Network management review

One browse, no details

Architecture
Insert picture description here
1.2
Five major energy supply domains
Insert picture description here

1.3
Four parts of the network management system
Insert picture description here
Manager, agent, network protocol, mib
Insert picture description here
NME network management entity

Centralized distributed distinction
centralized management station a plurality of managed objects
distributed management of a plurality of co-station managed objects, wherein the managed domain
agency

Insert picture description here
When there are non-standard equipment to be managed, an agent is required

1.4
Communication between management station and agent (polling: request and response, event report: trap)
1.5
Network monitoring
Two calculations (emphasis):
availability
Insert picture description here
Utilization rate: failure-free time/total time
Insert picture description here
series and parallel, probability
Insert picture description here
Insert picture description here
calculation steps are Three times, calculate the probability of two at the first time, and calculate the probability of one at the
second time. The second time the peak and non-peak availability are calculated. The
third weighted
response time is
Insert picture description here
divided into going and returning.
Utilization (load, capacity, relative load, relative utilization) is
Insert picture description here
Insert picture description here
a simple eg: Link 1: Relative load: 30/200, capacity 40/400, utilization rate 0.15/0.1=1.5
1.6
Browse
** Identify what is that functional domain

Two important points, but no small points, no doubts.
2.2
BNF (interger page 89) is legally selected

Insert picture description here
Insert picture description here
One and two are correct, one is a number, a positive number, and the other is an identifier. There is no such
ColorType capitalization type definition of identifier (integer)

Other BNF does not look

coloerA lowercase, value definition

Master ASN.1

Insert picture description here
Pay attention to case
Name case
Type definition
Insert picture description here
Value definition (no memory space allocated)
Insert picture description here
Label definition:
Insert picture description here
2.1 Table five types
Insert picture description here

set no need to watch

Insert picture description here
Tag category: universal, application, context-specific, private
Data type: simple (INTEGER, OCTET STRING is left unchecked), structured, tagged, ohter
Insert picture description here
Insert picture description here
Insert picture description here
eg: abc is the son of 13614, number 88
hardware is the son of abc, number For the first
question, you can try to give information and then make a tree diagram. The
Insert picture description here
five types are that sequence is a structural type.
Insert picture description here
Learn to define
Insert picture description here
the difference between a sequence type and a sequence of. For
Insert picture description here
other types, look at the choice, there is no label. Then confirm the assignment to confirm the tag. The
Insert picture description here
Insert picture description here
above is just a type reference, and the tags and tags of the previous type are used.

The
Insert picture description hereoriginal type of the label type has a new label.
Implicit and explicit Insert picture description here
. Subtype: value range, can be recognized when you see it
Insert picture description here

2.3
Master all BER coding
Five general types + 5/6 types of snmp applications
Insert picture description hereInsert picture description here
Insert picture description here

Tag only remembers the short format
Insert picture description here
Insert picture description here
Insert picture description here
00000001 00000000 is 256
1 is fixed, which means there will be more later. 10000010 means the following 10 means there are two more bytes
length

Value is
Insert picture description here
because boolean is universal 01, so t is 01 and
depends on null, the positive and negative of the integer,
Insert picture description here
Insert picture description here
oid short and long format,
Insert picture description here
oid type
Insert picture description here
Insert picture description here
1*40+3=43/16=2B (combined only the first two digits),
long format:
Insert picture description here
Insert picture description here

seven One group and then make up eight digits. The
last octet one is 0
Insert picture description here
sequence, 30->00 1 10000 (16),
Insert picture description here
pay attention to the specific type and label

Implicit and explicit
Insert picture description here
Insert picture description here
Note here, even if it is a simple type, the PC bit here is 1. The explicit internal is an integer 02 (00 0 00002) L Note that it is 03

2.4
Module definition
Insert picture description here
EXPORTS FROM can be exported
IMPORTS FROM can be imported

Remember this DEFINITIONS

Macro Definition
Insert picture description here
Chapter 3


The community name is registered in the agent. The
get community name is wrong
. A trap will be sent, but it is not a response. It has nothing to do with get.
Four RFC
Insert picture description here
SMI
Insert picture description here
MIBs (the first five general types and five application types)
Insert picture description here
Insert picture description here
Insert picture description here
Insert picture description here
Insert picture description here
define management objects.
There are four managed objects. Elements
Insert picture description here
Object identifier (text name, OID), grammar, access, status, description (V2)
Insert picture description here
A managed object corresponds to a unique object type.
Insert picture description here
1212 adds many options to 1155. Improvements.
Insert picture description here
Insert picture description here
Managed objects are all leaf node
aggregation objects: table objects , Row objects (not leaves, no management information, tables should correspond to rows, rows correspond to columns. Also correspond to management objects),
non-aggregated objects: scalar objects, column objects (managed objects),
so distinguish between management objects and Tube object.
Insert picture description here
Scalar objects are leaf nodes.
Column objects are also leaf nodes. There are multiple instances.
Insert picture description here
Insert picture description here
Row object attributes are
Insert picture description here
column objects. The definition of the first column object

Insert picture description here
There is only one scalar object, so .0 at the end means an instance.
Insert picture description here
General rule:
Insert picture description here
Insert picture description here
Insert picture description here
fill in the last digit.
Special rule:

Insert picture description here
Insert picture description here
First determine that it is a variable-length string with special rules,
and then find the index column xyz to
find the abc identifier 1.3.6.1.2.1.2.2.2.1.2
Example 22 is written as follows.
Object identifiers do not know that you can write column names.
Indexes can be written as host
. Four characters, write 4 in the middle
1.3.6.1.2.1.2.2.2.1.2.4.104.111.115.116
that is, the
abc.4.host
Insert picture description here
network address, add 1 in the middle to indicate that it is an IP address
NetworkAddress type because it is a multiple choice question, The option has only one IpAddress,
so 1 is not the number of bytes written in it,
and the index of NetworkAddress is an ip, Insert picture description here
so OID.1.ip
Insert picture description here
itself is an OID type, and a few value
Insert picture description here
Insert picture description here
column objects must be added in between. Because there are multiple instances, so Index is needed. The
order of
Insert picture description here
the
Insert picture description here
dictionary is to be filled when the hole is dug . The order of the dictionary is getnext. The
mib-2
Insert picture description here
system group knows all.
Insert picture description here
Insert picture description here
Insert picture description here
Insert picture description here
For sysServices, it is necessary to count
which level of the device 76 = 64+8+4 application layer, transport layer, network layer
Insert picture description here
interface group You can see that the scalar object and the table object are brothers. The
interface group must master ifnumber

The child of the table object is the row object (emphasis)
The child of the row object is the column object

A look at the template of Experiment 1 is the key to understanding the importance of those groups

4.2 (Key points)

Insert picture description here
The trap is sent by the agent to the management station, and it is one-way.
Insert picture description here
As shown in the figure, the PDUs are all label types, and the trap is [4]
Insert picture description here
five types of PDU (ASN.1, BER must be mastered)
version number -1,
0 is v1
1 is
the
Insert picture description here
Insert picture description here
general PDU before the v2 community name : request identification, error status, error index, variable binding table.
Insert picture description here
Error status
Insert picture description here
Insert picture description here
Insert picture description here
getrequset/set is relatively simple.
Insert picture description here
getnext returns the next OID and value
Insert picture description here
L is a byte, 38 bytes.
Note that the PDU is all It is the SEQUENCE type.
If it is 2b 06 01 02 01 01 14, it is not 1.3.6.1.2.1.1.14, 14 is 20 to write 20
Insert picture description here
Insert picture description here
Insert picture description here
TrapPDU: manufacturer, proxy address, general trap type, special trap type, time stamp, variable binding The
first six types of the table are general traps, and the value 6 requires special traps.
Insert picture description here
161 for general PDU, 162 for trap

Insert picture description here
The son of the leaf node is his instance
Insert picture description here

4.7 (Key points)
Insert picture description here
inform (between management stations)
Insert picture description here
Insert picture description here
Insert picture description here
Insert picture description here
Insert picture description here
can be mixed without V1V2

In V2, the error may appear in the variable binding table, the error state, index 0 also depends on the variable binding table, there may be nosuchname and the
Insert picture description here
Insert picture description here
Insert picture description here
Insert picture description here
last one is the manufacturer ID: remember that it is not the system manufacturer, but the trap maker
Insert picture description here

Calculation
Insert picture description here
Error status (get)
4.5
Polling frequency
Insert picture description here
Insert picture description here
0.202 is 50ms 4+1ms 2=0.202s
Insert picture description here
4 50+2 500=1.2s
4.6
2578 Improve SMI for 1212
Insert picture description here
Insert picture description here

4.8V3
Insert picture description here
soctPDU
Chapter 5 The
Insert picture description here
difference between data table and control table

Insert picture description here
Utilization rate is the actual transmission bit number/theoretical
denominator bandwidth speed
Molecular formula packet overhead (64 preamble, 96 frame interval) + number of bytes*8

Draw stars (warning group).
Insert picture description here
This 123 is only at the beginning. The
remaining alarms have nothing to do with 123.
Insert picture description here
Insert picture description here
Chapter 6
Experiment 1

Insert picture description here
Write command (back system)
Insert picture description here
table operation
Chapter 7
Network management tasks 13
Insert picture description here
Chapter 8 Experiment 4
Insert picture description here.
Insert picture description here

Guess you like

Origin blog.csdn.net/qq_43430273/article/details/106925989