Presentation is loading. Please wait.

Presentation is loading. Please wait.

CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia.

Similar presentations


Presentation on theme: "CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia."— Presentation transcript:

1 CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia

2 Team Chart

3 Based on the given descriptions on the project outline and some interactions with Mr. Ee, we break our researches into three main area, 1. Network packet analyzer 2. Network management system 3. Network virtualization Market Researches

4 1. Network packet analyzer Wire Shark is an open source product that offer network packet analyzing 2. Network management system Nmap is an open source product that offer network exploration 3. Network management system ManageEngine OPManager is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization. Market Researches

5 4. Network management system Huawei iManager U2000 is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization. 5. Network management system StableNet is a proprietary product that managed owned networked IT devices on monitor, configuration and fault reporting. It provide basic GUI network virtualization. 6. Network management system Hitachi IT operation analyzer is GUI network virtualization. It also provide monitoring and fault reporting on owned network IT devices. Market Researches

6 Common features available, 1. Physical hardware information 2. Software information 3. Network information 4. Storage for the information 5. Warn/Alert feature Weak or missing feature, 1. GUI presentation 2. Profile management for specific environment. Conclusion from the researches

7 Features 1. Intelligent Network Discovery 2. Automated Network Visualization Mapping 3. Network Visualization Mapping Manipulation 4. Device Information Extraction 5. Smart Network Monitoring 6. Network Profile Management 7. Network Information Management Optional feature 1. Fault Reporting or Alerting Project Scope

8 Targeted Users 1. Wide range from home user to organization IT system administrator General Purpose 1. Network audit, checking for anonymous users. Specific Purpose 1. Network monitoring of networked device availability 2. Network alert of networked device failure 3. General reporting of the device monitored Advantage 1. Profile customization for specific environment. Project Value

9 Waterfall model Advantages 1. Waterfall is selected, due to clear and well defined scopes approved by end user. 2. Less complicated model, due to it single point of entry and exit on each phases. Disadvantages 1. Very hard to handle changes. Project Methodology

10 Programming Language Java and C C is used mainly for the information extraction. Java is used mainly for the GUI presentation. Both are multi-platform, open source and have a rich system library to utilities Java is selected due to CSCI213, Java Programming and Object Oriented Design. C is selected due to CSCI114, CSCI124, CSCI204. There is some exposure on similar languages. Project Development and Deployment Platform

11 Operating System Microsoft It is selected due to the huge market potential on the OS user research. Relational Database Management System MySQL It is selected due to its multi-platform and open source product. Project Development and Deployment Platform

12 Architecture Standalone It is selected for the product wishing penetrate into a wide range of target user. This will allow more flexibility on the product marketing. Project Deployment Architecture and Environment

13 The following risks are identified and possible solutions are brainstormed and finalized. Risks 1. Topic understanding 2. Design of the product 3. Development of the product 4. Report preparation 5. Poor communication 6. Poor tasks delivery Project Risks

14 Solutions 1. Regular meeting with the team members for efficient communication and progress update. Targeted meeting is once a week. 2. Regular meeting with supervisor for increment mile stone progress. Targeted meeting is once a fortnight. 3. Clear task and role delegation out front before the project. 4. Intense researches conducted to minimum risk exposure. Project Risks

15 Project Time Line

16

17

18 Project Use Case and Sequence Diagram

19

20

21

22

23 Project ER diagram

24 Project Conceptual Model DISCOVERY MACAddress ID1 IPAddress ID2 NetProtocolType DEVICE HostName DeviceType AmtOfCable ConnType VIRTUALIZATION ProfileID MONITORING DateTimeID RefreshRate Status INFORMATION UpTime DownTime Service USER UsernameID Password Rights LOGIN LoginDateTime ID 1..** Login 1..* * Consists of 1..* * Consists of 0..1 *

25 Project Relational Schema USER (Username, Password, Rights) Primary key: Username LOGIN(LoginDateTime, Username, Profile) Primary key: (LoginDateTime, Username, Profile) Foreign key: Username references USER (Username) VIRTUALIZATION(Profile) Primary key: Profile DISCOVERY (MACAddress, IPAddress, NetProtocolType) Primary key: MACAddress Candidate key: IPAddress DEVICE(MACAddress,HostName, DeviceType, AmtOfCable, ConnType) Primary key: MACAddress Foreign key: (MACAddress) references DISCOVERY (MACAddress) MONITORING(MACAddress, IPAddress, DateTime, RefreshRate, Status) Primary key: (MACAddress, IPAddress, DateTime) Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress) INFORMATION(MACAddress, IPAddress, DateTime, UpTime, DownTime, Service) Primary key: (MACAddress, IPAddress, DateTime) Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress) Foreign key: (DateTime) references MONITORING(DateTime)

26 Table: USER Table USER (Username, Password, Rights) Primary key: (Username) Description Each person has their own username and password to enter the system. Table: LOGIN Table LOGIN (LoginDateTime, Username, Profile) Primary key: (LoginDateTime, Username, Profile) Foreign key: (Username) references USER(Username) Description When user logged in, login timing captured by the system to track when did the user came in. Table: VIRTUALIZATION Table VIRTUALIZATION (Profile) Primary key: (Profile) Description User stored their personal information in the system. Project Data Dictionary

27 Table: DISCOVERY Table DISCOVERY (MACAddress, IPAddress, NetProtocolType) Primary key: (MACAddress) Candidate key: IPAddress Description Discover and store type of protocol or addresses for each device. Table: DEVICE Table DEVICE (MACAddress, HostName, DeviceType, AmtOfCable, ConnType) Primary key: (MACAddress) Foreign key: (MACAddress) references DISCOVERY (MACAddress) Description Each device contains basic information to make sure each device connect to correct network. Project Data Dictionary

28 Table: MONITORING Table MONITORING (MACAddress, IPAddress, DateTime, RefreshRate, Status) Primary key: (MACAddress, IPAddress, DateTime) Foreign key: (MACAddress, IPAddress) references DISCOVERY (MACAddress, IPAddress) Description Set the timer for all devices on refresh time rate and save status progress. INFORMATION Table INFORMATION (MACAddress, IPAddress, DateTime, UpTime, DownTime, Service) Primary key: (MACAddress, IPAddress, DateTime) Foreign key: (MACAddress, IPAddress) references (MACAddress, IPAddress) Foreign key: (DateTime) references MONITORING (DateTime) Description Update status uptime and downtime of each connection from time to time while monitoring network and devices. Project Data Dictionary

29 Project Interface Design

30 Network Discovery GUI

31 Project Interface Design Virtualization Mapping GUI

32 Project Interface Design Profile Management GUI

33 Project Interface Design Virtualization manipulation GUI

34 Project Progress Programming development phase Network Discovery Module 1. ICMP scanning : done 2. ARP scanning : done 3. Port scanning : still developing GUI : Network Discovery Module 1. ICMP scanning : done 2. ARP scanning : done 3. Port scanning : done Database read/write 1. ICMP scanning : in progress 2. ARP scanning : in progress 3. Port scanning : not ready JUnit Testing phase Network Discovery Module 1. ICMP scanning : in progress 2. ARP scanning : in progress 3. Port scanning : not ready

35 Project Progress Incoming programming development phase 1. Virtualization mapping 2. Virtualization mapping manipulation 3. Login management module 4. Profile management module 5. Network monitoring module 6. Device extraction module 7. Global statistic reporting module


Download ppt "CSCI321 : IT2/1A : Physical Network Aid Mr Ee Kiam Keong Lim Willie, Chua Shui Li Tan Yong Meng Shirley Chin Noraizah Naftalia."

Similar presentations


Ads by Google