We accept

Network Monitoring And Management System IT Essay

A books review is a body of wording that aims to review the critical items of current knowledge including substantive conclusions as well as theoretical and methodological efforts to a particular topic. Books reviews are secondary sources, and therefore, do not record any new or original experimental work.

Most often associated with academic-oriented literature, such as theses, a literature review usually precedes a study proposal and results section. Its ultimate goal is to bring the reader current with current literature on a topic and forms the basis for another goal, such as future research that may be needed in the area.

A well-structured literature review is characterized by a logical stream of ideas; current and relevant references with regular, appropriate referencing style; proper use of terminology; and an impartial and thorough view of the previous research on this issue.

4. 1 Domain Research

4. 1. 1 Network Monitoring and Management system

4. 1. 1. 1 Release to the utilization of Network Monitoring and Management system

Whenever there is certainly vital information within an organization there has to be some agent who has to provide security measures to that information. It is because this essential information can be some kind of business ideas, customer details or any type of private tenders that is vital to organizational advantage. Any rival company can gain earnings if it has utilized to the people information by any means. Thus here arise the need and consumption of network monitoring system that'll be able to monitor the activities of its consumer.

Secondly in every company you can expect there will be one network administrator. However when the amount of machine boosts it is difficult to manage those machines personally. Assume one need to install some kind of programs in the client Personal computer, the administrator must go to that PC and then set up. It is basically time consuming to visit each and every PC for initiation and completing a set up process. Yet another way to solve this issue is to employ more employees for maintenance of the machines. Now this will be expensive affair. So the use of Network Monitoring and Management collectively sorts an important part of organizational computer network in day to life.

4. 1. 1. 2 Network Monitoring and Management System

The term network monitoring represents the use of a system that constantly screens some type of computer network for gradual or failing components which notifies the network administrator (via email, pager or other alarms) in case of outages. It really is a subset of the functions involved in network management. While an intrusion detection system displays a network for hazards from the outside, a network monitoring system screens the network for problems caused by overloaded and/or crashed machines, network contacts or other devices. Effective arranging a network management system requires that a number of network management tasks be performed. The network management system should uncover the network inventory, keep an eye on the health and status of devices and provide notifications to conditions that impact system performance.

An intrusion detection system (IDS) is a device or software application that screens network and/or system activities for malicious activities or insurance plan violations and produces studies to a Management Stop. Intrusion prevention is the procedure of accomplishing intrusion diagnosis and wanting to stop discovered possible happenings. Intrusion diagnosis and elimination systems (IDPS) are primarily focused on identifying possible situations, logging information about them, attempting to stop them, and confirming these to security administrators. IDPSs have grown to be a required addition to the security infrastructure of almost every organization.

Network management refers to the activities, methods, methods, and tools that pertain to:

Operation deals with keeping the network (and the services that the network provides) ready to go smoothly. It includes monitoring the network to spot problems as soon as possible, essentially before users are influenced.

Administration handles keeping track of resources in the network and how they are allocated. It includes all the "housekeeping" that is necessary to keep carefully the network in order.

Maintenance is concerned with performing repairs and upgrades-for example, when equipment must be changed, whenever a router needs a patch for an operating system image, when a new transition is added to a network. Maintenance also entails corrective and preventive measures to help make the managed network run "better", such as modifying device configuration guidelines.

Provisioning can be involved with configuring resources in the network to support confirmed service. For example, this may include establishing the network so a new customer can obtain speech service.

4. 1. 1. 2. 1 Types of intrusion diagnosis systems [B5][B6]

For the goal of coping with IT, there are three main types of IDS:

Fig: Showing type of intrusion Detection system

Network intrusion recognition system (NIDS)

It is an independent program that recognizes intrusions by examining network traffic and screens multiple hosts. Network intrusion detection systems gain access to network traffic by linking to a network hub, network move configured for interface mirroring, or network touch. In a very NIDS, sensors are located at choke details in the network to be supervised, often in the demilitarized zone (DMZ) or at network edges. Sensors get all network traffic and review the content of individual packets for harmful traffic. An example of a NIDS is Snort.

Host-based intrusion detection system (HIDS)

It includes an agent on a host that recognizes intrusions by studying system calls, application logs, file-system changes (binaries, password data, capability databases, Access control lists, etc. ) and other number activities and talk about. In a very HIDS, receptors usually consist of a software agent. Some application-based IDS are also part of this category. A good example of a HIDS is OSSEC.

Perimeter Intrusion Detection System (PIDS)

Detects and pinpoints the positioning of intrusion makes an attempt on perimeter fences of critical infrastructures. Using either gadgets or even more advanced fiber optic cable tv technology fitted to the perimeter fence, the PIDS picks up disruptions on the fence, which signal is checked of course, if an intrusion is recognized and considered by the machine as an intrusion attempt, an security alarm is induced.

4. 1. 1. 2. 2 Evaluation with firewalls

Though they both relate to networking security, an intrusion recognition system (IDS) differs from a firewall for the reason that a firewall appears outwardly for intrusions in order to stop them from taking place. Firewalls limit gain access to between networks to prevent intrusion and do not signal an attack in the network. An IDS evaluates a suspected intrusion once it offers occurred and alerts an security alarm. An IDS also watches for problems that result from within something. This is typically achieved by examining network communications, determining heuristics and habits (generally known as signatures) of common computer problems, and taking action to alert providers. Something that terminates connections is called an intrusion protection system, and is another form of a credit card applicatoin layer firewall

4. 1. 1. 3 Components of Network Monitoring and Management System

The network monitoring system fundamentally consists of different modules with the aid of which proper working is carried out. Listed below are the set of modules and processes:

Initial Set-Up: This is actually the first step while establishing a network monitoring tool. The machines must be physically connected. IP handling should be properly completed.

Network Mapping: The machine transmits out a command line over the network along with use of various components to receive the least knowledge on the model in which the network is functioning network. This model is useful for documenting the network construction.

Machine Pooling: Now the map is ready, and the machine sends the current status need to the components that are in the network. With this technique the machine would in a position to get the data of any potential failures that exist in the network.

Alarms & Notification: The application form can detect the failures in the prevailing network. Like if any system has gone out of LAN scheduled to any cable tv fault or any type of other failures it'll send notification to the administrator. Information about errors can be exhibited centrally or even directed as an Text concept to a cellular phone Notification can be through e-Mail, SMS or Pager.

Reporting: The log-sheet by making use of the command can be quite useful for the system administrator to generate the idea of the kind of error that is frequently occurring.

By undergoing an intensive research the designer has discovered that certain techniques like filtering of customer, listing of process, managing clients and their processes will be the basic functionalities that must be present in a network monitoring system.

4. 1. 1. 4 Network structured Application Architecture

Network based mostly application architecture can be described as the software architecture of the network based mostly application. It offers an abstract view and the model for assessment of the architecture that is going to be used to develop the machine. It clarifies how system components are allocated and discovered and how these components interact with the machine. Also provides home elevators the amount and granularity of communication needed for interact. Along with it also gives idea on the software protocols.

4. 1. 1. 4. 1 Client/Server Structures [W2][W3]

The client-server model distinguishes between applications as well as devices. Network clients make requests to a server by sending messages, and machines respond to their clients by acting on each request and going back results. One server generally supports numerous clients, and multiple machines can be networked along in a pool to handle the increased handling load as the amount of clients grows up.

C:\Users\JAYESH\Pictures\features-client-server. jpgC:\Users\JAYESH\Pictures\client_server_architecture. jpg

Fig- A Client-Server Network

The client-server model of computing is a distributed application structure that partitions jobs or workloads between the providers of a source or service, called servers, and service requesters, called clients. Often clients and servers communicate over a computer network on individual hardware, but both customer and server may have a home in the same system. A server machine is a bunch that is working a number of server programs which reveal their resources with clients.

In most circumstances, client-server architecture allows the jobs and responsibilities of the computing system to be sent out among several indie personal computers that are known to one another only through a network. This creates an additional advantage to the architecture: greater ease of maintenance. For instance, you'll be able to replace, repair, update, or even relocate a server while its clients stay both unaware and unaffected by that change.

Client/Server architecture regarding domain research

4. 1. 1. 4. 2 Network monitoring protocols [W12]

Website monitoring service can check HTTP web pages, HTTPS, SNMP, FTP, SMTP, POP3, IMAP, DNS, SSH, TELNET, SSL, TCP, ping, SIP, UDP, Mass media Streaming and a range of other jacks with a number of check intervals which range from every four time to everyone minute. Typically, most network monitoring services test your server anywhere between once-per-hour and per-minute.

SNMP is the renowned protocol used to manage networked devices. It was to facilitate the exchange of management information between networked devices functioning at the application layer of the ISO/OSI model. A assortment of network management channels and network elements are implicit in the SNMP architectural model. Network management stations keep an eye on and control network elements by executing management applications for Network devices such as hosts, gateways, terminal and servers which have management agents in charge of performing the network management functions wanted by the network management channels. THE EASY Network Management Process (SNMP) is employed to connect management information between the network management channels and the providers in the network elements.

SNMP is most commonly used for remote management of network devices. SNMP is furthermore known for its flexibility. Adding network-management functions to the existing system is super easy. An SNMP-managed network typically includes three components:

Managed devices


Network management systems

A managed device can be any device that rests on your computer data network which is SNMP compliant. Routers, switches, hubs, workstations, and printers are types of managed devices. A realtor is normally software that resides on a managed device. The agent gathers data from the managed device and translates that information into a format that can be passed in the network using SNMP. A network-management system monitors and controls supervised devices. The network management system issues demands and devices come back responses.

4. 1. 1. 5 HCI (Individuals Computer Interaction)

"Human-computer connections is a discipline concerned with the design, evaluation and implementation of interactive computing systems for human being use and with the study of major phenomena adjoining them. " - Association for Processing Machinery

As "Smart Whistle Blower"- a network management and monitoring tool completely functions in line with the user. That's the reason developer attempted to implement people's conversation with computers and to develop the computer systems for successful discussion with human by the idea of HCI (Human- Computer Connections). The programmer used following main elements of HCI:




The developer integrated HCI with the purpose of improving the interactions between humans and computer systems by making computers more functional and receptive to the user's needs. Usability can be explained as the extent to that your system can be learnt and used by the users. So the developer actions the usability of the system by analyzing the next points:

Easy to learn

Effective to use

Efficient to use

While creating a system using HCI key points the next factors must be considered by the designer:

Organizational Factors

Environmental Factors

Health and Safe practices Factors

Comfort Factors


System/Network Administrator

Supervisor\ Advisor

HCI now could be being used in a wide range of fields that happen to be shown in the diagram below:

Fig: Displaying related modules to HCIU

Source: http://images. google. co. in/imgres?imgurl=http://www. deepamehta. de/docs/images/talk/39-middle. png

4. 1. 1. 6 Market Research

4. 1. 1. 6. 1 Similar software available in market

There are numerous monitoring tools available for sale, some of which are listed below:

Application Monitoring

Performance Monitoring

Database Monitoring

Security Monitoring

Environment Monitoring

Network Traffic Monitoring

PC Monitoring

Protocol Analyzing

4. 1. 1. 6. 2 Comparison Graph [W13] [W14] [W15][W16][W17][W18][W19][W20]

Fig: Showing Contrast Graph between ten software and Smart Whistle Blower

A Brief Analysis

On an evaluation with 10 network monitoring system it has been discovered that the proposed software i. e. Smart Whistle offers many such facilities that the current network monitoring system do not have. The comparability has been done on nine cool features that network monitoring and management software will need to have. The features commonly are as follows:

[Ж ] Logical Grouping [Ж ] Sent out Monitoring [Ж ] Hardware Intrusion Detection [Ж ] WebApp [Ж ] Car breakthrough [Ж ] Sets off/alerts [Ж ] Live Screening process [Ж ] Chat empowered [Ж ] Support Network Management System

4. 1. 2 Security management & recommendation

Security Management for sites differs for all sorts of situations. A small home or an office would only require basic security while large businesses will require high maintenance and advanced software and hardware to avoid malicious episodes from hacking and spamming.

Small homes

A basic firewall like COMODO Internet Security or a unified risk management system.

For Home windows users, basic Antivirus software like AVG Antivirus, ESET NOD32 Antivirus, Kaspersky, McAfee, Avast!, Zone Alarm Security Suite or Norton Antivirus. An anti-spyware program such as Glass windows Defender or Spybot - Search & Destroy would also be a good idea. You will discover many other types of antivirus or anti-spyware programs out there to be looked at.

When using a wireless connection, use a strong password. Also try to use the most powerful security reinforced by your wireless devices, such as WPA2 with AES encryption.

Enable Apple pc Address filtering to keep track of all home network Mac pc devices attaching to your router.

Assign STATIC IP addresses to network devices.

Disable ICMP ping on router.

Review router or firewall logs to help identify excessive network contacts or traffic to the web.

Use passwords for all those accounts.

Have multiple accounts per family member, using non-administrative accounts for day-to-day activities. Disable the guest account (Control Panel> Administrative Tools> Computer Management> Users).

Raise awareness about information security to children.

Medium businesses

A quite strong firewall or Unified Menace Management System

Strong Antivirus software and Internet Security Software.

For authentication, use strong passwords and change it out over a bi-weekly/monthly basis.

When utilizing a wireless connection, use a solid password.

Raise consciousness about physical security to employees.

Use an optional network analyzer or network monitor.

An enlightened administrator or supervisor.

Large businesses

A strong firewall and proxy to keep unwanted people out.

A strong Antivirus program and Internet Security Software package.

For authentication, use strong passwords and change it on a weekly/bi-weekly basis.

When by using a wireless interconnection, use a powerful password.

Exercise physical security safeguards to employees.

Prepare a network analyzer or network keep an eye on and utilize it when needed.

Implement physical security management like shut down circuit tv for entrance areas and limited zones.

Security fencing to indicate the business's perimeter.

Fire extinguishers for fire-sensitive areas like server rooms and security rooms.

Security guards can help improve security.


An adjustable firewall and proxy to permit authorized users access from the exterior/inside.

Strong Antivirus software and Internet Security Software programs.

Wireless relationships that lead to firewalls.

Children's Internet Coverage Act conformity.

Supervision of network to guarantee improvements and changes predicated on popular site utilization.

Constant guidance by educators, librarians, and administrators to ensure protection against episodes by both internet and sneaker net resources.

security via firewall

Large government

A strong firewall and proxy to keep unwanted people out.

Strong Antivirus software and Internet Security Software suites.

Strong encryption.

White list certified wireless connection, block everything else.

All network hardware is at secure zones.

All hosts should be on an exclusive network that is invisible from the exterior.

Put web machines in a DMZ, or a firewall from the outside and from the within.

Security fencing to draw perimeter and established wireless range to the.

4. 1. 3 Service and Technology Progress in India

As India growing as one of the major IT market leaders of the world, increasingly more IT companies are establishing in today's scenario. While using increase in IT companies more competition will occur on the market, consequently you will see increase in business politics and hence everybody will try to succeed this race of competition in the market. Thus you can find high risk of hackers intruding into company data source and taking away vital information and providing them to rival company. So here the importance of Network Security comes up. Because of this increasingly more range of Network Monitoring and management systems has been developed.

On an in depth research it has been found that the number of conditions of cyber crime is increasing each year. With practical assistance delivered by expert speaker systems an organization known as as e-Crime India is the leading networking and knowledge initiative for security, IT, fraud, investigations, CERT, audit, forensics, and conformity experts who are responsible for avoiding existing episodes and emerging threats.

Major IT companies in India like the Infosys, TCS, and Wipro etc. are experiencing separate department to build up software related to network security. Hence you can say the value of growing such something because this type of software is ever- demanding with the increase and development of technology.

4. 2 Information and Resources

Networks & Networking Concepts

Computer Sites and Internets with Internet Applications, 4th International Release, Douglas E Comer, Ralph E. Droms, ISN:013123627X, Publisher: Prentice Hall, Copyright: 2004

Behrouz Forozuan, (2004) Benefits to Data Communication & Networking, 3rd Edition, McGraw-Hill

Tanenbaum, Andrew S. (2003) Computer Networks, 4th Model, Prentice Hall

Stallings, William (2006) Data and Computer Marketing communications, 7th Model, Prentice Hall


Leslie Ann Robertson, 2003, Simple Program Design, 2nd Release, Boyd and Fraser

Shelly, G. B. , Cashman, T. J. & Rosenblatt, H. J. (2005) System Examination and Design, 5th or 6th Model, Course Technology

O'Connell, F. (2001) How exactly to Run Successful Tasks III: The Magic Bullet. Addison Wesley, ISBN: 0201748061

CCTA (2002) Handling Successful Projects with PRINCE2. The Stationary Office Literature, Cleland, D. (2001) HELPFUL INFORMATION to the Task Management Body of Knowledge 2000. PMI. ISBN: 0113308914

White Paper and Journal

Parnas, David, A rational design process and the way to fake it (PDF) An important newspaper which criticises the idea that software creation can occur in properly discrete stages.

Royce, Winston (1970), "Managing the Development of Large Software Systems", Proceedings of IEEE WESCON 26 (August): 1-9

Web Site

www. onestoptesting. com/sdlc-models/waterfall-model/

http://www. freelancer. com/projects/by-tag/projects-socket-programming-based-multi-client-server-architecture. html

More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
Check the price
for your assignment