You are on page 1of 17

Page|1

MOBILE BASED NETWORK MONITORING


SYSTEM
A
SEMINAR REPORT

Submitted in the partial fulfillment of the requirement for the award


Of the degree of

Bachelor of Technology
In

“ELETRONICS & COMMUNICAION ENGINEERING”

By

TURPU SHRAVANI
(Roll no. 19UP1A0479)

Submitted in

DEPARTMENT OF ELECTRONICS AND


COMMUNICATION ENGINEERING
VIGNAN’S INSTITUTE OF MANAGEMENT AND
TECHNOLOGY FOR WOMEN
(Affiliated to Jawaharlal Nehru Technological University)
Kondapur(V), Ghatkesar Mandal, Medchel Dt.
Telangana 501301
Page|2

09652910002 009652910003

Department of Electronics and Communication Engineering


VIGNAN’S INSTITUTE OF MANAGEMENT AND TECHNOOGY FOR
WOMEN

CERTIFICATE

This is to certify that the report work entitled “MOBILE BASED NETWORK
MONITORING SYSTEM” submitted in partial fulfillment of the requirement for the degree of
Bachelor of Technology in “ELECTRONICS AND COMMUNICATION ENGINEERING”, is a
bonafide seminar work carried out by Ms. TURPU SHRAVANI under my supervision and
guidance.

Name of SEMINAR CO_ORDINATOR HEAD OF THE DEPARTMENT


SIGNATURE with date SIGNATURE with date
Page|3

ACKNOWLEDGEMENT

Self-confidence, hard work, commitment and planning are essential to carry-out


any task. Possessing these qualities is sheer waste, if an opportunity does not exist.
So, I wholeheartedly thank Dr.G.Apparao Naidu, Principal, and Mr. P.Hari
Krishna, Head of the Department, Electronics and Communication Engineering for
their encouragement, support and guidance in carrying out the seminar.

I thank our technical seminar Guide, Mr. Vijay Kumar R.Urkude, Associate
Professor, for guiding me in collecting the topic information and completing the
presentation.

I would also like to express our sincere thanks to all the staff of Electronics and
Communication Engineering, VMTW, for their kind cooperation and timely help
during this period. Finally, we would like to thank our parents and friends who
have always stood by us whenever we were in need of them.
Page|4

ABSTRACT
The main objective of this system is the implementation of separate monitoring
system, implementation of mobile base network monitor at every client in the
network. Here in this approach, user of each client machine will know that his
machine is being monitored by network administrator or someone else. In order to
achieve confidentiality and integrity, multi agent based architecture is developed
which has various capabilities such as file monitoring, client activities monitoring
etc. This application has two modules, server and client. Server will receive
data/reports/logs from client module and will perform the appropriate action. Client
module will monitor each & every client pc for any activity.
Page|5

CONTENTS

Certificate 2

Acknowledgement 3

ABSTRACT 4

1. Introduction 6-7

2. Working Principle 8

3. System Architecture 9

4. Features Controlled By Cell Phone 10

5. Technologies Used 10-13

5.1 Gprs technology


5.2 Android Technology
5.3 Mobile Agent
5.4 Testing and Analysics

6. Factors To Be Considered To Implement The System 14

7. Advantages 15

8. Limitations 15

9. Applications 15

10. Conclusion 16

11. References 17
Page|6

CHAPTER1:INTRODUCTION

Mobile network monitoring system is a method in which a remote LAN network


can be controlled by a user from anywhere using a mobile based application. The
necessity of such a system arises when the user in unavailable at the actual site of
the network. In such a case, to monitor and control the various activities of the
network, a wireless and user friendly interface needs to be created through which
the user can execute different commands to control the various activities of the
network. Due to rapid growth of businesses and new enterprises in recent times, it
has become important out find new solutions to manage the various technical
setups used in such organizations. Each organization has its own set of
communication networks used for sharing information either with other parties or
within the organizational limits. The existence of such a network demands for a
well planned and efficient system to control and monitor the various activities of
the network. Sometimes it becomes necessary to manage the network from remote
places also.

Thus work aims at developing a system wherein the user can execute
various commands to control the activities of the network even when he is not
present at the actual site of the network using a mobile based application. The user
would enter the commands through the Mobile base device application which
would be sent to a remote server which would carry out the further functions. The
administrator of the network would be authenticated using SHA (Secure Hash
Algorithm) and then would gain the rights to monitor the network. The commands
would be forwarded to the server through the internet The network can be
controlled in two ways.One way is to enter the commands through the mobile
Page|7

device while the other way is to control the network directly through the server
which is a part of the network. The advancements and globalization in the field of
computer network have created many tribulations like security and network
overhead. To avoid these problems, network administrator has to use a mobile
base monitoring system to monitor and manage network according to predefined
security policy. Since last decade, network monitoring and its management have
been the biggest challenges for any distributed network infrastructure. In recent
years, mostly organizational network infrastructure used protocols like SNMP for
network management and monitoring purpose. These protocols follow centralized
approach of mobile based architecture. In current communication infrastructure,
many organizations follow centralized approach for network monitoring and
network management that is all the work of all the clients is been handled through
a single server and all the processing is done by server alone which creates extra
burden on network and huge amount of traffic at the central server thereby
reducing the performance of the network. So it created problems like limitation of
bandwidth, high network latency, lack of fault tolerance capability, etc. To reduce
these type of problems we have implemented “MOBILE BASED NETWORK
MONITORING SYSTEM”. The main objective of this system is the
implementation of separate monitoring system, implementation of mobile base
network monitor at every client in the network.

Here in this approach, user of each client machine will know that his
machine is being monitored by network administrator or someone else. In order to
achieve confidentiality and integrity, multi agent based architecture is developed
which has various capabilities such as file monitoring, client activities monitoring
etc. This application has two modules, server and client. Server will receive
Page|8

data/reports/logs from client module and will perform the appropriate action.
Client module will monitor each & every client pc for any activity like,

1. Internet usage
2. Storage usage
3. File system
4. Media activities

2. WORKING PRINCIPLE:
This tool would be installed on the server machine where commands from the user
would be received and accordingly various functions would be carried out. These
commands would be received at the client machine to perform the required activity
and provide necessary feedback to the server. The mobile device can be used to
monitor the server application by the user from a remote place. So the complete
system can be briefed up into three major parts:
2.Server: It receives the requests or control commands from the user
(administrator). These commands are then processed by the server for performing
the desired functions on the network. It also communicates with all the other client
destinations on the network and monitors the activities carried out by them.
2.Client: A client is the primary unit of any network. A number of clients
(controlled by the main Server) work in co-ordination to complete the task as
assigned to it by the server. Every client is installed with a client Demon tool
which continuously keeps track of all the processes running on the client and
performs the activities as instructed by the server.
3.Mobile application : It is an application which is installed on the administrator's
Mobile base device. The basic use of this application is to allow the user to control
the activities of the network form any remote location. The user enters the
Page|9

commands through an mobile based graphical user interface which are received by
the server for further processing. This application can also be used to monitor the
status of any client machine on the network.

3. System Architecture:
Administrator sends his request through the client application on his mobile phone
via the internet service provider to the server. Server then recognizes the client
machine which administrator is supposed to monitor and extract data from locally
cached data buffer where latest 15 sec data of every machine is updated or stored
and sends this info to the administrator as response. Administrator is provided with
a GUI based application in J2ME to send command message instantly without the
need to retype message every time. Server sends command to the clients like start
process, shutdown process, kill process, create, delete, send task list, compile code.
Through the GPRS service provider the communication is done with the ISP
server which communicates with the server and the server communicates with the
client. All clients are controlled and monitored by administrator via a series of
messages. The administrator controls the LAN through his mobile even he is at the
remote place. The clients cannot send back or communicate to the administrator
the communication is unidirectional it is not two way. Only the administrator can
give command to the clients. The mobile used can be any mobile which has a
mobile operating system in it. Also the administrator can check the network load
on the LAN by typing only a command. The administrator controls the LAN
through his mobile even he is at the remote place. The clients cannot send back or
communicate to the administrator the communication is unidirectional it is not two
way. Only the administrator can give command to the clients.The software
developed is a server based softwareapplication that provides ability to send and
P a g e | 10

receive commands through the network and communicates through standard


TCP/IP protocol. The software is capable of sending the notification to the
network administrator on his mobile device and thereafter the corrective action can
be taken by the network administrator by sending a notification in a prescribed
format.

4.Features Controlled By Cell Phone:


Overall View: Get the list of all the clients in the LAN on your cell phone. Check
the current status of the clients by pinging .As soon as any client goes offline it’s
name is removed from the list.
Process List: Get the list of all the processes running on the remote machine.
Initiate Process: Start various processes on server or client machine.
Kill Process: Terminate the undesirable processes on the client machine.
Access files: You can read the drives, folders, files of any of the client machines /
the server machine from cell.
Open File: A small text file residing in any of the client or the server machine can
be opened in your cell phone.
Send messages: Send messages to clients, Server from cell.
Broadcast messages : Broadcast message over the entire network.
New File: Create a new document in the cell phone and save the same in either the
server or client machine.
Shut Down: to shutdown the desired client machine.
5.Technologis to be used:
5.1 Gprs technology:

GPRS technology has become the most efficientcommunication system for


pushing the content on to the mobile devices. Usage of GPRS has grown
tremendously over the past few years and many GPRS based applications are
the most prevalent services in the wireless world today. GPRS are already
being used to control remote devices such as precision airconditioning systems,
P a g e | 11

building automation systems, monitoring the temperature and switching on/off


electronic devices. Therefore adding GPRS capabilities into your existing
network and managing the desktops and servers is the obvious step in going
forward.

5.2 Andoroid Technology:

One of the most widely used mobile OS these days is ANDROID.


Android[1] does a software bunch comprise not only operating system but
also middleware and key applications. Android is a powerful Operating
System supporting a large number of applications in Smart Phones. These
applications make life more comfortable and advanced for the users.
Hardware’s that support mobile is mainly based on
architecture platform. Some of the current features and specifications of
mobile base device are:
1. Application framework- it enables reuse and replacement of
components.
2. Dalvik virtual machine- it is optimized for mobile device.
3. Integrated browser- it is based on the open source web kit engine
4. Optimized graphics- it is peered by a custom 2D, 3D graphics
library.
5. SQLite
6. media support
7. GSM technology

8. Bluetooth, EDGE, 3G, Wi-Fi, camera, GPS, compass etc [5].


P a g e | 12

5.3 Mobile Agent:

Mobile agents are programs being sent across the network from the client to
the server or vice versa. An agent that can be executed after being
transferred over the network will be called an agent host. A software agent
is a common name and describes a software entity that computerizes some
of the regular or difficult tasks on behalf of human or other agents. Mobile
agents can travel in network following their itinerary and carrying logic and
data to perform a set of management tasks at each of the visited nodes in
order to meet their designed objectives. Mobile agents allow the
transformation of current networks into remotely programmable platforms.
Mobile agents are a powerful software interaction model that let a program
to be moved between hosts for remote execution. They are solutions for
managing distributed networks. To overcome the serious issue of network
traffic and to enhance the performance of network, a mobile agent is used.
To control and manage network traffic, network infrastructure requires
some intelligent system which should have the ability to give response
dynamically and take right decision. In order to reduce complexity and
improve reliablility, we need to follow decentralized approach where mobile
agents are the opinion. Mobile agents have the property of load balancing by
which they distribute the overall load among different nodes. Fig 1 shows
the client server communication architecture. This architecture consists of
one manager who generates no of mobile agents and sends it to the network
of managed node. They travel from one node to another autonomously and
asynchronously and perform monitoring and management task at each node
and collect network related information. After completing monitoring and
management task, mobile agents sent back to manager.
P a g e | 13

Figure 1. Mobile base Client server communication For Server:-

Step 1: Start

Step 2: Run the Server.


Step 3: Wait for the Client for Connection.
Step 4: Check for any incoming Connection from Client, if Yes, Register the
client and add it in the list of Connected Clients.
Step 5: Wait for the Information From Client.
Step 6: If any incoming information from Client then notifies Admin.
Step 7: Follow Steps 3 to 5 for more clients.
For Client:-
Step 1: Start.
Step 2: Check for the Server.
Step 3: If server is available then Connect and Go to Step 5.
Step 4: If not then Log Error and Go to Step 2.
Step 5: Monitor the client and send the information to server.
Step 6: If any action requested from server then execute that action.
Step 7: After executing the action notify server about it.
Step 8: Go to step 5.
P a g e | 14

5.4 Testing and Analysis:

Successful Authentication using SHA(SECURED HASH ALGORITHM) .


The mobile application has tested for successful communication with network.
This test will includes automation and consistency of the connection and will be
conducted in the following way :
1) Mobile application will ask for password and administrator is authenticated
by unique identity key.
2) Once connection is established commands will be sent to the remote server.
Successful Implementation to monitor Client
1) A client in LAN network is monitored by administrator using his mobile phone.
2) A command on GUI based application is used to“KILL” i.e. to delete a process
from clients list .
3 Server further decodes the command into actionevent to kill respective process.
4) A task completion message is sent by the server to the administrator.
5) Similar commands such as create, start, read, shutdown, log activity, delete,
send message , broadcast message, list files are successfully
implemented by administrator using mobile base device.

6.FACTORS TO BE CONSIDERED TO IMPLEMENT


THE SYSTEM :
1)The mobile (android) client and the server should be connected using GPRS
technology.
2)The only person who can communicate with the control module is the person
who will be successfully authenticated.
3)The Android based phone should have version 2.3 and above to successfully run
the application.
P a g e | 15

7. ADVANTAGES:
1)High Throughput: It aims to develop an integrated software solution that allows
a network administrator to remotely monitor his LAN network by his cell phone.
As speed of internet is high, performance of project increases.

2)Scalability: We can connect any number of clients to the server as per our
requirement.
3)Availability: - It is available any time anywhere irrespective of the presence of
network administrator near the LAN.
4)Reliability:-We can perform all functions required to administrate the LAN
remotely. It fails only when internet connection fails.
5)Transparency: Meet the Administrator’s requirements and satisfaction, since
perform all Functions required administrating the LAN remotely.Our System is
easily understandable to user.

8.LIMITATIONS:
1) The security model and algorithms of GPRS were developed in secrecy and
were never published.
2) The system does not support duplex communication between client and server.

9.APPLICATIONS:
Security, Agriculture, Automatic meter reading, CCTV, Vending machines, Water
Treatment, Elevators and escalators, Pollution Control, Process Control, Personnel
Monitoring, Cargo tracking, Access control.

CONCLUSION:
P a g e | 16

This application will provide assistance to the system administrator in monitoring


the tasks and also provide file transfer. For preparing this paper we did the detailed
survey and comparative analysis of SMS based monitoring and email based
monitoring. After analyzing the pros and cons of the two above systems we came
on conclusion that mobile based network monitoring system is more efficient and
reliable.Through this study, concept of network monitoring, remote access and
other concepts related to this work, had been reflected. Besides that, the similar
works which previously had been done in this field, were investigated and
comparison between the implemented application and the existing tools had been
given. In addition, the process, procedures and conditions of the implemented
application, step-by-step, have been thoroughly explained
P a g e | 17

REFERENCES

Vieira Junior, A.C. , Anido, M.L., ‘The Architecture of a Novel Tool for Network
Management Using GSM/GPRS Mobile Devices’, IEEE, 2004
Shashi Kumar N.R. , R Selvarani, Pushpavathi T.P.. GPRS Based Intranet Remote
Administration GIRA’
Nitin D. Shelokar, Dr. S.A.Ladhake, ‘Network Handle by mobile’, International
Journal of Computer Trends and Technology, May to June Issue 2011
Prof. Mamata Bhamare, Tejashree Malshikare, Renuka Salunke, Priyanka
Waghmare, ‘GSM Based LAN Monitoring and Controlling’, International Journal
of Modern Engineering Research (IJMER), Vol.2, Issue.2, Mar-Apr
2012
Prof. C. S. Nimodia, Prof. S. S. Asole,’A survey on Network Monitoring and
Administration using email and android phone’, International Journal of Emerging
Technology and Advanced Engineering, ISSN 2250- 2459, ISO 9001:2008
Certified Journal, Volume 3, Issue 4, April 2013,
Amol Poman , Mahesh Gundras, Prashant Pujari , GSM Based LAN Monitoring
System ,International Journal of Computer Science and Information Technologies,
Vol. 3 (3) , 2014,3848-3851

Haikao, T. and Simula , 1993 “ nural network traffic telephone system ‘ holma

H. And Toskda A,2001

You might also like