Reconfigurable Framework For Remote Monitoring and Management of Computer Systems
Reconfigurable Framework For Remote Monitoring and Management of Computer Systems
Reconfigurable Framework For Remote Monitoring and Management of Computer Systems
Systems
Abstract—Remote Monitoring and Management systems are systems and administrate them from a single center, Remote
information technology software tools to organize and manage Monitoring and Management (RMM) software tools are
client workstations. They are used by many companies that being used by organizations. RMM software generally has
are willing to minimize their labor cost, collect and measure two components, one of which is an admin portal used by
the data of a variety of clients, administrate them from a an IT personnel and the other is agent deployed to managed
single point, in a reliable and secure way. Dynamic profile client computers. With the help of the agents, RMM system
deployment, dynamic reconfiguration of monitors in response identifies newly joined clients and deploys some default and
to changes in clients’ profiles and creating notifications or predefined set of monitoring mechanisms and instructions.
running a procedure on the fly are the main features of remote There is also need for RMM systems to take actions after
monitoring systems which can be fully expressed by Dynamic deployment and show dynamic behaviors during runtime.
Software Product Line Approach. Reconfigurable Framework At this point, the application of Dynamic Software Product
for Remote Monitoring and Management of Computer Systems Line (DSPL) Engineering methodology seems well suited
aims to provide IT service providers with a dynamically for RMM systems. Although there is extensive academic
reconfigurable, reusable and easy to define smart monitoring research on DSPL concepts and techniques, the application
and measurement mechanism. It applies dynamic software areas and best practices in business are still preliminary.
product line concepts which are well defined in academic How DSPL mechanisms are put into practice in RMM
studies but not extensively implemented in business realm.
product families and what are the effectiveness, benefits and
gains in DSPL approach applied to RMM systems are the
It enables information technology management systems with
driving questions for this paper.
reusable and autonomously monitoring software assets.
Index Terms—Remote Monitoring and Management, Dynamic 1.2. Motivation
Software Product Line, Reconfigurability, Runtime Adaptation
A Remote Monitoring and Management System is used
to manage clients workstation remotely by aiming auto-
matic, reliable and maintainable management monitors. The
1. Introduction features of RMM are varying according to the custom needs.
Nevertheless, in all of them, RMM can detect the new
1.1. Problem Statement clients joining the network and then configure and manage
them automatically by the rules prescribed by IT service
Increasing demand for complex multidisciplinary sys- providers. For example, after new client identification is
tems, fast developing technology trends and need for adap- completed, a default profile defined by IT manager or a
tation to a fast evolving world require large scaled, multi em- specific one to this client is deployed to the workstation
ployee companies in almost every field. To ensure the sus- and controls the end user achine remotely. In a security
tainability of the work flow, increase productivity by keep- concerned profile,the manager can define such a rule that
ing employees workstations healthy and consistent, keep Malware Detection monitor starts to watch the computer
servers, network areas or other software systems of company and whenever it detects a virus or spy, it removes the
always up and running, companies hire Information Tech- malware automatically, or creates a notification to user or
nology (IT) staff and managers. Another key point for com- Management Service Providers. As another rule concerned
panies having computer systems is enhancing the quality with, whenever a CPU Monitor detects that CPU usage is
of service and reducing the risks, therefore they budget for exceeding the 70 percentage, then Event Log Monitor also
Management Service Providers (MSP). To reduce the cost to is set up. Considering these features, remote monitoring
employ IT management staff but more importantly diminish and management software is very suitable to model it as
the human errors, automate the management of computer Dynamic Software Product Line. With this motivation, Re-
configurable Framework for RMM Systems emerged which Line (SP L) development is one of leading approaches for
facilitates the construction and configuration of remote mon- large-scale product families in which many of them share
itors by applying the dynamic reconfiguration and asset the same components and have variable and configurable
reuse approaches guided by a variability model. options and requirements. Software product line approach
aims to create a product portfolio with lower cost and high
1.3. Contributions quality by adopting reusable software components. However
the more important need; adaptation to variable systems and
Reconfigurable Framework for RMM Systems con- environment, sensing the changes in context conditions have
tributes the software engineering domain by exploring the led to a newer approach: Dynamic Software Product Lines
applicability of DSPL methodology in the Remote Moni- [2]. In todays large and heterogeneous systems, determin-
toring and Management domain. Although the framework ing the requirements and features before deployment phase
addresses computer systems, it can also be a guide for is not enough, instead there is an emerging challenge to
monitoring systems in other application fields. handle variability during runtime. DSPL approach supports
to define the variability points of a system for both pre and
1.4. Organization post deployment stages and then suggests feature activation
and deactivation mechanisms to handle autonomous decision
In the rest of the paper, initially the background for making and then dynamic reconfiguration of software assets
RMM and DSPL concepts, then commonality and variation during execution. [3]
points analysis of RMM systems is given, which is an impor- Dynamic software product lines provide following prop-
tant phase for dynamic software product line development. erties:
Then the details of the framework in terms of architec-
ture, self awareness and dynamic binding mechanism and • Adaptation to dynamically varying system and en-
reusable assets are explained. vironment needs.
• Dynamic reconfiguration of product by applying au-
tonomous decision making at runtime.
2. Background • Support for wide range of product families with the
help of reusable software components.
2.1. Remote Monitoring and Management • Management of variability driven by an explicit
variability model.
Remote Monitoring and Management is software tool
used by IT/Management service providers to manage and
organize their client systems. A RMM system enables 2.3. Variability Modeling with Feature Models in
Managed Service Providers to setup monitors over client DSPL
computers/systems to gather information and data pertain-
ing to how the system is performing and to supervise the
security and performance related issues. With the help of A distinguishing aspect of a DSPL from manual-
monitoring mechanism, MSPs or technical support team managing systems in general is that a DSPL must possess
can execute management tasks autonomously [1]. Remote a variability model explicitly, variability management and
Monitors are, in general, shaped with three main concerns: dynamic adaptation mechanisms must be using this model.
Security, Performance and Communication. Under these In a product family, the most important thing to maxi-
categories; TCP, Network Bandwidth, CPU, RAM, Folder mize the reuse of product components is determination of
Size, File Size, Malware Detection and many other monitors commonalities and variabilities between them. Every single
are set to clients and their workstations are managed by ser- aspect that is common or distinct can be accepted as a
vice providers remotely. An autonomous and self-adaptive variant for this product family. It is crucial to identify the
remote monitoring and management software is preferred goals for a system, ask domain questions and give explicit
by many company because it helps reduce labor cost and answers to these questions, and in return they are also
replace the error prone manual management systems. Instead another variability points/variants [4] On the other hand,
of wasting hours for employed IT support teams, RMM a product also can have some internal states and vary
software with a single IT manager can organize the client by the environmental changes during execution cycles. To
machines automatically by minimizing human factor and adopt product to the resulting conditions, some features are
solve the issues without interrupting the client. activated or deactivated and the system needs to evolve and
achieve self adaptation. All possible features that can be
active for a product or system are also variation points.
2.2. Dynamic Software Product Lines
"Commonalities and variabilities are modeled
To react to dynamic needs originating from humans, from the perspective of product features, âĂIJs-
system or environmental changes and new feature demands takeholder visible characteristics of productsâĂİ
in software intensive products, new approaches and so- in a product line that are of stakeholders concern.
lutions have appeared in the literature. Software Product [4]
Remote Monitoring
CPU
Services Monitor Event Log Idle State
Folder
Monitor Monitor Monitor
Size
Monitor Disk Space
Monitor
File Size Process
Monitor Monitor RAM Monitor
Malware
Detection
Optional Feature
Single Choice
Excludes Requires
Feature Definition
This feature is the first of four main and abstract features of the RMM system. It has four child feature
Resource Utilization watching the different sources of computer systems: Folder Size, File Size, Process and Service Monitors.
Resource Utilization feature is mandatory and the system must have at least one child feature of it.
This feature continuously watches the size of predefined folder, if the size of it becomes higher than the
Folder Size Monitor
specified value, this value is reported to the system immediately.
This feature continuously watches the size of predefined file, if the size of it becomes higher than the
File Size Monitor
specified value, this value is reported to the system immediately.
This feature continuously watches the predefined process or set of processes, if the running state of
Process Monitor
process changes, status is reported to the system immediately.
This feature continuously watches the predefined service or set of services, if the running state of
Service Monitor
processes changes, status is reported to the system immediately.
This feature is the second of four main and abstract features of the RMM system. This optional feature
Security aims to detect security vulnerabilities on computer systems. It has 3 different child feature : Access
Restriction, Malware Detection, Intrusion Detection.
This abstract feature watches the drivers of computer systems with restricted access to drivers. USB
Access Restriction Detection and CD/DVD Detection Monitors are the concrete child of this feature. When Access
Restriction is activated, one of these features must also be activated.
USB Detection Monitor This feature continuously monitors the USB drive and reports the existence of drive to the system when
it is detected
CD/DVD Detection Monitor This feature continuously monitors the CD/DVD drive and reports the existence of drive to the system
when it is detected
This is an abstract feature to monitor the malware attacks to computer systems. When Security feature is
Malware Detection activated, this feature must also be activated. Two concrete child features; Online and Offline Detection
Monitors can be alternatively active in a system.
This concrete feature monitors the attacks that can take place over the Internet. When this feature is
Online Detection Monitor activated, Network Traffic Monitor feature must also be activated. Idle State Monitor cannot be active
when this feature is active.
This concrete feature monitors the changes in operating system caused by the applications of computer
Offline Detection Monitor systems. It reports the security vulnerability to the system. Event Log Monitor must also be activated
when this feature is activated.
This feature is an abstract feature to detect the unauthorized entry to the system. Intrusion Detection
Intrusion Detection Monitor must be activated when Security feature is activated. At least one of three concrete child of it;
Network Traffic, TCP and Ping Monitors must also be activated.
This feature checks the network traffic of computer system at the specified frequency and when the
Network Traffic Monitor
percentage of usage exceeds the specified threshold, it reports the percentage to the system.
This feature monitors the specified TCP Port at the specified frequency. It reports the state changes and
TCP Monitor
the list of connected clients to the system.
This feature pings the specified URL at the specified frequency and reports the packet loss percentage
Ping Monitor
when the it exceeds the specified threshold.
This mandatory feature is the third of four main and abstract features of the RMM system. It has four
Performance child feature monitoring the components that can be a measure of performance: CPU, Disk Space, RAM
and Event Log Monitors. At least one of these coexisting features must be active in the system.
This feature watches the percentage of CPU usage and reports to the system together with the current
CPU Monitor
value when the specified percentage value is exceeded.
This feature keeps track of the usage of disk space, reports to the system together with the current value
Disk Space Monitor
when the specified percentage is exceeded.
This feature keeps track of RAM usage, reports the system together with the current value when the
RAM Monitor
specified percentage is exceeded.
This feature monitors the Event Log component of Windows Operating System, reports error log to the
Event Log Monitor system together with application name. This feature can also be configured to track error logs for a
specific application.
Energy This optional feature is the last of four main and abstract features of the RMM system. It has one child
feature: Idle State Monitor.
It is a concrete feature that monitors the idle state of the system. It continuously checks the indicators of
Idle State Monitor idle state; whether the screen protector is active, a user input is present or the mouse and the keyboard
are not used for a certain period of time. It reports the idle state changes to the system.
Figure 2: Remote Monitoring System Software Components