.

Friday, March 29, 2019

Wide Area Networks, Observer Management and Monitoring Tools

immense or sliceal cavity Networks, observer Management and Monitoring ToolsAbstractIn this comprehend the concepts of antithetical interlocking management principles will be explored with a view to demonstrating how beholder manages wide-cut bailiwick nets. The everywherecompensate will explore the issues with ghastly and how beholder overcomes these puzzles.Introduction colossal region mesh big topologys ar becoming off the beaten track(predicate) to a greater extent complex and far wider spread than ever before, this of course leads to some outstanding problems for the entanglement passenger cars of these large scale intercommunicates. Most of these electronic net profits ar huge in size and screwing considerably encompass an entire city, whereas most of them atomic number 18 transcontinental. This poses the stolon of many problems for a mesh topology handler, they may non be in the same continent as a large parity of their network. This makes t he single-valued function of network management softw be inherent, such as observer. victimisation network management softw atomic number 18 means the network manager would not hold in to leave their desk to find any fault in the network whether it was in the next room or half way crosswise the globe.Literary ReviewThe most useful literary text the write found was from the new owners of observer, the softw ar used in this report. The new owners ViaviSolutions oblige published a white paper on using perceiver Analyser, their latest version of the observer suite as a auspices as welll. (anon, 2014)The journal by Liu et al. (2014) provided a lot of insight into where wide area networks are going, and their optimisation. It contains interesting formulae for network optimisation using the Gauss-Newton method of non statementar least squares. This princip solelyy agrees with the first text in this review round the nature and make up of a wide area network.Ahmed Boutaba, (2014) goes on to agree in part with the rest of the journals nearly the nature of a grim only goes on to discuss the fact that traditional figurelers corporation cause bottle necks in the network and that opting for SDN (Software Defined Network) allows for a straightaway network and a elevateder level of feel overall.Ahmedi Mitrevski, (2014) looks at perhaps the only real area of dis savvy with regards to WANs and that is how much they follow. The relative damage of implementing and the monthly upkeep of a network seems to be the only area where professionals disagree about these networks.Anon (2008). This seminar adumbrate the principles of network management that are considered as industry standard.Cahn, (1998). This journal looks at the design of WANs and their benefits, and this similarly agrees with the principles out creesed in the previous articles mentioned, including the ambiguous nature of the costing of a network. It out greenbacks in that location are only th ree important numbers when considering a WAN, these are the cost, either monthly up keep, total restrict up cost or a mixture of both, the reliability and the response ms, and goes on to study these are all directly proportional to each another(prenominal), as in if you reduce the heart of money spent the response time goes up which brings the reliability down.Dian Septama et al., (2015). In this journal there is lots of selective information regarding providing a high quality of service, one of the primary(prenominal) areas a network manager faces the biggest struggles and base cause the biggest issues aside from gage.Feng et al.,( 2014) this journal explores the real world application of a WAN and covers the issues in using traditional methods against new technologies which are opting for more automation and utilising programs and algorithms to manage the trivial day-to-day foot race of a network which frees up the clement element to focus their time on more important tasks.Geer,( 2013)this journal focuses more on the security and live state of the earnings, but in essence the internet is just a very large WAN and so its management and security are relevant here(Langer et al., 2010) this journal uses the example of a healthcare giving medication utilising the fast and secure delivery methods of a WAN to transport orphic patient files and details across the WAN to remote geographical locations, the main example used is radiology images. These are now digital images and are large in size due to the resolutions required to accurately use them for medical diagnosis.Malhotra et al., (2011) this journal replicates closely the test that was carried out by the reason of this report, the main differences are this journal samples with a LAN and uses OPNET to generate the usage.shinbone et al., (2007) this journal agrees with Ahmed Boutaba, (2014) and Feng et al.,( 2014) in so much as they state that a network should be superintended and managed by an algorithm based on the existing SNMP framework.Tiropanis et al., (2015)this journal explores the development of networks and their respective skills and how these countenance evolved, specifically into internet science and web science. And how each of these areas are evolving in their own areas and how each of them has an intrusion on the others.Travostino et al., (2006) this journal out hounds another real world application of WANs for the scattering of virtual forms and how they tummy be utilised to compute large tasks order the network instead of only using local resources.Wang et al., (2014) this journal documents an experiment into the future of how security of a WAN could be implemented. It outlays an idea of direct the authentication key across the network securely but not via mathematical encoding to deter eavesdroppers but by quantum physics. The system uses high frequency lasers beamed down fibre optic cables which are encoded by the lighter and then decoded by a receiver, the encryption is encoded into the specific frequency of the lasers architecture and photon length. Each transmitter and receiver contain sophisticated monitoring circuitry which monitor the incoming dealings and actively s suffer for Trojan horse photons from the channel.Observer and wide area networksFor the purposes of this report the author created a mistaken WAN to utilise the software Observer to implement network management. The network off-key three terminals situated in three cities around the world. The console was simulated as being in London, one was in Paris and the other was in New York name 1 Showing simulate geographic Location of Console (Circled) image 2 Showing Simulated geographical Location of Second PC (Circled) fig 3 Showing Simulated Geographical Location of Third PC (Circled)Once the author had set up the WAN they opened Observer on each of the machines machine-accessible to the virtual WAN. The machine simulated as London was selected as the machine to be the console for the purpose of managing the network and so was configured to collate the entropy generated by the network. The other two machines utilised the inbuilt profession generation tool in Observer. Although the software produces trading this is of a cosmic microwave background style and so the data received is pellucidly simulated but for the purpose of this report this is acceptable. The affair generator in Observer comes with a plethora of options. The default option sends a small group of piece of lands by means of on a broadcast channel (ffffffffffff) the author altered this displace to generate the twitch talkers and pair intercellular substance graphs as on a broadcast channel all the employment appeared to be generating and received by the switchs MAC address which wasnt the case. The size of the share and the transmission length were overly altered to give a larger test sample. The author also tried to generate random job which is one of the options but this seemed to have no effect on the trade generated as it was constant bit rate style simulation duty. image 4 observer running on first PC (Simulated location Paris)Fig 5 Observer running on third PC (simulated location New York)Fig 6 Traffic Generation on second PC (Paris)Fig 7 Traffic Generation on third PC (New York)On the console PC observer was running several of its functonal windows, first of which was the top talkers windows. This window is utilised to identify the staations on the network with the highest traffic volumes. This is in particular usefull from a management perspective as to monitor the spirit of the network in order to maintain smooth operation, and identify potential security threats. (Anon, 2016) the top talkers concealing provides a huge amount of information about the different stations attached to the network, including the amount of traffic generated and received by the node in both packets and bytes, its MAC address, its IP address . From this screen the network manager can monitor all the nodes on the network and diagnose issues as they happen. If a node suddenly starts generating large amounts of traffic for no apparent reason the network manager can have observer set up an alert and even have it send a SMS message or email reporting the issue. This ensures the network manager can stay on top of all aspects of the network unheeding of time or location. If any issues arise the network manager can deploy a resource from the technical team to resolve the problem swiftly so as not to impact upon the quality of service.Fig 8 Observer Top Talkers window with Paris PC selectedFig 9 Observer Top Talkers window with New York PC selected spirit at at the top talkers window identifies that the two Traffic generating PCs were indeed the ones with the heaviest traffic flow, followed by the swiches and hub that connected them all together. A network manager looking at this screen can monitor all machines connect ed to the network regardless of geographical location, even wireless connections are shown and can be monitored. (Liu et al., 2014)Another window on the console pc is the opposite matrix screen. With this tool the network manage can monitor the pathways the network traffic is taking on the network. by means of this analysis the network manager can optimise the network through routing manipulation. If a particular router is getting the brunt of the network traffic a second router can be installed to share the traffic burden and reduce the consumption of the initial router and theoretically improve the quality of service. (Anon, 2016), (Anon, 2008)Fig 10 the Pair Matrix window showing traffic from the Paris PC the the New York pc and then to conslolePCFig 11 Paris and New York PCs traffic going straight to Consloe PCThe last-place tool used by the author is the packet drive window. The first attempts at packet capture by the author demonstrated the sine qua non for checking the settings thouroughly as the devotee for capture was very small and so the captured line on the graph was tiny to start with untill this was increased by the author. later increasing the buffer size the graphs look much better and the data far more usable. by and by increaseing the buffer hugely the traffic was restarted and the capture began again. The packet capture showed the traffic being generated as it monitors all traffic on the network, but will only capture a certain amount for analysis.Fig 12 Packet Capture window showing the current traffic on the network (yellow line shows packets captured, blue line is total packets on network)Fig 13 Packet cature after buffer increasedFig 14 Dialogue box from Observer dilate total packets and ability to save the range for later referenceThrough the packet capture the network manager can observe the networks personality again to monitor for threats and general maintenance of the network. (Anon, 2016)ResultsAfter running the experime nt the data collected showed exactly how powerful the observer tool can be, although there was only three machines the scope of observers abilities is evident and can easily be imagined for a network of three thousand machines. The interface can be de-cluttered to show only relevant information so the network manager wouldnt get bogged down with an information overload.Looking at the paired matrix graphs there are several lines on the screen all of which are communiqus between nodes on the network, not all of these are PCs most of them are routers and switches along which the WAN is established. The thickness of each line denotes the amount of traffic it has dealt with. These lines show both incoming and outgoing traffic and the lines connect the source to its destination address. The marks are acombination of the appoint name, normally the name assigned in the NIC and its MAC address EG. Broadcom5A7C09 the label for the console PC.As shown in fig 11 the packets do not have to be routed to or even through the console PC for Observer to pick the packets up and display them.The data collected from the packet capture can be used to manually calculate the manipulation of the network, although this can also be worked out by Observer automatically. The packet capture screen is in a graph format with time across the bottom and the amount of packets per second up the side. There are three coloured lines on the graph blue which denotes the total packets on the network, yellow which are the packets captured by Observer and red which denotes the amount of dropped packets. In the data captured there were no dropped packets, and a peak of approximately cholecalciferol packets per second. This flow rate lasts for five minutes with no dropped packets, showing the networks utilisation was within acceptable ranges. if there had been dropped packets it would show that the network was working too hard and there for would mean it had a high utilisation and would displace the network manager to address the utilisation, and to optimise the efficiency of the network.Looking at the top talkers table in fig 9, in this data it is evident which nodes on the network receive the most and also which transmit the most. This information is highly important to the network manager as these are essential to the security and effective maintenance of the network. For example if there was an employee using the companys network to watch movies on their workstation the network manager would see within Observer a radical pitch to the stoichiometry of the network and its personality would change. Once this change had been brought to the network managers attention they could look on Observer at the top talkers and paired matrix charts and identify which terminal was using an abnormal amount of the networks bandwidth and then take action against the offending party in line with the companys IT policy.ConclusionThis report has looked at the management techniques used in apply ing wide area networks, their future, their application in the real world and their design and deployment, it is the purview of the author that the general consensus is that the IT community seem to be in agreement about most concepts of wide area networks, apart from the cost of them, and how to control them. Although the majority of newer reports (Shin et al., 2007), (Ahmed Boutaba, 2014), and (Feng et al., 2014) are swayed towards having the majority of the control handed over to algorithms and ontogenesis programs, there is also still call for there to be a human element to be involved in the management process. After looking through the papers used in the research for this report it is the opinion of the author that the application of a well managed WAN is far more beneficial than any other communication option, considering the internet is in reality just a huge WAN its self, a WAN can run everything in a business or donnish environment, from physical security like door loc ks and fire alarms through to phones (Dian Septama et al., 2015) and lighting, there are even applications to control environmental conditions. With the introduction of automatize network managers, the buildings air conditioning could be being controlled by a calculating machine thousands of miles away.With the development of encrypted laser communications utilised in QKD making networks about altogether secure the control of more sensitive systems may communicate under the control of larger WANs and possibly a large central, globose WAN to control all the mundane systems around the globe.To conclude this report the author believes in view of the huge advances in using automated network management options and the amount of non communications based areas controlled by nodes on the network, coupled with the advancements made in artificial intelligence the fictitious character of the human network manager could become extinct as we know it. The role could progress to either bein g an overseer of the AI or completely redundant altogether.BibliographyAhmed, R. Boutaba, R. (2014) Design considerations for managing wide area software defined networks. IEEE Commun. Mag., 52 (7), pp.116-123.Ahmedi, B. Mitrevski, P. (2014) On The Development of Methodology for Planning and Cost-Modeling of A Wide arena Network. IJCNC, 6 (3), pp.71-90.Anon (2008) 10th IEEE/IFIP Network Operations and Management Symposium (NOMS2008). IEICE communications Society Magazine, 2008 (7), pp.7_12-7_15.Anon (2014) USING A NETWORK ANALYZER AS A SECURITY TOOL. 1st ed. Minnetonka. Available from Accessed 17 December 2015.Cahn, R. (1998) Wide area network design. San Francisco, Calif., Morgan Kaufmann.Dian Septama, H., Ulvan, A., Hlavacek, J. Bestak, R. (2015) High Available VoIP Server Failover Mechanism in Wide Area Network. TELKOMNIKA (Telecommunication Computing Electronics and Control), 13 (2), p.739.Feng, Y., Cui, D., Li, Y., Zhang, J. Li, J. (2014) Contrasting Meteorological Wide-A rea Networks and evolutionary Programming. AMM, 687-691, pp.2557-2560.Geer, D. (2013) Resolved. Communications of the ACM, 56 (6), p.48.Langer, S., French, T. Segovis, C. (2010) TCP/IP Optimization over Wide Area Networks Implications for Teleradiology. Journal of Digital Imaging, 24 (2), pp.314-321.Liu, L., Ling, Q. Han, Z. (2014) Decentralized Gauss-Newton method for nonlinear least squares on wide area network. IOP Conf. Ser. Mater. Sci. Eng., 67, p.012021.Malhotra, R., Gupta, V. K. Bansal, R. (2011) Simulation and Performance psychoanalysis of Wired and Wireless Computer Networks. International Journal of Computer Applications, 14 (7), pp.11-17.Shin, K., Jung, J., Cheon, J. Choi, S. (2007) Real-time network monitoring scheme based on SNMP for moral force information. Journal of Network and Computer Applications, 30 (1), pp.331-353.Tiropanis, T., Hall, W., Crowcroft, J., Contractor, N. Tassiulas, L. (2015) Network science, web science, and internet science. Communications o f the ACM, 58 (8), pp.76-82.Travostino, F., Daspit, P., Gommans, L., Jog, C., de Laat, C., Mambretti, J., Monga, I., van Oudenaarde, B., Raghunath, S. Yonghui Wang, P. (2006) Seamless live migration of virtual machines over the MAN/WAN. Future Generation Computer Systems, 22 (8), pp.901-907.Wang, S., Chen, W., Yin, Z., Li, H., He, D., Li, Y., Zhou, Z., Song, X., Li, F., Wang, D., Chen, H., Han, Y., Huang, J., Guo, J., Hao, P., Li, M., Zhang, C., Liu, D., Liang, W., Miao, C., Wu, P., Guo, G. Han, Z. (2014) Field and long-run demonstration of a wide area quantum key distribution network. Opt. Express, 22 (18), p.21739.

No comments:

Post a Comment