Comprehensive Report: ONOS Implementation, Security, and Performance

Verified

Added on  2019/12/03

|22
|4475
|384
Report
AI Summary
This report details the implementation of the Open Network Operating System (ONOS) for Cognizant, a medium-sized company establishing a network in Manchester, UK. The report covers the selection of ONOS as the preferred NOS due to its open-source nature and suitability for Software Defined Networking (SDN). It outlines the hardware and software requirements for ONOS installation, including Ubuntu Linux, Java, and specific ONOS parameters. The report emphasizes the importance of disaster recovery planning, security policies, and performance monitoring. It describes the implementation plan, including IP address allocation, and security policies such as password management and patch management. The report also includes illustrations of the LAN setup, ONOS components, and performance monitoring processes, providing a comprehensive overview of the network implementation, security considerations, and performance management strategies.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Network Operating System
1
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Table of Contents
Introduction......................................................................................................................................4
TASK 1 Network operating system principles................................................................................4
1.1 Selection of NOS...................................................................................................................4
1.2 Disaster recovery availability and security in context of NOS..............................................5
1.3 ................................................................................................................................................6
TASK 2 ...........................................................................................................................................6
2.1 Detail plan of implementation of NOS .................................................................................6
2.2 Plan and evolution of disaster recovery plan for ONOS......................................................10
TASK 3..........................................................................................................................................11
3.1 & 3.2 Implementation and configuration of NOS...............................................................11
Installation of LAN network in Cognizant company ...............................................................13
TASK 4 manage network operating systems.................................................................................17
4.1 Performance baseline for the Manchester branch................................................................17
4.2 Performance monitoring report............................................................................................18
4.3 Describes the effective way to manage and monitor the performance of the network.......20
CONCLUSION..............................................................................................................................21
References .....................................................................................................................................22
2
Document Page
Illustration Index
Illustration 1: LAN setup...............................................................................................................14
Illustration 2: ONOS......................................................................................................................15
Illustration 3: Network graph and flow manager...........................................................................16
Illustration 4: Performance measurement process at Manchester..................................................18
Illustration 5: Performance monitoring .........................................................................................19
Illustration 6: Test performance monitoring .................................................................................20
3
Document Page
INTRODUCTION
Network operating system can be defined as a computer operating system that is
designed to support different workstations of computer. It mainly includes remote access,
connectivity of network devices as well as storage of data with fell network security. There are
different NOS used by organizations such as Artisoft's LANtastic, Banyan VINES, Novell's
NetWare, and Microsoft's LAN Manager etc. The present report is based on the Medium sized
company named as Cognizant. Company wants to establish a network system in Manchester,
UK and also wants to span their network on two floors. Moreover, the overall planning and
designing of the network connection is described in this report with the overall hardware and
software requirements. For this purpose, remote desktop support is essential and it is quite
essential for network manager to allocate the minimal amount of support. In addition to this,
Cognizant can expand their business operations by setting their performance baseline as well as
security and scaling aspects. Disaster recovery methods and security concerns are described in
the present report as per the selected network operating system.
TASK 1 NETWORK OPERATING SYSTEM PRINCIPLES
1.1 Selection of NOS
As a network manager it is quite essential for me to develop a best network operating
system for Cognizant through which company can expand their business operations effectively.
There are different types of operating system some of which are open source or free of charge. It
is the best way to provide a platform to company to operate different application software. With
the help of the Network operating system company can easily manage all their network resources
(Cheng and et.al, 2011). There are different types of NOS such as: Artisoft's LANtastic: This type of NOS Mainly supports a wide variety of computer
operating system. These are the different computer operating system such as Windows
XP, Windows NT etc. It is a user friendly NOS and people can easily go through its
installation process. It also provides a chatting feature that allows all network PCs to
communicate with each other. In addition to this, it is very easy and simple to maintain
and it does not requires any extra cost for maintenance.
4
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Novell's NetWare: This network operating system is totally based on the XNS protocol
architecture (Hart, 2013). There are various desktops available in the market and it
provide comprehensive support to all the system such as DOS, Windows, Macintosh,
UNIX etc. One of the main feature is that it supports the open source and licensed both
operating system. Open Network operating system: It is an SDN network operating system for all the
service providers. It was open sourced on December 5, 2014. It is basically architected
for performance, high availability, scale out and well defined abstractions and interfaced.
In addition to this, it can be stated that ONOS operating system comprises ON.Lab.
Microsoft LAN manager: LAN manager is a NOS that is designed and supported by the
Microsoft and runs under the Microsoft OS. This system also supports a good
multitasking functions as well as other OS such as DOS, Windows etc.
As per the given scenario, Cognizant uses ONOS (Open network operating system) is
being used as it is a open sources and it is based on the software define network. It bring out the
innovation and openness to the internet and cloud infrastructure with the help of the open source
tools and platforms. It helps the company in establishing local area network and sharing all the
information remotely. It also helps in distributing control platform for large scale networks and
focus on the reliability and scalability.
1.2 Disaster recovery availability and security in context of NOS
Nowadays in any organization one of the major concern is to go through the best network
availability. Disaster recovery can be define as a area through which company can go through the
security planning of all of the negative events. All such negative events includes anything that
puts an organization's operations at risk such as hacking, cyber attacks etc. At the time of using
any NOS the major problem is faced by the IT director is some sudden damages such as
physical damages to equipment like computer, routers as well as information loss. While using
ONOS company can get secure and effective disc backups (Karsai and et.al, 2011). In order to
overcome with the problems of sudden damages IT manager need to adopt best backup plans so
that they can keep their data secure. Managing and controlling the internal and external interrupts
in the network system is define as a process of disaster recovery. Moreover, it can be stated that
5
Document Page
security is the major concern that company should follow and for this purpose they need to adopt
various security controls in order to prevent unauthorized access. For this purpose, Cognizant has
developed a disaster recovery and business continuity plan.
1.3
There are different types of NOS available in the market. As per the given requirements
and considerations Cognizant has adopted ONOS. The operational need of company can be
fulfill by adopting this system. They can easily go through the proper network implementation
plan through which they can set up 30 and 40 computers on two different floors. This ONOS
provides them high features on low maintenance cost (LAWRENZ, 2013). There are different
service provider networks are available as WAN core backbone, Metro networks, Cellular access
networks, wired access etc. In the present scenario, the disaster recovery practices for current
NOS company can further use disaster recovery module. It can further managed by the database
cloud backups as well as services. It is essential to recognize all the threats and issues that
occurs. In order to prevent the damages a action plan should be developed. Security is the major
concern of any company as they need to keep their data secure and protect. With the help of
following several security issues company can manage all the damages and keep them secure.
The ON.Lab is a non profit organization founded by SDN investor which brings innovative ideas
from leading edge and deliver high quality service open source platforms. Due to the free
availability it is quite essential to keep full security. For this purpose Denial of services (DOS)
will be used when deserializing malformed packets in ONOS. When attackers try to exploit the
DOS flaw they only need to be able to send malicious crafted packets through the switched
controlled by ONOS. In addition to this, most of the SDN controller includes the host tracking as
well as allow host to migrate between different physical locations in the network.
TASK 2
2.1 Detail plan of implementation of ONOS
For the better implementation of the selected NOS it is quite essential for company to
fulfill all the requirements such as hardware, software requirements as well as best backup
methods and security policies that company should use.
6
Document Page
In order to install ONOS network operating system network administrator need to download
SPRING-OPEN version of the ONOS controller source code. In order to run this on the Ubutnu
Linux environment.
sudo apt-get install openjdk-7-jdk openjdk-7-doc openjdk-7-jre-lib
git clone
Download the tar file
tar xzf zookeeper-3.4.6.tar.gz
Run the controller set up
cd ~/spring-open
./onos.sh setup
Compile the controller setup
mvn clean
mvn compile
Run the controller
./onos.sh start
Hardware requirements: ONOS can also be described as a network controller which control all
the data networks with the help of the adapter layers.
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Dual Intel Xeon E5-2670v2 2.5GHz Processors - 10 real cores/20 hyper-threaded cores
per processor;
32GB 1600MHz DDR3 DRAM;
1Gbps Network interface card;
Ubuntu 14.04 OS;
Time synchronization among cluster nodes using ptpd.
Routers Switches (At the time of development of connection)
Software requirement
Java HotSpot(TM) 64-Bit Server VM; version 1.8.0_31
JAVA_OPTS="${JAVA_OPTS:--Xms8G -Xmx8G}"
onos-1.1.0 snapshot: commit a31e13471ee626abce2bc43c413fab17586f4fc3
Additional case-specific ONOS parameters
At the time of configuring ONOS network administrator should behave in a conservative
manner. They need to propose two features that could be applied to ONOS i.e.:
Application authentication
Permission based accessed control
c) It is essential to have a proper IP address allocation for all the computers and servers as well
as network printers in order to keep full security. For this purpose there are primary, secondary
as well as virtual IP address configuration is done by the analyst.
Primary IP address creates a mapping between the attached networks and the physical
interfaces on a system.
For 1st floor computers For 2nd floor computers For network printers
8
Document Page
192.168.0.1
192.168.0.2
192.168.0.3
192.168.0.4
192.168.0.59
Etc.
192.168.0.40
192.168.0.41
192.168.0.42
192.168.0. 43
192.168.0.44
Etc.
192.168.0.55
192.168.0.15
There are some of the most common key attributes through which ONOS can be developed best
for their service provider networks are: Northbound: This section provides the network graph with the view of entire network. Southbound: Well defined abstraction will be provided under this section in which
discovery, configuration and programmability will be defined. Southbound enables
ONOS to support the OpenFlow and a diversity of interfaced and devices.
Distributed core: It provides high performance, high availability and scale out.
This network operating system radically reshape the wide area network which provides network
with the potential to deliver the performance, scale, availability as well as core feature that we
value. For this purpose and for the practical implementation ON.LAB should be configured in an
effective manner. Under this several steps are followed:
Development
Demonstration
Deployment
Distribute
Support
9
Document Page
d) Security policy is the set of requirements which are required to set a path to a specific
objectives. There are various security policies followed by company while implementing the
NOS such as: Password management: System analyst needs to go through the proper password
management while using ONOS (Open network operating system) so that no one can
hack the passwords easily. For the better password management some points should be
followed by IT manager such as: Identification, authentication, multi-factor
authentication, strong authentication. At the time of log-in user needs to provide his
identity so anybody else cannot use it. Cognizant can easily keep all their customers and
employee's data secure by providing them unique passwords (Hennessy, 2013).
Patch management: It is the best strategy adopted by Cognizant through which they can
decide what patches should be applied on what applications. Successful patch
management policies can help with security audits and compliance audits.
Further, the planning needs to be implemented for file server management. After
adopting this network operating system there are various services provided by server such as
chatting and e-mail server. After implementing this NOS company can access all the data
remotely and easily communicate with each other on different floors. There are various other
services provided that file sharing, modification in database as well as uploading the content in
information system.
2.2 Plan and evolution of disaster recovery plan for ONOS
The disaster may be occur in the company due to external and internal factors and it
directly impact on the networking system of the company. The plan should be in such type which
run the company after human intervention or natural disasters. The following the plan helps the
company to make a plan for recovery (Peterson, 2011).
Stages Explanation
Identification and analysis of
disasters
Identify the risk or treats of disasters
Analyse the disasters
10
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Make the list of the disasters
Classify the risk by giving the
relative weight
Classify the risk according to the type such as external
risk (natural, suppliers, civil, human caused etc.), facility
risk (climate control, electricity, telephone, water, fire,
structure of the company etc), data system risk,
departmental risk etc.
After classification, give them weight
Doing the risk assessment Make the risk assessment form in which design the sub
group of risk (Disaster Recovery Plan Testing: Cycle the
Plan, Plan the Cycle, 2013).
Use the scale to give them ranking and calculate them
Determine the effect of
disasters
In this stage, company has to make the list of those
things and entities which mostly affected by the
disasters.
Evaluation When the plan is prepared, its time to evaluate the plan
of recovery
Evaluation is done by taking the feedback from the
employees about the plan.
Another method which can be used by the company for the recovery after the disaster
occurred. These tips will help the company to run the business after the disasters.
Creating the duplicate hardware and software so that they will be used in emergency.
Taking the backup of the previous data and store them at safe place (Rosen, 2014).
Outsource the some service such as making the web site of the company etc.
TASK 3
3.1 & 3.2 Implementation and configuration of NOS
In order to install ONOS proper installation process is followed by IT officer such as:
11
Document Page
1. Driver Installation: All the hardware and software requirements should be fulfilled such as:
Hardware Requirements
Dual Intel Xeon E5-2670v2 2.5GHz Processors - 10 real cores/20 hyper-threaded cores
per processor;
32GB 1600MHz DDR3 DRAM;
1Gbps Network interface card;
Ubuntu 14.04 OS; Time synchronization among cluster nodes using ptpd.
Software requirement
Java HotSpot(TM) 64-Bit Server VM; version 1.8.0_31
JAVA_OPTS="${JAVA_OPTS:--Xms8G -Xmx8G}"
onos-1.1.0 snapshot: commit a31e13471ee626abce2bc43c413fab17586f4fc3
Additional case-specific ONOS parameters
2. Pre-Installation Requirement: Some of the pre-installation requirement are as follows: some
supporting files are required such as:
Installation of Java, Maven and Karaf
Ubuntu Server 14.04 LTS 64-bit
2GB or more RAM
2 or more processors
Java 8 JDK (Oracle Java recommended; OpenJDK is not as thoroughly tested)
Apache Maven 3.3.1
git
bash (for packaging & testing)
Apache Karaf 3.0.3
12
Document Page
3. Installing ONOS Server:
After installing the Java building and packaging ONOS is required
Pacakging ONOS tar.gz or zip distribution Running ONOS locally on development machine
Slecting IP Adress
$ export ONOS_IP= 192.168.0.1
Selecting ONOS app to activate
$ export ONOS_APPS=drivers,openflow,proxyarp,mobility,fwd
Starting ONOS
$ ok clean
Creating local cluster configs for IP 10.1.9.247...
Setting up hazelcast.xml for subnet 10.1.9.*...
Staging builtin apps...
Customizing apps to be auto-activated: drivers,openflow,proxyarp,mobility,fwd...
Welcome to Open Network Operating System (ONOS)!
Running ONOS locally on the development machine
Deploying ONOS remotely using ONOS tools
Deploying ONOS using only the onos.tar.gz file
Installation of LAN network in Cognizant company
13
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
14
Illustration 1: LAN setup
Document Page
15
Illustration 2: ONOS
(Source: ON.LAB, 2014)
Document Page
3.3 Evaluation of disaster recovery plan using testing method
In order to protect all the data and keep the overall data secure a disaster recovery plan is
provided above for the Cognizant. In order to evaluate the disaster recovery plan there are several
testing methods are used by the analyst such as: Checklist testing: It evaluates the current and standard policies for disaster management.
In order to control the disaster all the activities that are taken into consideration should be
measured.
16
Illustration 3: Network graph and flow manager
(Source: ON.LAB, 2014)
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
Simulation testing: System check for standards and original process execution comes
under the simulation testing (Peterson, 2011). all the limitations or controlling of different
resources are attained in this method.
Full interruption testing: With the help of this testing method overall remote condition
of the network system is checked. It is quite costly test to implement and it requires high
efficiency to complete the tasks.
With the help of the above given testing method company can easily go through the better
disaster recovery.
TASK 4 MANAGE NETWORK OPERATING SYSTEMS
4.1 Performance baseline for the Manchester branch
Network administrator can measure the working conditions of a network infrastructure,
performance data and network metrics by using performance baseline approach. With help of
this, network engineer can identify anomalies in day to day network traffic and understand the
total network capacity of system. Network manager of medium size company can measure
performance of network operating system with help of preparing a single performance chart
based on various elements such as time-frame, memory pages, network interfaces and average
queue length etc (Hart, 2013). It is essential to recognize all the threats and issues that occurs
which help to improve the performance according to expected results. In order to prevent the
damages a action plan should be developed. Security is the major concern of any company as
they need to keep their data secure and protect. Network assessment is essential task for the
organization to measure and analysis of performance of network devices and applications are
used in developing network infrastructure at Manchester. Network manager of the company can
use Protocol analyser and network diagram applications tools for troubleshooting and analyses of
data traffic during the packets sent through different protocols. By using these tools, performance
of network devices such as switches, routers, hubs can be measured in terms of buffer
management, CPU, memory usage and throughput (Rosen, 2014).
17
Document Page
(Source: Nes, 2004)
Along with hardware devices performance of software used in networking system such as
e-mail and Telnet on the basis of bandwidth usage in a proper way. Performance of networking
system implemented at Manchester office can be measured in terms of various factors such as
cost, quality, time, reliability and speed of system in an appropriate manner. With help of
network assessment approach and preparing performance balance line for the system, network
manager of the company can overcome network related issues and helps company to review of
existing network infrastructure and issues in form of statistical report so that network capabilities
easily identified and network infrastructure can be set-up and implement at right time without
any delay (Saltzer, and Kaashoek, 2009). By continuous monitoring and overcome differences
present in existing and standards one, performance of NOS system can be improved.
4.2 Performance monitoring report
Performance monitoring report is prepared for displaying and monitoring the NOS
system performance. It provides detail information about various areas concerned with memory
available bytes, page file bites, system processor queue length, network interface, latency,
bandwidth and capacity of network used in developing network infrastructure at Manchester
18
Illustration 4: Performance
measurement process at Manchester
Document Page
office (Cheng and et.al, 2011). Safety policies and disaster recovery system are prepared to
overcome system failure related issues and boost -up the performance of the current system.
Monitoring report is considering during control the operational performance and analysis of
current inputs and output of NOS with standard one (Saltzer and Kaashoek, 2009).
By preparing the monitoring report, network manager of the company will be able to
meet increasing network size and speed requirements along with manage all components used in
current network system. Besides that testing and monitoring of NOS system is essential to detect
the unwanted access in the network and secure database systems and file server (Microsoft tech-
net, 2014). Network manager prepared proper documentation in which contains all information
19
Illustration 5: Performance monitoring
(Source: Network performances testing, 2015 )
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
regarding to people involved in testing and network set-up, devices usage in system, monitoring
tools use for measure network performance and issues arises in system and corrective actions
taken to overcome those issues etc.
4.3 Describes the effective way to manage and monitor the performance of the network
Operational efficiency of Cognizant company can be measured with help of systematic
evaluation of NOS system. Networking system can be upgraded through technology
advancement and effective use of file server and network components in a right manner. By
using different ways performance of the network can be measured that can be explored as
follows that can be used for developing the report for monitoring the performance:
Packet transfer delivery between sender to receiver are checked in terms of
acknowledgment received for each packet sending and receiving task.
By applying constraints and integrity, roles and responsibilities are assigned to network
users associated with network (Microsoft tech-net, 2014).
For evaluating the performance of NOS, various performance measurement tools and
testing principles are used in an appropriate manner.
20
Illustration 6: Test performance monitoring
(Source: Network performances testing, 2015)
Document Page
Monitoring and controlling over devices both hardware and software are required to
identify and overcome network related issues in a proper way.
By modifications in the areas in which system is lacking to meet the standard and
expectations.
By following these guidelines, modification plan can be proposed and implement in a
systematic manner (Cheng and et.al, 2011).
CONCLUSION
Network assessment play an important role in troubleshooting of existing system with
issues can pose serious problems as well as implement NOS system within the organization in an
effective way. From the research report, it can be concluded that monitoring and controlling of
NOS system is required to execute network system in a proper way. The current study
emphasized on the use of network operating system and file server services at the workplace. By
using backup plans and operation control systems, disaster management and network security
related issues were understood in a significant manner. With help of adequate resource utilization
and proper implementation of NOS system, firm can set-up network infrastructure in a proper
way.
21
Document Page
REFERENCES
Cheng, X., and et.al, 2011. Virtual network embedding through topology-aware node ranking.
ACM SIGCOMM Computer Communication Review, 41(2). Pp.38-47.
Haas, W. 2011. Light-weight communications on Intel's single-chip cloud computer processor.
ACM SIGOPS Operating Systems Review, 45(1). Pp.73-83.
Hart, C. 2013. Graph Theory Topics in Computer Networking. Sage publishes.
Hennessy, J. L. 2013. Computer organization and design: the hardware/software interface.
Newnes publishes.
Karsai and et.al, 2011. Small but slow world: How network topology and burstiness slow down
spreading. Physical Review E, 83(2). Pp.025-102.
LAWRENZ., W. 2013. CAN system engineering. Springer. Vob publishes.
Navarro, J. 2013. Solutions to the Computer Networking Challenges of the Distribution Smart
Grid. Communications Letters, IEEE, 17(3). Pp.588-591.
Oechslin, P., 2007. Computer System Security: Basic Concepts and Solved Exercises. EPFL
Press.
Peterson, L. L., 2011. Computer Networks: A Systems Approach. Elsevier.
Rosen, R. 2014. Internet control message protocol (ICMP). In Linux Kernel Networking. pp.37-
61.
Sarkar, N., 2006. Tools for Teaching Computer Networking and Hardware Concepts. Idea
Group Inc (IGI).
Zhang, L. 2010. A taxonomy of biologically inspired research in computer networking.
Computer Networks, 54(6). Pp.901-916.
Online
Disaster Recovery Plan Testing: Cycle the Plan, Plan the Cycle, 2013. [pdf]. Available through:
< http://www.sans.org/reading-room/whitepapers/recovery/disaster-recovery-plan-testing-cycle-
plan-plan-cycle-563/ > [Accessed on 12th February 2015].
22
chevron_up_icon
1 out of 22
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]