Snmp Configuration Introduction; Snmp Versions And Supported Mib - 3Com 5500-SI Configuration Manual

5500 series
Hide thumbs Also See for 5500-SI:
Table of Contents

Advertisement

28
SNMP Configuration
Introduction
SNMP Versions and
Supported MIB
SNMP C
ONFIGURATION
The Simple Network Management Protocol (SNMP) has gained the most extensive
application in the computer networks. SNMP has been put into use and widely
accepted as an industry standard in practice. It is used for ensuring the transmission
of the management information between any two nodes. In this way, network
administrators can easily search and modify the information on any node on the
network. In the meantime, they can locate faults promptly and implement the fault
diagnosis, capacity planning and report generating. SNMP adopts the polling
mechanism and provides the most basic function set. It is most applicable to the
small-sized, fast-speed and low-cost environment. It only requires the unverified
transport layer protocol UDP; and is thus widely supported by many other products.
In terms of structure, SNMP can be divided into two parts, namely, Network
Management Station and Agent. Network Management Station is the workstation
for running the client program. At present, the commonly used NM platforms include
Sun NetManager and IBM NetView. Agent is the server software operated on
network devices. Network Management Station can send GetRequest,
GetNextRequest and SetRequest messages to the Agent. Upon receiving the requests
from the Network Management Station, Agent will perform Read or Write operation
according to the message types, generate and return the Response message to
Network Management Station. On the other hand, Agent will send Trap message on
its own initiative to the Network Management Station to report the events whenever
the device encounters any abnormalities such as new device found and restart.
To uniquely identify the management variables of a device in SNMP messages, SNMP
adopts the hierarchical naming scheme to identify the managed objects. It is like a
tree. A tree node represents a managed object, as shown in the Figure 165. Thus the
object can be identified with the unique path starting from the root.
Figure 165 Architecture of the MIB Tree
1
1
1
5
A
The MIB (Management Information Base) is used to describe the hierarchical
architecture of the tree and it is the set defined by the standard variables of the
monitored network device. In Figure 166, the managed object B can be uniquely
specified by a string of numbers {1.2.1.1}. The number string is the Object Identifier of
the managed object.
2
1
2
2
B
6

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

5500-ei5500g-ei

Table of Contents