Upload
shaju-naduvil
View
108
Download
2
Embed Size (px)
Citation preview
REMOTE ADMIN AND NETWORK MONITORING
Abstract:
Remote monitoring is real time monitoring tool for windows network and analysis
through log file and construct a real time graph by throughput in the network.
In our project, we are going to perform operations like
1. We monitor the packets in the network in real time.
2. We will know whether the packet is TCP, UDP or IP etc.
3. We will be able to monitor the packet transformation information i.e., from which
host to which host.
4. Remote Administration.
Remote Admin is used to admin the remote system from the server system. With
the help of this application we able to turnoff, restart, logoff and file transfer and remote
software installation or running remote application. Administrators and users with
administrator rights can only use this tool for accessing remote system and perform
different operations.
MODULES :
MONITOR THE REAL TIME NETWORK TRAFFIC.
MAINTAINED LOG FILE IN THE SERVER.
CONSTRUCT A GRAPH USING A THROUGHPUT.
ADMIN THE REMOTE SYSTEM LIKE REMOTE CONTROLS.
MONITOR THE REAL TIME NETWORK TRAFFIC
Monitors the traffic in GUI Window. Select a network adapter to monitor .It will
show date, time, traffic occurrence, sender and receiver and we will be able to see the
data transmitted in bytes. We monitor the packets in the network in real time.
1
By verifying the packets in the client system. Our system enables the user to
know whether the packet transmission over TCP, UDP or IP. And also it is possible to
know the source and destination system. From which host to which host. For the secured
transmission we will get the acknowledgement from the client about the packet receiving.
MAINTAINED THE LOG FILE IN SERVER
The server is in the responsible position to maintain the log file which contains
the details about the file transmission date, time and number of packets. We will view
the network monitor details in future. When ever the server response to client all the
details will be maintained in the log system. This log file is used for future reference.
In this module we store all details monitored in the system to display in future
CONSTRUCT A GRAPH USING A THROUGHPUT.
In this module we construct a graph in GUI window .We construct the graph by
throughput of the network traffic. The pictorial representation of the network work
monitoring. The servers construct the graph using a throughput of the network analysis.
In this module we construct a graph in GUI window. This is constructed by using the
throughput point.
ADMIN THE REMOTE SYSTEM LIKE REMOTE CONTROLS.
Remote Admin tool helps organizations achieve operational excellence through
delivering satisfactory service quality, reliability, and lower total cost of ownership for
multiple platform environments. Remote Admin Tool helps the business running, while
lowering the complexity and cost of managing the server infrastructure. Following are the
function which is involved in the remote administration.
2
EXECUTING COMMANDS
Remote Admin should allow user to,
Execute single commands,
Custom batch for multiple commands processing
Save the modified or customized settings.
Can restart or shut down the remote system.
Clear the screan and clear the debug console.
ALLOW FILE TRANSFER
This Tool allows user to perform operations like single file transfer,
multiple file transfer between local and remote system. This should be achieved
by using,
Instant File Transfer
This tool allows user to perform Instant Upload, Instant Download,
where single file is uploaded/downloaded instantly.
Delay File Transfer
This tool allows user to perform delay Upload, delay Download, where
multiple files are stored in queue and later it is uploaded/downloaded to a
particular location.
FILE BROWSER
The Tool allows the user to browse through the files and directories of the remote
system. It also allow user to perform file operations like Copy, move, Delete, Create,
Rename, Edit, and View Property of files.
MONITORING CONNECTION
Remote Admin Tool allow user to monitor the connection status of remote
computer, and to identify which server is currently down or not available (either due to a
physical problem e.g.
3
Network link down, or a logical error e.g. the failure of RMI Service).It should
also provide functions like refresh connections, restart logical connections and shut down
connections.
FEATURES OF PROPOSED SYSTEM
It is highly portable to a great variety of computer platforms
Invoke single/batch operating system command(s) of remote systems
locally,
Perform file operation on remote systems locally,
Transfer of files between remote and local computers,
Editing file contents on remote systems locally,
Monitoring the connection status of managed systems,
File transfer protocol is used to connect two computers over the Internet so that
the user of one computer can transfer packets and perform file commands on the other
computer. Specifically, FTP is a commonly used protocol for exchanging files over any
network that supports the TCP/IP protocol (such as the Internet or an intranet). There are
two computers involved in an FTP transfer: a server and a client. The FTP server,
running FTP server software, listens on the network for connection requests from other
computers. The client computer, running FTP client software, initiates a connection to the
server. Once connected, the client can do a number of file manipulation operations such
as uploading files to the server, download files from the server, rename or delete files on
the server and so on. Any software company or individual programmer is able to create
FTP server or client software because the protocol is an open standard. Virtually every
computer platform supports the FTP protocol. This allows any computer connected to a
TCP/IP based network to manipulate files on another computer on that network
regardless of which operating systems are involved (if the computers permit FTP access).
There are many existing FTP client and server programs.
4
In active mode, the FTP client opens a random port (> 1023), sends the FTP
server the random port number on which it is listening over the control stream and waits
for a connection from the FTP server. When the FTP server initiates the data connection
to the FTP client it binds the source port to port 20 on the FTP server.In passive mode,
the FTP Server opens a random port (> 1023), sends the FTP client the port on which it is
listening over the control stream and waits for a connection from the FTP client. In this
case the FTP client binds the source port of the connection to a random port greater than
1023.
TECHNOLOGY USED
Java
INTRODUCTION
Java is an object-oriented programming language developed initially by James
Gosling and colleagues at Sun Microsystems. The language, initially called Oak (named
after the oak trees outside Gosling's office), was intended to replace C++, although the
feature set better resembles that of Objective C.
Java, a platform independent programming language helps in building any kind
of application of our interest; Java uses a compiler to convert the source code into
architectural independent byte code. These are executed over a Java Virtual Machine
(JVM), which is an idealized java processor chip usually implemented in software rather
than hardware .Java was developed to include methods for Internet data manipulation.
Java applications can be written once and run on any machine having a Java Virtual
Machine as part of its operating system.
Features Of Java
Platform Independent
Object-Oriented language
Secure
5
Portable
Robust
Image processing
Web development support
Supports Multithreading
SWING
Swing is a GUI toolkit for Java. It is one part of the Java Foundation Classes
(JFC).Swing includes graphical user interface (GUI) widgets such as text boxes, buttons,
split-panes,and tables. Swing widgets provide more sophisticated GUI components than
the earlier Abstract Window Toolkit.Since they are written in pure Java, they run the
same on all platforms,that is uniform behaviour in all platform, unlike the AWT which Is
tied to the underlying platform's windowing system.
Swing supports pluggable look and feel – not by using the native platform's
facilities,but by roughly emulating them. This means you can get any supported look and
feel on any platform. Swing is a platform independent, Model-View-Controller GUI
framework for Java. It follows a single-threaded programming model.
Swing Features
Platform independence
Extensibility
Component-Oriented
Customisable
Configurable
Lightweight UI
Loosely-Coupled/MVC
Look and feel
6
REMOTE METHOD INVOCATION (RMI)
. Remote method invocation allows applications to call object methods located
remotely, sharing resources and processing load across systems. Unlike other systems for
remote execution which require that only simple data types or defined structures be
passed to and from methods, RMI allows any Java object type to be used - even if the
client or server has never encountered it before. RMI allows both client and server to
dynamically load new object types as required. In this article, you'll learn more about
RMI.
Remote Method Invocation (RMI) facilitates object function calls between
Java Virtual Machines (JVMs). JVMs can be located on separate computers - yet one
JVM can invoke methods belonging to an object stored in another JVM. Methods can
even pass objects that a foreign virtual machine has never encountered before, allowing
dynamic loading of new classes as required. This is a powerful feature
Figure 5.3.1 shows remote references and stubs
RMI Flow
Remote Interface
StubRemote Object
(Server)Client Skeleton
implements implements
7
RMI System architecture
1.Server Creates Remote Object
2. Server Registers Remoe Object
3. Client requests object from Registry
4. Registry returns remote reference
(and stub gets created)
5. Client invokes stub method
6. Stub talks to skeleton
7. Skeleton invokes remote object Method
Overview of the project
Command Line
Run Command
This enables the local user to open the required application in the remote
machine.
8
Custom Batch
This feature allows to create a batch which consists of few applications on the
whole. We can create a maximum of 5 applications in a single batch. The
execution of this batch opens all the applications that are created,
simultaneously in the remote machine.
Clear Screen
This feature helps the user to clear the current remote admin screen.
Clear Debug
This feature helps the user to clear the Debug console area.
Login features
The remote system can be restarted, shut down from the local system itself.
File Browsers
This module provide platform to browse Files and directories of the remote system
and perform different file operations. Those files available in the remote machine can be
viewed from the local system itself. Those files and directories can be updated, deleted,
edited,renamed, etc,. also the local user can create new directories and also files for the
directories in the remote machine.
File Transfers
This module allows users to instant/delay Upload and download files in ASCII and
Binary format. The files and the directories in the romote machine can be moved from
the local machine to the remote system (ie, uploading) or moved from the remote system
to the local machine (ie downloading).
This transfer of files from either side can be done between different directories also. The
transfer of files and directories can be done to move them within the same system but
between the directories also.
9
Connection Monitor
This module allows users to monitor the connection status of the remote systems.
Restart/Refresh RMI connection between the systems is also done in this module.
SYSTEM IMPLEMENTATION
Server Side Installation
Install the required software’s to satisfy server configuration
Copy the folder that contains server side programs to the system
Set the class path
Set the IP address of the client system in the RMIServer.java file
Compile the Server side programs
Run the RMIServer.class file for establishing RMI connection with the
client connection.
Client Side Instalation
Install the required software’s to satisfy client’s configuration
Copy the folder that contains client side programs into the system
Set the class path
Compile the client side programs
Run the RMIClientGUI.class file for establishing RMI connection with the client
connection.
10
6.3 Use Case Diagram
Figure 6.3.1 Creating Remote Admin Tool
6.4 ACTIVITY DIAGRAM
11
Figure 6.3.2 Executing commands
7. ARCHITECTURAL DESIGN
12
Figure 7.1 Architecture Design
Figure 7.1 illustrates the external architecture of Remote Admin Tool. It also explains
key authentication by encrypting and decrypting server key for secure connection.
8. STRUCTURAL DESIGN
8.1.1 CLASS DIAGRAM
13
Figure 8.1.1.1 Class Diagram
14
Figure 8.1.1.2 Class Diagram
15
Figure8.1.1.3 Class Diagram
16
8.1.2 MODULE DIAGRAM
Figure 8.1.2.1 Module Diagram
8.2 SEQUENCE DIAGRAM
Command Line Module
17
REMOTE ADMIN TOOL
COMMAND LINE FILE BROWSERS FILE TRANSFER CONNECTION MONITOR
Figure8.2.1 Sequence Diagram showing the command line module operations
File Browsers
18
Figure 8.2.2 Sequence Diagram showing file browser module operations
Upload files
19
Figure 8.2.3 Sequence Diagram illustrating upload file operation
20
DownloadFiles
Figure8.2.4 Sequence Diagram illustrating download file operation
21
ConnectionMonitor
Figure8.2.5 Sequence Diagram illustrating connection monitor module
22
8.3 Deployment Design
8.3.1 Deployment Diagram
Figure 8.3.1.1 Deployment Diagram for Remote Admin Tool
8.3.2 User Interface Diagram
23
Figure 8.3.2.1 shows the command line tab of remote admin tool
24
Figure 8.3.2.2 shows the dialog box to select server
25
Figure 8.3.2.3 shows the server list which allows to create, modify and delete server
details
26
Figure 8.3.2.4 shows the dialog box to execute commands of remote
system
27
Figure 8.3.2.5 shows the dialog box to execute batch commands of remote system
28
Figure 8.3.2.6 shows the batch configuration saved message
29
Figure 8.3.2.7 shows the file transfer tab with displaying drives of both remote system
and local system
30
Figure 8.3.2.8 shows the different file operations in file transfer tab
31
Figure 8.3.2.9 shows the files in upload queue for delay uploading operation
32
Figure 8.3.2.10 shows the file transfer tab with displaying drives of the remote system
33
Figure 8.3.2.11 shows the file editor dialog box with a file for editing
Figure 8.3.2.12 shows the setup buffer dialog box to specify the buffer size for loading
file
34
Figure 8.3.2.13 shows the files in the C drive of the remote system
35
Figure8.3.2.14 shows connection monitor
36
9. Testing And Implementation
9.1 Test Reports
Server Selection
Table 9.1.1
Test
case no
Description Iteratio
n No
Expected Result Observed Result Reasons
for failure
1 Server is not
selected
1 Alert the user to select
the server first
Displays message
“select server first”
-
2 Server is selected 1 Allow user to perform
operations
Displays message
“RMI server
Refused to Host”
Network
failure
3 Server is selected 2 Allow user to perform
operations
Allow user to
access remote
systems
-
Authentication
Table 9.1.2
Test
case no
Description Iteratio
n No
Expected Result Observed Result Reasons for
failure
1 Unregistered user is
trying to access
remote system
1 Alert user about the
unauthorized access
and should not allow
the user to access
remote system
Display message
“Unauthorized
access to RMI
System”
-
37
2 Registered user is
trying to access
remote system
1 Allow user to access
remote system
Displays message
“Unauthorized
access to RMI
System”
Server Key
and Server
Pass Phrase
is not
transferred
to Server
system
3 Registered user is
trying to access
remote system
2 Allow user to access
remote system
The user is
authenticated and
allowed to access
the remote system
-
38
Command Line
Table 9.1.3
Test
case no
Description Iteratio
n No
Expected Result Observed Result Reasons
for failure
1 If incorrect
command is entered
1 Display the error
message, regarding
the incorrect
commands
Displays message
“Not recognized
commands/batch
file”
-
2 If correct command
is entered
1 Execute the
commands, and
display the output
Executes the
commands, and
display the output
in the output
console
-
File Browser
Table 9.1.4
Test
case no
Description Iteratio
n No
Expected Result Observed Result Reasons
for failure
1 If entered path is
incorrect, when
trying to browse
files
1 Display warning
message about the
path, if the path is
incorrect
Displays error
message “Incorrect
path”
-
2 If entered path is
correct
1 Display the files and
directories, if the path
is correct
Files and
directories are
displayed in a tree
structure
-
3 If the file cannot be 1 Alert the user about Displays message -
39
moved to the target
location
the problem in
moving the file
“No privilege to
move the file”
4 If the file can be
moved
1 Move the file to the
target location
Moves the specified
file to the location
-
File Transfer
Table 9.1.5
Test
case no
Description Iteratio
n No
Expected Result Observed Result Reasons
for failure
1 If specified path is
incorrect
1 Alert the user about
the incorrect path
Displays message
“Invalid path for
file transfer”
-
2 If specified path is
correct
1 Transfer files to the
specified location
Transfers files and
displays “Transfer
complete “message
-
3 If buffer size is
insufficient when
loading file for
editing
1 Display error message
about the buffer
overflow
Displays “Buffer
Overflow” message
-
4 If buffer size is
sufficient
1 Load the file for
editing
Displays the
contents of the file
that is to be edited
-
Connection Monitor
Table 9.1.6
Test
case no
Description Iteratio
n No
Expected Result Observed Result Reasons
for failure
1 Refreshing all 1 Display current status Displays the current -
40
connections with
different systems
of connection with the
servers
status of
connections with
the servers
2 Restart the RMI
Service
1 Recreates stub and
skeleton for proper
connection
Displays message
“RMI server
refused to host”
Physical
error
occurred
3 Restart the RMI
Service
2 Recreates stub and
skeleton for proper
connection
Displays message
“RMI server
connected”
-
10. Development Environment
Server
Hardware Requirements
Processor : Intel Pentium III
RAM : 256 Mega Bytes
Hard Disk : 10 Giga Bytes
Operating System : Windows NT/2003 Server/XP, Linux
Software Requirements
Language : Java (j2sdk1.4.2_04)
Client
Hardware Requirements
Processor : Intel Pentium III
RAM : 128 Mega Bytes
Hard Disk : 10 Giga Bytes
Operating System : Windows NT/2003 Server/XP, Linux
Software Requirements
Language : Java (j2sdk1.4.2_04)
41
11. Implementation Environment
Server
Hardware Requirements
Processor : Intel Pentium III
RAM : 256 Mega Bytes
Hard Disk : 10 Giga Bytes
Operating System : Windows XP, Linux
Software Requirements
Language : Java (j2sdk1.4.2_04)
Client
Hardware Requirements
Processor : Intel Pentium III
RAM : 128 Mega Bytes
Hard Disk : 10 Giga Bytes
Operating System : Windows XP
Software Requirements
Language : Java (j2sdk1.4.2_04)
42
12. Conclusion
The project entitled “Remote Admin Tool” is developed and tested successfully.
It meets the specified requirements. The REMOTE ADMIN TOOL accessing the remote
system over the network regardless of the target computers platform has been verified
effectively. This feature of being independent of the remote system platform plays a good
role in area where different OS is being used.
The Command line feature of this software is found to effectively open the
required application in the remote machine , also the other functions in this module such
as the custom batch which creates a batch of applications, the clear screen which clears
the remote admin screen, the clear debug function which clears the debug console area,
the save configuration that saves the batch configuration are tested to work quite
effective. The File Transfer module is found to upload and download the files and
directories on either side in a very small span of time. The file browser available in the
REMOTE ADMIN TOOL makes it easy for the user to browse the files of the remote
system and carry out various operations such as cut, copy, paste, rename, edit, details,
delete etc,.The Connection monitor also tested effective. Various tasks and operations to
be executed at remote computer are now automated by instructions defined in Remote
Admin tool. It provides a user-friendly interface on the client side for easy accessing of
remote systems.
Thus, Remote Admin tool is highly portable to a great variety of computer
platforms that support JAVA
13. Limitation
Managed Server List export & import is limited in the remote admin tool.
Server key has to be transferred to the target system by any other technology for
authentication purpose.
13.1 Future Enhancement
43
This tool can provide Application Programming Interface for programming plug-in and
for integration with external system like mobile devices and embedded systems.
14. Bibilography
References
William Grosso, “JAVA RMI”, O'Reilly Media, Inc.; 1 edition, 2001
Esmond Pitt and Kathleen McNiff, ”THE REMOTE METHOD INVOCATION
GUIDE”, Tata McGraw Hill Publishing Company, 2001
John Zukowski, “Definitive Guide to Swing for Java 2”,1999
Tristan Richardson, Quentin Stafford-Freser,
Kenneth R. Wood and Andy Hopper,”VIRTUAL NETWORK COMPUTING” Reprint from IEEE Internet Computing, Volume 2, Number 1 January/February 1998
Roger S.Pressman, “ SOFTWARE ENGINEERING –A PRACTIONERS
APPROACH “, Tata McGraw Hill Publishing Company, 1997.
Wesites
www.java.sun.com
www.samba.org
www.remote-desktop-control.com
44
45