Development of Monitoring Tools for Measuring Network Performances: A Passive Approach



Similar documents
PANDORA FMS NETWORK DEVICES MONITORING

A Summary of Network Traffic Monitoring and Analysis Techniques

PANDORA FMS NETWORK DEVICE MONITORING

Network Management. Jaakko Kotimäki. Department of Computer Science Aalto University, School of Science. 21. maaliskuuta 2016

Network Monitoring Comparison

SNMP Network Management Concepts

Network traffic monitoring and management. Sonia Panchen 11 th November 2010

Simple Network Management Protocol

Enterprise Network Control and Management: Traffic Flow Models

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Analysis of Bursty Packet Loss Characteristics on Underutilized Links Using SNMP

A NOVEL RESOURCE EFFICIENT DMMS APPROACH

How To Manage A Network With Mobile Agents

Internet Traffic Measurement

Using RMON to Manage Remote Networks Gilbert Held

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

ITEC310 Computer Networks II

QoSpy an approach for QoS monitoring in DiffServ Networks.

R07. IV B.Tech. II Semester Regular Examinations, April, NETWORK MANAGEMENT SYSTEMS (Information Technology)

Configuring SNMP Cisco and/or its affiliates. All rights reserved. 1

Cisco Performance Visibility Manager 1.0.1

Subnetting and Network Management Omer F. Rana. Networks and Data Communications 1

Network Monitoring and Traffic CSTNET, CNIC

Lecture 12: Network Management Architecture

SNMP and Network Management

LIST OF FIGURES. Figure No. Caption Page No.

Introduction to Network Management

CoMPACT-Monitor: Change-of-Measure based Passive/Active Monitoring Weighted Active Sampling Scheme to Infer QoS

Monitoring and analyzing audio, video, and multimedia traffic on the network

Design of Hospital EMR Management System

How To Manage Network Performance

Java Based VoIP Performance Monitoring Tool

How To Understand Network Performance Monitoring And Performance Monitoring Tools

Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004

Network Monitoring with SNMP

TCP/IP, Addressing and Services

Top-Down Network Design

Cisco Performance Management: Best Practices White Pap

Have your JACE also monitor your Ethernet network

MANAGING NETWORK COMPONENTS USING SNMP

Network Monitoring with SNMP

"Charting the Course...

IP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview

Simulation Study on Internet Applications over DSL Access Network: KFUPM Campus as an Example

SNMP Basics BUPT/QMUL

Performance Evaluation of Routing Protocols for Video Conference over MPLS VPN Network

Faculty of Engineering Computer Engineering Department Islamic University of Gaza Network Chapter# 19 INTERNETWORK OPERATION

Network Traceability Technologies for Identifying Performance Degradation and Fault Locations for Dependable Networks

Cisco IOS Flexible NetFlow Technology

SolarWinds Certified Professional. Exam Preparation Guide

Active Management Services

(Refer Slide Time: 1:17-1:40 min)

Study of Network Performance Monitoring Tools-SNMP

Network Traffic Monitoring and Analysis

Network Instruments white paper

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

Monitoring Network QoS in a Dynamic Real-Time System 1

Network Monitoring and Management NetFlow Overview

TUTORIAL SNMP: STATUS AND APPLICATION FOR LAN/MAN MANAGEMENT. Aiko Pras

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

Analysis of Basic Quality of Service Mechanism for Voice over IP In Hamdard University Network Campus

Chapter 18. Network Management Basics

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

IP Addressing A Simplified Tutorial

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

NetFlow/IPFIX Various Thoughts

SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP)

Research on Errors of Utilized Bandwidth Measured by NetFlow

Appendix A Remote Network Monitoring

Avaya ExpertNet Lite Assessment Tool

Huawei esight Brief Product Brochure

A Model Design of Network Security for Private and Public Data Transmission

Internet Management and Measurements Measurements

Extending Network Visibility by Leveraging NetFlow and sflow Technologies

A Guide to Understanding SNMP

SBSCET, Firozpur (Punjab), India

Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph

QualNet 4.5 Network Emulation Interface Model Library

A Network Management Framework for Emerging Telecommunications Network.

Collaborative & Integrated Network & Systems Management: Management Using Grid Technologies

diversifeye Application Note

Lab VI Capturing and monitoring the network traffic

Internetworking and IP Address

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

Performance Management

RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

Network Management. Who's the boss? You or the network? net man - 1. Copyright 2000 Scott Bradner

A Brief. Introduction. of MG-SOFT s SNMP Network Management Products. Document Version 1.3, published in June, 2008

SNMP Informant. SNMP Informant, the default Microsoft SNMP extension agents and WMI January 2009

SNMP Simple Network Management Protocol

Sample Configuration Using the ip nat outside source static

Using SNMP for Remote Measurement and Automation

RSVP- A Fault Tolerant Mechanism in MPLS Networks

Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept

INTERNET OF THINGS 1

You can probably work with decimal. binary numbers needed by the. Working with binary numbers is time- consuming & error-prone.

Simple Network Management Protocol

TELE 301 Network Management

PART OF THE PICTURE: The TCP/IP Communications Architecture

Strategies. Addressing and Routing

Transcription:

IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Development of Monitoring Tools for Measuring Network Performances: A Passive Approach 1 Abdullah Al Mamun, 2 Sultan Anwar, 3 Hassan Ali 1,2,3 King Fahd University of Petroleum & Minerals, KSA Abstract Effective network management is becoming crucial to manage large amount of network data traffic with less resources. Network management is fulfilled by network monitoring which includes traffic monitoring which depends on throughput, utilization, error rate and many other performance metrics. There are several ways to calculate these metrics but we have used passive approach to calculate these performance metrics. We have developed a network monitoring tool by which network manager can visualize these metrics easily to take necessary decisions. Keywords Network traffic, SNMP, MiB, Throughput, Utilization I. Introduction Network Management is becoming the backbone of every organization, having large amount of data traffic with limited resources. So, effective traffic management is very important in providing QoS (Quality of Service) and efficient allocation of resources. Traffic management is a critical component of network management, especially for large-scale and complex organizations. There are various measurement metrics that can be used to monitor network performance such as availability of network over a certain period, packet delay, packet loss, response time, throughput, bandwidth and link utilization etc. For example, link utilization, one of the main performance metrics, helps Network Managers to maintain QoS by finding out how much of the link bandwidth is currently being utilized, and whether the link capacity is sufficient to meet the needs of customer quality standards or not. There are several ways to measure network performance [1]: A. Traffic Monitoring Network information is collected by monitoring packets that are moving between network devices. After the network packets have been captured, they must be decoded and analyzed to see what trends and/or problems exist on the network. B. Querying Network Devices This is a simple way to collect network data by querying network devices. This requires a network device to be a managed device that has an agent, which can be probed and provides required data. C. Generate Test Traffic This technique requires mathematical skills and the knowledge of network theory. Network performance is analyzed by generating test traffic which requires minimum of two devices, and is measured by "Packet Pair and Packet Train methods [2]. It is critical to manage the entire network efficiently due to large amount of data traffic and limited resources. For effective network management, Network Managers need to have knowledge of various network performance metrics. This will not only help them in performance evaluation of the network but also in rectification of different problems such as a link is down, a device is down, or any device that is generating low traffic which needs to be replaced. The results obtained from network metrics can be achieved by designing a simple tool. The objective is to design a network performance monitoring tool using SNMP that will collect information and statistics on a network from manageable devices. This information will be used to determine various performance metrics. The objectives of the project are: 1. Develop an appropriate method to poll agents and collect performance data using SNMP. 2. Use the collected data to obtain the required performance metrics. 3. Develop a suitable GUI to show the data in a user friendly statistical graph. II. Background and Terminology A. SNMP The main elements of SNMP-based traffic measurements are Management Agent (MA), Management workstation (MW), Management Information Base (MIB) and SNMP protocol. All Management Information objects are stored in MIB with fixed format. Every metric being managed can be referred to as one object and MIB is a structured set of these objects. The format of objects is defined by Structure of Management information (SMI) which gives a basic framework to define parameters of MIB and structures. MW and MA can configure and poll MIB to gain some useful objects. There are five service primitives that are defined to configure and poll the MIB. MIB II defined many Object Groups such as System, Interface, AT (Address Translation), IP, ICMP, TCP, UDP, SNMP and so on. SNMP is designed to be simple so it does not do any processing; it just saves some basic data to be delivered to a manager. Hence, the manager does the complex work and a meaningful statistics to preview the status of the network. SNMP consists of five simple commands, three of them from the manager to the agent and two from the agent to the manager. Fig. 1 illustrates SNMP commands. Following are the Interface Group Object IDs, which will be used to calculate performance monitoring metrics. ifoutoctets: The total number of octets transmitted out of the interface. ifinoctets: The total number of octets received on the interface. ifoutnucastpkts: The total number of packets that higherlevel protocols requested be transmitted to a non-unicast (i.e., a subnetwork- broadcast or sub-network-multicast) address including those that were discarded or not sent. iflnnucastpkts: The number of non-unicast (i.e., sub-network broadcast or sub-network multicast) packets delivered to a higher-layer protocol. ifoutucastpkts: The total number of packets that higher-level protocols requested be transmitted to a sub-network unicast address, including those that were discarded or not sent. iflnucastpkts: The number of sub-network unicast packets delivered to a higher- layer protocol. www.ijcst.com International Journal of Computer Science And Technology 81

IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fig. 1: SNMP Commands These OIDs obtained from the Interface group will be used to obtain the different metrics by doing mathematical computations. The computed metrics are as follows: 1. Response time: How long the packet takes to traverse the network. Packet delay time and packet loss can also be calculated through it. 2. Availability: The duration of time the networking component works. 3. Network utilization: It presents the percentage of time that the network is in use over a given period. 4. Network throughput: It represents the amount of network bandwidth available for a network application at any given moment. 5. Accuracy: It is a percentage that represents the success rate over all traffic rates. (The higher is better). III. Related work There are two approaches for network monitoring: A. Active measurement approach [3] Where test packets are sent into the network to measure network performance. Ping and trace route tools are considered to be under this approach. The active approach requires a good understanding of networking and mathematics to minimize test traffic and get accurate results at the same time [6]. B. Passive measurement approach [4] This method does not generate any traffic to the network; instead it uses devices to monitor traffic. SNMP, RMON, and NetFlow [5] are examples of such approach where these protocols are implemented inside devices and capture traffic to monitor the network. The passive approach measures real network traffic, so it does not generate additional test traffic on the network. However, the security issues arise here because all this information is stored in the network devices [6]. C. Combination of active and passive [7-8] This approach combines both active and passive monitoring using easy-to measure methods. It is based on measuring network performance using active-probe packets. It converts the network performance to actual performance experienced by user packets by weighing the performance with the number of user packets arriving near the probe packets that are measured passively. Therefore, it measures the users performance yet only requires simple active and passive monitoring, where the former only involves counting of the number of user packets. 82 International Journal of Computer Science And Technology Active approach is based on the test traffic means you have to generate your own traffic to calculate performance metrics that is why this approach has a big draw back that it gives you performance results based on test traffic generated by yourself not based on original user traffic which is passing inside the network. Combination approach uses both approaches but is difficult to implement and required high profile software and hardware to analyze results which increase complexity. In our project, we are going to use the passive approach that can estimate not only the average performance experienced by all users but also the actual performance for individual users, organizations, and applications. By using this approach we can get statistical data about the network where we cannot get it from SNMP variables like availability. And we will use the passive approach to evaluate other performance metrics like throughput, utilization, and so on. We then adapt the interval of getting statistics based on the user requirements while making sure that this interval is not greatly affecting the performance of the network. IV. Proposed Solution In this project, we are going to develop a network performance monitoring tool. It will collect statistical performance data from the network and stores it into a database. Then it will be displayed to the user in a graphical way. Availability and response time will be measured via the ping tool. Accuracy, error rate, and utilization will be calculated depending on data that are collected using SNMP. V. Prototype Architecture and design The manager has a MIB of all agents existing in the network. The Manager sends GetRequest and GetNextRequest messages to managed devices and in response receives the GetResponse messages with the values that were asked from the agents. The received values are stored in the management data base for performance evaluation and further calculations. The methodology and prototype architecture design is shown in fig. 2 where the performance monitoring tool is hosted and there are group of agents. Fig. 2: Prototype Design Architecture for Performance Monitoring Tool The tool that we have developed uses SNMPV1 collects data of interface group OIDs from MIB. First we have developed a virtual network using GNS3 in which we have used 1 router as an agent. We have successfully converted the agent (router) from non-manageable to manage-able. Our tool polls agent by sending GetRequest and GetNextRequest and then receives OID values with the help of GetResponse. These OIDs are used to calculate the performance metrics that will be described later on. Fig. 5 www.ijcst.com

ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) illustrates OIDs asked by the manager and delivered by agent. Here the OIDs of system group are shown Fig. 3: Message Sequence Between Manager and Agent Fig. 4 illustrates our prototype architecture to monitor real time TCP, IP and FTP traffic. PC2 is attached to internet and PC1 has manager to monitor the traffic. However PC1 is able to access internet through PC2. They both are attached to the router (agent) from which traffic has to pass. When PC1 and PC2 communicate with each other, meanwhile the manager implemented on PC1 can monitor traffic by getting data from agent and shows results. Fig. 4: Prototype Architecture to Monitor Real Time Traffic VI. Implementation The tool is implemented using following tools and language: Visual studio: An application development tool GNS3: A graphical network simulator which allows you to build virtual network topologies. C#: As programming language to develop the tool, from which GUI can be embedded easily. First of all we have built a virtual network topology by using GNS3 by installing various network elements images. Once the images are installed successfully, one can use network devices of his own choice. We built the network topology as shown in figure 4 to monitor real IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 time network traffic as well. We have used just one router just to analyze the traffic on small scale to implement the prototype architecture. The router which is an agent must be a managed router in order to get the desired OIDs form it. The Agent (router) is then attached to the PC1 in figure 4 through loopback adapter from one of its interface. The other interface of agent is attached to PC2. The PC1 has a manager to get and analyze the OIDs provided by agent. One side of PC2 is attached to the agent and other is attached to the internet. The topology is built in such a way that the PC1 can easily fetch the data from internet through PC2 and with the help of manager can analyze the traffic. The topology shown in fig. 4 is built so that the real time traffic between PC1 and PC2 can be monitored and analyzed easily. At the manager side the tools described above are used to fetch data from manageable agent. snmpsharpnet library is used in C# to establish the communication between manager and agent. Then with the help of GetRequests and GetNextRequests the OIDs of interface group are fetched. The OIDs of interface group illustrated in section II are fetched and stored into the local data base. These OIDs are used to calculate network performance metrics by doing some mathematical operations. The performance metrics which that can be calculated by using these OIDs are Availability, Response time, Error rate, Accuracy, Utilization, Throughput and Network Usage, Traffic rate by bytes, Traffic rate by packets and Loss are as follows [9-10]. As to develop the tool with limited time we consider just System description, Utilization and Throughput. Because GNS3 provides the virtual network attached directly to the PC so one can ignore other performance metrics like availability, error rate and accuracy etc. While these performance metrics can be calculated and visualized easily. Forms class is used in C# to embed GUI and to show utilization and throughput in graphs. The stored values of interface group object IDs are used to calculate utilization and throughput and then calculated values of utilization and throughput are used to build graphs using classes Google Chart Sharp and SharpGraphLib. With the help of these things our tool will be able to interact with the network and present statistics. To elaborate more the working of tool the software based sequence diagram is shown in fig. 5. The view page will provide the user with options to select the performance metrics and fill the time interval with the type of chart required. The results will be analyzed and the charts will be displayed to the user. VII. Functionality and Utilization The tool presented here provides the user with the ability to monitor network status by obtaining key performance metrics including system description, throughput and utilization. Any small organization or company that needs to monitor its network status and evaluate the performance of the network can use this tool. By utilizing such performance statistics manager will be able to make proactive decisions. VIII. Results Analysis The tool provides the user with graphs of Throughput and Utilization to be able to analyze the results. The utilization graph is given in % which shows that how much link is being utilized with respect to time. Similarly the throughput graph is given in bits/sec with respect to time. In the testing phase we analyzed the tool by providing low and high traffic separately. During low traffic the utilization and throughput were very low as shown in figures 5 and 6. www.ijcst.com International Journal of Computer Science And Technology 83

IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) Fig. 5: Utilization With Low Traffic Fig. 6: Throughput With Low Traffic on Access Spaces (ISAS), IEEE-ISAS, 2011. [4] S. Amarnath, A. Kumar, A New Technique for Link Utilization Estimation in Packet Data Networks using SNMP Variables, IEEE Global Telecommunications Conference, 1997. [5] CISCO. Introduction to Cisco IOS NetFlow - A Technical Overview. 2012. [6] Cottrell, L. Anderton. Passive vs. Active Monitoring. 2001. [7] K. Ishibashi, T. Kanazawa, M. Aida and H. Ishii, Active/ passive combination-type performance measurement method using changeof-measure framework, IEEE Global Telecommunications Conference, 2002. [8] M. Aida, N. Miyoshi and K. Ishibashi, A Scalable and Lightweight QoS Monitoring Technique Combining Passive and Active Approaches, Twenty-Second Annual Joint Conference of the IEEE Computer and Communications, 2003. [9] CISCO. Performance Management: Best Practices White Paper. s.l. : CISCO. [Online] Available: http:// www.cisco.com/c/en/us/support/docs/availability/highavailability/15115perfmgmt.html?referring_site=bodynav. [10] Gaogang Xie, Jianhua Yang, Junfeng Wan, Zhongcheng Li, A Methodology of Effective Measurement for Link Traffic, 2003. Fig. 7: Utilization With High Traffic Fig. 8: Throughput With High Traffic IX. Conclusion We have developed a network performance monitoring tool. It provides the user with ability to monitor network performance. It utilizes the libraries available in C# to collect statistics from SNMP devices, store this statistics in database. The application uses certain C# libraries and classes to provide users with graphical view of the network statistics. The tool is flexible by allowing user to specify time interval and choose which interface needed to show the statistics. References [1] [Online] Available: http://www.cisco.com/web/about/ac123/ ac147/archived_ issues/ipj_6-1/measuring_ip.html [2] Hitoshi Obara, Shouto Koseki, Pavel Selin, Packet Train Pair: A fast and efficient technique for measuring available bandwidth in the Internet, SICE Annual Conference 2012. [3] K. lgai, E. Oki, A simple link-utilization estimation scheme based on RTT measurement, 1st International Symposium 84 International Journal of Computer Science And Technology Abdullah Al Mamun received his B.S. degree in Computer Science & Engineering from Dhaka University of Engineering & Technology, Bangladesh, in 2012, the M.S. degree in Computer Engineering from King Minerals, in 2016 (possible date). He was a Part time Research Assistant, with Department of Renewable Energy, Research Institute, KUPM in 2015, 2016 respectively. His research interests include Bigdata Analysis and Machine Leering. At present, He is studying MS in Computer Engineering in KFUPM. Sultan Anwar received his B.S. degree in Computer Engineering from COMSATS Institute of Information Technology, Islamabad, Pakistan, in 2013 and continuing the M.S. degree in Computer Networks form King Minerals, Dhahran, Saudi Arabia. He was an assistant DCO in Pakistan Telecommunication Co. Limited. He is a research assistant with faculty of College of Computer Science and Engineering King Minerals, Dhahran, Saudi Arabia. His research interests include Wireless Sensor Networks, Network Security schemes, and Geographical Information Systems. At present, He is engaged in Pipeline leak detection techniques using wireless sensing nodes. www.ijcst.com

ISSN : 0976-8491 (Online) ISSN : 2229-4333 (Print) IJCST Vo l. 6, Is s u e 4, Oc t - De c 2015 Hassan Ali received his B.S. degree in Computer Engineering from COMSATS Institute of Information Technology, Islamabad, Pakistan, in 2013 and continuing the M.S. degree in Computer Networks form King Minerals, Dhahran, Saudi Arabia. He was in faculty of Electrical Engineering department in Govt. College of Technology, Lahore, Pakistan in 2014. His research interests include Distributed Systems, Heterogeneous communications and Real time publish subscribe Operating systems and software. At present, He is engaged in Smart Grid communication interoperability and its standards. www.ijcst.com International Journal of Computer Science And Technology 85