SlideShare a Scribd company logo
NETWORK MONITORING
SYSTEM
Literature Survey
 A. Basic terminology
Network monitoring tool
Network monitoring tool is the networking tool that is used to examine
usage of local area network and provide a statistical data of uploads and
downloads in a network. Monitoring tool is usually used to monitor I/P traffic
between the LAN and the internet. It is a network diagnostic system that is used
to monitor local area network and provide a statistical display of the same. The
data can be further used to improve the network efficiency. Other problems such
as locating the down server, receiving incorrect work request etc can also be
removed.
 Simple network management protocol
Simple network management protocol (SNMP) is based on agent/manager
model. The model consists of an agent, a manager, a database containing
information about the management and the network protocols.
In SNMP the administrative computer which is more commonly called as manager
has the task of monitoring and managing a group of systems in a network. The
systems that are managed by the manager have a continuous program running
known as agent, which reports the information to the manager via SNMP.
Devices such as Routers, printers, servers etc use SNMP.
WinPcap
 It is a freeware which is used for direct network access under windows.
WinPcap provides architecture for network analyses and packet capturing for
win32 platform.
WinPcap can facilitate:
 Raw packet capturing
 Filtering the packets according to the set of rules defined by the user.
 To gather statistical data related to network traffic.
Why do we need it??
 Network Traffic Monitoring (NTM) is a network analytic tool that observes
local area network usage and provides a statistical display of uploads and
downloads in a network. The network display monitor displays following
information:
 • Source address of the system that sends frame to the network.
 • The protocol that was used to send the frame.
 • Destination address of the system where the frame will be received.
 • Data of the message that is sent.
 Capturing is the process by which a network monitor collects the information.
All the information is stored by default in capture buffer. Also, one can
apply restrictions on the information to be captured by the system and the
data to be displayed on the monitor.
 The network monitoring tool is essential to keep the track of the packets that
are entering and leaving the system. NMT can provide an statistical data of
the network traffic and thus improvements can be made on the system.
C. Current research and progress
 Microsoft is currently empowering a project to build a network
monitoring tool to achieve “State of art”. By introducing this system one
can improve network efficiency and monitor the same more efficiently.
 Moreover researches are adopting various techniques, such as use of an
Active measurement system in which a probe traffic is injected into the
network and then monitor the performance of the system from the
performance of the injected packets.
PROBLEM DEFINITION
 PREVIOUS NETWORK MONITORING TOOLS
ARE NOT USER FRIENDLY.
 THE SECURITY WAS NOT THE PRIMARY
OBJECTIVE.
 RESTORAL CAPABILITIES WERE NOT
A BIG ISSUE.
 TRAFFIC REROUTING WAS NOT A
PROMINENT FEATURE IN THEIR
INVENTORY.
PLATFORM DEPLOYED-VISUAL C++
WHY VISUAL C++ ???
 MICROSOFT FOUNDATION CLASS LIBRARIES.
 AUTOMATIC GENERATION OF INTERFACE.
 OBJECT ORIENTED APPROACH.
 INCORPORATES SEVERAL NEW PROTOCOLS.
SYSTEM ARCHITECTURE
Network
Management server
Management
application
MIB
Management server
Management
application
MIB
Network
Element
manager
Element
manager
Network resources ( servers, routers, hosts ) with management agents
Management clients ( PCs, workstations )
 SYSTEM DESIGN:
 What is it??
System design describes the requirements that are
needed by our system. It also emphasis on the
operating requirement and the system and its sub
system’s architecture. The input/output layout,
interphases, detailed design, and processing logic
are also covered.
PLANNING
ANALYSIS
DESIGN
IMPLEMENTATION
 Understood The scope
 How to do it?
 Who will do what?
 What makes it
different
 Functional
requirement
 Objectives
 Need
 UML Diagrams to
describe
operations
 Procedural flow
 Input output
layout
 Yet on it??
DEVELOPMENT LIFECYCLE
 Our implementation
We have used UML diagrams to describe operations and
functions or our system including its structural and
behavioural view
Use Case Diagram
1) Actors:
• Network: It represents a collection of machines connected to the host machine
and passes the packets from one machine to another.
• NPM Tool: it takes packets from the network, analyzes them and monitors the
network.
• System owner: System owner is the client accessing services from the server.
2) Use Cases:
• IP Packets: All the IP packets in the network come to NPM for analyses.
• Alert system: Alerts the system owner if a anomaly is detected.
• Log file: Keep track of the IP address and name of the machine which is stored in
the database.
• Anomaly detection: Detects if there is any deviation from the specified rules.
• Monitors network
• Calculates Bandwidth
• Provides GUI
TOOLS/PROTOCOLS Required
INTRODUCTION TO VISUAL C++
 Visual C++ is the most powerful front-end tool and graphical user interface
that is mainly used for developing application programs.
 The added advantages of Visual C++ are the built in Microsoft Foundation
Class (MFC) Libraries.
 These Libraries include base classes for creating windows, form, dialogue,
sockets etc. These libraries are included to reduce the overhead of
developer in creating windows and interfaces and he can focus on the
application development. In addition Visual C++ support network
programming with giving access to NIC.
WinPcap
 WinPcap is a free, public system for direct network access under Windows.
WinPcap is an architecture for packet capture and network analysis for the
Win32 platforms.
 The purpose of WinPcap
 Capture raw packets
 Filter the packets according to user-specified rules before dispatching them to
the application
 Transmit raw packets to the network
 Gather statistical values on the network traffic
3.2.1 WinPcap structure
SNMP
 SNMP is based on the manager/agent model consisting of a manager, an
agent, a database of management information, managed objects and the
network protocol. The manager provides the interface between the human
network manager and the management system. The agent provides the
interface between the manager and the physical device(s) being managed
 The manager and agent use a Management Information Base (MIB) and a
relatively small set of commands to exchange information.
 SNMP uses five basic messages
 GET
 GET-NEXT
 GET-RESPONSE
 SET
 TRAP
Layered Communication
IMPLEMENTATION
NMS is implemented in following modules.
 Network Browser
• Scanning the network for system: Using findalldev() and openlive()
Function
• System Status: Checks the number of active users in the network and their Ip
and Mac address
• ARP request is send using pcap_sendpacket() and reply is received using
pcap_next_ex().
• Machine Name: Computer name is retrieved from the system using Winsock
function
FUNCTIONS
 pcap findalldev()
 pcap openlive()
 pcap setfilter()
 pcap compile
 pcap Loop()
 pcap next ex()
 pcap send packet()
 pcap close()
 TRAFFIC MONITORING
Main feature of our project is monitoring traffic in the network
• Network traffic analyzer
The port numbers are used to identify the application layer
protocols (HTTP,FTP,DNS etc.)
• Protocol analyzer
This monitors the protocol used by each system and thus enables to
calculate bandwidth usage.
• Bandwidth monitor
Bandwidth is calculated by monitoring the number of packets traverse.
Size of each packet *Number of packets=Value of bandwidth
TESTING
Unit Testing
 We did unit testing on our various sub units of the program.
 The function pcap_findalldevs() was tested for the various networks that can
be opened.
 The function Pcap_open_live() was tested to check the working which was to
open the live capture function.
 Pcap_setfilter() was tested to check the association of the filter to a capture.
Integration Testing
 The integration testing produced errors as Unit testing was not a success.
System Testing
 The system testing will be done once we get favorable outcomes from the
Integration testing.
Comparison Testing
 The comparison testing will be done and the output of the software will be
tested with the software which is available in the market.
Future Enhancement
Project can be further enhanced to
 Fault management
 Alerts and threshold
 Windows event log monitoring
 Traffic management
 Network Security
 Network scheduling
QUESTIONS ???

More Related Content

What's hot

Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
Chathurangi Shyalika
 
5 benefits of OpManager
5 benefits of OpManager5 benefits of OpManager
5 benefits of OpManager
ManageEngine, Zoho Corporation
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
Venkata Naga Ravi
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
Coder Tech
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
Nour Eldeen Mahmoud Khalifa
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
Rofiq Fauzi
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
Prince JabaKumar
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
Rob Dunn
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
SwiftTech Solutions, Inc.
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
Damian Parniewicz
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
talkaton
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
Nutan Kumar Panda
 
Network Security
Network SecurityNetwork Security
Network Security
Manoj Singh
 
The 3 aspects of network performance management
The 3 aspects of network performance managementThe 3 aspects of network performance management
The 3 aspects of network performance management
ManageEngine
 
Network design
Network designNetwork design
Network design
csk selva
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
rjain51
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
Bry Cunal
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
Papun Papun
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
ssusere578aa
 
Routing
RoutingRouting
Routing
Saima Azam
 

What's hot (20)

Network monitoring tools
Network monitoring toolsNetwork monitoring tools
Network monitoring tools
 
5 benefits of OpManager
5 benefits of OpManager5 benefits of OpManager
5 benefits of OpManager
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
Firewall and Types of firewall
Firewall and Types of firewallFirewall and Types of firewall
Firewall and Types of firewall
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
Network Monitoring System
Network Monitoring SystemNetwork Monitoring System
Network Monitoring System
 
Network Monitoring Tools
Network Monitoring ToolsNetwork Monitoring Tools
Network Monitoring Tools
 
Network Monitoring Basics
Network Monitoring BasicsNetwork Monitoring Basics
Network Monitoring Basics
 
Network Operations Center
Network Operations CenterNetwork Operations Center
Network Operations Center
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
Network Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdfNetwork Analysis Mini Project 2.pdf
Network Analysis Mini Project 2.pdf
 
Firewall configuration
Firewall configurationFirewall configuration
Firewall configuration
 
Network Security
Network SecurityNetwork Security
Network Security
 
The 3 aspects of network performance management
The 3 aspects of network performance managementThe 3 aspects of network performance management
The 3 aspects of network performance management
 
Network design
Network designNetwork design
Network design
 
Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)Introduction to Network Function Virtualization (NFV)
Introduction to Network Function Virtualization (NFV)
 
Network administration and Management
Network administration and ManagementNetwork administration and Management
Network administration and Management
 
Intrusion prevention system(ips)
Intrusion prevention system(ips)Intrusion prevention system(ips)
Intrusion prevention system(ips)
 
Troubleshooting Your Network.pptx
Troubleshooting Your Network.pptxTroubleshooting Your Network.pptx
Troubleshooting Your Network.pptx
 
Routing
RoutingRouting
Routing
 

Similar to Network Monitoring System ppt.pdf

NetBrain CE 5.0
NetBrain CE 5.0NetBrain CE 5.0
NetBrain CE 5.0
NetBrain Technologies
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
Pooja Bhojwani
 
L1803027588
L1803027588L1803027588
L1803027588
IOSR Journals
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureMOHD ARISH
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
AssadLeo1
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
IRJET Journal
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
Alexander Decker
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
Prof Ansari
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
cscpconf
 
Our Methodology & Benefits
Our Methodology & BenefitsOur Methodology & Benefits
Our Methodology & Benefits
NetBrain Technologies
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
ManageEngine, Zoho Corporation
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
Alexander Decker
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET Journal
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
sweta dargad
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
IT Tech
 
Project report
Project reportProject report
Project report
ayush13bbm
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
Gyan Prakash
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network Telemetry
Aalok Shah
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
ManageEngine
 
Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
Girish Naik
 

Similar to Network Monitoring System ppt.pdf (20)

NetBrain CE 5.0
NetBrain CE 5.0NetBrain CE 5.0
NetBrain CE 5.0
 
Internship msc cs
Internship msc csInternship msc cs
Internship msc cs
 
L1803027588
L1803027588L1803027588
L1803027588
 
Centralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructureCentralized monitoring station for it computing and network infrastructure
Centralized monitoring station for it computing and network infrastructure
 
network-management Web base.ppt
network-management Web base.pptnetwork-management Web base.ppt
network-management Web base.ppt
 
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL ScriptNetwork Analyzer and Report Generation Tool for NS-2 using TCL Script
Network Analyzer and Report Generation Tool for NS-2 using TCL Script
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
HOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.comHOST AND NETWORK SECURITY by ThesisScientist.com
HOST AND NETWORK SECURITY by ThesisScientist.com
 
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRENON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTRE
 
Our Methodology & Benefits
Our Methodology & BenefitsOur Methodology & Benefits
Our Methodology & Benefits
 
Proof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManagerProof of Concept Guide for ManageEngine OpManager
Proof of Concept Guide for ManageEngine OpManager
 
Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...Present and desired network management to cope with the expected expansion, n...
Present and desired network management to cope with the expected expansion, n...
 
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN AlgorithmIRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
 
Architecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring SystemArchitecture for SNMP based Network Monitoring System
Architecture for SNMP based Network Monitoring System
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Project report
Project reportProject report
Project report
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
Network Telemetry
Network TelemetryNetwork Telemetry
Network Telemetry
 
Monitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManagerMonitor and manage everything Cisco using OpManager
Monitor and manage everything Cisco using OpManager
 
Real Time Network Monitoring System
Real  Time  Network  Monitoring  SystemReal  Time  Network  Monitoring  System
Real Time Network Monitoring System
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 

Network Monitoring System ppt.pdf

  • 2. Literature Survey  A. Basic terminology Network monitoring tool Network monitoring tool is the networking tool that is used to examine usage of local area network and provide a statistical data of uploads and downloads in a network. Monitoring tool is usually used to monitor I/P traffic between the LAN and the internet. It is a network diagnostic system that is used to monitor local area network and provide a statistical display of the same. The data can be further used to improve the network efficiency. Other problems such as locating the down server, receiving incorrect work request etc can also be removed.
  • 3.  Simple network management protocol Simple network management protocol (SNMP) is based on agent/manager model. The model consists of an agent, a manager, a database containing information about the management and the network protocols. In SNMP the administrative computer which is more commonly called as manager has the task of monitoring and managing a group of systems in a network. The systems that are managed by the manager have a continuous program running known as agent, which reports the information to the manager via SNMP. Devices such as Routers, printers, servers etc use SNMP.
  • 4. WinPcap  It is a freeware which is used for direct network access under windows. WinPcap provides architecture for network analyses and packet capturing for win32 platform. WinPcap can facilitate:  Raw packet capturing  Filtering the packets according to the set of rules defined by the user.  To gather statistical data related to network traffic.
  • 5. Why do we need it??  Network Traffic Monitoring (NTM) is a network analytic tool that observes local area network usage and provides a statistical display of uploads and downloads in a network. The network display monitor displays following information:  • Source address of the system that sends frame to the network.  • The protocol that was used to send the frame.  • Destination address of the system where the frame will be received.  • Data of the message that is sent.  Capturing is the process by which a network monitor collects the information. All the information is stored by default in capture buffer. Also, one can apply restrictions on the information to be captured by the system and the data to be displayed on the monitor.  The network monitoring tool is essential to keep the track of the packets that are entering and leaving the system. NMT can provide an statistical data of the network traffic and thus improvements can be made on the system.
  • 6. C. Current research and progress  Microsoft is currently empowering a project to build a network monitoring tool to achieve “State of art”. By introducing this system one can improve network efficiency and monitor the same more efficiently.  Moreover researches are adopting various techniques, such as use of an Active measurement system in which a probe traffic is injected into the network and then monitor the performance of the system from the performance of the injected packets.
  • 7. PROBLEM DEFINITION  PREVIOUS NETWORK MONITORING TOOLS ARE NOT USER FRIENDLY.  THE SECURITY WAS NOT THE PRIMARY OBJECTIVE.  RESTORAL CAPABILITIES WERE NOT A BIG ISSUE.  TRAFFIC REROUTING WAS NOT A PROMINENT FEATURE IN THEIR INVENTORY.
  • 8. PLATFORM DEPLOYED-VISUAL C++ WHY VISUAL C++ ???  MICROSOFT FOUNDATION CLASS LIBRARIES.  AUTOMATIC GENERATION OF INTERFACE.  OBJECT ORIENTED APPROACH.  INCORPORATES SEVERAL NEW PROTOCOLS.
  • 9. SYSTEM ARCHITECTURE Network Management server Management application MIB Management server Management application MIB Network Element manager Element manager Network resources ( servers, routers, hosts ) with management agents Management clients ( PCs, workstations )
  • 10.  SYSTEM DESIGN:  What is it?? System design describes the requirements that are needed by our system. It also emphasis on the operating requirement and the system and its sub system’s architecture. The input/output layout, interphases, detailed design, and processing logic are also covered.
  • 11. PLANNING ANALYSIS DESIGN IMPLEMENTATION  Understood The scope  How to do it?  Who will do what?  What makes it different  Functional requirement  Objectives  Need  UML Diagrams to describe operations  Procedural flow  Input output layout  Yet on it?? DEVELOPMENT LIFECYCLE
  • 12.  Our implementation We have used UML diagrams to describe operations and functions or our system including its structural and behavioural view
  • 13. Use Case Diagram 1) Actors: • Network: It represents a collection of machines connected to the host machine and passes the packets from one machine to another. • NPM Tool: it takes packets from the network, analyzes them and monitors the network. • System owner: System owner is the client accessing services from the server. 2) Use Cases: • IP Packets: All the IP packets in the network come to NPM for analyses. • Alert system: Alerts the system owner if a anomaly is detected. • Log file: Keep track of the IP address and name of the machine which is stored in the database. • Anomaly detection: Detects if there is any deviation from the specified rules. • Monitors network • Calculates Bandwidth • Provides GUI
  • 14.
  • 15. TOOLS/PROTOCOLS Required INTRODUCTION TO VISUAL C++  Visual C++ is the most powerful front-end tool and graphical user interface that is mainly used for developing application programs.  The added advantages of Visual C++ are the built in Microsoft Foundation Class (MFC) Libraries.  These Libraries include base classes for creating windows, form, dialogue, sockets etc. These libraries are included to reduce the overhead of developer in creating windows and interfaces and he can focus on the application development. In addition Visual C++ support network programming with giving access to NIC.
  • 16. WinPcap  WinPcap is a free, public system for direct network access under Windows. WinPcap is an architecture for packet capture and network analysis for the Win32 platforms.  The purpose of WinPcap  Capture raw packets  Filter the packets according to user-specified rules before dispatching them to the application  Transmit raw packets to the network  Gather statistical values on the network traffic
  • 18. SNMP  SNMP is based on the manager/agent model consisting of a manager, an agent, a database of management information, managed objects and the network protocol. The manager provides the interface between the human network manager and the management system. The agent provides the interface between the manager and the physical device(s) being managed  The manager and agent use a Management Information Base (MIB) and a relatively small set of commands to exchange information.  SNMP uses five basic messages  GET  GET-NEXT  GET-RESPONSE  SET  TRAP
  • 20. IMPLEMENTATION NMS is implemented in following modules.  Network Browser • Scanning the network for system: Using findalldev() and openlive() Function
  • 21. • System Status: Checks the number of active users in the network and their Ip and Mac address • ARP request is send using pcap_sendpacket() and reply is received using pcap_next_ex(). • Machine Name: Computer name is retrieved from the system using Winsock function FUNCTIONS  pcap findalldev()  pcap openlive()  pcap setfilter()  pcap compile  pcap Loop()  pcap next ex()  pcap send packet()  pcap close()
  • 22.  TRAFFIC MONITORING Main feature of our project is monitoring traffic in the network • Network traffic analyzer The port numbers are used to identify the application layer protocols (HTTP,FTP,DNS etc.) • Protocol analyzer This monitors the protocol used by each system and thus enables to calculate bandwidth usage. • Bandwidth monitor Bandwidth is calculated by monitoring the number of packets traverse. Size of each packet *Number of packets=Value of bandwidth
  • 23. TESTING Unit Testing  We did unit testing on our various sub units of the program.  The function pcap_findalldevs() was tested for the various networks that can be opened.  The function Pcap_open_live() was tested to check the working which was to open the live capture function.  Pcap_setfilter() was tested to check the association of the filter to a capture. Integration Testing  The integration testing produced errors as Unit testing was not a success. System Testing  The system testing will be done once we get favorable outcomes from the Integration testing. Comparison Testing  The comparison testing will be done and the output of the software will be tested with the software which is available in the market.
  • 24. Future Enhancement Project can be further enhanced to  Fault management  Alerts and threshold  Windows event log monitoring  Traffic management  Network Security  Network scheduling