TELE9752: Network Operations and Control

Session 2, 2014


Aug. 13
Note the instructions for the wiki extension assignment, in particular that nominations for new topics that you find interesting are due by the end of week 3.
Aug. 8
For the week 12 presentations, there are 7 groups with approximately 6 students in each group.
Aug. 3
Please check that you can login to Moodle so that you can propose Wiki extension assignment topics before the deadline at the end of week 3.
Consultation time will be held from 5:00 to 5:15 pm on Tuesdays in office 341. If there is demand then, then it will extend longer.
Jul. 28
By the end of week 7 (i.e. Sun Sep. 14) could you please try to complete the ISP usage survey? An example of Tim's data is available on Moodle.
Jul. 25
In the news: ISPs are spending less on their networks as they make more money off them
Jul. 21
The course outline for this course and others is available here. Class times and locations. The first class for this course will be held in week 1.

Feb. 24
If you want a giggle about accounting, watch The Checkout's clip entitled Phoney Regulations about the Telecommunications Consumer Protection (TCP) Code. And you thought TCP code just provided flow, error and congestion control!

Aug. 15
In the news: Vulnerability in ICMPv6 could allow Denial of Service
Jul. 30
Why YouTube buffers: The secret deals make -- and break -- online video
Jul. 25
Please post your questions as comments on the relevant wiki page (anonymously if you like) so that we have a record of the question and answer so as to help other students who may be interested and to help improve the course. An example of how the wiki can expand on topics covered in lectures is provided by this comment which attempts to answer a question from the week 2 class, and while trying to do so relates the topic of that page to several other topics covered in that lecture.
Jun. 6
Damaged fibre prevents viewing of transit of Venus
Jan. 20
Meet the frog that cut off 160 telco customers and EFTPOS

Course description

See the UNSW course handbook. Course outlines are available here. Course wiki.


This course schedule is tentative and subject to change.

Class times and locations

To help you identify the more important topics in the lectures, here is a rough list of important slides, base URL for locating slides by identifier: - append the slide ID to jump to near the slide, e.g. jump may not be exact - you may have to search a couple of slides before/after
Week Topic
Lecture notes
Textbook sections Recommended reading Resources Mindmaps Packets
1 Network Management Systems Clemm: Ch 1, 2, 3:86-97, 5
Comer: Ch 1, 3 and 9.1-9.6
"On the job with a network manager", Ch. 2 of A. Clemm: Network Management Fundamentals (11521 words) GUI management interface for a typical home router Quiz RFC Sourcebook
Colo facility tour. A somewhat old video tour of Akamai's NOCC
2 Revisiting protocol stacks in context of management Clemm: TBD
Comer: Ch 2, 9.7-10 and (less relevant) Ch 12
R. Droms: " Automated configuration of TCP/IP with DHCP", IEEE Internet Computing, 3(4):45-53 (5462 words) Quiz map VLANs GVRP
3 Structuring and presenting management information (SMI, OIDs, MIBs, ASN.1) Ch 6 of Clemm. Ch 10 of Comer B. Kaliski: "A Layman's Guide to a Subset of ASN.1, BER, and DER", RSA Laboratories Technical Note
Chapter 17.1 of L. Parziale et al: "TCP/IP Tutorial and Technical Overview", IBM Redbook GG24-3376-07 (5900 words)

(Only Section 17.1.1 is relevant to week 3, but the remainder is relevant to week 4.)

OIDs: Registry, Repository
Enterprise #s
MIB Repository
4 Communicating management information (BER, SNMP, syslog) Ch 8 of Clemm. Ch 10 of Comer SNMP: Simple Network Management Protocol, Ch. 25 of W. Richard Stevens: TCP/IP Illustrated, Volume 1: The Protocols Quiz,
The Simple Times
SNMP, syslog
Material below this point is yet to be updated for 2014
5 RMON Clemm pp. 307-8; Comer 10.18 Section 9.1.1 of D. Mauro and K. Schmidt: Essential SNMP, O'Reilly (1826 words) E. Wong: Network Monitoring Fundamentals and Standards
6 Mid-session exam   mid-session Clock photos
7 S: Security Management Ch. 5 of Clemm
Ch 6 and 8 of Comer
W. Stallings: "Security Comes to SNMP: The New SNMPv3 Proposed Internet Standards", Internet Protocol Journal, 1(3):2-12

sample chapter 4 on SNMPv3

Configuration Management and Security

8 F: Fault management
Ch 5 of Clemm & Comer G. Candea: The Basics of Dependability (5794 words)
L. Lewis: Event correlation in spectrum and other commercial products, Aprisma White Paper (4347 words)
N. Ayari et al: "Fault tolerance for highly available internet services: concepts, approaches, and issues", IEEE Communications Surveys & Tutorials
A. Haider and R. Harris: "Recovery Techniques in Next Generation Networks", IEEE Communications Surveys & Tutorials

Excel Hamming distance calculator (uses macros so if asked whether you want to 'enable content' while opening the file, then answer yes)

map map HSRP, VRRP
9 C: Configuration Ch. 5 of Clemm
Ch 4 and 13 of Comer
E. Danielyan: “Zero Configuration Networking”, Internet Protocol Journal, 5(4):20-6 (2704 words)
M. Srinivasan: Tutorial on the Link Layer Discovery Protocol

- mid-session break      
10 No class: Labour Day public holiday          
11a A: Accounting Ch 6 of Comer The Art of Peering: The Peering Playbook  RADIUS Diameter
11p P: Performance

Ch. 11 of Clemm.
Ch. 7 of Comer
Service Level Agreements on IP Networks
E. Wustenhoff: “Service Level Agreement in the Data Center

An introduction to IP flow information export (IPFIX)

model SLA Netflix appliance service maintenance agreement (Appendix 2) Why SLAs are redundant, but Zencoder offers one anyway (RPO defined)

12 Student presentations on advanced topics Ch 18 of Comer IRTF NMRG
New Frontiers in Internet Network Management
13 No class / overflow          

Related courses

This course assumes prior knowledge of Network Technologies. It complements the course on Trusted Networks: While security is central to NOC (e.g. it is the S in FCAPS), this course focuses on the operations and control of security and the security of NOC, but not on encryption mechanisms nor securing other ("data plane") network protocols.

Course support


Tim Moors

Contact methods:


Textbooks are available from the UNSW Bookshop which also defines the types "prescribed" and "recommended".


A. Clemm: Network Management Fundamentals, Cisco Press
Since this book doesn't number sections, we'll refer to parts of chapters by their page numbers, e.g. Ch 5:132-143 discusses fault management.

Secondary recommendations

(in alphabetical order by author)

Network Management texts have a reputation for being inane. Any suggestions about textbooks that have substantial engineering depth would be greatly appreciated.

Assessment tasks

Bonus marks

Two student presentations, for which the presenting students received bonus marks: AUSNOG presentation (PPT 2007 format) Mobilink Pakistan. Some ideas for future student presentations: Other ideas for developments that would deserve bonus marks: