8.1 What is Network Management?

Having made our way through the first seven chapters of this text, we're now well aware that a network consists of many complex, interacting pieces of hardware and software - from the links, bridges, routers, hosts and other devices that comprise the physical components of the network to the many protocols (in both hardware and software) that control and coordinate these devices.  When hundreds or thousands of such components are cobbled together by an organization to form a network, it is not surprising that components will occasionally malfunction, that network elements will be misconfigured, that network resources will be overutilized, or that network components will simply "break" (e.g., a cable will be cut, a can of soda will be spilled on top of router).  The network administrator, whose job it is to keep the network "up and running," must be able to respond to (and better yet, avoid) such mishaps.   With potentially thousands of network components spread out over a wide area, the network administrator in a network operations center (NOC) clearly needs tools to help monitor, manage, and control the network.  In this chapter, we'll examine the architecture, protocols, and information base used by a network administrator in this task.

Before diving in to network management itself, let's first consider a few illustrative "real-world" non-networking scenarios in which a complex system with many interacting components must monitored, managed, and controlled by an administrator. Electrical power-generation plants (at least as portrayed in the popular media, e.g., movies such as the China Syndrome) have a control room where dials, gauges, and lights  monitor the status (temperature, pressure, flow) of remote valves, pipes, vessels, and other plant components. These devices allow the operator to monitor  the plant's many components, and may alert the operator (the famous flashing red warning light) when trouble is imminent. Actions are taken by the plant operator to control these components.  Similarly, an airplane cockpit is instrumented to allow a pilot to monitor and control the many components that make up an airplane.   In these two examples, the "administrator" monitors remote devices and analyzes their data to ensure that they are operational and operating within prescribed limits (e.g., that a core meltdown of a nuclear power plant is not imminent, or that the plane is not about to run out of fuel), reactively controls the system by making adjustments in response the changes within the system or its environment, and proactively manages the system, e.g., by detecting trends or anomalous behavior that allows action to be taken before serious problems arise.  In a similar sense,  the network administrator will actively monitor, manage and control the system with which s/he is entrusted.

In the early days of networking, when computer networks were research artifacts rather than a critical infrastructure used by millions of people a day, "network management" was an unheard of thing.  If one encountered a network problem, one might run a few pings to locate the source of the problem and then modify system settings, reboot hardware or software, or call a remote colleague to do so. (A very readable discussion of the first major "crash" of the ARPAnet on October 27, 1980, long before network management tools were available, and the efforts taken to recover from and understand the crash is [RFC 789]).  As the public Internet and private intranets have grown from small networks into a large global infrastructure,  the need to more systematically manage the huge number of hardware and software components within these networks has grown more important as well.

network management: a motivating scenario
Figure 8.1-1: A simple scenario illustrating the uses of network management

In order to motivate our study of network management, let's begin with a simple example.  Figure 8.1-1 illustrates a small network consisting of three routers, and a number of hosts and servers.  Even in such a simple network, there are many scenarios in which a network administrator might benefit tremendously from having appropriate network management tools:

The ISO, the organization that gave us  the well-known 7-layer ISO reference model (see Chapter 1), has also created a network management model, that is useful for placing the above anecdotal scenarios in a more structured framework. Five areas of network management are defined: In this chapter, we'll cover only the rudiments of network management.  Our focus will  be purposefully narrow - we'll examine only the infrastructure for network management - the overall architecture, network management protocols, and information base through which a network administrator "keeps the network up and running." We'll  not cover the decision making processes of the network administrator, who must plan, analyze, and respond to the management information that is conveyed to the NOC.  In this area, topics such as fault identification and management [Katzela 1995, Mehdi 1997], proactive anomaly detection [Thottan 1998], alarm correlation [Jakobson 1993], and more come into consideration.  Nor will we cover the broader topic of service management [Saydam 1996] - the provisioning of resources such as bandwidth, server capacity and the other computational/communication resources needed to meet the mission-specific service requirements of an enterprise. In this latter area, standards such as TMN [Glitho 1995, Sidor 98] and TINA [Hamada 1997] are larger, more encompassing (and arguably much more cumbersome) standards that address this larger issue.  TINA, for example, is described as "a set of common goals, principles, and concepts cover the management of services, resources, and parts of the Distributed Processing Environment" [Hamada 1997].  Clearly, all of these topics are enough for a separate text, and would take us a bit far afield from the more technical aspects of  computer networking.  So, as noted above, our more modest goal here will be cover the important "nuts and bolts" of  the infrastructure through which the network administrator keeps the bits flowing smoothly

An often-asked question is "What is network management?" Our discussion above has motivated the need for, and illustrated a few of the uses of, network management.  We'll conclude this section with a single-sentence (albeit a rather long, run-on sentence) definition of network management from [Saydam 1996]:

It's a mouthful, but it's a good workable definition.  In the following sections, we'll add some meat to this rather bare-bones definition of network management.

References

[AT&T 1999] AT&T, "AT&T raises the bar on data networking guarantees," http://www.att.com/press/0198/980127.bsc.html
[Glitho 1995] R. Glitho and S. Hayes (eds.) , special issue on Telecommunications Management Network, IEEE Communications Magazine, Vol. 33, No. 3, (March 1995).
[Hamada 1997] T. Hamada, H. Kamata, S. Hogg, "An Overview of the TINA Management Architecture," Journal of Network and Systems Management, Vol. 5. No. 4 (Dec. 1997). pp. 411-435.
[Jakobson 1993] G. Jacobson and M. Weissman, "Alarm Correlation," IEEE Network Magazine, 1993, pp. 52-59.
[Katzela 1995] I. Katzela, and M. Schwartz. "Schemes for Fault Identification in Communication Networks," IEEE/ACM Transactions on Networking, Vol. 3, No. 6 (Dec. 1995), pp. 753-764.
[Larsen 1997] A. Larsen, "Guaranteed Service: Monitoring Tools," Data Communications, June 1997, pp. 85-94.
[Mehdi 1997] D. Mehdi and D. Tipper (eds.), Special Issue: Fault Management in Communication Networks, Journal of Network and Systems Management, Vol. 5. No. 2 (June 1997).
[RFC 789] E. Rosen, "Vulnerabilities of Network Control Protocols," RFC 789.
[RFC 2570]  J. Case, R. Mundy,  D. Partain,  B. Stewart, "Introduction to Version 3 of the Internet-standard Network Management Framework" RFC 2570, May 1999.
[Saydam 1996] T. Saydam and T. Magedanz, "From Networks and Network Management into Service and Service Management," Journal of Networks and System Management, Vol. 4, No. 4 (Dec. 1996), pp. 345-348.
[Sidor 1998] D. Sidor, TMN Standards: Satisfying Today's Needs While Preparing for Tomorrow, IEEE Communications Magazine, Vol. 36, No. 3 (March 1998), pp. 54-64.
[Thottan 1998] M. Thottan and C. Ji, "Proactive Anomaly Detection Using Distributed Intelligent Agents," IEEE Network Magazine, Vol. 12, No. 5 (Sept./Oct. 1998), pp. 21-28.
[UUnet 1999] UUnet, "Service Level Agreement," http://www.uk.uu.net/support/sla/


Copyright 1999. James F. Kurose and Keith W. Ross. All Rights Reserved.