Sunday, May 8, 2011

Skype Will Not Detect Webcam

III Introduction to SNMP SNMP II Introduction to Introduction to SNMP

Hello!

This post will continue to study the protocol SNMP. Following a historical introduction previous post and study the components and protocol architecture, today we focus on the MIBs.

We saw in the previous post that each managed device contains an agent that accesses the physical device information and makes it accessible (and, sometimes, configurable) to the NMS. For example, an agent might respond to a request by reporting the number of bytes transmitted by an interface. These variables contain the information of the devices are known as managed objects. A collection of managed objects described in a document called the MIB, so you could say that the MIB files form the set of queries that a NMS can make to an agent.

The management information tree

All management information is defined so that each managed object in any MIB module, either standard or private, has a unique identifier, called object identifier (object identifier, OID .) The OID is a string of integers separated by dots, which places the object into a logical node of a tree known as the management information tree. The integers represent the nodes in the path from the root to the object itself. Each node has a label, which is the integer associated with the node itself, and a brief description.

For historical reasons, remain some nodes that are irrelevant to us and make the object identifiers are longer than necessary. The following figure shows the tree.


Objects that are of interest to us are under the mib-2 node under node snmp v2 and those who are under the node Enterprises. We will see that the managed objects that are related are organized into groups and subgroups, so we do not have thousands of nodes hanging directly mib-2 node, for example.

To take a look at management information tree, you can download a MIB browser and TKMib, available at Debian and Ubuntu repository:

$ sudo aptitude install TKMib
$
TKMib &


if you navigate to the group system, within the mib node -2, see all the managed objects in this group, as sysDescr, sysUpTime, sysName, sysLocation ...



The image shows how to select the object sysDescr we can see its OID, its type and access mode, your description ...

There are 2 types of managed objects, scalar and tabular:

  • scalar objects, SysUpTime as are those who can only return a result, they define a single instance of an object (a single leaf on the tree).
  • For tabular objects, however, there may be multiple instances (multiple leaves on the tree). Consider, for example, a device with multiple network cards in this case there will be a ifSpeed \u200b\u200bobject instance for each of the cards the computer.

In the next post will continue to study the SNMP protocol, focusing on messages management and security of the protocol.

Greetings!

Sources:
http://www3.rad.com/networks/applications/snmp/comp.htm Http://www.manageengine.com/network-monitoring/what-is-snmp.html

Ontario Requirements Concession Trailer



Hello!

This week, I will spend a number of entries to study the protocol SNMP, Simple Netowork Management Protocol - Protocol Simple Network Management, based on the great article of Debby Koren, "Dean" RAD University .

A historical review

Before the advent of SNMP, if you wanted to manage a set of network devices, you should have stations dedicated to management, perhaps with multiple windows for different types of information (statistics, activity, etc.) that were specific to each manufacturer. In fact, it was rare that a manufacturer had a common management station for all your devices.

There was a common protocol, but a lot of proprietary protocols. SNMP was developed to address this problem by offering a protocol for standardized network management so that they could use a common technology for exchanging information consistent between different devices on the network, even those from different manufacturers.

Since the publication of the first RFC SNMP over 20 years, SNMP has been updated several times and has become a standard which is implemented in almost all network devices. Although it was designed with elements of the Internet, you can find all kinds of devices that support it, as air conditioning. You can also use SNMP to manage software systems. SNMP can be used to monitor, configure and obtain information from devices or programs using graphical interfaces in expensive management teams or using a free management software or even from the CLI.

Components and Architecture

There are 4 basic components of SNMP:
  • managed nodes or network elements, which have an agent (agent).
  • At least one station network management (NMS)
  • Management Information
  • A management protocol of the network, using the NMS and the agents to exchange management information
A managed node can be any system, including a software system that has some kind of network connectivity. In fact, early in the development of SNMP, with the aim of demonstrating the versatility of the protocol, the company showed Epilogue how you could use SNMP to manage a toaster.

The agent that contains each node implements the protocol management SNMP. The agent is able to send, receive and parse SNMP messages. The agent interacts with the physical device and obtain the information needed to answer the queries of the NMS and to send trap messages (notification messages). The agent is also able to make changes to the configuration of the device following the instructions from the NMS requests. Agents therefore have to have an access control settings to manage the read / write privileges.

A station network management (NMS ) is a host that is capable of sending and receiving SNMP requests and parse responses and SNMP trap messages to / from the managed nodes. NMS There are many commercial software offers many features like the ability to "discover" the management of the network nodes, graphically displaying the nodes in a network map, using icons for each node type, display status information, statistics, etc.

The third component is the SNMP management information, which is obviously the information exchanged between agents and the NMS. We use the term managed object to refer to a management information unit. Ojo! Do not confuse a managed object to a managed device is not the same. A managed object is an abstract concept, is the definition of a information. For example, suppose you have a device that can change color, we could define a managed object called "color" and its corresponding definition would be "the color of the device."

A collection of related managed objects, which are defined in a document called MIB module (Management Information Base). We will see that there are some standard MIB modules, which are called simply MIBs, all devices must support SNMP. There are other standard MIB modules should be supported only by devices for which the MIB is relevant, and other private MIB specific to a particular manufacturer, containing definitions of managed objects for their teams.

For example, all SNMP manageable devices must have certain information such as IP address, to be considered compliant with the SNMP protocol, this information should be defined in a standard MIB that all devices must support . If the device has an Ethernet interface, then you should be able to provide certain information such as the number of collisions, and this information is defined in a MIB Ethernet, all devices with an Ethernet interface must support. Finally, a manufacturer of switches, for example, could offer a feature that makes their devices more attractive to customers: the switch can change color to blend into the closet. The manufacturer has to offer, therefore, a private MIB that contain a managed object for this purpose.

Therefore, MIBs contain objects representing managed resources, configuration, status, etc. of a system. Managed objects are assigned values \u200b\u200bto represent them, but not the value itself. For example, following the example of the managed object "color", its definition is "the color of the device" and its assigned value could be 0 for black, 1 for pink, 2 to gray, 3 for green, etc.. In this case, the object would be an integer, and value represent the entire color. Would be precisely the value of managed object which would be monitored and modified by NMS.

And this brings us to the last component of the management architecture: the management protocol of the network. But wait a moment, is not this what we call 'SNMP'? Is not the protocol SNMP network management? SNMP is that and more, as it defines the MIBs, architecture and protocol for exchanging messages. In this latter respect, the message exchange protocol between the NMS and the managed nodes, including the type of messages and formats is the protocol called network management.

We will see in the next outset that there are several types of SNMP messages, which allow the NMS to read and / or write information, and allow agents to send trap messages to notify or alarm of a certain situation.


Management Architecture


SNMP uses a client-server architecture as shown in the figure below:



As the pioneer NMS SNMP requests, while agents in different managed devices (router, switch, server and toaster) passively await these consultations, we can say that the NMS is the client and server agents. Agents listen requests on port UDP 161.

however, also contains the SNMP management protocol traps. As already mentioned, traps are unsolicited messages that are sent to the NMS by the agents to report unusual events or alarms on a given situation. As the agent is the one who initiates the connection, in this case the agents are clients and NMS servers, listening on UDP port 162.


In the next posts we will continue talking about SNMP, MIBs deepening the , the messages management and security of the protocol.

Greetings!

Wednesday, May 4, 2011

Developing Sudoku In C

BY WAY OF PRESENTATION PRESENTATIONS



This blog is designed to engage the work of students studying the subject of Education and Society in the Faculty of Education of Toledo. Also involved resources from New Technologies Applied to Education Diploma of Education students shared. Included

research on related topics, presentations, book reviews , presentations, blogs and websites designed by students.