ADVANTAGE OF PROPOSED SYSTEM
This system ethereal can decode more than 480 protocols.
It runs on over all windows platform combatable to .net.
Its support over 480 protocols and because it is open source,
new ones are contributed very frequently.
It can read capture files from over 20 different products.
It can monitoring and control traffic.
OVERALL DESCRIPTIONMODULE DESCRIPTION
Packets Transmitted and Received
Bytes Transmitted and Received
Utilization Information
IP Address and MAC Address
Assigned User Friendly Names for each Node PACKETS TRANSMITTED
AND RECEIVED
In LAN information are exchanged between nodes and server or
nodes and nodes. Information is exchanged as packets. Each packet
has a definite frame work. The frame work consists of a header
information data bytes and other message specific information like
message end. The transmitting node will send the information to the
receiving node. So that the packet will receive only addressed
machine. In Ethernet LAN technology involves is CSMA (Collision
Sense Multiple Access). Since each node is linked to the LAN. The
packets from each node will be travelling in the same media, namely
UTP cable. In order to make available to an end to end
communication between two machines CSMA technology is used. The
packets must be send by the transmitted nodes must be received by
the receiving machine. If collision occurs it will be sensed by the
nodes as the medium is in used and the packets will send again.
BYTES TRANSMITTED AND RECEIVED
In packet of information there are various information namely
packet header, data and end of message. In this format data is the
actual no of bytes transmitted by the server or node. After receipt
of the packet of information from the Network the receiving machine
will converted into the actual bytes of information. The Network
protocol analyzer will verify the actual bytes of information
transmitted by the transmitting machine and actual number of bytes
received by the receiving machine. This will give the exact measure
of efficiency of the Network in terms of actual usable number of
bytes of information.
UTILIZATION INFORMATION
This software will give a summary report of Network medium
utilized by different nodes in the LAN. This is the very important
in the LAN in nodes to plan Network management activities by the
Network administration
IP ADDRESS AND MAC ADDRESS
Every machine will have on internet protocol address allotted
manually or dynamically. This address is retrieved from the machine
and given by the utility for information. MAC address is the unique
address of the NIC card of the machine this unique address is very
important as far as Network communication is concerned. This
address is taken out from the NIC BIOS and will be displayed by
this software.
ASSIGNED USER FRIENDLY NAMES FOR EACH NODE
In Network the user will assigned a computer name for each node.
This name can be displayed by the Operating system in the
respective machine. This Software taken out the information and
displayed for the user.OPERATING ENVIRONMENT System
Configuration
This project is developed using Microsoft Tools. .Net platforms
are used in this project as front end. Minimum level of hardware is
required to maintain in this project.
HARDWARE CONFIGURATION
Main Processor : Intels Dual PentiumFrequency
: 500 MHzTotal Memory
: 256 MB
Hard disk capacity
: 20 GB
CLIENT CONFIGURATION
Machine Used
: Pentium, AMD
Main Processor
: Intels 80856
Frequency
: 200 MHz
Total Memory
: 128 MB RAM
Hard Disk Capacity
: 40 GB hard disk
Floppy Drive(s)
: 3.5 inch, 1.44 MB Drive
Keyboard
: Compaq 101 keyboard
Mouse
: Compaq Mouse
Monitor Used
: Compaq SVGA
Printers
:Laser Printers(HP LaserJet)
SOFTWARE CONFIGURATIONOperating System : Windows XP, ME,
VistaFront End : VISUAL BASIC 6.0
Network Architecture
: TCP/IP
Documentation
: Microsoft Word.SYSTEM FEATURES System Configuration
This project is developed using Microsoft Tools. Dot Net
platforms are used as front end .Minimum level of hardware is
required to maintain in this project. SYSTEM DESIGN DESIGN PLAN
Output Design
Computer output is the most important and direct source of
information to the user. One important feature of the system for
the user is the output procedures. Efficiency and intelligible
design should improve the system with the user. Without quality of
output, the entire system may appear to be so unnecessary.
Designing computer should proceed in an organized manner. It
should be developed while ensuring that each output element is
designed so that people will easy to use the system effectively.
The term output applies to any information produced by an
information system, whether to be displayed or printed.
The output form of the system is either by screen or by
hardcopies. Output design aims at communicating the results of the
processing to the users. An application is successful only it can
produce efficient and effective outputs. The reports are generated
to suit the needs of the users. The reports have to be generated
with appropriate levels.
Input Design: A major part in the design of the system is the
preparation of the input. Input is necessary for the successful
development and implementation of the system. The input design is
the link that ties the information systems into the process of
converting oriented inputs to computer based formats.
The quality of the inputs determines the quality of the output.
Input specifications describe the manner in which data enter the
system for processing. Inaccurate input is the common cause of
errors in data processing. The input design is the process of
converting user-oriented inputs to a computer-based format. So the
input interface design is the important role in controlling
errors.
This application is being developed in a user-friendly manner.
The forms are being designed in such a way that during the
processing the cursor is placed in the position where the data must
be entered. An option of select an appropriate input from the list
of values. Validations are made for each of every data enters to a
new field so that he/she understandable what is to be entered
whenever the user enters an error data. Error messages are
displayed and the user can move to next field only after entering
the current data.
The input design focus on the following:
Proper validation of the input should be provided
The screen should be user friendly and easy to operate
Avoiding inordinate delay, keeping process simple.
Code Design
The main purpose of performing code design is to simplify the
coding to achieve better coding. The loading is prepared in such a
way that the internal procedures are more meaningful. Validation
manager is displayed for each column.
The loading of the variable is done in such a way that the other
one who has developed the package can understand its purpose.
The main purpose of performing code design is to simplify the
coding to achieve better coding. The loading is prepared in such a
way that the internal procedures are more meaningful. Validation
manager is displayed for each column.
The loading of the variable is done in such a way that the other
one who has developed the package can understand its purpose.
MODULE DESIGN
PACKETS TRANSMITTED AND RECEIVED
Packet sniffers capture "binary" data passing through the
network, most if not all decent sniffers "decode" this data into a
human readable form. To make it even easier (for humans) another
step occurs known as "protocol analysis". There is a varying degree
of the analysis that takes place; some are simple, just breaking
down the "packet" information. Others are more complex giving
"detailed" information about what it sees on the packet (i.e.,
highlights a password for a service).
The information that travels across a network is sent in
"packets." For example, when an email is sent from one computer to
another, it is first broken up into smaller segments. Each segment
has the destination address attached, the source address, and other
information such as the number of packets and reassembly order.
Once they arrive at the destination, the packet's headers and
footers are stripped away, and the packets reconstituted.
Each packet usually contains three parts: 1) a header, which are
the instructions referring to the data within the packet; 2) the
payload or actual data in the packet; 3) the trailer or code
telling the receiving device that it is nearing the end of the
packet. Positive usage of sniffer is also its regular usage, which
aim is to maintain network and system working normally.
a. Capturing packets;
b. Recording and analyzing traffic;
c. Decrypting packets and displaying in clear text;
d. Converting data to readable format;
e. Showing relevant information like IP, protocol, host or
server name and so on.
BYTES TRANSMITTED AND RECEIVED
In packet of information there are various information namely
packet header, data and end of message. In this format data is the
actual no of bytes transmitted by the server or node. After receipt
of the packet of information from the Network the receiving machine
will converted into the actual bytes of information. The Network
protocol analyzer will verify the actual bytes of information
transmitted by the transmitting machine and actual number of bytes
received by the receiving machine. This will give the exact measure
of efficiency of the Network in terms of actual usable number of
bytes of information.
UTILIZATION INFORMATION
This software will give a summary report of Network medium
utilized by different nodes in the LAN. This is the very important
in the LAN in nodes to plan Network management activities by the
Network administration
IP ADDRESS AND MAC ADDRESS
Every machine will have on internet protocol address allotted
manually or dynamically. This address is retrieved from the machine
and given by the utility for information. MAC address is the unique
address of the NIC card of the machine this unique address is very
important as for as Network communication is concerned. This
address is taken out from the NIC BIOS and will be displayed by
this software.
ASSIGNED USER FRIENDLY NAMES FOR EACH NODE
In Network the user will assigned a computer name for each node.
This name can be displayed by the Operating system in the
respective machine. This Software taken out the information and
displayed for the user.
USER INTERFACE DESIGNDFD
DATA FLOW DIAGRAM
A Flowchart is a diagram that uses graphic symbols to depict the
nature and flow of the steps in a process .It allows us to break
any process down into individual events or activities and to
display these in shorthand form showing the logical relationships
between them. Steps in a process are shown with symbolic shapes,
and the flow of the process is indicated with arrows connecting the
symbols. Generally the start point, end points, inputs, outputs,
possible paths and decisions that lead to these possible paths are
included. The commonly used flowchart symbols are listed below:
Computer processing
Directional arrow
Used to show the direction of processing and other
eventsDocument
Used to show any printed document input or output
Connector
Used to connect different entry and/or exit In the flow
chart
LEVEL 0
LEVEL1 LEVEL 2(PROTOCOL ANALYSING)
LEVEL 2(PACKET ANALYSING)LEVEL 2(DOWNLOAD MANAGER)
LEVEL 3(PACKET ANALYSING)
LEVEL 3(PACKET ANALYSING)
LEVEL 3(DOWNLOAD MANAGER)
SYSTEM IMPLEMENTATION Implementation is the stage where
theoretical design has been turned into a working system. The main
aim of this implementation phase is to see whether the output
created and inputs given are according to the users requirements
and specifications. It also involves user training for minimization
resistance to change and giving the system a change to prove its
worth. The successful implementation of the new system depends upon
a involvement of staff working in the department.
The first step done to implement is to install VB .NET with
windows along with the database. After that the user should check
all hardware configurations. After installing the required
application software the user has to check and verify all installed
component. The main aim of this Implementation plan is to see
whether the outputs created and inputs were given according to the
user requirements and specifications that have been established.
This was done in the security department by having the developer as
a secondary person and another employee who conducted the actual
test. Some Suggestion was made while requirement testing was done
that has been incorporated. As there is no need to give any
training to the users. Because they already know their requirements
and those who are using this project also know well about this.
Only a certain introduction and those with little knowledge of
English and computer can easily operate this system. After the
implementation of this project the system manager has to maintain
all its software and hardware. The system manager has to upgrade
the software frequently and whenever using a floppy the system
should be protected using Anti virus Software. UPS and other
electronic components should be connected. And this software also
maintains with login and password protection.
The stage consists of:
1. Testing the developed program with sample data.
2. Detection & correction of errors.
Testing whether the system meets user requirements.
Creating files of the system with the actual data.
Making necessary changes are desired by the user.
Training user personnel.
An implementation design of method is to achieve the changes
over method.
Full object-oriented capabilities
An incredible IDE
Cross-language inheritance
Real VB (or C#, etc) in ASP.NET, not VBScript
Web service tools
One way to do things, no matter what .NET language you are using
FRONT END
A brief history of VB.net
Visual basic.net is one of the languages that are directed
towards meeting the objectives of the .net initiative of creating
distributed application. Visual basic .net is a powerful
object-oriented language that provides feature such as abstraction,
encapsulation, inheritance and polymorphism. In addition it
provides many other features that did not exist in the earlier
version, such as multi inheritance and structured exception
handling.
FEATURES OF VISUAL BASIC .NET
Some of the key features introduced in visual basic .net are as
follows:-
1. Inheritance: it is the ability of a class to derive its
characteristics from an existing class. Visual basic .net provides
the inherits key word to implement in habitants.
2. Constructors and destructors: a constructor is a special type
of method that is invoked when you create new instants of a class.
A destructor releases the resources used by an object.
3. Overloading: overloading enables methods to be defined with
the same name but different parameters.
4. Overriding: overriding is the capability of a derived class
to override the characteristics of parent class .
5. Structure exception handling: visual basic .net supports
structured exception handling that consists of protected blocks of
codes and filters for the possible exception that can be raised by
the program.
6. Multithreading: visual basic .net provides full support for
creating multithread applications. Multithreading enables an
application to contain one or more threads that can share work load
in an application by executing one at a time.
SYSTEM TESTING System testing is the most vital that has to be
enforced in any system development cycle. This could be done as
parallel activity along with the system development or during
system implementation .The feed back received during this testing
should be carefully examined for further enhancement made to the
system.
The system was tested with sample data and adequate corrections
were made as per the requirements .Enough validation check and
error message are provided such as the user data entry errors are
minimized.
System testing is the process and tools used to test coded
software before it is released to the public. Software testing is a
critical component of the software development cycle. Without
software testing, consumers would not get stable software releases.
Software testing is a process used to help identify the
correctness, completeness and quality of developed computer
software. With that in mind, software testing can never completely
establish the correctness of arbitrary computer software. There are
many approaches to software testing, but effective testing of
complex products is essentially a process of investigation, not
merely a matter of creating and following rote procedure. One
definition of software testing is "the process of questioning a
software product in order to evaluate it", where the "questions"
are things the tester tries to do with the product, and the product
answers with its behavior in reaction to the probing of the tester.
Although most of the intellectual processes of software testing are
nearly identical to that of review or inspection, the word software
testing is connoted to mean the dynamic analysis of the software
product putting the software through its paces. We have conducted a
different types of testing.
System Testing
Intended to test the system as a whole rather than individual
system components
Integration testing
As the system is integrated, it is tested by the system
developer for specification compliance
Stress testing
The behavior of the system is tested under conditions of
load
Acceptance testing
The system is tested by the customer to check if it conforms to
the terms of the development contractUNIT TESTING
Unit resting focuses verification efforts on the smallest unit
of software design .this is also known as Module Testing. In pay
fixation the module tested separately. This testing is carried out
during programming stage itself .In this testing step each module
is focused to be working satisfactorily as regard to the expected
output from the module.
In PAYFIXATION we checked first with a sample data and are found
to be success.
The program is constructed and tested in small segment, where
errors are easier to isolate and correct. In this package, the
interfaces are more likely to be tested completely and also a
systematic approach I applied. All the modules are combined in
advices and entire program is tested as a whole.INTEGRATING
SYSTEM
The program is constructed and tested in small segment, where
errors are easier to isolate and correct. In this package, the
interfaces are more likely to be tested completely and also a
systematic approach I applied. All the modules are combined in
advices and entire program is tested as a whole. Concerned with
testing the system as it is integrated from its components
Integration testing is normally the most expensive activity in
the systems integration process
Should focus on
Interface testing where the interactions between sub-systems and
components are tested
Property testing where system properties such as reliability,
performance and usability are tested
Regression Testing
Regression testing is an important component of incremental
testing. When a new increment is added to the system, the tests
which have been run on the previous increment are run again
If these tests do not produce the same outputs as before, this
implies that the new increment has, in some way, interfered with
the functionality of the existing system
Interface Testing
Probably the most common problem which arises during system
integration is interface problems where sub-systems and components
do not interact as anticipated by their developers
These may not be detectable during earlier testing phases
because of interface misunderstandings or because they are a
consequence of the way in which the interface is used
Security Testing
Security testing is concerned with checking that the system and
its data are protected from accidental or malicious damage
Unlike other types of testing, this cannot really be tested by
planning system tests. The system must be secure against
unanticipated as well as anticipated attacks
Security testing may be carried out by inviting people to try to
penetrate the system through security loopholesVALIDATION
TESTING
At the end of user testing, software is completely assembled as
a package, interfacing errors have now being uncovered and
correcting test begins. Software testing and validation are
achieved through a serious black box tests that demonstrate
conformity with the requirement.OUTPUT TESTING
Next step is output testing of the proposed system. Since no
system could be useful if it does not produces the required output
in the specific format. The outputs are displayed by the system
under consideration and are tested by asking the user about the
format of the screen, as the format was designed in the system
design phase according to the needs. Hence output testing does not
result in any correction in the system.USER ACCEPTANCE TESTING
Acceptance testing involves planning and execution of functional
tests ,performance test, and stress tests to verify that the
implemented system satisfies its requirements. Acceptance tests are
typically performed by quality assurance and/or customer
organizations.
Functional and performance tests are performed to determine the
limitations of the system. Typically , acceptance typically,
acceptance test will incorporate test cases developed during unit
testing and integration testing. Additional test cases are added to
achieve desired level of functional , performance, and stress
testing of the entire system. Tools of Special importance during
acceptance testing include a test Coverage analyzer, a timing
analyzer, and a coding standards checker. A test coverage analyzer
records the control paths followed for each test case. Timing
analyzer reports the time spent in various regions of the source
code and different test cases.
A plan outlines the classes of tests to be conducted and test
procedure defines specific cases that will be used to demonstrate
conformity with requirements. Both the plan and the procedure are
designed to ensure that all functional requirements are achieved,
documentation is correct and other requirements are met. After the
validation test, one of the conditions exist.
They are,
The function or performance characteristics confirm to
specification and are accepted. A deviation from the specification
is uncovered and a deficiency list is created. The deviation or
error discovered at this stage in a project can rarely be corrected
prior to scheduled completion. It is necessary to negotiate with
the customer to establish methodsFUTURE ENHANCEMANT Internet based
protocol analyzing system can be done.
Automatic network alert system to the system and network
administrator can be done.BIBLIOGRAHY
* Visual basic 6.0 from the Ground Up
By
Gray Cornell
* Visual basic 6.0 Complete Reference
By
BPB Publication
* Visual basic 6.0 The Complete Reference
By
Noel Jerke , Tata Mcgraw Hill
* Principle of Data Base system
By
Jeffrey D.Ullman
* Database system Concepts
By
Silberschatz, Korth and Sudharsan, Tata McGraw Hill