SlideShare une entreprise Scribd logo
1  sur  51
Télécharger pour lire hors ligne
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Nirma University
SNMP Based Network Monitoring System
Supporting Real-time Visualization Of Network
SWETA DARGAD(12MCEI37)
CSE-INS,
IT,Nirma University
May 22, 2014
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Project Profile
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Outline
1 Topics covered in earlier presentations
2 Related Works
3 3 Level layered Design
4 Implementation
5 SNMS- Working Of Modules
6 Case Study: DOS attack
7 Issues Resolved
8 Conclusion
9 Future Work
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Topics covered in earlier presentations
1 Topics covered in presentation 1
1 Motivation
2 Problem Definition
3 General Introduction Of NMS And SNMP
4 Literature Survey
5 Related Works
6 Study Of Existing Systems
2 Topics covered in presentation 2
1 General Introduction of RRD
2 Working Of RRD
3 Steps To Network Monitoring
4 Selection Of Tools
3 Topics covered in presentation 3
1 Proposed Approach and Tools Used
2 Design And Implementation
3 Results And Discussions
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Technical Vocabulary
GPL licence : General Public Licence
NMS: Network Monitoring System
MIB : Management Information Base
MS: Management Station
API : Application Programing Interface
RRD : Round Robin Database
Oid: Object Id
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Key Points
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Objective
The objective of this research is to provide a standard framework
to use open source and easily avaialble tools and build a Network
Monitoring System in Linux like environment and easy-to-use
front-end.
It is simple to implement with database in RRD Tool and
storage of other required fields in MySql.
It is flexible
Show Network Map which shows targeted graphs to each
device
Allows a variety of network devices, Interfaces, Operating
sytem to be queried.
Provides Ping, and target to measure bandwidth, cpu, web
statistics, memory, disk, ups etc.
Provides a web-based, menu driven presentations of network
metrices graphically.
Discover SNMP attributes about each target.
Alerts via E-mail or Syslog upon a failure of an added deviceCSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
SNMP
An SNMP-managed network[7] consists of three components.
A Managed Device[8] is an equipment that is in on network
and is SNMP compliant. A managed device can be Routers,
switches, workstations and printers
The agent is typically software that resides on a managed
device.
A managed device[21] can be any piece of equipment that sits
on your data network and is SNMP compliant. Routers,
switches, hubs, workstations, and printers are all examples of
managed devices
A single SNMP message is referred to as a Protocol Data
Unit.
Data is collected from the devices by the SNMP agents that
uses querying by Net-SNMP.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layered Structure of SNMP commands
Figure : SNMP commands in a layered Structure
snmp get, getnext and walk are used to retrieve the value of an
object instance and snmpset is used to write a value to object.
get,getnext,set requests are sent on 161 port and trap on 162 port.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
RRDTool
RRDtool[14] handles time-series data like network bandwidth,
temperatures, CPU load, etc.
The data is stored in a round-robin database (circular buffer),
thus the system storage footprint remains constant over time.
RRD Tool does not store data as we hand it, rather it
re-samples the data and store the re-sampled version of it.
Data arrive roughly 5 minutes but not exactly. It takes actual
arrival time under curve and create new points in time
between interval and make a curve beneath that real curve.
Thus traffic latency will be same but the numbers shown may
differ.
Reasons of indefinite arrival of data may be Query lost or
Device Down
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
RRDTool Datastructure
Figure : Above image shows that
data stored in RRD is like in a
circular queue. Figure : rrd curve and RRD’s
mechanism to plot datapoints
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Life of Data in RRD
Figure : This figure shows that the raw data is sampled at definite
interval of time and consolidation is done which is then stored in the
RRA and later it destroys the oldest sample
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
3 Level layered Design
Figure : Three Level layered model for Network Monitoring Sytem
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer 3
This layer is very important to control and monitor the
network at their end or from anywhere in the organization
A web-application can be used as a Network Management
Station but which can be accessed from any where in network.
This layer consist of modules like Weathermap, graphing,
statistics, and Alarms.
This layer signifies the need of a Web application at first place.
A network Administrator needs to check his network from any
where in the organization or even out-side
He needs to have a ubiquitous access to the networkThese are
HTML pages which show the network devices linked together
as the user’s network.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer3 : NetworkMap Module
This module is connected to Polling Module, Cron and
RRDTool/Database module in Layer 2.
It uses PHP-Weathermap tool to make beautifully crafted
Network Map.
These are HTML pages which show the network devices linked
together as the user’s network.
We need to create a weathermap.conf file and run it.
Here we can insert icons and labels and links to show the
network layout in a beautifully crafted way.
We need to target the rrd’s which we create in Layer2 using
RRDTool.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Network Map of IPR network
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer3 : Graphing Module
This module is connected to Polling Module and Cron,
RRDTool/Database module and MySQL database in Layer 2.
It uses PHP script which in turn create a shell script where
rrdcreate is used to create rrd and rrdupdate to update it and
the rrdgraph is used to create a graph of the updated rrd.
These graphs are saved in MySQL database by user which he
could later view.
Also the user will add the shell script to the cron to get
updated graphs.
Also graphs of Memory are made and updated by a script to
map the memory of the system
Realtime CPU Usage and Ram Usage is calculated by ”top”.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Graphing Module
Figure : Graph of Memory usage last Day
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer3 : Statistics Module
This module is connected to Polling Module.
Which inturn sends SNMPGet request PDU at backend to
gather information from the network devices in Layer 1
SNMP Agent on Layer1 sends the SNMPResponse PDU in
reply which is viewed in statistics Module by user.
Figure : PDU format of SNMP Messages
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Statistics Module
Figure : Interface statistics of router
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer3 : Alarming Module
This module is connected to PHP-ServerMonitor which stores
info in MySQL database.
It generates alert messages and can send those to user by sms
or email.
It uses POP and SMTP to send mails.
It checks whether the servers listed or the services added are
up and running on the selected ports or not.
The ports and services are monitored at a fixed interval
Also Syslogs are generated and stored to keep a track of
which service went down at which time.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Alarming Module
Figure : Snapshot of Alarming Module
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer 2
The users request is sent to second layer which consists of
Monitoring Server and is also known as ”Functional layer” .
SNMP request are sent to polling module from time to time
as specified in Cron to the SNMP Agents.
Layer 3 gets all its graphs, Networkmap targets, and satistics
from this layer.
These SNMP Requests are sent to the data collection module
in layer 1.
The data from the SNMP Response are sent to RRD Database
which stores this time series data in form of bit-format files.
The data in the rrds are fed to generate graphs or target in
NetworkMap.
Alerts are sent from PHP-Server Monitor to Alarms module in
Layer 3 which are stored in Database.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer 1
This layer is of Net-SNMP , here data collection is done by
Net-SNMP .
This layer is also known as ”Data layer”.
This layer consist of SNMP Agents who reside on the Network
Devices and network devices.
Data is collected from the devices by the SNMP agents that
use querying of Net-SNMP. The response that is generated by
this Layer is sent to layer 2 in the form of SNMP-Reponse.
The devices always need to listen on port 161 to get requests
and the Monitoring server needs to listen on 162 to get trap
probes.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer2: SNMP Request and Response
Figure : NMS sends SNMP request on UDP(User Datagram Protocol)
and on port 161 to the SNMP agent which is daemon[8].SNMP agent
contacts the subagents on the device on internal port and collect relevent
information of SNMP get request and gives SNMP reponse on UDP port
161 and trap on 162.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Layer2: RRDtool
RRDtool is responsible of generating graphs in layer 3. There
are three(3) basic steps to setting up RRDtool and graphing
Initialize the database : Create the rrd database and prepare it
to accept data using rrdcreate.
Collect the data sets over time: We update the rrd file after
every specified interval using rrdupdate.
Create the graph : Take the data from the rrd database, do
any calculations we want to do on the data and create that
actual graph using rrdgraph
Add to cron tab: The cron job will run to collect data using a
script to enter that data periodically into the database
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
RRD create
step is the amount of time in seconds we expect data to be
updated into the database
start It can be ”N” for now or time in epochs
DS:pl:GAUGE:120:0:100 DS stands for DataSet followed by
name of data set followed by type of dataset and the 120 is
heatbeat time in seconds followed by start and end points on
graph.
RRA:MAX:0.5:1:1500 Round Robin Archieve Directive: which
defines how many values the RRD database will archieve
followed by type of value here only MAX, 0.5 is a constant, 1
shows no. of steps and 1500 shows no. of steps to store in
database
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
User Registration
User Needs to Rgister if he is a new User, On clicking on
”Register”
User enters his User Name and ”Password” and Confirm
”Password”.
A php script runs which connects to database ”nms” and
inserts the UserName and encrypted password into table
”users” .
It also checks if the user is already registered and if so it
throws exception ”UserName is already in Use”.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Dashboard
Once User completes registration He can Login and see the
Dashboard
Dashboard contains frames showing no. of links ”UP” and
”DOWN” using ”NMAP”
Also User see the realtime graph of the Ping to Internal
Router which if down brings the LAN down.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
NetworkMap Module
The User can see the NetworkMap of external network and
clicking on the router, he can view the architecture of the
network devices connected to internal network in the iframe
User can click on the links and view the graph of the IN/Out
traffic
User see the link status and average traffic on the first glance
itself
Graphs showing the in and out traffic of the link at one click .
Also status of the link with current traffic on NetworkMap.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Graphing Module
Also We can view bar graphs of CPU usage and RAM usage
in Real-Time. Bellow figure shows snapshot of the same.
These bar charts are showing the statistics of CPU and RAM
usage in beautiful Bar charts which are easy to understand.
User see Memory usage graphs for which a shell script is run
”rrdtool create” to create a rrd, ” rrdtool update” by
command ”free” and ”rrdtool graph” to graph the data.
User can add new graph to the table ”oldgraphs” of any
HOST which has SNMP enabled on it and view them later.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Ghraphing Module: Diagram
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Case Study: Denial of Service Attack
Here we conducted an experiment in which we generated a lot
of traffic on a switch so as to do a DOS attack on it. We will
see how Network Monitoring system can point towards such
attacks also. For this we will see the Traffic graphs of the
switch.
Figure : Graph showing Ping Latency of a Switch
Result : The figure shows the switch was down nearly at 3pm.
The Red bar shows that there was 50-100 packet loss.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Statistics Module
The user can get statistics in a tabular form which is directly
obtained by quering specific Oid of the devices.
System Uptime
No. of Interfaces
Routing Information
Speed of the links on the Interface
In-traffic and Out-traffic of interface
performance counters
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Statistics Module: Server Statistcs And Related Oids
Figure : This table shows the Oids, sending snmpget to this oid will give
real-time information of the servers
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Alarming Module
User can add Servers and Services to the database servermon
and table ”psm-startservers” by just click on ”ADD” button.
We need to specify the label , Domain or IP, Port, type of
service and search pattern to add new Server/Service.
Add email of Users to whom the NMS needs to notify in case
of flaws to table ”psm-startusers”.
View Logs which are stored in ”psm-startlog”.
Change Configuration in ”psm-startconfig”.
Also Logs can be saved which store the information about the
service/server that went down along with the time stamp.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Data Dictionary for Logs
Figure : The Structure Of The Table For Logging
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Logs generated By Alarming Module
Figure : Logs Generated
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Denial of Service Attack
CaseWe study the Denial Of Service attack and detection of the
same using a SNMP based Network Monitoring System.
Objective We will see how our SNMS helps in detection of the
attack and Visualization of the network by just monitoring the
traffic and ping statistics of the switches used to design the
network. Also our objective of Collecting Historic Information For
Base-lining And Trending Purposes can be fulfilled or not. We will
monitor the network and try to get some interesting results. Below
diagram shows the network design of the experiment.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Network Diagram: Denial of Service Attack
Figure : Network Diagram of Scenerio for DOS Attack
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Case Study: Denial of Service Attack
We design a network of three switches connected to each
other, say Switch A, Switch B and Switch C.
We connect these switches to an external switch which is
connected to 2 workstation , one of which is a server for our
Network Monitoring System , here it is SNMS (SNMP based
Network Monitoring System).
Now we monitor the switches by generating a graph of In/Out
traffic on the interfaces of those switches.
We generated a lot of traffic by TCP flooding on the switch B
so as to do a DOS attack on it.
We will see how Network Monitoring system can point
towards such attacks also. For this we will see the Traffic
graph of the switch before and after the interval of the attack.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Results: Denial of Service Attack
Figure : Graph Showing Ping Latency Of SwitchB
Result 1 : The above figure is a graph showing ping statistics of a
switch which was down nearing 3pm. This is understood because
the Red bar shows that there was 50-100 packet loss. The
Monitoring Server was trying to ping but it was unavailable.
Latency was 3.91 to ping the device.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Case Study: Denial of Service Attack
Figure : Graph Showing In/Out
Traffic Of Switch A At Interafce1
Figure : Graph Showing In/Out
Traffic Of Switch A At Interafce3
Result 2 : We connected SwitchA to the external network at
interface 1 and to Switch B at interface 3. The graph of Switch A
at interface1 has Intraffic 11 Mbps but at the time of attack, the
graph is empty, the SNMS server is unable to send packets at the
interval of time when DOS attack. This shows the SNMP get
Request to graph was unable to get the SNMP reply at the time of
DOS attack.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Issues Resolved
Figure : Issues Resolved
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Comparison of Various tools with NMS
Figure : Comparison of Various tool with NMS
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Conclusion
Considering the features of SNMP like flexibility and simplicity
and less load, A SNMP based Network monitoring system is
designed which supports ubiquitous access.
By querying the network devices from time to time graphs can
be plotted for easy understanding of traffic trend.
Real-time visualization of graphs can be added of disk usage,
memory usage, logged in users and ping latency.
Real-time Bar graphs showing CPU and RAM Usage of the
device on oneclick is possible.
NetworkMap shows underlying Network Design at a glance
with link status and in/out traffic. Also in time of flaws the
NMS can send alerts to users in the form of SMS and E-mail.
In case of loop or any such problem NA can sit on his place
and check the device statistics and also can store Ping
Latency of important devices like Routers.
Status of critical switches along with the number of interfacesCSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Limitations
The framework which we have designed for SNMS is on a
centralized server. All the querying is done from that server
itself in a LAN network. What if the network is WAN, In such
a network this framework will not be able to monitor. In such
environment there would be a need of Distributed Network
Monitoring System.
Nowadays organizations have started adding wireless devices
to network a lot. These wireless devices create a IEEE 802.11
wireless networks. SNMP is capable of monitoring such a
network. We have not added wireless devices in our objective
to be monitored.
Our project deals with only the network monitoring and not
the Network Management. We have used only SNMP get
commands, But user cannot set the OId which are
READ/WRITE Oids ex: System Information like System
Name, Location.CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Future Work
SNMP based Distributed Network Monitoring.
SNMP based Network Monitoring of Wireless devices.
Network Management using SNMP.
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
TimeLine
Figure : Timeline of Project
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
References
D. Harrington, R. Presuhn, B. Wijnen. ”RFC 3411: An Architecture for Describing Simple Network
Management Protocol (SNMP) Management Frameworks” , IETF, December 2002.
M. Rose, K. McCloghrie. ”RFC 1155: Structure and Identification of Management Information for
TCP/IP-based Internets” , IETF , May 1990
Ranganai Chaparadza,” On designing SNMP based monitoring systems supporting ubiquitous access and
real-time visualization of traffic flow in the network,using low cost tools”, Jounal 13th IEEE International
Conference on Networks,2005
Authors Zeng, Wenxian Wang, Yue ” Design and Implementation of Server Monitoring System Based on
SNMP”, International Joint Conference on Artificial Intelligence, Jounal 2009
Paul Moceri, ”SNMP and Beyond: A Survey of Network Performance Monitoring Tools”
Chakchai Netphakdee, Chinnakorn Wijitsopon, Kasidit ” Web-based Automatic Network Discovery / Map
Systems”,Issue Iccaie ,Year 2011.
Paul Simoneau,” SNMP Network Management” ,1999 .
Douglas R.Mauro and KevinJ.Schmidt, ”Essential SNMP”,Book by OREILLY,2009.
W. Stallings,” SNMP, SNMPv2, and RMON: Practical Network Management, MA Addison-Wesley, 1996.
William Stallings,” SNMP and SNMPv2: The Infrastructure for Network Management”,IEEE
Communications Magazine, March 1998
M. Rose,” The Simple Book: An introduction to Network Management” 3rd ed., Upper Saddle River, NJ:
Prentice Hall, 1996.
Moceri, Paul,”SNMP and Beyond : A Survey of Network Performance Monitoring Tools”, White paper
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References
Demo
Demo
CSE Department CSE-INS,IT,Nirma University
SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network

Contenu connexe

Tendances

Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetGyan Prakash
 
Project report
Project reportProject report
Project reportayush13bbm
 
Routing & Switching report
Routing & Switching reportRouting & Switching report
Routing & Switching reportExpress News
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEEMEMTECHSTUDENTPROJECTS
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETIRJET Journal
 
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCANADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCANIJNSA Journal
 
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...IJCNCJournal
 
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issuesNetwork analysis Using Wireshark Lesson 12 - bandwidth and delay issues
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issuesYoram Orzach
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInformation Technology
 
OpenFlow Security Threat Detection and Defense Services
OpenFlow Security Threat Detection and Defense ServicesOpenFlow Security Threat Detection and Defense Services
OpenFlow Security Threat Detection and Defense ServicesEswar Publications
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and DesingMd Khaza Main Uddin
 
5th KuVS Meeting
5th KuVS Meeting5th KuVS Meeting
5th KuVS Meetingsteccami
 
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017Yoram Orzach
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorIJECEIAES
 
Error performance of jpeg and watermark
Error performance of jpeg and watermarkError performance of jpeg and watermark
Error performance of jpeg and watermarkijsptm
 

Tendances (20)

Network Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes NetNetwork Traffic Anomaly Detection Through Bayes Net
Network Traffic Anomaly Detection Through Bayes Net
 
Snmp
SnmpSnmp
Snmp
 
Project report
Project reportProject report
Project report
 
Routing & Switching report
Routing & Switching reportRouting & Switching report
Routing & Switching report
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
IEEE 2014 DOTNET PARALLEL DISTRIBUTED PROJECTS A system-for-denial-of-service...
 
A Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANETA Survey on Data Intrusion schemes used in MANET
A Survey on Data Intrusion schemes used in MANET
 
bakalarska_praca
bakalarska_pracabakalarska_praca
bakalarska_praca
 
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCANADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
 
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
FLOODING ATTACK DETECTION AND MITIGATION IN SDN WITH MODIFIED ADAPTIVE THRESH...
 
Wsn protocols
Wsn protocolsWsn protocols
Wsn protocols
 
SNMP
SNMPSNMP
SNMP
 
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issuesNetwork analysis Using Wireshark Lesson 12 - bandwidth and delay issues
Network analysis Using Wireshark Lesson 12 - bandwidth and delay issues
 
Internet Traffic Monitoring and Analysis
Internet Traffic Monitoring and AnalysisInternet Traffic Monitoring and Analysis
Internet Traffic Monitoring and Analysis
 
OpenFlow Security Threat Detection and Defense Services
OpenFlow Security Threat Detection and Defense ServicesOpenFlow Security Threat Detection and Defense Services
OpenFlow Security Threat Detection and Defense Services
 
Proposal for System Analysis and Desing
Proposal for System Analysis and DesingProposal for System Analysis and Desing
Proposal for System Analysis and Desing
 
5th KuVS Meeting
5th KuVS Meeting5th KuVS Meeting
5th KuVS Meeting
 
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
lesson 2- Network analysis Using Wireshark introduction to cellular feb-2017
 
Optimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behaviorOptimal remote access trojans detection based on network behavior
Optimal remote access trojans detection based on network behavior
 
Error performance of jpeg and watermark
Error performance of jpeg and watermarkError performance of jpeg and watermark
Error performance of jpeg and watermark
 

Similaire à RRD Tool and Network Monitoring

Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdfkristinatemen
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system pptashutosh rai
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
Ijrime complimentary copy vol1 issue5
Ijrime complimentary copy vol1 issue5Ijrime complimentary copy vol1 issue5
Ijrime complimentary copy vol1 issue5surendergupta1978
 
Ijrime complimentary copy vol1 issue5
Ijrime complimentary copy vol1 issue5Ijrime complimentary copy vol1 issue5
Ijrime complimentary copy vol1 issue5surendergupta1978
 
Performance comparision 1307.4129
Performance comparision 1307.4129Performance comparision 1307.4129
Performance comparision 1307.4129Pratik Joshi
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptIRJET Journal
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
Designing a Perfection with the Network Simulation System
Designing a Perfection with the Network Simulation SystemDesigning a Perfection with the Network Simulation System
Designing a Perfection with the Network Simulation SystemGambit Communications
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Maria Stylianou
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Journals
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficeSAT Publishing House
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewIJERD Editor
 
slides_itc30_2018_Morichetta_v2.pdf
slides_itc30_2018_Morichetta_v2.pdfslides_itc30_2018_Morichetta_v2.pdf
slides_itc30_2018_Morichetta_v2.pdfAndrea Morichetta
 
IRJET- Study of Various Network Simulators
IRJET- Study of Various Network SimulatorsIRJET- Study of Various Network Simulators
IRJET- Study of Various Network SimulatorsIRJET Journal
 
Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxaida alsamawi
 

Similaire à RRD Tool and Network Monitoring (20)

NS-3
NS-3 NS-3
NS-3
 
June 28 Presentation
June 28 PresentationJune 28 Presentation
June 28 Presentation
 
Network Monitoring System ppt.pdf
Network Monitoring System ppt.pdfNetwork Monitoring System ppt.pdf
Network Monitoring System ppt.pdf
 
network monitoring system ppt
network monitoring system pptnetwork monitoring system ppt
network monitoring system ppt
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
Ijrime complimentary copy vol1 issue5
Ijrime complimentary copy vol1 issue5Ijrime complimentary copy vol1 issue5
Ijrime complimentary copy vol1 issue5
 
Ijrime complimentary copy vol1 issue5
Ijrime complimentary copy vol1 issue5Ijrime complimentary copy vol1 issue5
Ijrime complimentary copy vol1 issue5
 
Performance comparision 1307.4129
Performance comparision 1307.4129Performance comparision 1307.4129
Performance comparision 1307.4129
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
Designing a Perfection with the Network Simulation System
Designing a Perfection with the Network Simulation SystemDesigning a Perfection with the Network Simulation System
Designing a Perfection with the Network Simulation System
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...Performance Analysis of multithreaded applications based on Hardware Simulati...
Performance Analysis of multithreaded applications based on Hardware Simulati...
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network trafficOnline stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
 
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A ReviewAnalysis of IT Monitoring Using Open Source Software Techniques: A Review
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
 
slides_itc30_2018_Morichetta_v2.pdf
slides_itc30_2018_Morichetta_v2.pdfslides_itc30_2018_Morichetta_v2.pdf
slides_itc30_2018_Morichetta_v2.pdf
 
Dc project 1
Dc project 1Dc project 1
Dc project 1
 
IRJET- Study of Various Network Simulators
IRJET- Study of Various Network SimulatorsIRJET- Study of Various Network Simulators
IRJET- Study of Various Network Simulators
 
Lecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptxLecture 1 - Introduction.pptx
Lecture 1 - Introduction.pptx
 

Plus de sweta dargad

Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technologysweta dargad
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2sweta dargad
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1sweta dargad
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimessweta dargad
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’ssweta dargad
 

Plus de sweta dargad (9)

Sock Puppet.pptx
Sock Puppet.pptxSock Puppet.pptx
Sock Puppet.pptx
 
Stacks
StacksStacks
Stacks
 
Applications of RFID technology
Applications of RFID technologyApplications of RFID technology
Applications of RFID technology
 
Cyber security tutorial2
Cyber security tutorial2Cyber security tutorial2
Cyber security tutorial2
 
Cyber security tutorial1
Cyber security tutorial1Cyber security tutorial1
Cyber security tutorial1
 
Classifying Cybercrimes
Classifying CybercrimesClassifying Cybercrimes
Classifying Cybercrimes
 
All about snmp
All about snmpAll about snmp
All about snmp
 
Open source nms’s
Open source nms’sOpen source nms’s
Open source nms’s
 
Cacti
CactiCacti
Cacti
 

Dernier

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 

Dernier (20)

Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 

RRD Tool and Network Monitoring

  • 1. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network SWETA DARGAD(12MCEI37) CSE-INS, IT,Nirma University May 22, 2014 CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 2. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Project Profile CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 3. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Outline 1 Topics covered in earlier presentations 2 Related Works 3 3 Level layered Design 4 Implementation 5 SNMS- Working Of Modules 6 Case Study: DOS attack 7 Issues Resolved 8 Conclusion 9 Future Work CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 4. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Topics covered in earlier presentations 1 Topics covered in presentation 1 1 Motivation 2 Problem Definition 3 General Introduction Of NMS And SNMP 4 Literature Survey 5 Related Works 6 Study Of Existing Systems 2 Topics covered in presentation 2 1 General Introduction of RRD 2 Working Of RRD 3 Steps To Network Monitoring 4 Selection Of Tools 3 Topics covered in presentation 3 1 Proposed Approach and Tools Used 2 Design And Implementation 3 Results And Discussions CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 5. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Technical Vocabulary GPL licence : General Public Licence NMS: Network Monitoring System MIB : Management Information Base MS: Management Station API : Application Programing Interface RRD : Round Robin Database Oid: Object Id CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 6. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Key Points CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 7. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Objective The objective of this research is to provide a standard framework to use open source and easily avaialble tools and build a Network Monitoring System in Linux like environment and easy-to-use front-end. It is simple to implement with database in RRD Tool and storage of other required fields in MySql. It is flexible Show Network Map which shows targeted graphs to each device Allows a variety of network devices, Interfaces, Operating sytem to be queried. Provides Ping, and target to measure bandwidth, cpu, web statistics, memory, disk, ups etc. Provides a web-based, menu driven presentations of network metrices graphically. Discover SNMP attributes about each target. Alerts via E-mail or Syslog upon a failure of an added deviceCSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 8. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References SNMP An SNMP-managed network[7] consists of three components. A Managed Device[8] is an equipment that is in on network and is SNMP compliant. A managed device can be Routers, switches, workstations and printers The agent is typically software that resides on a managed device. A managed device[21] can be any piece of equipment that sits on your data network and is SNMP compliant. Routers, switches, hubs, workstations, and printers are all examples of managed devices A single SNMP message is referred to as a Protocol Data Unit. Data is collected from the devices by the SNMP agents that uses querying by Net-SNMP. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 9. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layered Structure of SNMP commands Figure : SNMP commands in a layered Structure snmp get, getnext and walk are used to retrieve the value of an object instance and snmpset is used to write a value to object. get,getnext,set requests are sent on 161 port and trap on 162 port. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 10. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References RRDTool RRDtool[14] handles time-series data like network bandwidth, temperatures, CPU load, etc. The data is stored in a round-robin database (circular buffer), thus the system storage footprint remains constant over time. RRD Tool does not store data as we hand it, rather it re-samples the data and store the re-sampled version of it. Data arrive roughly 5 minutes but not exactly. It takes actual arrival time under curve and create new points in time between interval and make a curve beneath that real curve. Thus traffic latency will be same but the numbers shown may differ. Reasons of indefinite arrival of data may be Query lost or Device Down CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 11. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References RRDTool Datastructure Figure : Above image shows that data stored in RRD is like in a circular queue. Figure : rrd curve and RRD’s mechanism to plot datapoints CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 12. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Life of Data in RRD Figure : This figure shows that the raw data is sampled at definite interval of time and consolidation is done which is then stored in the RRA and later it destroys the oldest sample CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 13. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References 3 Level layered Design Figure : Three Level layered model for Network Monitoring Sytem CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 14. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer 3 This layer is very important to control and monitor the network at their end or from anywhere in the organization A web-application can be used as a Network Management Station but which can be accessed from any where in network. This layer consist of modules like Weathermap, graphing, statistics, and Alarms. This layer signifies the need of a Web application at first place. A network Administrator needs to check his network from any where in the organization or even out-side He needs to have a ubiquitous access to the networkThese are HTML pages which show the network devices linked together as the user’s network. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 15. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer3 : NetworkMap Module This module is connected to Polling Module, Cron and RRDTool/Database module in Layer 2. It uses PHP-Weathermap tool to make beautifully crafted Network Map. These are HTML pages which show the network devices linked together as the user’s network. We need to create a weathermap.conf file and run it. Here we can insert icons and labels and links to show the network layout in a beautifully crafted way. We need to target the rrd’s which we create in Layer2 using RRDTool. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 16. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Network Map of IPR network CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 17. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer3 : Graphing Module This module is connected to Polling Module and Cron, RRDTool/Database module and MySQL database in Layer 2. It uses PHP script which in turn create a shell script where rrdcreate is used to create rrd and rrdupdate to update it and the rrdgraph is used to create a graph of the updated rrd. These graphs are saved in MySQL database by user which he could later view. Also the user will add the shell script to the cron to get updated graphs. Also graphs of Memory are made and updated by a script to map the memory of the system Realtime CPU Usage and Ram Usage is calculated by ”top”. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 18. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Graphing Module Figure : Graph of Memory usage last Day CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 19. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer3 : Statistics Module This module is connected to Polling Module. Which inturn sends SNMPGet request PDU at backend to gather information from the network devices in Layer 1 SNMP Agent on Layer1 sends the SNMPResponse PDU in reply which is viewed in statistics Module by user. Figure : PDU format of SNMP Messages CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 20. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Statistics Module Figure : Interface statistics of router CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 21. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer3 : Alarming Module This module is connected to PHP-ServerMonitor which stores info in MySQL database. It generates alert messages and can send those to user by sms or email. It uses POP and SMTP to send mails. It checks whether the servers listed or the services added are up and running on the selected ports or not. The ports and services are monitored at a fixed interval Also Syslogs are generated and stored to keep a track of which service went down at which time. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 22. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Alarming Module Figure : Snapshot of Alarming Module CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 23. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer 2 The users request is sent to second layer which consists of Monitoring Server and is also known as ”Functional layer” . SNMP request are sent to polling module from time to time as specified in Cron to the SNMP Agents. Layer 3 gets all its graphs, Networkmap targets, and satistics from this layer. These SNMP Requests are sent to the data collection module in layer 1. The data from the SNMP Response are sent to RRD Database which stores this time series data in form of bit-format files. The data in the rrds are fed to generate graphs or target in NetworkMap. Alerts are sent from PHP-Server Monitor to Alarms module in Layer 3 which are stored in Database. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 24. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer 1 This layer is of Net-SNMP , here data collection is done by Net-SNMP . This layer is also known as ”Data layer”. This layer consist of SNMP Agents who reside on the Network Devices and network devices. Data is collected from the devices by the SNMP agents that use querying of Net-SNMP. The response that is generated by this Layer is sent to layer 2 in the form of SNMP-Reponse. The devices always need to listen on port 161 to get requests and the Monitoring server needs to listen on 162 to get trap probes. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 25. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer2: SNMP Request and Response Figure : NMS sends SNMP request on UDP(User Datagram Protocol) and on port 161 to the SNMP agent which is daemon[8].SNMP agent contacts the subagents on the device on internal port and collect relevent information of SNMP get request and gives SNMP reponse on UDP port 161 and trap on 162. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 26. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Layer2: RRDtool RRDtool is responsible of generating graphs in layer 3. There are three(3) basic steps to setting up RRDtool and graphing Initialize the database : Create the rrd database and prepare it to accept data using rrdcreate. Collect the data sets over time: We update the rrd file after every specified interval using rrdupdate. Create the graph : Take the data from the rrd database, do any calculations we want to do on the data and create that actual graph using rrdgraph Add to cron tab: The cron job will run to collect data using a script to enter that data periodically into the database CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 27. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References RRD create step is the amount of time in seconds we expect data to be updated into the database start It can be ”N” for now or time in epochs DS:pl:GAUGE:120:0:100 DS stands for DataSet followed by name of data set followed by type of dataset and the 120 is heatbeat time in seconds followed by start and end points on graph. RRA:MAX:0.5:1:1500 Round Robin Archieve Directive: which defines how many values the RRD database will archieve followed by type of value here only MAX, 0.5 is a constant, 1 shows no. of steps and 1500 shows no. of steps to store in database CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 28. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References User Registration User Needs to Rgister if he is a new User, On clicking on ”Register” User enters his User Name and ”Password” and Confirm ”Password”. A php script runs which connects to database ”nms” and inserts the UserName and encrypted password into table ”users” . It also checks if the user is already registered and if so it throws exception ”UserName is already in Use”. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 29. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Dashboard Once User completes registration He can Login and see the Dashboard Dashboard contains frames showing no. of links ”UP” and ”DOWN” using ”NMAP” Also User see the realtime graph of the Ping to Internal Router which if down brings the LAN down. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 30. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References NetworkMap Module The User can see the NetworkMap of external network and clicking on the router, he can view the architecture of the network devices connected to internal network in the iframe User can click on the links and view the graph of the IN/Out traffic User see the link status and average traffic on the first glance itself Graphs showing the in and out traffic of the link at one click . Also status of the link with current traffic on NetworkMap. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 31. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Graphing Module Also We can view bar graphs of CPU usage and RAM usage in Real-Time. Bellow figure shows snapshot of the same. These bar charts are showing the statistics of CPU and RAM usage in beautiful Bar charts which are easy to understand. User see Memory usage graphs for which a shell script is run ”rrdtool create” to create a rrd, ” rrdtool update” by command ”free” and ”rrdtool graph” to graph the data. User can add new graph to the table ”oldgraphs” of any HOST which has SNMP enabled on it and view them later. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 32. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Ghraphing Module: Diagram CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 33. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Case Study: Denial of Service Attack Here we conducted an experiment in which we generated a lot of traffic on a switch so as to do a DOS attack on it. We will see how Network Monitoring system can point towards such attacks also. For this we will see the Traffic graphs of the switch. Figure : Graph showing Ping Latency of a Switch Result : The figure shows the switch was down nearly at 3pm. The Red bar shows that there was 50-100 packet loss. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 34. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Statistics Module The user can get statistics in a tabular form which is directly obtained by quering specific Oid of the devices. System Uptime No. of Interfaces Routing Information Speed of the links on the Interface In-traffic and Out-traffic of interface performance counters CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 35. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Statistics Module: Server Statistcs And Related Oids Figure : This table shows the Oids, sending snmpget to this oid will give real-time information of the servers CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 36. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Alarming Module User can add Servers and Services to the database servermon and table ”psm-startservers” by just click on ”ADD” button. We need to specify the label , Domain or IP, Port, type of service and search pattern to add new Server/Service. Add email of Users to whom the NMS needs to notify in case of flaws to table ”psm-startusers”. View Logs which are stored in ”psm-startlog”. Change Configuration in ”psm-startconfig”. Also Logs can be saved which store the information about the service/server that went down along with the time stamp. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 37. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Data Dictionary for Logs Figure : The Structure Of The Table For Logging CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 38. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Logs generated By Alarming Module Figure : Logs Generated CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 39. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Denial of Service Attack CaseWe study the Denial Of Service attack and detection of the same using a SNMP based Network Monitoring System. Objective We will see how our SNMS helps in detection of the attack and Visualization of the network by just monitoring the traffic and ping statistics of the switches used to design the network. Also our objective of Collecting Historic Information For Base-lining And Trending Purposes can be fulfilled or not. We will monitor the network and try to get some interesting results. Below diagram shows the network design of the experiment. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 40. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Network Diagram: Denial of Service Attack Figure : Network Diagram of Scenerio for DOS Attack CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 41. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Case Study: Denial of Service Attack We design a network of three switches connected to each other, say Switch A, Switch B and Switch C. We connect these switches to an external switch which is connected to 2 workstation , one of which is a server for our Network Monitoring System , here it is SNMS (SNMP based Network Monitoring System). Now we monitor the switches by generating a graph of In/Out traffic on the interfaces of those switches. We generated a lot of traffic by TCP flooding on the switch B so as to do a DOS attack on it. We will see how Network Monitoring system can point towards such attacks also. For this we will see the Traffic graph of the switch before and after the interval of the attack. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 42. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Results: Denial of Service Attack Figure : Graph Showing Ping Latency Of SwitchB Result 1 : The above figure is a graph showing ping statistics of a switch which was down nearing 3pm. This is understood because the Red bar shows that there was 50-100 packet loss. The Monitoring Server was trying to ping but it was unavailable. Latency was 3.91 to ping the device. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 43. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Case Study: Denial of Service Attack Figure : Graph Showing In/Out Traffic Of Switch A At Interafce1 Figure : Graph Showing In/Out Traffic Of Switch A At Interafce3 Result 2 : We connected SwitchA to the external network at interface 1 and to Switch B at interface 3. The graph of Switch A at interface1 has Intraffic 11 Mbps but at the time of attack, the graph is empty, the SNMS server is unable to send packets at the interval of time when DOS attack. This shows the SNMP get Request to graph was unable to get the SNMP reply at the time of DOS attack. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 44. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Issues Resolved Figure : Issues Resolved CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 45. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Comparison of Various tools with NMS Figure : Comparison of Various tool with NMS CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 46. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Conclusion Considering the features of SNMP like flexibility and simplicity and less load, A SNMP based Network monitoring system is designed which supports ubiquitous access. By querying the network devices from time to time graphs can be plotted for easy understanding of traffic trend. Real-time visualization of graphs can be added of disk usage, memory usage, logged in users and ping latency. Real-time Bar graphs showing CPU and RAM Usage of the device on oneclick is possible. NetworkMap shows underlying Network Design at a glance with link status and in/out traffic. Also in time of flaws the NMS can send alerts to users in the form of SMS and E-mail. In case of loop or any such problem NA can sit on his place and check the device statistics and also can store Ping Latency of important devices like Routers. Status of critical switches along with the number of interfacesCSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 47. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Limitations The framework which we have designed for SNMS is on a centralized server. All the querying is done from that server itself in a LAN network. What if the network is WAN, In such a network this framework will not be able to monitor. In such environment there would be a need of Distributed Network Monitoring System. Nowadays organizations have started adding wireless devices to network a lot. These wireless devices create a IEEE 802.11 wireless networks. SNMP is capable of monitoring such a network. We have not added wireless devices in our objective to be monitored. Our project deals with only the network monitoring and not the Network Management. We have used only SNMP get commands, But user cannot set the OId which are READ/WRITE Oids ex: System Information like System Name, Location.CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 48. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Future Work SNMP based Distributed Network Monitoring. SNMP based Network Monitoring of Wireless devices. Network Management using SNMP. CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 49. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References TimeLine Figure : Timeline of Project CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 50. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References References D. Harrington, R. Presuhn, B. Wijnen. ”RFC 3411: An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks” , IETF, December 2002. M. Rose, K. McCloghrie. ”RFC 1155: Structure and Identification of Management Information for TCP/IP-based Internets” , IETF , May 1990 Ranganai Chaparadza,” On designing SNMP based monitoring systems supporting ubiquitous access and real-time visualization of traffic flow in the network,using low cost tools”, Jounal 13th IEEE International Conference on Networks,2005 Authors Zeng, Wenxian Wang, Yue ” Design and Implementation of Server Monitoring System Based on SNMP”, International Joint Conference on Artificial Intelligence, Jounal 2009 Paul Moceri, ”SNMP and Beyond: A Survey of Network Performance Monitoring Tools” Chakchai Netphakdee, Chinnakorn Wijitsopon, Kasidit ” Web-based Automatic Network Discovery / Map Systems”,Issue Iccaie ,Year 2011. Paul Simoneau,” SNMP Network Management” ,1999 . Douglas R.Mauro and KevinJ.Schmidt, ”Essential SNMP”,Book by OREILLY,2009. W. Stallings,” SNMP, SNMPv2, and RMON: Practical Network Management, MA Addison-Wesley, 1996. William Stallings,” SNMP and SNMPv2: The Infrastructure for Network Management”,IEEE Communications Magazine, March 1998 M. Rose,” The Simple Book: An introduction to Network Management” 3rd ed., Upper Saddle River, NJ: Prentice Hall, 1996. Moceri, Paul,”SNMP and Beyond : A Survey of Network Performance Monitoring Tools”, White paper CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network
  • 51. Outline Literarture Survey 3 Level layered Design Implementation SNMS Case Study Conclusion References Demo Demo CSE Department CSE-INS,IT,Nirma University SNMP Based Network Monitoring System Supporting Real-time Visualization Of Network