Subscribe Us

Abstract - Network Monitoring System






NETWORK MONITORING SYSTEM


Literature Survey

u A. Basic terminology

Network monitoring tool

Network monitoring tool is the networking tool that is used to examine usage of local area network and provide a statistical data of uploads and downloads in a network. Monitoring tool is usually used to monitor I/P traffic between the LAN and the internet. It is a network diagnostic system that is used to monitor local area network and provide a statistical display of the same. The data can be further used to improve the network efficiency. Other problems such as locating the down server, receiving incorrect work request etc can also be removed.

 

Ø Simple network management protocol

Simple network management protocol (SNMP) is based on agent/manager model. The model consists of an agent, a manager, a database containing information about the management and the network protocols. In SNMP the administrative computer which is more commonly called as manager has the task of monitoring and managing a group of systems in a network. The systems that are managed by the manager have a continuous program running known as agent, which reports the information to the manager via SNMP. Devices such as Routers, printers, servers etc use SNMP.  

WinPcap

u It is a freeware which is used for direct network access under windows.

WinPcap provides architecture for network analyses and packet capturing for win32 platform.

WinPcap can facilitate:

u Raw packet capturing

u Filtering the packets according to the set of rules defined by the user.

u To gather statistical data related to network traffic.

 

B. Why do we need it??

u Network Traffic Monitoring (NTM) is a network analytic tool that observes local area network usage and provides a statistical display of uploads and downloads in a network. The network display monitor displays following information:

u • Source address of the system that sends frame to the network.

u • The protocol that was used to send the frame.

u • Destination address of the system where the frame will be received.

u • Data of the message that is sent.

u Capturing is the process by which a network monitor collects the information.

All the information is stored by default in capture buffer. Also, one can apply restrictions on the information to be captured by the system and the data to be displayed on the monitor. 

u The network monitoring tool is essential to keep the track of the packets that are entering and leaving the system. NMT can provide an statistical data of the network traffic and thus improvements can be made on the system.  

C. Current research and progress

u Microsoft is currently empowering a project to build a network monitoring tool to achieve “State of art”. By introducing this system one can improve network efficiency and monitor the same more efficiently.

u Moreover researches are adopting various techniques, such as use of an

Active measurement system in which a probe traffic is injected into the network and then monitor the performance of the system from the performance of the injected packets.

 

PROBLEM DEFINITION

v PREVIOUS NETWORK MONITORING TOOLS ARE NOT USER FRIENDLY.

v THE SECURITY WAS NOT THE PRIMARY OBJECTIVE.

v RESTORAL CAPABILITIES WERE NOT A BIG ISSUE.

v TRAFFIC REROUTING WAS NOT A PROMINENT FEATURE IN THEIR  INVENTORY. 

 

SYSTEM DESIGN:

u What is it??

System design describes the requirements that are needed by our system. It also emphasis on the operating requirement and the system and its sub system’s architecture. The input/output layout, interphases, detailed design, and processing logic are also covered.

 

Our implementation

We have used UML diagrams to describe operations and functions or our system including its structural and behavioural view  

Use Case Diagram

1) Actors:

• Network: It represents a collection of machines connected to the host machine

and passes the packets from one machine to another.

• NPM Tool: it takes packets from the network, analyzes them and monitors the

network.

• System owner: System owner is the client accessing services from the server.

 

2) Use Cases:

• IP Packets: All the IP packets in the network come to NPM for analyses.

• Alert system: Alerts the system owner if a anomaly is detected.

• Log file: Keep track of the IP address and name of the machine which is stored in

the database.

• Anomaly detection: Detects if there is any deviation from the specified rules.

• Monitors network

• Calculates Bandwidth

• Provides GUI

TOOLS/PROTOCOLS Required

WinPcap

u WinPcap is a free, public system for direct network access under Windows.

WinPcap is an architecture for packet capture and network analysis for the

Win32 platforms.

u The purpose of WinPcap

v Capture raw packets

v Filter the packets according to user-specified rules before dispatching them to

the application

v Transmit raw packets to the network

v Gather statistical values on the network traffic

 

SNMP

u SNMP is based on the manager/agent model consisting of a manager, an agent, a database of management information, managed objects and the network protocol. The manager provides the interface between the human network manager and the management system. The agent provides the interface between the manager and the physical device(s) being managed

u The manager and agent use a Management Information Base (MIB) and a

relatively small set of commands to exchange information.

u SNMP uses five basic messages

v GET

v GET-NEXT

v GET-RESPONSE

v SET

v TRAP

TRAFFIC MONITORING

Main feature of our project is monitoring traffic in the network

Network traffic analyzer

The port numbers are used to identify the application layer

protocols (HTTP,FTP,DNS etc.)

Protocol analyzer

This monitors the protocol used by each system and thus enables to

calculate bandwidth usage.

Bandwidth monitor

Bandwidth is calculated by monitoring the number of packets traverse.

Size of each packet *Number of packets=Value of bandwidth

 

TESTING

Unit Testing

u We did unit testing on our various sub units of the program.

u The function pcap_findalldevs() was tested for the various networks that can

be opened.

u The function Pcap_open_live() was tested to check the working which was to

open the live capture function.

u Pcap_setfilter() was tested to check the association of the filter to a capture.

Integration Testing

u The integration testing produced errors as Unit testing was not a success.

System Testing

u The system testing will be done once we get favorable outcomes from the

Integration testing.

Comparison Testing

u The comparison testing will be done and the output of the software will be

tested with the software which is available in the market.

 

Future Enhancement

Project can be further enhanced to

u Fault management

u Alerts and threshold

u Windows event log monitoring

u Traffic management

u Network Security

u Network scheduling



Share:

Abstract of LAN chat application (using Java)

 







ABSTRACT

 

LAN chat application is one of easiest way to chat with a your friends through LAN. No internet connection is needed. The only thing which requires is server IP address and you will be able to connect to others members through LAN . It can help you to talk to your friends even you both do not have internet connection. As it is based on LAN. LAN i.e.  local area network which connect different client to each other and also client to main server. So we have used the same concept here we are connecting two client or client and server with each other and by providing the IP address we can talk with each other.

 

On the other hand file sharing application  is also implemented where a user can upload a file or download a file. We are providing the path to the directory where we have stored our file to the user who wants to download particular file.

 


 

INTRODUCTION

The growth of the Internet has led to new and faster forms of communication. There are now programs that allow users to communicate in real-time with one or more people. These instant messaging tools are commonly referred to as IRC (Internet Relay Chat). Some of these programs can be downloaded for free.

LAN chat is one the same way can be used to talk to your friend in your circle .All you have to do is to provide his IP address and then you both will get connect to each other and then you can talk.It is helpful because if you have any problem while solving something you do not have  to go to his room and to meet him and  you can talk to him on chat if you both are connected to each other and can get solution of your problem .Chat application is one of the most useful software which is used by every business to communicate with his employers if he is out of station.

File sharing  on the other hand is good tool to share those file which your friend wants from you or any other file which can be useful for other. The user can see this file after login to system and can download this file .It is one of the easiest way as it doesn’t require much knowledge for sharing and downloading.

OVEVIEW

The LAN  chat application which we have implemented contain following things :-

1.     LOGIN

2.     CHAT

3.     JOIN CHAT ROOM

4.     UPLOAD FILE

5.     DOWNLOAD FILE

LOGIN   :

 

 

·        In computer security, a login or logon is the process by which individual access to a computer system is controlled by identification of the user using credentials provided by the user.

·        A user can log in to a system to obtain access and can then log out or log  off (perform a logout / logoff) when the access is no longer needed.

·        To log out is to close off one's access to a computer system after having previously logged in.

·        The registered user  needs to provide his username and password to authenticate his account.

·        After successful  login user will allow to chat and upload and download file .

 

THERE ARE TWO MODULES IN IT:-

      1.ADMIN LOGIN

      2.USER LOGIN

 

ADMIN MODULE :-

1.Add new user :: Admin can add a new user.Whether to allow any one to create a account or not depends on user to this chat application .

 

2.View user :Admin has got the right to check the personal details of the user .He can see all user details .

 

3.Delete user :Admin can also delete user who is abusing  other member and who is not following the rules .

 

4.Update chatroom: Admin can update chat room  and can also limit a chat room a  fixed number if he finds that there is too much crowd in chat room .

 

5.Delete files:If admin finds that particular file is bad or containing  virus that he can delete that file.

 

 

USER MODULE

1.Profile update : User can update the information given by him such as name and about me .he can change it as many times as he want to there is no restriction in it.

 

2.Chat room : User can join any chat room he wish to join  and there is no restriction in it.

3.File upload : User can upload file from the client Machine to server machine.

4.File download User can download file from the server Machine to client machine.

 

 

CHAT

 

After logged in user is allowed to chat with each other in a group or in private. This help user to get any information or solution of their problem  and also to share his knowledge with others.

 

You can also connect with your friends only if you want to talk to him privately .

 

Same is in case of file sharing a user can download and upload file easily by just clicking the file .This is very easy process and any one can easily upload and download file.

 

JOIN CHAT ROOM

In this you can connect to particular room which is currently running or have at least 1 user in it .This type of room are made to share particular information. You can join any chat room if room is available and can talk to other people who are logged in right now .

 

UPLOAD FILE

This will help you to upload a particular file from your computer to a server which other can easily download.To upload a file a user must be logged in only then he can upload a file .A file should not be bad other wise admin has the right to delete it .

DOWNLOAD FILE

In this a user can download a particular file he wants to. For this a user just have to log in and then go to path where all files are available and then he has to click on that file and it will prompt a message to save a file to particular location and in this way you can download and save a file.

 

 


 

 

TECHNOLOGIES USED

 

Front end as: Eclipse helios

Back end as:  Mysql

Database:  Mysql

Querying language:   Sql

Forms: Jsp , Java servlet

External library  :  Apache common.fileupload , Apache.commons.io

 

REQUIREMENTS

 

System Requirements:

Operating System: Microsoft® Windows® XP/Vista/window7/linux

Processor: 1 Ghz

Memory: 512 MB RAM

Hard Disk Space: 45 MB Available HDD Space

Video Card: 3D graphics accelerator equivalent to GF6200 or higher

Sound Card: 16-bit Sound Card

DirectX® Version: DirectX® 9.0c

 


 

 

TABLES USED :

 

LOGIN

loginid

VARCHAR2(30)

 

name

VARCHAR2(30)

password

VARCHAR2(30)

 

email

VARCHAR2(30)

 

type

VARCHAR2(30)

 

 

 

 

 

 

 

 

 

CHAT ROOMS:

 

roomname

VARCHAR2(30)

 

roomdesc

VARCHAR2(30)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 




SHARED FILES:

 

fileName

VARCHAR2(30)

 

contenttype

VARCHAR(30)

loginid

VARCHAR2(30)

 

 

 

 

Share:
Powered by Blogger.

Ad Code

Responsive Advertisement

Ad Code

Responsive Advertisement

Featured post

Search This Blog

Recently added book names

THE HTML AND CSS WORKSHOP   | MICROSOFT POWER BI COOKBOOK   | MongoDB in Action, 2nd Edition  | ADVANCED DEEP LEARNING WITH PYTHON   | Cracking Codes with Python An Introduction to Building and Breaking  | Moris Mano Degital Design 3rd Edition  | Beginning App Development with Flutter by Rap Payne  |react hooks in Action - John Larsen   | Artificial Intelligence A Modern Approach Third Edition Stuart Russel  | Data Structures and Algorithms - Narasimha Karumanchi   | Thomas S.M. - PostgreSQL High Availability Cookbook - 2017  | Gunnard Engebreth PHP 8 Revealed Use Attributes the JIT Compiler   | ICSE Class X Computer Application Notes   | INTERNET OF THINGS PROJECTS WITH ESP32   | 100 aptitude trick(102pgs)s   | OBJECT_ORIENTED_PROGRAMMING Question & Answer   | C questions and answer   | Full_Book_Python_Data_Structures_And_Algorithm   | Jira 8 Administration Cookbook Third Edition  | KALI LINUX WIRELESS PENETRATION TESTING BEGINNERS GUIDE THIRD EDITION - Cameron Buchanan, Vivek Ramachandran  HTML5 & javascript By :- Jeanine Meyer   | Python For Beginners Ride The Wave Of Artificial Intelligence   | HackingTheXbox   | Introduction to Algorithms 3rd.Edition - (CLRS)   | The C++ Programming Language - Bjarne Stroustrup   | Modern C++ Programming Cookbook - Marius Bancila   | Java The Complete Reference Eleventh Edition   Data_Communications and Networking 4th Ed Behrouz A Forouzan   | DevOps with Kubernetes - Hideto Saito   | The-Linux-Command-Line-A-Complete-Introduction   | Assembly Language for X86 Processors KIP R. Irvine   | Effective_Modern_C++ - Scott Meyer

Contact Form

Name

Email *

Message *

Followers

Mobile Logo Settings

Mobile Logo Settings
image

Computer Training School Regd. under Govt. of West Bengal Society Act 1961

Header Ads Widget

Responsive Advertisement

Hot Widget

random/hot-posts

Recent in Sports

Popular Posts

Labels

Blog Archive

Blogger templates