View
394
Download
0
Category
Tags:
Preview:
DESCRIPTION
The slideshow I had developed for Same (Supernodal Asset Management Environment), part of the University of Toledo Engineering Design Expo, and my senior capstone project.
Citation preview
SameBy Team 17Supernodal Asset Management Environment
Same
Same is… A new approach to IT Asset Management
inventory applications A way to increase the efficiency of your IT
department, and therefore your entire company Able to collect hardware and software
information through the network automatically, and without disturbing anyone
Our idea of how inventory management should work
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Same is… A new approach to IT Asset Management
inventory applications A way to increase the efficiency of your IT
department, and therefore your entire company Able to collect hardware and software
information through the network automatically, and without disturbing anyone
Our idea of how inventory management should work
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Same is… A new approach to IT Asset Management
inventory applications A way to increase the efficiency of your IT
department, and therefore your entire company Able to collect hardware and software
information through the network automatically, and without disturbing anyone
Our idea of how inventory management should work
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Same is… A new approach to IT Asset Management
inventory applications A way to increase the efficiency of your IT
department, and therefore your entire company Able to collect hardware and software
information through the network automatically, and without disturbing anyone
Our idea of how inventory management should work
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Inventory management is considered one of the most important aspects of maintaining an efficient Information Technology Department.
It provides IT staff with the answers to questions like:
What software is used the most by our users? Which computers need replaced the soonest?
Traditionally, inventory management applications are either designed for small businesses or large businesses, not both.
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Inventory management is considered one of the most important aspects of maintaining an efficient Information Technology Department.
It provides IT staff with the answers to questions like:
What software is used the most by our users? Which computers need replaced the soonest?
Traditionally, inventory management applications are either designed for small businesses or large businesses, not both.
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Inventory management is considered one of the most important aspects of maintaining an efficient Information Technology Department.
It provides IT staff with the answers to questions like:
What software is used the most by our users? Which computers need replaced the soonest?
Traditionally, inventory management applications are either designed for small businesses or large businesses, not both.
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Small business-oriented programs… Scan a network, pulling information from
each computer they find one by one. Can work seamlessly on all operating
systems (Windows, Mac, Linux) Require nothing but a server to work
from and a network to scan Take far too long to scan a large network
To scan the University of Toledo would take a month!
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Small business-oriented programs… Scan a network, pulling information from
each computer they find one by one. Can work seamlessly on all operating
systems (Windows, Mac, Linux) Require nothing but a server to work
from and a network to scan Take far too long to scan a large network
To scan the University of Toledo would take a month!
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Small business-oriented programs… Scan a network, pulling information from
each computer they find one by one. Can work seamlessly on all operating
systems (Windows, Mac, Linux) Require nothing but a server to work
from and a network to scan Take far too long to scan a large network
To scan the University of Toledo would take a month!
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Small business-oriented programs… Scan a network, pulling information from
each computer they find one by one. Can work seamlessly on all operating
systems (Windows, Mac, Linux) Require nothing but a server to work
from and a network to scan Take far too long to scan a large network
To scan the University of Toledo would take a month!
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Large business-oriented programs… Usually need a separate program, often called
an ‘agent’, to be installed on every computer Often require substantial (and extremely
costly) infrastructure systems be in place to work right
Mostly only support Windows, because of the requirements mentioned earlier
Run lightning fast because the agent does all the work, and can often help manage computers too
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Large business-oriented programs… Usually need a separate program, often called
an ‘agent’, to be installed on every computer Often require substantial (and extremely
costly) infrastructure systems be in place to work right
Mostly only support Windows, because of the requirements mentioned earlier
Run lightning fast because the agent does all the work, and can often help manage computers too
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Large business-oriented programs… Usually need a separate program, often called
an ‘agent’, to be installed on every computer Often require substantial (and extremely
costly) infrastructure systems be in place to work right
Mostly only support Windows, because of the requirements mentioned earlier
Run lightning fast because the agent does all the work, and can often help manage computers too
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Large business-oriented programs… Usually need a separate program, often called
an ‘agent’, to be installed on every computer Often require substantial (and extremely
costly) infrastructure systems be in place to work right
Mostly only support Windows, because of the requirements mentioned earlier
Run lightning fast because the agent does all the work, and can often help manage computers too
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
What makes Same different? Same is a hybrid of the small business and
large business methods. It uses a networking concept known as
‘Supernodes’ to distribute the work evenly, greatly speeding up the whole scanning process
Supernodes are computers on a network that can perform tasks for a server, so it can focus on other jobs
Same can scale to meet the needs of any company
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
What makes Same different? Same is a hybrid of the small business and
large business methods. It uses a networking concept known as
‘Supernodes’ to distribute the work evenly, greatly speeding up the whole scanning process
Supernodes are computers on a network that can perform tasks for a server, so it can focus on other jobs
Same can scale to meet the needs of any company
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
What makes Same different? Same is a hybrid of the small business and
large business methods. It uses a networking concept known as
‘Supernodes’ to distribute the work evenly, greatly speeding up the whole scanning process
Supernodes are computers on a network that can perform tasks for a server, so it can focus on other jobs
Same can scale to meet the needs of any company
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Same is a suite of three applications
A database, to store collected data and act as a scanner switchboard
A set of scanners, which work as a team to quickly gather information
A web interface, for reporting and scanner administration
Website
Scanners
Database
• Displays Data
• Configures• Collect Data
• Work Together
• Stores Data• Switchboard
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
An overview of Same’s web-based interface
Same
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Dashboard
Provides Administrator and Technician level users of Same a quick view of scanner status, as well as access to newly scanned computers and saved reports
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Inventory
Displays all the information the database has to offer about the computers found on the network.
Provides an easy to digest format for important data.
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Reports
A user friendly way of creating customized views of the data collected by Same. Users choose which columns to display in what order, and can set filters to narrow results.
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
Configure
Accessible only to the Administrator level users.
Add new users, edit existing ones, authorize and set up scan jobs and quickly access to the interface’s usage logs.
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Step-by-step with the Same scanner program
Same
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
The Same scanner Written using the Ruby programming
language Unlike most programming languages, Ruby programs can
be run on any operating system without making any changes to the code
Designed to run in the background as a service on the Supernode it operates from, so users won’t even realize it’s there
Uses the Same database to distribute the workload evenly across all scanners
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
The Same scanner Written using the Ruby programming
language Unlike most programming languages, Ruby programs can
be run on any operating system without making any changes to the code
Designed to run in the background as a service on the Supernode it operates from, so users won’t even realize it’s there
Uses the Same database to distribute the workload evenly across all scanners
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
The Same scanner Written using the Ruby programming
language Unlike most programming languages, Ruby programs can
be run on any operating system without making any changes to the code
Designed to run in the background as a service on the Supernode it operates from, so users won’t even realize it’s there
Uses the Same database to distribute the workload evenly across all scanners
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Same
The Same scanner Uses a special secure
algorithm to generate the database credentials to use
Checks in with the server, looking for any outstanding scan requests to do
Works through the list of IP addresses given in the scan request, trying each address to see if a computer is currently using it
Attempts to connect to each computer using the username and password listed as part of the scan request
Gathers all the information it can on the computers it connects to
Sends the results of the scan to the database for storage and later review
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Team 17 thanks you for your interest!
Same
Team 17Senior Technology CapstoneCopyright © 2009 Nick Fraker & Kat Schudel, All Rights Reserved
Recommended