CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia.

Slides:



Advertisements
Similar presentations
Unified Workflow Discovery Tool Version 1.0 User Guide December 2010 – Intended for Internal Use Only.
Advertisements

Point of Sale (POS) Client & Back Office Server. Operational Concept What is our Objective? What is our Objective? What are our Goals? What are our Goals?
Unified Workflow Discovery Tool Version 1.0 User Guide December 2008 – Internal Use Only.
Business Intelligence Integration Joel Da Costa, Takudzwa Mabande, Richard Migwalla Antoine Bagula, Joseph Balikuddembe.
1 Semester 2 Module 4 Learning about Other Devices Yuda college of business James Chen
<<replace with Customer Logo>>
Team members: Van Nguyen, Christopher Waters, and William Tran Client: iapp24 Advisor: Govindarasu.
Client/Server Computing Ajay Kumar Shrivastava. Network Operating System (NOS) It manages the services of the server It exists at the session and presentation.
System Security Scanning and Discovery Chapter 14.
Active Directory: Final Solution to Enterprise System Integration
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Lecture 13 Revision IMS Systems Analysis and Design.
Electrical and Computer Engineering PeopleFinder Vitaly Gordievsky Alex Trefonas Scott Richard Matt Beckford Midway Design Review.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 1 Introduction to Managing the SUSE Linux Enterprise Server.
BUSINESS DRIVEN TECHNOLOGY
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Handouts Software Testing and Quality Assurance Theory and Practice Chapter 11 System Test Design
Network security policy: best practices
Slide 1 of 9 Presenting 24x7 Scheduler The art of computer automation Press PageDown key or click to advance.
> Blueprint Kickoff >. Introductions Customer Vision & Success Criteria Apigee Accelerator Overview Blueprint Schedule Roles & Responsibilities Communications.
Bluetooth based home automation system N.Sriskanthan, F.Tan, K. Karande Microprocessors and Microsystems 26(2002) Presenter: Bui Phuong Nhung.
ISIGN IMS Proximity Marketing Solution (IMS) iSIGN Media Corp Sales 1ATTRACT. TRANSACT. MEASURE.
Project Proposal: Academic Job Market and Application Tracker Website Project designed by: Cengiz Gunay Client: Cengiz Gunay Audience: PhD candidates and.
This presentation will guide you though the initial stages of installation, through to producing your first report Click your mouse to advance the presentation.
07 – Project Management Software
These materials are prepared only for the students enrolled in the course Distributed Software Development (DSD) at the Department of Computer.
Data Center Infrastructure
Ihr Logo Data Explorer - A data profiling tool. Your Logo Agenda  Introduction  Existing System  Limitations of Existing System  Proposed Solution.
Term 2, 2011 Week 3. CONTENTS The physical design of a network Network diagrams People who develop and support networks Developing a network Supporting.
MAHI Research Database Data Validation System Software Prototype Demonstration September 18, 2001
MSF Requirements Envisioning Phase Planning Phase.
An Introduction to IBM Systems Director
What is a life cycle model? Framework under which a software product is going to be developed. – Defines the phases that the product under development.
Sri Lanka Institute of Information Technology Software Engineering Project – I Clone of Rally GROUP NO : WD-SEP-002 | PROJECT NO :25 PROJECT : CLONE OF.
Online Complaint Management Guided By: Mrs. Hiral.A.Patel Mrs. Hiral.A.Patel Prepared by: Mr.KeyurPatel Mr.Keyur Patel : Mr.NiravPatel
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
September 3, 2013 Project on Inventory Control System (PICS) P.I.C.S
SQL Server 2012 Session: 1 Session: 3 Introduction to SQL Server 2012 Data Management Using Microsoft SQL Server.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia.
Force Platform & Cloud Computing Presented By Kancharla Sreeveni Student id : Sales Force Team.
CTP210 TERM PROJECT
VMWare Workstation Installation. Starting Vmware Workstation Go to the start menu and start the VMware Workstation program. *Note: The following instructions.
Experiment Management System CSE 423 Aaron Kloc Jordan Harstad Robert Sorensen Robert Trevino Nicolas Tjioe Status Report Presentation Industry Mentor:
Management Information Systems, 4 th Edition 1 Chapter 8 Data and Knowledge Management.
Unified Workflow Discovery Tool Version 3.2 User Guide July 2010 – Intended for Internal Use Only Note: this User Guide includes all information from V1.
Connecting with Computer Science2 Objectives Learn how software engineering is used to create applications Learn some of the different software engineering.
CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia.
verifone HQtm Estate Management Solution
Supervisor: Mr. Huynh Anh Dung Students: To Quang Duy Pham Ngoc Tien Nguyen Luong Ngoc Chau Nguyen Hoang Phuc Nguyen Thi Trang.
Presentation Layer (Graphical User Interface) AppGUI Logic Layer (Business Logic and data access) Network Discovery Device Information Extraction Network.
DISCOVERY MACAddress ID1 IPAddress ID2 NetProtocolType DEVICE HostName DeviceType AmtOfCable ConnType VIRTUALIZATION ProfileID MONITORING DateTimeID RefreshRate.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
SCHOOL MANAGEMENT SYSTEM Developed by: Swapnil R. Gohil ( )
Download Manager software Training Workshop Ostend, Belgium, 20 th May 2014 D.M.A. Schaap - Technical Coordinator.
Online School Management System Supervisor Name: Ashraful Islam Juwel Lecturer of Asian University of Bangladesh Submitted By: Bikash Chandra SutrodhorID.
BI Reporting Tools Kalyn Kelly June 10, BI – Business Intelligence  A set of theories, methodologies, architectures, and technologies that transform.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
  ONLINE DORMITORY RESERVATION SYSTEM By RAMYA VAKITY KOUSHIK KUMAR SURAGONI MOTHE ADITHYA    GRADUATE CAPSTONE SEMINAR PROJECT    Submitted in partial.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Advanced Higher Computing Science
Business System Development
Information Technology Deanship
DATABASES WHAT IS A DATABASE?
PLANNING A SECURE BASELINE INSTALLATION
Features Overview.
Presentation transcript:

CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia

Team Chart

Based on the given descriptions on the project outline and some interactions with Mr. Ee, we break our researches into three main area, 1. Network packet analyzer 2. Network management system 3. Network virtualization Market Researches

1. Network packet analyzer Wire Shark is an open source product that offer network packet analyzing 2. Network management system Nmap is an open source product that offer network exploration 3. Network management system ManageEngine OPManager is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization. Market Researches

4. Network management system Huawei iManager U2000 is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization. 5. Network management system StableNet is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization. 6. Network management system Hitachi IT operation analyzer is GUI network virtualization. It also provide monitoring and fault reporting on owned network IT devices. Market Researches

Common features available, 1. Physical hardware information 2. Software information 3. Network information 4. Storage for the information 5. Warn/Alert feature Weak or missing feature, 1. GUI presentation 2. Profile management for specific environment. Conclusion from the researches

Features 1. Intelligent Network Discovery 2. Automated Network Visualization Mapping 3. Network Visualization Mapping Manipulation 4. Device Information Extraction 5. Smart Network Monitoring 6. Network Profile Management 7. Network Information Management Optional feature 1. Fault Reporting or Alerting Project Scope

Targeted Users 1. Wide range from home user to organization IT system administrator General Purpose 1. Network audit, checking for anonymous users. Specific Purpose 1. Network monitoring of networked device availability 2. Network alert of networked device failure 3. General reporting of the device monitored Advantage 1. Profile customization for specific environment. Project Value

Waterfall model Advantages 1. Waterfall is selected, due to clear and well defined scopes approved by end user. 2. Less complicated model, due to it single point of entry and exit on each phases. Disadvantages 1. Very hard to handle changes. Project Methodology

Programming Language Java and C C is used mainly for the information extraction. Java is used mainly for the GUI presentation. Both are multi-platform, open source and have a rich system library to utilities Java is selected due to CSCI213, Java Programming and Object Oriented Design. C is selected due to CSCI114, CSCI124, CSCI204. There is some exposure on similar languages. Project Development and Deployment Platform

Operating System Microsoft It is selected due to the huge market potential on the OS user research. Relational Database Management System MySQL It is selected due to its multi-platform and open source product. Project Development and Deployment Platform

Architecture Standalone It is selected for the product wishing penetrate into a wide range of target user. This will allow more flexibility on the product marketing. Project Deployment Architecture and Environment

The following risks are identified and possible solutions are brainstormed and finalized. Risks 1. Topic understanding 2. Design of the product 3. Development of the product 4. Report preparation 5. Poor communication 6. Poor tasks delivery Project Risks

Solutions 1. Regular meeting with the team members for efficient communication and progress update. Targeted meeting is once a week. 2. Regular meeting with supervisor for increment mile stone progress. Targeted meeting is once a fortnight. 3. Clear task and role delegation out front before the project. 4. Intense researches conducted to minimum risk exposure. Project Risks

Project Time Line

Project Use Case and Sequence Diagram

Project ER diagram

Project Conceptual Model DISCOVERY MACAddress ID1 IPAddress ID2 NetProtocolType DEVICE HostName DeviceType AmtOfCable ConnType VIRTUALIZATION ProfileID MONITORING DateTimeID RefreshRate Status INFORMATION UpTime DownTime Service USER UsernameID Password Rights LOGIN LoginDateTime ID 1..** Login 1..* * Consists of 1..* * Consists of 0..1 *

Project Relational Schema USER (Username, Password, Rights) Primary key: Username LOGIN(LoginDateTime, Username, Profile) Primary key: (LoginDateTime, Username, Profile) Foreign key: Username references USER (Username) VIRTUALIZATION(Profile) Primary key: Profile DISCOVERY (MACAddress, IPAddress, NetProtocolType) Primary key: MACAddress Candidate key: IPAddress DEVICE(MACAddress,HostName, DeviceType, AmtOfCable, ConnType) Primary key: MACAddress Foreign key: (MACAddress) references DISCOVERY (MACAddress) MONITORING(MACAddress, IPAddress, DateTime, RefreshRate, Status) Primary key: (MACAddress, IPAddress, DateTime) Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress) INFORMATION(MACAddress, IPAddress, DateTime, UpTime, DownTime, Service) Primary key: (MACAddress, IPAddress, DateTime) Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress) Foreign key: (DateTime) references MONITORING(DateTime)

Table: USER Table USER (Username, Password, Rights) Primary key: (Username) Description Each person has their own username and password to enter the system. Table: LOGIN Table LOGIN (LoginDateTime, Username, Profile) Primary key: (LoginDateTime, Username, Profile) Foreign key: (Username) references USER(Username) Description When user logged in, login timing captured by the system to track when did the user came in. Table: VIRTUALIZATION Table VIRTUALIZATION (Profile) Primary key: (Profile) Description User stored their personal information in the system. Project Data Dictionary

Table: DISCOVERY Table DISCOVERY (MACAddress, IPAddress, NetProtocolType) Primary key: (MACAddress) Candidate key: IPAddress Description Discover and store type of protocol or addresses for each device. Table: DEVICE Table DEVICE (MACAddress, HostName, DeviceType, AmtOfCable, ConnType) Primary key: (MACAddress) Foreign key: (MACAddress) references DISCOVERY (MACAddress) Description Each device contains basic information to make sure each device connect to correct network. Project Data Dictionary

Table: MONITORING Table MONITORING (MACAddress, IPAddress, DateTime, RefreshRate, Status) Primary key: (MACAddress, IPAddress, DateTime) Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress) Description Set the timer for all devices on refresh time rate and save status progress. INFORMATION Table INFORMATION (MACAddress, IPAddress, DateTime, UpTime, DownTime, Service) Primary key: (MACAddress, IPAddress, DateTime) Foreign key: (MACAddress, IPAddress) references (MACAddress, IPAddress) Foreign key: (DateTime) references MONITORING (DateTime) Description Update status uptime and downtime of each connection from time to time while monitoring network and devices. Project Data Dictionary

Project Interface Design

Network Discovery GUI

Project Interface Design Virtualization Mapping GUI

Project Interface Design Profile Management GUI

Project Interface Design Virtualization manipulation GUI

Project Progress Programming development phase Network Discovery Module 1. ICMP scanning : done 2. ARP scanning : done 3. Port scanning : still developing GUI : Network Discovery Module 1. ICMP scanning : done 2. ARP scanning : done 3. Port scanning : done Database read/write 1. ICMP scanning : in progress 2. ARP scanning : in progress 3. Port scanning : not ready JUnit Testing phase Network Discovery Module 1. ICMP scanning : in progress 2. ARP scanning : in progress 3. Port scanning : not ready

Project Progress Incoming programming development phase 1. Virtualization mapping 2. Virtualization mapping manipulation 3. Login management module 4. Profile management module 5. Network monitoring module 6. Device extraction module 7. Global statistic reporting module