Olusola Aminat Ayomide: A Seminar Report On Mobile Based Network Monitoring System

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 8

A

SEMINAR REPORT ON

MOBILE BASED NETWORK MONITORING SYSTEM

Prepared By

OLUSOLA AMINAT AYOMIDE

(CS/ND/P19/3219)

(APPLIED SCIENCE)

DEPARTMENT OF COMPUTER SCIENCE

SCHOOL OF APPLIED SCIENCE

P.M.B 420, OFFA KWARA STATE


ABSTRACT
Mobile devices are becoming essential for today's life. In developed countries, about half of the people have
a Smartphone, resulting in millions of these electronic devices. Android is the most popular operating system
for Smartphones and other electronic devices such as tablets. Hence, for network administrators, it is
essential to start managing all the Android based devices. Network is formed by the collection or group of
computers. While in office is an easy task to manage and control the activities of the network. A remote
LAN network can be controlled by a user from anywhere using a mobile based application (running on
ANDROID operating system). The necessity of such a system arises when the user is unavailable at the
actual site of the network. In such a case, to monitor and control the various activities of the network, a
wireless and user friendly interface needs to be created through which the user can execute different
commands to control the various activities of the network.
INTRODUCTION
How a days, the demands of user can be available at everywhere at every time simultaneously because of
smart phones have grown significantly in terms of both processing and user interface. Hence in a smart
phone challenging call for present concurrent everywhere applications to be organized. The plan with the
mobile handsets and smart phones are to transport the valuable services apart from the basic communication.
Due to new activities in current times and quick development of businesses, it has become vital to find out
latest resolution to handle the different technical setups used in such organizations. Each association has its
own set of communication networks used for distribution of information either within the organizational
limits or with other parties. The survival of such a network demands for a well-designed and professional
system to control and monitor the different activities of the network. Occasionally it develops into essential
to handle the network from remote places also. Monitoring of network is nothing but the information
gathering function of network management. Network monitoring applications are formed to gather data for
network management applications. The gathering of useful information from different parts of the network is
the reason of network monitoring so that the network can be controlled using the collected information and
managed. In remote locations the majority of the network devices are located. These devices do not typically
have openly connected terminals so that network management application cannot monitor their statuses
easily. Thus, network monitoring techniques are developed to permit network management applications to
confirm the states of their network devices. As more and more network devices are used to assemble bigger
networks, network monitoring techniques are stretched to monitoring networks as a whole.
SYSTEM OBJECTIVES
Features controlled by the proposed system are as follows:
 Net View: Get in your cell phone, the list of entire client’s in LAN. Keep pinging every time to check
the latest status of the PC’s. Anytime, the PC goes offline, its name is removed from the list.
 Process List: Get the list of all the processes running on the remote machine.
 Read: You can read the drives, folders, files of any of the client machines / the server machine from
cell.
 Open File: A small text file residing in any of the client or the server machine can be opened in your
cell phone.
 Broadcast messages: Broadcast messages to clients, Server from cell.
 New File: Create a new document in the cell phone and save the same in either the server or client
machine.
 Activate Process: Activate different processes in either the server machine or any of the client’s.
 Kill Process: Kill the desired processes on either the server or clients.
 Shut Down: The client machines from mobile.

ARCHITECTURAL DIAGRAM OF PROPOSED SYSTEM


Administrator sends his request through his mobile phone to the server. Server then recognizes the client
machine which administrator wants to monitor and control.
Administrator is provided with a GUI based application in Android phone to send command instantly.
Server sends command to the client like start process, shut down process, kill process, create, delete file,
Process List.
Through the Android service provider the communication is done with the mobile phone which
communicates with server and server communicates with the clients. All clients are controlled and
monitored by administrator. The administrator controls the LAN through his mobile phone even he is at the
remote place. The administrator also checks the load on the LAN. If server fails in this model then Client can
communicate to admin through mobile phones.
INTERFACES

HARDWARE INTERFACE
Mobile Devices
The external hardware interface will support mobile devices, such as smart phones and LAN network.
External Storages
The product will support transparent connections with external hard drives in order to support automatic
archiving capability.

SOFTWARE INTERFACE
Operating System
The product will work with Android 2.1 and above.
Integrated Commercial Components
The system will interact with web application programming interfaces (API) of third party services, such as
HTML5.

FLOW OF THE APPLICATION


On entering the application the welcome screen would be displayed. This screen would simply have the
application name and logo. Then user can control LAN network via AT command or using menu driven
commands.
Suppose we are considering the File transfer function. In this client wants any file from the server then he
sends request to the administrator. Then admin will check for that requested file and allows server to send
that file. Then server will send that file to the respectives client.
If administrator notices that any user or client is doing unauthorized access to the system then he wants to
Shut down that client’s machine then he simply does that by Shut down AT command. After receiving that
command from admin the client’s machine will be automatically turn offed.
We can perform or implement various operations like net view, kill process, file transferring, Process view
and message broadcasting.
The SQLite Database is used for the storage purpose. In this it has the clients as well as administrator details.
Any unauthorized person cannot handle a LAN.
The Following Figure shows the flow of the application.

FUTURE WORKS
The future enhancements in the application include LAN monitoring and control whenever the administrator
is out of station. This application reduces the time as well as efforts of administrator.

APPLICATIONS OF PROPOSED SYSTEM


 LAN monitoring at the University/college level can be used for monitoring, logging and retention of
network packets that traverse University networks.
The goal of this project is to maintain confidentiality, integrity availability of the university network
infrastructure and information assets.
 LAN monitoring at the office level can be used to monitor the office LAN by the administrator at any
time if at a particular point he/she cannot be present there. He/she does not have to depend on any
third party information regarding the LAN and can instead check the LAN status himself using his
mobile. LAN monitoring at the malls is used to monitor all information of malls by administrator at
any time if at particular time she/she cannot be present there.
CONCLUSIONS
This application will provide assistance to the system ad-ministrator in monitoring the task. Due to wide use
of android devices, this application is developed for all devices having android operating system and later
and it provides mobility for users for controlling their computer desktops from remote place over internet
through various functions such as view running process, run process, end process, shutdown system, create
file, view file, print file, mail file. Thus the extended scope of this system will prove to be helpful in
providing mo-bility and accessing the remote Server over the internet in feas-ible and scalable way.
REFERENCES

[1] Per Storm. M2M - Makin Till Maskin - Kommunikation”,2001. http://www.atomerochbitar .se/- m-
m.html.

[2] Bluetooth SIG (Special Interest Group) Home Page. http://www.bluetoothsig.org/.

[3] ZDNet. TI launches sub-$5 Bluetooth chipset, October2001. http://news.zdnet.co.uk/story/- 0,,t269-


s2097647,00.html.

[4] DECT Forum Home Page. http://- www.dectweb.com/dectforum/.

[5] IEEE. IEEE Std 802.11b-1999January2000. http://standards.ieee.org/reading/ieee/-std/lanman/802. 11b-


1999.pdf.

[6] Infrared Data Association (IrDA) Home Page.http://www.irda.org/.

[7] Road Vehicles – Interchange of Digital Information– Controller Area Network (CAN) for High Speed
Communications, February 1992. ISO/DIS 11898.

[8] K. Larsen, P. Peterson, and W. Yi. UppAalinaNutshell. Springer International Journal of Software Tools
for Technology Transfer, 1(1+2), 1997.
http://www.docs.uu.se/docs/- rtmv/papers/lpwsttt97.pdf.

[9] Transmission Control Protocol (TCP): InternetRFC793. http://rfc.net/rfc793.html.

[10] Internet Protocol (IP); Internet RFC 791.http://rfc.net/rfc0791.html.

[11] WAP Forum. WAP Architecture.

[12] WAP Forum. Wireless Application Protocol.Wireless Markup Language Specification.

You might also like