Professional Documents
Culture Documents
Bachelor of Technology
In
By
TURPU SHRAVANI
(Roll no. 19UP1A0479)
Submitted in
09652910002 009652910003
CERTIFICATE
This is to certify that the report work entitled “MOBILE BASED NETWORK
MONITORING SYSTEM” submitted in partial fulfillment of the requirement for the degree of
Bachelor of Technology in “ELECTRONICS AND COMMUNICATION ENGINEERING”, is a
bonafide seminar work carried out by Ms. TURPU SHRAVANI under my supervision and
guidance.
ACKNOWLEDGEMENT
I thank our technical seminar Guide, Mr. Vijay Kumar R.Urkude, Associate
Professor, for guiding me in collecting the topic information and completing the
presentation.
I would also like to express our sincere thanks to all the staff of Electronics and
Communication Engineering, VMTW, for their kind cooperation and timely help
during this period. Finally, we would like to thank our parents and friends who
have always stood by us whenever we were in need of them.
Page|4
ABSTRACT
The main objective of this system is the implementation of separate monitoring
system, implementation of mobile base network monitor at every client in the
network. Here in this approach, user of each client machine will know that his
machine is being monitored by network administrator or someone else. In order to
achieve confidentiality and integrity, multi agent based architecture is developed
which has various capabilities such as file monitoring, client activities monitoring
etc. This application has two modules, server and client. Server will receive
data/reports/logs from client module and will perform the appropriate action. Client
module will monitor each & every client pc for any activity.
Page|5
CONTENTS
Certificate 2
Acknowledgement 3
ABSTRACT 4
1. Introduction 6-7
2. Working Principle 8
3. System Architecture 9
7. Advantages 15
8. Limitations 15
9. Applications 15
10. Conclusion 16
11. References 17
Page|6
CHAPTER1:INTRODUCTION
Thus work aims at developing a system wherein the user can execute
various commands to control the activities of the network even when he is not
present at the actual site of the network using a mobile based application. The user
would enter the commands through the Mobile base device application which
would be sent to a remote server which would carry out the further functions. The
administrator of the network would be authenticated using SHA (Secure Hash
Algorithm) and then would gain the rights to monitor the network. The commands
would be forwarded to the server through the internet The network can be
controlled in two ways.One way is to enter the commands through the mobile
Page|7
device while the other way is to control the network directly through the server
which is a part of the network. The advancements and globalization in the field of
computer network have created many tribulations like security and network
overhead. To avoid these problems, network administrator has to use a mobile
base monitoring system to monitor and manage network according to predefined
security policy. Since last decade, network monitoring and its management have
been the biggest challenges for any distributed network infrastructure. In recent
years, mostly organizational network infrastructure used protocols like SNMP for
network management and monitoring purpose. These protocols follow centralized
approach of mobile based architecture. In current communication infrastructure,
many organizations follow centralized approach for network monitoring and
network management that is all the work of all the clients is been handled through
a single server and all the processing is done by server alone which creates extra
burden on network and huge amount of traffic at the central server thereby
reducing the performance of the network. So it created problems like limitation of
bandwidth, high network latency, lack of fault tolerance capability, etc. To reduce
these type of problems we have implemented “MOBILE BASED NETWORK
MONITORING SYSTEM”. The main objective of this system is the
implementation of separate monitoring system, implementation of mobile base
network monitor at every client in the network.
Here in this approach, user of each client machine will know that his
machine is being monitored by network administrator or someone else. In order to
achieve confidentiality and integrity, multi agent based architecture is developed
which has various capabilities such as file monitoring, client activities monitoring
etc. This application has two modules, server and client. Server will receive
Page|8
data/reports/logs from client module and will perform the appropriate action.
Client module will monitor each & every client pc for any activity like,
1. Internet usage
2. Storage usage
3. File system
4. Media activities
2. WORKING PRINCIPLE:
This tool would be installed on the server machine where commands from the user
would be received and accordingly various functions would be carried out. These
commands would be received at the client machine to perform the required activity
and provide necessary feedback to the server. The mobile device can be used to
monitor the server application by the user from a remote place. So the complete
system can be briefed up into three major parts:
2.Server: It receives the requests or control commands from the user
(administrator). These commands are then processed by the server for performing
the desired functions on the network. It also communicates with all the other client
destinations on the network and monitors the activities carried out by them.
2.Client: A client is the primary unit of any network. A number of clients
(controlled by the main Server) work in co-ordination to complete the task as
assigned to it by the server. Every client is installed with a client Demon tool
which continuously keeps track of all the processes running on the client and
performs the activities as instructed by the server.
3.Mobile application : It is an application which is installed on the administrator's
Mobile base device. The basic use of this application is to allow the user to control
the activities of the network form any remote location. The user enters the
Page|9
commands through an mobile based graphical user interface which are received by
the server for further processing. This application can also be used to monitor the
status of any client machine on the network.
3. System Architecture:
Administrator sends his request through the client application on his mobile phone
via the internet service provider to the server. Server then recognizes the client
machine which administrator is supposed to monitor and extract data from locally
cached data buffer where latest 15 sec data of every machine is updated or stored
and sends this info to the administrator as response. Administrator is provided with
a GUI based application in J2ME to send command message instantly without the
need to retype message every time. Server sends command to the clients like start
process, shutdown process, kill process, create, delete, send task list, compile code.
Through the GPRS service provider the communication is done with the ISP
server which communicates with the server and the server communicates with the
client. All clients are controlled and monitored by administrator via a series of
messages. The administrator controls the LAN through his mobile even he is at the
remote place. The clients cannot send back or communicate to the administrator
the communication is unidirectional it is not two way. Only the administrator can
give command to the clients. The mobile used can be any mobile which has a
mobile operating system in it. Also the administrator can check the network load
on the LAN by typing only a command. The administrator controls the LAN
through his mobile even he is at the remote place. The clients cannot send back or
communicate to the administrator the communication is unidirectional it is not two
way. Only the administrator can give command to the clients.The software
developed is a server based softwareapplication that provides ability to send and
P a g e | 10
Mobile agents are programs being sent across the network from the client to
the server or vice versa. An agent that can be executed after being
transferred over the network will be called an agent host. A software agent
is a common name and describes a software entity that computerizes some
of the regular or difficult tasks on behalf of human or other agents. Mobile
agents can travel in network following their itinerary and carrying logic and
data to perform a set of management tasks at each of the visited nodes in
order to meet their designed objectives. Mobile agents allow the
transformation of current networks into remotely programmable platforms.
Mobile agents are a powerful software interaction model that let a program
to be moved between hosts for remote execution. They are solutions for
managing distributed networks. To overcome the serious issue of network
traffic and to enhance the performance of network, a mobile agent is used.
To control and manage network traffic, network infrastructure requires
some intelligent system which should have the ability to give response
dynamically and take right decision. In order to reduce complexity and
improve reliablility, we need to follow decentralized approach where mobile
agents are the opinion. Mobile agents have the property of load balancing by
which they distribute the overall load among different nodes. Fig 1 shows
the client server communication architecture. This architecture consists of
one manager who generates no of mobile agents and sends it to the network
of managed node. They travel from one node to another autonomously and
asynchronously and perform monitoring and management task at each node
and collect network related information. After completing monitoring and
management task, mobile agents sent back to manager.
P a g e | 13
Step 1: Start
7. ADVANTAGES:
1)High Throughput: It aims to develop an integrated software solution that allows
a network administrator to remotely monitor his LAN network by his cell phone.
As speed of internet is high, performance of project increases.
2)Scalability: We can connect any number of clients to the server as per our
requirement.
3)Availability: - It is available any time anywhere irrespective of the presence of
network administrator near the LAN.
4)Reliability:-We can perform all functions required to administrate the LAN
remotely. It fails only when internet connection fails.
5)Transparency: Meet the Administrator’s requirements and satisfaction, since
perform all Functions required administrating the LAN remotely.Our System is
easily understandable to user.
8.LIMITATIONS:
1) The security model and algorithms of GPRS were developed in secrecy and
were never published.
2) The system does not support duplex communication between client and server.
9.APPLICATIONS:
Security, Agriculture, Automatic meter reading, CCTV, Vending machines, Water
Treatment, Elevators and escalators, Pollution Control, Process Control, Personnel
Monitoring, Cargo tracking, Access control.
CONCLUSION:
P a g e | 16
REFERENCES
Vieira Junior, A.C. , Anido, M.L., ‘The Architecture of a Novel Tool for Network
Management Using GSM/GPRS Mobile Devices’, IEEE, 2004
Shashi Kumar N.R. , R Selvarani, Pushpavathi T.P.. GPRS Based Intranet Remote
Administration GIRA’
Nitin D. Shelokar, Dr. S.A.Ladhake, ‘Network Handle by mobile’, International
Journal of Computer Trends and Technology, May to June Issue 2011
Prof. Mamata Bhamare, Tejashree Malshikare, Renuka Salunke, Priyanka
Waghmare, ‘GSM Based LAN Monitoring and Controlling’, International Journal
of Modern Engineering Research (IJMER), Vol.2, Issue.2, Mar-Apr
2012
Prof. C. S. Nimodia, Prof. S. S. Asole,’A survey on Network Monitoring and
Administration using email and android phone’, International Journal of Emerging
Technology and Advanced Engineering, ISSN 2250- 2459, ISO 9001:2008
Certified Journal, Volume 3, Issue 4, April 2013,
Amol Poman , Mahesh Gundras, Prashant Pujari , GSM Based LAN Monitoring
System ,International Journal of Computer Science and Information Technologies,
Vol. 3 (3) , 2014,3848-3851
Haikao, T. and Simula , 1993 “ nural network traffic telephone system ‘ holma