INTRODUCTION
Background of Study
Operating system statistics provide information on the usage and performance of the system's main hardware components, as well as the performance of the operating system itself. This information is essential for detecting possible resource exhaustion, such as CPU cycles and physical memory, and for detecting poor performance of peripherals, such as hard drives. Operating system statistics are only an indication of how the hardware and operating system are performing.
Therefore, it is important to have tools that will enable the computer user to regularly check their operating system as well as central processing unit (CPU). The computer monitoring system will allow you to graphically display information about activity on your system. There are a series of commands that allow system administrators, programmers, and users to examine each of the resources that a Windows system uses.
The system will also make it possible to provide the user with the performance and critical issue that the system is facing at that time. In addition, the Computer Monitoring System will also provide detailed information about the computer systems and hardware, its functions and its capabilities in supporting various new functionalities and platforms, such as Windows 64 bits.
Problem Statement
Objective and Scope of Study
- Objective
The scope of the study on this project is basically to understand and explore how the computer and its operating system synchronize between themselves and the various hardware. The project will be more focused on the characteristic within the computer and operating system that can cause system threshold and overload resource, how this characteristic or counter bank interacts with the specific component and the status value and the data flow between the components, characteristics and the operating system. Apart from that, it is also important to gain in-depth understanding in the status value itself; the type, how it can be converted into useful information and the reliability of the data.
LITERATURE REVIEW AND/OR THEORY
- CPU Mouitoriug
- Needs For Computer Monitoring
- Complexity in CPU Monitoring
- Example of Current Similar System
- I WhatsUp Premium Gold
- JConsole
- Balauciug Performance, Energy and Quality in Pervasive Computing
The system administrator must have a thorough understanding of the activities on the system before users are affected by a crisis. These profiles of system activity and user requirements can help the system administrator gain a holistic view of the activity on the system. In addition, operating system statistics provide information about the usage and performance of the system's major hardware components, as well as the performance of the operating system itself.
The complete graphical representation of the network is then used as a tool to survey and access the operational status for each device on the network. It not only defines management interfaces for the Java virtual machine, but also provides out-of-the-box remote monitoring and management of the Java platform and the applications running on it. It uses the extensive Java virtual machine tools to provide performance and resource consumption information of applications running on the Java platform.
The monitor first determines the amount of competition for the CPU by measuring the percentage of cycles recently used by other processes. The monitor observes CPU usage by associating the operation with the identification of the executing process.
METHODOLOGY /PROJECT WORK
Procedure
- Planning ................................................................................. I I
- Design
During this phase, all the theory and findings about the development of the system will be used practically to reach the finished product by the end of the semester. Towards the end of the semester, questionnaire will be carried out for the purpose of analyzing user acceptance. During the analysis phase, the author identified the required monitoring feature to be implemented within the system and successfully classified and categorized each of the features based on its object classes.
The result of the analysis could be found in the chapter Result and discussion later. Apart from that, an analysis has also been done on how the system will be able to meet the objectives of the project, especially in terms of reducing time, money and energy for the computer users. The physical design will only be carried out in the second phase of the project, where it involved product development, concerning the construction of coding and modules.
First, the logical design phase involved the construction of the system itself, where the author had to identify how the system is going to behave when receiving input from the user or from a related source. That is, UCD not only displays the details of individual features of the system, but can also be used to display all available functions. While the author basically used the process flow diagram as a graphic representation of the sequence of all operations, movements, inspections and storage activities of a process.
To identify the source of the data the system needs and also where the data is sent to, the author decided to use the design of a data flow model to track and recognize which part of the computer component attribute is needed. The physical design phase included the construction of the prototype, including the construction of the interface, the system process method, and the procedure and function of the system. The author has divided this phase into two, with the construction of the system interface being carried out during the first part of the project, while the remaining physical design tasks will be carried out during part B.
Minor changes to the system interface were carried out during the semester break last time to suit the programming needs. During part A, the construction of the prototype interface was done starting with the design of the system storyboard, so that the author could have a brief overview. Later, during Part B, the remaining prototype construction will be completed as well as any minor changes that may occur during the process.
Tools
- Softwares
- System Requirement
RESULT AND DISCUSSION
Result of the Analysis
The main source of the monitoring attribute value can be triggered from the operating system's reporting mechanism; log file that maintained the monitoring process and its system-wide value while the system was running. When the system enters the build phase, it is therefore critical to identify the source of the attributes in advance before the coding can be constructed to build the system. The following table lists the necessary information required by the monitoring software system and the original source of the data obtained from the computer system.
By making use of the obtainable information provided by each of the above sources, the data will be processed by each module of the monitoring areas. The author decided to separate the data processing into several sub-modules so that the physical design of the system can be implemented incrementally; sub-module by sub-module, before making the integration of each functionality. Indirectly, the monitored value will indicate the inefficiency in computing and thus provide the application with the current value of the computing system.
In addition, based on the analysis performed, the data flow process for the overall system starting from the computer user himself to the deepest part of the computer which is the operating system. This movement and transfer of data between each entity must be clarified so that the primary data source as well as the requested point can be correctly assigned to maintain reliability. If the user performs the tuning at the same time as the program was running, there may be changes in the setting of the monitoring attributes within the computer system, and therefore, the system must receive the new computer system configurations.
This includes the identification of the data, the process that is performed within the system and the assessment that is performed during the processes. Computer monitoring system processes begin with the installation of the software by the user on the affected computer system. This test was performed to measure the effectiveness of the information provided by the system to the user.
The areas in which the system is evaluated are prototype realism, user control and freedom, aesthetics and minimalist design, and system usability. Based on an informal discussion with the evaluators about the overall effectiveness of the system, most agreed that the system is presentable and suitable for use by both experts and novices. Although all evaluators agreed that the information in the system is relevant to the scope and areas covered by the project, some information may be irrelevant to the novice, as this information may be difficult for a user with only basic computer knowledge to understand.
Most of the evaluators agreed that the prototype system covered most of the computational aspects that should be monitored in order to achieve optimization in computer use. Since the prototype covered most of the areas of computer components related to the performance of the entire computer, it provides a huge amount of information to the user.
I. I Windows Management Instrumentation
- Computer Monitoring System Logical Design
- Physical Design Result
- Computer Monitoring System :Physical Design
- Evaluation (User Acceptance Test)
- Evaluation Result
- Evaluation Result Analysis
RECOMMENDATION AND CONCLUSION
Summary of Project
By incorporating scripting technologies, HTML application, and manipulation of Windows Management Instrumentation functionality, the author is believed to have achieved the original intent and goal stated earlier. This project could help a computer user to understand the requirements needed to maintain a good computer configuration. During the development and research phase of the project, the author also learned new lessons about computer configuration and programming techniques that may be useful in the future.
Towards the completion of the prototype, the methodology has provided the author with strong guidance for the project. The research and construction phase is critical in completing the project to meet the defined scope.
Suggested Future Work for Expansion and Continuation
- Provide troubleshooting functionality
- More clear and comprehend information provided
- Capability in using at different platform
Conclusion
Retrieved October 2005 from the World Wide Web:. tr/english/facilitiesservices/computercenter/bookslib/Unix%20Unleashed/unx29.htm. World Wide Web: http://www.w3.org/TR/xhtmll/DTD/xhtml!-strict.dtd [7] Using JConsole to Monitor Applications, Mandy Chung, December 2004 [8] Look inside for more information on computers Sleep setting monitoring,. 9] Dynamic Processor Rebalancing and Dynamic Processor Resiliency, April 16, 2002, http://docs.hp.com/en/1119/dynamic.pdf.