You are on page 1of 30

Thadomal Shahani Engineering College

Electronics and Telecommunication Engineering Department


B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)
List of Practicals
1. Installation of OS Ubuntu.
2. Study of Network Management Tools:
a. Status monitoring tools
b. Traffic monitoring tools
c.Route monitoring tools
3. Installation and configuration of SNMP Tools
4. Study of MIB tools: qtmib
5. Installation and configuration of network traffic analyzer NTOP
6. Study of sflow and netflow plugin for router and switch management.
7. Install and configure a network management system (NMS) to monitor the devices
on network using Nagios and Cacti
8. Study of network mapper Zenmap
9. Study of Network Traffic Visualization using Etherape
10. Study of manageable L2/L3 switch configuration for network management.
11. Integration of XML and SNMP for non-manageable objects.
12. Installation and Configuration of OpenNMS as a NMS.
13. Implementation of Centralized Log Management System: Syslog-ng
14. Study of commercial network management tools: HPOpenView, OpManager,
GFILanguard and IBM NMS.
Thadomal Shahani Engineering College
Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO. : 1
Title: Installation & Configuration of GNU/Linux as a NOS (Ubuntu/Fedora/CentOS).
Aim: To study the installation & configuration of different types of Operating System.
Objectives:
 To understand the operating system.
 Installation of operating system.
 To understand partitioning of hard disk.
 To configure network & firewall policy configuration.
 To understand server daemon process.
Requirements: Gigabit/100 Mbps Ethernet, network switch, Linux distribution media.
Title: Installation & Configuration of GNU/Linux as a NOS (Ubuntu/Fedora/CentOS).
Aim: To study the installation & configuration of different types of Operating System.
Objectives:
 To understand the operating system.
 Installation of operating system.
 To understand partitioning of hard disk.
 To configure network & firewall policy configuration.
 To understand server daemon process.
Requirements: Gigabit/100 Mbps Ethernet, network switch, Linux distribution media.
Ubuntu is one of the most popular forms of the Linux operating system. It is available for free, and
will run
on almost any computer.
Procedure & observations for installing Ubuntu:
Download the Ubuntu ISO file. You can get the ISO file from the Ubuntu website. An ISO file is a
CD image file that will need to be burned before you can use it. There are two options available
from the Ubuntu website. 12.04 LTS has continuous updates and provides technical support. It is
scheduled to be supported until April 2017. This option will give you the most compatibility with
your existing hardware.
13.04 is the latest Ubuntu build, and comes with limited support. It has the newest features, though
they
may not work with all hardware. This release is geared more towards experienced Linux users.
If you have a Windows 8 PC or a PC with UEFI firmware, download the 64-bit version of Ubuntu.
Older machines should download the 32-bit version.
Burn the ISO file. Open up your burning program of choice. There are free and paid programs
available
that can burn an ISO to a CD or DVD.
Windows 7, 8, and Mac OS X can all burn ISO files to a disc without having to download a separate
program.
Boot from the disc. Once you have finished burning the disc, restart your computer and choose to
boot from the disc. You may have to change your boot preferences by hitting the Setup key while
your computer is restarting. This is typically F12, F2, or Del.

Try Ubuntu before installing. Once you boot from the disc, you will be given the option to try
Ubuntu without installing it. The operating system will run from the disc, and you will have a
chance to explore the layout of the operating system.
Once you are done exploring, open the Install file on the desktop.

Install Ubuntu. Your computer will need at least 4.5 GB of free space. You will want more than this
if you want to install programs and create files. If you are installing on a laptop, make sure that it is
connected to a power source, as installing can drain the battery faster than normal. Check the
“Download updates automatically” box, as well as the “Install this third-party software” box. The
third-party software will allow you to play MP3 files as well as watch Flash video (such as
YouTube).

Set up the wireless connection. If your computer is not connected to the internet via Ethernet,
you can configure your wireless connection in the next step. If you didn’t have an internet
connection in the previous step, hit the Back button after setting up the wireless connection so that
you can enable automatic updates.
Choose what to do with your existing operating system. If you have Windows installed on your
system, you will be given a couple options on how you’d like to install Ubuntu. You can either install
italongside your previous Windows installation, or you can replace your Windows installation with
Ubuntu.
If you install it alongside your old version of Windows, you will be given the option to choose your
operating system each time you reboot your computer. Your Windows files and programs will
remain untouched.
If you replace your installation of Windows with Ubuntu all of your Windows files, documents, and
programs will be deleted.
Set your partition size. If you are installing Ubuntu alongside Windows, you can use the slider to
adjust how much space you would like to designate for Ubuntu. Remember that Ubuntu will take up
about 4.5 GB
when it is installed, so be sure to leave some extra space for programs and files. Once you are
satisfied with your settings, click Install Now.
DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
Choose your location. If you are connected to the internet, this should be done automatically.
Verify that the time zone displayed is correct, and then click the Continue button.
Set your keyboard layout. You can choose from a list of options, or click the Detect Keyboard
Layout button to have Ubuntu automatically pick the correct option.
Enter your login information. Enter your name, the name of the computer (which will be
displayed on the network), choose a username, and come up with a password. You can choose to
have Ubuntu automatically log you in, or require your username and password when it starts.
Wait for the installation process to complete. Once you choose your login info, the installation
will begin. During setup, various tips for using Ubuntu will be displayed on the screen. Once it is
finished, you will be prompted to restart the computer and Ubuntu will load.
Conclusion: Thus, different steps involved in installation and configuration of Ubuntu were
performed and the configuration of the same as a network operating system was carried out.
Thadomal Shahani Engineering College
Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO.: 02
AIM: Study of various Network Monitoring Tools.
OBJECTIVE: To study the following Network Monitoring Tools:
1. Route Monitoring
2. Status Monitoring
3. Traffic Monitoring
ROUTE MONITORING:
Following were the commands used to study Route Monitoring:
 # ping <IP address of the host>
Ping is a well known tool to check network connectivity between two IP hosts. Ping is installed
by default on Windows, Apple and Linux/Unix operating systems. It uses the ICMP protocol
which has been created to check IP connectivity and get information about other machines in an
IP network.
OUTPUT:
DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
The basic information about this command given in the man pages is as follows:
Now, to check whether the host is on network or not, we ping the gateway using the below
command.
 # ping 172.16.20.1
If the network is in good health, the time period is less than one millisecond.
OUTPUT:
DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
The following command is used to see the IP Routing table:
 # route -n
The man page of the same is as shown below:
STATUS MONITORING:
Following were the commands used to study Route Monitoring:
 # netstat -an
The above command shows the network status.
To observe only TCP connections, use the following command:
 # netstat -an | grep tcp
OUTPUT:
Similarly, to check the UDP connections, we can use the command:
 # netstat -an | grep udp
Since UDP is a connectionless service, it will not show any connections in the output even after
opening several tabs in the browser.
Now, open another terminal and use the command,
 # nslookup www.rediff.com
Nslookup is a program to query Internet domain name servers. Nslookup has two modes:
interactive and non-interactive. Interactive mode allows the user to query name servers for
information about various hosts and domains or to print a list of hosts in a domain. Non-
interactive mode is used to print just the name and requested information for a host or domain.
OUTPUT:
Again if we try to check network status using the netstat command, UDP still shows no
connections.
PROCESS MONITORING: To observe the network level processes.
Command:
 # lsof
Monitors all the processes of Operating System.
 # lsof -i
Shows only network level processes.
OUTPUT:
 # netstat -tuape | grep tcp
OUTPUT:
 # arp -a
OUTPUT:
 # ifconfig
It is used to configure a network interface.
OUTPUT:
 # traceroute ---------------(WRITE TSEC WEBSITE ADDRESS)
We come to know that this host is a part of this server's network.
OUTPUT:
If we try to use any other website instead of www.spit.ac.in, we will get more number of hops.
The stars in the above figure means that those packets are being filtered by the Router(firewall).
It shows the statistics of only one hop i.e. this host on this server's network.
NETWORK MAPPER(nmap):
Nmap ("Network Mapper") is a free and open source (license) utility for network discovery and
security auditing. Nmap uses raw IP packets in novel ways to determine what hosts are available
on the network, what services (application name and version) those hosts are offering, what
operating systems (and OS versions) they are running, what type of packet filters/firewalls are in
use, and dozens of other characteristics. In addition to the classic command-line Nmap
executable, the Nmap suite includes an advanced GUI and results viewer (Zenmap).
PORT MONITORING USING NMAP:
Command:
 # nmap -sT 172.16.20.86
Flush the iptables on the host 172.16.20.86 and start service. Again run the above command. The
difference between the can be clearly observed from the figures giben below:

Installing the GUI for nmap:


 # yum install nmap-frontend
OUTPUT:
 # yum install wireshark
Install nmap on another host and use this command:
 # nmap -sT 172.16.20.53
OUTPUT:
CONCLUSION: Thus different network monitoring tools are studied and implemented.

Thadomal Shahani Engineering College


Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO. : 3
Title: Study of SNMPv2 , installation and configuration.
Aim: To study the installation & configuration of SNMPv2.
Objectives:
 To understand the SNMP.
 To understand SNMPv2
 Installation of SNMPv2
 Configuration of SNMPv2
 To understand server daemon process.
 Displaying Information tree.
Requirements: Linux Distribution (Fedora, Ubuntu),active internet connection to
download
packages.
Step-1: For Fedora, verify if snmp package is installed, using following command:
# yum install net-snmp net-snmp-utils
Step-2: Locate configuration files as shown.
Step-3: Locate /etc/snmp/snmpd.conf
Step-4: Configure snmpd.conf file.
Snmpd implies that it is a daemon process.
We need to configure the .conf file for starting snmpd process.
Location of snmpd.conf
Step-5: Starting snmp service
SNMP process can be started with following command:
service snmpd starts
Step-6: Check network connections u Specifically, the netstat command can show details about
individual network connections, overall and protocol-specific networking statistics, and much
more, all of which could help troubleshoot certain kinds of networking issues.sing ‘nestat’.co
Step 7: Checking status of snmpd process.
Use following commands to check the status of snmpd process.
The command shows “active(running)”, if the process is running.

Step-8: Displaying tree of information.


The command snmpwalk uses the SNMP GETNEXT request to query a network for a tree of information.
following snmpwalk command shows the system tree with a default agent configuration.
Conclusion: Thus, different steps involved in installation and configuration of SNMPv2
were performed and the configuration of the same was carried out.
Thadomal Shahani Engineering College
Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO: 4
Aim: Study if MIB Tools –qtmib.
Theory:
qtmib is an easy-to-use SNMP MIB Browser based on QT4 library. It is build as a front-end for
netsnmp tools, and it allows the user to query any SNMP-enabled device. It implements
SNMPv1 and SNMPv2c, and it is released under GPL v2 license.
qtmib supports out of the box a large number of MIBs. We are currently tracking netdisco
(http://www.netdisco.org/) MIB archive. You can also install private MIBs by dropping them in
~/.config/qtmib/mibs directory.
It is an open-source (GPL v2 license) program, that allows you to connect to any SNMP-enabled
device and browse the MIBs. The graphical user interface is build using QT4 library. The
program comes with a large number of MIBs pre-installed, anything from Cisco’s and Juniper’s
to HP’s and Dell’s. You can also install your own MIBs by copying them into
~/.config/qtmib/mibs directory.
Features:
- SNMP v1 and v2c
- OID/MIB translation
- large number of built-in MIBs
- user MIBs
- network discovery
- reports: system, interface, routing table, connections, process, software
Download:
source code: http://sourceforge.net/projects/qtmib/files/qtmib
Ubuntu package: http://sourceforge.net/projects/qtmib/files/qtmib.deb
Dependencies: QT4 development libraries, net-snmp (http://www.net-snmp.org/)
Installation:
Ubuntu package:
$ sudo dpkg -i qmib_X.Y.Z_1.deb
Source code:
$ tar -xjvf qtmib-X.Y.Z.tar.bz2
$ cd qtmib-X.Y.Z
$ ./configure
$ make
$ sudo make install
Support:
http://qtmib.sourceforge.net
https://sourceforge.net/p/qtmib/discussion
https://sourceforge.net/p/qtmib/tickets
Conclusion:
Hence we have studied the MIB tools-qtmib.

Thadomal Shahani Engineering College


Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO:05
AIM: Installation and configuration of network traffic analyzer NTOP .
OBJECTIVE:
1. To generate the traffic from remote machine and analyse that traffic on server.
2. To analyse protocol distribution.
3. To get the detailed information about the hosts.
THEORY:
ntop shows the current network usage. It displays a list of hosts that are currently using the
network and reports information concerning the IP (Internet Protocol) and Fibre Channel (FC)
traffic generated by each host. The traffic is sorted according to host and protocol. Protocols
(user configurable) include:
 TCP/UDP/ICMP
 (R)ARP
 DLC
 IPsec
 Netbios
 TCP/UDP
1. FTP
2. HTTP
3. DNS
4. Telnet
5. SMTP/POP/IMAP
6. SNMP
7. NFS
8. X11
 Fibre Channel
1. Control Traffic - SW2,GS3,ELS
2. SCSI
ntop's author strongly believes in open source software and encourages everyone to
modify,improve and extend ntop in the interest of the whole Internet community
according to the enclosed licence.
SIMULATION:
RESULTS:
CONCLUSION:
Hence we have studied the installation and configuration of network traffic analyzer NTOP.

Thadomal Shahani Engineering College


Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO: 06
Aim: To study sFlow and NetFlow plugins for routers and switch management.
Objectives:
1.To install and configure NTOP tool
2.To study the configuration of NetFlow plugin using NTOP
3. To analyse network traffic using NetFlow(with NTOP as a flow collector)
Requirements: Standard PC, Cisco Router, Network Switch etc
Procedure:
1. Install ‘libpcap-devel libpcap libtool gcc’ package.
2. Download the tar file for RRD installation.
3. Install RRD tool which will be used to log data and then graphing it.
4. Download and install GeoIP.
5. Download and install Ntop and configure the user for it. Set the corresponding permissions.
6. Configure Ntop to start at boot.
7. Add the following command into /etc/rc.local file. Replace eth0 with the interface we have
setup tolisten on.
/usr/local/bin/ntop -i &quot;eth0&quot; -M -d -L -u ntop -P /usr/local/var/ntop --skip-version-
check --use-syslog=daemon
8. Run the above command to start Ntop without having to reboot.
9. Open a web browser and go to port 3000 on the server.
10. From the menu go to Plugins > All. Click the ‘No’ next to the Netflow Plugin to first enable
it.
11. Click the Netflow link to configure netflow.
12. Click the ‘add Netflow device’ button to add the device.
13. Set the following things.
 Netflow Device – Set this to the name of the device that will be sending data ie router.
 Local collector UDP port – This is the port that Ntop will listen for Netflow data on.
 Virtual NetFlow Interface Network Address – Set this to the network you will be receiving
Netflow data from.
14. Configure the device.
1. Set both the Netflow collector IP and the port to send it on.
2. Set the version of Netflow to use.
3. Set the source that it will use to send the data. It will be the management interface for the
device.
4. Configure the interfaces we are setting it to send flow data for data entering the vlan in both
directions
15. Analyse the data reports
Protocols > All Traffic:This shows the traffic to and from each IP.
Protocols > Throughput:This gives great graphs on the breakdown of data flow.
Summary > Traffic: These reports all to view data based on the direction of the traffic.
Conclusion: Hence the study of netFlow and sFlow plugins is carried out.

Thadomal Shahani Engineering College


Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

Experiment No. 07
AIM: Installation and configuration of Nagios and Cacti.
OBJECTIVE:
 To study the Nagios open-source tool
 To study the installation andconfiguration of Cacti
 To monitor various devices using these tools
THEORY: Nagios: NAGIOS is an open source enterprise level network monitoring tool. It
works using SNMP protocol. NAGIOS is an web based application which needs preinstalled web
server on the machine on which nagios is deployed. Nagios offers monitoring and alerting
services for servers,switches, applications, and services. It alerts the users when things go wrong
and alerts them a second time when the problem has been resolved. Nagios was originally
designed to run under Linux but also runs well on other Unix variants. It is a free software
licensed under the terms of the GNU General Public License version 2 as published by the Free
Software Foundation.
Installation of Nagios:
 First you need to install the following packages
 sudo apt-get install apache2
 sudo apt-get install build-essential
 sudo apt-get install libgd2-xpm-dev
 sudo apt-get install nagios
 after installation create an account
 enter username and password
 after completion run Nagios
 Open web browser and in address bar type \localhost\nagios
 The Nagios GUI will open
 Add devices with different platforms and operating systems
 Create the graph for various network and system parameters
 Study the graphs of these different hosts.
DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
Cacti: Cacti is an open-source, web-based network monitoring and graphing tool designed as a
frontend application for the open-source, industry-standard data logging tool RRDtool. Cacti
allows a user to poll services at predetermined intervals and graph the resulting data. It is
generally used to graph time-series data of metrics such as CPU load and network bandwidth
utilization.[2] A common usage is to monitor network traffic by polling a network switch or router
interface via simple network management protocol (SNMP).
The front end can handle multiple users, each with their own graph sets,[2] so it is sometimes used
by web hosting providers[3](especially dedicated server,[4] virtual private server, and collocation
providers) to display bandwidth statistics for their customers. It can be used to configure the data
collection itself, allowing certain setups to be monitored without any manual configuration of
RRDtool.[5] Cacti can be extended to monitor any source via shell scripts and executables
Installation of Cacti:
1. Sudo apt-get install cacti
2. Create an account providing username and password
3. Open browser and in address bar type \localhost\cacti
4. Add devices to be monitored
5. Select the graphs to be generated related to each device
6. Study the characteristics of the graphs
OBSERVATIONS:
Cacti:
CONCLUSION: Hence, we have studied the installation of Nagios and Cacti. We have
monitored hosts of different OS using these tools.
Thadomal Shahani Engineering College
Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO. : 8
Aim: Study of network mapper Zenmap
Description: Zenmap is the official graphical user interface (GUI) for the Nmap Security
Scanner. It is a multi-platform, free and open-source application designed to make Nmap easy
for beginners to use while providing advanced features for experienced Nmap users. Frequently
used scans can be saved as profiles to make them easy to run repeatedly. A command creator
allows interactive creation of Nmap command lines. Scan results can be saved and viewed later.
Saved scans can be compared with one another to see how they differ. The results of recent scans
are stored in a searchable database.
Requirements: Gigabit/100 Mbps Ethernet, network switch, Linux distribution media.
Procedure and observations:
Scanning
Begin Zenmap by typing zenmap in a terminal or by clicking the Zenmap icon in the desktop
environment. The main window, as shown in Fig.1 is displayed.
Fig.1 Zenmap's main window
The “Topology” tab:
The “Topology” tab is an interactive view of the connections between hosts in a network. Hosts
are arranged in concentric rings. Each ring represents an additional network hop from the center
node.Clicking on a node brings it to the center. Because it shows a representation of the network
paths between hosts, the “Topology” tab benefits from the use of the --traceroute option.
Topology view is discussed in more detail in the section called “Surfing the Network Topology.

The “Host Details” tab:


The “Host Details” tab breaks all the information about a single host into a hierarchical display.
Shown are the host's names and addresses, its state (up or down), and the number and status of
scanned ports. The host's uptime, operating system, OS icon and other associated details are
shown when available. When no exact OS match is found, the closest matches are displayed.
There is also a collapsible text field for storing a comment about the host which will be saved
when the scan is saved to a file .Each host has an icon that provides a very rough “vulnerability”
estimate, which is based solely on the number of open ports. The icons and the numbers of open
ports they correspond to are
0–2 open ports,
3–4 open ports,
5–6 open ports,
7–8 open ports
9 or more open ports.
CONCLUSION:
Zenmap is a very powerful tool that enables any network administrator to audit any size network.
It's a great tool, easy to use, and it's open source.

Thadomal Shahani Engineering College


Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO.: 09
AIM: Study of Network Traffic Visualization using Etherape
OBJECTIVE: Study of network traffic using a GUI based tool.
THEORY: EtherApe is a packet sniffer/network traffic monitoring tool, developed for Unix.
EtherApe is free, open source software developed under the GNU General Public License.
Featuring link layer, IP and TCP modes, it displays network activity graphically. Hosts and links
change in size with traffic. Colour coded protocols display. It supports Ethernet, FDDI, Token
Ring, ISDN, PPP,SLIP and WLAN devices, plus several encapsulation formats. It can filter
traffic to be shown, and canread packets from a file as well as live from the network. Node
statistics can be exported. The EtherApe network monitor is a midrange option for monitoring
your network’s data traffic.
The features about EtherApe include:
 graphical network traffic display
 color coded node and links for most used protocols
 traffic may be viewed on one's own network, end to end (IP) or port to port (TCP)
 a variety of frame and packet types are supported
 data view can be manipulated using a network filter
 clicking a node or link provides additional information regarding including protocol and
traffic
information
 summary protocol and node table
 can read traffic from a file or an actual network
 handles traffic on Ethernet, WLAN, VLAN plus several other media and encapsulation types
 supports both IPv4 and IPv6
 XML export of node statistics
OUPUT:
Packet size: 30,000
Packet size: 3,000:
Packet size: 60,000
CONCLUSION: Thus, Network Traffic was visually(GUI) studied by varying the packet sizes
using Etherape.

Thadomal Shahani Engineering College


Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO: 10
AIM: Study of manageable L2/L3 switch configuration for network management.
OBJECTIVE: To configure RMON, SNMP, Static IP address in D-Link DES 3026
manageable switch.
PROCEDURE:
• Connect the power cable of the switch to wall outlet.
• Connecting the Console Port(RS232): The switch provides an RS232 serial port that
enables a connection to a computer or terminal for monitoring and configuring the
switch.
This port is a female DB9 connector, implemented as a data communication terminal
equipment(DCE) connection.
• To use the console port, you need the following equipment:
1. A terminal or a computer with both a serial port and the ability to emulate a terminal.
2. A null modem or crossover RS232 cable with a female DB9 connector for the console
port on the switch.
• On server machine, set the ip address as the default ip address of switch (given in
switch user manual). This is shown in the figure given below:
• Type the default ip address of switch in the URL of browser. Input user name and
password as 'admin'.
• Do the settings as required.
CONCLUSION: Thus, the configuration of D-Link DES 3026 L2 manageable switch is
successfully completed.

Thadomal Shahani Engineering College


Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO. - 11
AIM : Installation and Configuration of OpenNMS as a NMS
OBJECTIVES : 1) To study Network Management Service
2) To install and configure open source NMS (Open NMS)
3) To add devices and services in open NMS
TOOL : Open NMS
THEORY : Network management
In computer networks, network management refers to the activities, methods,
procedures,and tools that pertain to the operation, administration, maintenance, and
provisioning of networked systems.[1] Network management is essential to command
and control practices and is generally carried out of a network operations center.
• Operation deals with keeping the network (and the services that the network provides)
up and running smoothly. It includes monitoring the network to spot problems as soon
as possible, ideally before users are affected.
• Administration deals with keeping track of resources in the network and how they are
assigned. It includes all the "housekeeping" that is necessary to keep the network
under control.
• Maintenance is concerned with performing repairs and upgrades—for example, when
equipment must be replaced, when a router needs a patch for an operating system
image, when a new switch is added to a network. Maintenance also involves
corrective and preventive measures to make the managed network run "better", such
as adjusting device configuration parameters.
• Provisioning is concerned with configuring resources in the network to support a given
service. For example, this might include setting up the network so that a new customer
can receive voice service.
A common way of characterizing network management functions is FCAPS—Fault,
Configuration, Accounting, Performance and Security.
Functions that are performed as part of network management accordingly include
controlling, planning, allocating, deploying, coordinating, and monitoring the resources
of a network,
network planning, frequency allocation, predetermined traffic routing to support load
balancing, cryptographic key distribution authorization, configuration management, fault
management, security management, performance management, bandwidth
management, Route analytics and accounting management.
Data for network management is collected through several mechanisms, including
agents installed on infrastructure, synthetic monitoring that simulates transactions, logs
of activity,sniffers and real user monitoring. In the past network management mainly
consisted of monitoring whether devices were up or down; today performance
management has become
a crucial part of the IT team's role which brings about a host of challenges—especially
for global organizations.

PROCEDURE :
A) INSTALLATION :
1. Select Your Release and Distribution
Release in OpenNMS means: stable, testing, unstable, snapshot
2.Configure APT
Adding a Repository
To set up APT to talk to the OpenNMS repository, you'll need to create a file called
"opennms.list" within the "/etc/apt/sources.list.d" directory, with the following
contents:
# contents of /etc/apt/sources.list.d/opennms.list
deb http://debian.opennms.org stable main
deb-src http://debian.opennms.org stable main
3. Adding the OpenNMS PGP Key to APT
Packages within the APT system are cryptographically signed to ensure their integrity.
This step ensures the integrity of the file you've downloaded, as well as a reference to
guarantee that the file is provided by who it says it was. These features are useful at
install-time as well as during future upgrades.
To install the OpenNMS PGP key into your system, type the following at a command
prompt:
wget -O - http://debian.opennms.org/OPENNMS-GPG-KEY | sudo apt-key add -
4. Download and verify OpenNMS package catalogs have been downloaded
Then you should be able to run
sudo apt-get update
apt-cache search opennms
apt-cache show opennms
5. Preparing the Database for OpenNMS
Before installing OpenNMS itself, you will want to install PostgreSQL, and do a few
things to make sure PostgreSQL is working properly.
A. Installing PostgreSQL
The first thing you'll want to do is install the PostgreSQL database itself. On any
Debianbased distribution, all you should have to do is install the "postgresql" package,
and it will pull in anything it needs.
sudo apt-get updatesudo apt-get install postgresql
B. Determining Your PostgreSQL Version

The version of PostgreSQL that gets installed depends upon what version distribution
you're
running. You can see the version of PostgreSQL installed with the "pg_lsclusters"
command. For the purposes of this tutorial, we'll set an environment variable on the
shell to
make things easier:
PGVERSION=`pg_lsclusters -h | head -n 1 | cut -d' ' -f1`
C. Verification
Example output with PostgreSQL 9.1 installed:
echo $PGVERSION 9.1
6. Allowing User Access to the Database
By default, PostgreSQL only allows you to connect if you are logged in to the local
account name that matches the PostgreSQL user. Since OpenNMS runs as root, it
cannot connect as the operating system's "postgres" or "opennms" users by default, so
we have to change the configuration to allow that.
To allow connections as the postgres user to authenticate without a password, you first
must change options in the pg_hba.conf file. On Debian-derived systems, this will be
located at /etc/postgresql/$PGVERSION/main/pg_hba.conf, where "$PGVERSION"
is the environment variable we set earlier containing the version of your PostgreSQL
database.
Edit your "/etc/postgresql/$PGVERSION/main/pg_hba.conf" file now, as root. It should
have entries similar to the following at the bottom.
sudo vi /etc/postgresql/$PGVERSION/main/pg_hba.conf
You will need to change these entries to replace the default authentication methods with
the method "trust". The final result should be like the following.
# TYPE DATABASE USER ADDRESS METHOD
# OpenNMS change: configure local, IPv4 and IPv6 connections made from localhost to
not require authentication
# "local" is for Unix domain socket connections only local all all trust # the default
method is peer
# IPv4 local connections:
host all all 127.0.0.1/32 trust # the default method is md5
# IPv6 local connections:
host all all ::1/128 trust # the default method is md5
# Allow replication connections from localhost, by a user with the
# replication privilege.
#local replication postgres peer
#host replication postgres 127.0.0.1/32 md5
#host replication postgres ::1/128 md5
Once you have finished making changes, restart the database (as root):
sudo service postgresql restart
7. Installing Java
sudo apt-get install openjdk-7-jre
8. Verification of the Java version
java -version
This is sample output using Java 7 on Ubuntu 12.04.3.
java version "1.7.0_25"
OpenJDK Runtime Environment (IcedTea 2.3.10) (7u25-2.3.10-1ubuntu0.12.04.2)
OpenJDK 64-Bit Server VM (build 23.7-b01, mixed mode)
9. Verification of a local mail transfer agent
OpenNMS sends out e-mail by default through a local mail transfer agent listening on
port
25. Confirm that a MTA (e.g. exim or postfix) is installed. One way to check for this is to
telnet to port 25 on the server and ensure a SMTP banner is displayed.
If a MTA is not present, install it with the following command:
sudo apt-get install default-mta
10. Installing OpenNMS
With all the prerequisites taken care of, you can now install OpenNMS. The OpenNMS
software is not a single package, but a combination of many components. The APT
packaging system will download and install all of these components and their
dependencies, if they are not already installed on your system.
There are many packages available in the OpenNMS APT repository, but the easiest
way to get started is to install the "opennms" package. This will pull in everything you
need to have a working OpenNMS, including the OpenNMS core, web UI, and a set of
common plugins.
You can do so by running (as root):
sudo apt-get install opennms The installer typically has two prompts: "The OpenNMS
installer must now be run manually" and a warning that "IPLIKE installation failed".
Please select "<Ok>" for both questions to continue.
The IPLIKE warning is normal, as this package will attempt to install itself into the
OpenNMS database, but on a new install the database has not been configured yet. We
will re-attempt the install later.
B) CONFIGURATION : Post-Install Configuration
1. Disable APT Updates
Some distributions that use APT as a package management system will attempt an
automatic update at regular intervals. A system administrator could potentially run a
manual update and inadvertently upgrade OpenNMS resulting in a misconfiguration or
complete failure.
To avoid these scenarios, you may want to disable the OpenNMS repositories after a
successful installation by editing the "/etc/apt/sources.list.d/opennms*" file and
commenting out each "deb" section. This can just as easily be changed back when it's
time to upgrade.
2. Configure Java
Next, you need to tell OpenNMS which Java you want it to use, using the
"/usr/share/opennms/bin/runjava" command.
To have OpenNMS search for and auto-detect the JRE, run:
sudo /usr/share/opennms/bin/runjava -s
3. Create/Update the OpenNMS Database
Whenever you install OpenNMS or upgrade it, you should run the "sudo
/usr/share/opennms/bin/install -dis" command, to create the OpenNMS database,
or
update it to the latest version. The install command takes many options, but in most
cases all you should need are the three options below:
• -d - to update the database
• -i - to insert any default data that belongs in the database
• -s - to create or update the stored procedures OpenNMS uses for certain kinds of data
access
A warning "Failed to load the optional jrrd library." during installation is normal and not a
problem, as jrrd use is optional. The installation should finish with the line "Installer
completed successfully!".
4. Verify connectivity to the OpenNMS database
At this point, you can check the network listener and authentication changes, as well as
whether or not your DB creation worked properly by trying to connect to the OpenNMS
database as the postgres database user from localhost.
psql -U postgres --host=localhost opennms
If you are presented with a prompt that looks like opennms=#, you can type \q and quit
the PostgreSQL shell as the database connection was successful. If this was not
successful, you will need to review your PostgreSQL configuration before continuing.
5.Start OpenNMS and Connect to the Web UI
You can now start OpenNMS using the "service" command (as root).
sudo service open nms start 6. Change the Administrator Password
As mentioned above, the default username is "admin" and the default password is
"admin" as well. It is recommended that you change the administrator user's password,
for security reasons. To do so, log in to the web UI and then click on the username
(admin) in the upper right corner, and then click "Change Password." Enter the old and
new passwords in the prompt, and click "OK."
7. Detecting Services on Devices
In order to detect services on devices, the Provisiond daemon executes detectors to
detect the presence of configured services. Once a service is detected, it is used by
other daemons to monitor availability, or to collect data about it.
These services are configured in the default foreign-source definition, which is pre-
configured with a number of common services, like HTTP, SMTP, and so on. All
Provisiond needs to get started is an IP address that OpenNMS suspects may provide
one or more of these services.
A. New Suspect Events
Provisiond listens for "new suspect" events, which tell OpenNMS, "I suspect the IP
address at <x> has services." These newSuspect events can come from a number of
sources:
• an event sent from the command-line, using the send-event.pl script
• an event sent from a 3rd-party tool, talking on the OpenNMS event listener TCP port
• the Discovery daemon, which scans IP ranges for valid IP addresses (using ICMP
"ping")
• the "Add Interface" page on the OpenNMS administrator web UI
perl $OPENNMS_HOME/bin/send-event.pl \
--interface YOUR-OPENNMS-IP \
uei.opennms.org/internal/discovery/newSuspect
(don't forget to replace YOUR-OPENNMS-IP with the IP address of your OpenNMS
server.)
Next, go to the event list page in your OpenNMS web UI. You should see the
newSuspect event in the event browser, and will probably already see events related to
scanning the node as well.

B. Scanning an Address
When Provisiond receives a newSuspect event, it executes the configured detectors to
determine the presence of each service on the IP address provided by the event. It then
creates a node and interface representing the IP address, and adds any services that it
detects to that interface.
Note: detecting that a service exists is not necessarily the same as detecting that the
service is functional and working properly. For example, an HTTP server responding
with a 501 error is still detected as a valid HTTP service, even though it would be
considered non-functional by a user.
After the scan is complete, the node, interfaces, and services are written to the
database, and then OpenNMS events are sent to indicate that these new nodes,
interfaces, and services exist.
C.SNMP Scanning If the SNMP service was found, and is functioning correctly, then the
SNMP agent is scanned for additional IP addresses, physical interfaces, and other
information relating to the node.
Each new IP address that's discovered is scanned for services, just like the one from
the new Suspect event.
Configuring Access to SNMP Devices
By default, OpenNMS will scan a large variety of devices, using the default "public"
SNMP community string. This is like a password, which allows access to SNMP on the
device. In a secure environment, it is likely that your SNMP devices use a community
string other than "public," and you will need to configure OpenNMS to know how to
communicate with those devices. If the correct community name is not configured
before the scan has started, the SNMP service will not be detected on your device, and
additional SNMP scanning will not be performed.
snmpwalk -v2c -c YOUR-COMMUNITY-STRING YOUR-OPENNMS-IP system

CONCLUSION : Open NMS is a powerful tool to monitor services and devices in a


network.
Hence we have studied and successfully installed and configured open NMS. Even we
have studied to monitor different devices and services.

Thadomal Shahani Engineering College


Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO.12
Aim : To Install and configure log anlaysis tools.(Webalyzer & Awstats)
Objective :
1. To study and understand the log files.
2. To collect log files and analying it using open source tools such as Webalyzer and
Awstats.
A. Webalyzer :
The Webalizer is a fast, free web server log file analysis program. It produces highly
detailed, easily configurable usage reports in HTML format, for viewing with a standard web
browser.
Features :
• It is written in C to be extremely fast and highly portable.
• Handles standard Common logfile format (CLF) server logs & compressed logs may be used
directly
without the need for uncompressing.
• Generated reports can be configured from the command line, or more commonly, by the use of
one or more configuration files.
• Supports multiple International languages.
• Unlimited log file sizes and partial logs are supported, allowing logs to be rotated as often as
needed, and eliminating the need to keep huge monthly files on the system.
• Fully supports IPv4 and IPv6 addresses.
Installation & configuration of Webalyzer :
• If you are using Fedora Core or Cent Os, type the following command to install # yum install
Webalizer • If you are using Debian Linux Os, type the following command to install # aptget
install webalizer
• To configure Webalizer, copy /etc/webalizer.conf file to your webroot/stats directory. Type the
following commands:
# mkdir p /home/lighttpd/theos.in/stats
# cp /etc/webalizer.conf /home/lighttpd/theos.in/stats/webalizer.conf
• Now open /home/lighttpd/theos.in/stats/webalizer.conf file:
# vi /home/lighttpd/theos.in/stats/webalizer.conf
• Setup LogFile location: LogFile /var/log/lighttpd/theos.in/access.log
• Make sure LogType is set to Lighttpd’s Combined web server log format: LogType clf
• Setup statistics report directory where you want to put the output files:
OutputDir /home/lighttpd/theos.in/stats/out
• Setup the name of the history file: HistoryName /home/lighttpd/theos.in/stats/webalizer.hist
• Make sure you get stats for last 12 months: Incremental yes
• Specify the filename for saving the incremental data:
IncrementalName /webroot/home/lighttpd/theos.in/stats/webalizer.current
• Define the hostname of report: HostName theos.in
• Setup DNSCache file name. Use the same file name for all your domains. This will speed up
DNS name lookup (you need to create a directory /var/cache/webalizer):
DNS Cache /var/cache/webalizer/dns_cache.db
• To get accurate stats you need to hide your own site from stats: HideSite theos.in
• In addition, you need to hide your own site from referrals as it gives most referrals:

HideReferrer theos.in
• Save and close the file.
• Create a directory to store DNS cache file:
# mkdir p
/var/cache/webalizer
• Generate test stats:
$ webalizer c
/home/lighttpd/theos.in/stats/webalizer.conf
• Map /home/lighttpd/theos.in/stats/ directory to url: Since /home/lighttpd/theos.in/stats directory
is out of your default webroot (/home/lighttpd/theos.in/html) you will not able to see the stats by
visiting url
http://theos.in/stats/. You can take the help of Lighttpd's mod_alias to map urls. Open your
configuration file and type following line:
# vi /etc/lighttpd/lighttpd.conf
Append following config directives:
alias.url = (
"/stats/" => "/home/lighttpd/theos.in/stats/out/"
)
• Save and close the file. Restart the Lighttpd server:
# /etc/init.d/lighttpd restart
B. Awstat
AWStats is a free powerful tool that generates advanced web, streaming, ftp or mail server
statistics, graphically. This log analyzer works as a CGI or from command line and shows you all
possible information your log contains, in few graphical web pages.
Feature :
• Number of Visits, and number of Unique visitors.
• Visit duration and latest visits.
• Authenticated Users, and latest authenticated visits.
• Usage by Months, Days of week and Hours of the day (pages, hits, KB).
• Domains/countries (and regions, cities and ISP with Maxmind proprietary geo databases) of
visitor's hosts (pages, hits, KB, 269 domains/countries detected).
• Hosts list, latest visits and unresolved IP addresses list
• Most viewed, Entry and Exit pages.
• Most commonly requested File types.
• Web Compression statistics (for Apache servers using mod_gzip or mod_deflate modules).
• Visitor's Browsers (pages, hits, KB for each browser, each version, 123 browsers detected:
Web, Wap, Streaming Media browsers..., around 482 with the "phone browsers" database)
• Visitor's Operating Systems (pages, hits, KB for each OS, 45 OS detected).
• Robots visits, including search engine crawlers (381 robots detected).
• Track Downloads such as PDFs, compressed files and others.
• Search engines, Keywords and Phrases used to find your site (The 122 most famous search
engines are detected like Yahoo, Google, Altavista, etc...).
Installation & Configuration of AWstats:
Step # 1: Install awstats
Visit project web site to grab latest stable version.
# cd /tmp
# wget http://jaist.dl.sourceforge.net/sourceforge/awstats/awstats6.71.
noarch.rpm
# rpm ivh
awstats6.71.
noarch.rpm
Step # 2: Configure lighttpd
Open lighttpd.conf file and configure perl cgi access (see tutorial for more info):
# vi lighttpd.conf
Append following configuration directive:
alias.url = (
"/awstatsclasses" => "/usr/local/awstats/wwwroot/classes/",
"/awstatscss" => "/usr/local/awstats/wwwroot/css/",
"/awstatsicons" => "/usr/local/awstats/wwwroot/icon/",
"/awstats/" => "/usr/local/awstats/wwwroot/cgibin/",
"/icon/" => "/usr/local/awstats/wwwroot/icon/"
)
# provide awstats cgibin
access
$HTTP["url"] =~ "/awstats/" {
cgi.assign = ( ".pl" => "/usr/bin/perl" )
}
Save and close the file. Restart lighttpd:
# /etc/init.d/lighttpd restart
Step # 3: Configure domain
Make a copy of default configuration file awstats.model.conf as awstats.domain.com.conf:
# cd /etc/awstats
# cp awstats.model.conf awstats.theos.in.conf
Open config file:
# vi awstats.theos.in.conf
Make sure you set values as follows:
LogFile="/var/log/lighttpd/theos.in/access.log"
LogFormat=1
SiteDomain="theos.in"
DirData="/home/lighttpd/theos.in/stats/awstats"
Save and close the file. Create dataDir:
# mkdir p
/home/lighttpd/theos.in/stats/awstats
# chown lighttpd:lighttpd /home/lighttpd/theos.in/stats/awstats
Step 4: Generate stats
Type the following command at a shell prompt:
/usr/local/awstats/wwwroot/cgibin/
awstats.pl update
config=
domain.com
If your domain name is theos.in, enter:
# /usr/local/awstats/wwwroot/cgibin/
awstats.pl update
config=
theos.in
Step 5: View stats

Fire a web browser and type url:


http://serverip/
awstats/awstats.pl?config=domain.com
http://serverip/
awstats/awstats.pl?config=theos.in
http://theos.in/awstats/awstats.pl?config=theos.in
Conclusion :
Hence we have studied the log analysis using open source tools which are webalyzer and
Awstats.
Thadomal Shahani Engineering College
Electronics and Telecommunication Engineering Department
B.E. Sem-VIII (Elective) 2020
Network Management in Telecommunication(NMT)

EXPERIMENT NO: 13
Aim: Study of commercial network management tools: IBMNMS, GFILanguard, OpManager,
HPOpenView.
Objectives:
1.To study of commercial network management tools.
2.To study features of various commercial network management tools.
Requirements: computer.
1.Commercial network management tool : IBM NMS
IBM Network Management helps CSP and enterprise data centre and networking staff to
discover,visualize, detect, configure, activate, integrate and remediate your network.
 1.Network Management features:
1.One integrated set of network management tools that provides network discovery, monitoring,
event management and configuration.
2.Centralized visibility and reporting that encompasses complex, dispersed network
environments.
3.Network discovery and monitoring that can improve network availability and efficiencies.
4.Event and fault management that can help troubleshoot network issues and resolve them
quickly.
5.Network configuration capabilities that support efficient deployment and change management.
 2.One integrated set of network management tools
1.Provides near real-time, centralized monitoring of complex networks and technology domains
with scalability that can exceed millions of events per day.
2.Delivers detailed visibility into enterprise network operations, including cloud-based services
that use heterogeneous infrastructures and physical networks.
3.Collects network data from business applications, network devices, internet protocols, security
devices and other data sources for centralized management.
4.Supports data exchange and in-context navigation among Netcool/OMNIbus, Tivoli Network
Manager and Tivoli Netcool Configuration Manager.
5.Integrates with operating support systems (OSS) and other mission-critical workflow
applications to handle complex network operations.
 3.Centralized visibility and reporting
1.Offers an intuitive, role-based web portal that delivers network monitoring and management
information from a single location.
2.Consolidates data from varied sources into web-based dashboards with customizable displays
of events, service views and operational indicators.
3.Provides management reports that include cross-domain, multivendor events and detailed
network device information.
4.Delivers centralized visualization and reporting of current and historical data from IBM and
thirdparty sources.
 4.Network discovery and monitoring
1.Delivers near real-time information on network connectivity, availability, performance, usage
and inventory.
2.Generates network maps automatically and updates maps with network changes without
manual intervention.
3.Identifies bottlenecks and other network issues to enable faster resolution and help avoid
outages.
4.Captures logical connectivity information including virtual private network (VPN), virtual
local area network (VLAN), asynchronous transfer mode (ATM), frame relay and multiprotocol
label switching (MPLS) services.
5.Discovers devices and the physical port-to-port connectivity between them for more granular
monitoring of network operations.
 5.Event and fault management
1.Provides advanced correlation, automated diagnostics and root-cause analysis to help increase
availability and performance.
2.Enables automated event correlation, isolation and resolution to help identify and resolve
problems without manual intervention.
3.Identifies the causes of network downtime at the node and port levels to help reduce resolution
times.
4.Shows event rate baselines, predictions and trends that can identify underlying problems and
help you address issues proactively.
 6.Network configuration capabilities
1.Automates the configuration and management of network devices for cloud-based services.
2.Provides automated features for change management, security control, provisioning, policy-
based compliance and software upgrades.
3.Helps you manage a wide range of network devices, protocols, systems, business applications
and security devices.
4.Lets administrators view configuration change data and compliance data alongside other
network events to help stay informed of network changes.
2) Commercial network management tool : GFI LANguard Network Security Scanner
GFI LANguard Network Security Scanner (GFI LANguard N.S.S.) is a tool that allows network
administrators to quickly and easily perform a network security audit. GFI LANguard N.S.S.
creates reports that can be used to fix security issues on a network. It can also perform patch
management.
Unlike other security scanners, GFI LANguard N.S.S. will not create a 'barrage' of information,
which is virtually impossible to follow up on. On the contrary, it will help highlight the most
important information. It also provides hyperlinks to security sites to find out more about these
vulnerabilities.
Using intelligent scanning, GFI LANguard N.S.S. gathers information on machines such as
usernames, groups, network shares, USB devices, wireless devices and other information found
on a Windows Domain.
Apart from this, GFI LANguard N.S.S. also identifies specific vulnerabilities such as
configuration problems in FTP servers, exploits in Microsoft IIS and Apache Web Servers or
problems in Windows security policy configuration, plus many other potential security issues.
Key Features
1.Finds rogue services and open TCP and UDP ports
2.Detects known CGI, DNS, FTP, Mail, RPC and othervulnerabilities
3.Detects Wireless devices.
4.Detects Rogue or backdoor users
5.Detects Open shares and lists who has access to these shares together with their permissions.
6.Enumeration of groups, including group members.
7.Enumeration of users, services, etc.
8.Enumeration of USB devices.
9.Enumeration of network devices and identification of the device type (Wired, Wireless, virtual)
10.Can perform Scheduled Scans.
11.Automatically updates Security vulnerability checks.
12.Ability to detect missing hot fixes and service packs for theoperating system.
13.Ability to detect missing hot fixes and service packs for supported applications.

14.Ability to save and load scan results.


15.Ability to compare scans, to learn about new possible entry points.
16.Ability to patch OS (English, French, German, Italian, Spanish Windows Systems) & Office
applications (English, French, German, Italian, Spanish).
17.Operating system identification.
18.Live host detection.
19.Database, HTML, XSL and XML output.
20.SNMP & MS SQL auditing.
21.VBscript compatible scripting language to build custom vulnerability checks.
22.SSH Module which allows execution of security scripts on Linux/Unix machines.
23.Scans multiple computers at the same time
3) Commercial network management tool : ManageEngine OpManager
With the growing need for the network monitoring software in the IT industry, OpManager has
been built to satisfy the needs ofnetwork administrators by monitoring servers, routers, switches,
firewalls,
printers, critical services and applications from a singleconsole.
ManageEngine OpManager is a comprehensive network monitoring software that provides the
network administrators with an integrated console for managing routers, firewalls, servers,
switches, and printers. OpManager offers extensive fault management and performance
management functionality. It provides handy but powerful Customizable Dashboards and CCTV
views that display the immediate status of your devices, at-a-glance reports, business views etc.
OpManager also provides a lot of out-of-the-box graphs and reports, which give a wealth of
information to the network administrators about the health of their networks, servers and
applications.
OpManager's network monitoring functionality includes the following:
1.Network Monitoring: OpManager discovers switches, routers and firewalls in the network
during the network discovery automatically and monitors the critical parameters such as the
traffic rate, error and discards rate, buffer hits and misses and so on. You can get the availability
report of each port and interface. Using the Switch Port Mapper tool, you can get the list of
devices connected to each port of the switch. You can also create your own views and draw the
diagram to virtually represent your network and get the availability of the interfaces visually.
2.Server Monitoring: OpManager allows you to classify devices as servers and desktops. This
facilitates separating critical servers from end-user workstations and allows for more meaningful
management. You can manage Windows Event Logs and Windows Services.
3.Cisco IPSLA Monitoring: OpManager allows you to monitor the performance of your VoIP
networks with the Cisco IPSLA monitor.The Cisco IPSLA monitor is add-on feature and
monitors the various parameter like Latency, Jitter, MoS etc.
4.WAN Monitoring: OpManager provides complete solutions for monitoring your WAN links.
It checks for RTT, Latency and availability between the WAN links. The WAN monitor comes
as an add-on feature.
5.VMware/Hyper-V Monitoring: OpManager out-of-the-box monitors VMware and Hyper-V
servers. It monitors VMware servers via native APIs provided by VMware and Hyper-V servers
via WMI. All the VMware and Hyper-V hosts and VMs are grouped under Virtualization tab.
6.Applications and Services Monitoring: OpManager discovers and actively monitors services
and applications running in the servers. Out-of-the-box support is provided for services such as
Web, HTTPS, FTP, IMAP, LDAP, Telnet, MySQL, MS-Exchange, SMTP,
POP3, WebLogic, etc., and applications such as MSSQL, MS Exchange, Oracle and Lotus.
Special add-ons are available for monitoring Exchange 2000/2003/2007 and Active Directory
Services.
7.URL Monitoring: OpManager monitors your Web sites, both global URLs and URLs in the
servers, and promptly notifies you when the host becomes unavailable.
8.Script Monitoring: OpManager monitors the output of the custom scripts you execute on the
devices and raise alarm accordingly.OpManager parses the output of the custom scripts and
verifies it with the configured threshold condition. If the threshold is violated an alarm is raised
and the same is notified via the associated notification profile.
9.Fault Management: OpManager provides extensive solutions for monitoring Syslogs,
Eventlogs and current Processes running on the devices. OpManager detects faults in the
network through periodical status polling and generates color-coded alarms for the faults.
OpManager can also be configured to notify the administrator about the fault detected in the
network.
10.Performance Management: OpManager measures the performance of the network hardware
and software, such as the bandwidth, memory, disk and CPU utilization, and service response
time by collecting data at regular intervals. These data are provided in the form of reports and
graphs to the administrators. The threshold limits can be configured to pro-actively monitor the
critical parameters in the managed devices.
11.IT Automation Workflows: OpManager helps you automate repeated IT actions with
Workflow.
Workflow works on if-else based conditions which execute a set of actions when the given
condition is satisfied, else executes another set of actions. However, you can also execute actions
without any condition.
4) commercial network management tool : HP OpenView ManageX.
ManageX is a complementary product for environments that include systems running the
Windows NT/2000 operating system. ManageX warns you of potential application and systems
bottlenecks and lets you take automated corrective actions to solve problems.
1.HP OpenView ManageX provides:
1.Console messaging, which sends alert messages from any managed node to ManageX.
2.A sophisticated event correlation engine for consolidating critical event logs and triggering
automated corrective actions.
3.Logs of historical performance characteristics on any system. Data can be forwarded into SQL
for baseline analysis and creating trend reports.
2.Performance Management
Figuring out how to fine-tune your network’s performance can be a real challenge. To assist in
this task, NNM gathers and reports information on network performance, availability, inventory,
and exceptions. NNM can forward information to other HP OpenView products that provide
statistical analysis on the data.
The following is a brief summary of NNM information gathering features:
1.Automatically monitor your network’s status.
2.Collect historical MIB information about MIB objects and MIF events, store the data for trend
analysis, and graph collected data. This helps you determine performance trends.
3.Automatically set thresholds based upon standard deviations of historically collected data.
4.Automatically collect data and generate General Availability,Threshold Violations, General
Inventory, and Ping Response Time/Ping Retry reports.
5.Manage and modify reports using the NNM Report Configuration Interface.
3.HP OpenView Products’ Capabilities
HP OpenView IT/Administration. IT/Administration is a centralized system administration
system for UNIX operating system and PC platforms.
It includes:
1.Standards-based software distribution.
2.Administration of user accounts across system platforms.
3.Consolidated hardware and software inventory, stored on a machine-by-machine basis.
4.Object-oriented system administration functions for managing file systems, printers, etc.
DEPARTMENT OF ELECTRONICS & TELECOMMUNICATION ENGINEERING
5.Change management functions including simulation, change detection, notification, and
history.
Integration with NNM and IT/Operations.HP OpenView IT/Administration. IT/Administration
provides consolidated system administration for both UNIX operating systems and PC
environments, including user inventories and software management. Functions specific to
accounting management
include:
1.Intuitive interface for adding and removing users.
2.Automatic collection of resource utilization data.
3.UNIX operating systems and PC inventory consolidation.NNM does not directly address the
security management function.
Other HP OpenView Products’ Capabilities
HP OpenView IT/Administration. IT/Administration offers a synchronized, central data
repository to assure accuracy and security as the systems environment changes.
It includes:
1.Automatic flagging of unauthorized changes.
2.Enforcement of consistent configurations.
3.Management through firewalls.
4.Policy-based configuration.
5.Configuration change simulation.
Conclusion:
Thus,We have studied the key features various management tools and like IBMNMS,
GFILanguard,opManager and HPOpenView.This will help us to select proper network
management system.

You might also like