49
ADVANTAGE OF PROPOSED SYSTEM This system ethereal can decode more than 480 protocols. It runs on over all windows platform combatable to .net. Its support over 480 protocols and because it is open source, new ones are contributed very frequently. It can read capture files from over 20 different products. It can monitoring and control traffic. OVERALL DESCRIPTION

Doc2NEW

Embed Size (px)

Citation preview

ADVANTAGE OF PROPOSED SYSTEM

This system ethereal can decode more than 480 protocols.

It runs on over all windows platform combatable to .net.

Its support over 480 protocols and because it is open source, new ones are contributed very frequently.

It can read capture files from over 20 different products.

It can monitoring and control traffic.

OVERALL DESCRIPTIONMODULE DESCRIPTION

Packets Transmitted and Received

Bytes Transmitted and Received

Utilization Information

IP Address and MAC Address

Assigned User Friendly Names for each Node PACKETS TRANSMITTED AND RECEIVED

In LAN information are exchanged between nodes and server or nodes and nodes. Information is exchanged as packets. Each packet has a definite frame work. The frame work consists of a header information data bytes and other message specific information like message end. The transmitting node will send the information to the receiving node. So that the packet will receive only addressed machine. In Ethernet LAN technology involves is CSMA (Collision Sense Multiple Access). Since each node is linked to the LAN. The packets from each node will be travelling in the same media, namely UTP cable. In order to make available to an end to end communication between two machines CSMA technology is used. The packets must be send by the transmitted nodes must be received by the receiving machine. If collision occurs it will be sensed by the nodes as the medium is in used and the packets will send again.

BYTES TRANSMITTED AND RECEIVED

In packet of information there are various information namely packet header, data and end of message. In this format data is the actual no of bytes transmitted by the server or node. After receipt of the packet of information from the Network the receiving machine will converted into the actual bytes of information. The Network protocol analyzer will verify the actual bytes of information transmitted by the transmitting machine and actual number of bytes received by the receiving machine. This will give the exact measure of efficiency of the Network in terms of actual usable number of bytes of information.

UTILIZATION INFORMATION

This software will give a summary report of Network medium utilized by different nodes in the LAN. This is the very important in the LAN in nodes to plan Network management activities by the Network administration

IP ADDRESS AND MAC ADDRESS

Every machine will have on internet protocol address allotted manually or dynamically. This address is retrieved from the machine and given by the utility for information. MAC address is the unique address of the NIC card of the machine this unique address is very important as far as Network communication is concerned. This address is taken out from the NIC BIOS and will be displayed by this software.

ASSIGNED USER FRIENDLY NAMES FOR EACH NODE

In Network the user will assigned a computer name for each node. This name can be displayed by the Operating system in the respective machine. This Software taken out the information and displayed for the user.OPERATING ENVIRONMENT System Configuration

This project is developed using Microsoft Tools. .Net platforms are used in this project as front end. Minimum level of hardware is required to maintain in this project.

HARDWARE CONFIGURATION

Main Processor : Intels Dual PentiumFrequency

: 500 MHzTotal Memory

: 256 MB

Hard disk capacity

: 20 GB

CLIENT CONFIGURATION

Machine Used

: Pentium, AMD

Main Processor

: Intels 80856

Frequency

: 200 MHz

Total Memory

: 128 MB RAM

Hard Disk Capacity

: 40 GB hard disk

Floppy Drive(s)

: 3.5 inch, 1.44 MB Drive

Keyboard

: Compaq 101 keyboard

Mouse

: Compaq Mouse

Monitor Used

: Compaq SVGA

Printers

:Laser Printers(HP LaserJet)

SOFTWARE CONFIGURATIONOperating System : Windows XP, ME, VistaFront End : VISUAL BASIC 6.0

Network Architecture

: TCP/IP

Documentation

: Microsoft Word.SYSTEM FEATURES System Configuration

This project is developed using Microsoft Tools. Dot Net platforms are used as front end .Minimum level of hardware is required to maintain in this project. SYSTEM DESIGN DESIGN PLAN

Output Design

Computer output is the most important and direct source of information to the user. One important feature of the system for the user is the output procedures. Efficiency and intelligible design should improve the system with the user. Without quality of output, the entire system may appear to be so unnecessary.

Designing computer should proceed in an organized manner. It should be developed while ensuring that each output element is designed so that people will easy to use the system effectively. The term output applies to any information produced by an information system, whether to be displayed or printed.

The output form of the system is either by screen or by hardcopies. Output design aims at communicating the results of the processing to the users. An application is successful only it can produce efficient and effective outputs. The reports are generated to suit the needs of the users. The reports have to be generated with appropriate levels.

Input Design: A major part in the design of the system is the preparation of the input. Input is necessary for the successful development and implementation of the system. The input design is the link that ties the information systems into the process of converting oriented inputs to computer based formats.

The quality of the inputs determines the quality of the output. Input specifications describe the manner in which data enter the system for processing. Inaccurate input is the common cause of errors in data processing. The input design is the process of converting user-oriented inputs to a computer-based format. So the input interface design is the important role in controlling errors.

This application is being developed in a user-friendly manner. The forms are being designed in such a way that during the processing the cursor is placed in the position where the data must be entered. An option of select an appropriate input from the list of values. Validations are made for each of every data enters to a new field so that he/she understandable what is to be entered whenever the user enters an error data. Error messages are displayed and the user can move to next field only after entering the current data.

The input design focus on the following:

Proper validation of the input should be provided

The screen should be user friendly and easy to operate

Avoiding inordinate delay, keeping process simple.

Code Design

The main purpose of performing code design is to simplify the coding to achieve better coding. The loading is prepared in such a way that the internal procedures are more meaningful. Validation manager is displayed for each column.

The loading of the variable is done in such a way that the other one who has developed the package can understand its purpose.

The main purpose of performing code design is to simplify the coding to achieve better coding. The loading is prepared in such a way that the internal procedures are more meaningful. Validation manager is displayed for each column.

The loading of the variable is done in such a way that the other one who has developed the package can understand its purpose.

MODULE DESIGN

PACKETS TRANSMITTED AND RECEIVED

Packet sniffers capture "binary" data passing through the network, most if not all decent sniffers "decode" this data into a human readable form. To make it even easier (for humans) another step occurs known as "protocol analysis". There is a varying degree of the analysis that takes place; some are simple, just breaking down the "packet" information. Others are more complex giving "detailed" information about what it sees on the packet (i.e., highlights a password for a service).

The information that travels across a network is sent in "packets." For example, when an email is sent from one computer to another, it is first broken up into smaller segments. Each segment has the destination address attached, the source address, and other information such as the number of packets and reassembly order. Once they arrive at the destination, the packet's headers and footers are stripped away, and the packets reconstituted.

Each packet usually contains three parts: 1) a header, which are the instructions referring to the data within the packet; 2) the payload or actual data in the packet; 3) the trailer or code telling the receiving device that it is nearing the end of the packet. Positive usage of sniffer is also its regular usage, which aim is to maintain network and system working normally.

a. Capturing packets;

b. Recording and analyzing traffic;

c. Decrypting packets and displaying in clear text;

d. Converting data to readable format;

e. Showing relevant information like IP, protocol, host or server name and so on.

BYTES TRANSMITTED AND RECEIVED

In packet of information there are various information namely packet header, data and end of message. In this format data is the actual no of bytes transmitted by the server or node. After receipt of the packet of information from the Network the receiving machine will converted into the actual bytes of information. The Network protocol analyzer will verify the actual bytes of information transmitted by the transmitting machine and actual number of bytes received by the receiving machine. This will give the exact measure of efficiency of the Network in terms of actual usable number of bytes of information.

UTILIZATION INFORMATION

This software will give a summary report of Network medium utilized by different nodes in the LAN. This is the very important in the LAN in nodes to plan Network management activities by the Network administration

IP ADDRESS AND MAC ADDRESS

Every machine will have on internet protocol address allotted manually or dynamically. This address is retrieved from the machine and given by the utility for information. MAC address is the unique address of the NIC card of the machine this unique address is very important as for as Network communication is concerned. This address is taken out from the NIC BIOS and will be displayed by this software.

ASSIGNED USER FRIENDLY NAMES FOR EACH NODE

In Network the user will assigned a computer name for each node. This name can be displayed by the Operating system in the respective machine. This Software taken out the information and displayed for the user.

USER INTERFACE DESIGNDFD

DATA FLOW DIAGRAM

A Flowchart is a diagram that uses graphic symbols to depict the nature and flow of the steps in a process .It allows us to break any process down into individual events or activities and to display these in shorthand form showing the logical relationships between them. Steps in a process are shown with symbolic shapes, and the flow of the process is indicated with arrows connecting the symbols. Generally the start point, end points, inputs, outputs, possible paths and decisions that lead to these possible paths are included. The commonly used flowchart symbols are listed below:

Computer processing

Directional arrow

Used to show the direction of processing and other eventsDocument

Used to show any printed document input or output

Connector

Used to connect different entry and/or exit In the flow chart

LEVEL 0

LEVEL1 LEVEL 2(PROTOCOL ANALYSING)

LEVEL 2(PACKET ANALYSING)LEVEL 2(DOWNLOAD MANAGER)

LEVEL 3(PACKET ANALYSING)

LEVEL 3(PACKET ANALYSING)

LEVEL 3(DOWNLOAD MANAGER)

SYSTEM IMPLEMENTATION Implementation is the stage where theoretical design has been turned into a working system. The main aim of this implementation phase is to see whether the output created and inputs given are according to the users requirements and specifications. It also involves user training for minimization resistance to change and giving the system a change to prove its worth. The successful implementation of the new system depends upon a involvement of staff working in the department.

The first step done to implement is to install VB .NET with windows along with the database. After that the user should check all hardware configurations. After installing the required application software the user has to check and verify all installed component. The main aim of this Implementation plan is to see whether the outputs created and inputs were given according to the user requirements and specifications that have been established. This was done in the security department by having the developer as a secondary person and another employee who conducted the actual test. Some Suggestion was made while requirement testing was done that has been incorporated. As there is no need to give any training to the users. Because they already know their requirements and those who are using this project also know well about this. Only a certain introduction and those with little knowledge of English and computer can easily operate this system. After the implementation of this project the system manager has to maintain all its software and hardware. The system manager has to upgrade the software frequently and whenever using a floppy the system should be protected using Anti virus Software. UPS and other electronic components should be connected. And this software also maintains with login and password protection.

The stage consists of:

1. Testing the developed program with sample data.

2. Detection & correction of errors.

Testing whether the system meets user requirements.

Creating files of the system with the actual data.

Making necessary changes are desired by the user.

Training user personnel.

An implementation design of method is to achieve the changes over method.

Full object-oriented capabilities

An incredible IDE

Cross-language inheritance

Real VB (or C#, etc) in ASP.NET, not VBScript

Web service tools

One way to do things, no matter what .NET language you are using FRONT END

A brief history of VB.net

Visual basic.net is one of the languages that are directed towards meeting the objectives of the .net initiative of creating distributed application. Visual basic .net is a powerful object-oriented language that provides feature such as abstraction, encapsulation, inheritance and polymorphism. In addition it provides many other features that did not exist in the earlier version, such as multi inheritance and structured exception handling.

FEATURES OF VISUAL BASIC .NET

Some of the key features introduced in visual basic .net are as follows:-

1. Inheritance: it is the ability of a class to derive its characteristics from an existing class. Visual basic .net provides the inherits key word to implement in habitants.

2. Constructors and destructors: a constructor is a special type of method that is invoked when you create new instants of a class. A destructor releases the resources used by an object.

3. Overloading: overloading enables methods to be defined with the same name but different parameters.

4. Overriding: overriding is the capability of a derived class to override the characteristics of parent class .

5. Structure exception handling: visual basic .net supports structured exception handling that consists of protected blocks of codes and filters for the possible exception that can be raised by the program.

6. Multithreading: visual basic .net provides full support for creating multithread applications. Multithreading enables an application to contain one or more threads that can share work load in an application by executing one at a time.

SYSTEM TESTING System testing is the most vital that has to be enforced in any system development cycle. This could be done as parallel activity along with the system development or during system implementation .The feed back received during this testing should be carefully examined for further enhancement made to the system.

The system was tested with sample data and adequate corrections were made as per the requirements .Enough validation check and error message are provided such as the user data entry errors are minimized.

System testing is the process and tools used to test coded software before it is released to the public. Software testing is a critical component of the software development cycle. Without software testing, consumers would not get stable software releases. Software testing is a process used to help identify the correctness, completeness and quality of developed computer software. With that in mind, software testing can never completely establish the correctness of arbitrary computer software. There are many approaches to software testing, but effective testing of complex products is essentially a process of investigation, not merely a matter of creating and following rote procedure. One definition of software testing is "the process of questioning a software product in order to evaluate it", where the "questions" are things the tester tries to do with the product, and the product answers with its behavior in reaction to the probing of the tester. Although most of the intellectual processes of software testing are nearly identical to that of review or inspection, the word software testing is connoted to mean the dynamic analysis of the software product putting the software through its paces. We have conducted a different types of testing.

System Testing

Intended to test the system as a whole rather than individual system components

Integration testing

As the system is integrated, it is tested by the system developer for specification compliance

Stress testing

The behavior of the system is tested under conditions of load

Acceptance testing

The system is tested by the customer to check if it conforms to the terms of the development contractUNIT TESTING

Unit resting focuses verification efforts on the smallest unit of software design .this is also known as Module Testing. In pay fixation the module tested separately. This testing is carried out during programming stage itself .In this testing step each module is focused to be working satisfactorily as regard to the expected output from the module.

In PAYFIXATION we checked first with a sample data and are found to be success.

The program is constructed and tested in small segment, where errors are easier to isolate and correct. In this package, the interfaces are more likely to be tested completely and also a systematic approach I applied. All the modules are combined in advices and entire program is tested as a whole.INTEGRATING SYSTEM

The program is constructed and tested in small segment, where errors are easier to isolate and correct. In this package, the interfaces are more likely to be tested completely and also a systematic approach I applied. All the modules are combined in advices and entire program is tested as a whole. Concerned with testing the system as it is integrated from its components

Integration testing is normally the most expensive activity in the systems integration process

Should focus on

Interface testing where the interactions between sub-systems and components are tested

Property testing where system properties such as reliability, performance and usability are tested

Regression Testing

Regression testing is an important component of incremental testing. When a new increment is added to the system, the tests which have been run on the previous increment are run again

If these tests do not produce the same outputs as before, this implies that the new increment has, in some way, interfered with the functionality of the existing system

Interface Testing

Probably the most common problem which arises during system integration is interface problems where sub-systems and components do not interact as anticipated by their developers

These may not be detectable during earlier testing phases because of interface misunderstandings or because they are a consequence of the way in which the interface is used

Security Testing

Security testing is concerned with checking that the system and its data are protected from accidental or malicious damage

Unlike other types of testing, this cannot really be tested by planning system tests. The system must be secure against unanticipated as well as anticipated attacks

Security testing may be carried out by inviting people to try to penetrate the system through security loopholesVALIDATION TESTING

At the end of user testing, software is completely assembled as a package, interfacing errors have now being uncovered and correcting test begins. Software testing and validation are achieved through a serious black box tests that demonstrate conformity with the requirement.OUTPUT TESTING

Next step is output testing of the proposed system. Since no system could be useful if it does not produces the required output in the specific format. The outputs are displayed by the system under consideration and are tested by asking the user about the format of the screen, as the format was designed in the system design phase according to the needs. Hence output testing does not result in any correction in the system.USER ACCEPTANCE TESTING

Acceptance testing involves planning and execution of functional tests ,performance test, and stress tests to verify that the implemented system satisfies its requirements. Acceptance tests are typically performed by quality assurance and/or customer organizations.

Functional and performance tests are performed to determine the limitations of the system. Typically , acceptance typically, acceptance test will incorporate test cases developed during unit testing and integration testing. Additional test cases are added to achieve desired level of functional , performance, and stress testing of the entire system. Tools of Special importance during acceptance testing include a test Coverage analyzer, a timing analyzer, and a coding standards checker. A test coverage analyzer records the control paths followed for each test case. Timing analyzer reports the time spent in various regions of the source code and different test cases.

A plan outlines the classes of tests to be conducted and test procedure defines specific cases that will be used to demonstrate conformity with requirements. Both the plan and the procedure are designed to ensure that all functional requirements are achieved, documentation is correct and other requirements are met. After the validation test, one of the conditions exist.

They are,

The function or performance characteristics confirm to specification and are accepted. A deviation from the specification is uncovered and a deficiency list is created. The deviation or error discovered at this stage in a project can rarely be corrected prior to scheduled completion. It is necessary to negotiate with the customer to establish methodsFUTURE ENHANCEMANT Internet based protocol analyzing system can be done.

Automatic network alert system to the system and network administrator can be done.BIBLIOGRAHY

* Visual basic 6.0 from the Ground Up

By

Gray Cornell

* Visual basic 6.0 Complete Reference

By

BPB Publication

* Visual basic 6.0 The Complete Reference

By

Noel Jerke , Tata Mcgraw Hill

* Principle of Data Base system

By

Jeffrey D.Ullman

* Database system Concepts

By

Silberschatz, Korth and Sudharsan, Tata McGraw Hill