23-02-2011, 11:35 AM
presented by:
Shah Abhi
Rana Siraj
Goswami Beena
Hajirakar Shraddha
Project report.pdf (Size: 600.87 KB / Downloads: 83)
NETWORK MONITORING TOOL
Abstract
Network engineer needs to start on network monitoring by integrating conventional network monitoring tools with an innovative visualization tool, which can provide the network activities that are easily understood by a user.
Network monitoring allows network managers to get a better insight in the network traffic transiting in a managed network. In order to make the tasks of a network manager easier, many network monitoring tools are made available for a wide range of purposes (e.g., traffic accounting, performance analysis, and so on).
Chapter 1
1.1 Aim of project
To prepare the NETWORK MONITORING TOOL that will be very useful for a small network connected in LAN.
1.2 Introduction of NETWORK MONITORING TOOL
Network engineer needs to start on network monitoring by integrating conventional network monitoring tools with an innovative visualization tool, which can provide the network activities that are easily understood by a user.
Network monitoring allows network managers to get a better insight in the network traffic transiting in a managed network. In order to make the tasks of a network manager easier, many network monitoring tools are made available for a wide range of purposes (e.g., traffic accounting, performance analysis, and so on).
Chapter 2
2.1 Block diagram of our project application
2.2 Literature Survey
2.2.1 Reading of protocols
As far as our project is concerned there are two main protocols that are responsible for monitoring and checking continuity.
For monitoring we need SNMP and for checking continuity we need ICMP.
a. SNMP
Simple Network Management Protocol (SNMP) is a UDP-based network protocol. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention.
In typical SNMP use, one or more administrative computers called managers have the task of monitoring or managing a group of hosts or devices on a computer network. Each managed system executes, at all times, a software component called an agent which reports information via SNMP to the manager.
Essentially, SNMP agents expose management data on the managed systems as variables. The protocol also permits active management tasks, such as modifying and applying a new configuration through remote modification of these variables. The variables accessible via SNMP are organized in hierarchies. These hierarchies, and other metadata (such as type and description of the variable), are described by Management Information Bases (MIBs).
An SNMP-managed network consists of three key components:
Managed device
Agent — software which runs on managed devices
Network management system (NMS) — software which runs on the manager
A managed device is a network node that implements an SNMP interface that allows unidirectional (read-only) or bidirectional access to node-specific information. Managed devices exchange node-specific information with the NMSs.
An agent is a network-management software module that resides on a managed device. An agent has local knowledge of management information and translates that information to or from an SNMP specific form.
A network management system (NMS) executes applications that monitor and control managed devices. NMSs provide the bulk of the processing and memory resources required for network management. One or more NMSs may exist on any managed network.
b. ICMP
When you send data from one device to another remote device, the IP Datagram often travels through one or more routers. There can be errors at routers while they try to forward the IP Datagram to its final destination. The Internet Control Message Protocol (ICMP) protocol is used to report problems with delivery of IP Datagrams within an IP network. ICMP is also used for other diagnosis and troubleshooting functions.
An Internet Control Message Protocol (ICMP) packet header is 8 Bytes long. The first four bytes always have the same meaning, and the contents of the remaining four depend on the ICMP packet type. An ICMP header follows the IP header in an IP packet and Internet Control Message Protocol (ICMP) is considered to be an integral part of IP.
The following points reveal that how ping process actually takes place:
The source host generates an ICMP protocol data unit.
The ICMP PDU is encapsulated in an IP datagram, with the source and destination IP addresses in the IP header. At this point the datagram is most properly referred to as an ICMP ECHO datagram, but we will call it an IP datagram from here on since that's what it looks like to the networks it is sent over.
The source host notes the local time on it's clock as it transmits the IP datagram towards the destination. Each host that receives the IP datagram checks the destination address to see if it matches their own address or is the all hosts address
If the destination IP address in the IP datagram does not match the local host's address, the IP datagram is forwarded to the network where the IP address resides.
The destination host receives the IP datagram, finds a match between itself and the destination address in the IP datagram.
The destination host notes the ICMP ECHO information in the IP datagram, performs any necessary work then destroys the original IP/ICMP ECHO datagram.
Shah Abhi
Rana Siraj
Goswami Beena
Hajirakar Shraddha
Project report.pdf (Size: 600.87 KB / Downloads: 83)
NETWORK MONITORING TOOL
Abstract
Network engineer needs to start on network monitoring by integrating conventional network monitoring tools with an innovative visualization tool, which can provide the network activities that are easily understood by a user.
Network monitoring allows network managers to get a better insight in the network traffic transiting in a managed network. In order to make the tasks of a network manager easier, many network monitoring tools are made available for a wide range of purposes (e.g., traffic accounting, performance analysis, and so on).
Chapter 1
1.1 Aim of project
To prepare the NETWORK MONITORING TOOL that will be very useful for a small network connected in LAN.
1.2 Introduction of NETWORK MONITORING TOOL
Network engineer needs to start on network monitoring by integrating conventional network monitoring tools with an innovative visualization tool, which can provide the network activities that are easily understood by a user.
Network monitoring allows network managers to get a better insight in the network traffic transiting in a managed network. In order to make the tasks of a network manager easier, many network monitoring tools are made available for a wide range of purposes (e.g., traffic accounting, performance analysis, and so on).
Chapter 2
2.1 Block diagram of our project application
2.2 Literature Survey
2.2.1 Reading of protocols
As far as our project is concerned there are two main protocols that are responsible for monitoring and checking continuity.
For monitoring we need SNMP and for checking continuity we need ICMP.
a. SNMP
Simple Network Management Protocol (SNMP) is a UDP-based network protocol. It is used mostly in network management systems to monitor network-attached devices for conditions that warrant administrative attention.
In typical SNMP use, one or more administrative computers called managers have the task of monitoring or managing a group of hosts or devices on a computer network. Each managed system executes, at all times, a software component called an agent which reports information via SNMP to the manager.
Essentially, SNMP agents expose management data on the managed systems as variables. The protocol also permits active management tasks, such as modifying and applying a new configuration through remote modification of these variables. The variables accessible via SNMP are organized in hierarchies. These hierarchies, and other metadata (such as type and description of the variable), are described by Management Information Bases (MIBs).
An SNMP-managed network consists of three key components:
Managed device
Agent — software which runs on managed devices
Network management system (NMS) — software which runs on the manager
A managed device is a network node that implements an SNMP interface that allows unidirectional (read-only) or bidirectional access to node-specific information. Managed devices exchange node-specific information with the NMSs.
An agent is a network-management software module that resides on a managed device. An agent has local knowledge of management information and translates that information to or from an SNMP specific form.
A network management system (NMS) executes applications that monitor and control managed devices. NMSs provide the bulk of the processing and memory resources required for network management. One or more NMSs may exist on any managed network.
b. ICMP
When you send data from one device to another remote device, the IP Datagram often travels through one or more routers. There can be errors at routers while they try to forward the IP Datagram to its final destination. The Internet Control Message Protocol (ICMP) protocol is used to report problems with delivery of IP Datagrams within an IP network. ICMP is also used for other diagnosis and troubleshooting functions.
An Internet Control Message Protocol (ICMP) packet header is 8 Bytes long. The first four bytes always have the same meaning, and the contents of the remaining four depend on the ICMP packet type. An ICMP header follows the IP header in an IP packet and Internet Control Message Protocol (ICMP) is considered to be an integral part of IP.
The following points reveal that how ping process actually takes place:
The source host generates an ICMP protocol data unit.
The ICMP PDU is encapsulated in an IP datagram, with the source and destination IP addresses in the IP header. At this point the datagram is most properly referred to as an ICMP ECHO datagram, but we will call it an IP datagram from here on since that's what it looks like to the networks it is sent over.
The source host notes the local time on it's clock as it transmits the IP datagram towards the destination. Each host that receives the IP datagram checks the destination address to see if it matches their own address or is the all hosts address
If the destination IP address in the IP datagram does not match the local host's address, the IP datagram is forwarded to the network where the IP address resides.
The destination host receives the IP datagram, finds a match between itself and the destination address in the IP datagram.
The destination host notes the ICMP ECHO information in the IP datagram, performs any necessary work then destroys the original IP/ICMP ECHO datagram.