Data aggregation for multi-instance security management tools in telecommunication network
dc.contributor | Aalto-yliopisto | fi |
dc.contributor | Aalto University | en |
dc.contributor.advisor | Plaku, Ngadhnjim | |
dc.contributor.author | Khatiwada, Bipin | |
dc.contributor.school | Perustieteiden korkeakoulu | fi |
dc.contributor.supervisor | Ylä-Jääski, Antti | |
dc.date.accessioned | 2023-08-27T17:22:59Z | |
dc.date.available | 2023-08-27T17:22:59Z | |
dc.date.issued | 2023-08-21 | |
dc.description.abstract | Communication Service Providers employ multiple instances of network monitoring tools within extensive networks that span large geographical regions, encompassing entire countries. By collecting monitoring data from various nodes and consolidating it in a central location, a comprehensive control dashboard is established, presenting an overall network status categorized under different perspectives. In order to achieve this centralized view, we evaluated three architectural options: polling data from individual nodes to a central node, asynchronous push of data from individual nodes to a central node, and a cloud-based Extract, Transform, Load (ETL) approach. Our analysis leads us to the conclusion that the third option is most suitable for the telecommunication system use case. Remarkably, we observed that the quantity of monitoring results is approximately 30 times greater than the total number of devices monitored within the network. Implementing the ETL-based approach, we achieved favorable performance times of 2.23 seconds, 7.16 seconds, and 27.96 seconds for small, medium, and large networks, respectively. Notably, the extraction operation required the most significant amount of time, followed by the load and processing phases. Furthermore, in terms of average memory consumption, the small, medium, and large networks necessitated 323.59 MB, 497.34 MB, and 1668.59 MB, respectively. It is worth noting that the relationship between the total number of devices in the system and both performance and memory consumption is linear in nature. | en |
dc.format.extent | 73 | |
dc.format.mimetype | application/pdf | en |
dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/122925 | |
dc.identifier.urn | URN:NBN:fi:aalto-202308275266 | |
dc.language.iso | en | en |
dc.programme | Master’s Programme in Security and Cloud Computing (SECCLO) | fi |
dc.programme.major | Security and Cloud Computing | fi |
dc.programme.mcode | SCI3113 | fi |
dc.subject.keyword | Data aggregation | en |
dc.subject.keyword | ETL | en |
dc.subject.keyword | Monitorring Tool | en |
dc.subject.keyword | Network Monitoring | en |
dc.title | Data aggregation for multi-instance security management tools in telecommunication network | en |
dc.type | G2 Pro gradu, diplomityö | fi |
dc.type.ontasot | Master's thesis | en |
dc.type.ontasot | Diplomityö | fi |
local.aalto.electroniconly | yes | |
local.aalto.openaccess | yes |
Files
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- master_Khatiwada_Bipin_2023.pdf
- Size:
- 2.07 MB
- Format:
- Adobe Portable Document Format