Models of Network Administration

Download Report

Transcript Models of Network Administration

Models of Network
Administration
Week 5
Understanding the system
as a whole
 Requires ability to see relationships and
dependencies between distinct parts
 The idea of a “causal web”
 Complex system may have multiple operating
modes – adaptive behaviour
Models for Management
 IETF
and ISO (TMN) have defined
models for management of systems
 These don’t always scale well



(SNMP RFC1155)
Focus on managing devices
Require a Human controller
Micro-manage the system
 Best model are those which automate functions
and regulate interactions of components
Information Models
 Represent the data used by an organisation
eg
database of Personnel, Assets and Services
 Uses a Directory service (eg X.500)




Structured: hierarchical, object-oriented
Common schema: allows interoperability
Access Control: per record
Optimised for read-only use. Not updated during use
 Specific vs General search

“White pages” vs “Yellow pages”
Network Directory X.500
 ISO 9594 (1988)
 Uses ASN.1 to define format of protocols
 Access method (DAP) defined in ISO terms
 LDAPv3 (RFC 2251–2256)
 Now replacing or being integrating into
vendor solutions eg NDS and MS ActiveDirectory
Lightweight Directory Access Protocol (LDAP)
 Contains Name-Value(s) pairs (“attributes”)
 Attributes have rules



(sub-attributes)
controlling
Method of value matching during search
Order of value matching during search
Whether attribute is mandatory or optional
 Attributes identified by Distinguished Name
Relative Distinguished Name (RDN)
 RDN is a Name-Value pair eg cn=“Chris Freeman”
 DN is a concatenation of RDNs in hierarchy
(DN)
or
Hierarchical Directory Services
 Well suited to distributed environment; allows
delegation of parts to separate hosts
 Directory tree may be partitioned into sub-trees
with no overlap
 Cooperating groups with can then manage their
own data locally and share with others
 May allow Availability and Redundancy through
replication of data and service
Hierarchical Directory Services
Querying Directory Services
 Usually built-in to application software
 Unix system call: GetHostByName( )
 Uses “nsswitch” to select one of several directory
services
 See also “Pluggable Authentication Modules”
(PAM)
 Original UNIX methods based on /etc files
 Later used NIS (aka “YellowPages” or yp)
 Non-hierarchical, lacked security
 Replaces by NIS+
Other Directory Services
 OpenLDAP
 Versatile, common platform
 Difficult syntax and sensitive to network LoS
 Novell Directory Service (NDS)
 Consistent distributed physical organisation of
devices and software objects
 Directly implements the information model
 Microsoft Active Directory
 Replaced NT4 Domain model
 Compatible with simplified version of LDAP
System Infrastructure
 A network is a “community of cooperating and
competing” components…
 Administrator selects components and assigns
roles depending on tasks required
 This may involve machines and users (staff)


Computing machinery: functional infrastructure
Staff: build and maintain infrastructure
System Infrastructure
 Identify purpose of computer system
 Choose hardware and software

Appropriate to task
 Set policies and procedures
Aspects of System Infrastructure
 Homogeneity

All systems identical or Configure for purpose?
 Load Balancing


One service per host or multi-service hosts?
Separate data storage and data processing can
double network traffic
 Human limitations on group size:
max150 objects
 Mobile and AdHoc networks
 Peer-to-Peer:
Scaled approach to management
Network Administration Models
 Central management – “star” model
Network Administration Models
 Centralised policy and enforcement
 JobRatecontroller=Rate1+Rate2+…Raten
 If sum of Requests exceeds
maxCapacity/n
then work
will queue at the controller
 Disadvantage of centralised control:
bottleneck in communications with controller
Other Network Administration Models
 Star with intermittently connected hosts
 Mesh: centralised policy & local enforcement
 Each host gets own copy of common policy.
Does not need constant connection to controller
 Each host updates itself according to policy
 But: Is policy up-to-date? Has policy been applied?
 Mesh: partial host autonomy & local enforcement
 Mesh: partial autonomy and peer policy exchange
Network Management
Technologies
 SNMP
 OSI TMN and Others
 Java Management Extensions (JMX)
 Jini and UPnP: management-free networks
 WMI and WBEM
Building an Infrastructure
What is the correct way to build a complex
networked application from nothing?
1.
2.
3.
4.
5.
6.
7.
NIC drivers
Local host config: Host name, SysLog
IP configuration (DHCP)
Domain Name configuration (Resolver, dDNS)
Middleware services (NIS, Kerberos, RADIUS)
Application services (MySQL, httpd, java, …)
Client applications (Browser, java, client-side APIs)
Aspects of Infrastructure
 Creating uniformity through Automation
 Revision control:
HostFactory, RCS
 Software distribution & synchronisation


Push model:
Pull model:
rdist
cfengine, rsync
 Reliability through parallelism
System Maintenance models
 Reboot
 return to original (if it still exists!)
 Manual administration
 not scalable, relies on knowledgable user
 Central control
 HP Openview, Tivoli, Sun Solstice
 star model problems
 Immunology (self-maintenance)
 Eg. Windows automatic restore
Multiple Operating Systems in a LAN




Convenience vs Differentiation
Simple FTP vs Open file sharing?
Software compatibility between systems
Problems:




Different object naming schemes
File System sharing: different Naming & ACLs
Different User ID and password schemes
User Authentication