Professional Documents
Culture Documents
Department of Computer
Science
Advanced Computer
Networking
(CS 723)
Chapter 9: Network Management
(Chapter 8: Network Security)
(Chapter 10: Next Generation Networking)
Chapter 8: Network Security
What is network security?
Confidentiality: only sender and intended receiver
should understand message contents
sender encrypts message
receiver decrypts message
Authentication: sender and receiver want to confirm
identity of each other
Message integrity: sender and receiver want to
ensure that message is not altered (in transit, or
afterwards) without detection
Access and availability: services must be accessible
and available to users
Alice Bob
data, control
channel
messages
Trudy
W. Stallings
managed device
SNMP protocol
convey information and commands between manager and
managed objects (agent executing on behalf of the managing
entity within a managed network)
Security administration capabilities
major addition in SNMPv3
Network Management 9-12
SNMP MIB
MIB object might be a counter such as the number
of IP datagrams discarded at a router due to error
in the datagram header...
Related MIB objects are gathered into MIB modules
MIB modules are specified via SMI
1.3.6.1.2.1.7.1
ISO udpInDatagrams
ISO-ident. Org. UDP
US DoD MIB2
Internet management
Network Management 9-16
OSI: Object Identifier Tree
managing managing
entity entity
request
trap msg
response
Value, 259
Length, 2 bytes
Type=2, integer
Self Management
Self organization
Self healing
Applications
Wireless ad hoc network
Wireless community network
Mobile ad-hoc network
(MANET)
Vehicular ad-hoc network
(VANET)