55
REMOTE ADMIN AND NETWORK MONITORING Abstract: Remote monitoring is real time monitoring tool for windows network and analysis through log file and construct a real time graph by throughput in the network. In our project, we are going to perform operations like 1. We monitor the packets in the network in real time. 2. We will know whether the packet is TCP, UDP or IP etc. 3. We will be able to monitor the packet transformation information i.e., from which host to which host. 4. Remote Administration. Remote Admin is used to admin the remote system from the server system. With the help of this application we able to turnoff, restart, logoff and file transfer and remote software installation or running remote application. Administrators and users with administrator rights can only use this tool for accessing remote system and perform different operations. MODULES : MONITOR THE REAL TIME NETWORK TRAFFIC. MAINTAINED LOG FILE IN THE SERVER. CONSTRUCT A GRAPH USING A THROUGHPUT. 1

Remote Administration and Network Monitor

Embed Size (px)

Citation preview

Page 1: Remote Administration and Network Monitor

REMOTE ADMIN AND NETWORK MONITORING

Abstract:

Remote monitoring is real time monitoring tool for windows network and analysis

through log file and construct a real time graph by throughput in the network.

In our project, we are going to perform operations like

1. We monitor the packets in the network in real time.

2. We will know whether the packet is TCP, UDP or IP etc.

3. We will be able to monitor the packet transformation information i.e., from which

host to which host.

4. Remote Administration.

Remote Admin is used to admin the remote system from the server system. With

the help of this application we able to turnoff, restart, logoff and file transfer and remote

software installation or running remote application. Administrators and users with

administrator rights can only use this tool for accessing remote system and perform

different operations.

MODULES :

MONITOR THE REAL TIME NETWORK TRAFFIC.

MAINTAINED LOG FILE IN THE SERVER.

CONSTRUCT A GRAPH USING A THROUGHPUT.

ADMIN THE REMOTE SYSTEM LIKE REMOTE CONTROLS.

MONITOR THE REAL TIME NETWORK TRAFFIC

Monitors the traffic in GUI Window. Select a network adapter to monitor .It will

show date, time, traffic occurrence, sender and receiver and we will be able to see the

data transmitted in bytes. We monitor the packets in the network in real time.

1

Page 2: Remote Administration and Network Monitor

By verifying the packets in the client system. Our system enables the user to

know whether the packet transmission over TCP, UDP or IP. And also it is possible to

know the source and destination system. From which host to which host. For the secured

transmission we will get the acknowledgement from the client about the packet receiving.

MAINTAINED THE LOG FILE IN SERVER

The server is in the responsible position to maintain the log file which contains

the details about the file transmission date, time and number of packets. We will view

the network monitor details in future. When ever the server response to client all the

details will be maintained in the log system. This log file is used for future reference.

In this module we store all details monitored in the system to display in future

CONSTRUCT A GRAPH USING A THROUGHPUT.

In this module we construct a graph in GUI window .We construct the graph by

throughput of the network traffic. The pictorial representation of the network work

monitoring. The servers construct the graph using a throughput of the network analysis.

In this module we construct a graph in GUI window. This is constructed by using the

throughput point.

ADMIN THE REMOTE SYSTEM LIKE REMOTE CONTROLS.

Remote Admin tool helps organizations achieve operational excellence through

delivering satisfactory service quality, reliability, and lower total cost of ownership for

multiple platform environments. Remote Admin Tool helps the business running, while

lowering the complexity and cost of managing the server infrastructure. Following are the

function which is involved in the remote administration.

2

Page 3: Remote Administration and Network Monitor

EXECUTING COMMANDS

Remote Admin should allow user to,

Execute single commands,

Custom batch for multiple commands processing

Save the modified or customized settings.

Can restart or shut down the remote system.

Clear the screan and clear the debug console.

ALLOW FILE TRANSFER

This Tool allows user to perform operations like single file transfer,

multiple file transfer between local and remote system. This should be achieved

by using,

Instant File Transfer

This tool allows user to perform Instant Upload, Instant Download,

where single file is uploaded/downloaded instantly.

Delay File Transfer

This tool allows user to perform delay Upload, delay Download, where

multiple files are stored in queue and later it is uploaded/downloaded to a

particular location.

FILE BROWSER

The Tool allows the user to browse through the files and directories of the remote

system. It also allow user to perform file operations like Copy, move, Delete, Create,

Rename, Edit, and View Property of files.

MONITORING CONNECTION

Remote Admin Tool allow user to monitor the connection status of remote

computer, and to identify which server is currently down or not available (either due to a

physical problem e.g.

3

Page 4: Remote Administration and Network Monitor

Network link down, or a logical error e.g. the failure of RMI Service).It should

also provide functions like refresh connections, restart logical connections and shut down

connections.

FEATURES OF PROPOSED SYSTEM

It is highly portable to a great variety of computer platforms

Invoke single/batch operating system command(s) of remote systems

locally,

Perform file operation on remote systems locally,

Transfer of files between remote and local computers,

Editing file contents on remote systems locally,

Monitoring the connection status of managed systems,

File transfer protocol is used to connect two computers over the Internet so that

the user of one computer can transfer packets and perform file commands on the other

computer. Specifically, FTP is a commonly used protocol for exchanging files over any

network that supports the TCP/IP protocol (such as the Internet or an intranet). There are

two computers involved in an FTP transfer: a server and a client. The FTP server,

running FTP server software, listens on the network for connection requests from other

computers. The client computer, running FTP client software, initiates a connection to the

server. Once connected, the client can do a number of file manipulation operations such

as uploading files to the server, download files from the server, rename or delete files on

the server and so on. Any software company or individual programmer is able to create

FTP server or client software because the protocol is an open standard. Virtually every

computer platform supports the FTP protocol. This allows any computer connected to a

TCP/IP based network to manipulate files on another computer on that network

regardless of which operating systems are involved (if the computers permit FTP access).

There are many existing FTP client and server programs.

4

Page 5: Remote Administration and Network Monitor

In active mode, the FTP client opens a random port (> 1023), sends the FTP

server the random port number on which it is listening over the control stream and waits

for a connection from the FTP server. When the FTP server initiates the data connection

to the FTP client it binds the source port to port 20 on the FTP server.In passive mode,

the FTP Server opens a random port (> 1023), sends the FTP client the port on which it is

listening over the control stream and waits for a connection from the FTP client. In this

case the FTP client binds the source port of the connection to a random port greater than

1023.

TECHNOLOGY USED

Java

INTRODUCTION

Java is an object-oriented programming language developed initially by James

Gosling and colleagues at Sun Microsystems. The language, initially called Oak (named

after the oak trees outside Gosling's office), was intended to replace C++, although the

feature set better resembles that of Objective C.

Java, a platform independent programming language helps in building any kind

of application of our interest; Java uses a compiler to convert the source code into

architectural independent byte code. These are executed over a Java Virtual Machine

(JVM), which is an idealized java processor chip usually implemented in software rather

than hardware .Java was developed to include methods for Internet data manipulation.

Java applications can be written once and run on any machine having a Java Virtual

Machine as part of its operating system.

Features Of Java

Platform Independent

Object-Oriented language

Secure

5

Page 6: Remote Administration and Network Monitor

Portable

Robust

Image processing

Web development support

Supports Multithreading

SWING

Swing is a GUI toolkit for Java. It is one part of the Java Foundation Classes

(JFC).Swing includes graphical user interface (GUI) widgets such as text boxes, buttons,

split-panes,and tables. Swing widgets provide more sophisticated GUI components than

the earlier Abstract Window Toolkit.Since they are written in pure Java, they run the

same on all platforms,that is uniform behaviour in all platform, unlike the AWT which Is

tied to the underlying platform's windowing system.

Swing supports pluggable look and feel – not by using the native platform's

facilities,but by roughly emulating them. This means you can get any supported look and

feel on any platform. Swing is a platform independent, Model-View-Controller GUI

framework for Java. It follows a single-threaded programming model.

Swing Features

Platform independence

Extensibility

Component-Oriented

Customisable

Configurable

Lightweight UI

Loosely-Coupled/MVC

Look and feel

6

Page 7: Remote Administration and Network Monitor

REMOTE METHOD INVOCATION (RMI)

. Remote method invocation allows applications to call object methods located

remotely, sharing resources and processing load across systems. Unlike other systems for

remote execution which require that only simple data types or defined structures be

passed to and from methods, RMI allows any Java object type to be used - even if the

client or server has never encountered it before. RMI allows both client and server to

dynamically load new object types as required. In this article, you'll learn more about

RMI.

Remote Method Invocation (RMI) facilitates object function calls between

Java Virtual Machines (JVMs). JVMs can be located on separate computers - yet one

JVM can invoke methods belonging to an object stored in another JVM. Methods can

even pass objects that a foreign virtual machine has never encountered before, allowing

dynamic loading of new classes as required. This is a powerful feature

Figure 5.3.1 shows remote references and stubs

RMI Flow

Remote Interface

StubRemote Object

(Server)Client Skeleton

implements implements

7

Page 8: Remote Administration and Network Monitor

RMI System architecture

1.Server Creates Remote Object

2. Server Registers Remoe Object

3. Client requests object from Registry

4. Registry returns remote reference

(and stub gets created)

5. Client invokes stub method

6. Stub talks to skeleton

7. Skeleton invokes remote object Method

Overview of the project

Command Line

Run Command

This enables the local user to open the required application in the remote

machine.

8

Page 9: Remote Administration and Network Monitor

Custom Batch

This feature allows to create a batch which consists of few applications on the

whole. We can create a maximum of 5 applications in a single batch. The

execution of this batch opens all the applications that are created,

simultaneously in the remote machine.

Clear Screen

This feature helps the user to clear the current remote admin screen.

Clear Debug

This feature helps the user to clear the Debug console area.

Login features

The remote system can be restarted, shut down from the local system itself.

File Browsers

This module provide platform to browse Files and directories of the remote system

and perform different file operations. Those files available in the remote machine can be

viewed from the local system itself. Those files and directories can be updated, deleted,

edited,renamed, etc,. also the local user can create new directories and also files for the

directories in the remote machine.

File Transfers

This module allows users to instant/delay Upload and download files in ASCII and

Binary format. The files and the directories in the romote machine can be moved from

the local machine to the remote system (ie, uploading) or moved from the remote system

to the local machine (ie downloading).

This transfer of files from either side can be done between different directories also. The

transfer of files and directories can be done to move them within the same system but

between the directories also.

9

Page 10: Remote Administration and Network Monitor

Connection Monitor

This module allows users to monitor the connection status of the remote systems.

Restart/Refresh RMI connection between the systems is also done in this module.

SYSTEM IMPLEMENTATION

Server Side Installation

Install the required software’s to satisfy server configuration

Copy the folder that contains server side programs to the system

Set the class path

Set the IP address of the client system in the RMIServer.java file

Compile the Server side programs

Run the RMIServer.class file for establishing RMI connection with the

client connection.

Client Side Instalation

Install the required software’s to satisfy client’s configuration

Copy the folder that contains client side programs into the system

Set the class path

Compile the client side programs

Run the RMIClientGUI.class file for establishing RMI connection with the client

connection.

10

Page 11: Remote Administration and Network Monitor

6.3 Use Case Diagram

Figure 6.3.1 Creating Remote Admin Tool

6.4 ACTIVITY DIAGRAM

11

Page 12: Remote Administration and Network Monitor

Figure 6.3.2 Executing commands

7. ARCHITECTURAL DESIGN

12

Page 13: Remote Administration and Network Monitor

Figure 7.1 Architecture Design

Figure 7.1 illustrates the external architecture of Remote Admin Tool. It also explains

key authentication by encrypting and decrypting server key for secure connection.

8. STRUCTURAL DESIGN

8.1.1 CLASS DIAGRAM

13

Page 14: Remote Administration and Network Monitor

Figure 8.1.1.1 Class Diagram

14

Page 15: Remote Administration and Network Monitor

Figure 8.1.1.2 Class Diagram

15

Page 16: Remote Administration and Network Monitor

Figure8.1.1.3 Class Diagram

16

Page 17: Remote Administration and Network Monitor

8.1.2 MODULE DIAGRAM

Figure 8.1.2.1 Module Diagram

8.2 SEQUENCE DIAGRAM

Command Line Module

17

REMOTE ADMIN TOOL

COMMAND LINE FILE BROWSERS FILE TRANSFER CONNECTION MONITOR

Page 18: Remote Administration and Network Monitor

Figure8.2.1 Sequence Diagram showing the command line module operations

File Browsers

18

Page 19: Remote Administration and Network Monitor

Figure 8.2.2 Sequence Diagram showing file browser module operations

Upload files

19

Page 20: Remote Administration and Network Monitor

Figure 8.2.3 Sequence Diagram illustrating upload file operation

20

Page 21: Remote Administration and Network Monitor

DownloadFiles

Figure8.2.4 Sequence Diagram illustrating download file operation

21

Page 22: Remote Administration and Network Monitor

ConnectionMonitor

Figure8.2.5 Sequence Diagram illustrating connection monitor module

22

Page 23: Remote Administration and Network Monitor

8.3 Deployment Design

8.3.1 Deployment Diagram

Figure 8.3.1.1 Deployment Diagram for Remote Admin Tool

8.3.2 User Interface Diagram

23

Page 24: Remote Administration and Network Monitor

Figure 8.3.2.1 shows the command line tab of remote admin tool

24

Page 25: Remote Administration and Network Monitor

Figure 8.3.2.2 shows the dialog box to select server

25

Page 26: Remote Administration and Network Monitor

Figure 8.3.2.3 shows the server list which allows to create, modify and delete server

details

26

Page 27: Remote Administration and Network Monitor

Figure 8.3.2.4 shows the dialog box to execute commands of remote

system

27

Page 28: Remote Administration and Network Monitor

Figure 8.3.2.5 shows the dialog box to execute batch commands of remote system

28

Page 29: Remote Administration and Network Monitor

Figure 8.3.2.6 shows the batch configuration saved message

29

Page 30: Remote Administration and Network Monitor

Figure 8.3.2.7 shows the file transfer tab with displaying drives of both remote system

and local system

30

Page 31: Remote Administration and Network Monitor

Figure 8.3.2.8 shows the different file operations in file transfer tab

31

Page 32: Remote Administration and Network Monitor

Figure 8.3.2.9 shows the files in upload queue for delay uploading operation

32

Page 33: Remote Administration and Network Monitor

Figure 8.3.2.10 shows the file transfer tab with displaying drives of the remote system

33

Page 34: Remote Administration and Network Monitor

Figure 8.3.2.11 shows the file editor dialog box with a file for editing

Figure 8.3.2.12 shows the setup buffer dialog box to specify the buffer size for loading

file

34

Page 35: Remote Administration and Network Monitor

Figure 8.3.2.13 shows the files in the C drive of the remote system

35

Page 36: Remote Administration and Network Monitor

Figure8.3.2.14 shows connection monitor

36

Page 37: Remote Administration and Network Monitor

9. Testing And Implementation

9.1 Test Reports

Server Selection

Table 9.1.1

Test

case no

Description Iteratio

n No

Expected Result Observed Result Reasons

for failure

1 Server is not

selected

1 Alert the user to select

the server first

Displays message

“select server first”

-

2 Server is selected 1 Allow user to perform

operations

Displays message

“RMI server

Refused to Host”

Network

failure

3 Server is selected 2 Allow user to perform

operations

Allow user to

access remote

systems

-

Authentication

Table 9.1.2

Test

case no

Description Iteratio

n No

Expected Result Observed Result Reasons for

failure

1 Unregistered user is

trying to access

remote system

1 Alert user about the

unauthorized access

and should not allow

the user to access

remote system

Display message

“Unauthorized

access to RMI

System”

-

37

Page 38: Remote Administration and Network Monitor

2 Registered user is

trying to access

remote system

1 Allow user to access

remote system

Displays message

“Unauthorized

access to RMI

System”

Server Key

and Server

Pass Phrase

is not

transferred

to Server

system

3 Registered user is

trying to access

remote system

2 Allow user to access

remote system

The user is

authenticated and

allowed to access

the remote system

-

38

Page 39: Remote Administration and Network Monitor

Command Line

Table 9.1.3

Test

case no

Description Iteratio

n No

Expected Result Observed Result Reasons

for failure

1 If incorrect

command is entered

1 Display the error

message, regarding

the incorrect

commands

Displays message

“Not recognized

commands/batch

file”

-

2 If correct command

is entered

1 Execute the

commands, and

display the output

Executes the

commands, and

display the output

in the output

console

-

File Browser

Table 9.1.4

Test

case no

Description Iteratio

n No

Expected Result Observed Result Reasons

for failure

1 If entered path is

incorrect, when

trying to browse

files

1 Display warning

message about the

path, if the path is

incorrect

Displays error

message “Incorrect

path”

-

2 If entered path is

correct

1 Display the files and

directories, if the path

is correct

Files and

directories are

displayed in a tree

structure

-

3 If the file cannot be 1 Alert the user about Displays message -

39

Page 40: Remote Administration and Network Monitor

moved to the target

location

the problem in

moving the file

“No privilege to

move the file”

4 If the file can be

moved

1 Move the file to the

target location

Moves the specified

file to the location

-

File Transfer

Table 9.1.5

Test

case no

Description Iteratio

n No

Expected Result Observed Result Reasons

for failure

1 If specified path is

incorrect

1 Alert the user about

the incorrect path

Displays message

“Invalid path for

file transfer”

-

2 If specified path is

correct

1 Transfer files to the

specified location

Transfers files and

displays “Transfer

complete “message

-

3 If buffer size is

insufficient when

loading file for

editing

1 Display error message

about the buffer

overflow

Displays “Buffer

Overflow” message

-

4 If buffer size is

sufficient

1 Load the file for

editing

Displays the

contents of the file

that is to be edited

-

Connection Monitor

Table 9.1.6

Test

case no

Description Iteratio

n No

Expected Result Observed Result Reasons

for failure

1 Refreshing all 1 Display current status Displays the current -

40

Page 41: Remote Administration and Network Monitor

connections with

different systems

of connection with the

servers

status of

connections with

the servers

2 Restart the RMI

Service

1 Recreates stub and

skeleton for proper

connection

Displays message

“RMI server

refused to host”

Physical

error

occurred

3 Restart the RMI

Service

2 Recreates stub and

skeleton for proper

connection

Displays message

“RMI server

connected”

-

10. Development Environment

Server

Hardware Requirements

Processor : Intel Pentium III

RAM : 256 Mega Bytes

Hard Disk : 10 Giga Bytes

Operating System : Windows NT/2003 Server/XP, Linux

Software Requirements

Language : Java (j2sdk1.4.2_04)

Client

Hardware Requirements

Processor : Intel Pentium III

RAM : 128 Mega Bytes

Hard Disk : 10 Giga Bytes

Operating System : Windows NT/2003 Server/XP, Linux

Software Requirements

Language : Java (j2sdk1.4.2_04)

41

Page 42: Remote Administration and Network Monitor

11. Implementation Environment

Server

Hardware Requirements

Processor : Intel Pentium III

RAM : 256 Mega Bytes

Hard Disk : 10 Giga Bytes

Operating System : Windows XP, Linux

Software Requirements

Language : Java (j2sdk1.4.2_04)

Client

Hardware Requirements

Processor : Intel Pentium III

RAM : 128 Mega Bytes

Hard Disk : 10 Giga Bytes

Operating System : Windows XP

Software Requirements

Language : Java (j2sdk1.4.2_04)

42

Page 43: Remote Administration and Network Monitor

12. Conclusion

The project entitled “Remote Admin Tool” is developed and tested successfully.

It meets the specified requirements. The REMOTE ADMIN TOOL accessing the remote

system over the network regardless of the target computers platform has been verified

effectively. This feature of being independent of the remote system platform plays a good

role in area where different OS is being used.

The Command line feature of this software is found to effectively open the

required application in the remote machine , also the other functions in this module such

as the custom batch which creates a batch of applications, the clear screen which clears

the remote admin screen, the clear debug function which clears the debug console area,

the save configuration that saves the batch configuration are tested to work quite

effective. The File Transfer module is found to upload and download the files and

directories on either side in a very small span of time. The file browser available in the

REMOTE ADMIN TOOL makes it easy for the user to browse the files of the remote

system and carry out various operations such as cut, copy, paste, rename, edit, details,

delete etc,.The Connection monitor also tested effective. Various tasks and operations to

be executed at remote computer are now automated by instructions defined in Remote

Admin tool. It provides a user-friendly interface on the client side for easy accessing of

remote systems.

Thus, Remote Admin tool is highly portable to a great variety of computer

platforms that support JAVA

13. Limitation

Managed Server List export & import is limited in the remote admin tool.

Server key has to be transferred to the target system by any other technology for

authentication purpose.

13.1 Future Enhancement

43

Page 44: Remote Administration and Network Monitor

This tool can provide Application Programming Interface for programming plug-in and

for integration with external system like mobile devices and embedded systems.

14. Bibilography

References

William Grosso, “JAVA RMI”, O'Reilly Media, Inc.; 1 edition, 2001

Esmond Pitt and Kathleen McNiff, ”THE REMOTE METHOD INVOCATION

GUIDE”, Tata McGraw Hill Publishing Company, 2001

John Zukowski, “Definitive Guide to Swing for Java 2”,1999

Tristan Richardson, Quentin Stafford-Freser,

Kenneth R. Wood and Andy Hopper,”VIRTUAL NETWORK COMPUTING” Reprint from IEEE Internet Computing, Volume 2, Number 1 January/February 1998

Roger S.Pressman, “ SOFTWARE ENGINEERING –A PRACTIONERS

APPROACH “, Tata McGraw Hill Publishing Company, 1997.

Wesites

www.java.sun.com

www.samba.org

www.remote-desktop-control.com

44

Page 45: Remote Administration and Network Monitor

45