80 research outputs found

    Results of the CEO Project - WWW Management

    Get PDF
    This report contains the result of a ‘proof of concept’ study that was performed by the CTIT of the University of Twente, together with ESYS Limited (Guildford, UK) for the Institute of Remote Sensing Applications of the Joint Research Centre (JRC) of the EC (Ispra, Italy). The study is part of the ‘Centre of Earth Observation’ (CEO) programme. The subject of the study was the design and implementation of tools that allow status and utilisation monitoring of networks and distributed information servers. In the specific case of the CEO programme, these information servers are accessible via the WWW and contain large amounts of earth observation data (e.g. satellite pictures). The work division within the project was that ESYS investigated the management applications, which had to run on top of HP-Openview, and the CTIT designed and implemented the management agents. These agents had to include the following Management Information Bases (MIBs): • A HTTP-MIB, with detailed information concerning the WWW document transfer protocol. • A Retrieval Service (RS) MIB, with high level information concerning the WWW document transfer service. • An Information Store (IS) MIB, with information concerning the WWW server and the documents provided by that server. The specifications of these MIBs were presented to the IETF and provided a good starting point for subsequent standardization activities. The agents were implemented as sub-agents of the EMANATE extensible agent package and are currently being tested in a number of field trials

    Definitions of Managed Objects for APPN TRAPS

    Full text link

    Design of a graphic user interface for a network management protocol

    Get PDF

    Administração e gerência de redes de computadores

    Get PDF
    With the computers networks growing in complexity, the network monitoring tools usage becomes more and more necessary. This monograph presents case studies where the importance of using network monitoring tools, like Nagios, Cacti and BigBrother, is shown in order to avoid excessive time and resources demand on managing networks. Enhancing substantially the administrator work quality standard, allowing him having a precise and centralized vision of all important network elements.Com a crescente complexidade das redes de computadores, a utilização de sistemas de gerenciamento de redes torna-se cada vez mais indispensável. Esta monografia apresenta estudos de caso onde é mostrada a importância da utilização de ferramentas de gerenciamento de redes, como o Nagios, o Cacti e o BigBrother, a fim de evitar o consumo excessivo de tempo e recursos para esta tarefa, elevando significativamente o padrão de qualidade do trabalho do administrador, permitindo-o ter uma visão precisa e centralizada de todos os elementos importantes da rede

    Tietoverkkojen valvonnan yhdenmukaistaminen

    Get PDF
    As the modern society is increasingly dependant on computer networks especially as the Internet of Things gaining popularity, a need to monitor computer networks along with associated devices increases. Additionally, the amount of cyber attacks is increasing and certain malware such as Mirai target especially network devices. In order to effectively monitor computer networks and devices, effective solutions are required for collecting and storing the information. This thesis designs and implements a novel network monitoring system. The presented system is capable of utilizing state-of-the-art network monitoring protocols and harmonizing the collected information using a common data model. This design allows effective queries and further processing on the collected information. The presented system is evaluated by comparing the system against the requirements imposed on the system, by assessing the amount of harmonized information using several protocols and by assessing the suitability of the chosen data model. Additionally, the protocol overheads of the used network monitoring protocols are evaluated. The presented system was found to fulfil the imposed requirements. Approximately 21% of the information provided by the chosen network monitoring protocols could be harmonized into the chosen data model format. The result is sufficient for effective querying and combining the information, as well as for processing the information further. The result can be improved by extending the data model and improving the information processing. Additionally, the chosen data model was shown to be suitable for the use case presented in this thesis.Yhteiskunnan ollessa jatkuvasti verkottuneempi erityisesti Esineiden Internetin kasvattaessa suosiotaan, tarve seurata sekä verkon että siihen liitettyjen laitteiden tilaa ja mahdollisia poikkeustilanteita kasvaa. Lisäksi tietoverkkohyökkäysten määrä on kasvamassa ja erinäiset haittaohjelmat kuten Mirai, ovat suunnattu erityisesti verkkolaitteita kohtaan. Jotta verkkoa ja sen laitteiden tilaa voidaan seurata, tarvitaan tehokkaita ratkaisuja tiedon keräämiseen sekä säilöntään. Tässä diplomityössä suunnitellaan ja toteutetaan verkonvalvontajärjestelmä, joka mahdollistaa moninaisten verkonvalvontaprotokollien hyödyntämisen tiedonkeräykseen. Lisäksi järjestelmä säilöö kerätyn tiedon käyttäen yhtenäistä tietomallia. Yhtenäisen tietomallin käyttö mahdollistaa tiedon tehokkaan jatkojalostamisen sekä haut tietosisältöihin. Diplomityössä esiteltävän järjestelmän ominaisuuksia arvioidaan tarkastelemalla, minkälaisia osuuksia eri verkonvalvontaprotokollien tarjoamasta informaatiosta voidaan yhdenmukaistaa tietomalliin, onko valittu tietomalli soveltuva verkonvalvontaan sekä varmistetaan esiteltävän järjestelmän täyttävän sille asetetut vaatimukset. Lisäksi työssä arvioidaan käytettävien verkonvalvontaprotokollien siirtämisen kiinteitä kustannuksia kuten otsakkeita. Työssä esitellyn järjestelmän todettiin täyttävän sille asetetut vaatimukset. Eri verkonvalvontaprotokollien tarjoamasta informaatiosta keskimäärin 21% voitiin harmonisoida tietomalliin. Saavutettu osuus on riittävä, jotta eri laitteista saatavaa informaatiota voidaan yhdistellä ja hakea tehokkaasti. Lukemaa voidaan jatkossa parantaa laajentamalla tietomallia sekä kehittämällä kerätyn informaation prosessointia. Lisäksi valittu tietomalli todettiin soveltuvaksi tämän diplomityön käyttötarkoitukseen

    EVALUATING THE USE OF SNMP AS A WIRELESS NETWORK MONITORING TOOL FOR IEEE 802.11 WIRELESS NETWORKS

    Get PDF
    The increasing popularity of wireless networks has led to instances of high utilization and congestion, some of which have resulted in an interruption of network service. A thorough understanding of how IEEE 802.11 wireless networks operate is crucial to predicting and preventing future interruptions. There have been many studies performed on wireless networks. Of those that have captured data from the wireless side, most have used a form of wireless network monitoring known as Vicinity Sniffing (wireless sniffing from a location that is physically close to an access point to be in the broadcast range) as the primary means of capturing data. We believe that with recent advancements, SNMP is now capable of producing reliable results that were previously unattainable. We were presented with several obstacles in our studies, most of which are beliefs that SNMP is inadequate for monitoring IEEE 802.11 wireless networks. The claim is that SNMP provides either aggregated statistics or instantaneous values, and that it cannot report data on a per-device level, which is often desired so that individual details of a network\u27s performance may be analyzed. Although the data is aggregated over some length of time, recent advancements do in fact allow for per-device details. Because of this, we believe that these claims are no longer valid, and that they are hindering the use of a very versatile tool. This study is motivated by the iTiger project which is a research project located at Clemson University. A prototype system has been developed allowing fans attending home football games to interact with a set of web applications using 802.11 enabled smartphones. A driving requirement behind the work presented in this thesis was to develop a framework for monitoring and analyzing the underlying IEEE 802.11 network used by the iTiger system. The work presented is based on a set of controlled experiments conducted in the football stadium. The result of our study will be to show that the latest generation of wireless equipment can provide data that was once thought to be available only from wireless monitoring. Through our analysis, we will provide a proof-of-concept that SNMP is more capable than previously thought and that the results obtained from wireless networks are as accurate, and in some situations even more accurate, than those statistics acquired from using the techniques of Vicinity Sniffing

    Secure Configuration and Management of Linux Systems using a Network Service Orchestrator.

    Get PDF
    Manual management of the configuration of network devices and computing devices (hosts) is an error-prone task. Centralized automation of these tasks can lower the costs of management, but can also introduce unknown or unanticipated security risks. Misconfiguration (deliberate (by outsiders) or inadvertent (by insiders)) can expose a system to significant risks. Centralized network management has seen significant progress in recent years, resulting in model-driven approaches that are clearly superior to previous "craft" methods. Host management has seen less development. The tools available have developed in separate task-specific ways. This thesis explores two aspects of the configuration management problem for hosts: (1) implementing host management using the model-driven (network) management tools; (2) establishing the relative security of traditional methods and the above proposal for model driven host management. It is shown that the model-driven approach is feasible, and the security of the model driven approach is significantly higher than that of existing approaches
    corecore