Document Type : Research Article


Networks Engineering Department, College of Information Engineering, Al-Nahrain University, Iraq


In this paper, we implement a Virtualized Network Management Laboratory named (VNML) linked to college campus network for educational purposes. This laboratory is created using Virtualbox virtualizer and GNS3 on Linux UBUNTU single HP DL380 G7 server platform. A total of 35 virtual devices (Routers, Switches and Virtual Machines) are created and distributed over virtualized campus network with seven network management tools configured and run. The proposed laboratory is aimed to overcome the limitations of network hardware existence in any educational facility teach network management subject in their curriculum. The other advantages include ease of managing the laboratory and overrides physical location setup within the same geographical area.


[1] Pekka Toivanen, “Server Virtualization”, Department of Information Technology, Lappeenranta University of Technology, October 2003.
[2] Manel Bourguiba, Kamel Haddadou, Kamel Haddadou and Guy Pujolle, “Improving network I/O virtualization for cloud computing”, IEEE Transactions on Parallel and Distributed Systems, Volume: 25, Issue: 3, March 2014.
[3] Fábio Fabian Daitx, Rafael Pereira Esteves and Lisandro Zambenedetti Granville, “On the use of SNMP as a management interface for virtual networks”, Integrated Network Management (IM) IEEE International Symposium, May 2011.
[4] Espen Braastad, “Management of high availability services using virtualization”, Department of Informatics, University of OSLO, May 2006.
[5] Dalibor Dobrilovic, Vesna Jevtic, Zeljko Stojanov and Borislav Odadzic, “Usability of virtual networklaboratoryinengineeringeducationandcomputer network course”, IEEE, Serbia, 2012.
[6] Evrim Guler, Suleyman Uludag, Murat Karakus and Stephen W. Turner, “Virtualized Lab Infrastructure on a Budget for Various Computing and Engineering Courses”, IEEE, USA 2012. [7] Marisol García-Valls, Tommaso Cucinotta and Chenyang Lu, “Challenges in real-time virtualization and predictable cloud computing”, Journal of Systems Architecture, August 2014.
[8] Oracle VM VirtualBox User Manual.
[9] V Meera, Meera Mary Isaac and C Balan, “Forensic acquisition and analysis of VMware virtual machine artifacts”, Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 IEEE International MultiConference, March 2013.
[10] Moritz Raho, Alexander Spyridakis, Michele PaolinoandDanielRaho,“KVM,XenandDocker: A performance analysis for ARM based NFV and cloud computing”, Information, Electronic and Electrical Engineering (AIEEE), 2015 IEEE 3rd Workshop on Advances, Nov. 2015.
[11] J. Sanders, “Linux, open source, and software’s future”, IEEE Software, Volume: 15, Issue: 5, August 2002.
[12] GNS3 Documentation, Release 1.4.5dev1, by GNS3 Team, March 2016.
[13] Mani Subramanian, Timothy A. Gonsalves and N. Usha Rani, “NETWORK MANAGEMENT Principles and Practice”, PEARSON, India, 2010.
[14] Andrea Bianco, Robert Birke, Fikru Getachew Debele and Luca Giraudo, “SNMP Management in a Distributed Software Router Architecture”, Communications (ICC) IEEE International Conference, June 2011.
[15] Per Kreuger and Rebecca Steinert, “Scalable in-network rate monitoring”, Integrated Network Management (IM) IFIP/IEEE International Symposium, May 2015.
[16] A.K.Y. Wong, An Chi Chen, N. Paramesh and P. Rav, “Ontology mapping for network management systems”, Network Operations and Management Symposium IEEE/IFIP, August 2004.
[17] ViniciusTavaresGuimaraes,GledersonLessados Santos, Guilherme da Cunha Rodrigues, Lisandro Zambenedetti Granville and Liane Margarida Rockenbach Tarouco, “A collaborative solution for SNMP traces visualization”, Information Networking (ICOIN) IEEE International Conference, April 2014.
[18] Jurgen Schonwalder and Vladislav Marinov, “On the impact of security protocols on the performance of SNMP”, IEEE Transactions on Network and Service Management, Volume: 8, Issue: 1, March 2011.
[19] Ya-Shiang Peng and Yen-Cheng Chen, “SNMPbased monitoring of heterogeneous virtual infrastructure in clouds”, Network Operations and Management Symposium (APNOMS) IEEE, September 2011.
[20] Monowar H. Bhuyan, D. K. Bhattacharyya and J. K. Kalita, “Network Anomaly Detection: Methods, Systems and Tools, IEEE Communications Surveys & Tutorials, Volume: 16, Issue: 1, June 2013.
[21] Amir R. Khakpour and Alex X. Liu, “Quantifying and Querying Network Reachability”, Distributed Computing Systems (ICDCS), 2010 IEEE 30th International Conference, June 2010. [22] Corrado Possieri and Andrew R. Teel, “Weak reachability and strong recurrence for stochastic directed graphs in terms of auxiliary functions”, Dec. 2016.
[23] Nabanita Mandal and Sonali Jadhav, “A survey onnetworksecuritytoolsforopensource”,Current Trends in Advanced Computing (ICCTAC), IEEE International Conference, March 2016.
[24] Gabriel Iuhasz and Ioan Dragan, “An Overview of Monitoring Tools for Big Data and Cloud Applications”, Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2015 17th IEEE International Symposium, Sept. 2015.
[25] Smokeping documentation. Available:, last visited 2nd of March 2017 8:40 AM.
[26] Eduard Luchian, Paul Docolin and Virgil Dobrota, “Advanced monitoring of the OpenStack NFV infrastructure: A Nagios approach using SNMP”, Electronics and Telecommunications (ISETC), 2016 12th IEEE International Symposium, Oct. 2016.
[27] C. C. Li, Z. S. Ji, F. Wang, P. Wang, Y. Wang and Z.C. Zhang, “The network monitoring system based on Cacti for EAST”, Real Time Conference (RT), 2016 IEEE-NPSS, June 2016.
[28] Samira Homayouni, Vaclav Raida and Philipp Svoboda. “CMPT: A methodology of comparing performance measurement tools:, Ultra-Modern Telecommunications and Control Systems and Workshops (ICUMT), 2016 8th IEEE International Congress, Oct. 2016.
[29] MRTG documentation. Available:, last visited 2nd of March 2017 8:45 AM.
[30] Ubuntu Server Guide. Available:, last visited 2nd of March 2017 9:00 AM.
[31] Putty User Manual. Available: sgtatham/putty/0.63/htmldoc/ , last visited 2nd of March 2017 9:15 AM.
[32] Golap Kanti Dey, Md. Mobasher Ahmed and Kazi Tanvir Ahmmed. “Performance analysis and redistribution among RIPv2, EIGRP & OSPF Routing Protocol”, Computer and Information Engineering(ICCIE),20151stIEEEInternational Conference, Nov. 2015.
[33] Daniel J. Barrett, Richard E. Silverman, and Robert G. Byrnes, “SSH, the Secure Shell the Definitive Guide”, 2nd edition, O’REILLY, May 2005.