Study of Workstation Management Systems for Linux and Servers
Study of Workstation Management Systems for Linux and Servers
ISSN NO-2584-2706
Abstract 1. Introduction
Workstation and server inventory In modern IT-driven organizations, managing
management is crucial for IT infrastructure, it and monitoring workstation inventory is
ensures efficient resource utilization and essential to ensure efficient resource utilization,
security. Workstation Inventory Management higher security and seamless
System is a real-time asset tracking and collaboration
system monitoring solution designed for among employees. A workstation inventory
Linux-based workstation systems and servers. management system helps the organizations to
It automatically discovers, connects, and track, manage, and
collects information about employee’s system, optimize computation of available resources by
when they log into the system. In Linux-based collecting, managing and maintaining updated
environments, managing hardware and information about hardware, software, and
software assets across multiple workstations network configurations of the systems.
and servers represents various challenges such Traditional manual inventory management
as tracking of configurations, software methods are prone to errors, time-consuming,
updates, and system health. This paper and inefficient in handling large-scale IT
explores various methodologies for infrastructures. This paper presents an
implementing workstation inventory automated Workstation Inventory Management
management in Linux and server System designed for Linux and server-based
environments, it compares existing tools, and environments, which enables real-time tracking
proposes an optimized approach using and team-based system connectivity by creating
DevOps with integrating automation, open- a workstation [5].
source tools, and real-time monitoring. The This system allows employees to log in using
system provides automated inventory tracking, their Employee unique ID, enrolled Name, and
IP-based system discovery, and a web-based IP Address of their system, upon which it
dashboard for administrators, ensuring a automatically retrieves systems hardware
scalable, efficient, and secure solution for specifications, installed software details, and
modern IT environments. By leveraging network configurations from their workstations
automated network integration and real-time which creates a better understanding of
updates, this study aims to enhance the available systems. Additionally, it dynamically
efficiency of workstation monitoring and IT discovers and connects to team member's
asset management. systems, enabling synchronized inventory
Keywords: Linux operating system, Inventory tracking
Management, Server Monitoring, Asset within project teams. Built using Linux, PuTTY,
Tracking, Open-Source Solutions. Oracle VM VirtualBox, Java Servlets, and
MySQL, the system provides a secure, efficient,
and automated approach with the use of DevOps
[7][8].
IJMSRT25MAY073 www.ijmsrt.com
DOI: https://doi.org/10.5281/zenodo.15505220 335
Volume-3,Issue-5,May2025 International Journal of Modern Science and Research Technology
ISSN NO-2584-2706
automated hardware part, and having a simple Comparative analysis to evaluate existing Linux
architecture design of the server-client and at workstation management tools and network
the same time, the system can be deployed monitoring systems to determine current issues,
easily. The research methodology the project constraints and where the scope for
was based on a design approach, which took a improvement lies [1][7].
prototype system as the basis of the study. This
prototype was initially only conceptual and later 3.2 Research Designs
was built and improved through its lifecycle A cycle of design-based research was adopted
based on the feedback from the initial testing. for this research work, which consisted of
The collection of data in this case required that proposing the prototype, testing it and further
a Linux server-client environment be virtually refining the whole system architecture [6][5].
created using Oracle VM VirtualBox. The
environments are virtually simulated. The 3.3 System Setup and Environment
environments are virtualized and composed of The environment for client-server systems was
different configurations of machines to model modeled using Oracle VM VirtualBox, while
different scenarios. The virtualization of the PuTTY was the software used for secure-shell-
server-client network was conducted by based remote communication. The OS for all
simulation with the use of Oracle VM systems was Linux, and they were properly
VirtualBox [7]. In addition, PuTTY was configured [8].
employed for securing the remote access as
well as for solidifying the client-server 3.4 Technology Selection
communication via SSH [8]. The main Operating System: Linux.
technologies for the system were decided to be Programming Language: Java (Java Servlets)
Java Servlets and MySQL which besides being Database: MySQL
the basis of the compatibility and easy Web Server: Apache Tomcat
integration of the system, also were of great Remote Access: PuTTY (SSH)
help in the smooth running of the database Virtualization: Oracle VM VirtualBox
operations. The experiment was conducted by
using a mix of qualitative and quantitative 4. Security Considerations
metrics for the user experience and system In Linux-based environments where multiple
usability evaluation. Response time, data users and administrative roles exists, Security is
transfer speed, login time of usage, and a critical component for any workstation
database query performance were also inventory management system. This system
measured to verify the system's efficiency. In implements reliable security to ensure data
the course of the study, various error scenarios integrity, user authentication, and secure
were generated, e.g. abrupt client communication between the client and server
disconnections, invalid login attempts, and [7][8].
network breakdowns, to be prepared for the
server's and its systems' handling of such issues 4.1 Role-Based Access Control (RBAC)
[12]. All the trials were set in a controlled Role-Based Access Control (RBAC) is a piece
environment to avoid any errors and ensure the of the puzzle that stands for to let just limited
correctness of the data. The combined usage of and authorized users to go through a particular
statistical and non-statistical methods provided system, and obtain specific information, such as
a comprehensive understanding of the technical data withing the system, perform only those
side and the efficiency of the system, thereby activities the system allows him/her/them, and
being a catalyst for the implementation of an do it in particular ways. This should be
energy-efficient, secure and scalable desktop designed with a user-centric mind and avoid
management solution [15]. experience to complex, confusing interfaces.
For example, System is supposed to be operated
3.1 Literature Review by users and not make it impossible to access
data because the UI is designed in an unfriendly
IJMSRT25MAY073 www.ijmsrt.com
DOI: https://doi.org/10.5281/zenodo.15505220 337
Volume-3,Issue-5,May2025 International Journal of Modern Science and Research Technology
ISSN NO-2584-2706
manner. Hence, each user account should allow from record-keeping. Human errors are
limited or even no prospection of any document minimized during the process and data
offered by the system. System admin is given consistency is assured to be there [6].
full control to those computers/users authorized
by the manager [12]. 5.1. Real-Time Updates
Once a person logs in to the workstation, all
4.2 Data Encryption workstation data are dynamically updated. This
Elimination of humans in decision making and guarantees that the IT administrator is not only
thus a 0.01% probability of granting an up-to-date with the most current system status
interface to unauthorized individuals. Besides, but also, can read reports this way since the
the system is the one that handles the entire reports are in real-time [6][7].
process of authenticating a user. When they log
in, they type in their information only when the 5.2. Centralized Database
user is truly present. Since Administrators of The single MySQL database that contains
the BI system have full control, they can information concerning workstations will
prohibit any user activity at will. At this stage, support IT teams greatly. They can query the
they get data-based decisions, instant alerts, and database, manage, and analyze the inventory
prediction options instead of conventional data with ease. In addition, audits are easier,
solutions. On the other hand, there is an report generation is more efficient and
automatic control system of this process that troubleshooting is more effective.
allows the BI system to restrict any user to view
or to make changes to a file [13]. 5.3. Security Monitoring
This software tracks non-stop the login
4.3 SSH Security Measures attempts, process operations, and the
A secure connection with a VPN could be consumption of system resources. This way, the
created between the server the cloud front could system will be able to detect a security issue i.e.
happen with the client server over the internet. one that an unauthorized user enters or suspect
The act of not doing one of the PPC tasks activities [7][12].
would leave the participants being labeled as
fallible and incompetent. This results in the 5.4. Scalability for Large-Scale Environments
removal of unvoiced rules and the identification This is a system that is specifically developed
of teachers who only concentrate on for hard-to-reach markets. The design is such
curriculum-based texts. The more advanced the that it can expand easily since it can keep pace
mobile client is, the higher the price is likely to with thousands of workstations without losing
be. any performance. The reason behind that is the
selective use of database queries and
4.4 Access Control and Data Protection implementation of the multi-threaded process
It explains role-based access to the MySQL that enables the system to function correctly in
database and restrictions on data manipulation. the face of the increasing number of computers
[4].
5. Functionalityand Performance Capabilities
New custom features are a new release to the 5.5. Continuous Security Monitoring
existing Workstation Inventory Management Security is a primary focus of any system. It
System. The features optimize inventory continuously monitors the process operations,
tracking, increase security, and bring efficiency and resource consumption to detect and address
to a company. potential security issues. This real-time security
Automated Inventory Tracking: Not only will monitoring helps identifying unauthorized
the system increase the error rate and guarantee access or suspicious activity promptly, ensuring
administrative consistency by making inquiries the integrity of the system [7][12].
to 'workstations' and, then, updating by itself,
but it will also remove the need for human input
IJMSRT25MAY073 www.ijmsrt.com
DOI: https://doi.org/10.5281/zenodo.15505220 338
Volume-3,Issue-5,May2025 International Journal of Modern Science and Research Technology
ISSN NO-2584-2706
(GLPI, OCS) Proposed System Improvement overhead, improves system reliability, and
Asset. The results show that Manual Inventory maximizes resource allocation [6]. The system's
Tracking always very slow and inefficient, this scalability advantage, too, lends itself nicely for
process consumes lots of hours for manually integration within firms of all scales, providing
feeding data input and it can be accompanied by hassle-free merging into current IT frameworks.
human errors. Although traditional methods Security is an important element of workstation
such as GLPI and OCS Inventory are time- management [9], and the system under
efficient, they are still based on agent- consideration features secure authentication
dependent tracking, which in turn consequently protocols, role-based access control, and
exposes security hazards and raises the encrypted communications to avoid unauthorized
company's running costs. The newly proposed access and data loss. Remote management and
automated and agentless method came up with configuration of servers through a secure
the 98% reduction of asset discovery time, interface reduces the requirement for on-site
which is a major advantage for this interventions, which is especially advantageous
development as it is very effective on large- for organizations working in distributed and
scale enterprise networks [10]. The most cloud-based setups [11]. The study also
important issue during the implementation of emphasizes the necessity of automation to
the system was data consistency problem due to eliminate human mistakes, reduce security
network latency and system resource threats, and maintain organizational IT policy
fluctuations which affected real-time tracking. compliance. Additionally, the server resource
This problem was resolved by optimizing utilization analysis using pie charts and
database queries, putting caching mechanisms performance graphs is very useful in
in place, and the use of multi-threaded data understanding CPU usage, memory usage,
collection techniques. Furthermore, security storage allocation, and network bandwidth usage.
concerns involving database access and API With this data, author concludes that,
endpoints were also addressed by means of a administrators are able to make informed
combination of methods. TLS encryption was decisions about workload balancing, performance
enforced to the system, role-based security tuning, and scaling infrastructure [13].
policies directly reduced the risk of user
privileges but periodic audits were still a must References
to do it correctly with no security breach. The [1] A. S. Tanenbaum and H. Bos, Modern
project has been completed and it is an Operating Systems, 4th ed. Upper Saddle River,
undeniable fact that it helps to monitor the NJ, USA: Pearson, 2015.
system continuously in real-time accurately by [2] R. Buyya, J. Broberg, and A. Goscinski,
avoiding the constant need for agent execution Cloud Computing: Principles and Paradigms.
and, moreover, it is a secure and a fast system Hoboken, NJ, USA: Wiley, 2011.
[10][13]. [3] W. Stallings, Operating Systems: Internals
and Design Principles, 9th ed. Boston, MA,
9. Conclusion USA: Pearson, 2017.
The main aim of this study was to overcome the [4] M. Burgess, Principles of Network and
issues in conventional workstation management System Administration, 2nd ed. Chichester, UK:
such as manual tracking of assets, ineffective Wiley, 2004.
utilization of resources, security exposures, and [5] S. Chandrasekar, "Automated IT Asset
the absence of real-time monitoring mechanisms. Management System for Enterprise
With the adoption of automated asset tracking, Workstations," in Proc. Int. Conf. Computer.
the system provides administrators with real-time Network. Commun, 2021, pp. 183–189.
visibility into hardware and software inventory [6] M. Tim Jones, GNU/Linux Application
and enables effective maintenance, updates, and Programming. Boston, MA, USA: Charles River
security management [3]. The system Media, 2008.
performance analysis shows that the suggested
solution effectively minimizes administrative
IJMSRT25MAY073 www.ijmsrt.com
DOI: https://doi.org/10.5281/zenodo.15505220 340
Volume-3,Issue-5,May2025 International Journal of Modern Science and Research Technology
ISSN NO-2584-2706
IJMSRT25MAY073 www.ijmsrt.com
DOI: https://doi.org/10.5281/zenodo.15505220 341