Design and Implementation of Network Monitoring System
Design and Implementation of Network Monitoring System
Design and Implementation of Network Monitoring System
CHAPTER ONE
Abstract.
Large organizations always require fast and efficient network monitoring system which
reports to the network administrator as soon as a network problem arises. This paper
presents an effective and automatic network monitoring system that continuously
monitor all the network switches and inform the administrator by email or sms when
any of the network switch goes down.
This system also point out problem location in the network topology and its effect on
the rest of the network. Such network monitoring system uses smart interaction of
Request Tracker (RT) and Nagios software’s in linux environment. The network
topology is built in Nagios which continuously monitor all of the network nodes based
on the services defined for them. Nagios generates a notification as soon as a network
node goes down and sends it to the RT software.
This notification will generate a ticket in RT database with problematic node information
and its effect on the rest of the network. The RT software is configured to send the
ticket by email and sms to the network administrator as soon as it is created. If the
administrator is busy at the moment and does not resolve the ticket within an hour, the
same ticket is automatically sent to the second network responsible person depending
upon the priority defined. Thus, all persons in the priority list are informed one by one
until the ticket is resolved.
INTRODUCTION
Network monitoring takes note of slow or failing systems and notifies the network
administrator of such occurrences. Such notifications can take the form of email
massage, page alerts, or plain old phone calls. No matter what form they take, network
problem massage should take the highest priority. Network monitoring should be
running while other systems are performing their functions that is vital. As computer
networks grow in size, both physically and geographically day by day, more scalable
solutions for network administration are becoming necessary to monitor bandwidth
usage, report and resolve network failures and analyzing user activity. The proper
solution may support system administrators to make decisions for their future
expansions, preventing system failures and maintaining efficient internet band width.
1.1 BACKGROUND OF THE STUDY
It is very typical in every industry that as its client base continuous to grow, the industry faces increased
number of problems. In network monitoring aspect the problem may include:
The main objective of the research is to design and implement a computer network monitoring system
using Federal Polytechnic Nekede Owerri network as a case study. This project also entails the reason
and the maintenance of the effectiveness of the system when compared with
any other way of monitoring network. Another objective is to introduce computer in the area of
monitoring network.
Monitoring a network is very important in computer network firm . It will help to know the status of
network they provide in a particular area and arise for rescue when the need arises. The uses of network
monitoring system also expose any act of intruding from external body and even internal. And also help
to give report concerning the network if the industry is moving forward, backward or stagnant in the
area of providing network for the client.
The aim of this research work is to design and implement a network communication monitoring system.
The scope helps focus on the area picked and make the research effective.
There were certain constraints encountered while the research this project was being carried out. Listed
below are some of the prominent ones. They are:
Financial Constraints: Limited source of funds for the researcher to embark upon grater level of
research that has to do with visiting different establishment that operate on network communication
monitoring system, traveling from one school to another, library, vendors etc. to another to obtain fact
and collection of data.
Time: Time needed to travel outside the school environment to other places (distance places in
particular) in search for the required data was limited; this also led to the choice of Federal Polytechnic
Owerri as a case study.
Nevertheless, as there were hindrances and limitations arising from different quarters, the researcher
was able to gather all the necessary information required for the completion of this project.
1.7 DEFINITION OF TERMS
MONITORING SYSTEM: - A set of device that observes and records selected activities within a data
processing system for analysis or the set of function is required to initiate the transmission of a token on
the ring and provide soft- error recovery in case of lost tokens, circulating frames or other difficulties.
SOFTWARE: - All or part of the program, procedure, rules, and associated documentation of
processing system. Software is an intellectual creation that is independent of the medium on which it is
recorded.
HACKING: - The act of a computer enthusiast who uses his or her knowledge and means to gain
unauthorized access to protect resources.
COMPUTER: - A device or system that is capable of carrying out a sequence of operations in
distinctly and explicitly defined manner. The operations are frequently numerical computations or data
manipulations but also include input/output; the operations with the sequence may depend on
particular data values. The definition of the sequence is called the program. Also it may consist of
several interconnected units.