Professional Documents
Culture Documents
Gabriel Proposal
Gabriel Proposal
ABSTRACT
Computer networks need protocols to govern all transmission and presentation processes. The
Transmission Control Protocol (TCP) is one of the most important protocols that has the
compatibility to work with all types of computer networks, overcoming all architectural and
operating system differences. Nowadays, networks depend on the TCP protocol to control data flow
between all types of connected computers, whether it is client or server, over any type of media
whether it is wired or wireless networks, for all network topologies. A simulation of a university
campus network has been conducted to determine TCP protocol features, those features are taken
into consideration as one of the most important network parameters. In all digital networks, the data
transmission is not a continuous transmission – instead, it is a discreet transmission, presenting itself
as packets. These packets transfer and propagate within the network between computers, and network
nodes using the TCP protocol depending on the address, which is embedded in its header. TCP has a
great influence on the network speed. The network simulator OPNET provides an easy way of
campus design, predicting and estimating the performance of networks in a university campus
environment.
In this research, wired connections reach all computer network users at fixed points to maintain
higher Mbps and ensure reliable communications between all the campus network nodes, as well
as to increase the overall network performance taking into account the future expansions for the
university campus network design.
There are many open source (eg: Nagios) and commercial products (eg: OPmanager, Orion) which
provide network monitoring facilities. These applications provide network engineers and administrators
with many features and tools to identify and examine network infrastructure (Perera, 2014 pp 2). Many of
the monitoring tools available in the industry provide specific monitoring tasks which are limited for one
feature. Most monitoring tools provide interfaces to display network status, or server status. If
configurations of devices require alterations a separate tool or suit is required for configurations and
device management purposes. Majority of the network monitoring tools are standalone system which
does not enable network engineers and administrators to remotely monitor or examine network events and
statistics.
Commercial monitoring tools are very expensive and the cost adds up during the network
designing and implementation. However there is a selection of open source network monitoring tools.
They also provide similar functionality and features as the commercial tools. The current monitoring
systems completely monitor the data network as a whole. However monitoring of physical server details
and resources are limited or not provided.Systems and network administrators however require tools that
are affordable to ease the management of computer networks (Martin). This research culminated into the
development of a Network Monitoring Tool for network administrators. The tool has a light foot print and
does not require the use of a database. It instead monitors network traffic as well as available network
adapters on a networked computer. T The proposed system tends to develop an application that can
monitor and manage a network over LAN and wireless connection. The system development will come to
reality through the use ofvisual C# and Mysql database.
1 To maintain the effectiveness of the system when compared with any other way of monitoring
network.
2 To develop a system that monitor and give details of the host.
3 To develop a system that views attitudes of network users and administrators
Zhiyong (2003) emerged network worms and attacks have distributive characteristic, which can spread
globally in a very short time. Security management crossing network to co-defense network-wide attacks
and improve efficiency of security administration is urgently needed. This paper proposes a hierarchical
distributed network security management system (HD-NSMS), which can centrally manage security
across networks. First describes the system in macrostructure and microstructure; then discusses three key
problems when building HD-NSMS: device model, alert mechanism and emergency response
mechanism; at last, describes the implementation of HD-NSMS. The paper is valuable for implementing
NSMS in that it derives from a practical network security management system (NSMS).
Rafiullah, SarmadUllah, Rifaqat and Muhammad (2003,pp..1-12Alkar and Buhur, (2005) implemented
Internet based wireless flexible solution where home appliances are connected to slave node. The slave
nodes communicate with master node through RF and master node has serial RS232 link with PC server.
The nodes are based on PIC 16F877 µc. PC server is formed of a user interface component, the database
and the web server components. An Internet page has been setup running on a Web server. The user
interface and the Internet front end are connected to a backend data base server. The control of devices is
established and their), Large organizations always require fast and efficient network monitoring system
which reports to the network administrator as soon as a network problem arises. This paper presents an
effective and automatic network monitoring system that continuously monitor all the network switches
and inform the administrator by email or SMS when any of the network switch goes down. This system
also point out problem location in the network topology and its effect on the rest of the network. Such
network monitoring system uses smart interaction of Request Tracker (RT) and Nagios software in Linux
environment.
This scenario is common place in academic institutions because of the aforementioned reasons. This was
the inertia for this research and project development. Improved techniques for building a better network
monitoring system were devised and investigated. A new network monitoring tool was built from the
ground up using new technologies. Some of the new techniques devised were integrated into the new
network monitoring tool to improve usability and usefulness of a network monitoring tool from the
perspective of network users and systems administrators.
According to Barry (2010, P:1-12), Network infrastructure is growing rapidly and as a result, network
traffic is expanding beyond the point where traditional approaches can still be used to efficiently detect
anomalies. To aid in overcoming this issue, modern approaches to tra ffic monitoring need to be
investigated. One particularly good way of representing large amounts of network traffic is with the aid of
data visualization. InetVis, an interactive tool for visualization, was developed in 2005 by J.P van Riel
under the security and networks research group at Rhodes University. It displays traffic in a 3
dimensional cube which uses source and destination addresses as well as port numbers for each
dimension. Users have the ability to navigate through this 3D space through the use of a simple interface.
Basic theory used to check the availability is using ICMP messages (PING) to check the availability of
host. But there are few ways to do this in C# language.
Using the above method to check the availability and if the host is available, some information can be
gathered about it using SNMP messages. Basically SNMP GET request was used. Using SNMP GET it
fetch the values of certain OIDs (Object Identifiers). Each entity in the network and the system has its
own OID.
It is very typical in every industry that as its client base continuous to grow, the industry faces increased
number of problems in monitoring their operations. In network monitoring aspect the problem may
include:
The subject of monitoring by the system will be the network devices (ie. routers and switches).
The proposed application for network management and monitoring system is intended to detect numerous
attacks. Since it is not possible to design a network management and monitoring system for every type of
attack, the system be will designfor denial of service attack, Web server attack and buffer overflow attack.
Some of it advantages are:
i. to design low cost intelligent embedded system based remote monitoring system .