Design And Implementation of LAN Commander Applicable For Efficient Network Administration Solution Using JAVA Programming
DOI:
https://doi.org/10.61841/1hgxp448Keywords:
Local Area Network (LAN) Commander, Remote Administration Tool (RAT), , Network Monitoring Tool,, LAN Chat Server, LAN Chat Client, LAN Scanner,, , Java Remote Method Invocation (RMI).Abstract
The defining factor of our today world is communication technology and particularly, the Internet; that vast multitude of computer networks that came together to become a meaningful whole. Our world of now relies upon those networks, and the expansion and scaling of those networks is always underway, trying to keep ahead of the ever-growing needs of large companies and organizations. As these networks grow, the number of technical challenges that maintaining them grows as well. Depending on the size, a single company may house dozens or hundreds or even more subnets, and all must be kept in check, to make sure that the organization’s work goes ahead unhindered. The latter lines basically describe how the job of “Network Administrator” came to be overcome. They are the first and perhaps only line of defense against unforeseen circumstances that may hinder the operations of an organization and although it seems straightforward on paper, the sheer amount of network end devices makes their task seem impossible at a glance. This paper aims to facilitate the operation of Computer Networks, by allowing Network Administrators to remotely manage endpoints through means of a Java Software called “LAN Commander”. This function will allow for various features, such as Remote Desktop control and Network Monitoring.
Downloads
References
[1] Rupal D. Bhatt, Dr. D.B.Choksi. (2013), A Comparative Evaluation of Remote Administration Tools.
International Journal of Advanced Research in Computer Science, 4(4), 235-240
[2] Abhishek Kumar Gupta, Sagar Goswami, Ankur Nasa, Dr SC Gupta. (2018). Remote Desktop Monitoring and Controlling. International Research Journal of Engineering and Technology, 5(3), 2026-2027
[3] Harsh Mittal, Manoj Jain and Latha Banda. (2013). Momonitoring Local Area Network Using Remote Method Invocation”, International Journal of Computer Science and Mobile Computing, 2(5), 50-55.
[4] Abdullah Al Mamun, Sultan Anwar, Hassan Ali. (2015). Development of Monitoring Tools for Measuring Network Performances: A Passive Approach. International Journal of Computer Science And Technology, 6(4), 81-85.
[5] Wang Ping, Wany Zheng, “IEEE. (2007). Design and Implementation of Open Computer Lab Monitoring and Management system. Computer and modernization, IEEE.11, 125-128.
[6] njRAT Uncovered. (2013). General Dynamics Fidelis Cybersecurity Solutions. www.fidelissecurity.com, 1-
27. Retrieved from https://paper.seebug.org/papers/APT/APT.../ fta-1009---njrat-uncovered-1.pdf
[7] Debra Littlejohn Shinder. (2001). Computer Networking Essentials. Computer Networking Essentials (Cisco Press Core Series), Publisher: Cisco Press.
[8] Gallardo Raymond. (2013). The Java Tutorial: A Short Course on the Basics. Publisher: Pearson, Fifth Edition.
[9] William Grosso. (2001). Java RMI. Publisher: O'Reilly Media, First Edition.
[10] William E Perry. (2006). Effective Methods for Software Testing. Publisher: Wiley Publishing inc, Third Edition.
[11] Robert K Wysocki. (2009). Effective Software Project Management. Publisher: Wiely Publishing inc, Fifth Edition.
[12] Learn How To RAT (njrat With Full Tutorial) - Science / Technology, Nairaland, Retrieved from
[13] https://www.nairaland.com/4343782/learn-how-rat-njrat-full
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.