Sei sulla pagina 1di 34

ADVANTAGE OF PROPOSED

SYSTEM

This system ethereal can decode more than 480 protocols.


It runs on over all windows platform combatable to .net.
Its support over 480 protocols and because it is open source,
new ones are contributed very frequently.
It can read capture files from over 20 different products.
It can monitoring and control traffic.

OVERALL DESCRIPTION
MODULE DESCRIPTION

Packets Transmitted and Received

Bytes Transmitted and Received

Utilization Information

IP Address and MAC Address

Assigned User Friendly Names for each Node


PACKETS TRANSMITTED AND RECEIVED

In LAN information are exchanged between nodes and server or nodes


and nodes. Information is exchanged as packets. Each packet has a
definite frame work. The frame work consists of a header information
data bytes and other message specific information like message end.
The transmitting node will send the information to the receiving node.
So that the packet will receive only addressed machine. In Ethernet
LAN technology involves is CSMA (Collision Sense Multiple Access).
Since each node is linked to the LAN. The packets from each node will
be travelling in the same media, namely UTP cable. In order to make
available to an end to end communication between two machines
CSMA technology is used. The packets must be send by the
transmitted nodes must be received by the receiving machine. If
collision occurs it will be sensed by the nodes as the medium is in used
and the packets will send again.

BYTES TRANSMITTED AND RECEIVED

In packet of information there are various information namely packet


header, data and end of message. In this format data is the actual no of
bytes transmitted by the server or node. After receipt of the packet of
information from the Network the receiving machine will converted
into the actual bytes of information. The Network protocol analyzer
will verify the actual bytes of information transmitted by the

transmitting machine and actual number of bytes received by the


receiving machine. This will give the exact measure of efficiency of the
Network in terms of actual usable number of bytes of information.

UTILIZATION INFORMATION

This software will give a summary report of Network medium utilized


by different nodes in the LAN. This is the very important in the LAN
in nodes to plan Network management activities by the Network
administration

IP ADDRESS AND MAC ADDRESS

Every machine will have on internet protocol address allotted manually


or dynamically. This address is retrieved from the machine and given
by the utility for information. MAC address is the unique address of the
NIC card of the machine this unique address is very important as far as
Network communication is concerned. This address is taken out from
the NIC BIOS and will be displayed by this software.
ASSIGNED USER FRIENDLY NAMES FOR EACH NODE
In Network the user will assigned a computer name for each node. This
name can be displayed by the Operating system in the respective
machine. This Software taken out the information and displayed for the
user.

OPERATING
ENVIRONMENT
System Configuration

This project is developed using Microsoft Tools. .Net platforms


are used in this project as front end. Minimum level of hardware is
required to maintain in this project.
HARDWARE CONFIGURATION
Main Processor

: Intels Dual Pentium

Frequency

: 500 MHz

Total Memory

: 256 MB

Hard disk capacity

: 20 GB

CLIENT CONFIGURATION

Machine Used

: Pentium, AMD

Main Processor

: Intels 80856

Frequency

: 200 MHz

Total Memory

: 128 MB RAM

Hard Disk Capacity

: 40 GB hard disk

Floppy Drive(s)

: 3.5 inch, 1.44 MB Drive

Keyboard

: Compaq 101 keyboard

Mouse

: Compaq Mouse

Monitor Used

: Compaq SVGA

Printers

:Laser

Printers(HP

LaserJet)

SOFTWARE CONFIGURATION
Operating System

: Windows XP, ME, Vista

Front End

: VISUAL BASIC 6.0

Network Architecture
Documentation

: TCP/IP
: Microsoft Word.

SYSTEM FEATURES
System Configuration
This project is developed using Microsoft Tools. Dot Net platforms
are used as front end .Minimum level of hardware is required to
maintain in this project.

SYSTEM DESIGN
DESIGN PLAN
Output Design
Computer output is the most important and direct source of
information to the user. One important feature of the system for the
user is the output procedures. Efficiency and intelligible design should
improve the system with the user. Without quality of output, the entire
system may appear to be so unnecessary.

Designing computer should proceed in an organized


manner. It should be developed while ensuring that each output
element is designed so that people will easy to use the system
effectively. The term output applies to any information produced by an
information system, whether to be displayed or printed.
The output form of the system is either by screen or by
hardcopies. Output design aims at communicating the results of the
processing to the users. An application is successful only it can produce
efficient and effective outputs. The reports are generated to suit the
needs of the users. The reports have to be generated with appropriate
levels.

Input Design:
A major part in the design of the system is the preparation of
the input. Input is necessary for the successful development and
implementation of the system. The input design is the link that ties the
information systems into the process of converting oriented inputs to
computer based formats.
The quality of the inputs determines the quality of the output.
Input specifications describe the manner in which data enter the system
for processing. Inaccurate input is the common cause of errors in data
processing. The input design is the process of converting user-oriented

inputs to a computer-based format. So the input interface design is the


important role in controlling errors.
This application is being developed in a user-friendly manner.
The forms are being designed in such a way that during the processing
the cursor is placed in the position where the data must be entered. An
option of select an appropriate input from the list of values. Validations
are made for each of every data enters to a new field so that he/she
understandable what is to be entered whenever the user enters an error
data. Error messages are displayed and the user can move to next field
only after entering the current data.
The input design focus on the following:
Proper validation of the input should be provided
The screen should be user friendly and easy to operate
Avoiding inordinate delay, keeping process simple.

Code Design
The main purpose of performing code design is to simplify
the coding to achieve better coding. The loading is prepared in such a
way that the internal procedures are more meaningful. Validation
manager is displayed for each column.
The loading of the variable is done in such a way that the other one
who has developed the package can understand its purpose.

The main purpose of performing code design is to simplify the coding


to achieve better coding. The loading is prepared in such a way that the
internal procedures are more meaningful. Validation manager is
displayed for each column.
The loading of the variable is done in such a way that the other one
who has developed the package can understand its purpose.

MODULE DESIGN

PACKETS TRANSMITTED AND RECEIVED

Packet sniffers capture "binary" data passing through the network, most
if not all decent sniffers "decode" this data into a human readable form.
To make it even easier (for humans) another step occurs known as
"protocol analysis". There is a varying degree of the analysis that takes
place; some are simple, just breaking down the "packet" information.
Others are more complex giving "detailed" information about what it
sees on the packet (i.e., highlights a password for a service).
The information that travels across a network is sent in "packets." For
example, when an email is sent from one computer to another, it is first
broken up into smaller segments. Each segment has the destination

address attached, the source address, and other information such as the
number of packets and reassembly order. Once they arrive at the
destination, the packet's headers and footers are stripped away, and the
packets reconstituted.
Each packet usually contains three parts: 1) a header, which are the
instructions referring to the data within the packet; 2) the payload or
actual data in the packet; 3) the trailer or code telling the receiving
device that it is nearing the end of the packet. Positive usage of sniffer
is also its regular usage, which aim is to maintain network and system
working normally.
a. Capturing packets;
b. Recording and analyzing traffic;
c. Decrypting packets and displaying in clear text;
d. Converting data to readable format;
e. Showing relevant information like IP, protocol, host or
server name and so on.

BYTES TRANSMITTED AND RECEIVED


In packet of information there are various information namely packet
header, data and end of message. In this format data is the actual no of

bytes transmitted by the server or node. After receipt of the packet of


information from the Network the receiving machine will converted
into the actual bytes of information. The Network protocol analyzer
will verify the actual bytes of information transmitted by the
transmitting machine and actual number of bytes received by the
receiving machine. This will give the exact measure of efficiency of the
Network in terms of actual usable number of bytes of information.

UTILIZATION INFORMATION

This software will give a summary report of Network medium utilized


by different nodes in the LAN. This is the very important in the LAN
in nodes to plan Network management activities by the Network
administration

IP ADDRESS AND MAC ADDRESS


Every machine will have on internet protocol address allotted manually
or dynamically. This address is retrieved from the machine and given
by the utility for information. MAC address is the unique address of the
NIC card of the machine this unique address is very important as for as
Network communication is concerned. This address is taken out from
the NIC BIOS and will be displayed by this software.

ASSIGNED USER FRIENDLY NAMES FOR


EACH NODE
In Network the user will assigned a computer name for each node. This
name can be displayed by the Operating system in the respective
machine. This Software taken out the information and displayed for the
user.

USER INTERFACE DESIGN

DFD
DATA FLOW DIAGRAM

A Flowchart is a diagram that uses graphic symbols to depict the


nature and flow of the steps in a process .It allows us to break any
process down into individual events or activities and to display these in
shorthand form showing the logical relationships between them. Steps
in a process are shown with symbolic shapes, and the flow of the
process is indicated with arrows connecting the symbols. Generally the
start point, end points, inputs, outputs, possible paths and decisions that
lead to these possible paths are included. The commonly used
flowchart symbols are listed below:

Computer processing
Used to indicate any processing performed by
a computer

Directional arrow

Used to show the direction of processing and


other events
Document

Used to show any printed document input or


output

Connector

Used to connect different entry and/or exit


In the flow chart

LEVEL 0

LEVEL1

LEVEL 2(PROTOCOL ANALYSING)

LEVEL 2(PACKET ANALYSING)

LEVEL 2(DOWNLOAD MANAGER)

LEVEL 3(PACKET ANALYSING)

LEVEL 3(PACKET ANALYSING)

LEVEL 3(DOWNLOAD MANAGER)

SYSTEM IMPLEMENTATION
Implementation is the stage where theoretical design has been
turned into a working system. The main aim of this implementation
phase is to see whether the output created and inputs given are
according to the users requirements and specifications.

It also

involves user training for minimization resistance to change and giving


the system a change to prove its worth. The successful implementation
of the new system depends upon a involvement of staff working in the
department.
The first step done to implement is to install VB .NET with
windows along with the database. After that the user should check all
hardware configurations. After installing the required application
software the user has to check and verify all installed component. The
main aim of this Implementation plan is to see whether the outputs
created and inputs were given according to the user requirements and
specifications that have been established. This was done in the security
department by having the developer as a secondary person and another
employee who conducted the actual test. Some Suggestion was made
while requirement testing was done that has been incorporated. As

there is no need to give any training to the users. Because they already
know their requirements and those who are using this project also
know well about this. Only a certain introduction and those with little
knowledge of English and computer can easily operate this system.
After the implementation of this project the system manager has to
maintain all its software and hardware. The system manager has to
upgrade the software frequently and whenever using a floppy the
system should be protected using Anti virus Software. UPS and other
electronic components should be connected. And this software also
maintains with login and password protection.
The stage consists of:
1. Testing the developed program with sample data.
2. Detection & correction of errors.

Testing whether the system meets user requirements.

Creating files of the system with the actual data.

Making necessary changes are desired by the user.

Training user personnel.

An implementation design of method is to achieve the


changes over

method.

Full object-oriented capabilities

An incredible IDE

Cross-language inheritance

Real VB (or C#, etc) in ASP.NET, not VBScript

Web service tools

One way to do things, no matter what .NET language you are


using

FRONT END
A brief history of VB.net
Visual basic.net is one of the languages that are directed towards
meeting the objectives of the .net initiative of creating distributed
application. Visual basic .net is a powerful object-oriented language
that provides feature such as abstraction, encapsulation, inheritance and
polymorphism. In addition it provides many other features that did not
exist in the earlier version, such as multi inheritance and structured
exception handling.
FEATURES OF VISUAL BASIC .NET
Some of the key features introduced in visual basic .net are as follows:-

1. Inheritance: it is the ability of a class to derive its characteristics


from an existing class. Visual basic .net provides the inherits key
word to implement in habitants.
2. Constructors and destructors: a constructor is a special type of
method that is invoked when you create new instants of a class. A
destructor releases the resources used by an object.
3. Overloading: overloading enables methods to be defined with the
same name but different parameters.
4. Overriding: overriding is the capability of a derived class to
override the characteristics of parent class .
5. Structure exception handling: visual basic .net supports structured
exception handling that consists of protected blocks of codes and
filters for the possible exception that can be raised by the
program.
6. Multithreading: visual basic .net provides full support for creating
multithread applications. Multithreading enables an application to
contain one or more threads that can share work load in an
application by executing one at a time.

SYSTEM TESTING
System testing is the most vital that has to be enforced in any
system development cycle. This could be done as parallel activity

along

with

the

system

development

or

during

system

implementation .The feed back received during this testing should be


carefully examined for further enhancement made to the system.
The system was tested with sample data and adequate corrections
were made as per the requirements .Enough validation check and error
message are provided such as the user data entry errors are minimized.
System testing is the process and tools used to test coded software
before it is released to the public. Software testing is a critical
component of the software development cycle. Without software
testing, consumers would not get stable software releases. Software
testing is a process used to help identify the correctness, completeness
and quality of developed computer software. With that in mind,
software testing can never completely establish the correctness of
arbitrary computer software. There are many approaches to software
testing, but effective testing of complex products is essentially a
process of investigation, not merely a matter of creating and following
rote procedure. One definition of software testing is "the process of
questioning a software product in order to evaluate it", where the
"questions" are things the tester tries to do with the product, and the
product answers with its behavior in reaction to the probing of the
tester. Although most of the intellectual processes of software testing
are nearly identical to that of review or inspection, the word software

testing is connoted to mean the dynamic analysis of the software


product putting the software through its paces. We have conducted a
different types of testing.
System Testing
Intended to test the system as a whole rather than individual
system components
Integration testing
As the system is integrated, it is tested by the system
developer for specification compliance
Stress testing
The behavior of the system is tested under conditions of
load
Acceptance testing
The system is tested by the customer to check if it conforms
to the terms of the development contract

UNIT TESTING
Unit resting focuses verification efforts on the smallest unit of
software design .this is also known as Module Testing. In pay

fixation the module tested separately. This testing is carried out


during programming stage itself .In this testing step each module is
focused to be working satisfactorily as regard to the expected output
from the module.
In PAYFIXATION we checked first with a sample data and are
found to be success.
The program is constructed and tested in small segment, where
errors are easier to isolate and correct. In this package, the interfaces
are more likely to be tested completely and also a systematic
approach I applied. All the modules are combined in advices and
entire program is tested as a whole.
INTEGRATING SYSTEM
The program is constructed and tested in small segment, where
errors are easier to isolate and correct. In this package, the interfaces
are more likely to be tested completely and also a systematic approach
I applied. All the modules are combined in advices and entire program
is tested as a whole.

Concerned with testing the system as it is integrated from its


components

Integration testing is normally the most expensive activity in the


systems integration process
Should focus on
Interface testing where the interactions between subsystems and components are tested
Property testing where system properties such as reliability,
performance and usability are tested
Regression Testing
Regression testing is an important component of incremental
testing. When a new increment is added to the system, the tests
which have been run on the previous increment are run again
If these tests do not produce the same outputs as before, this
implies that the new increment has, in some way, interfered with
the functionality of the existing system
Interface Testing
Probably the most common problem which arises during system
integration is interface problems where sub-systems and
components do not interact as anticipated by their developers
These may not be detectable during earlier testing phases because
of interface misunderstandings or because they are a consequence
of the way in which the interface is used

Security Testing
Security testing is concerned with checking that the system and
its data are protected from accidental or malicious damage
Unlike other types of testing, this cannot really be tested by
planning system tests. The system must be secure against
unanticipated as well as anticipated attacks

Security testing may be carried out by inviting people to try to


penetrate the system through security loopholes

VALIDATION TESTING
At the end of user testing, software is completely assembled as a
package, interfacing errors have now being uncovered and correcting
test begins. Software testing and validation are achieved through a
serious black box tests that demonstrate conformity with the
requirement.

OUTPUT TESTING
Next step is output testing of the proposed system. Since no system
could be useful if it does not produces the required output in the
specific format. The outputs are displayed by the system under

consideration and are tested by asking the user about the format of the
screen, as the format was designed in the system design phase
according to the needs. Hence output testing does not result in any
correction in the system.
USER ACCEPTANCE TESTING
Acceptance testing involves planning and execution of functional
tests ,performance test, and stress tests to verify that the implemented
system satisfies its requirements. Acceptance tests are typically
performed by quality assurance and/or customer organizations.
Functional and performance tests are performed to determine
the limitations of the system. Typically , acceptance

typically,

acceptance test will incorporate test cases developed during unit testing
and integration testing. Additional test cases are added to achieve
desired level of functional , performance, and stress testing of the entire
system. Tools of Special importance during acceptance testing include
a test Coverage analyzer, a timing analyzer, and a coding standards
checker. A test coverage analyzer records the control paths followed
for each test case. Timing analyzer reports the time spent in various
regions of the source code and different test cases.
A plan outlines the classes of tests to be conducted and test
procedure defines specific cases that will be used to demonstrate

conformity with requirements. Both the plan and the procedure are
designed to ensure that all functional requirements are achieved,
documentation is correct and other requirements are met. After the
validation test, one of the conditions exist.
They are,
The function or performance characteristics confirm to specification
and are accepted. A deviation from the specification is uncovered and a
deficiency list is created. The deviation or error discovered at this stage
in a project can rarely be corrected prior to scheduled completion. It is
necessary to negotiate with the customer to establish methods

FUTURE ENHANCEMANT
Internet based protocol analyzing system can be done.
Automatic network alert system to the system and network
administrator can be done.

BIBLIOGRAHY
* Visual basic 6.0 from the Ground Up
By
Gray Cornell
* Visual basic 6.0 Complete Reference
By
BPB Publication
* Visual basic 6.0 The Complete Reference
By
Noel Jerke , Tata Mcgraw Hill
*
*

Principle of Data Base system


By
Jeffrey D.Ullman
Database system Concepts
By

Silberschatz, Korth and Sudharsan, Tata McGraw Hill

Potrebbero piacerti anche