Upload
corey-tyler
View
215
Download
0
Tags:
Embed Size (px)
Citation preview
CSCI321 : IT2/1A : Physical Network Aid
Mr Ee Kiam KeongLim Willie,
Chua Shui LiTan Yong Meng
Shirley ChinNoraizah Naftalia
Team Chart
Based on the given descriptions on the project outline and some interactions with Mr. Ee,we break our researches into three main area,1. Network packet analyzer2. Network management system3. Network virtualization
Market Researches
1. Network packet analyzerWire Shark is an open source product that offer network packet analyzing
2. Network management systemNmap is an open source product that offer network exploration
3. Network management systemManageEngine OPManager is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization.
Market Researches
4. Network management systemHuawei iManager U2000 is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization.
5. Network management systemStableNet is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization.
6. Network management systemHitachi IT operation analyzer is GUI network virtualization. It also provide monitoring and fault reporting on owned network IT devices.
Market Researches
Common features available,1. Physical hardware information2. Software information3. Network information4. Storage for the information5. Warn/Alert feature
Weak or missing feature,1. GUI presentation2. Profile management for specific environment.
Conclusion from the researches
Features1. Intelligent Network Discovery2. Automated Network Visualization Mapping3. Network Visualization Mapping Manipulation4. Device Information Extraction5. Smart Network Monitoring6. Network Profile Management7. Network Information Management
Optional feature1. Fault Reporting or Alerting
Project Scope
Targeted Users1. Wide range from home user to organization IT system administrator
General Purpose1. Network audit, checking for anonymous users.
Specific Purpose1. Network monitoring of networked device availability 2. Network alert of networked device failure3. General reporting of the device monitored
Advantage1. Profile customization for specific environment.
Project Value
Waterfall model
Advantages1. Waterfall is selected, due to clear and well defined scopes approved by end user. 2. Less complicated model, due to it single point of entry and exit on each phases.
Disadvantages1. Very hard to handle changes.
Project Methodology
Programming LanguageJava and CC is used mainly for the information extraction.Java is used mainly for the GUI presentation.
Both are multi-platform, open source and have a rich system library to utilities
Java is selected due to CSCI213, Java Programming and Object Oriented Design.
C is selected due to CSCI114, CSCI124, CSCI204. There is some exposure on similar languages.
Project Development and Deployment Platform
Operating SystemMicrosoft
It is selected due to the huge market potential on the OS user research.
Relational Database Management SystemMySQL
It is selected due to its multi-platform and open source product.
Project Development and Deployment Platform
ArchitectureStandalone
It is selected for the product wishing penetrate into a wide range of target user. This will allow more flexibility on the product marketing.
Project Deployment Architecture and Environment
The following risks are identified and possible solutions are brainstormed and finalized.Risks1. Topic understanding2. Design of the product3. Development of the product4. Report preparation5. Poor communication6. Poor tasks delivery
Project Risks
Solutions1. Regular meeting with the team members for efficient communication and progress update. Targeted meeting is once a week.2. Regular meeting with supervisor for increment mile stone progress. Targeted meeting is once a fortnight.3. Clear task and role delegation out front before the project.4. Intense researches conducted to minimum risk exposure.
Project Risks
Project Time Line
Project Time Line
Project Time Line
Project Use Case and Sequence Diagram
Project Use Case and Sequence Diagram
Project ER diagram
Project Conceptual Model
DISCOVERY MACAddress ID1IPAddress ID2NetProtocolType
DEVICE HostNameDeviceTypeAmtOfCableConnType
VIRTUALIZATIONProfile ID
MONITORING DateTime IDRefreshRateStatus
INFORMATION UpTimeDownTimeService
USERUsername IDPasswordRights
LOGINLoginDateTime ID
1..* *
Login
1..*
*Consists ofConsists of
1..*
*
Consists of
0..1
*
Project Relational Schema USER (Username, Password, Rights)Primary key: Username
LOGIN(LoginDateTime, Username, Profile)Primary key: (LoginDateTime, Username, Profile)Foreign key: Username references USER (Username)
VIRTUALIZATION(Profile)Primary key: Profile
DISCOVERY (MACAddress, IPAddress, NetProtocolType)Primary key: MACAddressCandidate key: IPAddress
DEVICE(MACAddress,HostName, DeviceType, AmtOfCable, ConnType)Primary key: MACAddressForeign key: (MACAddress) references DISCOVERY (MACAddress)
MONITORING(MACAddress, IPAddress, DateTime, RefreshRate, Status)Primary key: (MACAddress, IPAddress, DateTime)Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress)
INFORMATION(MACAddress, IPAddress, DateTime, UpTime, DownTime, Service)Primary key: (MACAddress, IPAddress, DateTime)Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress)Foreign key: (DateTime) references MONITORING(DateTime)
Table: USERTableUSER (Username, Password, Rights)Primary key: (Username)DescriptionEach person has their own username and password to enter the system. Table: LOGINTableLOGIN (LoginDateTime, Username, Profile)Primary key: (LoginDateTime, Username, Profile)Foreign key: (Username) references USER(Username)DescriptionWhen user logged in, login timing captured by the system to track when did the user came in.
Table: VIRTUALIZATIONTableVIRTUALIZATION (Profile)Primary key: (Profile)DescriptionUser stored their personal information in the system.
Project Data Dictionary
Table: DISCOVERYTableDISCOVERY (MACAddress, IPAddress, NetProtocolType)Primary key: (MACAddress)Candidate key: IPAddressDescriptionDiscover and store type of protocol or addresses for each device. Table: DEVICETableDEVICE (MACAddress, HostName, DeviceType, AmtOfCable, ConnType)Primary key: (MACAddress)Foreign key: (MACAddress) references DISCOVERY (MACAddress)DescriptionEach device contains basic information to make sure each device connect to correct network.
Project Data Dictionary
Table: MONITORINGTableMONITORING (MACAddress, IPAddress, DateTime, RefreshRate, Status)Primary key: (MACAddress, IPAddress, DateTime)Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress)DescriptionSet the timer for all devices on refresh time rate and save status progress. INFORMATIONTableINFORMATION (MACAddress, IPAddress, DateTime, UpTime, DownTime, Service)Primary key: (MACAddress, IPAddress, DateTime)Foreign key: (MACAddress, IPAddress) references (MACAddress, IPAddress)Foreign key: (DateTime) references MONITORING (DateTime)DescriptionUpdate status uptime and downtime of each connection from time to time while monitoring network and devices.
Project Data Dictionary
Project Interface Design
Project Interface Design
Network Discovery GUI
Project Interface Design
Virtualization Mapping GUI
Project Interface Design
Profile Management GUI
Project Interface Design
Virtualization manipulation GUI
Project ProgressProgramming development phaseNetwork Discovery Module1. ICMP scanning : done2. ARP scanning : done3. Port scanning : still developing
GUI : Network Discovery Module1. ICMP scanning : done2. ARP scanning : done3. Port scanning : done
Database read/write1. ICMP scanning : in progress2. ARP scanning : in progress3. Port scanning : not ready
JUnit Testing phaseNetwork Discovery Module1. ICMP scanning : in progress2. ARP scanning : in progress3. Port scanning : not ready
Project Progress
Incoming programming development phase1. Virtualization mapping2. Virtualization mapping manipulation3. Login management module4. Profile management module5. Network monitoring module6. Device extraction module7. Global statistic reporting module