Telecom Network Management - Course Handout


BIRLA INSTITUTE OF TECHNOLOGY & SCIENCE, PILANI
WORK INTEGRATED LEARNING PROGRAMMES
COURSE HANDOUT


Part A:  Content Design
Course Title
Telecom Network Management
Course No(s)
SS ZG582/ CSI ZG582
Credit Units
5
Credit Model
1: Class Room Hours
2: Students Preparation
2: Case Studies/Lab
 (1 credit unit translates to approximately 32 hours)
Course Author
Anita Ramachandran
Version No
1.1
Date
Nov 9, 2017


Text Book(s)

T1
Mani Subramanian, Network Management: Principles and Practice, 2nd edition, Pearson


Reference Book(s) & other resources

R1
Stallings, W., SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, Reading, MA: Addison-Wesley, 1998.
R2
Divakara K. Udupa, TMN Telecommunications Management Network, McGraw-Hill Professional Pub., 1999
R3
SNMP RFCs 1157, 1905, 2571, 2572, 2573
R4
http://net-snmp.sourceforge.net


Glossary of Terms


Module
M
Module is a standalone quantum of designed content. A typical course is delivered using a string of modules. M2 means module 2.
Recorded Lecture
RL
A recorded lecture will consist of a sequence of topic recordings (typically less 10 minutes each). There will be assessments between topic recordings to allow the learner test his/her understanding of video material previously viewed.
RL2.1 = Recorded Lecture 1 in module 2.
Contact session sub-module/topics
CS
Contact session topics refer to topics in form of concepts, discussions items, problems which will be taken up by the course instructor during the contact hours. A contact hours is built by stringing a bunch of contact session topics.
Homework
HW
Specific problems/design/lab exercises assigned as homework.
Lab Exercise
LE
Lab exercises


Modular Content Structure

No
Title of the Module
Ref.#
M1
Data Communications and Network Management Overview
T1, Ch 1
M2
Network Technology
T1; Ch 2
M3
Network Management: Standards, Models & Language
T1; Ch 3
M4
SNMPv1
T1; Ch 4, 5
Relevant RFCs
M5
SNMPv2
T1; Ch 6
Relevant RFCs
M6
SNMPv3
T1; Ch 7
Relevant RFCs
M7
Lab
http://elearn .bits-pilani.ac.in
R4
M8
Network Management Tools, RMON
T1; Ch 9, 8
M9
Network Management Applications Overview & Event Correlation Techniques
T1; Ch 11
M10
Network Management Systems and Engineering
T1; Ch 9
M11
OSI Model, TMN
T1; Ch 10
Relevant standards
M12
Broadband Network Management
T1; Ch 12, 13
Relevant standards
M13
Advanced Management Concepts
T1; Ch 16
M14
Case Studies
Instructor Supplied Material


Detailed Structure


Introductory Video/Document: << Introducing the faculty, overview of the course, structure and organization of topics, guidance for navigating the content, and expectations from students>>

      Each of the sub-modules of Recorded Lectures (RLx.y) shall delivered via 30 – 60mins videos followed by:
      Contact session (CSx.y) of 2Hr each for Illustrating the concepts discussed in the videos with exercises, tutorials and discussion on case-problems (wherever appropriate); contact sessions (CS) may cover more than one recorded-lecture (RL) videos.

Course Contents


Type
Title
Description
M1: Data Communications and Network Management Overview
RL1.1
Data Communications and Network Management Overview
RL1.1  Data Communications and Network Management Overview
This introductory module talks about data and telecom Networks, distributed computing environment, TCP/IP based networks. This module is intended to be a recap of basic networking fundamentals.
RL1.2
Communication Standards and Protocols
RL 1.2Communication Standards and Protocols
This sub-module explains why communication protocols are required, in the context of interoperability. Also provides a brief overview of OSI and Internet models.
RL1.3
Networks, Systems & Services
RL 1.3Networks, Systems & Services
Introduces the concepts of network elements, services, broadband networks, and provides a brief explanation of broadband network technologies. This sub-module introduces the need for network management by identifying some common network problems. This sub-module also touches upon the goals of network management, common challenges in network management and introduces the students to a high-level architecture of network management systems,
M2: Network Topology
RL 2.1
Network Topologies
RL 2.1Network Topologies
This module describes the network topologies for LANs and WANs, brief recap on how Ethernet works, the different Ethernet technologies, and other Layer-2 technologies like switched Ethernet, VLANs, Token Ring, FDDI and WLAN.
RL 2.2
Network Node Components
RL 2.2 Network Node Components
This sub-module talks about the different components in a network – hubs, bridges, switches, routers, gateways, protocol converters, edge routers etc. An explanation of the different transmission technologies is given. It also talks about the various network elements needed for different technologies like GSM, CDMA, DOCSIS, PON etc.
CS 1.0

Discuss the fundamentals of networking concepts, network topologies, advantages and disadvantages of each, and the different aspects of L2 and L3 network elements. At the end of this session, students should have had a high level understanding of the different network technologies and the various network elements that constitute them, so that they are able to appreciate the need for and the goals of network management.  
M3: Network Management: Standards, Models & Language
RL 3.1
NM Standards, Models & Language Overview
RL 3.1NM Standards, Models & Language Overview
Having introduced the need of network management in M1 & M2, this sub-module describes in detail what network management is, and at a high level, how it is done. It then talks about the need for standards and protocols in network management, and describes some models in more detail.
RL 3.2
Organization & Information Models
RL 3. 2Organization & Information Models
This sub-module describes the organization and information models for network management. Introduces the concepts of manager, agent, managed object, and the different types of organization model.
RL 3.3
Communication &Functional Models
RL 3. 3Communication & Functional Models
This sub-module describes the communication and functional models for network management. Provides a brief overview of ASN.1, and explains a MIB definition. It then talks about the functional model for network management to introduce the concepts of FCAPS.
M4: SNMPv1 Organization & Information Models
RL 4.1
SNMPv1 Organization Model
RL 4.1SNMPv1 Organization Model
In this module, SNMP is introduced as an example of a network management protocol. This sub-module talks about the SNMP organization model, SNMP NM architecture, message types. Also introduces the concept of MIBs
RL 4.2
SNMPv1 Information Model
RL 4.2SNMPv1 Information Model
In this sub-module, how SNMP identifies a managed object, and how information is represented for exchange between SNMP entities is explained. Describes scalar and tabular objects.
RL 4.3
SNMP v1 MIBs
RL 4.3SNMP v1 MIBs
This sub-module takes a more detailed look at some standard SNMP MIBs.
CS 2.0

Explain the relevance of interoperability with examples from real deployment scenarios, and thus the need for network management standards and protocols. Explain why we need communication, functional, organization and information models and what come under the purview of each. Introduce SNMP as one of the network management protocols.
LE 1.0
(To be done as HW)

1.       Install Net-SNMP. Configure it as given in the user manual.
2.       Install a graphical MIB browser like SnmpB.
3.       Load the various MIBs and understand the capabilities of the MIB browser.
M5: SNMPv1 Protocol Operations
RL 5.1
SNMPv1 Communication & Functional Models
RL 5.1SNMPv1 Communication & Functional Models
This sub-module describes the different SNMP messages for communication between SNMP entities, and explains community strings/profile. Also describes the functional model from an FCAPS perspective.
RL 5.2
SNMPv1 Protocol Operations
RL 5.2SNMPv1 Protocol Operations
This sub-module describes the SNMP protocol stack, different SNMP message formats, and how these messages are exchanged between SNMP entities.
CS 3.0
(To be done in class as LE 2.0)

Examine Wireshark captures of SNMP messages between agents and managers, to explain the SNMP protocol stack and what the fields in these messages represent.
M6: SNMPv2 & SNMPv3
RL 6.1
SNMPv2
RL 6.1SNMPv2
This sub-module describes the disadvantages of SNMPv1, and the need for SNMP v2. It highlights the major differences between SNMPv1 and SNMPv2, and explains the SNMPv2 protocol operations in detail.
RL 6.2
SNMPv3
RL 6.2SNMPv3
This sub-module describes the need for SNMPv3, its architecture and applications.
RL 6.3
SNMPv3 Security Model
RL 6.3SNMPv3 Security Model
This sub-module recaps some common security threats, and explains the enhanced security features of SNMPv3.
LE 3.0
(To be done as HW)

1.       Try out various SNMP commands supported by Net-SNMP.
2.       Configure Net-SNMP for SNMPv3, and examine the SNMPv3 messages using Wireshark.
CS 4.0

Explain the evolution of SNMP. Examine the protocol operation and message structures (using Wireshark captures) of SNMPv2 and SNMPv3 messages. Understand the aspects of SNMPv3 that provides it with strong security features. Evaluate SNMP with respect to its strengths and weaknesses in today’s networking environments.
M7: Network Management Lab
RL 7.1

RL 7.1 Lab
Net-SNMP demo
RL 7.2

RL 7.2 Lab
SNMP MIB browser
RL 7.3

RL 7.3Lab
Network management tools, utilities
LE 4.0
(To be done as HW)

1.       Install MRTG. Run it for some time and observe the graphs produced by the tool.
2.       Set up Net-SNMP in a networked environment, and exchange SNMP messages across different computers.
M8: Network Management Tools, RMON
RL 8.1
Network Management Tools
RL 8.1 Network Management Tools
This sub-module provides an overview of some system utilities, network routing and traffic monitoring tools for network management. Also mentions some free and commercially available NM tools.
RL 8.2
RMON
RL 8.2RMON
This sub-module talks about what RMON is, some RMON MIBs, and the advantages that network operators get by deploying it.
RL 8.3
Lab
RL 8.3 Lab – MRTG
CS 5.0

Lab
Demo session for Net-SNMP and MRTG
LE 5.0

Lab
Students are expected to attend the session with Net-SNMP and MRTG running on their computers. At the end of this session, students are expected to understand how SNMP works in terms of information representation and exchange and how simple applications like MRTG can be built over SNMP.
M9: Network Management Applications
RL 9.1
NM Applications Overview (FCAPS)
RL 9.1NM Applications Overview (FCAPS)
This sub-module takes a closer look at what FCAPS entails. Also explains the significance of service and policy management in network management.
RL 9.2
Event Correlation Techniques
RL 9.2Event Correlation Techniques
This sub-module explains the different event correlation techniques used in network management software. The approaches covered are rule based reasoning, model based reasoning, case based reasoning and state transition graph model.
CS 6.0

Explain the commonly used tools/utilities for network management. Give examples of commercially available tools, the features they provide and market leaders in this domain.
Explain the significance of FCAPS, and the role that even correlation techniques play in the development of network management systems, with examples from the software industry.
M10: Network Management Systems and Engineering
RL 10.1
NM Systems & Engg-1
RL 10.1 NM Systems & Engg-1
This sub-module module explains some software design/architecture aspects of network management systems. It covers MIB engineering in particular, in terms of what aspects to keep in mind while designing a MIB for a network element, and the various components of a typical network management software architecture.
RL 10.2
NM Systems & Engg-2
RL 10.2 NM Systems & Engg-2
This sub-module explains the various modules of a network management server, aspects of data collection in performance management and factors to consider while designing the polling functionality in a network management server. Also covers the various aspects of accounting and security management.
M11: Telecommunication Management Network (TMN)
RL 11.1
OSI Model
RL 11. 1 OSI Model
This sub-module covers the network management model from an OSI perspective, and details how the OSI is similar to and different from the Internet model.
RL 11.2
Telecommunication Management Network (TMN)
RL 11.2 Telecommunication Management Network (TMN)
This sub-module talks about the evolution of TMN, and why it was needed. This explains the functional, physical and information architecture recommended by TMN standards.
RL 11.3
TMN Logical Layered Architecture
RL 11.3 TMN Logical Layered Architecture
This sub-module is dedicated to the logical layered architecture recommended by TMN. It explains each layer in detail, and the significance of service management and business management layers.
CS 7.0

Understand the software architecture/design aspects of a network management systems. Introduce the need for TMN, how it integrates into the deployments of network management systems and what value it provides for network operators. At the end of this module, students are expected to have understood not just the information exchange and processing aspects of network management protocols, but also the service and business aspects associated with it, and how network operators derive meaningful decisions from the plethora of information collected by managers via SNMP/other NM protocols.
M12: Broadband Network Management
RL 12.1
Broadband Network Management – MPLS
RL 12.1 Broadband Network Management – MPLS
This sub-module explains the concept of MPLS, how packets are transmitted in an MPLS network, and the advantages that this technology provides us with.
RL 12.2
Broadband Network Management MPLS Network Management
RL 12.2 Broadband Network Management MPLS Network Management
Having looked at the basics of MPLS, this sub-module explains the various network management aspects of an MPLS network.
RL 12.3
Broadband Network Management - Access Networks HFC
RL 12.3 Broadband Network Management - Access Networks HFC
This sub-module gives an overview of HFC/DOCSIS network, the components that make up an HFC network and how network management is done in an HFC network. It also describes IPDR as a potential alternative to SNMP-based network management.
RL 12.4
Broadband Network Management - Access Networks PON
RL 12.4 Broadband Network Management - Access Networks PON
This sub-module gives an overview of PON network, the components that make up a PON network, how network management is done in a PON network and the role of the OAM sublayer in EPON management.
RL 12.5
Broadband Network Management - Access Networks ADSL
RL 12.5 Broadband Network Management - Access Networks ADSL
This sub-module gives an overview of ADSL network, the components that make up an ADSL network, how network management is done in an ADSL network and the different parameters for fault, config and performance management.
CS 8.0

Discussion on various broadband access technologies, and their network management techniques. At the end of this module students are expected to have widened their understanding of network management – they should realize that there is more to network management that just SNMP.
M13: Advanced Management Topics
RL 13.1
Advanced Management Concepts-CORBA
RL 13.1 Advanced Management Concepts-CORBA
This sub-module covers CORBA-based network management technology.
RL 13.2
Advanced Management Concepts-XML
RL 13.2 Advanced Management Concepts-XML
This sub-module covers XML-based network management technology, and XML-based approaches to network management.
RL 13.3
Advanced Management Concepts-Other Topics

RL 13.3 Advanced Management Concepts-Other Topics
This sub-module gives a brief overview of Over The Air Provisioning, Software Defined Networking and IP Detail Record as alternate/emerging technologies for network management. The intent of this session is to make the students familiar with some of the recent advances in network management.
CS 9.0

Overview of alternatives to SNMP for network management. At the end of this module, students are expected to be familiar with some of the recent advances in network management.
M14: Case Studies
RL 14.1
Case Study 1
RL 14.1 Case Study 1
A hypothetical case study covering the role of each layer in the logical layered architecture, in network management. Explains how raw data collected by the lowest layer is refined, correlated with other data and presents meaningful information to the operator.
RL 14.2
Case Study 2
RL 14.2 Case Study 2
Another hypothetical case study covering the role of each layer in the logical layered architecture, in network management.
CS 10.0

Discuss the case studies, and any other questions that students may have.




Part B: Course Handout

Academic Term
Second Semester 2017-2018
Course Title
Telecom  Network Management
Course No
SS ZG582/ CSI ZG582
Lead Instructor
Anand Kumar

Course Objectives:

No
Course Objective
CO1
Provide overview of network management principles, practices and technologies for managing telecommunication and computer communication networks and services
CO2
Explain the theoretical and practical aspects of network management, from the perspectives of software design and network operations.
CO3
Outline the concepts related to FCAPS, SNMP, RMON, monitoring tools and new trends in the network management domain
CO4
Illustrate network management concepts with case studies and examples from industry

Learning Outcomes:

No
Learning Outcomes
LO1
Students shall gain ability to appreciate the network management principles applies in various networks and organizations
LO2
Students shall be able to demonstrate the usage of one or more network management tools to perform simple network management operations
LO3
Given a network management problem that an NOC could be faced with, students shall be able to analyse the problem, explain possible scenarios that could have led to the problem, and design solutions to address the same at the operations and business management level
LO4
Students shall be able to explain and compare alternate technologies for network management used in different broadband access networks

Course Description

This course covers a recap of networking fundamentals, the goals and challenges of network management, the need for standards and protocols in this domain, SNMPv1/v2/v3, network management applications, event correlation techniques, network management software systems architecture and design considerations, TMN, broadband network management, advanced management concepts. It also covers lab sessions on Net-SNMP and network monitoring tools/utilities.


Teaching Methodology (Flipped Learning Model)

The pedagogy for this course is centered around flipped learning model in which the traditional class-room instruction is replaced with recorded lectures to be watched at home as per the student’s convenience and the erstwhile home-working or tutorials become the focus of classroom contact sessions. Students are expected to finish the home works on time.

Course Delivery

       There are 10 Contact Sessions (of 2 hours each)--5 before mid-semester and 5 post-mid-semester over a period of 20 weeks with alternate weeks for home-watching of Recorded Lectures
       The students are expected to watch the prescribed Recorded Lectures (RLs) before attending the above Contact Sessions

Contact Session Plan

o      Each Module (M#) covers an independent topic and module may encompass more than one Recorded Lecture (RL).
o      Contact Sessions (2hrs each week) are scheduled alternate weeks after the student watches all Recorded Lectures (RLs) of the specified Modules (listed below) during the previous week
o      In the flipped learning model, Contact Sessions are meant for in-classroom discussions on cases, tutorials/exercises or responding to student’s questions/clarification--- may encompass more than one Module/RLs/CS topic.
o      Contact Session topics listed in course structure (numbered CSx.y)  may cover several  RLs; and as per the pace of instructor/students’ learning, the instructor may take up more than one CS topic during each of the below sessions.


Contact
Session
Topics
Ref Modules
Pre-contact Session prep
During Contact Session
1
Data Communications and Network Management Overview,  Network Topology
M1, M2
RL 1.1, RL 1.2, RL 1.3
RL 2.1, RL 2.2
CS 1.0
2
Network Management: Standards, Models & Language,  SNMPv1 Organization & Information Models
M3, M4
RL 3.1, RL 3.2, RL 3.3
RL 4.1, RL 4.2, RL 4.3
CS 2.0
3
SNMPv1 Protocol Operations
M5
HW 1.0
RL 5.1, RL 5.2
CS 3.0
4
SNMPv2 & SNMPv3
M6
HW 2.0
RL 6.1, RL 6.2, RL 6.3
CS 4.0



5

Network Management Lab,  RMON,  Network Management Tools & Applications

M7, M8
HW 2.0
RL 7.1, RL 7.2, RL 7.3

CS 5.0,
Pre-Mid Review
Review: All topics covered till date
M1 M6
 All RLs in  M1M6
6
Network Management Applications
M9
HW 3.0
RL 8.1, RL 8.2
RL 9.1, RL 9.2
CS 6.0
7
Network Management Systems and Engineering, TMN
M10, M11
RL 10.1, RL 10.2
RL 11.1, RL 11.2, RL 11.3
CS 7.0
8
Broadband Network Management
M12
RL 12.1, RL 12.2, RL 12.3, RL 12.4, RL 12.5
CS 8.0
9
Advanced Management Topics
M13
RL 13.1, RL 13.2, RL 13.3
CS 9.0

10
Discussion of case studies
M14
RL 14.1, RL 14.2
CS 10.0,
Pre-Compre Review
All topics in syllabus / covered till date
M1 M14
All RLs in M1 M14



Select Topics and Case Studies from business for experiential learning

For the below lab topics, refer TMN lab capsules - the link for the same can be obtained from the WILP CS&IS Lab Setup Instruction Manual located at http://elearn.bits-pilani.ac.in
Topics No.
Select Topics in Syllabus for experiential learning

Access URL
1
a.       Install net-snmp on your computer.
b.      Use the various SNMP CLI commands to read the IF-MIB on your computer.
c.       Record the results with screenshots.
2
a.       Configure and run snmpd and snmptrapd.
b.      Use net-snmp commands to walk through the IF-MIB on your laptop.
c.       Record the results with screenshots.
d.      Install and configure snmptrapd.
e.       Use CLI commands to generate traps.
f.       Record the results with screenshots.
3
a.       Install a graphical MIB browser (like SnmpB).
b.      Load the various MIBs on your computer.
c.       Browse the MIBs and observe the values for each of the SNMP operations for scalar and tabular attributes.
d.      Record the results with screenshots.
3
Find out from the Internet how IPDR is used for network management; support output with screenshots & statistical data.
-
4
Design considerations for a metamodel/MIB for any device (eg: wireless AP, TV, mobile phone, router etc), given its characteristics
-

Evaluation Scheme

Legend: EC = Evaluation Component
No
Name
Type
Duration
Weight
Day, Date, Session, Time
EC-1
Quiz-1
Online
-
5%
February 1 to 10, 2018
Quiz-2
Online
-
5%
March 1 to 10, 2018
Assignment 1
Online
-
15%
March 20 to 30, 2018
EC-2
Mid-Semester Test
Closed Book
Lab: Will also be tested in Midsem Test
2 hours
30%
04/03/2018 (FN) 10 AM – 12 Noon

EC-3
Comprehensive Exam
Open Book
3 hours
45%
22/04/2018 (FN) 9 AM – 12 Noon


Note - Evaluation components can be tailored depending on the proposed model.

Note to faculty: For sample assignment questions, refer Computer Networking Courses LabExercises.doc

Important Information:

Syllabus for Mid-Semester Test (Closed Book): Topics in Weeks 1-7
Syllabus for Comprehensive Exam (Open Book): All topics given in plan of study
Evaluation Guidelines:
1.      EC-1 consists of two quizzes and one assignment. Announcements regarding the same will be made in a timely manner.
2.      For Closed Book tests: No books or reference material of any kind will be permitted. Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
3.      For Open Book exams: Use of prescribed and reference text books, in original (not photocopies) is permitted. Class notes/slides as reference material in filed or bound form is permitted. However, loose sheets of paper will not be allowed. Use of calculators is permitted in all exams. Laptops/Mobiles of any kind are not allowed. Exchange of any material is not allowed.
4.      If a student is unable to appear for the Regular Test/Exam due to genuine exigencies, the student should follow the procedure to apply for the Make-Up Test/Exam. The genuineness of the reason for absence in the Regular Exam shall be assessed prior to giving permission to appear for the Make-up Exam. Make-Up Test/Exam will be conducted only at selected exam centres on the dates to be announced later.
It shall be the responsibility of the individual student to be regular in maintaining the self-study schedule as given in the course handout, attend the lectures, and take all the prescribed evaluation components such as Assignment/Quiz, Mid-Semester Test and Comprehensive Exam according to the evaluation scheme provided in the handout.

6 comments:

  1. Keep on Posting such great blog network management

    ReplyDelete
  2. An informative and engaging blog that provides valuable insights and practical tips. managed security services

    ReplyDelete
  3. Telecom Signaling Penetration Testing ensures the robustness of communication networks. By probing vulnerabilities in signaling protocols, this essential cybersecurity process helps safeguard against potential threats, ensuring uninterrupted and secure telecommunication services. Safeguard your telecom infrastructure with precise testing services experts penetration testing services for enhanced reliability and peace of mind.

    ReplyDelete
  4. In the ever-evolving landscape of telecommunications, understanding the role of robust web hosting solutions in ensuring network availability and reliability is increasingly crucial, making this course handout even more relevant.

    ReplyDelete