International Journal of Pure and Applied Mathematics Volume 116 No. 13 2017, 9-15 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu

A NOVEL METHOD TO MANAGE NETWORK REQUIREMENTS

S.Pothumani 1, Dr.J.Hameed Hussain 2 1Assistant Professor , Dept. of CSE, Bharath University, Chennai, Tamil Nadu, India 2Dean Engineering , Bharath University, Chennai, Tamil Nadu, India [email protected], [email protected]

Abstract: The aim of this paper is to fulfill all possible a message to any client connected in the enterprise network requirements of a network administrator regarding his and Search for the given in the network. And also network. This also provides an efficient way for the displays all shared folders of a specified computer [1,2]. system administrator to work offsite and who needs to keep intact with his PC and do his work, so that they can 2. Related work share their PC’s with each other. The system administrator working in a multistoried building can use The existing system is a normal Network Management Tool this tool to manage the network by logging into the which can be used only for the domain based network. It server system in the main branch through LAN or has some difficulties. They are Administrator could not internet using the IP address of the server and control his control the network when he is out of station, A Remote- system and network or can work with the others. Based tool is not yet found ,Remote accessing of any server Network scrutinizer is a software tool that helps an is not possible. administrator manage the machines connected across the enterprise network and monitor the various tasks running 3. Proposed Work on various remote machines, thereby assisting the administrator in controlling the systems in the network. The existing system has a lot of drawbacks as said earlier. ADSI and WMI are the two techniques which are Considering these drawbacks in mind the proposed system implemented in the project. is developed. The proposed system is to provide an internet based Network Management System which fulfills the functionalities of an administrator like tracking IP address, 1. Introduction desktop, getting active machines in the network, searching Network scrutinizer is a software tool that helps an machine in a particular domain, etc. It is required to run on administrator manage the machines connected across the a networked Windows environment. The proposed system enterprise network and monitor the various tasks has three main modules in it. They are tracking, monitoring running on various remote machines, thereby assisting and utilities [3,4]. the administrator in controlling the systems in the The various modules and its functions in this project network. The tool aimed for administrator’s exclusive are described. The modules are divided into three main use helps in checking the availability of a machine in the categories. They are mentioned and explained in brief as network. This is used to enables the administrator to follows. work on multiple terminals by connecting his system to the server. It allows the user to retrieve a list of 3.1 Tracking that are active in the network. It is used to The tracking module contains four sub modules. They are Displays the IP Address of the computers. It Pings the IPAddress, Active Machines, Shared Folders, Ping and IP Address and displays whether the computer is Search. The ADSI technology helps in implementing the available in the network and Monitor and control all tracking module as it allows handling directory services. running services, processes and events on remote ● Tracking IPAddress concerns with IP Address of hosts and local machines. And it Watch features of any remote host in any domain. running tasks (the handle of the main window, process ID, Etc) , Maps & disconnects the network drives, Sends

9 International Journal of Pure and Applied Mathematics Special Issue

● Active Machines give information about the machines which are active in a network domain. ● Shared Folders tracks the folders which are shared at that time in the network. ● Ping connects a host to another host by replying the number of bytes transferred to it. ● Search performs a searching operation of a particular host in a particular domain.

3.2 Monitoring The Monitoring module contains four Sub modules in it. They are Application, Services, and Events. The monitoring module is implemented using the Windows Management Information. Figure 1. ADSI Architecture ● Application : This helps the administrator to keep in track of the applications in the network Active directory technology (ADSI) for a particular remote host. Active Directory is the Windows directory service that ● Services : This provides the administrator with provides a unified view of complex networks. It reduces the the services of a particular host in the network. number of directories and namespaces with which a ● Events : Events keep track of the events that are developer must contend. To use the ADSI technology, running and stopped in the remote host in the client computers must have ADSI 2.5 or later installed on network. them. ADSI 2.5 is automatically installed with Windows

2000 and therefore does not require installation. In a typical 3.3 Utilities organization, there are often diverse types of directories in The utilities module consists of three sub modules in it. use. These may include Windows NT directories, They are mapping, disconnecting and messaging. application-specific directories, and directories of network resources. This variety can cause problems for end users, ● Mapping : This connects Network Drives even developers, and administrators. A user may encounter from one branch to another branch office problems while trying to log on to multiple resources. An provided with a same server. administrator may face difficulties in maintaining network ● Disconnecting : Disconnects the connected resources on diverse systems. As a developer, it may need drives in the Network. to write an application to seamlessly interact with several ● Messaging : Provides administrator to interact different directories. [5] with any remote host in the network. The administrator is expected to connect with the server

of the particular domain with the IP Address. The changes 4. System Architecture administrator makes to that window will automatically take This architecture used in tracking module and effect in the server. monitoring module is discussed. This includes the Active Directory provides a straightforward concepts of Active Directory Service Interface (ADSI) structuring of a complicated network of computers. An and Windows Management Instrumentation (WMI) Active Directory system is arranged in a hierarchical tree. using which tracking and monitoring module is Each node represents a resource or service available on the implemented respectively. The basic technique and the network and contains a set of properties that can be protocol used are also discussed. The windows socket is retrieved and manipulated. used to provide a protocol independent transport A directory is an information source used to store interface. information about interesting objects. A telephone directory stores information about telephone subscribers. In a file ADSI Architecture system, the directory stores information about files. In a The tracking module is based on the ADSI technology. distributed computing system or a public computer network The figures below represent the architecture of ADSI. such as the Internet, there are many interesting objects: printers, fax servers, applications, and databases. Users want to find and use these objects. Administrators want to manage how these objects are used.

10 International Journal of Pure and Applied Mathematics Special Issue

A directory service differs from a directory in for that namespace. Many of the providers have objects in that a service is both the information source and the common. For example, all of the providers give access to a functionality that makes the information available to group object that represents a group account, and a user users. For example, a directory service stores object that represents a user account. information about objects such as users. That For the Windows NT service providers, can access information can be used for identification when domains, computers, print queues, and sessions. For the communicating with network resources, but also as the LDAP provider, can access organizations, locality, and definition of where the object fits into the overall Root DS Entry (rootDSE) objects. The Root DS Entry is a hierarchical scheme. Scope is the limits defined for required set of operational attributes that the user can read searching the tree or sub trees. [6] to find out fundamental characteristics of the directory and Active directory schema the server. The rootDSE is required only for LDAP providers. [8] Active Directory schemas define attributes for directory objects in much the same way that database schemas Active directory objects define structures for databases. This schema information Active Directory Service Interfaces (ADSI) is a is stored with an Active Directory hierarchy to help programmatic interface for Windows Active expedite member searches on large directories. Directory. It enables the applications to interact with Security diverse directories on a network, using a single interface. Visual Studio .NET and the .NET Framework make it easy Active Directory provides a variety of security tools to add ADSI functionality with the Directory Entry and such as Secure Sockets Layer and Kerberos encryption Directory Searcher components. to create a flexible security environment for developers. [7] ADSI helps in creating applications that perform common administrative tasks, such as backing up Providers and objects databases, accessing printers, and administering user Each type of directory system can access with the accounts. ADSI makes it possible for to: DirectoryEntry component has a specific directory ❖ Log on once to work with diverse directories. The protocol (called a service provider ) that allows to access DirectoryEntry component class provides username and work with that directory's contents. ADSI was and password properties that can be entered at runtime created to eliminate the difficulty of switching back and and communicated to the Active Directory object are forth between these protocols by enabling developers to binding to. access all of the protocols through a single interface. ❖ When an instance of a Directory Entry component is Use a single application programming interface (API) created, specify a path for it that indicates the type of to perform tasks on multiple directory systems by provider in use on the system are accessing and the offering the user a variety of protocols to use object to which it wants to bind. The following table ❖ The DirectoryServices namespace provides the classes lists the service providers can access and the identifiers to perform most administrative functions. for each. ❖ Perform "rich querying" on directory systems. ADSI technology allows for searching for an object by Service provider Path identifier specifying two query dialects: SQL and LDAP. Windows NT version WinNT://path ❖ Access and use a single, hierarchical structure for 5.0, ,or administering and maintaining diverse and complicated Windows XP network configurations by accessing an Active Lightweight Directory LDAP://path Directory tree. Access Protocol (LDAP) Searching directories NetWare NDS://path Using the Directory Searcher class to search and perform Directory Service queries against an Active Directory hierarchy using the Novell Netware 3. x NWCOMPAT://path Lightweight Directory Access Protocol (LDAP). This helps Each service provider makes available to a to perform queries based on properties (Rich Query) of an different set of objects with associated data and object that is located in a large directory to find a specific behaviors that can access and manipulate. These objects object by one or more of its property values. correspond to items and resources in the directory tree Administering directories

11 International Journal of Pure and Applied Mathematics Special Issue

The Directory Entry component can be bound to an Information Model (CIM) to represent managed objects in object in the directory to perform administrative tasks, Windows-based environments. CIM is a data model, a such as modifying properties or monitoring conceptual view of the environment, that unifies and informational changes. For example, suppose that a extends existing instrumentation and management standards company allows employees to place online orders for (SNMP, DMI, CMIP, and so on) using object-oriented books needed in their jobs. Spending limits vary constructs and design. depending on the employee's position. When an Web-based Enterprise Management is an industry- employee places a book order, the company's tracking wide DMTF initiative that supports uniform system, application can use a Directory Entry component to network, and applications management based on the verify information about the employee's position and Common Information Model, also a DMTF standard. The spending limits. If the limit is exceeded, the Directory goals of this initiative are to develop standardized Entry component can retrieve the e-mail address for the technology for accessing management information in an employee and his manager and can then send additional enterprise environment, and to enable the development of information to both of them. Both the Directory Entry tools and technologies that reduce the complexity and costs component and Directory Searcher component require of enterprise management. By providing such standards, that have the ADSI SDK or ADSI runtime installed on r this initiative contributes to the industry-wide efforts to computer in order to create applications with their lower total cost of ownership (TCO). TCO refers to the functionality. ADSI 2.5 is installed by default with administrative costs associated with computer hardware and Windows NT version 5.0, Windows 2000, or Windows software purchases, deployment and configuration, XP. When using a previous version of Windows, you hardware and software updates, training, maintenance, and can install the SDK from the Microsoft web site. technical support. WMI ARCHITECTURE The WBEM initiative proceeds through the cooperative efforts of the founding member companies of The monitoring module is based on Windows WBEM, BMC Software Inc., Cisco Systems Inc., Compaq Management Instrumentation (WMI). Windows Computer Corp., Intel Corp., and Microsoft Corp., as well Management Instrumentation is a scalable system as many other companies active in the DMTF. management infrastructure that uses a single consistent, standards-based, extensible, object-oriented interface. Windows management instrumentation technology WMI provides a standard way to interact with system The Windows Management Instrumentation technology is a management information and the underlying WMI . management infrastructure that supports the syntax of CIM, The figures below represent the architecture of WMI. the Managed Object Format (MOF), and a common programming interface. The Managed Object Format is used to define the structure and contents of the CIM schema in human and machine-readable form. Windows Management Instrumentation offers a powerful set of services, including query-based information retrieval and event notification. These services and the management data are accessed through a (COM) programming interface. Additionally, support for scripting is provided in the WMI scripting interface. The architecture of WMI is described below Figure 2. WMI Architecture The Windows Management Instrumentation technology Windows management instrumentation (WMI) provides: WMI is used primarily by system management ● Access to monitor, command, and control any entity application developers and administrators to access and through a common, unifying set of interfaces, manipulate system management information. Windows irrespective of the underlying instrumentation Management Instrumentation (WMI) technology is an mechanism. implementation of the Desktop Management Task ● WMI is an access mechanism. A logically Force's (DMTF) Web-based Enterprise Management organized, consistent model of Windows operation, (WBEM) initiative for operating configuration, and status. systems. It takes advantage of the DMTF Common

12 International Journal of Pure and Applied Mathematics Special Issue

● A COM application programming interface ® sockets implementation in the Berkeley Software (API) for providing and accessing management Distribution (BSD, release 4.3) from the University of information. California at Berkeley. The specification includes both ● Interoperability with other Windows BSD-style socket routines and extensions specific to management services. This approach simplifies Windows. Using Windows Sockets permits the application developers' efforts to create integrated and well- to communicate across any network that conforms to the architected management solutions. Windows Sockets API. On Win32, Windows Sockets ● A flexible architecture. This allows vendors to provide for thread safety. extend the information model to cover managed Many network software vendors support Windows objects, such as devices and applications, by Sockets under network protocols including Transmission writing code modules called providers Control Protocol/Internet Protocol (TCP/IP), Xerox® (previously called WBEM providers). Network System (XNS), Digital Equipment Corporation’s ● Providers are the means to connect Windows DECNet ™ protocol, Novell ® Corporation’s Internet Packet Management Instrumentation with one or more Exchange/Sequenced Packed Exchange (IPX/SPX), and sources of management information. others. Although the present Windows Sockets ● Extensions to the Windows Driver Model specification defines the sockets abstraction for TCP/IP, (WDM) to capture instrumentation data and any network protocol can comply with Windows Sockets events from device drivers and kernel-side by supplying its own version of the dynamic link components. (DLL) that implements Windows Sockets. Examples of ● A powerful event mechanism that allows commercial applications written with Windows Sockets management events to be asserted and associated include Window servers X, terminal emulators, and with other management information. These electronic mail systems.A socket is a communication notifications can also be forwarded to local or endpoint — an object through which a Windows Sockets remote management applications. A rich query application sends or receives packets of data across a language that enables detailed queries of the network. A socket has a type and is associated with a information model. running process, and it may have a name. Currently, ● A scriptable API that developers can use to sockets generally exchange data only with other sockets in create management applications. The scripting the same “communication domain,” which uses the Internet API supports several languages, including Protocol Suite. Both kinds of sockets are bi-directional: Microsoft Visual Basic®; Visual Basic for they are data flows that can be communicated in both Applications; Visual Basic Scripting Edition directions simultaneously (full-duplex). Two socket types (VBScript); Microsoft JScript®, and Perl. are available: Additionally, we can use the Windows Scripting ● Stream Sockets Host or to write scripts that use Stream sockets provide for a data flow this interface. Windows Scripting Host, like without record boundaries - a stream of bytes. Internet Explorer, serves as a controller engine of Streams are guaranteed to be delivered and to be ActiveX® scripting engines. Windows Scripting correctly sequence and unduplicated. Host supports scripts written in VBScript, ● Datagram Sockets JScript, and Perl. Datagram sockets support a record- ● By extending CIM and supporting MOF and a oriented data flow that is not guaranteed to be common programming interface, the Windows delivered and may not be sequenced as sent or Management Instrumentation technology enables unduplicated. diverse applications to transparently manage a variety of enterprise components. OVERALL REMOTE SERVER ACCESS WINSOCK PROTOCOL ARCHITECTURE Name commonly used for the Windows Sockets Remote Desktop Controller Server programming interface, used to provide a protocol- Remote Desktop Controller Server is the server independent transport interface. Windows CE supports program, which sends its desktop window in real time to a most of the common Winsock functions. client program over the Internet or a modem, or a connection oriented networking system. The Windows Sockets specification defines a Remote Desktop Controller Client binary-compatible network-programming interface for The Remote Desktop Controller Client is the client Microsoft Windows. Windows Sockets are based on the program, which displays the desktop of a machine running

13 International Journal of Pure and Applied Mathematics Special Issue

the server program. Here we have to connect the client price of safety in an active network. IEEE/KICS Journal of program with the specified IP address of the server Communications and Networks (JCN), March 2001. machine. Thereafter, the client machine can have a talk [2] K. G. Anagnostakis, M.W. Hicks, S. Ioannidis, A. D. and also control the server in some ways. Keromytis, and J. M. Smith. Scalable resource control in

active networks. In Proceedings of the 2nd International 5. Conclusion Working Conference on Active Networks (IWAN), October Thus the project was initiated to work in a more efficient 2000. and personal way. This enables the administrator to keep [3] K. G. Anagnostakis, S. Ioannidis, S. Miltchev, and J. M. in track of his network. The tool is basically built using Smith. Practical network applications on a lightweight VB.NET with the help of ADSI and WMI technologies. active management environment. In Proceedings of the 3rd A tool to manage and monitor remote machines on a International Working Conference on Active Networks network has been devised and has been found working (IWAN), October 2001. in a networked environment with accuracy and consistency. The developed system works on a [4] Andrew S. Tanenbaum, Computer Networks, Fourth Windows environment with the application installed on edition (2003) Prentice Hall of India Publications. a Windows 2000 machine. The tool proves to be of great [5] Noel Jerke, Visual Basic6 The Complete Reference, aid to an administrator to control remote machines in the (1999) Tata McGraw Hill, New Delhi. network. [6] http://www.msdn.microsoft.com 6. Future Enhancements [7] http://www.vbcity.com Enhancing a system is the most basic thing for development. A thing is not considered to be efficient if [8] http://www.vbdotnetheaven.com .. it is not developed and adapts to the advancements in the technology. So, there must be a consistent development in any system. A system may appear to be efficient enough at that time, but as time progresses the system should also be enhanced to the level of advancement in the technology.

Work Groups Considering the future enhancement of this tool, it could be done to work fine for workgroups in the network. At present it satisfies all possible needs of network having domain. Multiple Servers This system can also be enhanced to access multiple servers by single client. This can be done by dividing the client desktop to view the different server’s desktop.

Processing Speed The processing speed of the tool can also be improved. Since desktop capturing undergoes compression and decompression it is reasonably slow. Similarly when loading the hosts of a specific domain if it is a huge network the process is slowed. This is expected to overcome in the days to come.

References [1] D. S. Alexander, P. B. Menage, W. A. Arbaugh, A. D. Keromytis, K. Anagnostakis, and J. M. Smith. The

14 15 16