Simple Network Management Protocol: Network Management MR Sherrif Moussa Done By: Ronak S Aswaney, ID:0710229

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 14

SNMP

Simple Network Management Protocol

Network Management
Mr Sherrif Moussa
Done By: Ronak S Aswaney, ID:0710229
Objectives
 Understand what is a SNMP.
 Know the components of a SNMP.
 Understand the Interactions in a SNMP.
 Understand how the SNMP protocol works.
Introduction
 SNMP is a framework that provides facilities for managing and monitoring
network resources on the Internet.
 Components of SNMP:
◦ SNMP agents
◦ SNMP managers
◦ Management Information Bases (MIBs)
SNMP agent
◦ SNMP protocol itself SNMP
manager

SNMP agent
SNMP
protocol
messages
SNMP agent
Components of SNMP
 SNMP agent is software that runs on a piece of network equipment (host,
router, printer, or others) and that maintains information about its
configuration and current state in a database.

 Information in the database is described by Management Information


Bases (MIBs).

 An SNMP manager is an application program that contacts an SNMP agent


to query or modify the database at the agent.

 SNMP protocol is the application layer protocol used by SNMP agents and
managers to send and receive data.
Advantages of using SNMP
 Standardized.
 Universally supported.
 Extendible.
 Portable.
 Allows distributed management access.
 Lightweight protocol.
SNMP in The OSI Model
Interactions in SNMP
Management Station Managed System

SNMP Manager SNMP Agent


Process Process MIB
Queries

Replies

Access
objects
Traps

Traps
Data
SNMP SNMP messages SNMP
UDP UDP
IP IP

IP Network
Traps
 Traps are unrequested event reports that are sent to a management
system by an SNMP agent process.
 When a trappable event occurs, a trap message is generated by the agent
and is sent to a trap destination (a specific, configured network address).
 Many events can be configured to signal a trap, like a network cable fault,
failing NIC or Hard Drive, a “General Protection Fault”, or a power supply
failure.
 Traps can also be throttled -- You can limit the number of traps sent per
second from the agent.
 Traps have a priority associated with them -- Critical, Major, Minor,
Warning, Marginal, Informational, Normal, Unknown.
MIBS
 A MIB specifies the managed objects.

 MIB is a text file that describes managed objects using the syntax of ASN.1
(Abstract Syntax Notation 1).

 ASN.1 is a formal language for describing data and its properties.


Managed Objects
 Each managed object is assigned an object identifier (OID)
 The OID is specified in a MIB file.
 An OID can be represented as a sequence of integers separated by decimal
points or by a text string:
Example:
◦ 1.3.6.1.2.1.4.6.
◦ iso.org.dod.internet.mgmt.mib-2.ip.ipForwDatagrams

 When an SNMP manager requests an object, it sends the OID to the SNMP
agent.
 Managed objects are organized in a tree-like hierarchy and the OIDs reflect
the structure of the hierarchy.
SNMP Protocol
 SNMP manager and an SNMP agent communicate using the SNMP
protocol
◦ Generally: Manager sends queries and agent responds
◦ Exception: Traps are initiated by agent.
SNMP Protocol Cont.
 Get-request. Requests the values of one or more objects.

 Get-next-request. Requests the value of the next object, according to a


lexicographical ordering of OIDs.

 Set-request. A request to modify the value of one or more objects.

 Get-response. Sent by SNMP agent in response to a get-request, get-


next-request, or set-request message.

 Trap. An SNMP trap is a notification sent by an SNMP agent to an SNMP


manager, which is triggered by certain events at the agent.
SNPM - UDP
 SNMP uses User Datagram Protocol (UDP) as the transport mechanism for
SNMP messages.
Conclusion
 SNMP information technology systems-monitoring has grown dramatically
and has drastically reduced the requirement for administrators to
manually monitor individual network components.

 SNMP provides many of the tools necessary to collect and analyze data to
enable system tuning for optimum performance and to identify when and
where future growth in the network is required.

 THANK YOU !!!


 ANY QUESTIONS?

You might also like