SlideShare a Scribd company logo
NETWORK MONITORING
SYSTEM
Literature Survey
 A. Basic terminology
Network monitoring tool
Network monitoring tool is the networking tool that is used to examine
usage of local area network and provide a statistical data of uploads and
downloads in a network. Monitoring tool is usually used to monitor I/P traffic
between the LAN and the internet. It is a network diagnostic system that is used
to monitor local area network and provide a statistical display of the same. The
data can be further used to improve the network efficiency. Other problems such
as locating the down server, receiving incorrect work request etc can also be
removed.
 Simple network management protocol
Simple network management protocol (SNMP) is based on agent/manager
model. The model consists of an agent, a manager, a database containing
information about the management and the network protocols.
In SNMP the administrative computer which is more commonly called as manager
has the task of monitoring and managing a group of systems in a network. The
systems that are managed by the manager have a continuous program running
known as agent, which reports the information to the manager via SNMP.
Devices such as Routers, printers, servers etc use SNMP.
WinPcap
 It is a freeware which is used for direct network access under windows.
WinPcap provides architecture for network analyses and packet capturing for
win32 platform.
WinPcap can facilitate:
 Raw packet capturing
 Filtering the packets according to the set of rules defined by the user.
 To gather statistical data related to network traffic.
Why do we need it??
 Network Traffic Monitoring (NTM) is a network analytic tool that observes
local area network usage and provides a statistical display of uploads and
downloads in a network. The network display monitor displays following
information:
 • Source address of the system that sends frame to the network.
 • The protocol that was used to send the frame.
 • Destination address of the system where the frame will be received.
 • Data of the message that is sent.
 Capturing is the process by which a network monitor collects the information.
All the information is stored by default in capture buffer. Also, one can
apply restrictions on the information to be captured by the system and the
data to be displayed on the monitor.
 The network monitoring tool is essential to keep the track of the packets that
are entering and leaving the system. NMT can provide an statistical data of
the network traffic and thus improvements can be made on the system.
C. Current research and progress
 Microsoft is currently empowering a project to build a network
monitoring tool to achieve “State of art”. By introducing this system one
can improve network efficiency and monitor the same more efficiently.
 Moreover researches are adopting various techniques, such as use of an
Active measurement system in which a probe traffic is injected into the
network and then monitor the performance of the system from the
performance of the injected packets.
PROBLEM DEFINITION
 PREVIOUS NETWORK MONITORING TOOLS
ARE NOT USER FRIENDLY.
 THE SECURITY WAS NOT THE PRIMARY
OBJECTIVE.
 RESTORAL CAPABILITIES WERE NOT
A BIG ISSUE.
 TRAFFIC REROUTING WAS NOT A
PROMINENT FEATURE IN THEIR
INVENTORY.
PLATFORM DEPLOYED-VISUAL C++
WHY VISUAL C++ ???
 MICROSOFT FOUNDATION CLASS LIBRARIES.
 AUTOMATIC GENERATION OF INTERFACE.
 OBJECT ORIENTED APPROACH.
 INCORPORATES SEVERAL NEW PROTOCOLS.
SYSTEM ARCHITECTURE
Network
Management server
Management
application
MIB
Management server
Management
application
MIB
Network
Element
manager
Element
manager
Network resources ( servers, routers, hosts ) with management agents
Management clients ( PCs, workstations )
 SYSTEM DESIGN:
 What is it??
System design describes the requirements that are
needed by our system. It also emphasis on the
operating requirement and the system and its sub
system’s architecture. The input/output layout,
interphases, detailed design, and processing logic
are also covered.
PLANNING
ANALYSIS
DESIGN
IMPLEMENTATION
 Understood The scope
 How to do it?
 Who will do what?
 What makes it
different
 Functional
requirement
 Objectives
 Need
 UML Diagrams to
describe
operations
 Procedural flow
 Input output
layout
 Yet on it??
DEVELOPMENT LIFECYCLE
 Our implementation
We have used UML diagrams to describe operations and
functions or our system including its structural and
behavioural view
Use Case Diagram
1) Actors:
• Network: It represents a collection of machines connected to the host machine
and passes the packets from one machine to another.
• NPM Tool: it takes packets from the network, analyzes them and monitors the
network.
• System owner: System owner is the client accessing services from the server.
2) Use Cases:
• IP Packets: All the IP packets in the network come to NPM for analyses.
• Alert system: Alerts the system owner if a anomaly is detected.
• Log file: Keep track of the IP address and name of the machine which is stored in
the database.
• Anomaly detection: Detects if there is any deviation from the specified rules.
• Monitors network
• Calculates Bandwidth
• Provides GUI
TOOLS/PROTOCOLS Required
INTRODUCTION TO VISUAL C++
 Visual C++ is the most powerful front-end tool and graphical user interface
that is mainly used for developing application programs.
 The added advantages of Visual C++ are the built in Microsoft Foundation
Class (MFC) Libraries.
 These Libraries include base classes for creating windows, form, dialogue,
sockets etc. These libraries are included to reduce the overhead of
developer in creating windows and interfaces and he can focus on the
application development. In addition Visual C++ support network
programming with giving access to NIC.
WinPcap
 WinPcap is a free, public system for direct network access under Windows.
WinPcap is an architecture for packet capture and network analysis for the
Win32 platforms.
 The purpose of WinPcap
 Capture raw packets
 Filter the packets according to user-specified rules before dispatching them to
the application
 Transmit raw packets to the network
 Gather statistical values on the network traffic
3.2.1 WinPcap structure
SNMP
 SNMP is based on the manager/agent model consisting of a manager, an
agent, a database of management information, managed objects and the
network protocol. The manager provides the interface between the human
network manager and the management system. The agent provides the
interface between the manager and the physical device(s) being managed
 The manager and agent use a Management Information Base (MIB) and a
relatively small set of commands to exchange information.
 SNMP uses five basic messages
 GET
 GET-NEXT
 GET-RESPONSE
 SET
 TRAP
Layered Communication
IMPLEMENTATION
NMS is implemented in following modules.
 Network Browser
• Scanning the network for system: Using findalldev() and openlive()
Function
• System Status: Checks the number of active users in the network and their Ip
and Mac address
• ARP request is send using pcap_sendpacket() and reply is received using
pcap_next_ex().
• Machine Name: Computer name is retrieved from the system using Winsock
function
FUNCTIONS
 pcap findalldev()
 pcap openlive()
 pcap setfilter()
 pcap compile
 pcap Loop()
 pcap next ex()
 pcap send packet()
 pcap close()
 TRAFFIC MONITORING
Main feature of our project is monitoring traffic in the network
• Network traffic analyzer
The port numbers are used to identify the application layer
protocols (HTTP,FTP,DNS etc.)
• Protocol analyzer
This monitors the protocol used by each system and thus enables to
calculate bandwidth usage.
• Bandwidth monitor
Bandwidth is calculated by monitoring the number of packets traverse.
Size of each packet *Number of packets=Value of bandwidth
TESTING
Unit Testing
 We did unit testing on our various sub units of the program.
 The function pcap_findalldevs() was tested for the various networks that can
be opened.
 The function Pcap_open_live() was tested to check the working which was to
open the live capture function.
 Pcap_setfilter() was tested to check the association of the filter to a capture.
Integration Testing
 The integration testing produced errors as Unit testing was not a success.
System Testing
 The system testing will be done once we get favorable outcomes from the
Integration testing.
Comparison Testing
 The comparison testing will be done and the output of the software will be
tested with the software which is available in the market.
Future Enhancement
Project can be further enhanced to
 Fault management
 Alerts and threshold
 Windows event log monitoring
 Traffic management
 Network Security
 Network scheduling
QUESTIONS ???

More Related Content

What's hot

Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring SystemRofiq Fauzi
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentationardhita banu adji
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management FundamentalsSolarWinds
 
FINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKFINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKKulsumKhan13
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDNVenkata Naga Ravi
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus networkAalap Tripathy
 
01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansiNader Elmansi
 
Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)Elena Benson
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber securityKAMALI PRIYA P
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
 

What's hot (20)

Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
Fault management presentation
Fault management presentationFault management presentation
Fault management presentation
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
FINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORKFINAL REPORT ON ENTERPRISE NETWORK
FINAL REPORT ON ENTERPRISE NETWORK
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Wireshark Tutorial
Wireshark TutorialWireshark Tutorial
Wireshark Tutorial
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Design of a campus network
Design of a campus networkDesign of a campus network
Design of a campus network
 
01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi01 elements of modern networking by nader elmansi
01 elements of modern networking by nader elmansi
 
Wireshark Basic Presentation
Wireshark Basic PresentationWireshark Basic Presentation
Wireshark Basic Presentation
 
NETWORK PLANNING AND DESIGN,
NETWORK PLANNING AND DESIGN,  NETWORK PLANNING AND DESIGN,
NETWORK PLANNING AND DESIGN,
 
Network operations center (noc)
Network operations center (noc)Network operations center (noc)
Network operations center (noc)
 
Ccna introduction
Ccna introductionCcna introduction
Ccna introduction
 
Network traffic analysis with cyber security
Network traffic analysis with cyber securityNetwork traffic analysis with cyber security
Network traffic analysis with cyber security
 
Network management
Network management Network management
Network management
 
Snmp
SnmpSnmp
Snmp
 
HSRP ccna
HSRP ccna HSRP ccna
HSRP ccna
 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
 

Viewers also liked

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring SystemGirish Naik
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor PresentationNafaâ TAYACHI
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert SystemSupawit Wannapila
 
All of Your Network Monitoring is (probably) Wrong
All of Your Network Monitoring is (probably) WrongAll of Your Network Monitoring is (probably) Wrong
All of Your Network Monitoring is (probably) Wrongice799
 
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08Leslie Bradshaw
 
Business Intelligence: Leveraging SharePoint to drive business results
Business Intelligence: Leveraging SharePoint to drive business resultsBusiness Intelligence: Leveraging SharePoint to drive business results
Business Intelligence: Leveraging SharePoint to drive business resultsEnrique Lima
 
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8Enrique Lima
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms pptMoeCrotty
 
Network latency - measurement and improvement
Network latency - measurement and improvementNetwork latency - measurement and improvement
Network latency - measurement and improvementMatt Willsher
 
Monitoring and control system
Monitoring and control systemMonitoring and control system
Monitoring and control systemSlideshare
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner BusinesstoVirtual
 
Monitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewMonitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewOpsview
 

Viewers also liked (16)

Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 
PRTG Network Monitor Presentation
PRTG Network Monitor PresentationPRTG Network Monitor Presentation
PRTG Network Monitor Presentation
 
Network Monitoring System and Alert System
Network Monitoring System and Alert SystemNetwork Monitoring System and Alert System
Network Monitoring System and Alert System
 
PRTG
PRTGPRTG
PRTG
 
Prtg network monitor
Prtg network monitorPrtg network monitor
Prtg network monitor
 
All of Your Network Monitoring is (probably) Wrong
All of Your Network Monitoring is (probably) WrongAll of Your Network Monitoring is (probably) Wrong
All of Your Network Monitoring is (probably) Wrong
 
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
NMS & JESS3 // BarCampDCII // C-SPAN Hubs 10.18.08
 
Tap Into the Health of Your Network
Tap Into the Health of Your NetworkTap Into the Health of Your Network
Tap Into the Health of Your Network
 
Business Intelligence: Leveraging SharePoint to drive business results
Business Intelligence: Leveraging SharePoint to drive business resultsBusiness Intelligence: Leveraging SharePoint to drive business results
Business Intelligence: Leveraging SharePoint to drive business results
 
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
Building a SharePoint Demo/Dev Lab using Hyper-V on Windows 8
 
Nms 9882 nms ppt
Nms 9882 nms pptNms 9882 nms ppt
Nms 9882 nms ppt
 
FLEXAP WATCHER
FLEXAP WATCHERFLEXAP WATCHER
FLEXAP WATCHER
 
Network latency - measurement and improvement
Network latency - measurement and improvementNetwork latency - measurement and improvement
Network latency - measurement and improvement
 
Monitoring and control system
Monitoring and control systemMonitoring and control system
Monitoring and control system
 
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
Ekran System Forensic Monitoring Tool -BusinesstoVirtual Italy Partner
 
Monitoring Server Temperature with Opsview
Monitoring Server Temperature with OpsviewMonitoring Server Temperature with Opsview
Monitoring Server Temperature with Opsview
 

Similar to network monitoring system ppt

Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.pptAssadLeo1
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptIRJET Journal
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Alexander Decker
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET Journal
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring Systemsweta dargad
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Project report
Project reportProject report
Project reportayush13bbm
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network TelemetryAalok Shah
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerManageEngine
 

Similar to network monitoring system ppt (20)

NetBrain CE 5.0
NetBrain CE 5.0NetBrain CE 5.0
NetBrain CE 5.0
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
L1803027588
L1803027588L1803027588
L1803027588
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Our Methodology & Benefits
Our Methodology & BenefitsOur Methodology & Benefits
Our Methodology & Benefits
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Project report
Project reportProject report
Project report
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network Telemetry
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
Computers in management
Computers in managementComputers in management
Computers in management
 

Recently uploaded

Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdfKamal Acharya
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturingssuser0811ec
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdfKamal Acharya
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdfKamal Acharya
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfAbrahamGadissa
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfKamal Acharya
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineJulioCesarSalazarHer1
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfmahaffeycheryld
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Aryaabh.arya
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringC Sai Kiran
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamDr. Radhey Shyam
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industriesMuhammadTufail242431
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringC Sai Kiran
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopEmre Günaydın
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationRobbie Edward Sayers
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdfKamal Acharya
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.PrashantGoswami42
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectRased Khan
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edgePaco Orozco
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdfKamal Acharya
 

Recently uploaded (20)

Courier management system project report.pdf
Courier management system project report.pdfCourier management system project report.pdf
Courier management system project report.pdf
 
Introduction to Casting Processes in Manufacturing
Introduction to Casting Processes in ManufacturingIntroduction to Casting Processes in Manufacturing
Introduction to Casting Processes in Manufacturing
 
Hall booking system project report .pdf
Hall booking system project report  .pdfHall booking system project report  .pdf
Hall booking system project report .pdf
 
Online resume builder management system project report.pdf
Online resume builder management system project report.pdfOnline resume builder management system project report.pdf
Online resume builder management system project report.pdf
 
Digital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdfDigital Signal Processing Lecture notes n.pdf
Digital Signal Processing Lecture notes n.pdf
 
A case study of cinema management system project report..pdf
A case study of cinema management system project report..pdfA case study of cinema management system project report..pdf
A case study of cinema management system project report..pdf
 
Electrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission lineElectrostatic field in a coaxial transmission line
Electrostatic field in a coaxial transmission line
 
AI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdfAI for workflow automation Use cases applications benefits and development.pdf
AI for workflow automation Use cases applications benefits and development.pdf
 
Democratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek AryaDemocratizing Fuzzing at Scale by Abhishek Arya
Democratizing Fuzzing at Scale by Abhishek Arya
 
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-5 Notes for II-II Mechanical Engineering
 
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data StreamKIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
KIT-601 Lecture Notes-UNIT-3.pdf Mining Data Stream
 
Halogenation process of chemical process industries
Halogenation process of chemical process industriesHalogenation process of chemical process industries
Halogenation process of chemical process industries
 
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical EngineeringIntroduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
Introduction to Machine Learning Unit-4 Notes for II-II Mechanical Engineering
 
İTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering WorkshopİTÜ CAD and Reverse Engineering Workshop
İTÜ CAD and Reverse Engineering Workshop
 
HYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generationHYDROPOWER - Hydroelectric power generation
HYDROPOWER - Hydroelectric power generation
 
Fruit shop management system project report.pdf
Fruit shop management system project report.pdfFruit shop management system project report.pdf
Fruit shop management system project report.pdf
 
Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.Quality defects in TMT Bars, Possible causes and Potential Solutions.
Quality defects in TMT Bars, Possible causes and Potential Solutions.
 
Arduino based vehicle speed tracker project
Arduino based vehicle speed tracker projectArduino based vehicle speed tracker project
Arduino based vehicle speed tracker project
 
2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge2024 DevOps Pro Europe - Growing at the edge
2024 DevOps Pro Europe - Growing at the edge
 
School management system project report.pdf
School management system project report.pdfSchool management system project report.pdf
School management system project report.pdf
 

network monitoring system ppt

  • 2. Literature Survey  A. Basic terminology Network monitoring tool Network monitoring tool is the networking tool that is used to examine usage of local area network and provide a statistical data of uploads and downloads in a network. Monitoring tool is usually used to monitor I/P traffic between the LAN and the internet. It is a network diagnostic system that is used to monitor local area network and provide a statistical display of the same. The data can be further used to improve the network efficiency. Other problems such as locating the down server, receiving incorrect work request etc can also be removed.
  • 3.  Simple network management protocol Simple network management protocol (SNMP) is based on agent/manager model. The model consists of an agent, a manager, a database containing information about the management and the network protocols. In SNMP the administrative computer which is more commonly called as manager has the task of monitoring and managing a group of systems in a network. The systems that are managed by the manager have a continuous program running known as agent, which reports the information to the manager via SNMP. Devices such as Routers, printers, servers etc use SNMP.
  • 4. WinPcap  It is a freeware which is used for direct network access under windows. WinPcap provides architecture for network analyses and packet capturing for win32 platform. WinPcap can facilitate:  Raw packet capturing  Filtering the packets according to the set of rules defined by the user.  To gather statistical data related to network traffic.
  • 5. Why do we need it??  Network Traffic Monitoring (NTM) is a network analytic tool that observes local area network usage and provides a statistical display of uploads and downloads in a network. The network display monitor displays following information:  • Source address of the system that sends frame to the network.  • The protocol that was used to send the frame.  • Destination address of the system where the frame will be received.  • Data of the message that is sent.  Capturing is the process by which a network monitor collects the information. All the information is stored by default in capture buffer. Also, one can apply restrictions on the information to be captured by the system and the data to be displayed on the monitor.  The network monitoring tool is essential to keep the track of the packets that are entering and leaving the system. NMT can provide an statistical data of the network traffic and thus improvements can be made on the system.
  • 6. C. Current research and progress  Microsoft is currently empowering a project to build a network monitoring tool to achieve “State of art”. By introducing this system one can improve network efficiency and monitor the same more efficiently.  Moreover researches are adopting various techniques, such as use of an Active measurement system in which a probe traffic is injected into the network and then monitor the performance of the system from the performance of the injected packets.
  • 7. PROBLEM DEFINITION  PREVIOUS NETWORK MONITORING TOOLS ARE NOT USER FRIENDLY.  THE SECURITY WAS NOT THE PRIMARY OBJECTIVE.  RESTORAL CAPABILITIES WERE NOT A BIG ISSUE.  TRAFFIC REROUTING WAS NOT A PROMINENT FEATURE IN THEIR INVENTORY.
  • 8. PLATFORM DEPLOYED-VISUAL C++ WHY VISUAL C++ ???  MICROSOFT FOUNDATION CLASS LIBRARIES.  AUTOMATIC GENERATION OF INTERFACE.  OBJECT ORIENTED APPROACH.  INCORPORATES SEVERAL NEW PROTOCOLS.
  • 9. SYSTEM ARCHITECTURE Network Management server Management application MIB Management server Management application MIB Network Element manager Element manager Network resources ( servers, routers, hosts ) with management agents Management clients ( PCs, workstations )
  • 10.  SYSTEM DESIGN:  What is it?? System design describes the requirements that are needed by our system. It also emphasis on the operating requirement and the system and its sub system’s architecture. The input/output layout, interphases, detailed design, and processing logic are also covered.
  • 11. PLANNING ANALYSIS DESIGN IMPLEMENTATION  Understood The scope  How to do it?  Who will do what?  What makes it different  Functional requirement  Objectives  Need  UML Diagrams to describe operations  Procedural flow  Input output layout  Yet on it?? DEVELOPMENT LIFECYCLE
  • 12.  Our implementation We have used UML diagrams to describe operations and functions or our system including its structural and behavioural view
  • 13. Use Case Diagram 1) Actors: • Network: It represents a collection of machines connected to the host machine and passes the packets from one machine to another. • NPM Tool: it takes packets from the network, analyzes them and monitors the network. • System owner: System owner is the client accessing services from the server. 2) Use Cases: • IP Packets: All the IP packets in the network come to NPM for analyses. • Alert system: Alerts the system owner if a anomaly is detected. • Log file: Keep track of the IP address and name of the machine which is stored in the database. • Anomaly detection: Detects if there is any deviation from the specified rules. • Monitors network • Calculates Bandwidth • Provides GUI
  • 14.
  • 15. TOOLS/PROTOCOLS Required INTRODUCTION TO VISUAL C++  Visual C++ is the most powerful front-end tool and graphical user interface that is mainly used for developing application programs.  The added advantages of Visual C++ are the built in Microsoft Foundation Class (MFC) Libraries.  These Libraries include base classes for creating windows, form, dialogue, sockets etc. These libraries are included to reduce the overhead of developer in creating windows and interfaces and he can focus on the application development. In addition Visual C++ support network programming with giving access to NIC.
  • 16. WinPcap  WinPcap is a free, public system for direct network access under Windows. WinPcap is an architecture for packet capture and network analysis for the Win32 platforms.  The purpose of WinPcap  Capture raw packets  Filter the packets according to user-specified rules before dispatching them to the application  Transmit raw packets to the network  Gather statistical values on the network traffic
  • 18. SNMP  SNMP is based on the manager/agent model consisting of a manager, an agent, a database of management information, managed objects and the network protocol. The manager provides the interface between the human network manager and the management system. The agent provides the interface between the manager and the physical device(s) being managed  The manager and agent use a Management Information Base (MIB) and a relatively small set of commands to exchange information.  SNMP uses five basic messages  GET  GET-NEXT  GET-RESPONSE  SET  TRAP
  • 20. IMPLEMENTATION NMS is implemented in following modules.  Network Browser • Scanning the network for system: Using findalldev() and openlive() Function
  • 21. • System Status: Checks the number of active users in the network and their Ip and Mac address • ARP request is send using pcap_sendpacket() and reply is received using pcap_next_ex(). • Machine Name: Computer name is retrieved from the system using Winsock function FUNCTIONS  pcap findalldev()  pcap openlive()  pcap setfilter()  pcap compile  pcap Loop()  pcap next ex()  pcap send packet()  pcap close()
  • 22.  TRAFFIC MONITORING Main feature of our project is monitoring traffic in the network • Network traffic analyzer The port numbers are used to identify the application layer protocols (HTTP,FTP,DNS etc.) • Protocol analyzer This monitors the protocol used by each system and thus enables to calculate bandwidth usage. • Bandwidth monitor Bandwidth is calculated by monitoring the number of packets traverse. Size of each packet *Number of packets=Value of bandwidth
  • 23. TESTING Unit Testing  We did unit testing on our various sub units of the program.  The function pcap_findalldevs() was tested for the various networks that can be opened.  The function Pcap_open_live() was tested to check the working which was to open the live capture function.  Pcap_setfilter() was tested to check the association of the filter to a capture. Integration Testing  The integration testing produced errors as Unit testing was not a success. System Testing  The system testing will be done once we get favorable outcomes from the Integration testing. Comparison Testing  The comparison testing will be done and the output of the software will be tested with the software which is available in the market.
  • 24. Future Enhancement Project can be further enhanced to  Fault management  Alerts and threshold  Windows event log monitoring  Traffic management  Network Security  Network scheduling