Design and Development of Network Monitoring and Controlling Tool for Domain Controller @ Department of Computer Studies, CISBER using RMI Technology- A Case Study

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2015 by IJETT Journal
Volume-26 Number-2
Year of Publication : 2015
Authors : Dr. P.G. Naik, Mr. M.B. Patil
  10.14445/22315381/IJETT-V26P211

MLA 

Dr. P.G. Naik, Mr. M.B. Patil "Design and Development of Network Monitoring and Controlling Tool for Domain Controller @ Department of Computer Studies, CISBER using RMI Technology- A Case Study", International Journal of Engineering Trends and Technology (IJETT), V26(2),55-64 August 2015. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
A large and a moderate sized organization typically consists of a computer network comprising of nodes of different configuration. Further, based on the position of an employee in an organizational hierarchy the network user can be granted permission for accessing certain resources. This can be achieved at the application level by performing an employee role mapping to a pre-defined task list. In the case of shared resources disciplined approach is desirable for proper sharing of band width based on the factors such as a priority of a task, role of an employee in the organization etc., failing of which will result in a legitimate user being deprived of his fair share. In their earlier work, the authors have designed and developed a network monitoring and controlling tool using both single threading and multi threading models. The tool has been thoroughly tested in work group environment and works as per the expectations. However, the tool has not taken care of domain controller and as such has some limitations it its scope and usability. In order to overcome these limitations, the authors have re-designed the tool for domain controller using Java's RMI technology. A single site of control is achieved using FTP and Telnet technologies. As before, the task permissions and the duration for which the tasks are permissible on different machines are stored in XML configuration file which is parsed using JDOM (Java Document Object Model) parser. The configuration file contains the details such as the machine name and the list of tasks not permitted on that machine during a specified time interval. The list of machines and the list of tasks not permitted on that machine for the given time period are configurable by an end user. A user friendly interface is developed for this purpose.

 References

[1] Design and Development of Network Monitoring and Controlling Tool for Department of Computer Studies CSIBER, International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 3 Issue: 3 1237 – 1243
[2] Design and Development of Multithreaded Network Monitoring and Controlling Tool for Department of Computer Studies CSIBER, Proceedings of UGC Sponsored National Seminar on Recent Trends in Information Technology, organized by Department of Computer Studies CSIBER, Kolhapur, 6th and 7th March, 2015.
[3]. Soyoung Hwang and Donghui Yu, Remote Monitoring and Controlling System Based on ZigBee Networks, International Journal of Software Engineering and Its Applications Vol. 6,No. 3, July, 2012
[4] R. Caceres, N. G. Du±eld, J. Horowitz and D. Towsley, \Multicast-based inference of network-internal loss characteristics", IEEE Trans. in Inf. Theory, vol. 45, pp. 2462-2480, 1999
[5] M. Rabbat, R. Nowak and M. Coates, \Multiple source, multiple destination network tomography",in Proc.of IEEE Infocom 2004
[6] Y. Chen, D. Bindel, H.Song and R.Katz, \An algebraic approach to practical and scalable overlay network monitoring,"in Proc. ACM SIGCOMM 2004
[7] ANSWER: Network Monitoring Using Object-Oriented Rules Gary M. Weiss, Johannes P. Ros and Anoop Singhal Proceedings of the Tenth Conference on Innovative Applications of Artificial Intelligence
[8] W. Mathews and L. Cottrell, ―The PingER project: Active internet performance monitoring for the HENP community, IEEE Commun. Mag., vol. 38, no. 5, pp. 130–136, May 2000.
[9]S. Kalidindi and M. Zekauskas, ―Surveyor: An infrastructure for internet performance measurements, in Proc. INET‘99, 1999.
[10]R. Wolski, N. Spring, and C. Peterson, ―Implementing a performance forecasting system for metacomputing: the network weather service, in Proc. of Supercomputing, 1997.,AAAI Press, 1998, 1087-1093
[11] V. Paxson, J. Mahdavi, A. Adams, and M. Mathis, ―An architecture for large-scale internet measurement, IEEE Commun. Mag., vol. 36, no. 8, pp. 48–54, Aug. 1998.
[12]G. Almes, S. Kalidindi, and M. Zekauskas, ―A one-way delay metric for IPPM, RFC2679, 1999.
[13]G.Almes, S. Kalidindi, and M. Zekauskas, ―A one-way loss metric for IPPM, RFC2680, 1999.
[14] T. Oetiker and D. Rand. Multi router traffic grapher. [Online]. Available: http://www.mrtg.org/
[15] Risto Vaarandi, ―Platform Independent Event Correlation Tool forNetwork Management, Proceedings of the 2002 IEEE/IFIP NetworkOperations and Management Symposium.
[16] Jeonghwa Yang, W. Keith Edwards, David Haslem, ―Eden: SupportingHome Network Management Through Interactive Visual Tools, UIST‘10 October 3-6, 2010, New York.

Keywords
FTP, JDOM, Remote Method Invocation, Network, Tasklist, Telnet, Workgroup.