TELE9752: Network Operations and Control
Session 2, 2017
- Nov. 17
- The server that hosts this site has irregular power supply from 7pm to 4am Wed, Thur and Friday. Copies of content are also available on the Internet Archive
- Oct. 27
- Google has, for some unknown reason, blocked the form for ranking presentations of other groups. I've asked for this block to be removed, and if isn't removed by this weekend, then I'll create an alternate form on Moodle. I'll extend the deadline for completing this form to the end of the study break, i.e. 11:59pm Nov. 5. Sorry for the inconvenience. THanks also to group 2 who have sent me their slides and which I will upload ASAP.
- Oct. 20
- Please complete the rankings of presentations made by OTHER groups (based on your notes from the week 12 class) and weightings for members of YOUR group by the end of week 13. The slides that were presented are available here. Thanks.
- Oct. 19
- The MIB Browser software that the assignment links to should work well “straight out of the box”. Once it has installed and loaded, press the Browse button on the top left, then the Browse button in the window that pops up, then select your MIB file and press Upload. You should then see the top-level members object, and can click on it and its parents to see objects in your MIB, as shown in the image below. The black rectangle hides some details that you'll see if you get the “arbitrary number of pairs” part right for the bonus marks, and the MIB shown doesn't exactly address the spec which refers to an exercise not an assignment or project.
- Aug. 31
- The mid-session test in week 7 will start at 6:30pm.
The assignment specification is available here and if you have time, you might want to spend some time on it before the mid-session exam since the assignment will use knowledge of MIBs etc that is tested in the mid-session exam.
The papers for the week 12 presentations are as follows.
- R. Mijumbi et al: “Management and orchestration challenges in network functions virtualization”, IEEE Communications Magazine, 54(1):98-105, 2016
students with zIDs ending in 2, i.e. 3486412
- Z. Ye et al: “Joint topology design and mapping of service function chains for efficient, scalable, and reliable network functions virtualization”, IEEE Network, 30(3):81-7, 2016
students with zIDs ending in 3, 4 or 8, i.e.
- K. Nguyen and M. Cheriet: “Virtual Edge-Based Smart Community Network Management”, IEEE Internet Computing, 20(6):32-41, 2016
students with zIDs ending in 5, 6 or 7, i.e.
- P. Demestichas et al: “Intelligent 5G Networks: Managing 5G Wireless/Mobile Broadband”, IEEE Vehicular Technology Magazine, 10(3):41-50, 2015
students with zIDs ending in 9 or 0, i.e.
- Jul. 12
- This course will start with the lecture in week 1. Please read the course outline before the lecture.
- Jun. 6
- Damaged fibre prevents viewing of transit of Venus
- Jan. 20
- Meet the frog that cut off 160 telco customers and EFTPOS
See the UNSW course handbook. Course outlines are available here. Course wiki.
This course schedule is tentative and subject to change.
Class times and locations
To help you identify the more important topics in the lectures, here is a rough list of important slides, base URL for locating slides by identifier: http://uluru.ee.unsw.edu.au/~tim/courses/tele9752/id/ - append the slide ID to jump to near the slide, e.g. http://uluru.ee.unsw.edu.au/~tim/courses/tele9752/id/6U jump may not be exact - you may have to search a couple of slides before/after
||Network Management Systems
||Clemm: Ch 1, 2, 3:86-97, 5
Comer: Ch 1, 3 and 9.1-9.6
|"On the job with a network manager", Ch. 2 of A. Clemm: Network Management Fundamentals (11521 words)
||GUI management interface for a typical home router Quiz RFC Sourcebook
Colo facility tour. A somewhat old video tour of Akamai's NOCC
||Revisiting protocol stacks in context of management
Comer: Ch 2, 9.7-10 and (less relevant) Ch 12
|R. Droms: " Automated configuration of TCP/IP with DHCP", IEEE Internet Computing, 3(4):45-53 (5462 words)
||Structuring and presenting management information (SMI, OIDs, MIBs, ASN.1)
||Ch 6 of Clemm. Ch 10 of Comer
||B. Kaliski: "A Layman's Guide to a Subset of ASN.1, BER, and DER", RSA Laboratories Technical Note
Chapter 17.1 of L. Parziale et al: "TCP/IP Tutorial and Technical Overview", IBM Redbook GG24-3376-07 (5900 words)
(Only Section 17.1.1 is relevant to week 3, but the remainder is relevant to week 4.)
|OIDs: Registry, Repository
||Communicating management information (BER, SNMP, syslog)
||Ch 8 of Clemm. Ch 10 of Comer
||SNMP: Simple Network Management Protocol, Ch. 25 of W. Richard Stevens: TCP/IP Illustrated, Volume 1: The Protocols
The Simple Times
||Clemm pp. 307-8; Comer 10.18
||Section 9.1.1 of D. Mauro and K. Schmidt: Essential SNMP, O'Reilly (1826 words)
|| E. Wong: Network Monitoring Fundamentals and Standards
||S: Security Management
||Ch. 5 of Clemm
Ch 6 and 8 of Comer
|W. Stallings: "Security Comes to SNMP: The New SNMPv3 Proposed Internet Standards", Internet Protocol Journal, 1(3):2-12
sample chapter 4 on SNMPv3
“Configuration Management and Security”
||F: Fault management
|Ch 5 of Clemm & Comer
||G. Candea: The Basics of Dependability (5794 words)
L. Lewis: Event correlation in spectrum and other commercial products, Aprisma White Paper (4347 words)
| N. Ayari et al: "Fault tolerance for highly available internet services: concepts, approaches, and issues", IEEE Communications Surveys & Tutorials
A. Haider and R. Harris: "Recovery Techniques in Next Generation Networks", IEEE Communications Surveys & Tutorials
Excel Hamming distance calculator (uses macros so if asked whether you want to 'enable content' while opening the file, then answer yes)
||Ch 6 of Comer
||The Art of Peering: The Peering Playbook
||Ch. 5 of Clemm
Ch 4 and 13 of Comer
|E. Danielyan: “Zero Configuration Networking”, Internet Protocol Journal, 5(4):20-6 (2704 words)
|M. Srinivasan: Tutorial on the Link Layer Discovery Protocol
||mDNS and LLDP, WPAD, ISATAP
Ch. 11 of Clemm.
Ch. 7 of Comer
|Service Level Agreements on IP Networks
E. Wustenhoff: “Service Level Agreement in the Data Center”
“An introduction to IP flow information export (IPFIX)”
|model SLA Netflix appliance service maintenance agreement (Appendix 2)
Why SLAs are redundant, but Zencoder offers one anyway (RPO defined)
||Student presentations on advanced topics
||Ch 18 of Comer
New Frontiers in Internet Network Management
|Material below this point is yet to be updated for 2017
||No class / overflow
This course assumes prior knowledge of Network Technologies. It complements the course on Trusted Networks: While security is central to NOC (e.g. it is the S in FCAPS), this course focuses on the operations and control of security and the security of NOC, but not on encryption mechanisms nor securing other ("data plane") network protocols.
- Face-to-face: During breaks in lectures, or during consultation times (Thursdays 5:00-5:15+pm in room 741 of building E10)
You are encouraged to use consultation time to obtain answers to your questions, but please post your question on the wiki before coming to consultation, either as a comment on the wiki page that it relates to, or in the Anonymous questions discussion forum.
- Email: For administrative matters only: t.moors AT unsw.edu.au with "TELE9752" in the subject line and state your student ID and name as it appears on UNSW records.
Textbooks are available from the UNSW Bookshop which also defines the types "prescribed" and "recommended".
A. Clemm: Network Management Fundamentals, Cisco Press
Since this book doesn't number sections, we'll refer to parts of chapters by their page numbers, e.g. Ch 5:132-143 discusses fault management.
(in alphabetical order by author)
- W. Barth: Nagios: System and Network Monitoring, No Starch Press
- M. Burgess: Principles of Network and System Administration, Wiley, ISBN 0470868074
- J. Burke: Network Management Concepts and Practice: a Hands-on Approach, Pearson, ISBN 0130329509
- D. Comer: Automated Network Management Systems: Current and Future Capabilities, Pearson
- A. Farrel: Network Management Know It All, Morgan Kaufmann
- T. Limonchelli, C. Hogan and S. Chalup: The Practice of System and Network Administration, Addison-Wesley, 2nd ed., ISBN 0-321-49266-8
- D. Mauro and K. Schmidt: Essential SNMP, O'Reilly; available electronically from within UNSW
- J. McCabe: Network Analysis, Architecture and Design, Morgan Kaufmann, 3rd ed.
- M. Subramanian: Network Management: Principles and Practice, Addison Wesley
- D. Verma: Principles of Computer Systems and Network Management Springer
Network Management texts have a reputation for being inane. Any suggestions about textbooks that have substantial engineering depth would be greatly appreciated.
- Wiki extension assignment
- Mid-session exam:
- Scope: The mid-session exam does not cover RMON. Note the list of important slides
- What to bring: The only object that you need to bring is your student ID card; do not bring notes, calculators, phones, bags, drinks etc - you will be asked to leave all such objects at the front of the lecture theatre. You will be provided with a pen and paper.
- What to expect: sample questions, sample answers and marks, cover page
- Group presentation (due in week 12 class)
- Final exam: The final exam will only directly cover topics that were not covered in the mid-session exam, i.e. RMON to week 12 Group Research. Of course, topics such as RMON, SNMPv3 etc are indirectly based on some understanding of MIBs, SNMP and other topics covered by the mid-session exam, but if you passed the mid-session, then you shouldn't need to review those topics again for the final exam. Note the list of important slides
Two student presentations, for which the presenting students received bonus marks: AUSNOG presentation (PPT 2007 format)
Mobilink Pakistan. Some ideas for future student presentations:
Other ideas for developments that would deserve bonus marks:
- OpenStack Networking (Neutron) management
- Overview of command-line interfaces for non-Cisco equipment (Cisco's IOS is widely documented), e.g. JunOS etc.
- Experiences working in a telco call centre.
- Experiences with telco customer support.
- Experiences installing and using open-source network management software (other than Nagios used for the 9752 project)
- Recent advances in network management protocols, e.g. RFCs 5590-2 about SNMP security (e.g. over SSH), Netconf protocol (RFC 4741 and DOI 10.1109/MCOM.2010.5560601)
- Provide more real-life examples of Network Operations and Control.
- Identify anything in the course that may be out of date and provide, or point to, replacement materials.
- Creating editable Powerpoint line art drawings for drawings that currently only exist as whiteboard photos. Examples of line art: lecture 1 [1L] [TX], lecture 2 [6C] [WJ]; examples of photos lecture 2 , lecture 3 [GD]
- Propose new questions (that the lecturer does not already have) that can be used in examinations. To be useful, they must relate to course material, test intended learning outcomes (e.g. understanding of concepts or ability to apply concepts, rather than rote memorisation), and be sufficiently succinct to be presentable in an exam. See the Mid-session exam sample for examples of the expected style. Questions can relate to any part of the course, i.e. should be suitable for either the mid-session or final exam.