Alarm Network System Supervised by: Dr. Luai Malhis. Prepared by: Mahmoud Musa & Mustafa Assaf.

Slides:



Advertisements
Similar presentations
Technology Made Easy!! Telnet and Voice over internet Protocol(VOIP) By: Nicolette Johnson Peta-Lee Richards.
Advertisements

© 2003, Cisco Systems, Inc. All rights reserved..
Blue Eye T E C H N O L G Y.
MM Player Supervised by: Dr. Luai Malhis. Prepared by: Mustafa Assaf & Mahmoud Musa.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
CCNA2 Module 4. Discovering and Connecting to Neighbors Enable and disable CDP Use the show cdp neighbors command Determine which neighboring devices.
Introducing Web ViewPoint V5 AAH
UNIVERSITY OF JYVÄSKYLÄ Peer-to-Peer Studio Server User Interface Chedar node Chedar node Chedar node Chedar node Peer-to-Peer Studio.
1 CCNA 2 v3.1 Module 4. 2 CCNA 2 Module 4 Learning about Devices.
Network Hosts Analyzer Hadas Shumovitch Elad Levi Tal Katz
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols Network Fundamentals – Chapter.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
S6C12 - AAA AAA Facts. AAA Defined Authentication, Authorization, and Accounting Central Management of AAA –Information in a single, centralized, secure.
NetComm Wireless SMS Forwarding Feature Spotlight.
1 Semester 2 Module 2 Introduction to Routers Yuda college of business James Chen
FTP. SMS based FTP Introduction Existing System Proposed Solution Block Diagram Hardware and Software Features Benefits Future Scope Conclusion.
Perforce (Version Control Software). Perforce is an enterprise version management system in which users connect to a shared file repository. Perforce.
COMP 417 CISCO IOS CLI (Command-Line Interface). CLI Access Modes User EXEC Provides basic access to the IOS with limited command availability. Basically.
Data Communications and Networks
Firewalls. What are firewalls? a hardware device and/or software program which sits between the Internet and the intranet, internet, of an organization.
Operating systems CHAPTER 7.
ITIS 2110 Class # No home network devices devices devices devices devices devices devices 9.
Computation for Physics 計算物理概論 Introduction to Linux.
Unit 4, Lesson 11 How Data Travels the Internet
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 3: TCP/IP Architecture.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Application Layer Functionality and Protocols.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
Networks QUME 185 Introduction to Computer Applications.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Windows 7 Firewall.
1 © 2007 Cisco Systems, Inc. All rights reserved.Cisco Public Remote access typically involves allowing telnet, SSH connections to the router Remote requires.
What’s New in Fireware v11.9.5
Chapter 15 – Part 2 Networks The Internal Operating System The Architecture of Computer Hardware and Systems Software: An Information Technology Approach.
Application Layer Khondaker Abdullah-Al-Mamun Lecturer, CSE Instructor, CNAP AUST.
Application Block Diagram III. SOFTWARE PLATFORM Figure above shows a network protocol stack for a computer that connects to an Ethernet network and.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 2 Module 2 Introduction to Routers.
1 The System Menu. 2 The System menu Dashboard Page displayed upon every login. It encompasses several boxes organised in two columns that provide a complete.
OPERATING SYSTEMS BY LANDON, KYLE, AND ETHAN. WHAT IS THEIR PURPOSE? (1) manage the computer's resources, such as the central processing unit (2) establish.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network, Enhanced Chapter 3: TCP/IP Architecture.
1 Router Fundamentals (Ref. CCNA5 Introduction to Networks 2.1, 6.3)
3.3 Data Networks. Overview Identify the main differences between LAN and WAN. Identify the advantages of using a network over stand-alone computers.
Network Management Workshop Apricot 2010 Kuala Lumpur Managing network configuration with RANCID.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G Connect on demand Feature.
Chapter 8 Operating Systems. Objectives Identify the types of system software Summarize the startup process on a personal computer Describe the functions.
CSC190 Introduction to Computing Operating Systems and Utility Programs.
Transmission Control Protocol (TCP) Internet Protocol (IP)
Chapter 2 – Part 1 Introduction To Windows Operating Systems CMPF 112 : COMPUTING SKILLS.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—4-1 LAN Connections Understanding Cisco Router Security.
1 Pertemuan 3 Operating Cisco IOS Software. Discussion Topics The purpose of Cisco IOS software Router user interface Router user interface modes Cisco.
OPERATING SYSTEM REVIEW. System Software The programs that control and maintain the operation of the computer and its devices The two parts of system.
Retele de senzori EEMon Electrical Energy Monitoring System.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Windows Server 2003 { First Steps and Administration} Benedikt Riedel MCSE + Messaging
Application Layer Functionality and Protocols
CS 380 Switch/Router Lab Project Introduction
Module 9: Preparing to Administer a Server
100% Exam Passing Guarantee & Money Back Assurance
Understanding Switch Security
Operating & Configuring a Cisco IOS Device
CISCO IOS CLI (Command-Line Interface)
Chapter 9 Router Configuration (Ospf, Rip) Webmin, usermin Team viewer
Chapter 2: Basic Switching Concepts and Configuration
Understanding Cisco Router Security
Module 9: Preparing to Administer a Server
Chapter 7 Network Applications
Computer Networks Protocols
MESSAGE ACCESS AGENT: POP AND IMAP
Presentation transcript:

Alarm Network System Supervised by: Dr. Luai Malhis. Prepared by: Mahmoud Musa & Mustafa Assaf

Outline  Introduction.  System descriptions.  Methodology.  Recommendations for Future Work

Introduction This project present a two networks applications.  The first one is an alarm network system application.  The other is a system application is used to configure the routers using a good user interface.

System Environment  Our system will be used to manage a cisco 2600 series router. It can support another version of cisco series, but some service will not be enable since it have to have a hardware to support it.

Software Information  Microsoft Visual Studio C# environment.  Telnet: Our project relies on telnet communication.

System Features  Easy to use our system.  It support configure the router either with regular way throw writing a command or with user friendly interface.  It monitors your network and tell you about any change in it.  It send an alarm messages throw a SMS messages or messages.  It can work in background.  It have a login window to give the system more security.

System Constraints  Our system work only on Windows operating system.  System must work in machine that support telnet.  Not all feature will be enable on all router series. Because it have to have an internal hardware support this features.

Methodology Telnet  we built a telnet connection over a TCP connection to make communication channel to the router. And then throw this communication channel, we pass our commands to router and receive a replay from it.

Methodology Monitors the router  The alarm network system application is used to monitoring the networks and checking it from any changes are happened in the networks like change in temperature of the router.

Monitors the router

Methodology Sending a messages  And the system is also sent a message using SMS messages and messages to the network administers to inform them about the changes or errors that are happened in the routers.

Sending a messages

Methodology Configure the routers  The CCP is a network system application is used to manage the routers and configure it in simplicity way by using a user interface that will help network administers by generate the command that the network administers want to write using the user interface in the application instead of write a command in regular way. And also the system support configure the routers in traditional way.

Configure the routers

Recommendations for Future Work  The system can be developed to cover more type of traps like power trap and change in route table … etc.  The system can be developed to cover more command in its user interface.  The system can be developed to be work on another environments, for example, the system can be run in web browsers or in UNIX.  The system support router cisco only, so the system can be developed to support another types of routers.  The system use telnet in their connections to the router, so the system can be developed to be worked in more secure channel like SSH.