SlideShare a Scribd company logo
1 of 6
Download to read offline
IOSR Journal of Computer Engineering (IOSRJCE)
ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 06-11
www.iosrjournals.org
www.iosrjournals.org 6 | Page
RMC: Real-Time Monitoring and Controlling Approach on
Networks
G. Naveen Samuel1
, Immanuel Ganadurai2
1
(Computer Science and Engineering, Joe Suresh Engineering College, India)
2
(Computer Science and Engineering, Karpagam University, India)
Abstract: A GUI based architecture for monitoring the operations and controlling the activities of the client
machines placed in a network by an approach named RMC (Real-time Monitoring and Controlling) system. A
client – server approach of the net spy allows the administrator to view those client systems connected to the
LAN. The network administrator chooses needed clients with the help of their IP address for the monitoring
process that enhances various events as system information, memory usage, desktop capturing and the tasks that
are currently running under those clients. It captures the resources and each operation made in the client
secretly. Here we enroll another process of controlling those monitored resources. The control utility includes
controlling hardware like keyboard, mouse and also locking the client’s machine. It performs shutdown
operations on the clients from the server. Combination of the controlling aspect along the monitoring process
includes a cost efficient approach in maintaining a reliable network.
Keywords: API interface, GUI interface, screen capture, Net spy and RMC approach.
I. Introduction
Real-time Monitoring System (RM) is GUI based software for monitoring the clients in a network. Net
Spy enables an administrator to view the number of client systems connected to a LAN. Client Systems are
monitored through their IP address. While a client enters a network, it is enhanced with a name and an IP
address to be registered in the server. Monitoring is efficient in all organizations for maintaining records about
the clients entering and exiting their network. Various events are monitored such as system information, usage
of memory, capturing desktop activities and tasks running under clients. System Information contains OS name
and version, processor detail, hard disk information and RAM details [3]. Monitoring a client can be a security
operation prevailed over a network to keep a reliable flow of information between client and server. Clients may
enroll their IP with the server for communication purpose but administrator takes rights on clients to make a
security service. RM ensures a current state monitoring system which provides a facility of maintaining actions
of the clients within the network circle. Clients may work against the organization and make them to collapse
the goal they fixed for the yearly needs. But RM systems are used in their organization to make them secure by
monitoring those clients and make their motto to be diminished. Most of the monitoring systems ensure traffic
monitoring by the use of packet analyzer [12]. Operations can be monitored only through the IP addresses that
are provided by the clients.
Real-time Controlling system (RC) is an approach engaged only on controlling the clients from the
server. The server or network administrator in the network controls each activity of their clients enrolled in their
network. Controlling system is also made using the IP address of the clients. An organization controlled by a
head, controls all the operations of their employees or clients by giving different rights for each clients. This is
organized also in networks by enabling some rights for each client [5, 17]. Controlling software enables the
network administrator to take control of their clients from their server monitor. Administrator enhances several
rights along the clients for security purposes and maintains the network by provided commands over the clients
to be performed by the clients to be constant in the network circle. Real-time controlling includes the control
utility such as controlling hardware support of for the clients and locking their machines if not needed. It also
performs shut operations on the clients from the server. Enabling this controlling system can make a cost
efficient process for the server to work through their network. RC enabled networks can be a profitable
approach for the organizations to work consistently. Servers enable their operation by commanding their clients
to proceed with their work along server’s interaction on them [18, 23]. Networking enables those clients that are
engaged along the server to process a schematic referenced structure of data transferring options. Controlling
state of a system is the value added process of the system with an augmented security over a network
environment.
RMC: Real-Time Monitoring And Controlling Approach On Networks
www.iosrjournals.org 7 | Page
Fig. RMC Approach
Real-time Monitoring and Controlling (RMC) approach is enhanced with both these operations in a
single process that can be entitled with the network procedures. Usage of this approach on a network will power
the system with secure formulae. This approach will process along the performance of the clients and server to
interact with the processing style of the network. Administrator takes full responsibility of the network by
working with both monitoring and controlling operation that is engaged in an organization to fulfill their goal.
Maintenance of the network is enabled with this approach to stimulate a proper security structure of a network
by propagating through the communication process [4].
II. Related Works
In present scenarios, there are softwares performing monitoring options on the network. These
monitoring approach are implemented in several systems for traffic management. Softwares that can perform
both monitoring and controlling operations are no more present in this existing environment. It is difficult to
control the system only with the monitoring phase. Servers or network administrators are enhanced only with
monitoring the operations made by the clients and if needed to control them, they need to make a separate
manual process that means reaching them to control their activities. It requires more efforts and also its cost
expensive. It may need several softwares in engaging both the operations in a network. Manual procedures may
lead to several failures in control [14]. For enabling an efficient RMC (Real-time Monitoring and Controlling)
system, we introduce a procedure for making both the operations by the server. This approach includes both
monitoring as well as controlling the activities made by the clients. Organisations working with RMC can be
familiar in securing a constant network connection. A network administrator can work easily with this approach
by organising the network connection in a single software approach proposed [21]. Enabling RMC reduces extra
burden of purchasing two or more softwares for monitoring and controlling the network. Here server can
identify a network traffic easily by monitoring each clients working in a network and can control them with
some system commands. GUI based architecture is also used to enhance a live stream of capturing the activities
done in the desktops of the clients present in a network [7, 16]. This GUI architecture is enabled for a real-time
approach of the RMC system.
III. RMC Approach
a) Monitoring Phase:
Server lists the clients using their IP address connected to the LAN. The API program is linked to all
the files in the operating system. API is an interface between the user and the software components used in the
system. It makes the remote procedure call method to interact with the operating system. IP addresses of the
clients interacting along the network are listed along the server state [1, 22]. Those clients needed to interact
along the network are made to register their IP address and their name on the list provided by the server. Client’s
IP address is used for monitoring them by calling API functions of the client. Server enhances this operation and
checks or monitors the required details of the clients and makes the GUI interface to enable a real-time
monitoring to the server [8, 19]. GUI interface makes a graphical representation of the client’s current working
particulars and furnishes those activities that are made in it.
Fig. Monitoring Phase
RMC: Real-Time Monitoring And Controlling Approach On Networks
www.iosrjournals.org 8 | Page
b) Controlling Phase:
This phase is devised as the second phase of this approach that is proposed to take control over the
clients connected onto a network. Here the monitored state needs a result of action on the client to make its state
of action excellent with the help of this phase [6]. API interface plays the main role in this phase by regulating
the commands that are organized by the server or the administrator in controlling the clients operations.
Administrator or the server organizing the network make the commands of controlling power over the client
engaged with them [2, 11]. Forcing the clients to make the work give by the organizer or the server and work
according to the commands entitled by them is the main task prevailed in this phase.
Fig. Controlling Phase
The server selects an IP address of the client and makes a call for API programming commands to the
selected client. Client then makes the required operation of the API for computing the task [13]. Thus it
performs along it for making control operations on the system. Client is enhanced with a regulated operation to
control its state of work or the traffic engaged by it.
IV. Implementation of RMC
RMC is based on GUI software interface which helps in making a live monitoring of the clients
operations. RMC approach consists of two different modules with the Net Spy operation such that Monitoring
and Controlling module. Here we structure a new net spy device by enrolling both these modules into it, while
each performs its own task. Both modules make an effective procedure in maintaining constant achievements in
the organisation. Operations are enhanced according to the goal entitled by the organiser of the network. Clients
participating in a network are organised with their IP address listed in the server for regulating a systematic
process of evaluating a solution to the improper work issue of the clients in the field [15, 22]. RMC approach is
proposed for achieving those requirements of an organisation working on temporal changes made across a
network. Implementing RMC is basically advised with the administrator’s rights prescribed over a network for
performing an efficient task that surrounds the contributions of the clients ensuring the same network. Client
maintains a consistent approach with the server to retain the tasks measured by the organisation which is
controlled by the administrator of the system. Attributes of the clients are also monitored then and there with
this approach and controls every actions organised by them to compromises the procedure enforced by the
administrator or the organiser.
Fig. RMC Approach
a) Monitoring:
Clients are monitored along the network to make a secure working strategy. Server makes use of this
module that performs operations as Screen Capture and Task Manager.
Screen Capture: Here the live screen is telecasted from the clients to the server. The current screen is
captured from the client system and is displayed in the server. The administrator or the server enhances an
efficient watch over the user who works in the system currently. Here the server selects the IP address of the
client from the client list and makes a call to the specified client with an API program. Also it selects the
RMC: Real-Time Monitoring And Controlling Approach On Networks
www.iosrjournals.org 9 | Page
operation type of the client as a string message that consists of the required operations to be made by the client.
The client then receives the message and it makes the required solution for the server. The client first checks
whether the IP call is same as its IP address. Secondly, it works for the server by capturing the screen and it
converts the screen into a bitmap and it converts the bitmap then into bytes. Here the stream of bytes is
transferred from the client to the server. Server receives the stream and converts it into a bitmap image and the
bitmap is displayed on the server as the output of the screen capturing operation.
Task Manager: Task manager lists all the processes that are running in the client system, including the
background process. In screen, capture the user can easily cheat the administrator by minimizing the window
and hiding the taskbar. But the task manager that is abstracted will display all the running process even though it
is in the hidden state. User may activate several processes at a time that are organized in the task manager for
ensuring the performance of the current system. Here it makes a specific process to be abandoned which is
working with errors and may not respond to the system. Administrator can view the processes of the client used
and also it can perform the required action of the server against the client’s performance.
Fig. Screen Capture
b) Controlling:
Controlling module is entitled as the important modules of the RMC approach. Here different
operations are enabled as desktop viewing and performing operations on the displayed information. Controlling
involves operations as termination, shutdown, logoff or restart operations and so on. Each operation may be
organized by the administrator or server for maintaining the performance of the network used by several clients.
Here operations are performed specifically on a client by introducing its IP address on the server message.
Server selects the IP address of the client which needs the server operation. Here the operation type is selected
and it is enabled through the IP that is already been selected. IP address and the operation type selected by the
server is organized as a string message that is sent to the client for enabling its required action. The client
receives the message from the client, analyses it and performs the needed operations on it. Operations are
performed by the API interface present in each client system. The message sent by the server first contacts the
client API interface and makes the calls for enabling several operations on the client system.
Fig. Performs Controlling Operations
RMC: Real-Time Monitoring And Controlling Approach On Networks
www.iosrjournals.org 10 | Page
V. Need of RMC Approach
Most organizations need an eye on their employees work to fulfill their goals. Thus RMC approach is
used here for making a real-time monitoring of their employees and makes them work properly by controlling
them without any physical access. RMC plays the main role in capturing the employee’s screen and displaying it
in the administrator’s system. Administrator also allows the employees present in the list to be logged into their
network. RMC helps in terminating the programs that are running improperly in their client system.
Organizations goals are to be succeeded with a necessary procedural works by the employees but if it is out of
service in monitor and controlled by the administrator acting as a server [10]. Employee’s system could be
turned on only when it is registered in the employee’s list at the time of connection orientation. Without the
presence of the administrator in an organization, systems are not allowed to be accessed by the clients. They
work on their organization and make a disciplined way of communication between their employees. If any
operation to be aborted by the client, then the server makes a message to the client to withhold those works and
work along the organization [6]. If the received message is rejected by the client, the server takes charge on the
client by terminating their works with the help of RMC approach. Nowadays various educational institutions
works with RMC approach to favor an excellent education to the students they handle. Education is organized
through a network where movements of every student are watched periodically. Students are allowed to make
their listening and writing works through the network based education system that are monitored then and there
to show a good result in their performance in examinations. Monitoring each and every student to make them
study well and construct their future with a disciplined environmental state of operations within them [9, 20].
Teachers in the institutions acts as the administrator and takes charge of their students activities and make a
perfect atmosphere over the institution. RMC approach is also used in many applications for favoring a reliable
state of networking state [7]. RMC approach has secured a reliable and cost efficient software approach over the
networking field.
VI. Performance Analysis
Achieving a well disciplined and a profitable growth in an organization is not an easy task of the
organizer. Employee’s attitude of work should be analyzed at every moment to achieve an affordable goal.
Organizers or the administrator must monitor every moments of their employee or client present in their
organization or network. Monitoring alone could not show an efficient result in the organization. With the help
of monitoring aspects, controlling of each activity of the clients is to be enhanced in this state [15]. Servers are
not in a safe mode operation such as the clients working in their network can make some illegal source of
operation against the network. Here the objective of the organization now is set to be with both monitoring each
activities that are made currently and control them from the organizer’s desk and not with their physical access
to each employees working in their organization. This objective is achieved through the RMC approach
enhanced in this paper and makes the organizer to be up-to-date about their employees working details.
Persistence of the employees over the organizational needs is made to be in a procedure to fulfill or achieve their
goals entitled with them [9, 13]. While comparing to the present software’s which are organized only for
monitoring but not present their ideas in controlling the unwanted actions of the clients in the network. RMC
approach makes a reliable system of monitoring all the current state of each system connected to the network
and present an interactive control measures on them which could be engaged with any operation that are
persisting in the system. While analyzing its performance with the organization which is in need of this
approach, it can be measured to be perfect on their action persisting with this approach that maintains an
affordable result. This research study with RMC throws light on the extensive use of statistical techniques for
analyzing the reliable performance of the organizations [21]. The paper also furnishes a summary of the
requirements in each organization and concludes with an efficient approach. It fulfils all the needs of the
organizers for organizing their employees. A sensitive study is made along this paper to make the organization
full interactive with this approach.
VII. Conclusion
Finally coming to the conclusion of this paper a reliable RMC approach is devised and verified
successfully. Real-time Monitoring and Controlling system has been designed and developed to the satisfaction
of end users. Approach is built with a real-time strategic limit that could render both monitoring and controlling
operations on the clients connected to the network. Administrator needs are satisfied along the specific attitude
of the clients making their works against the network to establish a negative statics on it. Administrator makes
use of this approach every time when the clients enter the network at a specific limit. Lists are maintained
periodically at the server and the connections are established along the response given by the server or
administrator. The system has been built with the latest technology to make the best of all resources. This
approach is used specifically in education system to render a perfect study to the students and make them to
engage with the teachers in a friendly atmosphere. It is also used probably in the organisations which consists of
employees and works in a network structure to formulate a worthy achievement which regards the organiser’s
RMC: Real-Time Monitoring And Controlling Approach On Networks
www.iosrjournals.org 11 | Page
goal. Here the structural representation of the approach is statistically used all over the system to compromise a
specific work needed for encrypting a system along the basic situations maintained by the organiser. RMC
approach is user friendly as it shows a fast response through the administrator. It is simple in working
throughout the statistical operations made by the clients in the system and it is spied by the organiser or
administrator who is responsible for the entire work. It is also much interactive with clients and server present in
the network which formulates an affordable approach to the administrator. RMC approach works easier than
other systems in the networking environment. Future world is fully based on networking and monitoring of the
structured networks which becomes an important task. With this approach specified in the paper, we could
manage any remote system i.e. we can kill a process, shutdown, reboot and also lock a remote system. Several
enhancements can be made along this paper in future to entitle this software approach to be reliable in the
networking market.
References
[1] Chang Ho Choi , CSMonitor: a visual client/server monitor for CORBA-based distributed applications, Software Engineering
Conference, 1998. Proceedings, Pg: 338-345.
[2] Dorsey, Robert E, 1992, The Voluntary Contributions Mechanism with Real Time Revisions, Public Choice, Springer, vol. 73(3),
pages 261-82, April.
[3] Cary Deck & Nikos Nikiforakis, "Perfect and Imperfect Real-Time Monitoring in a Minimum-Effort Game", Working Papers 10-
18, 2010,Chapman University, Economic Science Institute.
[4] V. Kapsalis, A. Kalogeras, K. Charatsis, G. Papadopoulos, “Seamless Integration of Distributed Real Time Monitoring and Control
Applications Utilising Emerging Technologies”, IECON'01: The 27th Annual Conference of the IEEE Industrial Electronics
Society, Pg: 176-181, 2001 IEEE
[5] G. Chen, M. Neville, Q. Kong, “Distributed Network Management Using CORBA/TMN”, Proceedings of the 7th IFIP/IEEE
International Workshop on Distributed Systems Operation and Management (DSOM), 1996.
[6] J. Boyle, H. Truong, N. Nour, “Providing a web-based view of your managed network”, Proceedings of 1997 IEEE International
Conference on Communications (ICC'97), Montreal, Canada, June, 1997.
[7] Tony White, Andrzej Bieszczad, “The Expert Advisor:An Expert System for Real Time Network Monitoring”, Northern Telecom
[8] [Rabie et al 1988] Rabie S., Rau-Chaplin A., Shibahara T., DAD: A Real-Time Expert System for Monitoring Data Packet
Networks, IEEE Networks Magazine September, 1988.
[9] [White, Bieszczad 1992] White T.,Bieszczad A., A Customization environment for the Expert Advisor Network Management
system, Canadian Conference on Artificial Intelligence, Vancouver, 1992.
[10] [Laffey, et al 1988] Laffey T., WeitzenKamp S., Read J., Kao S., Schmidt J., Intelligent Real-Time Monitoring, Proceedings AAAI
1988 pages 72-76.
[11] Girish Revadigar, Chitra Javali, “Real Time Monitoring And Control Of Wireless Networks”, International Journal Of Embedded
Systems And Applications (Ijesa) Vol.2, No.1, March 2012.
[12] Ahmed N. Abdalla, Muhammad Nubli, Tan Chien Siong, Fauzan Khairi, A. Noraziah, “Enhancement of real-time multi-patient
monitoring system based on wireless sensor networks”, International Journal of Physical Sciences Vol. 6(4), pp. 664-670, 18
February, 2011.
[13] Rolf Stadler, Mads Dam, Alberto Gonzalez, Fetahi Wuhib, “Decentralized Real-time Monitoring of Network-wide Aggregates”,
Ladis 2008 proceedings.
[14] Lasse Klingbeil, TimWark, “AWireless Sensor Network for Real-time Indoor Localisation and Motion Monitoring “, 2008
International Conference on Information Processing in Sensor Networks.
[15] A. Witayangkurn A, *, M. Nagai B, K. Honda C, M. Dailey C, R. Shibasaki D, “Real-Time Monitoring System Using Unmanned
Aerial Vehicle Integrated With Sensor Observation Service “ International Archives Of The Photogrammetry, Remote Sensing And
Spatial Information Sciences, Vol. Xxxviii-1/C22 Uav-G 2011, Conference On Unmanned Aerial Vehicle In Geomatics, Zurich,
Switzerland
[16] W. Jiang , H. Schulzrinne, Modeling of packet loss and delay and their effect on real-time multimedia service quality, In Proc.
NOSSDAV, June 2000.
[17] K. Stuhlmuller, N. Farber, M. Link and B. Girod, Analysis of video transmission over lossy channels, IEEE J. Select. Areas
Commun., June 2000.
[18] A. R. Reibman, V. Vaishampayan, Y. Sermadevi, “ Quality monitoring of video over a packet network. IEEE Trans.Multimedia,
April 2004.
[19] Schill, Alexander, “DCE-The OSF Distributed Computing Environment Client/Server Model and Beyond”, 283.International DCE
Workshop. Karlsruhe, Germany, October 7-8, 1993. Berlin, Germany: Springer-Verlag, 1993.
[20] G. Chen, M. Neville, Q. Kong, “Distributed Network Management Using CORBA/TMN”, Proceedings of the 7th IFIP/IEEE
International Workshop on Distributed Systems Operation and Management (DSOM), 1996.
[21] L. Deri, B. Ban, “Static vs. Dynamic CMIP/SNMP Network Management Using CORBA”, IBM Research Report, IBM Zurich
Research Laboratory, 1996.
[22] “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area
Networks (LR-WPANs)”, Institute of Electrical and Electronics Engineers, IEEE 802.15.4, 2003.
[23] N. Bulusu, J. Heidemann and D. Estrin, “GPS-less Low Cost Outdoor Localization For Very Small Devices” , IEEE Personal
Communications, Special Issue on Smart Spaces and Environments, Vol. 7, No. 5, October 2000, pp 28-34.

More Related Content

What's hot

The Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemThe Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemIRIS Network Systems
 
Network management
Network managementNetwork management
Network managementNitesh Saitwal
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...eSAT Journals
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...eSAT Publishing House
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocolni35540
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069William Lee
 
Network performance management
Network performance managementNetwork performance management
Network performance managementjuliajone2511
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Abdullaziz Tagawy
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2cSaurav Aich
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterpriseNour Eldeen Mahmoud Khalifa
 
Network management aa
Network management  aaNetwork management  aa
Network management aaDhani Ahmad
 
Network Management
Network ManagementNetwork Management
Network ManagementVivek Garg
 
As4301234238
As4301234238As4301234238
As4301234238IJERA Editor
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and AssuranceMuhamadSyawal7
 
Network management ppt
Network management pptNetwork management ppt
Network management pptDheerajPachauri
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementDjadja Sardjana
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Merlin Govender
 

What's hot (18)

The Importance of an Integrated Network Management System
The Importance of an Integrated Network Management SystemThe Importance of an Integrated Network Management System
The Importance of an Integrated Network Management System
 
Network management
Network managementNetwork management
Network management
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...
 
An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...An overview of methods for monitoring web services based on the quality of se...
An overview of methods for monitoring web services based on the quality of se...
 
Simple network management protocol
Simple network management protocolSimple network management protocol
Simple network management protocol
 
Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069Introdunction to Network Management Protocols - SNMP & TR-069
Introdunction to Network Management Protocols - SNMP & TR-069
 
Network performance management
Network performance managementNetwork performance management
Network performance management
 
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2Managing enterprise networks with cisco prime infrastructure_ 1 of 2
Managing enterprise networks with cisco prime infrastructure_ 1 of 2
 
Bc product overview_v2c
Bc product overview_v2cBc product overview_v2c
Bc product overview_v2c
 
Network management systems in large enterprise
Network management systems in large enterpriseNetwork management systems in large enterprise
Network management systems in large enterprise
 
Network management
Network managementNetwork management
Network management
 
Network management aa
Network management  aaNetwork management  aa
Network management aa
 
Network Management
Network ManagementNetwork Management
Network Management
 
As4301234238
As4301234238As4301234238
As4301234238
 
Audit and Assurance
Audit and AssuranceAudit and Assurance
Audit and Assurance
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
Widyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-managementWidyatama.lecture.applied networking.iv-week-12.network-management
Widyatama.lecture.applied networking.iv-week-12.network-management
 
Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215Caretower's Managed ePO Brochure 180215
Caretower's Managed ePO Brochure 180215
 

Viewers also liked

Using Social Media to Promote your Toastmasters Club
Using Social Media to Promote your Toastmasters ClubUsing Social Media to Promote your Toastmasters Club
Using Social Media to Promote your Toastmasters ClubStar Bradshaw, UXC
 
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...IOSR Journals
 
4033 chiminazzo lionela_tp10
4033 chiminazzo lionela_tp104033 chiminazzo lionela_tp10
4033 chiminazzo lionela_tp10carinanoelisfranco
 
Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...
Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...
Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...IOSR Journals
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина ЗемлиNatalya Dyrda
 
Modeling of generation and propagation of cardiac action potential using frac...
Modeling of generation and propagation of cardiac action potential using frac...Modeling of generation and propagation of cardiac action potential using frac...
Modeling of generation and propagation of cardiac action potential using frac...IOSR Journals
 
Anaphylaxis
AnaphylaxisAnaphylaxis
AnaphylaxisVASS Yukon
 
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...IOSR Journals
 
Energy
EnergyEnergy
EnergyAnas Niaz
 
лицей пушкина
лицей пушкиналицей пушкина
лицей пушкинаNatalya Dyrda
 
Immigration and Visas for International Medics
Immigration and Visas for International MedicsImmigration and Visas for International Medics
Immigration and Visas for International MedicsOdyssey Recruitment
 

Viewers also liked (17)

Using Social Media to Promote your Toastmasters Club
Using Social Media to Promote your Toastmasters ClubUsing Social Media to Promote your Toastmasters Club
Using Social Media to Promote your Toastmasters Club
 
A0960104
A0960104A0960104
A0960104
 
Q7
Q7Q7
Q7
 
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...Studying the Impact of the Solar Activity on the Maximum  Usable Frequency Pa...
Studying the Impact of the Solar Activity on the Maximum Usable Frequency Pa...
 
H0524548
H0524548H0524548
H0524548
 
4033 chiminazzo lionela_tp10
4033 chiminazzo lionela_tp104033 chiminazzo lionela_tp10
4033 chiminazzo lionela_tp10
 
A0520106
A0520106A0520106
A0520106
 
Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...
Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...
Zinc Sulfate As a Growth Disruptor for Spodoptera littoralis With Reference t...
 
Иркутск - середина Земли
Иркутск - середина ЗемлиИркутск - середина Земли
Иркутск - середина Земли
 
Modeling of generation and propagation of cardiac action potential using frac...
Modeling of generation and propagation of cardiac action potential using frac...Modeling of generation and propagation of cardiac action potential using frac...
Modeling of generation and propagation of cardiac action potential using frac...
 
Anaphylaxis
AnaphylaxisAnaphylaxis
Anaphylaxis
 
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
Physical and Mechanical Properties of Selected Wood Species in Tropical Rainf...
 
Energy
EnergyEnergy
Energy
 
D0432026
D0432026D0432026
D0432026
 
E01053539
E01053539E01053539
E01053539
 
лицей пушкина
лицей пушкиналицей пушкина
лицей пушкина
 
Immigration and Visas for International Medics
Immigration and Visas for International MedicsImmigration and Visas for International Medics
Immigration and Visas for International Medics
 

Similar to Real-Time Monitoring and Controlling of Network Clients

Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...theijes
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...IRJET Journal
 
IRJET- Remote Desktop Monitoring and Controlling
IRJET- Remote Desktop Monitoring and ControllingIRJET- Remote Desktop Monitoring and Controlling
IRJET- Remote Desktop Monitoring and ControllingIRJET Journal
 
VEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMVEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMKalpam Srivastava
 
Architecture for monitoring applications in Cloud
Architecture for monitoring applications in CloudArchitecture for monitoring applications in Cloud
Architecture for monitoring applications in CloudOnkar Kadam
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White PaperBrian Hedstrom
 
Jq2416671672
Jq2416671672Jq2416671672
Jq2416671672IJERA Editor
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET Journal
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...IJTET Journal
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring toolsAlexander Decker
 
IRJET-Concurrency Control Model for Distributed Database
IRJET-Concurrency Control Model for Distributed DatabaseIRJET-Concurrency Control Model for Distributed Database
IRJET-Concurrency Control Model for Distributed DatabaseIRJET Journal
 
IRJET- Performance Analysis of Store Inventory Management (SIM) an Enterp...
IRJET-  	  Performance Analysis of Store Inventory Management (SIM) an Enterp...IRJET-  	  Performance Analysis of Store Inventory Management (SIM) an Enterp...
IRJET- Performance Analysis of Store Inventory Management (SIM) an Enterp...IRJET Journal
 
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV MonitoringIRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV MonitoringIRJET Journal
 
Utility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementUtility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementRyan Gallavin
 
shivkumar pathak web based manufacturing presentation
shivkumar pathak   web based manufacturing presentationshivkumar pathak   web based manufacturing presentation
shivkumar pathak web based manufacturing presentationAkash Maurya
 
Cisco network management
Cisco network managementCisco network management
Cisco network managementIT Tech
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingeSAT Journals
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
An overview of grid monitoring
An overview of grid monitoringAn overview of grid monitoring
An overview of grid monitoringManoj Prabhakar
 

Similar to Real-Time Monitoring and Controlling of Network Clients (20)

Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...Design and Implementation of monitoring LAN user wirelessly by Android mobile...
Design and Implementation of monitoring LAN user wirelessly by Android mobile...
 
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
Smart Lan System for Controlling and Monitoring Network Using at Commands in ...
 
IRJET- Remote Desktop Monitoring and Controlling
IRJET- Remote Desktop Monitoring and ControllingIRJET- Remote Desktop Monitoring and Controlling
IRJET- Remote Desktop Monitoring and Controlling
 
VEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMVEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEM
 
Architecture for monitoring applications in Cloud
Architecture for monitoring applications in CloudArchitecture for monitoring applications in Cloud
Architecture for monitoring applications in Cloud
 
SDN Federation White Paper
SDN Federation White PaperSDN Federation White Paper
SDN Federation White Paper
 
Jq2416671672
Jq2416671672Jq2416671672
Jq2416671672
 
IRJET- E-Gatepass System
IRJET- E-Gatepass SystemIRJET- E-Gatepass System
IRJET- E-Gatepass System
 
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
Arm Based Real Time Monitoring and Controlling of Industrial Parameters Using...
 
A step on developing network monitoring tools
A step on developing network monitoring toolsA step on developing network monitoring tools
A step on developing network monitoring tools
 
IRJET-Concurrency Control Model for Distributed Database
IRJET-Concurrency Control Model for Distributed DatabaseIRJET-Concurrency Control Model for Distributed Database
IRJET-Concurrency Control Model for Distributed Database
 
IRJET- Performance Analysis of Store Inventory Management (SIM) an Enterp...
IRJET-  	  Performance Analysis of Store Inventory Management (SIM) an Enterp...IRJET-  	  Performance Analysis of Store Inventory Management (SIM) an Enterp...
IRJET- Performance Analysis of Store Inventory Management (SIM) an Enterp...
 
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV MonitoringIRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
IRJET- A Literature Survey on Scaling Approaches for VNF in NFV Monitoring
 
Utility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access ManagementUtility Protects Servers and Simplies Compliance with Access Management
Utility Protects Servers and Simplies Compliance with Access Management
 
shivkumar pathak web based manufacturing presentation
shivkumar pathak   web based manufacturing presentationshivkumar pathak   web based manufacturing presentation
shivkumar pathak web based manufacturing presentation
 
Cisco network management
Cisco network managementCisco network management
Cisco network management
 
Survey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computingSurvey on reliable sla based monitoring for billing scheme in cloud computing
Survey on reliable sla based monitoring for billing scheme in cloud computing
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
D1072327
D1072327D1072327
D1072327
 
An overview of grid monitoring
An overview of grid monitoringAn overview of grid monitoring
An overview of grid monitoring
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 

Real-Time Monitoring and Controlling of Network Clients

  • 1. IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661 Volume 3, Issue 2 (July-Aug. 2012), PP 06-11 www.iosrjournals.org www.iosrjournals.org 6 | Page RMC: Real-Time Monitoring and Controlling Approach on Networks G. Naveen Samuel1 , Immanuel Ganadurai2 1 (Computer Science and Engineering, Joe Suresh Engineering College, India) 2 (Computer Science and Engineering, Karpagam University, India) Abstract: A GUI based architecture for monitoring the operations and controlling the activities of the client machines placed in a network by an approach named RMC (Real-time Monitoring and Controlling) system. A client – server approach of the net spy allows the administrator to view those client systems connected to the LAN. The network administrator chooses needed clients with the help of their IP address for the monitoring process that enhances various events as system information, memory usage, desktop capturing and the tasks that are currently running under those clients. It captures the resources and each operation made in the client secretly. Here we enroll another process of controlling those monitored resources. The control utility includes controlling hardware like keyboard, mouse and also locking the client’s machine. It performs shutdown operations on the clients from the server. Combination of the controlling aspect along the monitoring process includes a cost efficient approach in maintaining a reliable network. Keywords: API interface, GUI interface, screen capture, Net spy and RMC approach. I. Introduction Real-time Monitoring System (RM) is GUI based software for monitoring the clients in a network. Net Spy enables an administrator to view the number of client systems connected to a LAN. Client Systems are monitored through their IP address. While a client enters a network, it is enhanced with a name and an IP address to be registered in the server. Monitoring is efficient in all organizations for maintaining records about the clients entering and exiting their network. Various events are monitored such as system information, usage of memory, capturing desktop activities and tasks running under clients. System Information contains OS name and version, processor detail, hard disk information and RAM details [3]. Monitoring a client can be a security operation prevailed over a network to keep a reliable flow of information between client and server. Clients may enroll their IP with the server for communication purpose but administrator takes rights on clients to make a security service. RM ensures a current state monitoring system which provides a facility of maintaining actions of the clients within the network circle. Clients may work against the organization and make them to collapse the goal they fixed for the yearly needs. But RM systems are used in their organization to make them secure by monitoring those clients and make their motto to be diminished. Most of the monitoring systems ensure traffic monitoring by the use of packet analyzer [12]. Operations can be monitored only through the IP addresses that are provided by the clients. Real-time Controlling system (RC) is an approach engaged only on controlling the clients from the server. The server or network administrator in the network controls each activity of their clients enrolled in their network. Controlling system is also made using the IP address of the clients. An organization controlled by a head, controls all the operations of their employees or clients by giving different rights for each clients. This is organized also in networks by enabling some rights for each client [5, 17]. Controlling software enables the network administrator to take control of their clients from their server monitor. Administrator enhances several rights along the clients for security purposes and maintains the network by provided commands over the clients to be performed by the clients to be constant in the network circle. Real-time controlling includes the control utility such as controlling hardware support of for the clients and locking their machines if not needed. It also performs shut operations on the clients from the server. Enabling this controlling system can make a cost efficient process for the server to work through their network. RC enabled networks can be a profitable approach for the organizations to work consistently. Servers enable their operation by commanding their clients to proceed with their work along server’s interaction on them [18, 23]. Networking enables those clients that are engaged along the server to process a schematic referenced structure of data transferring options. Controlling state of a system is the value added process of the system with an augmented security over a network environment.
  • 2. RMC: Real-Time Monitoring And Controlling Approach On Networks www.iosrjournals.org 7 | Page Fig. RMC Approach Real-time Monitoring and Controlling (RMC) approach is enhanced with both these operations in a single process that can be entitled with the network procedures. Usage of this approach on a network will power the system with secure formulae. This approach will process along the performance of the clients and server to interact with the processing style of the network. Administrator takes full responsibility of the network by working with both monitoring and controlling operation that is engaged in an organization to fulfill their goal. Maintenance of the network is enabled with this approach to stimulate a proper security structure of a network by propagating through the communication process [4]. II. Related Works In present scenarios, there are softwares performing monitoring options on the network. These monitoring approach are implemented in several systems for traffic management. Softwares that can perform both monitoring and controlling operations are no more present in this existing environment. It is difficult to control the system only with the monitoring phase. Servers or network administrators are enhanced only with monitoring the operations made by the clients and if needed to control them, they need to make a separate manual process that means reaching them to control their activities. It requires more efforts and also its cost expensive. It may need several softwares in engaging both the operations in a network. Manual procedures may lead to several failures in control [14]. For enabling an efficient RMC (Real-time Monitoring and Controlling) system, we introduce a procedure for making both the operations by the server. This approach includes both monitoring as well as controlling the activities made by the clients. Organisations working with RMC can be familiar in securing a constant network connection. A network administrator can work easily with this approach by organising the network connection in a single software approach proposed [21]. Enabling RMC reduces extra burden of purchasing two or more softwares for monitoring and controlling the network. Here server can identify a network traffic easily by monitoring each clients working in a network and can control them with some system commands. GUI based architecture is also used to enhance a live stream of capturing the activities done in the desktops of the clients present in a network [7, 16]. This GUI architecture is enabled for a real-time approach of the RMC system. III. RMC Approach a) Monitoring Phase: Server lists the clients using their IP address connected to the LAN. The API program is linked to all the files in the operating system. API is an interface between the user and the software components used in the system. It makes the remote procedure call method to interact with the operating system. IP addresses of the clients interacting along the network are listed along the server state [1, 22]. Those clients needed to interact along the network are made to register their IP address and their name on the list provided by the server. Client’s IP address is used for monitoring them by calling API functions of the client. Server enhances this operation and checks or monitors the required details of the clients and makes the GUI interface to enable a real-time monitoring to the server [8, 19]. GUI interface makes a graphical representation of the client’s current working particulars and furnishes those activities that are made in it. Fig. Monitoring Phase
  • 3. RMC: Real-Time Monitoring And Controlling Approach On Networks www.iosrjournals.org 8 | Page b) Controlling Phase: This phase is devised as the second phase of this approach that is proposed to take control over the clients connected onto a network. Here the monitored state needs a result of action on the client to make its state of action excellent with the help of this phase [6]. API interface plays the main role in this phase by regulating the commands that are organized by the server or the administrator in controlling the clients operations. Administrator or the server organizing the network make the commands of controlling power over the client engaged with them [2, 11]. Forcing the clients to make the work give by the organizer or the server and work according to the commands entitled by them is the main task prevailed in this phase. Fig. Controlling Phase The server selects an IP address of the client and makes a call for API programming commands to the selected client. Client then makes the required operation of the API for computing the task [13]. Thus it performs along it for making control operations on the system. Client is enhanced with a regulated operation to control its state of work or the traffic engaged by it. IV. Implementation of RMC RMC is based on GUI software interface which helps in making a live monitoring of the clients operations. RMC approach consists of two different modules with the Net Spy operation such that Monitoring and Controlling module. Here we structure a new net spy device by enrolling both these modules into it, while each performs its own task. Both modules make an effective procedure in maintaining constant achievements in the organisation. Operations are enhanced according to the goal entitled by the organiser of the network. Clients participating in a network are organised with their IP address listed in the server for regulating a systematic process of evaluating a solution to the improper work issue of the clients in the field [15, 22]. RMC approach is proposed for achieving those requirements of an organisation working on temporal changes made across a network. Implementing RMC is basically advised with the administrator’s rights prescribed over a network for performing an efficient task that surrounds the contributions of the clients ensuring the same network. Client maintains a consistent approach with the server to retain the tasks measured by the organisation which is controlled by the administrator of the system. Attributes of the clients are also monitored then and there with this approach and controls every actions organised by them to compromises the procedure enforced by the administrator or the organiser. Fig. RMC Approach a) Monitoring: Clients are monitored along the network to make a secure working strategy. Server makes use of this module that performs operations as Screen Capture and Task Manager. Screen Capture: Here the live screen is telecasted from the clients to the server. The current screen is captured from the client system and is displayed in the server. The administrator or the server enhances an efficient watch over the user who works in the system currently. Here the server selects the IP address of the client from the client list and makes a call to the specified client with an API program. Also it selects the
  • 4. RMC: Real-Time Monitoring And Controlling Approach On Networks www.iosrjournals.org 9 | Page operation type of the client as a string message that consists of the required operations to be made by the client. The client then receives the message and it makes the required solution for the server. The client first checks whether the IP call is same as its IP address. Secondly, it works for the server by capturing the screen and it converts the screen into a bitmap and it converts the bitmap then into bytes. Here the stream of bytes is transferred from the client to the server. Server receives the stream and converts it into a bitmap image and the bitmap is displayed on the server as the output of the screen capturing operation. Task Manager: Task manager lists all the processes that are running in the client system, including the background process. In screen, capture the user can easily cheat the administrator by minimizing the window and hiding the taskbar. But the task manager that is abstracted will display all the running process even though it is in the hidden state. User may activate several processes at a time that are organized in the task manager for ensuring the performance of the current system. Here it makes a specific process to be abandoned which is working with errors and may not respond to the system. Administrator can view the processes of the client used and also it can perform the required action of the server against the client’s performance. Fig. Screen Capture b) Controlling: Controlling module is entitled as the important modules of the RMC approach. Here different operations are enabled as desktop viewing and performing operations on the displayed information. Controlling involves operations as termination, shutdown, logoff or restart operations and so on. Each operation may be organized by the administrator or server for maintaining the performance of the network used by several clients. Here operations are performed specifically on a client by introducing its IP address on the server message. Server selects the IP address of the client which needs the server operation. Here the operation type is selected and it is enabled through the IP that is already been selected. IP address and the operation type selected by the server is organized as a string message that is sent to the client for enabling its required action. The client receives the message from the client, analyses it and performs the needed operations on it. Operations are performed by the API interface present in each client system. The message sent by the server first contacts the client API interface and makes the calls for enabling several operations on the client system. Fig. Performs Controlling Operations
  • 5. RMC: Real-Time Monitoring And Controlling Approach On Networks www.iosrjournals.org 10 | Page V. Need of RMC Approach Most organizations need an eye on their employees work to fulfill their goals. Thus RMC approach is used here for making a real-time monitoring of their employees and makes them work properly by controlling them without any physical access. RMC plays the main role in capturing the employee’s screen and displaying it in the administrator’s system. Administrator also allows the employees present in the list to be logged into their network. RMC helps in terminating the programs that are running improperly in their client system. Organizations goals are to be succeeded with a necessary procedural works by the employees but if it is out of service in monitor and controlled by the administrator acting as a server [10]. Employee’s system could be turned on only when it is registered in the employee’s list at the time of connection orientation. Without the presence of the administrator in an organization, systems are not allowed to be accessed by the clients. They work on their organization and make a disciplined way of communication between their employees. If any operation to be aborted by the client, then the server makes a message to the client to withhold those works and work along the organization [6]. If the received message is rejected by the client, the server takes charge on the client by terminating their works with the help of RMC approach. Nowadays various educational institutions works with RMC approach to favor an excellent education to the students they handle. Education is organized through a network where movements of every student are watched periodically. Students are allowed to make their listening and writing works through the network based education system that are monitored then and there to show a good result in their performance in examinations. Monitoring each and every student to make them study well and construct their future with a disciplined environmental state of operations within them [9, 20]. Teachers in the institutions acts as the administrator and takes charge of their students activities and make a perfect atmosphere over the institution. RMC approach is also used in many applications for favoring a reliable state of networking state [7]. RMC approach has secured a reliable and cost efficient software approach over the networking field. VI. Performance Analysis Achieving a well disciplined and a profitable growth in an organization is not an easy task of the organizer. Employee’s attitude of work should be analyzed at every moment to achieve an affordable goal. Organizers or the administrator must monitor every moments of their employee or client present in their organization or network. Monitoring alone could not show an efficient result in the organization. With the help of monitoring aspects, controlling of each activity of the clients is to be enhanced in this state [15]. Servers are not in a safe mode operation such as the clients working in their network can make some illegal source of operation against the network. Here the objective of the organization now is set to be with both monitoring each activities that are made currently and control them from the organizer’s desk and not with their physical access to each employees working in their organization. This objective is achieved through the RMC approach enhanced in this paper and makes the organizer to be up-to-date about their employees working details. Persistence of the employees over the organizational needs is made to be in a procedure to fulfill or achieve their goals entitled with them [9, 13]. While comparing to the present software’s which are organized only for monitoring but not present their ideas in controlling the unwanted actions of the clients in the network. RMC approach makes a reliable system of monitoring all the current state of each system connected to the network and present an interactive control measures on them which could be engaged with any operation that are persisting in the system. While analyzing its performance with the organization which is in need of this approach, it can be measured to be perfect on their action persisting with this approach that maintains an affordable result. This research study with RMC throws light on the extensive use of statistical techniques for analyzing the reliable performance of the organizations [21]. The paper also furnishes a summary of the requirements in each organization and concludes with an efficient approach. It fulfils all the needs of the organizers for organizing their employees. A sensitive study is made along this paper to make the organization full interactive with this approach. VII. Conclusion Finally coming to the conclusion of this paper a reliable RMC approach is devised and verified successfully. Real-time Monitoring and Controlling system has been designed and developed to the satisfaction of end users. Approach is built with a real-time strategic limit that could render both monitoring and controlling operations on the clients connected to the network. Administrator needs are satisfied along the specific attitude of the clients making their works against the network to establish a negative statics on it. Administrator makes use of this approach every time when the clients enter the network at a specific limit. Lists are maintained periodically at the server and the connections are established along the response given by the server or administrator. The system has been built with the latest technology to make the best of all resources. This approach is used specifically in education system to render a perfect study to the students and make them to engage with the teachers in a friendly atmosphere. It is also used probably in the organisations which consists of employees and works in a network structure to formulate a worthy achievement which regards the organiser’s
  • 6. RMC: Real-Time Monitoring And Controlling Approach On Networks www.iosrjournals.org 11 | Page goal. Here the structural representation of the approach is statistically used all over the system to compromise a specific work needed for encrypting a system along the basic situations maintained by the organiser. RMC approach is user friendly as it shows a fast response through the administrator. It is simple in working throughout the statistical operations made by the clients in the system and it is spied by the organiser or administrator who is responsible for the entire work. It is also much interactive with clients and server present in the network which formulates an affordable approach to the administrator. RMC approach works easier than other systems in the networking environment. Future world is fully based on networking and monitoring of the structured networks which becomes an important task. With this approach specified in the paper, we could manage any remote system i.e. we can kill a process, shutdown, reboot and also lock a remote system. Several enhancements can be made along this paper in future to entitle this software approach to be reliable in the networking market. References [1] Chang Ho Choi , CSMonitor: a visual client/server monitor for CORBA-based distributed applications, Software Engineering Conference, 1998. Proceedings, Pg: 338-345. [2] Dorsey, Robert E, 1992, The Voluntary Contributions Mechanism with Real Time Revisions, Public Choice, Springer, vol. 73(3), pages 261-82, April. [3] Cary Deck & Nikos Nikiforakis, "Perfect and Imperfect Real-Time Monitoring in a Minimum-Effort Game", Working Papers 10- 18, 2010,Chapman University, Economic Science Institute. [4] V. Kapsalis, A. Kalogeras, K. Charatsis, G. Papadopoulos, “Seamless Integration of Distributed Real Time Monitoring and Control Applications Utilising Emerging Technologies”, IECON'01: The 27th Annual Conference of the IEEE Industrial Electronics Society, Pg: 176-181, 2001 IEEE [5] G. Chen, M. Neville, Q. Kong, “Distributed Network Management Using CORBA/TMN”, Proceedings of the 7th IFIP/IEEE International Workshop on Distributed Systems Operation and Management (DSOM), 1996. [6] J. Boyle, H. Truong, N. Nour, “Providing a web-based view of your managed network”, Proceedings of 1997 IEEE International Conference on Communications (ICC'97), Montreal, Canada, June, 1997. [7] Tony White, Andrzej Bieszczad, “The Expert Advisor:An Expert System for Real Time Network Monitoring”, Northern Telecom [8] [Rabie et al 1988] Rabie S., Rau-Chaplin A., Shibahara T., DAD: A Real-Time Expert System for Monitoring Data Packet Networks, IEEE Networks Magazine September, 1988. [9] [White, Bieszczad 1992] White T.,Bieszczad A., A Customization environment for the Expert Advisor Network Management system, Canadian Conference on Artificial Intelligence, Vancouver, 1992. [10] [Laffey, et al 1988] Laffey T., WeitzenKamp S., Read J., Kao S., Schmidt J., Intelligent Real-Time Monitoring, Proceedings AAAI 1988 pages 72-76. [11] Girish Revadigar, Chitra Javali, “Real Time Monitoring And Control Of Wireless Networks”, International Journal Of Embedded Systems And Applications (Ijesa) Vol.2, No.1, March 2012. [12] Ahmed N. Abdalla, Muhammad Nubli, Tan Chien Siong, Fauzan Khairi, A. Noraziah, “Enhancement of real-time multi-patient monitoring system based on wireless sensor networks”, International Journal of Physical Sciences Vol. 6(4), pp. 664-670, 18 February, 2011. [13] Rolf Stadler, Mads Dam, Alberto Gonzalez, Fetahi Wuhib, “Decentralized Real-time Monitoring of Network-wide Aggregates”, Ladis 2008 proceedings. [14] Lasse Klingbeil, TimWark, “AWireless Sensor Network for Real-time Indoor Localisation and Motion Monitoring “, 2008 International Conference on Information Processing in Sensor Networks. [15] A. Witayangkurn A, *, M. Nagai B, K. Honda C, M. Dailey C, R. Shibasaki D, “Real-Time Monitoring System Using Unmanned Aerial Vehicle Integrated With Sensor Observation Service “ International Archives Of The Photogrammetry, Remote Sensing And Spatial Information Sciences, Vol. Xxxviii-1/C22 Uav-G 2011, Conference On Unmanned Aerial Vehicle In Geomatics, Zurich, Switzerland [16] W. Jiang , H. Schulzrinne, Modeling of packet loss and delay and their effect on real-time multimedia service quality, In Proc. NOSSDAV, June 2000. [17] K. Stuhlmuller, N. Farber, M. Link and B. Girod, Analysis of video transmission over lossy channels, IEEE J. Select. Areas Commun., June 2000. [18] A. R. Reibman, V. Vaishampayan, Y. Sermadevi, “ Quality monitoring of video over a packet network. IEEE Trans.Multimedia, April 2004. [19] Schill, Alexander, “DCE-The OSF Distributed Computing Environment Client/Server Model and Beyond”, 283.International DCE Workshop. Karlsruhe, Germany, October 7-8, 1993. Berlin, Germany: Springer-Verlag, 1993. [20] G. Chen, M. Neville, Q. Kong, “Distributed Network Management Using CORBA/TMN”, Proceedings of the 7th IFIP/IEEE International Workshop on Distributed Systems Operation and Management (DSOM), 1996. [21] L. Deri, B. Ban, “Static vs. Dynamic CMIP/SNMP Network Management Using CORBA”, IBM Research Report, IBM Zurich Research Laboratory, 1996. [22] “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications for Low-Rate Wireless Personal Area Networks (LR-WPANs)”, Institute of Electrical and Electronics Engineers, IEEE 802.15.4, 2003. [23] N. Bulusu, J. Heidemann and D. Estrin, “GPS-less Low Cost Outdoor Localization For Very Small Devices” , IEEE Personal Communications, Special Issue on Smart Spaces and Environments, Vol. 7, No. 5, October 2000, pp 28-34.