer. howstuffworks. com/router1.htm, 2003[TCP/IP Guide] Charles M. Kozierok, The TCP/IP Guide, www. TCPIPGuide. com, Version 2.0, June 7, 2004.[UTP Cable] Cabling, http://members. tripod. com/barhoush 2/cabling. htm[UDP Apps] http://www2.rad. com/networks/2004/udp/udpapps. htm[ UDP 1] Roger A. Grimes, UDP vs. TCP, http://www. windowsitpro. com/Article/ArticleID/4031 5/40315.html, Oct 2003[VPN]Peter Southwick, Virtual Private Network Implementation and Concepts, http://www. hill. com/archive/pub/papers/papers. asp? yr=2003&mn=08, August 2003BibliographyJames F Kurose & Keith W Ross, Computer Networking! V A Top Down Approach Featuring the Internet, (2nd Edition), Addision-Wesley, ISBN: 0 321 17644-8 (the International Edition), ISBN 0-201-97699-4.Michael J. Palmer & Robert Bruce Sinclair, Advanced Networking Concepts, Course Technology, ISBN 0-7895-0195-3Houston H.

Carr & Charles A. Snyder, The Management of Telecommunications - Business Solutions to Business Problems, The McGraw-Hill Companies, ISBN 0-256-21961-3William Stallings & Richard Van Slyke, Business Data Communications, (Third Edition), Prentice Hall, ISBN 0-13-594581-X.

Research paper and essay writing, free essay topics, sample works Structure Of Management Information




Please do not pass this sample essay as your own, otherwise you will be accused of plagiarism. Our writers can write any custom essay for you!
Like this post? Please share to your friends:
Mann Erudite – Essays on Literary Works