Server Monitoring System Using A Network Intelligent Agent: Keywords: CFP, Cryptographic License Key
Server Monitoring System Using A Network Intelligent Agent: Keywords: CFP, Cryptographic License Key
Intelligent Agent
2.1.2 RAM
2. SERVER MONITORING
Random Access Memory (RAM) is a form of
PERFORMANCE data storage. A server can load information required
by certain applications into RAM for faster access
Server monitoring work plays a prominent
thereby improving the overall performance of the
role in saying that nowadays there are lots of
application. This is because the RAM is flash based
companies with rather small and simple networks
storage and is several times faster than the slower hard
where servers are also used and needed to be
disk. If a server runs out of RAM, it sets up a portion
monitored. A sever is monitored to keep the data safe
of the hard drive as virtual memory and this space is
and secured. A key reason for monitoring is
reserved for CPU usage. This process is named as
troubleshooting server performance problems. For
swapping and thus causes performance degradation
example, users may have problems connecting to the
since the hard drive is much slower than RAM.
server and this case need to monitor the server to
Swapping also contributes to file system
troubleshoot these problems. Another common reason
fragmentation which degrades overall server
for wanting to monitor a server is to improve server
performance. So if RAM usage is constantly rising,
performance. High server performance is obtained by
needed to add more RAM for a cheap way to boost
improving the Input Output disk, reducing CPU usage,
server performance.
and cutting down on the network traffic load on the
server. For example, as the number of users accessing
2.1.3 Hard Disk
a server grows, in that cause its not be able to reduce
the network traffic load, so server performance is
The hard disk is the device that the server
improved through load balancing or by distributing
uses to store data. The inbuilt hard disk drive consists
key data files on separate drives.
of several rigid rotating discs coated with magnetic
material with magnetic heads arranged strategically to
So the first job for a system or server admin
write data to, and read from the disc or platter. The
is to wonder about the need to be monitored.
data stored are permanent and non-volatile and are
Depending on the application that the server is
available till it is consciously erased by the end user.
running, there will be mission-critical service some
It is the need to monitor the hard disk because the
require built-in OS services to run in addition to their
operating system needs space on the disk for normal
services and some only require their own services.
operating processes including paging files and certain
caches. The application running on the server must servers also becomes heterogeneous. Different
need space to write temporary data for efficient servers have different operating systems and thus
operation and also need space for permanent data the server need different methods for
accessed by the user. This low free space on a drive is implementation and monitoring.
one of the reasons for file system fragmentation which
causes severe performance issues. It is also important that the Server
Monitoring gains deep service level insights into
2.2 Hardware Components the systems for a complete monitoring. And it must
be able to ensure that the system is functionally
2.2.1 CPU Fan stable and working efficiently to win over this
challenge. Server monitoring helps in effective
This fan draws heat away from the CPU. The management of resource utilization during the over
process of this fan is to draw cooler air into the case load of hardware resources on the server, that
from the outside, expel warm air from inside, or move marks another challenge for server monitoring to
air across a heat sink to cool a particular component. give insights into the resources.
If the CPU fan fails, either the server will eventually
overheat and fail or perform an emergency shutdown
to prevent serious damage thus the server becomes 4. IMPORTANCE OF SERVER
unavailable. To prevent this from happening, CPU Fan
speed-monitor RPM (revolutions per minute) is
MONITORING
monitored in safe levels. If there is a spike in fan RPM Any network crashes it costs time and money
that lasts several minutes or hours, that is an indicator to fix. At a time of downtime that is already costing
of a serious issue. For example, if the AC is not the business money and hurting its reputation, it will
working, the fan vents are blocked. be difficult to fork out more cash to get things back up
and running again. Here the Server monitoring is
2.2.2 Temperature important that can monitor any small issues before
they evolve into anything major. Server monitoring is
The temperature of the motherboard is essential in ensuring service availability. The basic
another important hardware component to be concept of server monitoring is to ensure a server or
monitored. Unusually high temperatures can cause server infrastructure is functioning as it should be, but
permanent damage to the server and will affect server many stop monitoring at this stage. So it is important
performance adversely. So a safe working temperature to understand effective server monitoring allows to
limits are obtained from the manufacturer and take this is a step further to enable effective
monitored within a safe range. With the addition of performance testing to overcome any issues with the
virtualization to the mix, server density has increased. server.
This makes monitoring temperatures both internal
server and external server environment even more
critical. In this case, temperature measurements are Server monitoring involves monitoring many
used to plan and deploy virtual servers for appropriate different aspects of a network or server infrastructure.
monitoring. For example, a high load web or database The server hardware, operating system, applications
server is not be deployed on a physical server since it running on the operating system, network traffic,
is approaching temperature limits for safe operation. memory and disk utilization and CPU usage are
examples of top level items monitored in a common
3. SERVER MONITORING server infrastructure. In more depth, monitoring can be
performed in disk queue length, memory pages per
CHALLENGES second and total network bytes per second. Many other
application or hardware specific monitoring can be
configured and setup depending on which pieces of
A one big challenge for server monitoring information is critical to business and support needs.
is managing the increasing number of servers with
the limited resources. As soon as one server get
cluster there is a need to setup another one. But it In business today it is very important to
is not possible with the limited number of understand the importance of real time monitoring.
resources in the organization, so thus the server This enables user to establish important statistics of
management and monitoring becomes difficult. server, network and application performance. Real
Even in IT infrastructure with growing number of time monitoring not only gives accurate note on good
or bad network environment but also hugely helps
with foreseeing any future possible issues which the
network might face as well as troubleshoot any on-
going support work required. Effective real time
monitoring not only is crucial to most business
because monitoring system ensures functionality
properly but also saves businesses money in the long
run if any application/server downtime occurs it Figure 1. Format of an ICMP message
wouldn’t be difficult for the server environment to
trace the issues happened before.
. ICMP message is sent to alert the server for a
secure network alert. The Internet Control Message
5. DEVELOPING A NETWORK Protocol (ICMP) is a best example of a client server
application. The ICMP server executes on all IP end
INTELLIGENT AGENT system computers. The protocol is used to report
problems with delivery of IP datagram within an IP
Network Intelligent Agent is developed to network. It can be used to show when a
monitor the server from multiple locations. This particular server is not responding due to unreachable
provides a secure monitoring. Server is monitored of an IP network. The ICMP message is sent to correct
usually when the users have problem in connecting to destination server by setting the source address to the
the server due to network issues and also monitored to address of the computer that generated the IP packet
gain high performance. To have a secure server and the IP protocol type is set as "ICMP" to indicate
monitoring, a network intelligent agent is developed that the packet is to be handled by the remote end
which does two tasks, first one is Network Alert system's ICMP client interface.
System in that server monitoring system monitors the
health of the server and a notification message is sent The ICMP protocol has the ability to control
to registered users. Second one is Network and provide a secure network alert to the server.
Authenticated Mechanism based on CFP (Computer Because of the capability of ICMP, to affect the
Finger Print), for networks that fulfill the requirements operation of important system functions and obtain
of security. Here the CFP indicates the MAC address configuration information, hackers have used ICMP
of the system. messages in a large number of attacks. As a result of
concerns about such attacks, network administrators
often arrange to block ICMP messages with firewalls.
5.1 Network Alert System
If ICMP is blocked, a number of common diagnostic
utilities like ping, trace route do not work properly. To
Monitoring is a mechanism that oversees overcome from this issue the intelligent agent work on
system issues, business activities, and integration second task, Network Authenticated Mechanism
processes. The sole purpose of the monitor is to raise based on CFP (Computer Finger Print). The CFP detail
alerts based on predefined rules. The alerts may of entire system is registered to the main server, when
indicate any problems, network failure, or errors that server is monitored it checks and verifies the details of
should be recovered are sent to the server. During a all the registers users. If one server goes down during
multiple connection to the server, monitoring system monitoring the ICMP message is then sent to the
monitors the health of server and a notification server after CFP verification.
message is sent to registered users. The monitoring
system verifies the status of the server by sending heart 5.2 Network Authenticated Mechanism
beat message. If the server goes offline, the system
sends notification message to the registered mobile Network Authenticated Mechanism is based
devices and to the mail address. The system will send on CFP (Computer Finger Print), for Networks that
notification message to all the users registered to fulfils the requirements of security. In server
receive notification message. The details of the entire monitoring the CFP is used for authentication purpose
server are registered into the main system by which the to avoid unauthorized users to access the server
system can monitor the server and sends notification database. Since, a computer finger print is unique for
message through a SMS or email. Here ICMP (Internet each system all over its ease way of obtaining a secure
Control Message Protocol) message format is used to monitoring. To identify CFP of each system generate
send SMS alert to the server. a machine id, get a cryptographic license key from a
server, and then each time the program runs check the
machine’s fingerprint against the one stored in the is unique as human finger print. These CFP details of
license file. Machine id has a hardware serial number. each system are registered into the server. If a server
This machine id includes the CPU, the hard disks, and goes offline during monitoring, the ICMP message is
all the network interfaces, each of which have a then sent to the server after CFP verification. It helps
globally unique MAC address. The MAC address of in understanding server’s system resource usage that
each system is stated as a computer finger print this it provides a better end-user experience.
6. CONCLUSION REFERENCES
In this paper, a system which follows [1] Larkins Carvalho and Nielet D’mello, “Secure network
monitoring system using mobile agents”, International Journal
distributed and decentralized approach for the purpose
of Modern Engineering Research (IJMER), vol. 3, issue. 3,
of server monitoring and management is proposed for (2013), pp. 1850-1853.
the purpose of reducing the traffic over the network. It
is safe to say that most businesses rely heavily on the [2] Rafiullah Khan, Sarmad Ullah Khan, Rifaqat Zaheer, and
Muhammad Inayatullah Babar, “An Efficient Network
stability of their IT network and infrastructure and it is
Monitoring and Management System”, International Journal
a fact that the cost of downtime is becoming an of Information and Electronics Engineering, vol. 3, no. 1,
increasingly growing concern. The network downtime (2013).
not only causes a major loss of business productivity
but also affects the quality of service that is provided
[3] Prof.B.Murali and Ms.A.Mary Subasree, “System Intelligent
to the customer and impact of service given by the Agent in Distributed Computing”, International Journal of
organization can also cause severe damage to the Advanced Research in Computer and Communication
business reputation. For this case the server Engineering, vol. 4, issue. 8, (2015).
monitoring is developed and now plays a most
[4] L. Chang, W.L. Chan, J. Chang, P. Ting, M. Netrakanti, “A
prominent role in protecting the business and its network status monitoring system using personal computer,”
reputation. presented at IEEE Global Telecommunications Conference,
August (2002).