20
Network Monitoring Through Mobile (MOBTOP) Developed By : Akanksha Jain. (102199) Shikha Arora (101319) Team Name: Beans Course: CS532 Guided By:Prof. Robert Zhu SUBMITTED TO : Herguan University , Sunnyvale (CA)

Network Monitoring Through Mobile (MOBTOP) Developed By : Akanksha Jain. (102199) Shikha Arora (101319) Team Name: Beans Course: CS532 Guided By:Prof

Embed Size (px)

Citation preview

Network Monitoring Through Mobile (MOBTOP)

Developed By : Akanksha Jain.

(102199)

Shikha Arora

(101319)

Team Name: Beans

Course: CS532 Guided By:Prof. Robert Zhu

SUBMITTED TO :

Herguan University , Sunnyvale (CA)

Introduction

•MOBTOP is a networking based application S/W

•It is based on WAP technology.

•It is based on the Client–Server model .

PurposeThis Software is basically designed for persons who want to monitor their N/W and access sites through mobile.

For example: a Network Administrator of any institute or organization.

Project Scope

• This project will help execute network commands through the mobile phone.

• Through this application we may keep track of server, use the utility of time and date etc., and check the network status.

• The end user can fire the network commands like netstat, ping, ipconfig etc. to check and interact with network server which may be stand-alone or server of LAN.

Product Features

• Administrator can continuously monitor what process is executing at his network terminals on his mobile.

• Administrator can access sites through his mobile.

• He can start and stop the Network (N/W) server.

• He can start and stop the Database (D/B) server.

• Any authorize person can get the information about his/her organization on his/her mobile phone.

• An authorize person can retrieve his/her data on his/her mobile.

Component Based Development Process Model

•Data Exchange Model:

•Automation

•Structured storage

•Underlying object model

4 ingredients for implement component-based development:

Feasibility is characterized as

•Technical Feasibility.•Economical Feasibility.•Operational Feasibility.

MOBTOP has all these 3 features hence it does not have

rigid S/w & H/w requirements, Cost of development is

low, and it can be easily used by the users.

Feasibility Study

Data Flow Diagram(Context Diagram)

MOBTOPAdministrator Administrator

DFD-LEVEL 1

Data Base

Server

Read input

Establish session

Administrator

Login data

Command

Connection information

Connection information

Output To be displayed

Output to be displayed

Data

Data Base

Network Server

System Architecture

WAP Gateway

Web ServerMobile Browser

WAP Emulator

N/W Server

D/B Server

Socket

Socket

Architectural Design

DatabaseHTTP

Request Interface

Login Card

N/W ServerServlet JWSHTTP

HTTP

Socket

Java web Server

Use Case Diagram

Use Case Diagram for server connection

Establish connection

Connection Info

Administrator Server machine

machine

PRE : Client is waiting for Server POST: Connection will be established established Between Client and Server. AND Server is waiting for Request from Client.

Use Case for handling network server

Network Server

Output On mobile Browser

Execute Command

Request from Administrator

Class diagram for Network Server

Network Server GUI Server Start Server Execute Start () Stop ()

Execute Thread Socket Execute () run ()

Start Server Thread Start Server () run ()

GUI Server Thread Start Server GUI Server () Action Performed ()

1

1

1

1

1

1

DataBase Server GUI Server1 Start Server Execute Start () Stop ()

Execute Thread Socket Execute () run ()

Start Server Thread Start Server () run ()

GUI Server1 Thread Start Server GUI Server1() Action Performed ()

1

1

1

1

1

1

Class diagram for Database Server

When User run MOBTOP then Output as follow:

Conclusion

MOBTOP has been planned with an aim to automate and ease the working of a network administrator within an intranet. Definitely with the implementation of this software the administrator control increases and he can perform his work more conveniently. Now the activities performed by the system-users within an intranet can be easily traced and controlled which will result in more productive utilization of the organization’s resources.