際際滷

際際滷Share a Scribd company logo
N-View
based on Simple Network Management Protocol(SNMP)
Under the Supervision of
Mr. Abhijit Chanda (VP Technology, Gamma Analytics, Kolkata)
and
Ms. Shrijana Pradhan (Assistant Professor II , CSE, SMIT)
SIKKIM MANIPAL INSTITUTE OF TECHNOLOGY
MAJITAR RANGPO, EAST SIKKIM 737136
Submitted by,
Rishav Kumar (Reg. No.- 20120068)
Rushil Kumar (Reg. No.-20120064)
Contents
S.NO. Title
1 Abstract
2 Introduction
3 Survey
4 Problem Definition
5 Solution Strategy
6 Methodology
7 Results and discussion
8 References
Abstract
deals with monitoring of all devices (PCs) from any device in a
network.
uses SNMP v2.
supports role based user access.
supports customised notification feature.
N-VIEW
Introduction
In a network that uses SNMP, there are managers and agents.
SNMP has three versions, i.e., v1, v2 and v3.
N-View monitors parameters describing process, software
installed, interface, drivers , storage and system configuration
details.
The managers and agents need to have SNMP service enabled.
Introduction(cont)
Functionality
 Network monitor
 Automated and informative
Technology
SNMP network protocol
Technology Stack
 JAVA
 HTML, CSS, JAVASCRIPT
 MySQL
 SPRING FRAMEWORK
Survey
30
Sl
No
Application Name Site Name Findings
1 Incognito www.incognito.com Works on TR69 which is not
supported by most of the
network devices and data
transferred is not
compressed.
2 Snmpwalk www.net-snmp-
sourceforge.net
Works on SNMP but no user
Interface.
3 PRTG www.paessler.com/prtg Works on SNMP but lacks
rule based notification.
4 OpenNMS www.opennms.org Complex user interface and
data is not shown in detail.
Problem Definition
 Most of the applications have complex user interface.
They lack rule based notification feature.
They do not show the network data in detail.
Solution Strategy
 The data collected from a computer is divided into distinct
categories.
 The data is presented in easily user understandable form.
 The data collected is used to conduct vivid tests and plot
charts.
 Rule based notification system is designed with e-mail
notifications.
Store
Retrieve
Response
Request
(Manager)
(Managed Devices)
Figure 1: Manager making request to Managed devices for information and storing it in database.
Network Architecture
Methodology
Figure 2: Flow chart for control flow
Figure 3: Flow chart for control flow
Methodology(cont)
Methodology(cont)
Figure 4: Flow chart for showing real time data
Figure 5: Flow chart for performing diagnostics
Methodology(cont)
Figure 6: Flow chart for showing data in charts
Methodology(cont)
Results and Discussion
Device Management
Device Addition :-
Figure 7: Register a device by its IP and Community name.
The computers in network are identified by the manager implementing
SNMPv2 by their respective IP addresses and community names.
Enter IP Enter Community
Results and Discussion(cont)
Figure 8: Get live data from added devices or remove added devices
Device Management ( Cont..)
Updating the dynamic list of devices :-
Results and Discussion(cont)
Figure 9: Data table showing processes running in a selected device.
Device Management : Live Data
Figure 10: Data table showing software installed of a selected device.
Results and Discussion(cont)
Device Management : Live Data
Figure 11: Data table showing storage details of a selected device.
Results and Discussion(cont)
Device Management : Live Data
Figure 12: Data table showing drivers installed of a selected device.
Results and Discussion(cont)
Device Management : Live Data
Figure 13: Data table showing Interface of a selected device.
Results and Discussion(cont)
Device Management : Live Data
Figure 14: Data table showing system details of a selected device.
Results and Discussion(cont)
Device Management : Live Data
Figure 15: Data table showing system details of a selected device.
Results and Discussion(cont)
Diagnostics : External Device Test
Figure 16: Data table showing Download / Upload Test.
Results and Discussion(cont)
Diagnostics : Data Usage Test
Figure 17: Data table showing list of PC having minimum required RAM.
Results and Discussion(cont)
Diagnostics : Performance Test
Figure 18: Data table showing process test for a specific process.
Results and Discussion(cont)
Diagnostics : Process Test
Figure 19: Multi Series Column Chart of Upload / Download..
Results and Discussion(cont)
Charts : Top 10 Pcs having maximum data usage
Figure 20 :3D Column Chart of top PCs having frequent use of external devices.
Results and Discussion(cont)
Charts : Top 10 PCs having maximum external device usage
Figure 21: 3D Column Chart of top PCs using RAM.
Results and Discussion(cont)
Charts : Top 10 Pcs having maximum RAM consumption
Figure 22: 3D Pie Chart of top 10 PCs having larger storage space.
Results and Discussion(cont)
Charts : Top 10 Pcs having maximum storage space.
Figure 23: 3D Doughnut Chart of top 10 PCs having larger free space.
Results and Discussion(cont)
Charts : Top 10 Pcs having maximum free space.
Results and Discussion(cont)
Figure 24: Notification Settings
Results and Discussion(cont)
Figure 25: Role Based User Management
Conclusion
Role based user management was implemented.
Real time data can be seen of any device within the network.
Rule based notification feature was implemented.
Diagnostics and charts were successfully implemented.
Limitations
Static IP should be used to avoid complexity in Live View
feature.
The time required to fetch data from a network depends upon
the type of network connection and the computers used in the
network.
Future Scope
The application can be accessed and controlled by smartphones
or remote computers through internet and Wi-Fi.
Machine learning can be incorporated with this application to
identify the parameters (provided by SNMP) if any that has any
link with productivity or bugs within the network and find their
relationship.
Gantt Chart
Figure 26: Gantt Chart
References
[1] http://kb.paessler.com/en/topic/663-how-do-i-install-the-
snmp-service-on-windows-systems ACCESSED: 13th JAN 2016
[2]https://www.manageengine.com/products/applications_man
ager/help/appendix/snmp-agent-configuration.html#windows-
2000 ACCESSED: 19th JAN 2016
[3] http://www.w3schools.com/ajax/ajax_asp.asp ACCESSED:
15th JAN 2016
[4] http://www.beingjavaguys.com/2013/07/sending-html-form-
data-to-spring.html ACCESSED: 7th FEB 2016
References(cont)
[5] http://getbootstrap.com/components/ ACCESSED: 10th FEB
2016
[6] http://www.tutorialspoint.com/jdbc/ ACCESSED: 5th MAR
2016
[7] http://www.daterangepicker.com/ ACCESSED: 12th MAR
2016
[8] https://tarruda.github.io/bootstrap-datetimepicker/
ACCESSED: 12th MAR
Thank You

More Related Content

Group 41 - Nview

  • 1. N-View based on Simple Network Management Protocol(SNMP) Under the Supervision of Mr. Abhijit Chanda (VP Technology, Gamma Analytics, Kolkata) and Ms. Shrijana Pradhan (Assistant Professor II , CSE, SMIT) SIKKIM MANIPAL INSTITUTE OF TECHNOLOGY MAJITAR RANGPO, EAST SIKKIM 737136 Submitted by, Rishav Kumar (Reg. No.- 20120068) Rushil Kumar (Reg. No.-20120064)
  • 2. Contents S.NO. Title 1 Abstract 2 Introduction 3 Survey 4 Problem Definition 5 Solution Strategy 6 Methodology 7 Results and discussion 8 References
  • 3. Abstract deals with monitoring of all devices (PCs) from any device in a network. uses SNMP v2. supports role based user access. supports customised notification feature. N-VIEW
  • 4. Introduction In a network that uses SNMP, there are managers and agents. SNMP has three versions, i.e., v1, v2 and v3. N-View monitors parameters describing process, software installed, interface, drivers , storage and system configuration details. The managers and agents need to have SNMP service enabled.
  • 5. Introduction(cont) Functionality Network monitor Automated and informative Technology SNMP network protocol Technology Stack JAVA HTML, CSS, JAVASCRIPT MySQL SPRING FRAMEWORK
  • 6. Survey 30 Sl No Application Name Site Name Findings 1 Incognito www.incognito.com Works on TR69 which is not supported by most of the network devices and data transferred is not compressed. 2 Snmpwalk www.net-snmp- sourceforge.net Works on SNMP but no user Interface. 3 PRTG www.paessler.com/prtg Works on SNMP but lacks rule based notification. 4 OpenNMS www.opennms.org Complex user interface and data is not shown in detail.
  • 7. Problem Definition Most of the applications have complex user interface. They lack rule based notification feature. They do not show the network data in detail.
  • 8. Solution Strategy The data collected from a computer is divided into distinct categories. The data is presented in easily user understandable form. The data collected is used to conduct vivid tests and plot charts. Rule based notification system is designed with e-mail notifications.
  • 9. Store Retrieve Response Request (Manager) (Managed Devices) Figure 1: Manager making request to Managed devices for information and storing it in database. Network Architecture
  • 10. Methodology Figure 2: Flow chart for control flow
  • 11. Figure 3: Flow chart for control flow Methodology(cont)
  • 12. Methodology(cont) Figure 4: Flow chart for showing real time data
  • 13. Figure 5: Flow chart for performing diagnostics Methodology(cont)
  • 14. Figure 6: Flow chart for showing data in charts Methodology(cont)
  • 15. Results and Discussion Device Management Device Addition :- Figure 7: Register a device by its IP and Community name. The computers in network are identified by the manager implementing SNMPv2 by their respective IP addresses and community names. Enter IP Enter Community
  • 16. Results and Discussion(cont) Figure 8: Get live data from added devices or remove added devices Device Management ( Cont..) Updating the dynamic list of devices :-
  • 17. Results and Discussion(cont) Figure 9: Data table showing processes running in a selected device. Device Management : Live Data
  • 18. Figure 10: Data table showing software installed of a selected device. Results and Discussion(cont) Device Management : Live Data
  • 19. Figure 11: Data table showing storage details of a selected device. Results and Discussion(cont) Device Management : Live Data
  • 20. Figure 12: Data table showing drivers installed of a selected device. Results and Discussion(cont) Device Management : Live Data
  • 21. Figure 13: Data table showing Interface of a selected device. Results and Discussion(cont) Device Management : Live Data
  • 22. Figure 14: Data table showing system details of a selected device. Results and Discussion(cont) Device Management : Live Data
  • 23. Figure 15: Data table showing system details of a selected device. Results and Discussion(cont) Diagnostics : External Device Test
  • 24. Figure 16: Data table showing Download / Upload Test. Results and Discussion(cont) Diagnostics : Data Usage Test
  • 25. Figure 17: Data table showing list of PC having minimum required RAM. Results and Discussion(cont) Diagnostics : Performance Test
  • 26. Figure 18: Data table showing process test for a specific process. Results and Discussion(cont) Diagnostics : Process Test
  • 27. Figure 19: Multi Series Column Chart of Upload / Download.. Results and Discussion(cont) Charts : Top 10 Pcs having maximum data usage
  • 28. Figure 20 :3D Column Chart of top PCs having frequent use of external devices. Results and Discussion(cont) Charts : Top 10 PCs having maximum external device usage
  • 29. Figure 21: 3D Column Chart of top PCs using RAM. Results and Discussion(cont) Charts : Top 10 Pcs having maximum RAM consumption
  • 30. Figure 22: 3D Pie Chart of top 10 PCs having larger storage space. Results and Discussion(cont) Charts : Top 10 Pcs having maximum storage space.
  • 31. Figure 23: 3D Doughnut Chart of top 10 PCs having larger free space. Results and Discussion(cont) Charts : Top 10 Pcs having maximum free space.
  • 32. Results and Discussion(cont) Figure 24: Notification Settings
  • 33. Results and Discussion(cont) Figure 25: Role Based User Management
  • 34. Conclusion Role based user management was implemented. Real time data can be seen of any device within the network. Rule based notification feature was implemented. Diagnostics and charts were successfully implemented.
  • 35. Limitations Static IP should be used to avoid complexity in Live View feature. The time required to fetch data from a network depends upon the type of network connection and the computers used in the network.
  • 36. Future Scope The application can be accessed and controlled by smartphones or remote computers through internet and Wi-Fi. Machine learning can be incorporated with this application to identify the parameters (provided by SNMP) if any that has any link with productivity or bugs within the network and find their relationship.
  • 37. Gantt Chart Figure 26: Gantt Chart
  • 38. References [1] http://kb.paessler.com/en/topic/663-how-do-i-install-the- snmp-service-on-windows-systems ACCESSED: 13th JAN 2016 [2]https://www.manageengine.com/products/applications_man ager/help/appendix/snmp-agent-configuration.html#windows- 2000 ACCESSED: 19th JAN 2016 [3] http://www.w3schools.com/ajax/ajax_asp.asp ACCESSED: 15th JAN 2016 [4] http://www.beingjavaguys.com/2013/07/sending-html-form- data-to-spring.html ACCESSED: 7th FEB 2016
  • 39. References(cont) [5] http://getbootstrap.com/components/ ACCESSED: 10th FEB 2016 [6] http://www.tutorialspoint.com/jdbc/ ACCESSED: 5th MAR 2016 [7] http://www.daterangepicker.com/ ACCESSED: 12th MAR 2016 [8] https://tarruda.github.io/bootstrap-datetimepicker/ ACCESSED: 12th MAR