Open Source Tools for Monitoring MPLS Nodes
Total Page:16
File Type:pdf, Size:1020Kb
PROJECT REPORT Open Source Tools For Monitoring MPLS Nodes BHAVESH SHARMA 10412EN008 Mathematics and Computing PROJECT GUIDE Dr. N.P. DHAVALE Deputy General Manager Institute for Development and Research in Banking Technology, (Established By Reserve Bank of India) CERTIFICATE This is to certify that project report titled Open Source Networking Tools for monitoring the MPLS nodes submitted by Bhavesh Sharma, a 2nd year UG of Mathematics and Computing, MTech. Integrated from IIT BHU, is record of a bonafide work carried out by him under my guidance during the period 17th May 2012 to 20th July 2012 at Institute of Development and Research in Banking Technology, Hyderabad. The project work is a research study, which has been successfully completed as per the set objectives. In this project assigned to Mr. Bhavesh Sharma, he has done excellent work. We wish him all the best for the near endeavors. Dr. N.P. Dhavale DGM, Infinet office IDRBT,Hyderabad Institute for Development And Research in Banking Technology 1 ABSTRACT There are a large number of RBI locations and an even large number of member banks in India. As the number of member banks registered with the RBI is very high, the monitoring of the network would be very challenging. There is a high need to constantly monitor the network for slow or failing components and notify the network administrator in case of outages. A detailed study of free open source tools including zabbix, netdisco, opennms and many more is to be performed and the best tools is to be selected for final integration. Institute for Development And Research in Banking Technology 2 ACKNOWLEDGEMENT I would like to express my sincere gratitude to the Institute for Development and Research in Banking Technology (IDRBT) and particularly Dr.N.P. Dhavale,(DGM , INFINET and Services) who was my guide in this project. This opportunity of learning all about banking architecture and a SLA (Service level Agreement) system application of the country was a boon to me as one rarely gets such exposure. I would not hesitate to add that this short stint in IDRBT has added a different facet to my life as this is a unique organization being a combination of academics, research, technology, communication services, crucial applications, etc., and at the same time performing roles as an arm of regulation, spread of technology, facilitator for implementing technology in banking and non-banking systems, playing a role of an NGO (without being one) and many more varied activities. I am extremely grateful to Dr.N.P.Dhavale for his advice, innovative suggestions and supervision. I thank him for introducing me to an excellent banking application and giving me the opportunity to approach diverse sections of people starting from bankers to general public. I am thankful to the staff of INFINET department at IDRBT for helping me to get familiar with the application. They gave me a chance to study the application and its impact from different perspectives. I am thankful to my college, IIT BHU for giving me this golden opportunity to work in a high-end research institute like IDRBT. I am thankful for IDRBT for providing such an amazing platform for students to work in real application oriented research. Finally, I thank one and all who made this project successful either directly or indirectly. I am very thankful to Ms. Anuraddha Madam and Shri Shrihari Sir with whom I worked throughout my stint at IDRBT and the project was possible only with their cooperation. Bhavesh Sharma Project Trainee Department of INFINET IDRBT, Hyderabad Institute for Development And Research in Banking Technology 3 Contents: 1.0 INTRODUCTION……………………………………………………………………………………………………………………1 1.1 KNOWING THE NETWORK……………………………………………………………………………………….2 1.2 WHAT TO MONITOR AND WHY?.................................................................................3 1.3 WHAT TO LOOK IN A NETWORK MONITORING APPLICATION………………………………….4 1.4 IDRBT NETWORK……………………………………………………………………………………………………..5 1.5 MPLS……………………………………………………………………………………………………………………….5 1.6 IDRBT MPLS ARCHITECHTURE …………………………………………………………………………………6 1.7 THE PROBLEM………………………………………………………………………………………………………….7 1.8 THE APPROACH……………………………………………………………………………………………………….7 2.0 NETDISCO……………………………………………………………………………………………………………………………10 2.1 INSTALLATION………………………………………………………………………………………………………..10 2.2 SOME BASIC OPERATION FOR NETDISCO………………………………………………………………..14 3.0 FRAMEFLOW……………………………………………………………………………………………………………………….17 3.1 INSTALLATION………………………………………………………………………………………………………..17 3.2 USAGE…………………………………………………………………………………………………………………….17 4.0 OPENQRM…………………………………………………………………………………………………………………………..23 4.1 SYSTEM REQUIREMENTS………………………………………………………………………………………...23 4.2 INSTALLATION…………………………………………………………………………………………………………23 4.3 CONFIGURATION…………………………………………………………………………………………………….24 4.4 USAGE…………………………………………………………………………………………………………………....24 CONCLUSION………………………………………………………………………………………………………………………………31 FUTURE WORK……………………………………………………………………………………………………………………………32 APPENDICES………………………………………………………………………………………………………………………………..32 REFERENCES ……………………………………………………………………………………………………………………………...32 1.0 INTRODUCTION Networking as we see today has constantly evolved from merely just two computers connected through a wire to a broader platform of Internet which acclaims to connect one part of the world to the other. As a result modern computer networks tend to be large heterogeneous collections of computers, switches, routers and a large assortment of other devices. To a large degree, the growth of such networks is ad-hoc and based on the current and perceived future needs of the users. As networks get larger and faster, the job of monitoring and managing them gets more complex. However, the job of managing computer networks becomes increasingly more important as society becomes more dependent on computers and the Internet for everyday business tasks. Network downtime now costs significant amounts of money so it is important that network and system managers are aware of everything that is happening on the networks for which they are responsible. As a result a solitary network consultant monitoring network activity is required based on the Open Systems Interconnect (OSI) reference model proposed by International Telecommunications Union (ITU).This task is accomplished by using some form of tool to gather, analyze and represent information about a computer network therefore, in general, network monitoring involves a set of tools to aid people to monitor and maintain computer networks. With a resource this valuable, ensuring its availability is essential. It’s also challenging because of threats such as hackers, denial of service attacks, viruses, and information theft, all of which can lead to downtime, loss of data, and overall decreasing credibility and profitability. Additionally, the network is evolving drastically, with new technologies, devices, and strategies, such as virtualization and service-oriented architectures. That’s why network management is such an important function and capability for businesses of all sizes. If our business depends on our network, then network management is critical. Network management is a broad functional area incorporating device monitoring, application management, security, ongoing maintenance, service levels, troubleshooting, planning, and other tasks – ideally all coordinated and overseen by an experienced and reliable network administrator. Yet even the most knowledgeable and capable network administrator is only as good as the network information that is visible, and that he or she can manage and act on. Administrators need to know what’s happening on their networks at all times, including real- time and historical information on usage, performance, and status of every device, application, and all data on the network. This is the domain of network monitoring, the most critical function of network management. The only way to know if everything on our network is operating as it should is to monitor it continuously. Institute for Development And Research in Banking Technology 1 1.1 KNOWING THE NETWORK Today’s networks can be astounding in their complexity. Routers, switches, and hubs link the multitude of workstations to critical applications on myriad servers and to the Internet. In addition, there are numerous security and communications utilities and applications installed, including firewalls, virtual private networks (VPNs), and spam and virus filters. These technologies span all verticals and companies of all sizes. Network management, therefore, is not confined to only certain industries or solely to large, public companies. Understanding the composition and complexity of our network, and having the capacity to be informed of how all the individual elements are performing at any given time, is a key success factor in maintaining the performance and integrity of the network – and often of the business – as a whole. There are potentially thousands of data points to monitor on a network, and it is critical to be able to access meaningful, accurate, and current information at any given time. Network administrators need to feel confident that they know what’s happening on their network from end to end at any given point in time. It is critical to “know our network” at all times. A network is no longer a monolithic structure. It includes the Internet, local area networks (LANs) , wide area networks (WANs), virtual LANS (VLANS), wireless networks, and all of the devices, servers, and applications that run on them.