TELE9752: Network Operations and Control

Session 2, 2017


Nov. 17
The server that hosts this site has irregular power supply from 7pm to 4am Wed, Thur and Friday. Copies of content are also available on the Internet Archive
Oct. 27
Google has, for some unknown reason, blocked the form for ranking presentations of other groups. I've asked for this block to be removed, and if isn't removed by this weekend, then I'll create an alternate form on Moodle. I'll extend the deadline for completing this form to the end of the study break, i.e. 11:59pm Nov. 5. Sorry for the inconvenience. THanks also to group 2 who have sent me their slides and which I will upload ASAP.
Oct. 20
Please complete the rankings of presentations made by OTHER groups (based on your notes from the week 12 class) and weightings for members of YOUR group by the end of week 13. The slides that were presented are available here. Thanks.
Oct. 19
The MIB Browser software that the assignment links to should work well “straight out of the box”. Once it has installed and loaded, press the Browse button on the top left, then the Browse button in the window that pops up, then select your MIB file and press Upload. You should then see the top-level members object, and can click on it and its parents to see objects in your MIB, as shown in the image below. The black rectangle hides some details that you'll see if you get the “arbitrary number of pairs” part right for the bonus marks, and the MIB shown doesn't exactly address the spec which refers to an exercise not an assignment or project.
Aug. 31
The mid-session test in week 7 will start at 6:30pm.

The assignment specification is available here and if you have time, you might want to spend some time on it before the mid-session exam since the assignment will use knowledge of MIBs etc that is tested in the mid-session exam.

The papers for the week 12 presentations are as follows.

  1. R. Mijumbi et al: “Management and orchestration challenges in network functions virtualization”, IEEE Communications Magazine, 54(1):98-105, 2016
    students with zIDs ending in 2, i.e. 3486412 5139262 5139772 5140142 5141132
  2. Z. Ye et al: “Joint topology design and mapping of service function chains for efficient, scalable, and reliable network functions virtualization”, IEEE Network, 30(3):81-7, 2016
    students with zIDs ending in 3, 4 or 8, i.e. 5121813 5181453 5037384 5148414 5097858
  3. K. Nguyen and M. Cheriet: “Virtual Edge-Based Smart Community Network Management”, IEEE Internet Computing, 20(6):32-41, 2016
    students with zIDs ending in 5, 6 or 7, i.e. 5129335 5140675 5001466 5175586 5096977
  4. P. Demestichas et al: “Intelligent 5G Networks: Managing 5G Wireless/Mobile Broadband”, IEEE Vehicular Technology Magazine, 10(3):41-50, 2015
    students with zIDs ending in 9 or 0, i.e. 5089819 5151029 5169989 5124760 5144430
Jul. 12
This course will start with the lecture in week 1. Please read the course outline before the lecture.
Jun. 6
Damaged fibre prevents viewing of transit of Venus
Jan. 20
Meet the frog that cut off 160 telco customers and EFTPOS

Course description

See the UNSW course handbook. Course outlines are available here. Course wiki.


This course schedule is tentative and subject to change.

Class times and locations

To help you identify the more important topics in the lectures, here is a rough list of important slides, base URL for locating slides by identifier: - append the slide ID to jump to near the slide, e.g. jump may not be exact - you may have to search a couple of slides before/after
Week Topic
Lecture notes
Textbook sections Recommended reading Resources Mindmaps Packets
1 Network Management Systems Clemm: Ch 1, 2, 3:86-97, 5
Comer: Ch 1, 3 and 9.1-9.6
"On the job with a network manager", Ch. 2 of A. Clemm: Network Management Fundamentals (11521 words) GUI management interface for a typical home router Quiz RFC Sourcebook
Colo facility tour. A somewhat old video tour of Akamai's NOCC
2 Revisiting protocol stacks in context of management Clemm: TBD
Comer: Ch 2, 9.7-10 and (less relevant) Ch 12
R. Droms: " Automated configuration of TCP/IP with DHCP", IEEE Internet Computing, 3(4):45-53 (5462 words) Quiz map VLANs GVRP
3 Structuring and presenting management information (SMI, OIDs, MIBs, ASN.1) Ch 6 of Clemm. Ch 10 of Comer B. Kaliski: "A Layman's Guide to a Subset of ASN.1, BER, and DER", RSA Laboratories Technical Note
Chapter 17.1 of L. Parziale et al: "TCP/IP Tutorial and Technical Overview", IBM Redbook GG24-3376-07 (5900 words)

(Only Section 17.1.1 is relevant to week 3, but the remainder is relevant to week 4.)

OIDs: Registry, Repository
Enterprise #s
MIB Repository
4 Communicating management information (BER, SNMP, syslog) Ch 8 of Clemm. Ch 10 of Comer SNMP: Simple Network Management Protocol, Ch. 25 of W. Richard Stevens: TCP/IP Illustrated, Volume 1: The Protocols Quiz,
The Simple Times
SNMP, syslog
5 RMON Clemm pp. 307-8; Comer 10.18 Section 9.1.1 of D. Mauro and K. Schmidt: Essential SNMP, O'Reilly (1826 words) E. Wong: Network Monitoring Fundamentals and Standards
6 Consolidation          
7 Mid-session exam   mid-session Clock photos
8 S: Security Management Ch. 5 of Clemm
Ch 6 and 8 of Comer
W. Stallings: "Security Comes to SNMP: The New SNMPv3 Proposed Internet Standards", Internet Protocol Journal, 1(3):2-12

sample chapter 4 on SNMPv3

Configuration Management and Security

9 F: Fault management
Ch 5 of Clemm & Comer G. Candea: The Basics of Dependability (5794 words)
L. Lewis: Event correlation in spectrum and other commercial products, Aprisma White Paper (4347 words)
N. Ayari et al: "Fault tolerance for highly available internet services: concepts, approaches, and issues", IEEE Communications Surveys & Tutorials
A. Haider and R. Harris: "Recovery Techniques in Next Generation Networks", IEEE Communications Surveys & Tutorials

Excel Hamming distance calculator (uses macros so if asked whether you want to 'enable content' while opening the file, then answer yes)

map map HSRP, VRRP
- mid-session break      
10 A: Accounting Ch 6 of Comer The Art of Peering: The Peering Playbook  RADIUS Diameter
11a C: Configuration Ch. 5 of Clemm
Ch 4 and 13 of Comer
E. Danielyan: “Zero Configuration Networking”, Internet Protocol Journal, 5(4):20-6 (2704 words)
M. Srinivasan: Tutorial on the Link Layer Discovery Protocol

11p P: Performance

Ch. 11 of Clemm.
Ch. 7 of Comer
Service Level Agreements on IP Networks
E. Wustenhoff: “Service Level Agreement in the Data Center

An introduction to IP flow information export (IPFIX)

model SLA Netflix appliance service maintenance agreement (Appendix 2) Why SLAs are redundant, but Zencoder offers one anyway (RPO defined)

12 Student presentations on advanced topics Ch 18 of Comer IRTF NMRG
New Frontiers in Internet Network Management
Material below this point is yet to be updated for 2017
13 No class / overflow          

Related courses

This course assumes prior knowledge of Network Technologies. It complements the course on Trusted Networks: While security is central to NOC (e.g. it is the S in FCAPS), this course focuses on the operations and control of security and the security of NOC, but not on encryption mechanisms nor securing other ("data plane") network protocols.

Course support


Tim Moors

Contact methods:


Textbooks are available from the UNSW Bookshop which also defines the types "prescribed" and "recommended".


A. Clemm: Network Management Fundamentals, Cisco Press
Since this book doesn't number sections, we'll refer to parts of chapters by their page numbers, e.g. Ch 5:132-143 discusses fault management.

Secondary recommendations

(in alphabetical order by author)

Network Management texts have a reputation for being inane. Any suggestions about textbooks that have substantial engineering depth would be greatly appreciated.

Assessment tasks

Bonus marks

Two student presentations, for which the presenting students received bonus marks: AUSNOG presentation (PPT 2007 format) Mobilink Pakistan. Some ideas for future student presentations: Other ideas for developments that would deserve bonus marks: