You are on page 1of 34






Submitted to







I, Mr. Santosh Kolte hereby declare that this project is the record of authentic work
carried out by me during the academic year 2016-17 and has not been submitted to any
other University or Institute towards the award of any degree.

Santosh Kolte


In two years course in Masters In Business Administration (MBA), Summer Internship

is a part of it which provides practical exposure about the real life working environment.
So it is an important and challenging part of two years course curriculum.
My project work is supported by unparalleled help & guidance from respected persons
with whom I have been acquainted with in the course of the project. I feel extremely
satisfied to be able to acknowledge their help & support in completion of my project
work. I express my gratitude & thanks to Prof. Sandeep Rathod my project guide whose
inspiring suggestions & guidance made it possible for me to go on with the project & had
a great influence on my thinking I owe a considerable debt of gratitude to Prof.
(Dr). Satish Ubale the director of Matrix School of Management Studies for helping to
get my Academic Career started.
It has been a great pleasure & an enriching experience working with Netcheck Solutions
India Pvt.. I wish to accord my gratitude to each & every person of the Company.
Especially Mr. Ranjit Shedge for giving me valuable advice and guidance and sparing
valuable time in clarifying various points raised by me.
Before concluding I must convey regards & heartiest gratitude to my family & friends
who have expended their unbelievable co-operation directly or indirectly in helping me to
complete this project.



The project has been undertaken to understand the Network infrastructure Monitoring
Management & Control System which is very important in todays globalized
environment to get fast and valuable outputs within time to achieve the goal of the
Now days in any Company or in organization every system is connected to the outside
world with the help of network. When computer connects to the network many risk
factors come in as well as people misuses their systems to do things other than the work,
so we need to have strong Monitoring, Control and management systems to avoid such
issues and protect the network from unauthorized use. There are many tools available into
the market to keep control on the Network which are studied in this project.
The research project started with an exploratory research done during the first few weeks
of the internship. Where the criteria employed by Engineers in the choice of a
Networking tools were explored. Later primary research was conducted in three weeks
that helped analyzed the areas of improvement required for the organization. It gave an
understanding what was required for the organization to improve the efficiency of
network management and performance.
The major areas for improvement included the quality and quantity of the Service served,
the promotion required to draw attention of the targeted segmentation and the training
required of the Engineers who directly deal with the customers in terms of service. These
findings are supported by the data collected through the questionnaire.

Chapter 1
1.1 What does Computer Networking mean?
Computer networking is an engineering discipline that aims to study and analyze the
communication process among various computing devices or computer systems that are
linked, or networked, together to exchange information and share resources.









implementation of fields like computer engineering, computer sciences, information

technology and telecommunication.
The increasing scope of communication has led to much advancement in the networking
field and in its relative industries like hardware, software manufacturing and integration.
As a result, most households have access to one or more networks. There are three broad
network types:

Local Area Network (LAN): Used to serve a small number of people located in a
small geographical space. Peer-to-peer or client server networking methods can be

Wide Area Network (WAN): Formed to connect a computer with its peripheral
resources across a large geographical area.

Metropolitan Area Network(MAN):A Metropolitan Area Network is basically a

bigger version of LAN and normally uses similar technology. It might cover a
group of nearby corporate offices or it can be in a city. It can be private or public.

1.2 Network monitoring

Networks have evolved from being a flat network where there were only a handful of
elements. Everything was connected to a more complex design where there are a lot more
technologies, such as cloud, wireless, remote users, VPN, IoT, mobile devices, and so on.
In spite of all the evolution that has occurred, one factor that has been constant is the need
for network monitoring. Monitoring allows network admins to know what is going on
in their network, be it with their WAN, LAN, VoIP, MPLS, and other connections or
the state of various network elements or nodes such as the access, distribution and
core switches, routers, firewalls, servers, client systems and so on.
Before you begin with network monitoring, it is necessary to understand networking in
general, as well as essentials about Windows systems which is the major OS used in
enterprises worldwide. Knowledge about the essentials of networking and the elements
that make up a computer network helps with better network management and monitoring.
General Networking:
A network is a collection of devices that are connected and can communicate with one
another over a common transport or communication protocol. Here communication can
refer to the transfer of data among users or instructions between nodes in the network,
such as computers, mobile devices, output devices, management elements, servers,
routing and switching devices, etc.
Networks can be categorized based on the geo area they span as LAN, WAN, or Internet.
Further, the design or topology of a network too can differ based on user and
organizational requirements, such as star, ring, bus, mesh, etc.
Whatever be the design or the topology, every network follows a reference design as
described in the OSI model for data transmission and communication. Open System

Interconnection (OSI) is a reference model for a network and describes how information
from an application installed on a device or system moves through various nodes in the
network to another device within the same network or to an external network. There are
many components that make a network and enables communication between various
nodes, such as network addresses, data transport & communication protocols, and
methods used for transfer of packets between nodes within the same network or different
networks. Below are some of the basic components that are part of every computer
network and these also are the vectors that form the essentials of network monitoring.

IPaddress and subnetting:

An IP address is the reference label assigned to each node in a network and is used by
other nodes for location and communication. Further, IP addresses are binary numbers,
but are stored in human readable format, either as an IPv4 address or IPv6 address.
The elements with an IP address that make up a network can be divided into different sub
networks based on the device type, location, access, etc. The devices in the same subnet
all have a common network prefix defined in its IP address.
Switching and Routing:
Switching refers to the process in which data is divided into smaller packets before they
are sent and transported over the network.
Routing is the act of finding a path for the packets that form data to traverse from a
source node in one network to a destination node in a different network.




Each element in a network, in addition to an IP address, can also have a reference name.
This allows a user to communicate with a resource using an easy to remember
alphabetical name rather than a difficult to remember IP address. DNS maps the name of
a resource to its physical IP address or translates a physical IP address to a name.






DHCP is a network protocol that allows a management server (DHCP server) to

dynamically assign an IP address to the resources in its network. Without DHCP, network
admins would have to assign IP addresses for each host in their network manually,
making management of IP addresses difficult.
General Windows Monitoring elements:
Enterprises use various business applications that are installed on servers within the
enterprise network or datacenter to provide services to hosts within the organization.
There are also additional network and user management such as the DNS, Active
Directory, DHCP, etc., that are provided from servers. Additionally, users or clients in an
organization too require an Operating System. Among the multiple choices available for
an Operating System, Windows based OSs are the most widely used, both for server as
well as for client host requirements in an enterprise.
The presence of business applications on servers necessitates their constant monitoring
for visibility about resource usages, such as memory, disk space, cache, CPU, and more.
Monitoring also helps identify possible issues that are affecting server performance. In
addition to servers, client devices too require monitoring to provide a trouble-free
experience to the end-user.
Windows based systems can provide data to monitoring systems which then processes
and uses the data to report on the performance and health of the servers, and host
machines. The data that is used for monitoring can be collected from a Windows machine
using any of the available methods discussed below.


Microsoft Windows Server includes OS performance counters that are enabled by default.
These performance counters provide data about system performance, such as data on
cache, memory, disk, processor, etc., which can be used by server performance
monitoring applications.





WMI is a Microsoft feature that allows for accessing management information about the
status of computer systems. In addition, WMI supports actions, such as configuration &
changing system properties, permissions, scheduling processes, etc. WMI can be used to
manage servers as well as client machines locally and remotely.

Microsoft Windows OS generates a variety of event logs that contain information about
events that occur on a system, such as application events (eg. data loss, or any significant
problem with application performance), security events (failed logons, attempts to access
secure files, security log tampering etc.), or system events. These logs can be monitored
with a monitoring system to identify possible issues with server and client systems.
General Monitoring techniques and protocols:
Now that you know what makes up a network and the components available for Windows
monitoring, let us look at general monitoring techniques used by network and systems
In order to successfully monitor your network or even server and systems, the availability
of the below options are necessary:
Data or information from various elements in the network. Data includes
information about the working, current status & performance, and health of the
element being monitored.
An application or monitoring software must be able to collect, process, and
present data in a user friendly format. Software should even alert users about
impending problems based on thresholds.
A protocol or method for transmitting information between the monitored element
and the monitoring software.

Information collected from the network helps with better management and control over
the network, identification of possible network issues before they cause downtime, and
quick resolution of issues when something goes wrong. In short, constant monitoring will
help create a high performing network.
Below are some of the general techniques available for monitoring. These techniques are
used for collection of monitoring data from the network.
This is a network admin tool that is used to test the reachability and availability of a host
in an IP network. The data from ping results can determine whether a host in the network
is active or not. Furthermore, it can measure the transmission time and packet loss when
communicating with a host.





SNMP is a network management protocol that is used for exchanging information

between hosts in a network that includes network monitoring software. This is the most
widely used protocol for management and monitoring of the network and includes the
below components:
Managed device: The node in the network that supports SNMP and access to specific
Agent: A software that is part of the monitored device. An agent has access to the MIB
(management information database) of the device and allows NMS systems to read and
write to the MIB.
Network Management System (NMS): An application on a system that monitors and
controls the managed devices through the agent using SNMP commands.
SNMP data is collected or sent to a managed device, either by polling or using traps.
Traps allow an agent to send information to an NMS about events on the device.
The MIB holds information about the structure of the data on a device for management.
The MIBs contain OID (object identifiers) which is the actual identifier for the variable to
be read from the device or set on the device.

Syslog (not to be confused with Windows Eventlog), is a message logging system that
allows for a device to send event notifications in IP networks. The information from these
messages can be used for system management, as well as security auditing. Syslogs are
supported on a variety of devices ranging from printers to routers, and firewalls.





In networks where an NMS is not available for monitoring, or the existing NMS does not
support specific functions or even extend the functionality of the existing NMS tool,
network admins can make use of scripts. Scripts use common commands, such as ping,
netstat, lynx, snmpwalk, etc., that are supported by most network elements to perform an
action, such as collecting information from elements, making changes to device
configurations, or perform a scheduled task. Bash scripts, Perl, etc. are common scripting
tools used by network admins.

1.2 What is Network Security?

In answering the question What is network security?, your IT partner should explain that
network security refers to any activities designed to protect your network. Specifically,
these activities protect the usability, reliability, integrity, and safety of your network and
data. Effective network security targets a variety of threats and stops them from entering
or spreading on your network.
What Is Network Security and How Does It Protect You?
After asking What is network security?, you should ask, What are the threats to my
Many network security threats today are spread over the Internet. The most common

Viruses, worms, and Trojan horses

Spyware and adware
Zero-day attacks, also called zero-hour attacks
Hacker attacks

Denial of service attacks

Data interception and theft
Identity theft
How Does Network Security Work?
To understand What is network security?, it helps to understand that no single solution
protects you from a variety of threats. You need multiple layers of security. If one fails,
others still stand.
Network security is accomplished through hardware and software. The software must be
constantly updated and managed to protect you from emerging threats.
A network security system usually consists of many components. Ideally, all components
work together, which minimizes maintenance and improves security.
Network security components often include:

Anti-virus and anti-spyware

Firewall, to block unauthorized access to your network

Intrusion prevention systems (IPS), to identify fast-spreading threats, such as

zero-day or zero-hour attacks

Virtual Private Networks (VPNs), to provide secure remote access

What are the Business Benefits of Network Security?
With network security in place, your company will experience many business benefits.
Your company is protected against business disruption, which helps keep employees
productive. Network security helps your company meet mandatory regulatory
compliance. Because network security helps protect your customers' data, it reduces the
risk of legal action from data theft.
Ultimately, network security helps protect a business's reputation, which is one of its
most important assets.

How Security Pays Off

Network security has become a requirement for businesses, especially those that rely on
the Internet. Your customers, vendors and business partners probably expect you to
protect any information they share with you.While network security has almost
become a prerequisite to running a business, it also pays off in multiple ways. Here
are some of the benefits businesses gain from a secured network.
Customer trust

Privacy is assured

Collaboration is encouraged
A strong security stance assures customers that sensitive information, such as credit card
numbers or confidential business details, will not be accessed and exploited. Your
business partners will feel more confident sharing data such as sales forecasts or prerelease product plans. In addition, the same technologies that keep intruders out can give
your partners secure access to information on your network, helping you collaborate and
work together more effectively.

Secure access on the road

Promotes productivity while out of the office

Strong network security lets your employees safely access your network from the road or
from home without introducing viruses or other threats. Secure, convenient network
access means that employees can use critical information when they need it, making them
more productive when they are away from their desks

Improved productivity

Less time wasted on spam

Better employee morale and collaboration

An effective network security program can boost productivity across your organization.
Employees spend less time on non-productive tasks such as sifting through spam or
dealing with viruses. Your network and your Internet connection remain safe, ensuring
you and your employees have regular access to the Internet and e-mail.
Reduced costs

Service disruption is avoided

Advanced services safely evolve

Network downtime is costly to all types of businesses. By ensuring your network and
your Internet connection are safely up and running, you can be sure that customers can
reach you when they need you. Effective security allows your business to add new
services and applications without disrupting the performance of your network. Taking a
proactive approach to safeguarding your data ensures your business remains up and
running when it needs to be.

1.3 What does Network Management mean?

Network management is a broad range of functions including activities, methods,
procedures and the use of tools to administrate, operate, and reliably maintain computer
network systems. Strictly speaking, network Management does not include terminal
equipment (PCs, workstations, printers, etc.). Rather, it concerns the reliability, efficiency
and capacity/capabilities of data transfer channels

While there is no precise definition of the term due to it being such a broad concept, some
of the main areas are summarized below:
Network Administration: This involves tracking and inventorying the many network
resources such as monitoring transmission lines, hubs, switches, routers, and servers; it
also involves monitoring their performance and updating their associated software
especially network management software, network operating systems, and distributed
software applications used by network users.
Network Operation: This involves smooth network functioning as designed and
intended, including close monitoring of activities to quickly and efficiently address and
fix problems as they occur and preferably even before users are aware of the problem.
Network Maintenance: This involves timely repair and necessary upgrades to all
network resources as well as preventive and corrective measures through close
communication and collaboration with network administrators. Example work includes
replacing or upgrading network equipment such as switches, routers and damaged
transmission lines.
Network Provisioning: This involves configuring network resources to support the
requirements of a particular service; example services may be voice capabilities or
increasing broadband requirements to facilitate more users.

Chapter 2
Company Profile

Net-Check Solutions (I) Pvt. Ltd. Pune.

(An ISO 9001:2008 Certified Company)

Net-Works Delivered.

Incorporated in 2003.
Beginning our sojourn with Network Testing, Installation, Tools & maintenance.
Proved our expertise in developing cutting-edge solutions for better harnessing of the

power of IT.
Thereafter, proved the expertise in network infrastructure development across the
length and breadth of the country

Mile stones

2003 - Developed UTP Tester and Fiber Termination Tool Kit

2004 - First Major Fiber Project of 60 Km
2005 - Started working for Carriers Projects
2006 - Developed Deployable Fiber Spools and RS 422 connectivity
2006 -07 Operations Across India
2008 - Completed 2550 Kms. of total fiber work
2009 Successfully completed state of art network infrastructure for HEMRL Nasik
2010 Successfully migrated entire network of Kirloskar Oil Engines Limited

including area offices all over India.

2011-12 - Successfully migrated entire network of Kirloskar Brothers Limited .
2013-15 Completed 10000 Kms of total fiber work .

Key Services

Network Design
Network Audit
Network Security

Metropolitan Networks, Video Surveillance and Storage

Voice over IP, IP Telephony and Data Video convergence
WI-Fi and WiMax Wireless Connectivity
Industrial Networks
Special Tactical Strategic Military Projects.
VMware, Data Centers and Storage networks

Work at a Glance

Yearly around 600 Kms of OFC work with all type of construction work and splicing

across India.
Yearly 10,000 Nodes Data and Voice Network Development / Capacity.
Large Corporate Network Infrastructure Development.
L2 and L3 Switching, Routing, Wireless, NAC, Storage.
Microwave/Carrier/Service Provider Network Infrastructure Development.
Satellite Communication/ Antenna Remoting.
Video Surveillance
Fire Alarm System
Access Control System

Major Achievements

Kirloskar Group Of Companies - 3000 + Points Data and Voice network. Fiber

backbone for long distance points.

Walchandnagar Industries Limited 2000 Points Data and Voice network. Using
Layer 2 and Layer 3 Switches. Fiber and Wireless link between 2 offices for

HEMRL Nasik 625 + Data and Voice Points network. Fiber work of more than 85
Kms. with all construction work and splicing. Wireless connectivity for 4 No's of E1

from exchange to HEMRL campus. IP Phones and analog extensions.

Praj Industries Limited 750 Data and Voice Points network. Using Layer 2 and

Layer 3 Switches. Implemented VLAN .

Pune University Campus 2000 + points network. Backbone connectivity on fiber
within various departments.

Kirloskar Oil Engines Limited Network Migration from 3COM to Cisco with 10
GBPS backbone using Cisco 4500 series chassis at core level. Cisco ACS and WLC
for wired and wireless authentication.

Associations With

Cisco Premium Certified Partner - Switches, Routers, Wireless, Security, Voice and

Unified Communication
D-Link Switches, Routers, Wireless, Passive Components
Digilink / Schneider Passive Components
Schneider Pelco CCTV, DVR, Fire System
Morley Fire System
Motorola Canopy Wireless Point to Point Connectivity Siemens - Voice, IP

Telephony, Security
Multitech - Unified Communication
Polycom, Tandberg Video Conferencing
AMP Structured Cabling
Corning Structured Cabling, OFC
Comscope Systimax Structured Cabling
Leviton Structured Cabling
RPG, Usha Martin OFC and Copper Cables
IVC, FLIR, AXIS Video Surveillance, Thermal Cameras
Fibreco, Amphenol, Brugg, Multidyne, OCC Tactical Fiber Cable Assemblies .

Strength Behind Net-Check

Technical and Professional attitude to deliver the optimized solutions on time.

Well qualified, dedicated and experienced staff of 18 Engineers,
Cisco Certified 15 Engineers
Structure Cabling Certified 5 Engineers
Net Check is Structured Cabling Certified Installer.
State of art network installation and testing equipments
Fluke Network UTP scanner 2No
UTP Tester Indigenous Manufactured
Fiber Splicing Machines 5 No's
T D R 4 No's
3M Fiber Locator 2 No's
Fiber Power Meter 2 No's
Fiber Laser Source 2 No's

Fiber Visual Fault Locator 6 Nos

Fiber Tool Kit 5 No's
E1 Tester 1 No

Site support and back office team of 50+ personnel.

Multiple projects teams to support various simultaneous carrier/corporate/defense

network infrastructure design and implementation across India.

Offices/Multiple Simultaneous Projects executed across India.

Why Net Check?

We as a Systems Integrator proposes the appropriate solution based on the

understanding the requirement of Customer.

1. Business requirements
2. System requirements and specific considerations
3. Target budget Optimized Design
We offer Product warranty in tandem with our Principals
Provides AMC that includes product replacements and troubleshooting
Our Engineers are trained on every application .
Ensures seamless and smooth implementation and training for users.


Chapter 3
Research Methodology

3.1 Introduction
No one can doubt the importance of network in the todays technology world but just
providing network is not sufficient for any organization, it should be well managed and
secure and should be monitored properly.
The market has been witnessing growth which is manifold for last few years. Many
players have entered the economy thereby increasing the level of competition. In the
competitive scenario it has become a challenge for each company to adopt practices that
would help the organization stand out in the market. The competitiveness of a company
of an organization is measured through the quality of products and services offered to
customers that are unique from others, so the Netcheck solution india private limited
suggested the topic A study of network monitoring ,management and Control(Security)
systems .

3.2 Need/Significance of the Study

It is needed to avoid network failures.

It will help for efficient network management.

It will be supportive to understand security black holes.

It will assist to give efficient networking solutions.

It will aid to understand security needs and control techniques.

3.3 Objectives of the study.

To Study the Network Monitoring and Management System Of

Netcheck Solution (I) Pvt. Ltd.

To Study Network Control (Security) Mechanisms In Netcheck


Pvt. Ltd.

To Suggest Improvement For Increasing Efficiency.

3.4 Data Collection.

The necessary information for this research is collected through Primary and Secondary
source. These sources are as follows:

Primary Source: A primary source also called as original source, is an artifact, a

document, a recording, or other source of information that was created at the time

under study. It serves as an original source of information about the topic. In this
search, the primary data is collected through discussion with the employees of

Secondary Source: Secondary data means data that already available i.e., they
refer to the data which have been collected and analyzed by someone else. In this
research, secondary data is collected through various research papers and

3.5 Limitations of the Study

Study was limited to the company and its Clients.

Answers given by the Respondent were up to their knowledge.
Time limit for the project was 60 days.
Network information is confidential so shared information will not match
Exactly as its applied in the organization.

Chapter 4
Theoretical Background

Shirbhate, R.S. & Patil, P.A. (2012): Network Traffic Monitoring Using Intrusion
Detection System, in this research paper the mentioned Security is a big issue for all
networks in todays enterprise environment. Many methods have been developed to
secure the network infrastructure and communication over the Internet, among them the
use of firewalls, encryption, and virtual private networks. Intrusion detection is a
relatively new addition to such techniques. IDS protect a system from attack, misuse, and
compromise. It can also monitor network activity. Network traffic monitoring and

measurement is increasingly regarded as an essential function for understanding and

improving the performance and security of our cyber infrastructure.

Khan R , Khan S.U , Zaheer R. , Babar M.I (2013):Large organizations always require fast

and efficient network monitoring system which reports to the network administrator as
soon as a network problem arises. This paper presents an effective and automatic network
monitoring system that continuously monitor all the network switches and inform the
administrator by email or sms when any of the network switch goes down. This system
also point out problem location in the network topology and its effect on the rest of the
network. Such network monitoring system uses smart interaction of Request Tracker (RT)
and Nagios softwares in linux environment. The network topology is built in Nagios
which continuously monitor all of the network nodes based on the services defined for
them. Nagios generates a notification as soon as a network node goes down and sends it
to the RT software. This notification will generate a ticket in RT database with
problematic node information and its effect on the rest of the network. The RT software is
configured to send the ticket by email and sms to the network administrator as soon as it
is created. If the administrator is busy at the moment and does not resolve the ticket
within an hour, the same ticket is automatically sent to the second network responsible
person depending upon the priority defined. Thus, all persons in the priority list are
informed one by one until the ticket is resolved.

Yongjie Cai (2014): Various wireless network technologies have been created to meet the
ever-increasing demand for wireless access to the Internet, such as wireless local area
network, cellular network and sensor network and many more. The communication
devices have transformed from large computational servers to small wireless hand-held
devices, ranging from laptops, tablets, and smartphones to small sensors. The advances of
these wireless networks (e.g., faster network speed) and their intensive usages result in an

enormous growth of network data in terms of volume, diversity, and complexity. All of
these changes have raised complicated network measurement and management issues. In
this proposal, I first investigate the impact of wireless local area network in home and
network security monitoring. Then I propose effective and efficient approaches in
analyzing network data, particularly those generated by smartphone apps and sensor

Navneet Kaur Dhillon and Mrs. Uzma Ansari(2012):Todays enterprise networks are
composed of multiple types of interconnected networks. Operations and management
staff must provide an efficient, reliable and secure operating environment to support an
organizations daily activities. Enterprise networks must be monitored for performance,
security, and fault management .Current management uses the complex, hard-to-learn and
hard-to-use tools. We need a simple, uniform, easy tool for managing networks. Client
server based management promises to provide such solutions. This paper focuses on the
use of packet capturing technology like WinPcap and JPCAP for the purposes of
enterprise network traffic monitoring and reporting. In this paper, we first examine the
requirements for enterprise network traffic monitoring, analysis and reporting, and then
present the design and implementation of a network traffic monitoring and reporting
system. Network traffic Monitoring is a network diagnostic tool that monitors local area
networks and provides a graphical display of network statistics. While collecting
information from the network's data stream, Network Monitor displays the following
types of information:
The source address of the computer that sent a frame onto the network.
The destination address of the computer that received the frame.
The protocols used to send the frame.
The process by which Network Monitor collects this information is called capturing. By
default, Network Monitor gathers statistics on all the frames it detects on the network into
a capture buffer, which is a reserved storage area in memory. To capture statistics on only

a specific subset of frames, we can single out these frames by designing a capture filter.
To use Network Monitor, our computer must have a network card that supports
promiscuous mode.

Mr. Nagaraja G.S., Chittal R.R., Kumar K.(2007): Computer networks have
influenced the software industry by providing enormous resources distributed around the
globe and interactions among people working anywhere in the world that the world today
seems too small. Networks themselves have undergone a radical change in the last few
decades starting from ARPANET to the Inter-Continental data cables that we see today.
The amount of data that is carried on the Information Super Highway has been increasing
everyday prompting for efficient management of the Trans-Continental Super Highway
of data. The growing dependence on networks for everyday tasks has created the demand
for high performance; reliable networks thereby making companies invest a lot on
research on improving the networks and new designs. Part of achieving the goal of high
performance is active monitoring of networks to help in the identification and prevention
of network errors. Many tools have emerged to aid in performance monitoring of
networks. The most common class of tools is based on the Simple Network Management
Protocol (SNMP), a protocol for sending and transmitting network performance
information on IP networks. Other types of network performance monitoring tools
include packet sniffers, flow monitors and application monitors. Examples of the various
monitoring tools are SolarWind's Orion SNMP monitoring platform, WireShark packet
capture tool, Webmetrics' Global Watch and Cisco's NetFlow flow monitoring tools. Key
words: Simple network management protocol, internet protocol, monitoring tools.

Siddharth Ghansela (2013):

Network security is main issue of this generation of computing because many types of
attacks are increasing day by day. Establishing a network is not a big issue for network
administrators but protecting the entire network is a big issue. There are various methods
and tools are available today for destroying the existing network. In this paper we mainly

emphasize on the network security also we present some major issues that can affect our
Keywords- Network Security, Threats, Cryptography, Ping

Rao U.H(2011): A network administrators efficiency to manage a network decreases as

the network becomes more complex and heterogeneous. Managing large, heterogeneous
networks created a crisis for many organizations. The network management tools and
solutions available are not only expensive but also difficult to install, configure,
administer, and maintain. This paper discusses the tools and solutions available for
network management, challenges involved in implementing network management
solutions and also a simple solution for a pro-active network management solution is
proposed. This solution was tested by implementing in a large enterprise. With the
implementation, the stakeholders were able to achieve higher efficiency and able to do
proactive network management.

Kim H. and Feamster N.(2013): Network management is challenging. To operate,

maintain, and secure a communication network, network operators must grapple with
low-level vendor-specific configuration to implement complex high-level network
policies. Despite many previous proposals to make networks easier to manage, many
solutions to network management problems amount to stop-gap solutions because of the
difficulty of changing the underlying infrastructure. The rigidity of the underlying
infrastructure presents few possibilities for innovation or improvement, since network
devices have generally been closed, proprietary, and vertically integrated. A new
paradigm in networking, software defined networking (SDN), advocates separating the
data plane and the control plane, making network switches in the data plane simple
packet forwarding devices and leaving a logically centralized software program to control
the behavior of the entire network. SDN introduces new possibilities for network
management and configuration methods. In this article, we identify problems with the
current state-of-the-art network configuration and management mechanisms and

introduce mechanisms to improve various aspects of network management. We focus on

three problems in network management: enabling frequent changes to network conditions
and state, providing support for network configuration in a high-level
language, and providing better visibility and control over tasks for performing network
diagnosis and troubleshooting. The technologies we describe enable network operators to
implement a wide range of network policies in a high-level policy language and easily
determine sources of performance problems. In addition to the systems themselves, we
describe various prototype deployments in campus and home networks that demonstrate
how SDN can improve common network management tasks.

Esad S. and Ivan. I(2011):The purpose of this document is to provide an insight into
basic NMS (Network Management System) activities, along with recommendations for
administrators of campus and/or local networks intending to apply the NMS tools within
their networks. The document begins with a discussion of network topology. Changes in
topology are recommended based on the idea that a majority of NMS activities should be
conducted through the management segment of the network. The discussion focuses on
two alternatives: the management network and the production network may either be
separated physically (out-band management segment) or they may share the same
physical infrastructure (the VLAN segment of the network). The document further
identifies the three components that should, as a minimum, be covered by a Network
Management System. They are the configuration management and log management,
along with the already recognized Network Monitoring component implemented using
one of the NMS software packages. Finally, the document briefly describes the most
frequently used management protocols and their application in different environments
and on different types of devices within a network (such as network devices, servers,
UPS devices and A/C), provided they do not jeopardize the security of the network.

Kadry S., Hassan W.(2008): The basic reasons we care about information systems
security are that some of our information needs to be protected against unauthorized

disclosure for legal and competitive reasons; all of the information we store and refer to
must be protected against accidental or deliberate modification and must be available in a
timely fashion. We must also establish and maintain the authenticity (correct attribution)
of documents we create, send and receive. Finally, the if poor security practices allow
damage to our systems, we may be subject to criminal or civil legal proceedings; if our
negligence allows third parties to be harmed via our compromised systems, there may be
even more severe legal problems. Another issue that is emerging in e-commerce is that
good security can finally be seen as part of the market development strategy. Consumers
have expressed widespread concerns over privacy and the safety of their data; companies
with strong security can leverage their investment to increase the pool of willing buyers
and to increase their market share. We no longer have to look at security purely as loss
avoidance: in todays marketplace good security becomes a competitive advantage that
can contribute directly to revenue figures and the bottom line. Networks today run
mission-critical business services that need protection from both external and internal
threats. In this paper we proposed a secure design and implementation of a network and
system using Windows environment. Reviews of latest product with an application to an
enterprise with worldwide branches are given. Keywords: Network design, LAN, WAN,
Security, Encryption, VPN, IPSec, Active Directory.


1. (
2. (

3. (
4. Network Traffic Monitoring Using Intrusion Detection System
accessed date on 26/07/16
5. An Efficient Network Monitoring and Management System
( accessed date on 26/06/16

6. Network Monitoring And Data Analysis In Wireless Networks





date on 27/06/16.

7. Enterprise Network Traffic Monitoring, Analysis, and Reporting Using






ovember2012/V2I11-0142.pdf )

8. Study of Network Performance Monitoring Tools-SNMP

( accessed date on
9. Network Security: Attacks, Tools and Techniques

10. Challenges of Implementing Network Management Solution

11. Improving Network Management with Software Defined Networking

12. Network Monitoring and Management Recommendations


13. Design And Implementation Of System And Network Security For An

Enterprise With Worldwide Branches.