Visual Networking James Paul Regis University

Total Page:16

File Type:pdf, Size:1020Kb

Visual Networking James Paul Regis University Regis University ePublications at Regis University All Regis University Theses Spring 2010 Visual Networking James Paul Regis University Follow this and additional works at: https://epublications.regis.edu/theses Part of the Computer Sciences Commons Recommended Citation Paul, James, "Visual Networking" (2010). All Regis University Theses. 448. https://epublications.regis.edu/theses/448 This Thesis - Open Access is brought to you for free and open access by ePublications at Regis University. It has been accepted for inclusion in All Regis University Theses by an authorized administrator of ePublications at Regis University. For more information, please contact [email protected]. Regis University College for Professional Studies Graduate Programs Final Project/Thesis Disclaimer Use of the materials available in the Regis University Thesis Collection (“Collection”) is limited and restricted to those users who agree to comply with the following terms of use. Regis University reserves the right to deny access to the Collection to any person who violates these terms of use or who seeks to or does alter, avoid or supersede the functional conditions, restrictions and limitations of the Collection. The site may be used only for lawful purposes. The user is solely responsible for knowing and adhering to any and all applicable laws, rules, and regulations relating or pertaining to use of the Collection. All content in this Collection is owned by and subject to the exclusive control of Regis University and the authors of the materials. It is available only for research purposes and may not be used in violation of copyright laws or for unlawful purposes. The materials may not be downloaded in whole or in part without permission of the copyright holder or as otherwise authorized in the “fair use” standards of the U.S. copyright laws and regulations. VISUAL NETWORKING A PROJECT SUBMITTED ON 16 APRIL, 2010 TO THE DEPARTMENT OF INFORMATION TECHNOLOGY OF THE SCHOOL OF COMPUTER & INFORMATION SCIENCES OF REGIS UNIVERSITY IN PARTIAL FULFILLMENT OF THE REQUIREMENTS OF MASTER OF SCIENCE IN SYSTEMS ENGINEERING BY JAMES PAUL APPROVALS Erik Moore Daniel Likarish Douglas I. Hart VISUAL NETWORKING Page 2 of 109 Abstract This research presents a case study of the Regis Academic Research Network (ARNe). It will focus on network bandwidth graphs and the information collected over a six month period of time. The case study will provide comparison of network bandwidth graphs. This case study will be used to theorize what is happening on the ARNE. In addition it will be used for creating hypotheses on what will happen to the network in the future. The research will also include a project. The project is to provide the setup and planning of the installation of open source tool set. This project will give Regis network administrators a useful tool in troubleshooting and planning with regards to the ARNE. VISUAL NETWORKING Page 3 of 109 Acknowledgements I would like to thank my teachers, classmates and family for their knowledge and support while pursuing this project. I would also like to thank the all the in the open source software community for providing robust free enterprise tools to customize, create and implement however needed. Lastly, I would like to thank Steven Huart a Doctor in an unrelated field for providing an unbiased critique of the project and its components. VISUAL NETWORKING Page 4 of 109 Table of Contents Abstract ........................................................................................................................................... 2 Acknowledgements ......................................................................................................................... 3 Table of Contents ............................................................................................................................ 4 List of Figures ................................................................................................................................. 5 List of Tables ................................................................................................................................... 6 Chapter 1 - Introduction .................................................................................................................. 7 Thesis Statement ......................................................................................................................... 7 Statement of Technical Problem ................................................................................................. 7 Project Relevance ........................................................................................................................ 8 What to Expect ............................................................................................................................ 9 Chapter 2 - Review of Literature and Research .............................................................................. 9 Terms and Definitions ................................................................................................................. 9 Computer ................................................................................................................................ 9 Software ................................................................................................................................ 11 Network ................................................................................................................................ 21 SNMP ................................................................................................................................... 23 MIB ....................................................................................................................................... 24 OID ....................................................................................................................................... 25 Community String ................................................................................................................ 29 Chapter 3 - Methodology............................................................................................................... 29 Chapter 4 - Results ........................................................................................................................ 38 Data Analysis ............................................................................................................................ 38 Time and Accuracy ............................................................................................................... 39 Planning and Implementing .................................................................................................. 42 Troubleshooting .................................................................................................................... 45 Chapter 5 – Project History ........................................................................................................... 60 Implementation ......................................................................................................................... 60 OS ......................................................................................................................................... 61 Packages ............................................................................................................................... 62 NTP ....................................................................................................................................... 66 Cacti ...................................................................................................................................... 67 Cacti Plugin Architecture ..................................................................................................... 69 Plugins .................................................................................................................................. 69 SSL ....................................................................................................................................... 71 Login Page ............................................................................................................................ 73 Access ................................................................................................................................... 74 Network ................................................................................................................................ 75 Cacti Setup ................................................................................................................................ 75 Chapter 6 - Conclusions ................................................................................................................ 83 References ..................................................................................................................................... 85 Appendix A ................................................................................................................................... 90 Appendix B.................................................................................................................................... 90 Appendix C.................................................................................................................................... 90 Appendix D ................................................................................................................................
Recommended publications
  • The Open-‐Source Monitoring Landscape
    The Open-Source Monitoring Landscape Michael Merideth Sr. Director of IT, VictorOps [email protected], @vo_mike My History and Background • Working in IT since the mid 90’s • Mostly at startups in the Colorado Front Range area • Along for the ride during the “dot com boom” • Build my career using open-source tools Since the 90’s now, there’s been a sharp division in tools and methodology between the enterprise space and the startup and small business communi;es. Obviously, smaller businesses, especially in the tech sector, were early and eager adopters of open- source technology, and much quicker to learn to rely on open-source tool chains in business-cri;cal applica;ons. Up at the enterprise level, at the public companies, they’re only now fully-embracing Linux as a business-cri;cal tool, and I think that’s largely because “the enterprise” is star;ng to be defined by companies that either came up in the dot com era, like Google, or built the dot com era, like Sun, or Dell, or let’s say RedHat. So, the “enterprise” had their toolchain, built on commercial solu;ons like HPUX and OpenView and so on, and the startup community, the “dot com” community had a completely different toolchain, based on Linux, based on open standards and protocols, built with open-source components like GNU, and Apache, and ISC Bind and so on. I’m lucky enough that I’ve been able to spend my career in the startup sphere, working with that open-source toolchain. I started working in IT in the mid 90’s in the Colorado front range, and I’ve spent my ;me since then working for and consul;ng at early-stage startups and other “non enterprise” shops.
    [Show full text]
  • The Nedi Guide for More Information)
    Introduction NeDi discovers your network devices and tracks connected end-nodes. It contains many additional features for managing enterprise networks: Intelligent topology awareness MAC address mapping/tracking Traffic, error, discard and broadcast graphing with threshold based alerting Uptime, BGP peer and interface status monitoring Correlate syslog messages and traps with discovery events Network maps for documentation and monitoring dashboards Detecti rouge access points and find missing devices Extensive reporting ranging from devices, modules, interfaces all the way to assets and nodes NeDi's modular architecture allows for simple integration with other tools. For example Cacti graphs can be created, based on discovered information. Due to NeDi's versatility things like printer resources can be monitored as well... Published on Sat Oct 14 13:45:05 2017 2 Installation Instructions NeDi's website provides all necessary information for a successful installation. The generic procedure with some links to external documentation: http://www.nedi.ch/installation OS Specific information: http://www.nedi.ch/installation/freebsd http://www.nedi.ch/installation/os-x http://www.nedi.ch/installation/suse-installation NeDi Appliance There's a free OpenBSD based appliance called NeDiO14 available on the Download page. It will be succeeded by a Debian based OVA called NeDian17. Partner Solutions NeDi is integrated in commercially supported solutions as well. Have a look at the partners on NeDi's Download page to get more information. 3 General
    [Show full text]
  • Killer Open Source Monitoring Tools Page 1 of 6
    Killer open source monitoring tools Page 1 of 6 Published on InfoWorld (http://www.infoworld.com) Home > Test Center > Networking > Killer open source monitoring tools > Killer open source monitoring tools Killer open source monitoring tools By Paul Venezia Created 2008-11-24 04:00AM In the real estate world, the mantra is location, location, location. In the network and server administration world, the mantra is visibility, visibility, visibility. If you don't know what your network and servers are doing at every second of the day, you're flying blind. Sooner or later, you're going to meet with disaster. Fortunately, there are a plethora of good tools, both commercial and open source that can shine much- needed light into your environment. Because good and free always beats good and costly, I've compiled a list of my favorite open source tools that prove their worth day in and day out in networks of any size. From network and server monitoring to trending, graphing, and even switch and router configuration backups, these utilities will see you through. [ Need a Linux that can boot from a pen drive, run in a sliver of RAM, rejuvenate an old system, or rescue data from a dead PC? See "Specialty Linuxes to the rescue [1]." Read about the very best open source software products in InfoWorld's Best of Open Source Software Awards 2008 [2]. ] Cacti (www.cacti.net [3]) First, there was MRTG. Back in the heady days of the 1990s, Tobi Oetiker saw fit to write a simple graphing tool built on a round-robin database scheme that was perfectly suited to displaying router throughput.
    [Show full text]