QUANTUM NETWORK MANAGEMENT AND MONITORING SUBSYSTEM

SKU0017
DESCRIPTION

The Quantum Network Management and Monitoring Subsystem is a software suite designed to manage and monitor geographically distributed telecommunication networks, including quantum networks. The subsystem consists of a number of software components (software agents) in the form of virtual machines. It is based on open-source technologies and projects, including Gentoo Linux OS, Zabbix, GLPI, PostgreSQL, Graylog, OpenLDAP, Rabbitmq, and others.

SUBSYSTEM COMPONENTS:

  • Web interface for the administrator’s automated workspace
  • Management subsystem
  • Monitoring subsystem: The number of parameters is measured in thousands; any logical combination of parameters can be used to generate alerts with varying levels of severity
  • Technical accounting/inventory subsystem (including descriptions, costs, acquisitions, contracts, procurement and repair personnel, etc.)
  • External system interaction subsystem with the ability to integrate with the OSS stack
  • Access control subsystem
  • Event logging subsystem

DISPLAYED DATA:

  • Architecture of the monitored network
  • Status of connections between network nodes
  • Status of network nodes
  • Telemetry of quantum communication parameters
  • Network availability coefficient (calculated over a specified time interval)
  • Informational messages for administrators
  • Detailed data on each network object: CPU load, RAM, disk status, network interface traffic, temperatures, ICMP ping availability, uptime, as well as many specific parameters such as UPS data (battery charge, voltage, power, etc.)
  • The ability to add new parameters available via SNMP
  • Periodic checks (with configurable intervals) and administrator notifications

ADVANTAGES OF THE DEVELOPMENT

  • Software components consist of separate software agents, which operate in an isolated environment (a significant advantage during development and operation) in the form of virtual machines
  • Interaction between software components is carried out via a specially developed protocol
  • Zero-trust principle at the interaction points between different components of the subsystem
  • Data transmissions between components are encrypted