SlideShare ist ein Scribd-Unternehmen logo
1 von 25
NETWORK MONITORING
SYSTEM
Literature Survey
 A. Basic terminology
Network monitoring tool
Network monitoring tool is the networking tool that is used to examine
usage of local area network and provide a statistical data of uploads and
downloads in a network. Monitoring tool is usually used to monitor I/P traffic
between the LAN and the internet. It is a network diagnostic system that is used
to monitor local area network and provide a statistical display of the same. The
data can be further used to improve the network efficiency. Other problems such
as locating the down server, receiving incorrect work request etc can also be
removed.
 Simple network management protocol
Simple network management protocol (SNMP) is based on agent/manager
model. The model consists of an agent, a manager, a database containing
information about the management and the network protocols.
In SNMP the administrative computer which is more commonly called as manager
has the task of monitoring and managing a group of systems in a network. The
systems that are managed by the manager have a continuous program running
known as agent, which reports the information to the manager via SNMP.
Devices such as Routers, printers, servers etc use SNMP.
WinPcap
 It is a freeware which is used for direct network access under windows.
WinPcap provides architecture for network analyses and packet capturing for
win32 platform.
WinPcap can facilitate:
 Raw packet capturing
 Filtering the packets according to the set of rules defined by the user.
 To gather statistical data related to network traffic.
Why do we need it??
 Network Traffic Monitoring (NTM) is a network analytic tool that observes
local area network usage and provides a statistical display of uploads and
downloads in a network. The network display monitor displays following
information:
 • Source address of the system that sends frame to the network.
 • The protocol that was used to send the frame.
 • Destination address of the system where the frame will be received.
 • Data of the message that is sent.
 Capturing is the process by which a network monitor collects the information.
All the information is stored by default in capture buffer. Also, one can
apply restrictions on the information to be captured by the system and the
data to be displayed on the monitor.
 The network monitoring tool is essential to keep the track of the packets that
are entering and leaving the system. NMT can provide an statistical data of
the network traffic and thus improvements can be made on the system.
C. Current research and progress
 Microsoft is currently empowering a project to build a network
monitoring tool to achieve “State of art”. By introducing this system one
can improve network efficiency and monitor the same more efficiently.
 Moreover researches are adopting various techniques, such as use of an
Active measurement system in which a probe traffic is injected into the
network and then monitor the performance of the system from the
performance of the injected packets.
PROBLEM DEFINITION
 PREVIOUS NETWORK MONITORING TOOLS
ARE NOT USER FRIENDLY.
 THE SECURITY WAS NOT THE PRIMARY
OBJECTIVE.
 RESTORAL CAPABILITIES WERE NOT
A BIG ISSUE.
 TRAFFIC REROUTING WAS NOT A
PROMINENT FEATURE IN THEIR
INVENTORY.
PLATFORM DEPLOYED-VISUAL C++
WHY VISUAL C++ ???
 MICROSOFT FOUNDATION CLASS LIBRARIES.
 AUTOMATIC GENERATION OF INTERFACE.
 OBJECT ORIENTED APPROACH.
 INCORPORATES SEVERAL NEW PROTOCOLS.
SYSTEM ARCHITECTURE
Network
Management server
Management
application
MIB
Management server
Management
application
MIB
Network
Element
manager
Element
manager
Network resources ( servers, routers, hosts ) with management agents
Management clients ( PCs, workstations )
 SYSTEM DESIGN:
 What is it??
System design describes the requirements that are
needed by our system. It also emphasis on the
operating requirement and the system and its sub
system’s architecture. The input/output layout,
interphases, detailed design, and processing logic
are also covered.
PLANNING
ANALYSIS
DESIGN
IMPLEMENTATION
 Understood The scope
 How to do it?
 Who will do what?
 What makes it
different
 Functional
requirement
 Objectives
 Need
 UML Diagrams to
describe
operations
 Procedural flow
 Input output
layout
 Yet on it??
DEVELOPMENT LIFECYCLE
 Our implementation
We have used UML diagrams to describe operations and
functions or our system including its structural and
behavioural view
Use Case Diagram
1) Actors:
• Network: It represents a collection of machines connected to the host machine
and passes the packets from one machine to another.
• NPM Tool: it takes packets from the network, analyzes them and monitors the
network.
• System owner: System owner is the client accessing services from the server.
2) Use Cases:
• IP Packets: All the IP packets in the network come to NPM for analyses.
• Alert system: Alerts the system owner if a anomaly is detected.
• Log file: Keep track of the IP address and name of the machine which is stored in
the database.
• Anomaly detection: Detects if there is any deviation from the specified rules.
• Monitors network
• Calculates Bandwidth
• Provides GUI
TOOLS/PROTOCOLS Required
INTRODUCTION TO VISUAL C++
 Visual C++ is the most powerful front-end tool and graphical user interface
that is mainly used for developing application programs.
 The added advantages of Visual C++ are the built in Microsoft Foundation
Class (MFC) Libraries.
 These Libraries include base classes for creating windows, form, dialogue,
sockets etc. These libraries are included to reduce the overhead of
developer in creating windows and interfaces and he can focus on the
application development. In addition Visual C++ support network
programming with giving access to NIC.
WinPcap
 WinPcap is a free, public system for direct network access under Windows.
WinPcap is an architecture for packet capture and network analysis for the
Win32 platforms.
 The purpose of WinPcap
 Capture raw packets
 Filter the packets according to user-specified rules before dispatching them to
the application
 Transmit raw packets to the network
 Gather statistical values on the network traffic
3.2.1 WinPcap structure
SNMP
 SNMP is based on the manager/agent model consisting of a manager, an
agent, a database of management information, managed objects and the
network protocol. The manager provides the interface between the human
network manager and the management system. The agent provides the
interface between the manager and the physical device(s) being managed
 The manager and agent use a Management Information Base (MIB) and a
relatively small set of commands to exchange information.
 SNMP uses five basic messages
 GET
 GET-NEXT
 GET-RESPONSE
 SET
 TRAP
Layered Communication
IMPLEMENTATION
NMS is implemented in following modules.
 Network Browser
• Scanning the network for system: Using findalldev() and openlive()
Function
• System Status: Checks the number of active users in the network and their Ip
and Mac address
• ARP request is send using pcap_sendpacket() and reply is received using
pcap_next_ex().
• Machine Name: Computer name is retrieved from the system using Winsock
function
FUNCTIONS
 pcap findalldev()
 pcap openlive()
 pcap setfilter()
 pcap compile
 pcap Loop()
 pcap next ex()
 pcap send packet()
 pcap close()
 TRAFFIC MONITORING
Main feature of our project is monitoring traffic in the network
• Network traffic analyzer
The port numbers are used to identify the application layer
protocols (HTTP,FTP,DNS etc.)
• Protocol analyzer
This monitors the protocol used by each system and thus enables to
calculate bandwidth usage.
• Bandwidth monitor
Bandwidth is calculated by monitoring the number of packets traverse.
Size of each packet *Number of packets=Value of bandwidth
TESTING
Unit Testing
 We did unit testing on our various sub units of the program.
 The function pcap_findalldevs() was tested for the various networks that can
be opened.
 The function Pcap_open_live() was tested to check the working which was to
open the live capture function.
 Pcap_setfilter() was tested to check the association of the filter to a capture.
Integration Testing
 The integration testing produced errors as Unit testing was not a success.
System Testing
 The system testing will be done once we get favorable outcomes from the
Integration testing.
Comparison Testing
 The comparison testing will be done and the output of the software will be
tested with the software which is available in the market.
Future Enhancement
Project can be further enhanced to
 Fault management
 Alerts and threshold
 Windows event log monitoring
 Traffic management
 Network Security
 Network scheduling
QUESTIONS ???

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network SecurityJohn Ely Masculino
 
Network management
Network managementNetwork management
Network managementMohd Arif
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)Abrish06
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring BasicsRob Dunn
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCEassinha
 
SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)Mohammad Awais Javaid
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management ProtocolPrasenjit Gayen
 
IP Configuration
IP ConfigurationIP Configuration
IP ConfigurationStephen Raj
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administrationKhang-Ling Loh
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert SystemSupawit Wannapila
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System AdministrationDuressa Teshome
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPTPijush Kanti Das
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)ISMT College
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problemsRaja Waseem Akhtar
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its applicationRoma Vyas
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewallCoder Tech
 

Was ist angesagt? (20)

Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Network management
Network managementNetwork management
Network management
 
Virtual Private Network(VPN)
Virtual Private Network(VPN)Virtual Private Network(VPN)
Virtual Private Network(VPN)
 
VPN
VPNVPN
VPN
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
SNMP AT a GLANCE
SNMP AT a GLANCESNMP AT a GLANCE
SNMP AT a GLANCE
 
SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)SNMP(Simple Network Management Protocol)
SNMP(Simple Network Management Protocol)
 
Simple Network Management Protocol
Simple Network Management ProtocolSimple Network Management Protocol
Simple Network Management Protocol
 
IP Configuration
IP ConfigurationIP Configuration
IP Configuration
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
System Administration: Introduction to system administration
System Administration: Introduction to system administrationSystem Administration: Introduction to system administration
System Administration: Introduction to system administration
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert System
 
Subnetting
SubnettingSubnetting
Subnetting
 
Introduction to Network and System Administration
Introduction to Network and System AdministrationIntroduction to Network and System Administration
Introduction to Network and System Administration
 
IP addressing and Subnetting PPT
IP addressing and Subnetting PPTIP addressing and Subnetting PPT
IP addressing and Subnetting PPT
 
Access Control List (ACL)
Access Control List (ACL)Access Control List (ACL)
Access Control List (ACL)
 
Chapter12 -- troubleshooting networking problems
Chapter12  -- troubleshooting networking problemsChapter12  -- troubleshooting networking problems
Chapter12 -- troubleshooting networking problems
 
Wireless sensor network and its application
Wireless sensor network and its applicationWireless sensor network and its application
Wireless sensor network and its application
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 

Andere mochten auch

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring SystemGirish Naik
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
All of Your Network Monitoring is (probably) Wrong
All of Your Network Monitoring is (probably) WrongAll of Your Network Monitoring is (probably) Wrong
All of Your Network Monitoring is (probably) Wrongice799
 
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08Leslie Bradshaw
 
Business Intelligence: Leveraging SharePoint to drive business results
Business Intelligence: Leveraging SharePoint to drive business resultsBusiness Intelligence: Leveraging SharePoint to drive business results
Business Intelligence: Leveraging SharePoint to drive business resultsEnrique Lima
 
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8Enrique Lima
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms pptMoeCrotty
 
Network latency - measurement and improvement
Network latency - measurement and improvementNetwork latency - measurement and improvement
Network latency - measurement and improvementMatt Willsher
 
Monitoring and control system
Monitoring and control systemMonitoring and control system
Monitoring and control systemSlideshare
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner BusinesstoVirtual
 
Monitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewMonitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewOpsview
 

Andere mochten auch (16)

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool5 reasons why you need a network monitoring tool
5 reasons why you need a network monitoring tool
 
PRTG
PRTGPRTG
PRTG
 
Prtg network monitor
Prtg network monitorPrtg network monitor
Prtg network monitor
 
All of Your Network Monitoring is (probably) Wrong
All of Your Network Monitoring is (probably) WrongAll of Your Network Monitoring is (probably) Wrong
All of Your Network Monitoring is (probably) Wrong
 
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Business Intelligence: Leveraging SharePoint to drive business results
Business Intelligence: Leveraging SharePoint to drive business resultsBusiness Intelligence: Leveraging SharePoint to drive business results
Business Intelligence: Leveraging SharePoint to drive business results
 
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms ppt
 
FLEXAP WATCHER
FLEXAP WATCHERFLEXAP WATCHER
FLEXAP WATCHER
 
Network latency - measurement and improvement
Network latency - measurement and improvementNetwork latency - measurement and improvement
Network latency - measurement and improvement
 
Monitoring and control system
Monitoring and control systemMonitoring and control system
Monitoring and control system
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
 
Monitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewMonitoring Server Temperature with Opsview
Monitoring Server Temperature with Opsview
 

Ähnlich wie network monitoring system ppt

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptIRJET Journal
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring Systemsweta dargad
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Project report
Project reportProject report
Project reportayush13bbm
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network TelemetryAalok Shah
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerManageEngine
 

Ähnlich wie network monitoring system ppt (20)

NetBrain CE 5.0
NetBrain CE 5.0NetBrain CE 5.0
NetBrain CE 5.0
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
L1803027588
L1803027588L1803027588
L1803027588
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Our Methodology & Benefits
Our Methodology & BenefitsOur Methodology & Benefits
Our Methodology & Benefits
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Project report
Project reportProject report
Project report
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network Telemetry
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
Computers in management
Computers in managementComputers in management
Computers in management
 

Kürzlich hochgeladen

The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLManishPatel169454
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...ranjana rawat
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01KreezheaRecto
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 

Kürzlich hochgeladen (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELLPVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
PVC VS. FIBERGLASS (FRP) GRAVITY SEWER - UNI BELL
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 

network monitoring system ppt

  • 2. Literature Survey  A. Basic terminology Network monitoring tool Network monitoring tool is the networking tool that is used to examine usage of local area network and provide a statistical data of uploads and downloads in a network. Monitoring tool is usually used to monitor I/P traffic between the LAN and the internet. It is a network diagnostic system that is used to monitor local area network and provide a statistical display of the same. The data can be further used to improve the network efficiency. Other problems such as locating the down server, receiving incorrect work request etc can also be removed.
  • 3.  Simple network management protocol Simple network management protocol (SNMP) is based on agent/manager model. The model consists of an agent, a manager, a database containing information about the management and the network protocols. In SNMP the administrative computer which is more commonly called as manager has the task of monitoring and managing a group of systems in a network. The systems that are managed by the manager have a continuous program running known as agent, which reports the information to the manager via SNMP. Devices such as Routers, printers, servers etc use SNMP.
  • 4. WinPcap  It is a freeware which is used for direct network access under windows. WinPcap provides architecture for network analyses and packet capturing for win32 platform. WinPcap can facilitate:  Raw packet capturing  Filtering the packets according to the set of rules defined by the user.  To gather statistical data related to network traffic.
  • 5. Why do we need it??  Network Traffic Monitoring (NTM) is a network analytic tool that observes local area network usage and provides a statistical display of uploads and downloads in a network. The network display monitor displays following information:  • Source address of the system that sends frame to the network.  • The protocol that was used to send the frame.  • Destination address of the system where the frame will be received.  • Data of the message that is sent.  Capturing is the process by which a network monitor collects the information. All the information is stored by default in capture buffer. Also, one can apply restrictions on the information to be captured by the system and the data to be displayed on the monitor.  The network monitoring tool is essential to keep the track of the packets that are entering and leaving the system. NMT can provide an statistical data of the network traffic and thus improvements can be made on the system.
  • 6. C. Current research and progress  Microsoft is currently empowering a project to build a network monitoring tool to achieve “State of art”. By introducing this system one can improve network efficiency and monitor the same more efficiently.  Moreover researches are adopting various techniques, such as use of an Active measurement system in which a probe traffic is injected into the network and then monitor the performance of the system from the performance of the injected packets.
  • 7. PROBLEM DEFINITION  PREVIOUS NETWORK MONITORING TOOLS ARE NOT USER FRIENDLY.  THE SECURITY WAS NOT THE PRIMARY OBJECTIVE.  RESTORAL CAPABILITIES WERE NOT A BIG ISSUE.  TRAFFIC REROUTING WAS NOT A PROMINENT FEATURE IN THEIR INVENTORY.
  • 8. PLATFORM DEPLOYED-VISUAL C++ WHY VISUAL C++ ???  MICROSOFT FOUNDATION CLASS LIBRARIES.  AUTOMATIC GENERATION OF INTERFACE.  OBJECT ORIENTED APPROACH.  INCORPORATES SEVERAL NEW PROTOCOLS.
  • 9. SYSTEM ARCHITECTURE Network Management server Management application MIB Management server Management application MIB Network Element manager Element manager Network resources ( servers, routers, hosts ) with management agents Management clients ( PCs, workstations )
  • 10.  SYSTEM DESIGN:  What is it?? System design describes the requirements that are needed by our system. It also emphasis on the operating requirement and the system and its sub system’s architecture. The input/output layout, interphases, detailed design, and processing logic are also covered.
  • 11. PLANNING ANALYSIS DESIGN IMPLEMENTATION  Understood The scope  How to do it?  Who will do what?  What makes it different  Functional requirement  Objectives  Need  UML Diagrams to describe operations  Procedural flow  Input output layout  Yet on it?? DEVELOPMENT LIFECYCLE
  • 12.  Our implementation We have used UML diagrams to describe operations and functions or our system including its structural and behavioural view
  • 13. Use Case Diagram 1) Actors: • Network: It represents a collection of machines connected to the host machine and passes the packets from one machine to another. • NPM Tool: it takes packets from the network, analyzes them and monitors the network. • System owner: System owner is the client accessing services from the server. 2) Use Cases: • IP Packets: All the IP packets in the network come to NPM for analyses. • Alert system: Alerts the system owner if a anomaly is detected. • Log file: Keep track of the IP address and name of the machine which is stored in the database. • Anomaly detection: Detects if there is any deviation from the specified rules. • Monitors network • Calculates Bandwidth • Provides GUI
  • 14.
  • 15. TOOLS/PROTOCOLS Required INTRODUCTION TO VISUAL C++  Visual C++ is the most powerful front-end tool and graphical user interface that is mainly used for developing application programs.  The added advantages of Visual C++ are the built in Microsoft Foundation Class (MFC) Libraries.  These Libraries include base classes for creating windows, form, dialogue, sockets etc. These libraries are included to reduce the overhead of developer in creating windows and interfaces and he can focus on the application development. In addition Visual C++ support network programming with giving access to NIC.
  • 16. WinPcap  WinPcap is a free, public system for direct network access under Windows. WinPcap is an architecture for packet capture and network analysis for the Win32 platforms.  The purpose of WinPcap  Capture raw packets  Filter the packets according to user-specified rules before dispatching them to the application  Transmit raw packets to the network  Gather statistical values on the network traffic
  • 18. SNMP  SNMP is based on the manager/agent model consisting of a manager, an agent, a database of management information, managed objects and the network protocol. The manager provides the interface between the human network manager and the management system. The agent provides the interface between the manager and the physical device(s) being managed  The manager and agent use a Management Information Base (MIB) and a relatively small set of commands to exchange information.  SNMP uses five basic messages  GET  GET-NEXT  GET-RESPONSE  SET  TRAP
  • 20. IMPLEMENTATION NMS is implemented in following modules.  Network Browser • Scanning the network for system: Using findalldev() and openlive() Function
  • 21. • System Status: Checks the number of active users in the network and their Ip and Mac address • ARP request is send using pcap_sendpacket() and reply is received using pcap_next_ex(). • Machine Name: Computer name is retrieved from the system using Winsock function FUNCTIONS  pcap findalldev()  pcap openlive()  pcap setfilter()  pcap compile  pcap Loop()  pcap next ex()  pcap send packet()  pcap close()
  • 22.  TRAFFIC MONITORING Main feature of our project is monitoring traffic in the network • Network traffic analyzer The port numbers are used to identify the application layer protocols (HTTP,FTP,DNS etc.) • Protocol analyzer This monitors the protocol used by each system and thus enables to calculate bandwidth usage. • Bandwidth monitor Bandwidth is calculated by monitoring the number of packets traverse. Size of each packet *Number of packets=Value of bandwidth
  • 23. TESTING Unit Testing  We did unit testing on our various sub units of the program.  The function pcap_findalldevs() was tested for the various networks that can be opened.  The function Pcap_open_live() was tested to check the working which was to open the live capture function.  Pcap_setfilter() was tested to check the association of the filter to a capture. Integration Testing  The integration testing produced errors as Unit testing was not a success. System Testing  The system testing will be done once we get favorable outcomes from the Integration testing. Comparison Testing  The comparison testing will be done and the output of the software will be tested with the software which is available in the market.
  • 24. Future Enhancement Project can be further enhanced to  Fault management  Alerts and threshold  Windows event log monitoring  Traffic management  Network Security  Network scheduling