70 research outputs found
MICA: A MID Compiler in Java
Management Information Bases (MIBs) define the attributes of objects managed by the Simple Network Management Protocol (SNMP). An SNMP application uses the information in one or more MIBs to learn the attributes of the objects supported by the managed devices in a network. MIBs in source form are not directly usable; they must first be compiled into a format acceptable to the SNMP application. Java's built-in network facilities make it an ideal language for writing SNMP applications, so the need arises for a Java-based MIB compiler. The MICA project is the design and implementation a Java class library that treats a MIB as an abstract data type (ADT). Java-based SNMP applications use this ADT to compile MIBs and extract their information.http://deepblue.lib.umich.edu/bitstream/2027.42/107925/1/citi-tr-97-1.pd
Recommended from our members
Protecting SNMP Through MarketNet
As dependency on information technology becomes more critical so does the need for network computer security. Because of the distributed nature of networks, large-scale information systems are highly vulnerable to negative elements such as intruders and attackers. The types of attack on a system can be diverse and from different sources. Some of the factors contributing to creating an insecure system are the relentless pace of technology, the need for information processing, and the heterogeneity of hardware and software. In addition to these insecurities, the growth and success of e-commerce make networks a desirable target for intruders to steal credit card numbers, bank account balances, and other valuable information. This paper looks at two different security technologies, SNMP v3 and MarketNet, their architectures and how they have been developed to protect network resources and services, such as, internet applications, devices, and other services, against attacks
A uniform resource identifier scheme for SNMP
One of the World Wide Web characteristics, besides its omnipresence in computer systems, is the adoption of a universal user interface that is used to access several different services that were previously accessed individually by independent applications. The Internet resources started to be identified by URI schemes, a text string with specific syntax and grammar. Although existing for several services such as http, ftp, gopher and news, these identifiers are not used to identify SNMP resources. This paper proposes an URI scheme for identifying SNMP resources and presents some practical scenarios where the existence of such compact and complete identifying mechanism increases flexibility and functionality of network management applications
A new mechanism for distributed managers persistence
SNMP is currently a worldwide used network management framework. However, it only
describes the structure of management information and how to access it, i.e., low-level
operations, presenting no considerations about information interpretation or other highlevel
tasks.
Recent work in this area has managed to define several modules suitable for management
distribution (DISMAN), which implies building agents that can cope with rather complex
information structures. In the case of information loss, for example due to an agent reset,
it is not practicable to force the management station to define and configure the
information once again.
In this paper we present an XML based data model that can provide a structure for
distributed managers persistency. Moreover, it can be used to define macros to group
together elementary SNMP operations and to describe what should a mobile agent do
when meeting some SNMP agent
Initial service management architecture
This document describes D2.2 of the Internet Next Generation project. Internet Next Generation is a project performed within the context of the Gigaport programme, and is funded by many organizations within the Netherlands. The architecture that is described within this document explains how customers of a Differentiated Services (DiffServ) network can manage the service that is provided by them, by reading and modifying QoS parameters in an interactive way. Which parameters are available and which values these parameters can take, is defined in the Service Level Specification (SLS), which is part of the Service Level Agreement (SLA). The form of management in which customers can modify the behaviour of the provided service is called Customer Service Management (CSM); the idea that customers can manage the behaviour of the provided service is not only interesting in case of DiffServ, but also in cases like Mobile IP, IP security or Virtual Private Networks (VPNs). The scope of this deliverable is restricted to QoS management in a DiffServ environment; a subsequent deliverable will extend this work and address how service .management can be performed in other environments, like IntServ / RSVP. This new deliverable will also address the problem of inter domain management
MANET Network Management and Performance Monitoring for NHDP and OLSRv2
Mobile Ad Hoc NETworks (MANETs) are generally thought of as infrastructureless and largely ``un-managed'' network deployments, capable of accommodating highly dynamic network topologies. Yet, while the network infrastructure may be ``un-managed'', monitoring the network performance and setting configuration parameters once deployed, remains important in order to ensure proper ``tuning'' and maintenance of a MANET. This memorandum describes a management framework for the MANET routing protocol OLSRv2, and its constituent protocol NHDP. It does so by presenting considerations for ``what to monitor and manage'' in an OLSRv2 network, and how. The approach developed is based on the Simple Network Management Protocol (SNMP), and thus this paper details the various Management Information Bases (MIBs) for router status monitoring and control -- as well as a novel approach to history-based performance monitoring. While SNMP may not be optimally designed for MANETs, it is chosen due to it being the predominant protocol for IP network management -- and thus, efforts are made in this paper to ``adapt'' the management tools within the SNMP framework for reasonable behavior also in a MANET environment
Traffic measurement and analysis of Wide Area Network (WAN) link usage: a case study of UiTM Perlis campus network / Abidah Mat Taib, Rafiza Ruslan and Abdul Hadi Kamel Abdullah
Network users normally will start complaining when the response time for the network access is intolerable or their network access is intermittently interrupted due to unclear reasons. Knowing how the network bandwidth is being utilized by the users will give the administrator some ideas of possible reasons for the network access problems and how to alleviate the problems. Some users may just use the network for running non bandwidth intensive applications like email and telnet and some users may use the network for running bandwidth intensive application such as video streaming and downloading big files using ftp application. Many users may visit popular web sites that are not related to their work during office hours. The above information about bandwidth utilization on a network link can be acquired through measurement and analysis of the network traffic that pass through the link. This paper discuss real time passive measurement of the network traffic on the WAN link that connects UiTM Perlis campus network to the main campus of UiTM in Shah Alam. The analysis of the traffic helped us to know some aspects of the WAN link utilization. This includes the average bandwidth utilization, popular application layer protocols and popular websites among different user segments and also some anomalies found in the captured trace
An entity access control model for network services management
The Network Services Management Framework tries to overcome the most important limitations of present network management frameworks, namely the most widely supported framework – the Internet Network Management Framework – by defining a management framework using a network services management distributed architecture that provides services management functions with any desired level of functionality. This document introduces one of the most important parts of this framework, the Entity Access Control Model and the mechanisms needed to its deployment: management entities and management domains, entity access and resources control management, and security mechanisms (authentication, data integrity verification, confidentiality and non-repudiation assurances). This model, although originally developed to be integrated on the Network Services Management Framework, can be completely integrated or partially adopted by other frameworks since it supports a wide range of conceptual and functional requisites recognised to be fundamental to the future of modern distributed network management frameworks
Multi-channel monitoring approach of E1 streams
The object of development is a device for multi-channel monitoring of the El stream state. The subject of the development is the monitoring of the status of the channels and analysis of traffic in each time slot of the El stream. The purpose of this paper is to develop an approach that allows multi-channel monitoring of the El stream state
- …