A Network Management Software Based on Secure Shell (SSH) Channels. and Java Universal Network Graph (JUNG)



Similar documents
IT 3202 Internet Working (New)

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

MANAGING NETWORK COMPONENTS USING SNMP

L2F Case Study Overview

Custom Integration Solutions

Interconnecting Cisco Networking Devices, Part 2 Course ICND2 v2.0; 5 Days, Instructor-led

ICT Infrastructure & Network Management

INTERCONNECTING CISCO NETWORKING DEVICES PART 2 V2.0 (ICND 2)

Interconnecting Cisco Networking Devices: Accelerated (CCNAX) 2.0(80 Hs) 1-Interconnecting Cisco Networking Devices Part 1 (40 Hs)

Interconnecting Cisco Networking Devices, Part 2 **Part of CCNA Route/Switch**

Lab Organizing CCENT Objectives by OSI Layer

November Defining the Value of MPLS VPNs

ASUS WL-5XX Series Wireless Router Internet Configuration. User s Guide

Computer Networking Networks

How To Configure A Vyatta As A Ds Internet Connection Router/Gateway With A Web Server On A Dspv.Net (Dspv) On A Network With A D

LAB 1: Evaluating Internet Connection Choices for a Small Home PC Network

Lab Diagramming External Traffic Flows

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

How To Learn Cisco Cisco Ios And Cisco Vlan

TOPOLOGIES NETWORK SECURITY SERVICES

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

"Charting the Course...

This course has been retired. View the schedule of current <a href=

Chapter 10 Link-State Routing Protocols

FNT EXPERT PAPER. // From Cable to Service AUTOR. Data Center Infrastructure Management (DCIM)

Lab Developing ACLs to Implement Firewall Rule Sets

Open Source Network: Software-Defined Networking (SDN) and OpenFlow

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $

Secure SCADA Network Technology and Methods

P-791R v2. Quick Start Guide. G.SHDSL.bis Router DEFAULT LOGIN. Administrator Password User Password. Version /2007 Edition 1

: Interconnecting Cisco Networking Devices Part 2 v2.0 (ICND2)

software networking Jithesh TJ, Santhosh Karipur QuEST Global

PANDORA FMS NETWORK DEVICES MONITORING

Applications of Software-Defined Networking (SDN) in Power System Communication Infrastructure: Benefits and Challenges

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Course Contents CCNP (CISco certified network professional)

Dynamic Routing Protocols II OSPF. Distance Vector vs. Link State Routing

About Network Data Collector

SDN and OpenFlow. Naresh Thukkani (ONF T&I Contributor) Technical Leader, Criterion Networks

Troubleshooting and Maintaining Cisco IP Networks Volume 1

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

PANDORA FMS NETWORK DEVICE MONITORING

Lesson 5-3: Border Gateway Protocol

KT The Value Networking Company

Introduction to computer networks and Cloud Computing

Interconnecting Cisco Network Devices 1 Course, Class Outline

Cisco Change Management: Best Practices White Paper

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

Software Defined Networking and OpenFlow: a Concise Review

Associate in Science Degree in Computer Network Systems Engineering

Cisco Outdoor Wireless Network Serves Up Automatic Meter Reading

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

INTERCONNECTING CISCO NETWORK DEVICES PART 1 V2.0 (ICND 1)

Skills Assessment Student Training Exam

Applicazioni Telematiche

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Layer 3 Network + Dedicated Internet Connectivity

Cisco 12 CCNA Certification

IT Networking and Security

DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM

P-660R-D Series. ADSL2+ Router. Quick Start Guide. Version /2006 Edition 1

CISCO IOS NETWORK SECURITY (IINS)

Chapter 7: Computer Networks, the Internet, and the World Wide Web. Invitation to Computer Science, C++ Version, Third Edition

Mapping Tool for Networks Using OSPF and LLTD Protocols

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Apple Airport Extreme Base Station V4.0.8 Firmware: Version 5.4

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

AC : A VOICE OVER IP INITIATIVE TO TEACH UNDERGRADUATE ENGINEERING STUDENTS THE FUNDAMENTALS OF COMPUTER COMMUNICATIONS

Chapter 3. Enterprise Campus Network Design

Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ

Experimentation driven traffic monitoring and engineering research

Effect of Windows XP Firewall on Network Simulation and Testing

Communication Networks. MAP-TELE 2011/12 José Ruela

Software Defined Networks

estadium Project Lab 8: Wireless Mesh Network Setup with DD WRT

Spotlight On Backbone Technologies

Introduction about cisco company and its products (network devices) Tell about cisco offered courses and its salary benefits (ccna ccnp ccie )

Traffic Characterization and Perceptual Quality Assessment for VoIP at Pakistan Internet Exchange-PIE. M. Amir Mehmood

On the effect of forwarding table size on SDN network utilization

Project 4: SDNs Due: 11:59 PM, Dec 11, 2014

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Virtual Leased Line (VLL) for Enterprise to Branch Office Communications

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Chapter 1 Configuring Basic Connectivity

WAN Technologies Based on CCNA 4 v3.1 Slides Compiled & modified by C. Pham

SDN_CDN Documentation

VPN. Date: 4/15/2004 By: Heena Patel

IT Networking and Security

DESIGN AND ANALYSIS OF TECHNIQUES FOR MAPPING VIRTUAL NETWORKS TO SOFTWARE- DEFINED NETWORK SUBSTRATES

Restorable Logical Topology using Cross-Layer Optimization

Transcription:

A Network Management Software Based on Secure Shell (SSH) Channels and Java Universal Network Graph (JUNG) Students: Simran Khalsa, Gerald Castaneda, Ruben Rivera. Mentor: Dr. Jorge Crichigno Department of Engineering, Northern New Mexico College {simran_khalsa, gerald_c_castaneda, ruben_m_rivera, jcrichigno}@nnmc.edu Abstract This project presents a Network Management Software (NMS) implementation based on Secure Shell (SSH) channels and Java Universal Network Graph (JUNG). Using secure SSH channels, the NMS extracts the topology of any computer network using Open Shortest Path (OSPF) as the routing protocol. NMS consists of two subsystems: the Topology Visualization Module, and the Control Module. The first one provides a visual interface that permits dynamic interaction between the network manager and devices. The latter implements control and optimization algorithms for automatic control of the network. An example application of the Control Module is routing optimization, where the routing of traffic is dynamically adjusted to avoid congested areas or hot spots. NMS is able to handle real-time updates in the network, such as link and node failures. 1

Introduction Computer networks consists of network devices and communications links. Network devices include specialized computers such as routers, which are the core of the Internet, and end users such as Laptops and mobile phones used by humans. Today, the Internet has grown into a production communication system that reaches all populated countries of the world and its use has grown exponentially [1]. A high-level overview of the Internet is shown in Figure 1 [2], where end users may be connected to the Internet by 3G providers, cable and DSL modems, and other services. The advent and utility of networking has created dramatic economic shifts. To provide Information Technology (IT) services, any current middle and large-size Internet Service Provider (ISP) and enterprise must manage an important number of routers for proper operation. As a result, an entire industry, network management, has emerged to develop technologies, services, and products to facilitate the management and administration of networks. Figure 1. Overview of the Internet architecture [2]. 2

Efforts to improve network management in current and future networks includes the Software-Defined Networking (SDN) initiative [3]. SDN is an emerging architecture that separates the forwarding plane from the control plane in network devices. This architecture decouples the network control and forwarding functions enabling the network control to become directly programmable and the underlying infrastructure to be abstracted for applications and network services. While the SDN architecture is still a work-in-progress, this project presents a Network Management Software (NMS) that proposes to control, in software, the behavior of network devices. NMS is based on Secure Shell (SSH) [4] channels and Java Universal Network Graph (JUNG) [5]. The project focuses on the management of routers using the secure SSH protocol which implements cryptographic algorithms to provide for authentication and confidentiality. Using secure SSH channels, the NMS extracts the topology of any computer networks that use Open Shortest Path (OSPF) [6] as the routing protocol. OSPF is the most widely used routing protocol. NMS consists of two subsystems: the Topology Visualization Module, and the Control Module (Figure 2). The first one provides a visual interface that permits dynamic interaction between the network manager and devices. The latter implements control and optimization algorithms for automatic control of the network. An example application of the Control Module is routing optimization, where the routing of traffic is dynamically adjusted to avoid congested areas or hot spots. NMS is able to handle real-time updates in the network, such as link and node failures. 3

With NMS, routers can be manually or automatically operated according to the needs of the network manager. NMS also makes user access and troubleshooting more convenient, and will provide a feedback control system for traffic engineering [7] and network security. Methods Given a single IP node and SSH passwords, NMS probes the entire network for all existing layer 3 devices. The Topology Visualization Module (Figure 2) generates a visual representation of the network (Figure 3). By clicking on a given router, an SSH channel between NMS and the router is open for management purposes. Figure 2. Network Management Software System. Our future work includes the Control Module (Figure 2), which will permit managers to automate security policies and traffic engineering. The latter refers to the ability of routers to route traffic optimally using optimization algorithms such as Linear Programming and Dijkstra. Java SE is the programming environment used to build this software. Java Universal Network Graph (JUNG) and Visual Library are used for drawing the network. The test-bed used 4

for developing and testing the NMS is composed of Cisco routers routers,, family model 2900, used in the industry (Figure gure 4). Cisco routers 2900 implement SSH channels, OSPF, and several other protocols. The routers used at Northern New Mexico College (NNMC) have 2 serial synchronous interfaces and 2 Fast Ethernet interfaces. All software development is performed using the test-bed bed (i.e., real equipment) rather than simulation software. Figure 3. Topology Visualization output of a real network. Further Discussion The NMS presented is built for network topologies using OSPF. In OSPF there are three type of networks: stub, point-to--point, point, and transit. A stub network is also known as Local Area Network (LAN). This is a network composed of end users that utilize a router to communicate with other LANs. A point-to-point point network is a network in which two routers are serially connected. A transit network is a network in which two or more routers are connected through a LAN. 5

Figure 4. Test--bed used at NNMC for developing and testing NMS. Conclusion The first prototype of NMS has already been created and tested. The Th Topology Visualization Module odule is able to accurately build the topology of a real network. The module also permits the network manager to visually interact with any device. Current efforts include further testing of the Topology Visualization Module, integration of a Syslog [8]] server for real-time real updates, and the implementation of the Control Module. Future work includes the expansion of NMS to manage network devicces in wireless networks such as wireless mesh [9] and sensor networks. References [1] D. Comer, Computer Networks and Internets, 5th Edition, Prentice Hall, 2010. [2] A. Tanenbaum, D. Wetherall,, Computer Networks, 5th Edition, Prentice Hall, 2011. [3] Open Networking Foundation. Online: www.opennetworking.org. [4] Ganymed SSH-2: 2: Java based SSH SSH-2 Protocol Implementation. Online: www.ganymed.ethz.ch. [5] Java Universal Network Graph. Online: http://jung.sourceforge.net. [6] Request For Comment 2328, OSPFv2. Online: http://www.ietf.org/rfc/rfc2328.txt. 6

[7] M. Pioro, D. Medhi, Routing, Flow, and Capacity Design in Communication and Computer Networks, Morgan Kaufmann, 2004. [8] Request For Comment 3164, The Syslog Protocol. Online: ttps://tools.ietf.org/html/rfc5424. [9] Khoury, J Crichigno, H Jerez, C Abdallah, W Shu, The InterMesh Network Architecture, UNM Technical Report: EECE-TR-07-007. 7