Sei sulla pagina 1di 6

IDL - International Digital Library Of

Technology & Research


Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017

IP Messenger
And File Transfer over Ethernet LAN
Mr. Solaiman Jahed
Solaiman.jahed@gmail.com
Department of CSE (Computer Science and Engineering)
School of Computing and Technology
REVA University, Karnataka, 560064 India

Abstract- Today many forms of communication exist network. To start chatting client should get
throughout the computer technology over the world since connected to server where they can practice two
past two decades. From instant messaging towards shared kinds of chatting, public one (message is
folders, FTP, Telephony communication, Mail transferring broadcasted to all connected users) and private
and so on. Each serves different purposes and uses distinct one (between any 2 users only) and during the
techniques to operate. IP Messenger and File Transfer last one security measures were taken.
over Ethernet LAN is a combination of Instant Messaging
and File Sharing. IP Messenger and File Transfer is a System Analysis
LAN-based network application used within an
System Objectives Communication over a network is
organization for the employees and colleagues to share the
one field where this tool finds wide ranging
files among themselves and to have text-chat with each
application. Chat application establishes a connection
other, this application replaces the use of shared folders between 2 or more systems connected over an intra-
and usage of e-mail and USB drive to transfer files and net or ad-hoc. This tool can be used for large scale
also replaces the use of instant messaging such as Skype, communication and conferencing in an organization
WhatsApp etc. or campus of vast size, thus increasing the standard of
co-operation.
I. INTRODUCTION
In addition it converts the complex concept of sockets
Communication is a method of using technology to a user friendly environment. This software can
to bring people and ideas together despite of have further potentials, such as file transfer and voice
the geographical barriers. The technology has chatting options that can be worked upon later
been available for years but the acceptance it was
Relation to External Environment This tool
quit recent.
helps in two major aspects
Our project is an example of a IP Messenger and Resolving the names of all the system
File Transfer. It is made up of client application, connected in a network and enlisting them.
Used for communication between multiple
which runs on the users PC and server
systems enlisted in the resolved list.
application, which runs on any Pc on the

IDL - International Digital Library 1|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


Design Consideration Fig 1.1 General Schema
Approach: The tool has been designed using C#
(Windows Form Application). II. LITERATURE SURVEY
Methodology: The user interacts with the tool
using a GUI. A Survey of Machine Learning Algorithm in
The GUI operates in 1 forms, the List form & Network Traffic Classification
the chat form.
Network Traffic Classification is an emerging
The List form contains the names of all the
systems connected to a network. research area and now a day the research is widely
The chat form makes the actual used in various activities such as intrusion detection
communication possible in the form of text. system and for security purpose. Many of the
protocols and proposed application have been
Operational Concepts and Scenarios Operation of investigated and developed by using machine
the application learning algorithms.
Based on the inputs given by the user: List Form: We also focused on traditional and statistical
When initialized, returns a list containing the names methods. The previous used techniques and recent
of all the system connected in a network. Contains techniques have been compared using machine
two buttons: Refresh and Connect. learning.
When Refresh button is clicked refreshes the list of In this paper the survey of different machine learning
names. When the Connect button is clicked or a name
techniques are done and I identify better techniques to
is double clicked, the chat form is initialized with a improve the performance
connection between the host and the client machine.
IP Multimedia Subsystem
Note: If no name is selected, and connect button is
clicked an error box is displayed. Chat form: IP Multimedia Subsystem (IMS) defined by 3GPP
Contains a rich textbox which cannot be edited but and 3GPP2 standardized based on IETF Internet
only displays the messages from one user to another, Protocols. Most of researches in Next Generation
including the self-sent message, as in any chat Network enabled IMS has been focused on the
application. engineering, rules, protocol, service provision in IMS,
compatibility issues and refinements of SIP with
IMS.
IMS is access independent as it supports IP to IP
session over wire-line IP, 802.11, 802.15, CDMA,
packet data along with GSM/EDGE/UMTS and other
packet data applications. It consists of session
control, connection control and an applications
services framework along with subscriber and
services data. It enables new converged voice and

IDL - International Digital Library 2|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


data services, while allowing for the interoperability
of these converged services between subscribers.
III. IP MESSENGER AND FILE TRANSFER
LAN Messenger
OVER ETHERNET LAN
The LM uses two-tier Client/Server architecture as
shown in figure 1. The application handling is This is a LAN messenger application, It is a Client
completed separately for database queries and /Server application program developed in (C# .NET).
updates and for business logic processing and user Here the individual can chat with other individual
interface presentation. Generally, the networks bind through LAN connection. Even they can exchange
the back-end of an application to the front-end. The file through one computer to other. Administrator can
client is the first tier and the server is the second. view chat logs through server. Here no need of
Internet access.
Design is like two sockets are created at the client
side and the server side. The client connects to the 3.1. Tools and Technologies Used
server through its IP address and port number.
This section describes the tools and technologies used
They must share the same port number for them to to develop the project. The tools and technologies
communicate.The client and the server both used in the BSF Applications are Web forms,
communicate through a stream of bytes written to the Bootstrap, JQuery, JSON .Net framework 4.5
socket. The client and the server must agree on a
protocol (TCP, UDP or RAW) and agree on the
Win forms
language of the information transferred back and Win Forms are used to create a Standalone as the
forth through the socket, this study used socket interface or front-end. Users can easily access the
concept to collect messages. Basically, themessage application from any computer connected.
sent by one staff into a socket and passes it to another Jquery
staff on the receiving side. If it is group chatting, a
jQuery used in our application increases the
central socket will be used to collect the message and
productivity of the developer by enabling them to
then it will be broadcast to all staff that are active.
achieve critical UI functionality by writing very small
amount of code such as helps to improve
performance of the application, Helps to develop
browser compatible web page.

JSon
JSON, used for JavaScript Object Notation, is a
minimal, readable format for structuring data. It is
used primarily to transmit data between a server and
web application, as an alternative to XML.

Fig 2.2LAN Messenger Flowchart 3.2. System Design

IDL - International Digital Library 3|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


The system design has three phases of development: Presentation Layer/ UI Layer
architectural, logical and physical design. This is the top most layer of application where user
performs their activity. Lets take example of any
application where user needs to fill up one form. In
windows applications windows form is presentation
layer. Basically user input is done in this layer.
Business Layer
This is on top of presentation layer. As the name
suggest, most of the business operation performs
here. For example, after collecting form data we want
to validate them with our custom business rule.
Data Access Layer
It is on top of Business Logic Layer Data Access
Layer presents. It contains methods that helps
business layer to connect with database. In data
access layer generally all database related code and
stuff belongs to.
3.2.2 Logical Design
The logical design of the system represents the data
flow, inputs and outputs of the system. Logical design
of the system is graphically represented and gives
Fig 3.1 System Design logical relationship between the components of the
system. Logical diagram includes ER diagram
representation i.e. Entity Relationship diagram.

3.2.1 Architectural Design

Fig 3.3 Logical Design of the Application

Fig 3.2 Architectural Design 3.2.3 Physical Design

IDL - International Digital Library 4|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


Physical design represents physical behavior of the system which not run the application. These
system. Physical design is related to the input and names and IPs can later be used for
output process of the system. Physical design will communication with the help of mouse event,
gives how to input the data into system, how can it is
or in simple language: a click or a double
authenticated, how does it is processed and how it is
displayed. The requirement of the physical design is: click.
Chat form This form is called only when an
Input requirements, Output requirements,
Storage requirements, Process requirements, element is selected from the List form. In this
System Control and back up or recovery is form, a connection is created between the
required to design physical design. host system and the selected system with the
The physical design is categorized into three sub task. help of a socket.
User interface When the Connect button is clicked or a
Data design name is double clicked, the chat form is
Process design initialized with a connection between the host
User Interfaceis designed to describe how user will and the client machine.
give input to the system and how system process the Log files is a concept that has been added to
information and return back to the users. the application so that you can track each and
Data design is concerned in representing about how every transaction over the LAN between
data represented in the system do and how those data machines that run this Application and
are stored into the system. communicated among each other.
Process design concerned about the movements of
the data in the system, and how and where these data V. CONCLUSION
are validated. Also concerned about the how data is
This paper is a survey of how to build an Instant
secured and transformed through and the system and
out of the system. messaging over Ethernet LAN without having any
Internet connection and also having a portable
application for transferring files over Ethernet LAN.
The advantage of this application is used within an
organization between employees regardless of having
IV. SYSTEM ARCHITECTURE
Internet connection and need to open the mail for file
The IP Messenger and the File Transfer Interface transferring or exchanging the files over USB devices
Design works as follows or texting with each other.
VI. REFERENCES
List form: In this form, all the computer
[1] Kazuki Ueda, TatsushiKikutani, and Takahiro Yakoh
names and IPs of the systems connected to a Parallel Implementation of Real-Time
network that runs the IP Messenger and File Communication and IP Communication by using
Transfer application are enlisted. List Form Multiple Ring Bu ers
contains the IPs and names of all the system [2] Marius Marcu and Adela Bascacov Tariff System
connected to the LAN which runs the Design for IP Conference Communication Solutions
application otherwise the application not
enlist the IPs and Computer names of those

IDL - International Digital Library 5|P a g e Copyright@IDL-2017


IDL - International Digital Library Of
Technology & Research
Volume 1, Issue 6, June 2017 Available at: www.dbpublications.org

International e-Journal For Technology And Research-2017


[3] Lilin Zhang, Ali Tizghadam, HadiBannazadeh and
Alberto Leon-Garcia Iterative Trafc Engineering in
the Data Plane of Multimedia IP Communication
[4]
http://csharp.netinformations.com/communications/cs
harp-socket-programming.htm
[5] N. Wang, K. H. Ho, G. Pavlou, and M. Howarth, An
overview of routing optimization for internet trafc
engineering, 2008.
[6] A. Tizghadam and A. Leon-Garcia, On Robust
Trafc Engineering in Transport Networks. in
GLOBECOM. IEEE, 2008, pp. 23722377.
[7]AGraphTheoreticalApproachtoTrafcEngineeringand
NetworkControl Problem. in International
Teletrafc Congress. IEEE, 2009, pp. 18. [4] ,
Autonomic Trafc Engineering for Network
Robustness, IEEE J.Sel. A. Commun., vol. 28, no. 1,
pp. 3950, Jan. 2010.
[8] Intel82574GbEControllerFamilyDatasheet.
Intel,2011.
[9] J.-D. Decotignie.Ethernet-based real-time and
industrial communications. Proceedings of the IEEE,
93(6):1102 1117, 2005.
[10] B. Feng, D. Ghosal, and N. Kannappan.Impact of
ATM ABR controlontheperformanceofTCP-Tahoe
and TCPReno. IEEE Global Telecommunications
Conference, GLOBECOM 97, 3:18321837,
November 1997.

IDL - International Digital Library 6|P a g e Copyright@IDL-2017

Potrebbero piacerti anche