The document discusses Remote Network Monitoring (RMON) and its capabilities. It describes RMON1 and RMON2, which allow network managers to monitor remote network segments. RMON1 provides traffic statistics, alarms, and packet capture capabilities. RMON2 adds support for monitoring network and application layers. The document outlines various RMON components like probes, and how RMON can be supported in Ethernet switches. It provides examples of RMON usage like with Cisco's Network Analysis Module.
SNMP (Simple Network Management Protocol) allows network devices to be monitored and managed. It defines an agent-manager architecture where agents run on devices and respond to requests from managers to retrieve or store management information. SNMP uses a management information base (MIB) and structure of management information (SMI) to define managed objects and their properties. Key SNMP components include versions 1 and 2, protocol data units (PDUs) like get, set, and trap requests, and error codes. SNMP traps allow agents to asynchronously notify managers of events.
Basic Concepts and Types of Network ManagementSorath Asnani
Network management involves monitoring, configuring, and troubleshooting network components to meet organizational requirements. It has five main functions: configuration management, fault management, performance management, security management, and accounting management. Configuration management deals with the status of network entities and their relationships, and includes reconfiguration and documentation of hardware, software, and user accounts. Fault management handles the detection, isolation, correction, and recording of network faults through either reactive or proactive approaches. Performance management monitors network capacity, traffic, throughput, and response time to ensure efficient operation. Security and accounting management control user access and resource usage according to defined policies.
The document discusses network management systems (NMS) in large enterprises. It covers the introduction to network management and outlines key topics including the functional areas of network management like configuration, fault, performance, security and accounting management. It also discusses network management protocols commonly used like SNMP, SNMPv2, SNMPv3, CMIS/CMIP and RMON. The document defines the key elements of a network management system including the management station, management agents, management information base and network management protocols. It also covers considerations for choosing a network management platform and system.
This chapter discusses exploiting wireless networks. It begins by explaining wireless technology and standards such as 802.11. It describes the basic components of a wireless network including access points and service set identifiers. It then covers wireless authentication methods like Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA), and wireless hacking tools and techniques like wardriving. The goal is to help security professionals understand wireless networks and how attackers may exploit them.
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction. Key characteristics of cloud computing include on-demand self-service, broad network access, resource pooling, rapid elasticity, and measured service. Common uses of cloud computing involve hosting applications and services through major cloud platforms like Amazon Web Services, Microsoft Azure, and Google Cloud.
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...IJCNCJournal
There are many security models for computer networks using a combination of Intrusion Detection System and Firewall proposed and deployed in practice. In this paper, we propose and implement a new model of the association between Intrusion Detection System and Firewall operations, which allows Intrusion Detection System to automatically update the firewall filtering rule table whenever it detects a weirdo intrusion. This helps protect the network from attacks from the Internet.
This document provides an overview of key network terminology and concepts, including:
- Network components like network interface cards, hubs, switches, and cables.
- Network protocols and how they allow different devices to communicate.
- Operating systems' role in managing network resources and enabling sharing.
- The OSI model and what each layer is responsible for in data transmission.
- Common network addressing schemes and protocols like IP, TCP, UDP, and IPv6.
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
This document discusses performance analysis of Voice over IP (VoIP) communication between two systems. It introduces VoIP technology and explores problems that can occur when sending voice and data packets over different windows. The proposed work evaluates performance of open source VoIP software tools like Linphone for clients, OpenSIPS for the server, and NS-2 for network traffic analysis. Two systems are configured as clients and one as the server to simulate a VoIP call between Client A and B routed through the server.
Use of Automation Codecs Streaming Video Applications Based on Cloud ComputingTELKOMNIKA JOURNAL
Streaming technology is currently experiencing a great progress. Faster internet more users streaming. Streaming services that exist today there are still weaknesses in both the upload speed, streaming speed and limited types of video extensions that can be played. To resolve these problems then made a video streaming service based local area network with a system of cloud computing that can work effectively in terms of upload speeds, streaming and variations in video formats. Video streaming application is classified as a service IaaS (Infrastructure as a Service Cloud) in cloud computing. On the use of streaming applications the user does not need to convert the video, with the purpose of uploading process can be faster and applications can play a variety of video formats.
Ethical hacking Chapter 2 - TCP/IP - Eric VanderburgEric Vanderburg
The document describes the TCP/IP protocol stack and key networking concepts. It explains that TCP/IP has four layers - network, internet, transport, and application. The transport layer handles encapsulation and uses TCP for connection-oriented communication, while the internet layer handles packet routing between hosts using IP addresses. It also covers binary, octal, and hexadecimal numbering systems used in IP addressing and packet headers.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
The document provides an overview of network infrastructure components including networking hardware, software, and services. It then discusses several key network protocols including TCP, IP, routing protocols, and DNS. It provides details on the OSI model and describes each layer including typical functions, protocols, and vulnerabilities. For TCP and IP, it outlines the basic operation including packet formatting, connection establishment, flow control, congestion control, and error handling.
Network monitoring system plays a significant role in the network security and management. Network monitoring refers to the observation on the events, happening through the network with the aim of providing a secure and persistent network. However, many small and medium sized organizations and Universities prefer to escape from this fact. The most important reason for University is that they do not have professional network administrators to be able to use the available network monitoring system. This avoidance would cost them a lot of funds or even failure in capital, in case of network failure. The proposed network monitoring will solve this problem because of its ease of use as well as providing all the required functionalities for monitoring a network. So, the advantage of using the proposed system would be able to use by students and teachers who have just basic understanding of using computer applications. According to this fact, this application could be used for small and medium sized organizations and Universities, in case of not having professional network administrators. San San Lwin | Cho Cho Myint | Win Win Maw ""Network Monitoring System for University"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22768.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/22768/network-monitoring-system-for-university/san-san-lwin
This document summarizes a project to develop an SNMP agent for the LEAF Linux distribution. It will implement MIBs as specified in RFC 1213 and RFC 2863 to allow retrieving network configuration and status information. A graphical user interface will also be created to simplify network management tasks for the administrator compared to using command line commands. This will enhance the existing process of network analysis and make important data more easily accessible. The feasibility study found that combining SNMP, LEAF, and a GUI could help manage complex networks more efficiently. Some challenges will be restricting the MIBs to a subset and ensuring the interface is intuitive.
SNMP is a widely used network management protocol that allows communication between network managers and agents using simple request/response messages. Managed elements contain SNMP agents that collect and store management data defined in MIB variables. Network management stations can send Get, GetNext, Set, and Trap messages to agents to read/write variables and receive asynchronous event notifications. The MIB defines managed objects using an ASN.1 tree structure and numeric identifiers to ensure unique naming.
Design and implementation of an ancrchitecture of embedded web server for wir...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Want to view and control your internet traffic?
With NetScope you can easily monitor and view your network traffic in full graphical format. Look at live data in per second resolution, then drill down and zoom in on any part of that traffic you like.
Then Shape it! Prioritize important data, give lower priority to less important data and BLOCK data that should not be on your network.
The document discusses various topics related to the internet and computing including:
1. The internet is a vast network that connects computers around the world allowing people to share information and communicate from anywhere.
2. Key terms are defined such as the world wide web, TCP/IP, DNS, HTML, HTTP, and URLs.
3. Examples of internet servers and clients are provided along with their basic functions.
This document discusses internet traffic monitoring and analysis. It describes:
1) The growth of internet usage and evolving network environments that require reliable monitoring.
2) Real-world applications of monitoring including network usage analysis, planning, SLA monitoring, and security attack detection.
3) POSTECH's research activities including MRTG+, WebTrafMon, and their next-generation system NG-MON for high-speed monitoring.
Simple Network Management Protocol (SNMP) allows network administrators to monitor nodes on a network from a central management station. It uses agents residing on devices that provide information to managers. SNMP uses a management information base (MIB) to define objects that agents expose and managers can query using get, getnext, and set commands. SNMPv1 uses community strings for security while SNMPv3 adds authentication, encryption, and access control to securely manage large, complex networks.
The Impact of Security Overhead Traffic on Network’s Resources PerformanceIOSR Journals
This document discusses the impact of security overhead traffic from IPSec VPN on network performance through an OPNET simulation. Three scenarios were modeled: 1) without IPSec, 2) with IPSec using DS1 links, and 3) with IPSec using higher bandwidth DS3 links. The results show that applying IPSec VPN significantly increased server CPU utilization and network delay due to the additional encryption overhead. Increasing the link bandwidth in the third scenario helped reduce this impact by allowing more network capacity for the additional IPSec traffic.
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
This document discusses tools and techniques for assessing and hardening Microsoft systems against common vulnerabilities. It describes Microsoft tools like the Microsoft Baseline Security Analyzer (MBSA) that can identify vulnerabilities related to patches, passwords, and insecure configurations. It also discusses vulnerabilities in Microsoft operating systems, services like IIS and SQL Server, and protocols like SMB/CIFS. The document provides best practices for securing Microsoft systems such as regular patching, antivirus software, logging and monitoring, disabling unused services, and enforcing strong passwords.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document provides information on various network defense tools. It begins by defining a computer network and listing common network types. It then discusses firewalls, describing them as software or hardware that checks incoming and outgoing information on a network. It lists the main types of firewalls as packet filters, application gateways, circuit gateways, and unified threat management. It provides details on each type, such as how packet filters use transport layer information to filter packets and how application gateways use proxies. The document also covers network address translation (NAT) and port forwarding.
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
Non-intrusive remote monitoring of data centre services should be such that it does not require
(or minimal) modification of legacy code and standard practices. Also, allowing third party
agent to sit on every server in a data centre is a risk from security perspective. Hence, use of
standard such as SNMPv3 is advocated in this kind of environment. There are many tools (open
source or commercial) available which uses SNMP; but we observe that most of the tools do not
have an essential feature for auto-discovery of network. In this paper we present an algorithm
for remote monitoring of services in a data centre. The algorithm has two stages: 1) auto
discovery of network topology and 2) data collection from remote machine. Further, we
compare SNMP with WBEM and identify some other options for remote monitoring of services
and their advantages and disadvantages.
This document describes a network monitoring system. It discusses network monitoring tools, Simple Network Management Protocol (SNMP), and WinPcap. Network monitoring tools examine local area network usage and provide statistical data on network traffic. SNMP uses an agent/manager model to monitor and manage network devices. WinPcap is used for direct network access and packet capturing under Windows. The document outlines the system design, architecture, implementation using Visual C++, and testing of the network monitoring system. It can be enhanced with additional features such as fault management, alerts, security monitoring, and traffic management.
This document describes a network monitoring system. It begins with basic terminology related to network monitoring tools and protocols like SNMP and WinPcap. It then discusses why network monitoring is needed and current research progress. The document outlines the system design, including UML diagrams, and tools and protocols used. It provides details on implementation modules like the network browser and traffic monitoring. Finally, it discusses testing and future enhancements.
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
The proposed work describes the design of a multimedia platform managing users and implementing cybersecurity. The paper describes in details the use cases of the whole platform embedding Big Data and artificial intelligence (AI) engine predicting network attacks. The platform has been tested by Tree Ensemble algorithm classifying and predicting anomalous server logs of possible attacks. The data logs are collected in Cassandra Big Data System enabling the AI training model. The work has been developed within the framework of a research industry project.
This document provides an overview of key network terminology and concepts, including:
- Network components like network interface cards, hubs, switches, and cables.
- Network protocols and how they allow different devices to communicate.
- Operating systems' role in managing network resources and enabling sharing.
- The OSI model and what each layer is responsible for in data transmission.
- Common network addressing schemes and protocols like IP, TCP, UDP, and IPv6.
Performance Analysis of VoIP by Communicating Two Systems IOSR Journals
This document discusses performance analysis of Voice over IP (VoIP) communication between two systems. It introduces VoIP technology and explores problems that can occur when sending voice and data packets over different windows. The proposed work evaluates performance of open source VoIP software tools like Linphone for clients, OpenSIPS for the server, and NS-2 for network traffic analysis. Two systems are configured as clients and one as the server to simulate a VoIP call between Client A and B routed through the server.
Use of Automation Codecs Streaming Video Applications Based on Cloud ComputingTELKOMNIKA JOURNAL
Streaming technology is currently experiencing a great progress. Faster internet more users streaming. Streaming services that exist today there are still weaknesses in both the upload speed, streaming speed and limited types of video extensions that can be played. To resolve these problems then made a video streaming service based local area network with a system of cloud computing that can work effectively in terms of upload speeds, streaming and variations in video formats. Video streaming application is classified as a service IaaS (Infrastructure as a Service Cloud) in cloud computing. On the use of streaming applications the user does not need to convert the video, with the purpose of uploading process can be faster and applications can play a variety of video formats.
Ethical hacking Chapter 2 - TCP/IP - Eric VanderburgEric Vanderburg
The document describes the TCP/IP protocol stack and key networking concepts. It explains that TCP/IP has four layers - network, internet, transport, and application. The transport layer handles encapsulation and uses TCP for connection-oriented communication, while the internet layer handles packet routing between hosts using IP addresses. It also covers binary, octal, and hexadecimal numbering systems used in IP addressing and packet headers.
HOST AND NETWORK SECURITY by ThesisScientist.comProf Ansari
Network management means different things to different people. In some cases, it involves a solitary network consultant monitoring network activity with an outdated protocol analyzer. In other cases, network management involves a distributed database, auto polling of network devices, and high-end workstations generating real-time graphical views of network topology changes and traffic. In general, network management is a service that employs a variety of tools, applications, and devices to assist human network managers in monitoring and maintaining networks.
The document provides an overview of network infrastructure components including networking hardware, software, and services. It then discusses several key network protocols including TCP, IP, routing protocols, and DNS. It provides details on the OSI model and describes each layer including typical functions, protocols, and vulnerabilities. For TCP and IP, it outlines the basic operation including packet formatting, connection establishment, flow control, congestion control, and error handling.
Network monitoring system plays a significant role in the network security and management. Network monitoring refers to the observation on the events, happening through the network with the aim of providing a secure and persistent network. However, many small and medium sized organizations and Universities prefer to escape from this fact. The most important reason for University is that they do not have professional network administrators to be able to use the available network monitoring system. This avoidance would cost them a lot of funds or even failure in capital, in case of network failure. The proposed network monitoring will solve this problem because of its ease of use as well as providing all the required functionalities for monitoring a network. So, the advantage of using the proposed system would be able to use by students and teachers who have just basic understanding of using computer applications. According to this fact, this application could be used for small and medium sized organizations and Universities, in case of not having professional network administrators. San San Lwin | Cho Cho Myint | Win Win Maw ""Network Monitoring System for University"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-3 , April 2019, URL: https://www.ijtsrd.com/papers/ijtsrd22768.pdf
Paper URL: https://www.ijtsrd.com/engineering/information-technology/22768/network-monitoring-system-for-university/san-san-lwin
This document summarizes a project to develop an SNMP agent for the LEAF Linux distribution. It will implement MIBs as specified in RFC 1213 and RFC 2863 to allow retrieving network configuration and status information. A graphical user interface will also be created to simplify network management tasks for the administrator compared to using command line commands. This will enhance the existing process of network analysis and make important data more easily accessible. The feasibility study found that combining SNMP, LEAF, and a GUI could help manage complex networks more efficiently. Some challenges will be restricting the MIBs to a subset and ensuring the interface is intuitive.
SNMP is a widely used network management protocol that allows communication between network managers and agents using simple request/response messages. Managed elements contain SNMP agents that collect and store management data defined in MIB variables. Network management stations can send Get, GetNext, Set, and Trap messages to agents to read/write variables and receive asynchronous event notifications. The MIB defines managed objects using an ASN.1 tree structure and numeric identifiers to ensure unique naming.
Design and implementation of an ancrchitecture of embedded web server for wir...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Want to view and control your internet traffic?
With NetScope you can easily monitor and view your network traffic in full graphical format. Look at live data in per second resolution, then drill down and zoom in on any part of that traffic you like.
Then Shape it! Prioritize important data, give lower priority to less important data and BLOCK data that should not be on your network.
The document discusses various topics related to the internet and computing including:
1. The internet is a vast network that connects computers around the world allowing people to share information and communicate from anywhere.
2. Key terms are defined such as the world wide web, TCP/IP, DNS, HTML, HTTP, and URLs.
3. Examples of internet servers and clients are provided along with their basic functions.
This document discusses internet traffic monitoring and analysis. It describes:
1) The growth of internet usage and evolving network environments that require reliable monitoring.
2) Real-world applications of monitoring including network usage analysis, planning, SLA monitoring, and security attack detection.
3) POSTECH's research activities including MRTG+, WebTrafMon, and their next-generation system NG-MON for high-speed monitoring.
Simple Network Management Protocol (SNMP) allows network administrators to monitor nodes on a network from a central management station. It uses agents residing on devices that provide information to managers. SNMP uses a management information base (MIB) to define objects that agents expose and managers can query using get, getnext, and set commands. SNMPv1 uses community strings for security while SNMPv3 adds authentication, encryption, and access control to securely manage large, complex networks.
The Impact of Security Overhead Traffic on Network’s Resources PerformanceIOSR Journals
This document discusses the impact of security overhead traffic from IPSec VPN on network performance through an OPNET simulation. Three scenarios were modeled: 1) without IPSec, 2) with IPSec using DS1 links, and 3) with IPSec using higher bandwidth DS3 links. The results show that applying IPSec VPN significantly increased server CPU utilization and network delay due to the additional encryption overhead. Increasing the link bandwidth in the third scenario helped reduce this impact by allowing more network capacity for the additional IPSec traffic.
Ch08 Microsoft Operating System Vulnerabilitiesphanleson
This document discusses tools and techniques for assessing and hardening Microsoft systems against common vulnerabilities. It describes Microsoft tools like the Microsoft Baseline Security Analyzer (MBSA) that can identify vulnerabilities related to patches, passwords, and insecure configurations. It also discusses vulnerabilities in Microsoft operating systems, services like IIS and SQL Server, and protocols like SMB/CIFS. The document provides best practices for securing Microsoft systems such as regular patching, antivirus software, logging and monitoring, disabling unused services, and enforcing strong passwords.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document provides information on various network defense tools. It begins by defining a computer network and listing common network types. It then discusses firewalls, describing them as software or hardware that checks incoming and outgoing information on a network. It lists the main types of firewalls as packet filters, application gateways, circuit gateways, and unified threat management. It provides details on each type, such as how packet filters use transport layer information to filter packets and how application gateways use proxies. The document also covers network address translation (NAT) and port forwarding.
NON-INTRUSIVE REMOTE MONITORING OF SERVICES IN A DATA CENTREcscpconf
Non-intrusive remote monitoring of data centre services should be such that it does not require
(or minimal) modification of legacy code and standard practices. Also, allowing third party
agent to sit on every server in a data centre is a risk from security perspective. Hence, use of
standard such as SNMPv3 is advocated in this kind of environment. There are many tools (open
source or commercial) available which uses SNMP; but we observe that most of the tools do not
have an essential feature for auto-discovery of network. In this paper we present an algorithm
for remote monitoring of services in a data centre. The algorithm has two stages: 1) auto
discovery of network topology and 2) data collection from remote machine. Further, we
compare SNMP with WBEM and identify some other options for remote monitoring of services
and their advantages and disadvantages.
This document describes a network monitoring system. It discusses network monitoring tools, Simple Network Management Protocol (SNMP), and WinPcap. Network monitoring tools examine local area network usage and provide statistical data on network traffic. SNMP uses an agent/manager model to monitor and manage network devices. WinPcap is used for direct network access and packet capturing under Windows. The document outlines the system design, architecture, implementation using Visual C++, and testing of the network monitoring system. It can be enhanced with additional features such as fault management, alerts, security monitoring, and traffic management.
This document describes a network monitoring system. It begins with basic terminology related to network monitoring tools and protocols like SNMP and WinPcap. It then discusses why network monitoring is needed and current research progress. The document outlines the system design, including UML diagrams, and tools and protocols used. It provides details on implementation modules like the network browser and traffic monitoring. Finally, it discusses testing and future enhancements.
ADVANCED MULTIMEDIA PLATFORM BASED ON BIG DATA AND ARTIFICIAL INTELLIGENCE IM...IJNSA Journal
The proposed work describes the design of a multimedia platform managing users and implementing cybersecurity. The paper describes in details the use cases of the whole platform embedding Big Data and artificial intelligence (AI) engine predicting network attacks. The platform has been tested by Tree Ensemble algorithm classifying and predicting anomalous server logs of possible attacks. The data logs are collected in Cassandra Big Data System enabling the AI training model. The work has been developed within the framework of a research industry project.
The document describes Cisco Network Academy's CCNA curriculum and Packet Tracer software. The CCNA curriculum validates skills in installing, configuring and troubleshooting medium-sized networks including WAN connections and basic security threats. Packet Tracer is a network simulation program used in the CCNA program to allow students to experiment with networks and troubleshoot issues. It supports simulation of network protocols, devices, and allows creation of network topologies to model real world networks.
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
The International Journal of Engineering & Science is aimed at providing a platform for researchers, engineers, scientists, or educators to publish their original research results, to exchange new ideas, to disseminate information in innovative designs, engineering experiences and technological skills. It is also the Journal's objective to promote engineering and technology education. All papers submitted to the Journal will be blind peer-reviewed. Only original articles will be published.
The papers for publication in The International Journal of Engineering& Science are selected through rigorous peer reviews to ensure originality, timeliness, relevance, and readability.
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
This document summarizes an embedded web server based interactive data acquisition and control system. The system uses an ARM9 processor running RTLinux to both acquire data from sensors and control industrial devices. It allows remote monitoring and control via a web browser. The ARM9 handles data acquisition, control functions, and an embedded web server simultaneously. Analog sensor signals are converted to digital with an ADC and stored in external memory. The web server portion allows clients to access the stored data and send control instructions via HTML pages to the ARM9 over Ethernet. This embedded single-board solution provides real-time data acquisition and control with remote access capabilities.
Embedded Web Server based Interactive data acquisition and Control SystemIOSR Journals
This document summarizes an embedded web server based interactive data acquisition and control system. The system uses an ARM9 processor running RTLinux to both acquire data from sensors and control industrial devices. It allows remote monitoring and control via a web browser. The ARM9 handles data acquisition, control functions, and an embedded web server simultaneously. Analog sensor signals are converted to digital with an ADC and stored in external memory. The web server portion allows clients to access the stored data and send control instructions via HTML pages. This embedded single-board solution provides reliable real-time data acquisition and remote control capabilities with low resource usage.
This document provides tutorials on TCP/IP protocols, OSI layers, DNS configuration, networking commands, and the operating system boot sequence. It summarizes key protocols like IP, TCP, UDP, FTP, HTTP, and SNMP. It describes the 7 layers of the OSI model and functions of each layer. It also outlines how to configure DNS zones and common networking commands like ipconfig, ping, tracert and netstat. Finally, it lists the typical boot file sequence for Windows systems from NTLDR to hardware detection files.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
The document provides information on various networking concepts:
- A switch connects multiple devices on a local network, while a router connects separate networks and forwards data between them. A firewall acts as a security barrier between a local network and the internet.
- DNS translates domain names to IP addresses so web browsers can load internet resources by interacting with DNS servers.
- An IP address is a unique string of numbers that identifies devices on a network or the internet.
- TCP is a connection-oriented protocol that provides reliable data delivery and error checking, while UDP is connectionless and does not guarantee delivery.
Here are the key differences between flow control and congestion control:
Flow control is used at the data link layer (layer 2) of the OSI model to regulate the amount of data
transferred between two endpoints (e.g. between a computer and a router) so that the receiving
endpoint is not overwhelmed. It ensures reliable delivery of frames by using mechanisms like
windowing and acknowledgments.
Congestion control is used at the transport layer (layer 4) of the OSI model to regulate the amount
of data entering the network to avoid overloading intermediate network nodes and links. It ensures
reliable delivery of packets by adjusting the transmission rate when congestion is detected through
packet loss or queue build-up
This document discusses SNMP (Simple Network Management Protocol). It includes:
- An overview of SNMP and its role in network management
- Descriptions of key SNMP components like managed devices, agents, and network management systems
- Explanations of SNMP versions 1, 2, and 3 and their differences in features like security
- Diagrams illustrating SNMP architecture and how it relates to the OSI model
- Details on SNMP operations, message types, and use of UDP ports
Present and desired network management to cope with the expected expansion, n...Alexander Decker
This document summarizes the present and desired network management approaches for the Nelson Mandela African Institute of Science and Technology (NM-AIST) network to cope with expected expansion. It discusses the five functional areas of network management according to the ISO (International Organization for Standardization) model - fault management, configuration management, performance management, security management, and accounting management. For each area, it provides an overview of the current approach at NM-AIST and recommendations for improvements to effectively manage current and future growth of the network.
Question 1The OSI model has seven layers where each layer pe.docxssuser774ad41
Question 1
The OSI model has seven layers where each layer performs various functions that are integrated to ensure that the network performs efficiently. The layers are arranged as follows from the bottom to the top layer:
a) The physical layer:
This is the first layer of the model and it has several functions. These are:
i. Bit synchronization:
The physical layer is very crucial in terms of timing and synchronizing the period and the amount of bits that are transferred between the sender and the recipient of a message. It uses a clock to ensure accurate and reliable synchronization.
ii. Bit rate control:
The physical layer also controls the bandwidth in a network by determining the number of bits that are transferred over the network channel within the specified time which is seconds in most cases.
iii. Physical topologies:
The physical layer also determines the design which is used to connect all the devices that make up the network. These include routers, switches, hubs and other equipment used in a network.
iv. Transmission mode:
The connection of devices in the physical layer determines how data between the communicating devices flows. There are various transmission modes which are supported by the physical layer. These are simplex, half-duplex and full-duplex. In simplex, data flows in only one direction. In half-duplex data can flow in both directions but not simultaneously. In the full-duplex transmission mode, data flows in both directions at the same time.
b) Data Link Layer:
This is the second layer of the OSI model. Some of its functions include:
i. Framing:
Data that is being transmitted is segmented into pieces known as frames to make the transmission process easier. The Data link layer facilitates the framing process to ensure that the receiver acquires the accurate and relevant information within the shortest possible time.
ii. Physical addressing:
The frames require adequate data regarding the sender and the recipient to ensure that a message does not fail to reach the intended recipient. The Data Link Layer achieves this by adding a MAC address to the header section of each of the frames that are being transmitted.
iii. Error control:
The use of frames in the DLL enables the network layer to detect when frames do not reach the intended recipient. In return, the DLL is able to retransmit the lost or damaged frames using the details in the headers.
iv. Flow control:
The DLL ensures that the flow of data between the sender and the recipient is constant. This techniques ensures the stability of the communication channel that is established when transmitting data.
v. Access control:
The assigning of MAC addresses to all the computers in a network enables the Data Link Layer to determine the machines with access to certain resources.
c) Network layer:
The functions of the third OSI model layer are:
i. Routing:
The network layer assesses the different routes that a frame can use to reach its recipient and it chooses the best rou ...
This document discusses how SNMP protocol is implemented on HP routers with OVPI (OpenView Performance Insight) for network management. It describes the three main components of SNMP - managed devices, agents, and NMS. It then explains how OVPI consists of NNM for network discovery and monitoring, and uses data collected by NNM to generate reports through OVPI. Examples of specific report packages are provided, such as Cisco ping reports and device resource reports, showing how they display performance metrics over time for network troubleshooting and optimization.
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARKIJNSA Journal
Network performance can be a prime concern for network administrators. The performance of the network depends on many factors. Some of the issues faced in the network performance are - Slow Internet, Bottlenecks, Loss of packets and/or retransmissions, and Excessive bandwidth consumption. For troubleshooting a network, an in-depth understanding of network protocols is required. The main objective of this research is to analyze the performance and various other parameters related to the integrity of a network in a home-based network environment using Wireshark. Network traffic is captured for different devices. The captured traffic is then analysed using Wireshark’s basic statistical tools and advanced tools for various performance parameters.
In this paper, a solution about the design of remote video monitoring system based on Arm-Linux platform and http protocol is introduced. And the embedded system, video capture, motion detection, short message service (SMS) alarm, and client video monitor are introduced. Video 4 Linux is used to get the camera video data, which is transferred to the Web Server, and the data is displayed on the client browser. The system can also be connected with mobile phones, using SMS to control alarm equipment. The system can be applied all kinds of video surveillance systems. Compared with video capture system based on digital signal processor (DSP), this system has the advantages of fewer modules, lower cost, higher intelligence, higher system stability, and higher security.
IRJET- Assessment of Network Protocol Packet Analysis in IPV4 and IPV6 on Loc...IRJET Journal
This document discusses using the TCPDUMP command to analyze network protocol packets for IPv4 and IPv6 on a local area network. TCPDUMP is used to capture network packets and display information like timestamps, source/destination IP addresses, and source/destination MAC addresses. Network administrators can use packet analysis to monitor network activity and traffic, troubleshoot problems, and improve network performance and efficiency. The methodology section describes how TCPDUMP can be used to analyze IPv4 and IPv6 packets and perform tasks like protocol analysis, identifying top network users, analyzing network activity by time or port number, and reconstructing communication between devices.
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A trends of salmonella and antibiotic resistanceAlexander Decker
This document provides a review of trends in Salmonella and antibiotic resistance. It begins with an introduction to Salmonella as a facultative anaerobe that causes nontyphoidal salmonellosis. The emergence of antimicrobial-resistant Salmonella is then discussed. The document proceeds to cover the historical perspective and classification of Salmonella, definitions of antimicrobials and antibiotic resistance, and mechanisms of antibiotic resistance in Salmonella including modification or destruction of antimicrobial agents, efflux pumps, modification of antibiotic targets, and decreased membrane permeability. Specific resistance mechanisms are discussed for several classes of antimicrobials.
A transformational generative approach towards understanding al-istifhamAlexander Decker
This document discusses a transformational-generative approach to understanding Al-Istifham, which refers to interrogative sentences in Arabic. It begins with an introduction to the origin and development of Arabic grammar. The paper then explains the theoretical framework of transformational-generative grammar that is used. Basic linguistic concepts and terms related to Arabic grammar are defined. The document analyzes how interrogative sentences in Arabic can be derived and transformed via tools from transformational-generative grammar, categorizing Al-Istifham into linguistic and literary questions.
A time series analysis of the determinants of savings in namibiaAlexander Decker
This document summarizes a study on the determinants of savings in Namibia from 1991 to 2012. It reviews previous literature on savings determinants in developing countries. The study uses time series analysis including unit root tests, cointegration, and error correction models to analyze the relationship between savings and variables like income, inflation, population growth, deposit rates, and financial deepening in Namibia. The results found inflation and income have a positive impact on savings, while population growth negatively impacts savings. Deposit rates and financial deepening were found to have no significant impact. The study reinforces previous work and emphasizes the importance of improving income levels to achieve higher savings rates in Namibia.
A therapy for physical and mental fitness of school childrenAlexander Decker
This document summarizes a study on the importance of exercise in maintaining physical and mental fitness for school children. It discusses how physical and mental fitness are developed through participation in regular physical exercises and cannot be achieved solely through classroom learning. The document outlines different types and components of fitness and argues that developing fitness should be a key objective of education systems. It recommends that schools ensure pupils engage in graded physical activities and exercises to support their overall development.
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
This document summarizes a study examining efficiency in managing marketing executives in Nigerian banks. The study was examined through the lenses of Kaizen theory (continuous improvement) and efficiency theory. A survey of 303 marketing executives from Nigerian banks found that management plays a key role in identifying and implementing efficiency improvements. The document recommends adopting a "3H grand strategy" to improve the heads, hearts, and hands of management and marketing executives by enhancing their knowledge, attitudes, and tools.
This document discusses evaluating the link budget for effective 900MHz GSM communication. It describes the basic parameters needed for a high-level link budget calculation, including transmitter power, antenna gains, path loss, and propagation models. Common propagation models for 900MHz that are described include Okumura model for urban areas and Hata model for urban, suburban, and open areas. Rain attenuation is also incorporated using the updated ITU model to improve communication during rainfall.
A synthetic review of contraceptive supplies in punjabAlexander Decker
This document discusses contraceptive use in Punjab, Pakistan. It begins by providing background on the benefits of family planning and contraceptive use for maternal and child health. It then analyzes contraceptive commodity data from Punjab, finding that use is still low despite efforts to improve access. The document concludes by emphasizing the need for strategies to bridge gaps and meet the unmet need for effective and affordable contraceptive methods and supplies in Punjab in order to improve health outcomes.
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
1) The document discusses synthesizing Taylor's scientific management approach and Fayol's process management approach to identify an effective way to manage marketing executives in Nigerian banks.
2) It reviews Taylor's emphasis on efficiency and breaking tasks into small parts, and Fayol's focus on developing general management principles.
3) The study administered a survey to 303 marketing executives in Nigerian banks to test if combining elements of Taylor and Fayol's approaches would help manage their performance through clear roles, accountability, and motivation. Statistical analysis supported combining the two approaches.
A survey paper on sequence pattern mining with incrementalAlexander Decker
This document summarizes four algorithms for sequential pattern mining: GSP, ISM, FreeSpan, and PrefixSpan. GSP is an Apriori-based algorithm that incorporates time constraints. ISM extends SPADE to incrementally update patterns after database changes. FreeSpan uses frequent items to recursively project databases and grow subsequences. PrefixSpan also uses projection but claims to not require candidate generation. It recursively projects databases based on short prefix patterns. The document concludes by stating the goal was to find an efficient scheme for extracting sequential patterns from transactional datasets.
A survey on live virtual machine migrations and its techniquesAlexander Decker
This document summarizes several techniques for live virtual machine migration in cloud computing. It discusses works that have proposed affinity-aware migration models to improve resource utilization, energy efficient migration approaches using storage migration and live VM migration, and a dynamic consolidation technique using migration control to avoid unnecessary migrations. The document also summarizes works that have designed methods to minimize migration downtime and network traffic, proposed a resource reservation framework for efficient migration of multiple VMs, and addressed real-time issues in live migration. Finally, it provides a table summarizing the techniques, tools used, and potential future work or gaps identified for each discussed work.
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
This document discusses data mining of big data using Hadoop and MongoDB. It provides an overview of Hadoop and MongoDB and their uses in big data analysis. Specifically, it proposes using Hadoop for distributed processing and MongoDB for data storage and input. The document reviews several related works that discuss big data analysis using these tools, as well as their capabilities for scalable data storage and mining. It aims to improve computational time and fault tolerance for big data analysis by mining data stored in Hadoop using MongoDB and MapReduce.
1. The document discusses several challenges for integrating media with cloud computing including media content convergence, scalability and expandability, finding appropriate applications, and reliability.
2. Media content convergence challenges include dealing with the heterogeneity of media types, services, networks, devices, and quality of service requirements as well as integrating technologies used by media providers and consumers.
3. Scalability and expandability challenges involve adapting to the increasing volume of media content and being able to support new media formats and outlets over time.
This document surveys trust architectures that leverage provenance in wireless sensor networks. It begins with background on provenance, which refers to the documented history or derivation of data. Provenance can be used to assess trust by providing metadata about how data was processed. The document then discusses challenges for using provenance to establish trust in wireless sensor networks, which have constraints on energy and computation. Finally, it provides background on trust, which is the subjective probability that a node will behave dependably. Trust architectures need to be lightweight to account for the constraints of wireless sensor networks.
This document discusses private equity investments in Kenya. It provides background on private equity and discusses trends in various regions. The objectives of the study discussed are to establish the extent of private equity adoption in Kenya, identify common forms of private equity utilized, and determine typical exit strategies. Private equity can involve venture capital, leveraged buyouts, or mezzanine financing. Exits allow recycling of capital into new opportunities. The document provides context on private equity globally and in developing markets like Africa to frame the goals of the study.
This document discusses a study that analyzes the financial health of the Indian logistics industry from 2005-2012 using Altman's Z-score model. The study finds that the average Z-score for selected logistics firms was in the healthy to very healthy range during the study period. The average Z-score increased from 2006 to 2010 when the Indian economy was hit by the global recession, indicating the overall performance of the Indian logistics industry was good. The document reviews previous literature on measuring financial performance and distress using ratios and Z-scores, and outlines the objectives and methodology used in the current study.
**Title:** Accounting Basics – A Complete Visual Guide
**Author:** CA Suvidha Chaplot
**Description:**
Whether you're a beginner in business, a commerce student, or preparing for professional exams, understanding the language of business — **accounting** — is essential. This beautifully designed SlideShare simplifies key accounting concepts through **colorful infographics**, clear examples, and smart layouts.
From understanding **why accounting matters** to mastering **core principles, standards, types of accounts, and the accounting equation**, this guide covers everything in a visual-first format.
📘 **What’s Inside:**
* **Introduction to Accounting**: Definition, objectives, scope, and users
* **Accounting Concepts & Principles**: Business Entity, Accruals, Matching, Going Concern, and more
* **Types of Accounts**: Asset, Liability, Equity explained visually
* **The Accounting Equation**: Assets = Liabilities + Equity broken down with diagrams
* BONUS: Professionally designed cover for presentation or academic use
🎯 **Perfect for:**
* Students (Commerce, BBA, MBA, CA Foundation)
* Educators and Trainers
* UGC NET/Assistant Professor Aspirants
* Anyone building a strong foundation in accounting
👩🏫 **Designed & curated by:** CA Suvidha Chaplot
The Mexico office furniture market size attained around USD 840.32 Million in 2024. The market is projected to grow at a CAGR of 3.60% between 2025 and 2034 and reach nearly USD 1196.86 Million by 2034.
Yuriy Chapran: Zero Trust and Beyond: OpenVPN’s Role in Next-Gen Network Secu...Lviv Startup Club
Yuriy Chapran: Zero Trust and Beyond: OpenVPN’s Role in Next-Gen Network Security (UA)
UA Online PMDay 2025 Spring
Website – https://pmday.org/online
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Harnessing Hyper-Localisation: A New Era in Retail StrategyRUPAL AGARWAL
Discover how hyper-localisation is transforming the retail landscape by allowing businesses to tailor products, services, and marketing strategies to meet the unique needs of specific communities. This presentation explores the concept, benefits, and real-world examples of hyper-localisation in action, helping retailers boost customer satisfaction and drive growth.
Alec Lawler - A Passion For Building Brand AwarenessAlec Lawler
Alec Lawler is an accomplished show jumping athlete and entrepreneur with a passion for building brand awareness. He has competed at the highest level in show jumping throughout North America and Europe, winning numerous awards and accolades, including the National Grand Prix of the Desert in 2014. Alec founded Lawler Show Jumping LLC in 2019, where he creates strategic marketing plans to build brand awareness and competes at the highest international level in show jumping throughout North America.
Looking for Reliable BPO Project Providers?"anujascentbpo
"Looking for Reliable BPO Project Providers?" tailored for businesses potentially seeking outsourcing partners, especially those in or considering Noida and India.
Top 5 Mistakes to Avoid When Writing a Job ApplicationRed Tape Busters
Applying for jobs can be tough, especially when you’re making common application mistakes. Learn how to avoid errors like sending generic applications, ignoring job descriptions, and poor formatting. Discover how to highlight your strengths and create a polished, tailored resume. Stand out to employers and increase your chances of landing an interview. Visit for more information: https://redtapebusters.com/job-application-writer-resume-writer-brisbane/
Network Detection and Response (NDR): The Future of Intelligent CybersecurityGauriKale30
Network Detection and Response (NDR) uses AI and behavioral analytics to detect, analyze, and respond to threats in real time, ensuring comprehensive and automated network security.
Kiran Flemish is a dynamic musician, composer, and student leader pursuing a degree in music with a minor in film and media studies. As a talented tenor saxophonist and DJ, he blends jazz with modern digital production, creating original compositions using platforms like Logic Pro and Ableton Live. With nearly a decade of experience as a private instructor and youth music coach, Kiran is passionate about mentoring the next generation of musicians. He has hosted workshops, raised funds for causes like the Save the Music Foundation and Type I Diabetes research, and is eager to expand his career in music licensing and production.
The Institute for Public Relations Behavioral Insights Research Center and Leger partnered on this 5th edition of the Disinformation in Society Report. We surveyed 2,000 U.S. adults to assess what sources they trust, how Americans perceive false or misleading information, who they hold responsible for spreading it, and what actions they believe are necessary to combat it.
Explore the growing trend of payroll outsourcing in the UK with key 2025 statistics, market insights, and benefits for accounting firms. This infographic highlights why more firms are turning to outsourced payroll services for UK businesses to boost compliance, cut costs, and streamline operations. Discover how QXAS can help your firm stay ahead.
for more details visit:- https://qxaccounting.com/uk/service/payroll-outsourcing/
The Mobile Hub Part II provides an extensive overview of the integration of glass technologies, cloud systems, and remote building frameworks across industries such as construction, automotive, and urban development.
The document emphasizes innovation in glass technologies, remote building systems, and cloud-based designs, with a focus on sustainability, scalability, and long-term vision.
V1 The European Portal Hub, centered in Oviedo, Spain, is significant as it serves as the central point for 11 European cities' glass industries. It is described as the first of its kind, marking a major milestone in the development and integration of glass technologies across Europe. This hub is expected to streamline communication, foster innovation, and enhance collaboration among cities, making it a pivotal element in advancing glass construction and remote building projects. BAKO INDUSTRIES supported by Magi & Marcus Eng will debut its European counterpart by 2038. https://www.slideshare.net/slideshow/comments-on-cloud-stream-part-ii-mobile-hub-v1-hub-agency-pdf/278633244
Alan Stalcup is the visionary leader and CEO of GVA Real Estate Investments. In 2015, Alan spearheaded the transformation of GVA into a dynamic real estate powerhouse. With a relentless commitment to community and investor value, he has grown the company from a modest 312 units to an impressive portfolio of over 29,500 units across nine states. He graduated from Washington University in St. Louis and has honed his knowledge and know-how for over 20 years.
1. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.8, 2014
A Step on Developing Network Monitoring Tools
Ahmed Kijazi
School of Information and Communication Science and Engineering, Nelson Mandela Institution of Science and
Technology P.O. Box 447, Arusha, Tanzania
Tel:+255712307240 Email:[email protected],[email protected]
Kisangiri Michael
School of Information and Communication Science and Engineering, Nelson Mandela Institution of Science and
Technology P.O. Box 447, Arusha, Tanzania
Tel:+255788744023 Email:[email protected]
Abstract:
Network Monitoring involves Using Software or hardware based Systems or a combination of both to constantly
observe the status of network devices and hosts, and notifies the network administrator via email, SMS or other
alarms in case of error or fail. Observing the status of network device and hosts is done when the Monitoring
System speaks with the networking devices or hosts using different protocols within the protocols stack (OSI
Layer) ,see Figure1.The aim of this paper is to provide a footstep on developing a network monitoring tool for
monitoring network devices and hosts. This is a software based Network Monitoring tool using a combination of
Simple network Monitoring Protocol (SNMP), Internet Control Message Protocol (ICMP) and Port scanning
concept.
Key words: SNMP Manager, MIB, SNMP Agent, ICMP, Port Scanning, DNS, DHCP, SMTP, HTTP, Service;
59
1. Introduction
Network Monitoring is not only concerned with Monitoring of the physical network and host device such as
routers, bridges, hubs and computers, but also concerned with monitoring of services which are running on some
of these devices. These services they provide data storage, manipulation, presentation, communication services
and they are running in the network Layer and above. In fact, this paper Monitor the application layers service
not otherwise, which are Domain name service (DNS), Dynamic host control protocol (DHCP), Simple Message
Transfer protocol (SMTP), Hypertext transfer protocol (HTTP). These application Layer services, they are
running on most important Servers on the Computer network such as Web Servers, Mail Servers, IP addresses
Servers and name resolution Servers. Monitoring of application service availability involves port scanning
technique while monitoring of network device and hosts use SNMP and ICMP protocols concept respectively.
SNMP is an industry standard management protocol that originated for TCP/IP networks. However, all these
three concepts they are implemented Using Java in one software package which then form a network monitoring
tool.
Figure1. A diagram for OSI 7 layers and services.
2. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.8, 2014
192.168.0.1
60
2. Methodology
Consider Figure 2. It is a monitored LAN which consists of three key elements:
i. A managed device
ii. Agent - software which runs on the Managed device.
iii. Network management system (NMS) — software which runs on the manager
A managed device is a network node that implements an SNMP interface that allows unidirectional (read-only)
or bidirectional access to node-specific information (read-write). Managed devices exchange node-specific
information with the NMSs [8]. Sometimes called network elements, the managed devices can be any type of
device, including, but not limited to, routers, access servers, switches, bridges, hubs, IP telephones, IP video
cameras, computer hosts, and printers [8]. An agent is a network-management software module that resides on a
managed device. An agent has local knowledge of management information and translates that information to or
from an SNMP specific form. A network management system (NMS) executes applications that monitor and
control managed devices, in this paper we call that application as a network monitoring tool. NMS provides the
bulk of the processing and memory resources required for network management. One or more NMSs may exist
on any managed network [8].
The developed network monitoring tool (SNMP Manager) is installed in the Network Management Station
(NMS). The System is used to Monitor Mail Server, Web Server, DNS Server, CISCO Switch 2960-S, Gateway
device and internet connection as shown in the Figure 2. The monitoring process is performed by the SNMP
Manager when sending and receiving packets via ICMP and SNMP to and from the network devices and hosts
within the network, but also port scanning techniques for Server Services. The monitoring process is categorized
into three parts as follows:
i. Monitoring of device availability
These do not care about the services running on the devices, just monitoring their availability only.
These apply to all devices in the network
ii. Monitoring of Service availability
Monitoring of Services, are based on monitoring of availability of Services running on the Servers.
These Services are the ones providing different functionalities in the network such as Mail, Address
resolution and Web based functionalities. These services operate in the application Layer.
iii. Monitoring of other parameters.
Other parameter are those apart from Services and device availability, these are Status of all ports of the
switch, bandwidth allocated in all ports of the switch, tracking the location of all devices using location
names, tracking the elapse time since the devices are up, determining the number of users configured in
each server, Determining the amount of physical memory available in each Server, Reading the current
operation temperature value from the switch, Checking the fan status from the switch and determining
the OS version which running in all devices.
Figure (2), it’s a sample network diagram where by network devices such as routers and switch and host
devices such as Web, Mail and DNS servers are Monitored by the Network Management Station
(NMS).
Switch
2960-S
NMS
Mail Server
Web Server
DNS
Gateway
192.168.0.2
192.168.0.3
192.168.0.4
192.168.0.5
192.168.0.6
link
Internet
Figure 2. Monitored LAN
3. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.8, 2014
61
i. Monitoring of device availability
Monitoring of device availability is done, by using the ICMP protocol. A part of the network monitoring
software is programmed in such a way it utilizes the ICMP ping packets to detect the availability of any devices
in the network [5] [6]. The software periodically automatically detects the devices by sending the echo request to
each device using IP address and then device respond with echo reply, see Figure 3. If the device echo reply
indicates not reachable means the device is down and if an echo reply indicate reachable means the device is up
[5] [6]. In order for the program to send the ICMP ping the programmer does not need to have deep knowledge
about the ICMP packet structure. Fortunately, Java provides libraries for sending a ping packet to the devices
using their IP addresses [5]. More examples are available in the internet.
Figure (3) present how the Network Management Station (NMS) sends ping packets to the network device and
hosts [10]. Through this process NMS can detect the availability of both network device and hosts in the
monitored network Figure (2).
NMS
192.168.0.3
Gateway
192.68.0.1
Echo request
Echo replies
NMS
192.168.0.3
Mail Server
192.168.0.4
Echo request
Echo replies
Figure 3. Echo request and replies from the devices
ii. Monitoring of Service availability.
Monitoring of Service availability is done by using port scanning technique. A service monitoring module in the
SNMP Manage does port scanning by periodically establishing connection to the Servers using Socket
programming, see Figure4 [7]. A socket comprises of IP address and a port number of the Services that SNMP
Manager wishes to establish a connection with them. Socket class is available in the java.net.* package so this
should be imported to the net beans IDE during programming. The socket should enclose within the try and
catch block so that any disconnection will be caught while connection remains in the try block [3].
Figure (4), it is a network monitoring tool installed on the NMS detecting Web, Mail and DNS availability using
TCP port scanning technique.
192.168.0.5
Connection to Mail
Server TCP:110 192.168.0.4
192.168.0.6
NMS
Indicates TCP Connection.
Figure 4. NMS identifies Server application by establishing a TCP connection to their ports
iii. Monitoring of other parameters.
Monitoring of other parameters is done using SNMP protocol. Simple Network Monitoring control protocol is an
application Layer protocol operates in port number 161 by default. SNMP is disabled in the devices which
4. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.8, 2014
support SNMP capabilities, in order for this protocol to work it should be enabled, a programmer required to
read the SNMP device manual before further development of software. In this paper Cisco switch 2960-S is used
as an example to explain the concept [4]. Java does not know anything about SNMP, in order to program any
SNMP Manager a software developer is required to download and import an SNMP library in the net beans.
More SNMP libraries are available online, but in this paper SNMP4J libraries have been used. Any Software
which Uses SNMP to manage the device, it is called an SNMP Manager. The management is done in
cooperation with agents and MIBS. An SNMP manager refers to a system that runs a managing application or
suite of applications. These applications depend on MIB objects for information that resides on the managed
systems. Managers generate requests for this MIB information, and an SNMP agent on the managed system
responds to these requests [4].
A request can either be the retrieval or modification of MIB information. By accessing the MIB objects, the
SNMP agent allows configuration, performance, and problem management data to be managed by the SNMP
manager. This is how the agent makes network and system information available to other systems [4]. SNMP
agents reside on systems that are managed. The agent receives requests to either retrieve or change management
information by referencing MIB objects. Management Information Base (MIB) objects are units of information
that provide information about the system and the network to the managing system. MIB objects are referenced
by the agent whenever a valid request from an SNMP manager is received [4].
Figure (5), SNMP Manager communicates with managed device using SNMP4J libraries.
62
NMS
SNMP
Manager
Software
Managed Device
SNMP Agent
Software
MIB
Obj1 Obj2
Objn
SNMP4J Library
Indicate Flow of information
Figure 5. SNMP Manager communicates with SNMP agent via SNMP4J Library
Fig (6), Express the Management information base (MIB) files organized in a tree structure. Each set of circles
from the top indicates a particular configuration in a device.
Figure 6. MIB configuration organization structure
MIB stores device configuration in the tree structure as shown in the Fig 6. Each series of this configuration
indicates a certain configuration in the device. The all parts indicate the general configuration for all devices, but
5. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.8, 2014
start from the private circle indicates specific configurations from different companies. For example, any CISCO
configuration start with OID number 1.3.6.1.4.1 see Fig6.The following are the OIDS of different configuration
from different devices and the configuration information they indicated.
Table (1), explain the configuration numbers (OIDs) from the devices and their meaning
OID number Configuration Device
.1.3.6.1.2.1.2.2.1.8 Shows Switch port status CISCO (2960-S)
.1.3.6.1.2.1.2.2.1.5 Switch ports bandwidth CISCO (2960-S)
.1.3.6.1.2.1.1.6.0 Device, Location Any
.1.3.6.1.2.1.1.3.0 Time elapse since the device is up Any
.1.3.6.1.2.1.25.1.5.0 Current Number of Users in the System Any
.1.3.6.1.2.1.25.2.2.0 Amount of Physical Memory Any
.1.3.6.1.4.1.9.9.13.1.4.1.3 Fan status CISCO (2960-S)
.1.3.6.1.4.1.9.9.13.1.3.1.3 Device Current working Temperature CISCO (2960-S)
.1.3.6.1.2.1.1.1.0 OS Description Any
Table1.OID numbers and respectively Managed configuration
63
3. Tools needed.
Normally it is very difficult to find the correct OID number in a given MIB configuration file because of their
complex content organization. In order to find the correct OID number in the MIB configuration file you need to
have MIB browser tools. Using the MIB browser software you can browse any MIB file in the device using
device IP address and get the correct OID number with description. In this paper a free MIB browser called MIB
browser engine is proposed [9] see Fig 7.
Figure (7), It is Manage engine free tool which is used to browse the device configuration files and extract OIDs
and their meaning.
Figure 7. Manage Engine Free Tool
6. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.8, 2014
For doing coding a net bean IDE is required, but in order for your coding to communicate with SNMP enabled
device SNMP library for Java must be imported in the net beans. These libraries are different classes and
functions which enable Java to communicate with SNMP enabled devices with combination of device IP
Address and SNMP port number which is 161 by default.
Figure (8), it is a graphical use interface of the netbean IDE, it is used for network programming using Java SE.
Figure 8. Net bean IDE
Figure (9) Graphical user interface of a website which you can download SNMP4J libraries. These libraries they
enable Java based program to communicate with SNMP enabled devices using the SNMP protocol.
64
7. Computer Engineering and Intelligent Systems www.iiste.org
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.5, No.8, 2014
Figure 9. SNMP for Java Library
65
4. Conclusion.
This paper will provide a footstep on how to develop network monitoring tools for non expertise network
programmer for Monitoring network as well as Hosts devices.
5. Reference:
[1]. G. Ravi, M. Mohamed Surputhee, Dr. R. Srinivasan (2012). Securing Wireless Sensor Networks using
Concealed Data Aggregation, Secret Sharing and Randomized Dispersive Routes. International Journal of
Computational Intelligence and Information Security,1837-7823
[2].SNMP, a protocol capable of managing any network device, which stands for Simple Network Management
ProtocoL.www.rane.com/note161.html. (July 27,2014)
[3]. David Reily and Michael Reily (2002) . Network programming and distributed computing. Addison Wesley
Pub ISBN: 0-201-71037-4
[4]. IBM .Simple Network Management Protocol (SNMP) Support version 4
[5].Configuring for Network Management Applications by CISCO.www.cisco.com/.../application-networking.(
July 27,2014).
[6]. Ahsan Habib, Mohamed M. Hefeeda, and Bharat K. Bhargavav CERIAS. Detecting Service Violations and
DOS Attacks.Department of Computer Sciences Purdue University, West Lafayette, IN 47907.
[7]. Lanier Watkins, Cherita Corbett, Benjamin Salazar, and Kevin Fairbanks .Using Network Traffic to
Remotely Identify the Type of Applications Executing on Mobile Devices.Johns Hopkins University Applied
Physics Laboratory Laurel, MD USA
[8]. M. Mohamed Surputheen1, G.Ravi2, Dr.R.Srinivasan(2012). Route Optimization using SNMP for
Automatic Discovery of Network Topology.International Journal of Computational Intelligence and Information
Security.1837-7823
[9]. A free MIB browser tool.www.manageengine.com/products/mibbrowser-free-tool/(July 6,2014).
[10]. Amir Sheikh, Rahul Hendawe, Rajnish Singh, Jayashree Shiral, Anmol Rohan. Remote Monitoring,
Controlling and Lost Hardware Detecting through GSM (2012). International Journal of Advanced Research in
Computer Engineering & Technology. 2278 – 1323
8. The IISTE is a pioneer in the Open-Access hosting service and academic event
management. The aim of the firm is Accelerating Global Knowledge Sharing.
More information about the firm can be found on the homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
There are more than 30 peer-reviewed academic journals hosted under the hosting
platform.
Prospective authors of journals can find the submission instruction on the
following page: http://www.iiste.org/journals/ All the journals articles are available
online to the readers all over the world without financial, legal, or technical barriers
other than those inseparable from gaining access to the internet itself. Paper version
of the journals is also available upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar