A Novel Method to Manage Network Requirements S
Total Page:16
File Type:pdf, Size:1020Kb
International Journal of Pure and Applied Mathematics Volume 116 No. 13 2017, 9-15 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu Special Issue ijpam.eu A NOVEL METHOD TO MANAGE NETWORK REQUIREMENTS S.Pothumani 1, Dr.J.Hameed Hussain 2 1Assistant Professor , Dept. of CSE, Bharath University, Chennai, Tamil Nadu, India 2Dean Engineering , Bharath University, Chennai, Tamil Nadu, India [email protected], [email protected] Abstract: The aim of this paper is to fulfill all possible a message to any client connected in the enterprise network requirements of a network administrator regarding his and Search for the given computer in the network. And also network. This also provides an efficient way for the displays all shared folders of a specified computer [1,2]. system administrator to work offsite and who needs to keep intact with his PC and do his work, so that they can 2. Related work share their PC’s with each other. The system administrator working in a multistoried building can use The existing system is a normal Network Management Tool this tool to manage the network by logging into the which can be used only for the domain based network. It server system in the main branch through LAN or has some difficulties. They are Administrator could not internet using the IP address of the server and control his control the network when he is out of station, A Remote- system and network or can work with the others. Based tool is not yet found ,Remote accessing of any server Network scrutinizer is a software tool that helps an is not possible. administrator manage the machines connected across the enterprise network and monitor the various tasks running 3. Proposed Work on various remote machines, thereby assisting the administrator in controlling the systems in the network. The existing system has a lot of drawbacks as said earlier. ADSI and WMI are the two techniques which are Considering these drawbacks in mind the proposed system implemented in the project. is developed. The proposed system is to provide an internet based Network Management System which fulfills the functionalities of an administrator like tracking IP address, 1. Introduction desktop, getting active machines in the network, searching Network scrutinizer is a software tool that helps an machine in a particular domain, etc. It is required to run on administrator manage the machines connected across the a networked Windows environment. The proposed system enterprise network and monitor the various tasks has three main modules in it. They are tracking, monitoring running on various remote machines, thereby assisting and utilities [3,4]. the administrator in controlling the systems in the The various modules and its functions in this project network. The tool aimed for administrator’s exclusive are described. The modules are divided into three main use helps in checking the availability of a machine in the categories. They are mentioned and explained in brief as network. This is used to enables the administrator to follows. work on multiple terminals by connecting his system to the server. It allows the user to retrieve a list of 3.1 Tracking computers that are active in the network. It is used to The tracking module contains four sub modules. They are Displays the IP Address of the computers. It Pings the IPAddress, Active Machines, Shared Folders, Ping and IP Address and displays whether the computer is Search. The ADSI technology helps in implementing the available in the network and Monitor and control all tracking module as it allows handling directory services. running services, processes and events on remote ● Tracking IPAddress concerns with IP Address of hosts and local machines. And it Watch features of any remote host in any domain. running tasks (the handle of the main window, process ID, Etc) , Maps & disconnects the network drives, Sends 9 International Journal of Pure and Applied Mathematics Special Issue ● Active Machines give information about the machines which are active in a network domain. ● Shared Folders tracks the folders which are shared at that time in the network. ● Ping connects a host to another host by replying the number of bytes transferred to it. ● Search performs a searching operation of a particular host in a particular domain. 3.2 Monitoring The Monitoring module contains four Sub modules in it. They are Application, Services, and Events. The monitoring module is implemented using the Windows Management Information. Figure 1. ADSI Architecture ● Application : This helps the administrator to keep in track of the applications in the network Active directory technology (ADSI) for a particular remote host. Active Directory is the Windows directory service that ● Services : This provides the administrator with provides a unified view of complex networks. It reduces the the services of a particular host in the network. number of directories and namespaces with which a ● Events : Events keep track of the events that are developer must contend. To use the ADSI technology, running and stopped in the remote host in the client computers must have ADSI 2.5 or later installed on network. them. ADSI 2.5 is automatically installed with Windows 2000 and therefore does not require installation. In a typical 3.3 Utilities organization, there are often diverse types of directories in The utilities module consists of three sub modules in it. use. These may include Windows NT directories, They are mapping, disconnecting and messaging. application-specific directories, and directories of network resources. This variety can cause problems for end users, ● Mapping : This connects Network Drives even developers, and administrators. A user may encounter from one branch to another branch office problems while trying to log on to multiple resources. An provided with a same server. administrator may face difficulties in maintaining network ● Disconnecting : Disconnects the connected resources on diverse systems. As a developer, it may need drives in the Network. to write an application to seamlessly interact with several ● Messaging : Provides administrator to interact different directories. [5] with any remote host in the network. The administrator is expected to connect with the server of the particular domain with the IP Address. The changes 4. System Architecture administrator makes to that window will automatically take This architecture used in tracking module and effect in the server. monitoring module is discussed. This includes the Active Directory provides a straightforward concepts of Active Directory Service Interface (ADSI) structuring of a complicated network of computers. An and Windows Management Instrumentation (WMI) Active Directory system is arranged in a hierarchical tree. using which tracking and monitoring module is Each node represents a resource or service available on the implemented respectively. The basic technique and the network and contains a set of properties that can be protocol used are also discussed. The windows socket is retrieved and manipulated. used to provide a protocol independent transport A directory is an information source used to store interface. information about interesting objects. A telephone directory stores information about telephone subscribers. In a file ADSI Architecture system, the directory stores information about files. In a The tracking module is based on the ADSI technology. distributed computing system or a public computer network The figures below represent the architecture of ADSI. such as the Internet, there are many interesting objects: printers, fax servers, applications, and databases. Users want to find and use these objects. Administrators want to manage how these objects are used. 10 International Journal of Pure and Applied Mathematics Special Issue A directory service differs from a directory in for that namespace. Many of the providers have objects in that a service is both the information source and the common. For example, all of the providers give access to a functionality that makes the information available to group object that represents a group account, and a user users. For example, a directory service stores object that represents a user account. information about objects such as users. That For the Windows NT service providers, can access information can be used for identification when domains, computers, print queues, and sessions. For the communicating with network resources, but also as the LDAP provider, can access organizations, locality, and definition of where the object fits into the overall Root DS Entry (rootDSE) objects. The Root DS Entry is a hierarchical scheme. Scope is the limits defined for required set of operational attributes that the user can read searching the tree or sub trees. [6] to find out fundamental characteristics of the directory and Active directory schema the server. The rootDSE is required only for LDAP providers. [8] Active Directory schemas define attributes for directory objects in much the same way that database schemas Active directory objects define structures for databases. This schema information Active Directory Service Interfaces (ADSI) is a is stored with an Active Directory hierarchy to help programmatic interface for Microsoft Windows Active expedite member searches on large directories. Directory. It enables the applications to interact with Security diverse directories on a network, using a single interface. Visual Studio .NET and the .NET Framework make it easy Active