Mobile Based Network Monitoring System
Mobile Based Network Monitoring System
com
www.SeminarsTopics.com
www.SeminarsTopics.com
monitoring system to monitor and manage network according to predefined
security policy. Since last decade, network monitoring and its management have
been the biggest challenges for any distributed network infrastructure. In recent
years, mostly organizational network infrastructure used protocols like SNMP for
network management and monitoring purpose. These protocols follow centralized
approach of mobile based architecture. In current communication infrastructure,
many organizations follow centralized approach for network monitoring and
network management that is all the work of all the clients is been handled through
a single server and all the processing is done by server alone which creates extra
burden on network and huge amount of traffic at the central server thereby
reducing the performance of the network. So it created problems like limitation of
bandwidth, high network latency, lack of fault tolerance capability, etc. To reduce
these type of problems we have implemented “MOBILE BASED NETWORK
MONITORING SYSTEM”. The main objective of this system is the
implementation of separate monitoring system, implementation of mobile base
network monitor at every client in the network. Here in this approach, user of each
client machine will know that his machine is being monitored by network
administrator or someone else. In order to achieve confidentiality and integrity,
multi agent based architecture is developed which has various capabilities such as
file monitoring, client activities monitoring etc. This application has two modules,
server and client. Server will receive data/reports/logs from client module and will
perform the appropriate action. Client module will monitor each & every client pc
for any activity like,
1. Internet usage
2. Storage usage
3. File system
4. Media activities
www.SeminarsTopics.com
DISCUSSION
This tool would be installed on the server machine where commands from the user
would be received and accordingly various functions would be carried out. These
commands would be received at the client machine to perform the required activity
and provide necessary feedback to the server. The mobile device can be used to
monitor the server application by the user from a remote place. So the complete
system can be briefed up into three major parts:
1.Server: It receives the requests or control commands from the user
(administrator). These commands are then processed by the server for performing
the desired functions on the network. It also communicates with all the other client
destinations on the network and monitors the activities carried out by them. 2.
Client: A client is the primary unit of any network. A number of clients (controlled
by the main Server) work in co-ordination to complete the task as assigned to it by
the server. Every client is installed with a client Demon tool which continuously
keeps track of all the processes running on the client and performs the activities as
instructed by the server.
3. Mobile application : It is an application which is installed on the administrator's
Mobile base device. The basic use of this application is to allow the user to control
the activities of the network form any remote location. The user enters the
commands through an mobile based graphical user interface which are received by
the server for further processing. This application can also be used to monitor the
status of any client machine on the network.
System Architecture
Administrator sends his request through the client application on his mobile phone
via the internet service provider to the server. Server then recognizes the client
machine which administrator is supposed to monitor and extract data from locally
www.SeminarsTopics.com
cached data buffer where latest 15 sec data of every machine is updated or stored
and sends this info to the administrator as response. Administrator is provided with
a GUI based application in J2ME to send command message instantly without the
need to retype message every time. Server sends command to the clients like start
process, shutdown process, kill process, create, delete, send task list, compile code.
Through the GPRS service provider the communication is done with the ISP server
which communicates with the server and the server communicates with the client.
All clients are controlled and monitored by administrator via a series of messages.
The administrator controls the LAN through his mobile even he is at the remote
place. The clients cannot send back or communicate to the administrator the
communication is unidirectional it is not two way. Only the administrator can give
command to the clients. The mobile used can be any mobile which has a mobile
operating system in it. Also the administrator can check the network load on the
LAN by typing only a command. The administrator controls the LAN through his
mobile even he is at the remote place. The clients cannot send back or
communicate to the administrator the communication is unidirectional it is not two
way. Only the administrator can give command to the clients.The software
developed is a server based softwareapplication that provides ability to send and
receive commands through the network and communicates through standard
TCP/IP protocol. The software is capable of sending the notification to the network
administrator on his mobile device and thereafter the corrective action can be taken
by the network administrator by sending a notification in a prescribed format.
www.SeminarsTopics.com
Features Controlled By Cell Phone
Overall View: Get the list of all the clients in the LAN on your cell phone. Check
the current status of the clients by pinging .As soon as any client goes offline it’s
name is removed from the list.
Process List: Get the list of all the processes running on the remote machine.
Initiate Process: Start various processes on server or client machine.
Kill Process: Terminate the undesirable processes on the client machine.
Access files: You can read the drives, folders, files of any of the client machines /
the server machine from cell.
Open File: A small text file residing in any of the client or the server machine can
be opened in your cell phone.
Send messages: Send messages to clients, Server from cell.
Broadcast messages : Broadcast message over the entire network.
New File: Create a new document in the cell phone and save the same in either the
server or client machine.
Shut Down: to shutdown the desired client machine.
technologis to be used 1. Gprs technology
GPRS technology has become the most efficientcommunication system for
pushing the content on to the mobile devices. Usage of GPRS has grown
tremendously over the past few years and many GPRS based applications are
the most prevalent services in the wireless world today. GPRS are already being
used to control remote devices such as precision airconditioning systems,
building automation systems, monitoring the temperature and switching on/off
electronic devices. Therefore adding GPRS capabilities into your existing
network and managing the desktops and servers is the obvious step in going
forward.
www.SeminarsTopics.com
2. Andoroid Technology
One of the most widely used mobile OS these days is ANDROID.
Android[1] does a software bunch comprise not only operating system but
also middleware and key applications. Android is a powerful Operating
System supporting a large number of applications in Smart Phones. These
applications make life more comfortable and advanced for the users.
Hardware’s that support mobile is mainly based on
architecture platform. Some of the current features and specifications of
mobile base device are:
1. Application framework- it enables reuse and replacement of
components
2. Dalvik virtual machine- it is optimized for mobile device
3. Integrated browser- it is based on the open source web kit engine
4. Optimized graphics- it is peered by a custom 2D, 3D graphics
library.
5. SQLite
6. media support
7. GSM technology
8. Bluetooth, EDGE, 3G, Wi-Fi, camera, GPS, compass etc [5].
3. Mobile Agent
Mobile agents are programs being sent across the network from the client to
the server or vice versa. An agent that can be executed after being
transferred over the network will be called an agent host. A software agent is
a common name and describes a software entity that computerizes some of
the regular or difficult tasks on behalf of human or other agents. Mobile
agents can travel in network following their itinerary and carrying logic and
data to perform a set of management tasks at each of the visited nodes in
www.SeminarsTopics.com
order to meet their designed objectives. Mobile agents allow the
transformation of current networks into remotely programmable platforms.
Mobile agents are a powerful software interaction model that let a program
to be moved between hosts for remote execution. They are solutions for
managing distributed networks. To overcome the serious issue of network
traffic and to enhance the performance of network, a mobile agent is used.
To control and manage network traffic, network infrastructure requires some
intelligent system which should have the ability to give response
dynamically and take right decision. In order to reduce complexity and
improve reliablility, we need to follow decentralized approach where mobile
agents are the opinion. Mobile agents have the property of load balancing by
which they distribute the overall load among different nodes. Fig 1 shows
the client server communication architecture. This architecture consists of
one manager who generates no of mobile agents and sends it to the network
of managed node. They travel from one node to another autonomously and
asynchronously and perform monitoring and management task at each node
and collect network related information. After completing monitoring and
management task, mobile agents sent back to manager.
Figure 1. Mobile base Client server communication For Server:- Step 1: Start
Step 2: Run the Server.
www.SeminarsTopics.com
Step 3: Wait for the Client for Connection.
Step 4: Check for any incoming Connection from Client, if Yes, Register the client
and add it in the list of Connected Clients.
Step 5: Wait for the Information From Client.
Step 6: If any incoming information from Client then notifies Admin.
Step 7: Follow Steps 3 to 5 for more clients.
For Client:-
Step 1: Start.
Step 2: Check for the Server.
Step 3: If server is available then Connect and Go to Step 5.
Step 4: If not then Log Error and Go to Step 2.
Step 5: Monitor the client and send the information to server.
Step 6: If any action requested from server then execute that action.
Step 7: After executing the action notify server about it.
Step 8: Go to step 5.
4. Testing and Analysis
Successful Authentication using SHA(SECURED HASH ALGORITHM) .
The mobile application has tested for successful communication with network.
This test will includes automation and consistency of the connection and will be
conducted in the following way :
1) Mobile application will ask for password and administrator is authenticated
by unique identity key.
2) Once connection is established commands will be sent to the remote server.
Successful Implementation to monitor Client
1) A client in LAN network is monitored by administrator using his mobile phone.
2) A command on GUI based application is used to“KILL” i.e. to delete a process
from clients list .
www.SeminarsTopics.com
3 Server further decodes the command into actionevent to kill respective process.
4) A task completion message is sent by the server to the administrator.
5) Similar commands such as create, start, read, shutdown, log activity, delete,
send message , broadcast message, list files are successfully implemented
by administrator using mobile base device.
FACTORS TO BE CONSIDERED TO IMPLEMENT THE SYSTEM
1) The mobile (android) client and the server should be connected using GPRS
technology.
2) The only person who can communicate with the control module is the person
who will be successfully authenticated.
3) The Android based phone should have version 2.3 and above to successfully
run the application.
ADVANTAGES
1) High Throughput: It aims to develop an integrated software solution that
allows a network administrator to remotely monitor his LAN network by his cell
phone.
As speed of internet is high, performance of project increases.
2) Scalability: We can connect any number of clients to the server as per our
requirement.
3) Availability: - It is available any time anywhere irrespective of the presence
of network administrator near the LAN.
4. Reliability:-We can perform all functions required to administrate the LAN
remotely. It fails only when internet connection fails.
5. Transparency: Meet the Administrator’s requirements and satisfaction, since
perform all Functions required administrating the LAN remotely.Our System
is easily understandable to user.
www.SeminarsTopics.com
LIMITATIONS
1) The security model and algorithms of GPRS were developed in secrecy and
were never published.
2) The system does not support duplex communication between client and server.
Applications can be found in almost any segment or environment such as:
Security, Agriculture, Automatic meter reading, CCTV, Vending machines, Water
Treatment, Elevators and escalators, Pollution Control, Process Control, Personnel
Monitoring, Cargo tracking, Access control.
www.SeminarsTopics.com
CONCLUSION
This application will provide assistance to the system administrator in monitoring
the tasks and also provide file transfer. For preparing this paper we did the detailed
survey and comparative analysis of SMS based monitoring and email based
monitoring. After analyzing the pros and cons of the two above systems we came
on conclusion that mobile based network monitoring system is more efficient and
reliable.Through this study, concept of network monitoring, remote access and
other concepts related to this work, had been reflected. Besides that, the similar
works which previously had been done in this field, were investigated and
comparison between the implemented application and the existing tools had been
given. In addition, the process, procedures and conditions of the implemented
application, step-by-step, have been thoroughly explained
www.SeminarsTopics.com
REFERENCES
Vieira Junior, A.C. , Anido, M.L., ‘The Architecture of a Novel Tool for Network
Management Using GSM/GPRS Mobile Devices’, IEEE, 2004
Shashi Kumar N.R. , R Selvarani, Pushpavathi T.P.. GPRS Based Intranet Remote
Administration GIRA’
Nitin D. Shelokar, Dr. S.A.Ladhake, ‘Network Handle by mobile’, International
Journal of Computer Trends and Technology, May to June Issue 2011
Prof. Mamata Bhamare, Tejashree Malshikare, Renuka Salunke, Priyanka
Waghmare, ‘GSM Based LAN Monitoring and Controlling’, International Journal
of Modern Engineering Research (IJMER), Vol.2, Issue.2, Mar-Apr
2012
Prof. C. S. Nimodia, Prof. S. S. Asole,’A survey on Network Monitoring and
Administration using email and android phone’, International Journal of Emerging
Technology and Advanced Engineering, ISSN 2250- 2459, ISO 9001:2008
Certified Journal, Volume 3, Issue 4, April 2013,
Amol Poman , Mahesh Gundras, Prashant Pujari , GSM Based LAN Monitoring
System ,International Journal of Computer Science and Information Technologies,
Vol. 3 (3) , 2014,3848-3851
Haikao, T. and Simula , 1993 “ nural network traffic telephone system ‘ holma
www.ijcsit.com/docs/volume%203/ https://www.seminarstopics.com
www.SeminarsTopics.com