Top Banner
NETWORK MONITORING SYSTEM Presented by:- Abhishek 1SS05CS004 Manish Kr Shashi 1SS05CS051 Rohit Kumar 1SS05CS088 Soumo Broto Gangoli 1SS05CS109
23

Network Monitoring System

Nov 16, 2014

Download

Documents

abhichoudhary87
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Network Monitoring System

NETWORK MONITORING SYSTEM

Presented by:-

Abhishek 1SS05CS004

Manish Kr Shashi 1SS05CS051

Rohit Kumar 1SS05CS088

Soumo Broto Gangoli 1SS05CS109

Page 2: Network Monitoring System

Contents:

• Introduction

• What is network monitoring system?

• Why is it required?

• Requirements

• Project development

• Server side

• Client side

• Snapshots

• Conclusion

• Future Enhancements

Page 3: Network Monitoring System

Introduction

Network Monitoring:-

• Network monitoring is spying for a good cause.

• The administrator keeps watch on the peers through a dedicated

system called server.

• The administrator has special privileges through which he can

terminate any process of any client computer.

Page 4: Network Monitoring System

What is Network Monitoring System?

• A Network Monitoring System is a software that prevents unauthorized

access or work done by a client system connected to the network.

• The server accepts connection from the clients connected to it.

• It constantly monitors its peers and prevents the users from unauthorized

browsing, downloading and illicit access.

Page 5: Network Monitoring System

Why is it required?

• This software is required to prevent unauthorized access of files

and data on a company or organizations’ LAN

• Also it can be used to prevent access of unwanted sites on the

internet.

• It can also be used to secure company’s data.

Page 6: Network Monitoring System

Requirements

Software requirements:

• Windows 2000 and above operating system

• VB .net as the front end and Visual Basic as the back end

• Microsoft Visual studio 2008

Database Server configuration:

• Microsoft SQL Server 2005

Page 7: Network Monitoring System

Requirements (contd)

Hardware requirements:

• Pentium III onwards computer processor

• 2.0 GHz processor

• 10 GB or higher hard disk

• 256 MB or above RAM

• 32 bit interface card

Page 8: Network Monitoring System

Project development

• VB.Net is used to develop this project.

•There are two parts – Server and Client

•The server is the administrator who monitors all the clients in the network.

•The administrator has a unique id and password through which he logs on.

• A client also has a username-password to connect to the network.

• Facility is also provided to register new users.

•The administrator can see all the client information.

• Mysql database is used to maintain the record of client and server database.

•The server is password protected and prevents unauthorized access.

Page 9: Network Monitoring System

Server side

• The server is a system that manages the resource used by the client connected to the network.

• The clients log on to the system using the password from the server.

• The server can constantly monitor the client systems connected to it.

• If the administrator find out any unauthorized access, he can terminate the process from his system.

• All the client details are stored in the database that can be only accessed by the administrator.

Page 10: Network Monitoring System

Client side

• All the clients are connected to the server through LAN.

• The clients have to take the password from the server to connect to the network.

• If the peer system tries to run a process which is not allowed by the server, it can be terminated by the server

• Facility is also provided for the new users to register with the administrator.

Page 11: Network Monitoring System

Snapshots

Fig:- The administrator login menu

Page 12: Network Monitoring System

Snapshots ( continued)

Page 13: Network Monitoring System

Snapshots ( continued)

Fig:- The control panel

Page 14: Network Monitoring System

Snapshots ( continued)

Fig:- Third party software used

Page 15: Network Monitoring System

Snapshots ( continued)

Fig:- The database

Page 16: Network Monitoring System

Snapshots ( continued)

Page 17: Network Monitoring System

Snapshots ( continued)

Page 18: Network Monitoring System

Snapshots ( continued)

Page 19: Network Monitoring System

Snapshots ( continued)

Page 20: Network Monitoring System

Snapshots ( continued)

Page 21: Network Monitoring System

Conclusion

• The software can be used on a LAN as well as WAN.

• It can be also applied on a small network such as our college.

Page 22: Network Monitoring System

Future Enhancements

• It can be modified to be used on a wide network.

• Security can be enhanced by creating a stronger database.

• The privileges given to the administrator can be reduced.

Page 23: Network Monitoring System