The document describes an N-View network monitoring application that uses SNMP v2 to monitor devices on a network. It allows monitoring processes, software, interfaces, drivers, storage, and system configuration of devices. The application supports role-based access, customized notifications, and displays data in tables and charts. It was developed using Java, HTML, CSS, JavaScript, Spring Framework, and MySQL database. The application provides features such as device management, live data collection, diagnostics tests, and data visualization charts.
1 of 40
Download to read offline
More Related Content
Group 41 - Nview
1. N-View
based on Simple Network Management Protocol(SNMP)
Under the Supervision of
Mr. Abhijit Chanda (VP Technology, Gamma Analytics, Kolkata)
and
Ms. Shrijana Pradhan (Assistant Professor II , CSE, SMIT)
SIKKIM MANIPAL INSTITUTE OF TECHNOLOGY
MAJITAR RANGPO, EAST SIKKIM 737136
Submitted by,
Rishav Kumar (Reg. No.- 20120068)
Rushil Kumar (Reg. No.-20120064)
2. Contents
S.NO. Title
1 Abstract
2 Introduction
3 Survey
4 Problem Definition
5 Solution Strategy
6 Methodology
7 Results and discussion
8 References
3. Abstract
deals with monitoring of all devices (PCs) from any device in a
network.
uses SNMP v2.
supports role based user access.
supports customised notification feature.
N-VIEW
4. Introduction
In a network that uses SNMP, there are managers and agents.
SNMP has three versions, i.e., v1, v2 and v3.
N-View monitors parameters describing process, software
installed, interface, drivers , storage and system configuration
details.
The managers and agents need to have SNMP service enabled.
6. Survey
30
Sl
No
Application Name Site Name Findings
1 Incognito www.incognito.com Works on TR69 which is not
supported by most of the
network devices and data
transferred is not
compressed.
2 Snmpwalk www.net-snmp-
sourceforge.net
Works on SNMP but no user
Interface.
3 PRTG www.paessler.com/prtg Works on SNMP but lacks
rule based notification.
4 OpenNMS www.opennms.org Complex user interface and
data is not shown in detail.
7. Problem Definition
Most of the applications have complex user interface.
They lack rule based notification feature.
They do not show the network data in detail.
8. Solution Strategy
The data collected from a computer is divided into distinct
categories.
The data is presented in easily user understandable form.
The data collected is used to conduct vivid tests and plot
charts.
Rule based notification system is designed with e-mail
notifications.
13. Figure 5: Flow chart for performing diagnostics
Methodology(cont)
14. Figure 6: Flow chart for showing data in charts
Methodology(cont)
15. Results and Discussion
Device Management
Device Addition :-
Figure 7: Register a device by its IP and Community name.
The computers in network are identified by the manager implementing
SNMPv2 by their respective IP addresses and community names.
Enter IP Enter Community
16. Results and Discussion(cont)
Figure 8: Get live data from added devices or remove added devices
Device Management ( Cont..)
Updating the dynamic list of devices :-
18. Figure 10: Data table showing software installed of a selected device.
Results and Discussion(cont)
Device Management : Live Data
19. Figure 11: Data table showing storage details of a selected device.
Results and Discussion(cont)
Device Management : Live Data
20. Figure 12: Data table showing drivers installed of a selected device.
Results and Discussion(cont)
Device Management : Live Data
21. Figure 13: Data table showing Interface of a selected device.
Results and Discussion(cont)
Device Management : Live Data
22. Figure 14: Data table showing system details of a selected device.
Results and Discussion(cont)
Device Management : Live Data
23. Figure 15: Data table showing system details of a selected device.
Results and Discussion(cont)
Diagnostics : External Device Test
24. Figure 16: Data table showing Download / Upload Test.
Results and Discussion(cont)
Diagnostics : Data Usage Test
25. Figure 17: Data table showing list of PC having minimum required RAM.
Results and Discussion(cont)
Diagnostics : Performance Test
26. Figure 18: Data table showing process test for a specific process.
Results and Discussion(cont)
Diagnostics : Process Test
27. Figure 19: Multi Series Column Chart of Upload / Download..
Results and Discussion(cont)
Charts : Top 10 Pcs having maximum data usage
28. Figure 20 :3D Column Chart of top PCs having frequent use of external devices.
Results and Discussion(cont)
Charts : Top 10 PCs having maximum external device usage
29. Figure 21: 3D Column Chart of top PCs using RAM.
Results and Discussion(cont)
Charts : Top 10 Pcs having maximum RAM consumption
30. Figure 22: 3D Pie Chart of top 10 PCs having larger storage space.
Results and Discussion(cont)
Charts : Top 10 Pcs having maximum storage space.
31. Figure 23: 3D Doughnut Chart of top 10 PCs having larger free space.
Results and Discussion(cont)
Charts : Top 10 Pcs having maximum free space.
34. Conclusion
Role based user management was implemented.
Real time data can be seen of any device within the network.
Rule based notification feature was implemented.
Diagnostics and charts were successfully implemented.
35. Limitations
Static IP should be used to avoid complexity in Live View
feature.
The time required to fetch data from a network depends upon
the type of network connection and the computers used in the
network.
36. Future Scope
The application can be accessed and controlled by smartphones
or remote computers through internet and Wi-Fi.
Machine learning can be incorporated with this application to
identify the parameters (provided by SNMP) if any that has any
link with productivity or bugs within the network and find their
relationship.