CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia.

Slides:



Advertisements
Similar presentations
VirtualSim Inc. Real tools for virtual worlds Presentation.
Advertisements

C# An overview. Visual C# Microsoft describes C# as a simple, general-purpose programming language that enables you to build rich, connected Web and client.
Business Intelligence Integration Joel Da Costa, Takudzwa Mabande, Richard Migwalla Antoine Bagula, Joseph Balikuddembe.
Mini Project Seminar on Pizza Ordering Application for Android
Implementation Network Wide
Monitoring a Large-Scale Network: Selecting the Right Tool Sayadur Rahman United International University & Network Manager, Financial Service.
Presentation Outline  Project Aims  Introduction of Digital Video Library  Introduction of Our Work  Considerations and Approach  Design and Implementation.
Best of.
1 BrainWave Biosolutions Limited Accelerating Life Science Research through Technology.
Computer Security and Penetration Testing
 ETL: Extract Transformation and Load  Term is used to describe data migration or data conversion process  ETL may be part of the business process repeated.
COMPUTER SOFTWARE ALISA RAHMANI PUTRI / VIDIYA RACHMAWATI /
2012 DiFX Users Meeting, Sydney John Spitzak Purpose: Provide a User Interface for specific needs of USNO o Run and organize repetitive DiFX jobs (daily.
Bluetooth based home automation system N.Sriskanthan, F.Tan, K. Karande Microprocessors and Microsystems 26(2002) Presenter: Bui Phuong Nhung.
ISIGN IMS Proximity Marketing Solution (IMS) iSIGN Media Corp Sales 1ATTRACT. TRANSACT. MEASURE.
Data Mining on the Web via Cloud Computing COMS E6125 Web Enhanced Information Management Presented By Hemanth Murthy.
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
By Mihir Joshi Nikhil Dixit Limaye Pallavi Bhide Payal Godse.
TRUSTPORT PRODUCT PORTFOLIO Marcela Parolkova Sales Director.
Next-Generation IDS: A CEP Use Case in 10 Minutes 3rd Draft – November 8, nd Event Processing Symposium Redwood Shores, California Tim Bass, CISSP.
Intrusion Detection Systems Austen Hayes Cameron Hinkel.
WavioNet 2.0. Proprietary Information. 2 Objective Introduce WavioNet application NMS Learn how to perform basic device management Understand WavioNet.
What is a life cycle model? Framework under which a software product is going to be developed. – Defines the phases that the product under development.
Global Array Manager ™ First ever storage management software that covers all RAID & HBA products from Mylex.
Shadow Security Scanner Li,Guorui. Introduction Remote computer vulnerabilities scanner Runs on Windows Operating Systems SSS also scans servers built.
May-2010 Indigo Pro Management Platform May 2010.
Network Monitoring Through Mobile (MOBTOP) Developed By : Akanksha Jain. (102199) Shikha Arora (101319) Team Name: Beans Course: CS532 Guided By:Prof.
Eric Keller, Evan Green Princeton University PRESTO /22/08 Virtualizing the Data Plane Through Source Code Merging.
Object Management Group (OMG) Specifies open standards for every aspect of distributed computing Multiplatform Model Driven Architecture (MDA)
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Project Transcender Standard Windows Forms to Windows 8 Metro Style porting tool Sri Lanka Institute of Information Technology 1.
NMS Case Study HP OpenView Network Node Manager Hong-taek Ju DP&NM Lab. Dept. of Computer Science and Engineering POSTECH, Pohang Korea Tel:
Ad Hoc Graphical Reports Ad Hoc Graphical Reports Copyright © Team #4 CSCI 6838 Spring CSCI Research Project and Seminar Team# 4 (
Course Presentation EEL5881, Fall, 2003 Project: Network Reliability Tests Project: Network Reliability Tests Team Client: Dr. Joseph Berrios Team Client:
Introduction and Feature Highlights
Phase One Completion Report
CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia.
Seminar Microsoft Next Generation Windows Services: By Microsoft. Guide Presented By Mr. Sandeep Gaikwad
DVIN Data Visualization Interactive Network. CRD Network.
ATLAS Grid Requirements A First Draft Rich Baker Brookhaven National Laboratory.
Retina Network Security Scanner
CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia.
verifone HQtm Estate Management Solution
Presentation Layer (Graphical User Interface) AppGUI Logic Layer (Business Logic and data access) Network Discovery Device Information Extraction Network.
Types of Software Chapter 2.
 Capstone Project : Team #6  October 4 th,2007.
CirrusCon Smart Device Platform Step by Step IoT.
Extreme Scalability Hardware & software scales to meet the demands of any network deployment Hardware & software scales to meet the demands of any network.
Tech Operation Operation’s KPI & Tasks Processes Team Architecture.
GFI LANguard Matt Norris Dave Hone Chris Gould. GFI LANguard: Description Through the performances of the three (3) cornerstones of vulnerability management:
Chapter 1 Vocabulary Mr. Greaser. Geography The study of the earth and its people.
INTELLIGENT TEST SCHEDULING TE-MPE Technical Meeting Michael Galetzka.
  ONLINE DORMITORY RESERVATION SYSTEM By RAMYA VAKITY KOUSHIK KUMAR SURAGONI MOTHE ADITHYA    GRADUATE CAPSTONE SEMINAR PROJECT    Submitted in partial.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Advance Computer Programming Market for Java ME The Java ME Platform – Java 2 Micro Edition (J2ME) combines a resource- constrained JVM and a set of Java.
Mary Ganesan and Lora Strother Campus Tours Using a Mobile Device.
Google. Android What is Android ? -Android is Linux Based OS -Designed for use on cell phones, e-readers, tablet PCs. -Android provides easy access to.
Chapter Goals Describe the application development process and the role of methodologies, models, and tools Compare and contrast programming language generations.
What is WWW? The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet.
Information Technology Deanship
for Display Antique and Art Object Information
A Web Mining Platform for Enhancing Knowledge Management on the Web KOK-LEONG ONG WEE-KEONG NG EE-PENG LIM Center for Advanced Information Systems,
Oracle Solaris Zones Study Purpose Only
نظم المعلومات التسويقية
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Software, O/S & Interfaces
 Mobile application development is similar to Web application development and has its roots in more traditional software development. However, is that.
Features Overview.
Mark Quirk Head of Technology Developer & Platform Group
Presentation transcript:

CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia

Common features available, 1. Physical hardware information 2. Software information 3. Network information 4. Storage for the information 5. Warn/Alert feature Weak or missing feature, 1. GUI presentation 2. Profile management for specific environment. Conclusion from the researches

Features 1. Intelligent Network Discovery 2. Automated Network Visualization Mapping 3. Network Visualization Mapping Manipulation 4. Device Information Extraction 5. Smart Network Monitoring 6. Network Profile Management 7. Network Information Management Optional feature 1. Fault Reporting or Alerting Project Scope

Targeted Users 1. Wide range from home user to organization IT system administrator General Purpose 1. Network audit, checking for anonymous users. Specific Purpose 1. Network monitoring of networked device availability 2. Network alert of networked device failure 3. General reporting of the device monitored Advantage 1. Profile customization for specific environment. Project Purpose

Programming Language Java and C C is used mainly for the information extraction. Java is used mainly for the GUI presentation. Both are multi-platform, open source and have a rich system library to utilities Java is selected due to CSCI213, Java Programming and Object Oriented Design. C is selected due to CSCI114, CSCI124, CSCI204. There is some exposure on similar languages. Project Development and Deployment Platform

Project Use Case and Sequence Diagram

Project Progress Programming development phase Network Discovery Module 1. ICMP scanning : done 2. ARP scanning : done 3. Port scanning : still developing GUI : Network Discovery Module 1. ICMP scanning : done 2. ARP scanning : done 3. Port scanning : done Database read/write 1. ICMP scanning : in progress 2. ARP scanning : in progress 3. Port scanning : not ready JUnit Testing phase Network Discovery Module 1. ICMP scanning : in progress 2. ARP scanning : in progress 3. Port scanning : not ready

Project Progress Incoming programming development phase 1. Virtualization mapping 2. Virtualization mapping manipulation 3. Login management module 4. Profile management module 5. Network monitoring module 6. Device extraction module 7. Global statistic reporting module