Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
1. INTRODUCTION
This project aims at developing a Network Packet Sniffer. Network Packet Sniffer is a
piece of software that monitors all network traffic. This is unlike standard network hosts that
only receive traffic sent specifically to them. As data streams flow across the network, the sniffer
captures each packet and eventually decodes and analyzes its content. For network monitoring
purposes it may also be desirable to monitor all data packets in a LAN and to mirror all packets
passing through a shared bus. This project will be comprised of three modules namely the User
Interface module, Statistics module and Packet Analysis module. User Interface module provides
all the Graphical Interface components necessary for the user to interact with the System. The
Analysis Module will analyze the incoming packets into a computer, identify them and passes
the information into the Statistics module. Finally the statistics module does the necessary
calculation based on the information and produce information that can be understood by the user.
This system is thus very useful to the users and a network administrator in particular who is
generally responsible for monitoring things on a network.
This system is a network analyzer (also known as protocol analyzer & packet sniffer), it
performs real-time packet capturing, 24x7 network monitoring, advanced protocol analyzing, in-
depth packet decoding, and automatic expert diagnosing. It allows you to get a clear view of the
complex network, conduct packet level analysis, and troubleshoot network problems.
1.1 Abstract:
The project shows how network connection information can be modeled as
chromosomes. It creates a new set of rules during run time. So the intruder cannot be able to
attack the system with virus. In recent years, Intrusion Detection System (IDS) has become one
of the hottest research areas in Computer Security. It is an important detection technology and is
used as a countermeasure to preserve data integrity and system availability during an intrusion.
1
An Intrusion Detection System is a system for detecting intrusions and reporting them accurately
to the proper authority. Intrusion Detection Systems are usually specific to the operating system
that they operate in and are an important tool in the overall implementation an organization’s
information security policy, which reflects an organization's statement by defining the rules and
practices to provide security.
A methodology of applying genetic algorithm into network intrusion detection technique
is unique as it considers both temporal and spatial information of network connections during the
encoding of the problem; therefore, it should be more helpful for identification of network
anomalous behaviors.
1.2 Synopsis:
Network Packet Sniffer is one of the most useful software tool for windows operating
system. Sniffer software works as a windows analyzer and maintain system information like
network status, drivers updates, running services, running drivers and handles information of
every feature in windows. which will be useful for administrator to easily monitor system status.
Network sniffer software required manual work to configure required settings. Using this settings
admin can analyze system details based on settings he configured. This application uses inbuilt
features on windows operating system like windows management instrumentation which is used
to communicate with all lower level systems. Based on the configuration
settings performance is depended.
This project is intended to develop a tool called Packet Sniffer. The Packet Sniffer allows
the computer to examine and analyze all the traffic passing by its network connection. It decodes
the network traffic and makes sense of it. When it is set up on a computer, the network interface
of the computer is set to promiscuous mode, listening to all the traffic on the network rather than
just those packets destined for it. Packet Sniffer is a tool that sniffs without modifying the
network’s packet in anyway. It merely makes a copy of each packet flowing through the network
interface and finds the source and destination Ethernet addresses of the packets. It decodes the
protocols in the packets given below:
IP (Internet Protocol), TCP (Transmission Control Protocol), UDP (User Datagram Protocol).
2. REQUIREMENT SPECIFICATIONS
2
2.1 Hardware Specification:
The hardware specification is necessary to support the proposed system, which have
been identified, ordered, delivered, installed and tested at the time of installation.
Processor : Pentium IV
Hard Disk : 40GB
RAM : 512MB or more
Mouse : Optical
Printer : HP Laser
Database : MS SQL
3. SYSTEM STUDY
3
Introduction to Packet Sniffers:
A Packet Sniffer is a program that can see all of the information passing over the network
it is connected to. A Packet Sniffer is a Wire-tapping device that plugs into computer Networks
and eavesdrop on the network traffic. A packet sniffer (also known as a network analyzer or
protocol analyzer or, for particular types of networks, an Ethernet sniffer or wireless sniffer) is
computer software that can intercept and log traffic passing over a digital network or part of a
network. As data streams flow across the network, the sniffer captures each packet and
eventually decodes and analyzes its content.
Most Ethernet networks use to be of a common bus topology, using either coax cable or
twisted pair wire and a hub. All of the nodes (computers and other devices) on the network could
communicate over the same wires and take turns sending data using a scheme known as carrier
sense multiple access with collision detection (CSMA/CD). Think of CSMA/CD as being like a
conversation at a loud party, you may have to wait for quite a spell for your chance to get your
words in during a lull in everybody else’s conversation. All of the nodes on the network have
their own unique MAC (media access control) address that they use to send packets of
information to each other. Normally a node would only look at the packets that are destined for
its MAC address. However, if the network card is put into what is known as “promiscuous
mode” it will look at all of the packets on the wires it is hooked to.
TCP/IP Protocols:
Background:
The Internet protocols are the world's most popular open-system (nonproprietary)
protocol suite because they can be used to communicate across any set of interconnected
networks and are equally well suited for LAN and WAN communications. The Internet protocols
consist of a suite of communication protocols, of which the two best known are the Transmission
Control Protocol (TCP) and the Internet Protocol (IP). The Internet protocol suite not only
includes lower-layer protocols (such as TCP and IP), but it also specifies common applications
such as electronic mail, terminal emulation, and file transfer. This document provides a broad
introduction to specifications that comprise the Internet protocols.
4
Internet protocols were first developed in the mid-1970s, when the Defense Advanced
Research Projects Agency (DARPA) became interested in establishing a packet-switched
network that would facilitate communication between dissimilar computer systems at research
institutions. With the goal of heterogeneous connectivity in mind, DARPA funded research by
Stanford University and Bolt, Beranek, and Newman (BBN). The result of this development
effort was the Internet protocol suite, completed in the late 1970s.
Documentation of the Internet protocols (including new or revised protocols) and policies
are specified in technical reports called Request for Comments (RFCs), which are published and
then reviewed and analyzed by the Internet community. Protocol refinements are published in the
new RFCs. To illustrate the scope of the Internet protocols, Fig 1. Maps many of the protocols of
the Internet protocol suite and their corresponding OSI layers.
Fig 1: Internet protocols span the complete range of OSI model layers.
OSI model Internet protocol suite
Application NFS
FTP,
Presentation RPC
Telnet,
SNMP
Transport TCP, UDP
Network IP ICMP
ARP RARP
Data Link
5
The Internet Protocol (IP) is a network-layer (Layer 3) protocol that contains addressing
information and some control information that enables packets to be routed. IP is the primary
network-layer protocol in the Internet protocol suite. Along with the Transmission Control
Protocol (TCP), IP represents the heart of the Internet protocols. IP has two primary
responsibilities: providing connectionless, best-effort delivery of data grams through an inter-
network; and providing fragmentation and reassembly of data grams to support data links with
different maximum-transmission unit (MTU) sizes.
6
3.2 Proposed System:
As a network analyzer (as a. packet sniffer), this system make it easy for us to monitor
and analyze network traffic in its intuitive and information-rich tab views. With this system
network traffic monitor feature, we can quickly identify network bottleneck and detect network
abnormities. This article is to discuss how we can monitor network traffic with this network
traffic monitor feature.
This system provides a Summary view that provides general information of the entire
network or the selected node in the explorer. In Summary view we can get a quick view of the
total traffic, real-time traffic, broadcast traffic, multicast traffic and so on. When we switch
among the node from the explorer, corresponding traffic information will be provided.
The Endpoints view; we can monitor network traffic information of each node, both local
and remote. With its easy sorting feature we can easily find out which host is generating or has
generated the largest traffic.
The Protocols view will list all protocols applied in network transmission. In Protocols
view we can monitor network traffic by each protocol. By analyzing network traffic by protocol,
we can understand what applications are using the network bandwidth, for example "http"
protocol stands for website browsing, "pop3" stands for email, etc.
7
3.3 SYSTEM DEVELOPMENT:
3.3.1 Module Description:
Login/logout for Admin:
Required to login and logout before and after access the Application for Admin. Required
username and password for security purpose just to identify themselves.
This is for the Admin, member of the Application have access to the management
administration Form. Management Admin can provide the IP Addresses or Domain Name to
connect Network news transfer Protocol server.
Ping Information:
It is used to see if a computer is operating and if network connections are intact. Ping uses
the Internet Control Message Protocol (ICMP) Echo function which The ping utility verifies
connections to a remote computer or computers. You can use ping to test both the computer name
and the IP address. If the IP address is verified, but the computer name is not, you may have a
name resolution problem. In this case, make sure the computer name you are querying is in either
the local host file or in the DNS database.
Packet Information:
A packet is the unit of data that is routed between an origin and a destination on the Internet
or any other packet-switched network. When any file is sent from one place to another on the
Internet, the Transmission Control Protocol (TCP) layer of TCP/IP divides the file into "chunks"
of an efficient size for routing. Each of these packets is separately numbered and includes the
Internet address of the destination.
4. SYSYTEM ANALYSIS
8
This Project deals with a packet capture utility and Network monitoring. This Project is
useful to the Network Administrators to observe each and every incoming packet for security
enhancements. Irrespective of the Destination IP of incoming packet the machine on which this
project is running captures all packets .This Project Keeps on differentiating the type of the
entities which are there in Ethernet header.
The main program will have an infinite loop which keeps an eye on each and every
incoming packet. The moment it collects that packet it starts invoking respective modules and
those modules will internally redirects that information to respective text files. The utilities used
in this project are WinPcap and PacketX.
WinPcap:
In the field of computer network administration, pcap consists of an application
programming interface (API) for capturing network traffic. Unix-like systems
implement pcap in the Libpcap library; Windows uses a port of Libpcap known
as WinPcap. Monitoring software may use Libpcap and/or WinPcap to capture
packets traveling over a network and, in newer versions, to transmit packets on a
network at the link layer, as well as to get a list of network interfaces for
possible use with Libpcap or WinPcap.
Libpcap and WinPcap also support saving captured packets to a file, and reading files
containing saved packets; applications can be written, using Libpcap or WinPcap, to be able to
capture network traffic and analyze it, or to read a saved capture and analyze it, using the same
analysis code. A capture file saved in the format that Libpcap and WinPcap use can be read by
applications that understand that format.
Libpcap and WinPcap provide the packet-capture and filtering engines of many open-
source and commercial network tools, including protocol analyzers (packet sniffers), network
monitors, network intrusion detection systems, traffic-generators and network-testers.
9
WinPcap consists of:
drivers for Windows 95/98/Me, and for the Windows NT family (Windows NT 4.0,
Windows 2000, Windows XP, Windows Server 2003, Windows Vista, etc.), which use
NDIS to read packets directly from a network adapter;
A port of Libpcap that uses the API offered by the low-level library implementations.
PacketX:
PacketX class library integrates WinPcap packet capture functionality with ActiveX
programming and scripting languages. PacketX hides the low level programming details by
implementing simple class framework that can be used to build networking applications with
minimum effort and time. In brief, PacketX uses WinPcap libraries to capture (and optionally
filter) network packets. In addition to standard capture mode you can collect network statistics
and send raw packets. All captured packets or statistics are encapsulated inside wrapper class and
returned to client as events. PacketX uses WinPcap Packet Driver API implemented by packet.dll
and BPF filtering support from pcap.dll. This means that you can use PacketX to capture, send
(and optionally filter) packets and collect network statistics. PacketX cannot be used to block
network traffic to build a firewall. The library contains an ActiveX control that can be used from
RAD development tools like Microsoft Visual Basic or Borland Delphi. For scripting
languages there are corresponding lightweight COM classes.
Some of the classes are as follows:
PacketXClass
AdapterCollection
Adapter
Packet
_IPktXPacketXEvents_OnPacketEventHandler
10
4.1 Feasibility Study:
It is necessary and prudent to evaluate the feasibility of a project at the earliest possible time.
There may be different ways of checking whether a system is feasible or not. Feasibility study
can be divided into three basic forms as follows.
Operational feasibility:
In this test, the operational scope of the system is checked. The system under consideration
should have enough operational research. It is observed that proposed system is very user
friendly and since the system is built with enough help, even persons with little knowledge of
windows can find the system very easy.
Technical feasibility:
This test includes a study of function, performance and constraints that may affect the ability to
achieve an acceptable system. This test begins with an assessment of the technical viability of the
proposed system. One of the main factors to be accessed is the need of various kinds of resources
for the successful implementation of the proposed system.
Economical feasibility:
An evaluation of development cost weighed against the ultimate income of benefit from the
development of the proposed system is made. Care must be taken regarding the costs that incur
in the development process of the proposed system.
11
4.2 Software Overview:
Microsoft .NET:
Microsoft announced the .NET initiative in July 2000. The .NET platform is a
new development framework with a new programming interface to Windows
services and APIs, integrating a number of technologies that emerged from
Microsoft during the late 1990s. Incorporated into .NET are COM+ component
services; the ASP web development framework; a commitment to XML and
object-oriented design; support for new web services protocols such as SOAP,
WSDL, and UDDI; and a focus on the Internet.
Development tools:
Specialized servers:
Web services:
Devices:
12
The .NET Platform:
The Microsoft .NET Platform consists of five main components, as shown in Figure 1 -1.
At the lowest layer lies the operating system (OS), which can be one of a variety of Windows
platforms, including Windows XP, Windows 2000, Windows Me, and Windows CE. As part of
the .NET strategy, Microsoft has promised to deliver more .NET device software to facilitate a
new generation of smart devices.
On top of the operating system is a series of .NET Enterprise Server products that
simplify and shorten the time required to develop and manage large-scale business systems.
These server products include Application Center 2000, BizTalk Server 2000, Commerce Server
2000, Exchange Server 2000, Host Integration Server 2000, Internet Security and Acceleration
Server 2000, and SQL Server 2000.
Since Web Services are highly reusable across the Web, Microsoft plans to provide a
number of building-block services that application developers can use, for a fee. An example of
building –block service is Microsoft Passport, which allows you to use a single username and
password at all web sites that support Passport authentication. On March 19, 2001, Microsoft
announced another set of Web Services with the codename Hailstorm. This product encompasses
a set of building –block services that support personalization, centered entirely on consistent user
experiences. Microsoft plans to add newer services, such as calendar, directory, and search
services. Third-party vendors are also creating new Web services of their own.
13
At the top layer of the .NET architecture is a brand new development tool called Visual
Studio.NET (VS.NET), which makes possible the rapid development of Web Services and other
applications. A successor of Microsoft Visual Studio 6.0, VS.NET is an Integrated Development
Environment (IDE) that supports four different languages and features such as cross-language
debugging and the XML Schema Editor.
And at the center of .NET is the Microsoft .NET Framework—the main focus of this
book. The .NET Framework is a new development and runtime infrastructure that will change
the development of business applications on the Windows platform. It includes the Common
Language Runtime (CLR) and a common framework of classes that can be used by all .NET
languages.
Visual Studio .NET contains a graphical programming environment called the Microsoft
Development Environment (MDE). The MDE enables you to create programs in Visual C# and
other Visual Studio .NET languages.
Security:
Computer networks let programmers share Visual Studio .NET code including C#
programs across the network. This collaborative effort lets you and your programming team
creates C# programs much more quickly than one person alone. The problem with collaborating
over a network is that unauthorized users from within or outside your network may try to gain
access to your C# program code. Visual Studio .NET provides built-in security features so you or
the leader of your programming team can determine who on your network gets access to your C#
program code and resources. You can also set different levels of security for different people in
case you want only certain people to have access to certain program code.
DLLs:
The advent of Windows brought dynamic link libraries (DLLs) to programmers. DLLs
are small, independent programs that contain executable routines that programs can use to
produce a certain result in Windows. For example, if a program needs to open a file, you can
14
write your C# program that uses the code in the DLL to open the file. Using DLLs frees up your
time to work on your program without having to reprogram the same code in your C# program
over and over again. You can access DLLs from your C# program, and create DLLs in C# for
your C# program to refer to when necessary. C# has full COM/Platform support, so you can
integrate C# code with any programming language that can produce COM DLLs such as Visual
C++.
XML:
15
5. SYSTEM DESIGN
Input Design:
The input design is the process of entering data to the system. The input design goal is to
enter to the computer as accurate as possible. Here inputs are designed effectively so that errors
made by the operations are minimized. The inputs to the system have been designed in such a
way that manual forms and the inputs are coordinated where the data elements are common to
the source document and to the input. The input is acceptable and understandable by the users
who are using it. Once identified, appropriate input media are selected for processing.
The input design also determines the user to interact efficiently with the system. Input
design is a part of overall system design that requires special attention because it is the common
source for data processing error. The goal of designing input data is to make entry easy and free
from errors.
The main objectives that are done during the input design are:
16
Data is checked for its accuracy
Data is transmitted to the computer
Validation of input data is done
Output Design:
Computer output is most important and direct source of information to the user. Efficient
of intelligible output should improve the system relationship with the user and help in decision-
making. Major forms of output are hard copy from the printer and soft copy from the CRT unit.
The output design was done so that results of processing could be communicated to the
users. The various outputs have been designed in such a way that they represent the same format
that the office and management used to.
Computer output is the most important and direct source of information to the user. Efficient,
intelligible output design should improve the systems relationships with the user and help in
decision making. A major form of output is the hardcopy from the printer.
When the application is started the user is prompted to select the network interface whose
traffic is to captured. Then the host machine will be put into promiscuous mode and it will be
able to capture all the traffic via its Network card.
17
All TCP, ARP, UDP and ICMP, traffic will be captured and executed thus transformed
into understandable language which will be displayed on the capture window.
If the number of packets to a given destination exceeds the set value they will be dropped
.this is done by blocking the destination name from communicating with the local hosts this is
done using AnyWebLock.
18
19
5.2 Data Flow Diagram:
20
Data flow diagram illustrates the different process and how data flows from one process
to another. Here the administrator runs the application then after he is required to login with
valid username and password. After he has to select the network interface whose traffic is to be
captured. When the interface is selected and the capture started, the host machine will be put in a
promiscuous mode (a network device is able to intercept and read each network packet that
arrives in its entirety.).Now the host machine is able to capture all network traffic on that
particular interface.
Then the administrator is able to determine the network traffic flow and the different
protocols used at that particular time since the host machine or device is able to capture all traffic
from and to the entire hosts on the network. The Administrator now is able to determine the
different irrelevant destinations by matching the different Internet Protocols captured and those
stored in the database after which all packets to that given destination can be blocked hence
improving the efficiency of the network. After all the captures the administrator is able to save
the captures for further analysis.
They provide the data at the logical level. They are characterized by that fact that they
provide fairly flexible structuring capabilities and allow data constraints to be specified
explicitly. The entity relationship data model is based on a perception of a real world that
consists of a set of basic object entities and relationships among the objects. It was developed to
facilities database design.
The ER data model is one of several semantic data model. The semantic aspect of model
lies in the attempt to represent the meaning of data .ER model is externally used in meaning and
interactive of real world enterprises. ER Model has some means of describing the physical
database model, it is basically useful in the design & communication of the logical database
model. In this model, objects of similar structure are collected into an entity set.
21
5.4 Use Case Diagram:
A use case describes a sequence of actions that provide something measurable value to an actor
and is drawn as a horizontal ellipse an actor is a person, organization or external system that
plays a role in one or more interactions with your system. Fig. 5.4 illustrates how the application
and the user will interwork to achieve the desired goal. It shows the different functionalities a
user can do as well as the system. User can start the capture, stop the capture, save logs while the
22
application can start monitoring the network, display graphs, get packet headers, destinations,
drop unwanted packets and get packet data.
23
6. TEST REPORT
The time lag between the cause and appearance of the problem.
The effort of system error on files and records within the system.
Unit Testing
Integrated Testing
Validation Testing
White Box Testing
Black Box Testing
24
Unit Testing: Testing of individual programs or modules is known as unit testing. Unit testing is
done both during documentation and testing phase. Unit testing focuses on verification of effort
on the smallest of software design. Modules using the detailed design description as a guide,
important control paths are tested to uncover errors within the boundary of the module. The
relative complexity is test and errors detected as a result are limited by the constraints scope
established for unit testing. Unit testing is always white box oriented and the step can be
conducted in parallel for multiple modules.
Integration Testing: Integration testing is a systematic technique for constructing the program
structure while at the same time conducting test to uncover errors associated with interfacing.
The objective is to take unit - tested modules and build a program structure that has been
dictated by design. Careful test planning is required to determine the extent and nature of
system testing to be performed and to establish criteria by which the result will be evaluated.
All the modules were integrated after the completion of unit test. While Top - Down
Integration was followed, the modules are integrated by moving downward through the control
hierarchy, beginning with the main module. Since the modules were unit - tested for no errors,
the integration of those modules was found perfect and working fine. As a next step to
integration, other modules were integrated with the former modules.
Validation Testing: The most common web application security weakness is the failure to
properly validate input coming from the client or environment before using it. The weakness
leads to almost all of the major vulnerabilities in web applications, such as cross site
scripting, SQL injection, interpreter injection.
Data from an external entity or client should never be trusted, since it can be arbitrarily
tampered with by an attacker. Validation doesn't just mean putting your pages through some web
driven testers. It also means test-driving it with friends, relatives, co-workers, and strangers.
Everyone has a different system and way of working, so ask for others to test-drive your styles or
themes before you make them public.
25
White Box Testing: White box testing is a test case method that uses control structure and
procedural design to drive test cases using white box testing method. Software engineer can test
cases that:
Exercise all logical decisions on their true or false sites.
Guarantee that all independent paths with a module have been exercised at least once.
Exercise internal data structure to ensure validity.
Execute all loops at their boundaries and their operational bounds.
White box testing sometimes called as glass box testing is a test case design method that uses
the control structures of the procedural design to derive test cases. Using White Box testing
methods, the software engineer can derive test case, that guarantee that all independent paths
with in a module have been exercised at least once, exercise all logical decisions on the true and
false sides, execute all loops at their boundaries and within their operational bounds, exercise
internal data structures to ensure their validity. “Logic errors and incorrect assumptions are
inversely proportional to the probability that a program path will be executed“.
Black Box Testing: Black box testing, also called as behavioral testing, focuses on the
functional requirements of the software. That is, black box testing enables the software
engineer to derive sets of input conditions that will fully exercise all functional requirements
for a program.
Black box testing focuses on the fundamental requirements on software and on input
and output of the module. It enables the software engineers to derive set of input condition that
will truly exercise all functional requirements of a program. Black box testing is rather a
contemporary approach that is likely to uncover different class of errors.
26
6.2 Test Cases:
Login
Serial Module Test Expected Refer
Expected Input Remark
No. description Case Output GUI
Attempt to
User authenticate with Login to
1. Login Fig 1 Successful
login valid username home page
and password
Attempt to Redirected to
User authenticate with same page
2. Login Fig 1 Failed
login invalid username with error
and password message
Attempt to
User authenticate with Login to
3. Login Fig1 Successful
Login valid username home page
and password
Attempt to Redirected to
User authenticate with same page
4. Login Fig 1 Failed
Login invalid username with error
and password message
27
Network Traffic
The
Expected requirement
No. Test case Title Description Result
Outcome in RS that is
being tested
1 Test the User saves the File is saved RS4 Passed
functionality of a file and views it
file downloaded later
from internet
28
Register
Serial Module Expected Refer
Test Case Expected Input Remark
No. description Output GUI
29
8. CONCLUSION
In practice, there is not a typical network problem that can’t be discovered and solved
using packet sniffer technology. Sniffers can be used as the first method of attack on a number of
issues that vary from overloaded networks to unresponsive switches to lost packets. As a number
of networks and nodes continue to grow and as network speeds accelerate, it becomes more and
more difficult to monitor a LAN by using traditional tools, such as RMON (Remote Monitoring)
probes. Packet sniffers, by contrast, monitor traffic on network right down to the Header
information on each series of data. This means that u can actually track data from starting point
to its end point. Packet sniffers can also be used to identify the types of packets on a network and
discover whether or not the specific packet has any errors.
30
9. BIBLIOGRAPHY
[1] Micheal Colline et al, (2006) ’ HANDBOOK SiLK version 0.10.3 , PA 15213-3890
[2] Shrirom Sarvotham et al, (2001) Connection-level Analysis and Modeling of network Traffic
[3] Seong Soo Kim et al (2004) A Study of Analyzing Network Traffic as Images in Real-Time
[4] Jean-Francois Raymond (2000) Traffic Analysis: Protocols, Attacks, Design Issues and Open
Problems, Zero-Knowledge Systems, Inc.
[6] Robert Geist and James Westal (2002) Simulation Modeling of self-similarity in Network
Traffic Department of Computer Science, Clemson University, Lucent Technologies.
[7] Steven L. Scott and Padhraic Smyth, “The Markov Modulated Poisson Process and Markov
Poisson Cascade with Applications to Web Traffic Modeling”
http://www.datalab.uci.edu/papers/ScottSmythV7.pdf
[8] Andrew S. Tanenbaum, Computer Networks, Third Edition, Prentice Hall International
Editions, 1996.http://ieeexplore.ieee.org/iel5/35/13111/00601746.pdf?
isnumber=&arnumber=601746
[9] R.Jain (1991) The Art of Computer Systems Performance Analysis, John Wiley and sons
New York
31
[10] Balakrishnan Chandrasekaran (2006) Survey of Network Traffic Models
http://www.cse.wustl.edu/~jain/cse567-06/ftp/traffic_models3/index.html
32