Document Net Informer
Document Net Informer
INTRODUCTION
1.1ABOUT THE PROJECT
The project entitled Net Informer and Privacy keeper performs the system security on network. This project handles critical skill set for any organization that wants to monitor incoming traffic as well as monitor outgoing. The inference of information from o servation of traffic flow! for e"ample# analysis of the presence# a sence# amount# direction# and fre$uency of traffic are maintained. To optimize your network infrastructure for application performance# you need complete# enterprise%wide visi ility into the composition of traffic on every link. &ith this insight# you can $uickly identify the source of any performance pro lems# validate the impact of planned and unplanned changes within the network# and avoid unnecessary &'N costs. The network traffic analysis module Performance (enter# gives network professionals insight into how application traffic is impacting network performance. )eporter 'nalyzer is used in the Network monitoring
winforms or we app applications and create programming ased in any o ject%oriented programming language C??PD# '8?.NAT# 2ultithreading or &indows *ervices. -3.NAT programming utilizes concepts connected to string encryption# forms inheritance# regular e"pressions and deployment. T,e .NET Frame-or. Ar ,ite t)re The .NAT framework is a software technology that is directed towards connecting information# people# systems and devices seamlessly. The high level of software .
creation of small# discrete# uilding lock types of applications. These applications are connected to other applications over the Internet. (entral to the .NAT framework architecture is the effort to provide support to for the ne"t generation solutions. The direction of change is to ensure that software deployment and versioning conflicts are avoided or minimized in the .NAT @ramework. Fser defined codes are released from the confines of the local storage systems and can e stored anywhere on a network and e"ecuted from any point in the network. Performance pro lems associated with scripted and interpreted environments are removed. (odes can e safely e"ecuted and the developer e"perience is consistent across widely varying types of applications# such as &indows ased applications and we ased applications. The thrust of design is towards creating a standard communication facility that is standardized so that .NAT codes can e integrated with other codes easily and seamlessly. 't the core of the .NAT infrastructure is the (ommon 7anguage )untime C(7)D and the .NAT @ramework class li rary. The runtime functions# like an agent# managing code at e"ecution time. It provides core services such as memory management# thread management and GremotingH. It enforces strict type safety and ensures code accuracy. This makes for security and ro ustness and provides a platform for running managed code. The .NAT @ramework provides several runtime hosts. It also supports the development of third%party runtime hosts. @or e"ample# '*P.NAT hosts the runtime to provide a scala le# server%side environment for managed code. '*P.NAT works directly with the runtime to ena le '*P.NAT applications and =27 &e services. The .NAT @ramework can e hosted y unmanaged components such as the Internet A"plorer. These load the common language runtime into their processes and initiate the e"ecution of managed code. This creates a software environment that can e"ploit oth managed and unmanaged features. This makes for mo ility of the code.
Advanta/e0 of (B.NET +. -3.NAT provides managed code e"ecution that runs under the (ommon 7anguage )untime C(7)D# resulting in ro ust# sta le and secure applications. 'll features of the .NAT framework are readily availa le in -3.NAT. ;. -3.NAT is totally o ject oriented. This is a major addition that -34 and other earlier releases didnEt have. .. The .NAT framework comes with '8?.NAT# which follows the disconnected paradigm# i.e. once the re$uired records are fetched the connection no longer e"ists. It also retrieves the records that are e"pected to e accessed in the immediate future. This enhances *cala ility of the application to a great e"tent. I. -3.NAT uses =27 to transfer data etween the various layers in the 8N'
'rchitecture i.e. data are passed as simple te"t strings. :. Arror handling has changed in -3.NAT. ' new Try%(atch%@inally lock has een introduced to handle errors and e"ceptions as a unit# allowing appropriate action to e taken at the place the error occurred thus discouraging the use of ?N A))?) 0?T? statement. This again credits to the maintaina ility of the code. 4. 'nother great feature added to -3.NAT is free threading against the -3 single% threaded apartment feature. In many situations developers need spawning of a new thread to run as a ackground process and increase the usa ility of the application.
$. S%STEM STUD%
$.1 E6ISTIN7 S%STEM
The system# which is followed at present# is a partly computerized system. The system consists of various information related to the data security has to e maintained. In the e"isting system each and every time a reference should e made. There are no high possi ilities to commit errors and mistakes# which leads to produce the wrong statements to the management. )eport keeping is also not an easy work. Its @unctions such as Anumerating (omputers# 2essaging# and -ideo 2onitoring are not possi le to maintain the systems internally. The information provided y the present system has no communication with the administrators. $.1.1 DRA&BAC"S Aven though a part of it was computerized# the system has so many pitfalls. some of them are The lack of security Time consumption Perfect watching is not done y the administrators 2onitored details are not saved. (ontrolling of process is not possi le The e"isting system does not implement the restriction for the user to access data.
>
incorporated the system details# such as 1ost name# IP address for )eceiving and sending
$.$.1 FEATURES
'dministers can find the computers on the network easily The system process can e start and stopped to control the systems. 2essage sending is possi le. -ideo files are saved in the ?utput file Fser friendly system 2aintenance of file is fle"i le. *tored data and procedures can e easily edited. )eports can e generated with case. The proposed system uses the ideal environment# windows environment# as it is the most popular multitasking system availa le today. The tool used to develop this proposed system was -3.NAT a 0FI for its fle"i ility and compati ility. The proposed system uses *B7 *erver# a data ase system with powerful 832* functions and easy accessing.
T!#e0 of fea0i3i2it!
' feasi ility analysis usually involves a thorough assessment of the financial CvalueD# technical CpracticalityD# and operational CneedD aspects of a proposal. In systems development projects# usiness managers are primarily responsi le for assessing the operational feasi ility of the system# and information technology CITD analysts are responsi le for assessing technical feasi ility. 3oth then work together to prepare a costK enefit analysis of the proposed system to determine its economic feasi ility. O#erationa2 fea0i3i2it! ' systems development project is likely to e operationally feasi le if it meets the EneedsE and e"pectations of the organization. Fser acceptance is an important determinant of operational feasi ility. It re$uires careful consideration of, (orporate culture! *taff resistance or receptivity to change! 2anagement support for the new system! The nature and level of user involvement in the development and implementation of the system! direct and indirect impacts of the new system on work practices! 'nticipated performance and outcomes of the new system compared with the e"isting system!
+/
Training re$uirements and other change management strategies! and GPay ackH periods Cie trade%off etween long%term organisational enefits and short%term inefficiencies during system development and implementationD.
Te ,ni a2 fea0i3i2it! ' systems development project may e regarded as technically feasi le or practical if the organization has the necessary e"pertise and infrastructure to develop# install# operate and maintain the proposed system. ?rganizations will need to make this assessment ased on, 5nowledge of current and emerging technological solutions! 'vaila ility of technically $ualified staff in%house for the duration of the project and su se$uent maintenance phase! 'vaila ility of infrastructure in%house to support the development and maintenance of the proposed system! &here necessary# the financial and9or technical capacity to procure appropriate infrastructure and e"pertise from outside! (apacity of the proposed system to accommodate increasing levels of use over the medium term! The capacity of the proposed system to meet initial performance e"pectations and accommodate new functionality over the medium term. E onomi fea0i3i2it! ' systems development project may e regarded as economically feasi le or good value to the organization if its anticipated enefits outweigh its estimated costs. 2any development costs are easier to identify. These costs may include the time# udget and staff resources invested during the design and implementation phase# as well as infrastructure# support# training and maintenance costs incurred after implementation. Nonetheless# it can also e difficult to accurately $uantify project costs when new technologies and comple" systems are involved. In these high%risk situations it may e
++
appropriate to use sophisticated cost% enefit analysis tools to make appropriate assessments of financial feasi ility.
+;
+.
The output of the system# if it differs from what was re$uired# it is due to an error. This output can e some numeric or alpha etic value# some formatted report# or some specific ehavior from the system. In case of an error there may e change in the format of out# some une"pected on developerEs part. ehavior from system# or some value different from the e discovered efore the system is e"pected is o tained. These errors can due to wrong analysis# wrong design# or some fault 'll these errors need to implemented at the customerEs site. Re#ort0 (harts for etter representation of data )eports can e customize on certain level Password protected reports *ummary reports for the e"act picture of the property at a particular time )eceipt or @olio printing @le"i le automatic invoice printing if desired
+I
+:
+4
program. 3lack o" testing is not an alternative to white o" techni$ues. )ather it is a complementary approach that is likely to uncover a different class of errors than white o" methods. 3lack o" testing attempts to find errors in the following categories. a. Incorrect or missing functions . Interface errors c. Arrors in a data structures or e"ternal data ase access d. 3ehavior or performance errors e. Initialization and termination errors. It is the stage of implementation# which ensures that system works accurately and effectively efore the live operation commences. It is a confirmation that all are correct and opportunity to show the users that the system must e tested with te"t data and show that the system will operate successfully and produce e"pected results under e"pected conditions. *oftware testing is a crucial element of software $uality assurance and represents the unlimited review of specification# design and coding. Testing represents an interesting anomaly for the software. 8uring earlier definition and development phase# it was attempted to uild software from an a stract concept to a tangi le implementation.
Unit te0tin/
Fnit tests perform asic tests at component level and test a specific usiness process# application# and9or system configuration. Fnit tests ensure that each path of a usiness process performs accurately to the documented specifications# functionality and contains clearly defined inputs and e"pected and e"pected results. The unit testing is conducted y preparing the following reports FTP K unit test plan FTP Preparation CTest *cenariosD FTP )eview FTP )esults
+6
@or e"ample we can take the login page and test y unit testing. In FTP Preparation Test *cenarios all the links in the page is taken for test. In FT? review all the links are tested for its target page or the result. In FTP result the testing results for all the links tested is given as passed or failed and if any error then it is noted to the particular developer and corrected. ' program represents the logical elements of a system. @or a program to run satisfactorily# it must compile and test data correctly and tie in properly with other programs. 'chieving an error free program is the responsi ility of the programmer. Program testing checks for two type of errors, synta" and logical. *ynta" error is a program statement that violates one or more rules of the language in which it is written. 'n improperly defined field dimension or error messages were generated computer. 7ogic error deals with incorrect data fields# out%of range items# and invalid com inations. *ince diagnostics do not determine logic errors the programmer must e"amine the output carefully. y the
O)t#)t Te0tin/
-arious outputs have een generated y the system. The system generated output and the desk%calculated values have een compared. 'll the output is perfect as the company desires. It egins with low volumes of transactions ased on live tone. The volume is increased until the ma"imum level for each transaction type is reached. The total system is also tested for recovery and fall ack# after various major failures to ensure that no data are lost during the emergency time.
Inte/ration te0tin/
Integration tests are done to test integrated software components were individually satisfactory# as shown y successful unit testing! the com ination of components is correct and consistent. Integration testing is specifically aimed at e"posing the pro lems that arise from the com ination of components.
+J
management level. The data is stored in *B7 *erver as )832*# which is highly relia le and simpler to use# the user level security is managed with the help of password options and sessions# which finally ensures that all the transactions are made securely.
;/
;+
T,e form for a)t,ori5in/ and ontro22in/ amendment0 are> 'mendment notification K it is used to accurately define and justify. 'mendments log K it records the estimated and actual completion of each activity defined y the author. 'mendment list K it provides a permanent record of all amendments made to documents within a documentation file. S!0tem A)dit It is an investigation to review performance of an operational system! to compare the actual with planned performance! to verify that started o jectives of system are still valid in present environment! and to evaluate the achievement of o jectives.
enefits in the
feasi ility study have achieved. *u se$uent audits# carried out# as part of regular reviews of systems will e concerned with the continued achievement of enefits# any deviation from the master system specification and opportunities for improvement.
;;
<. CONC+USION
<.1 CONC+USION
The goal of the project Net Informer and Priva ! "ee#er successfully achieved. The implementation and testing has een done in a step% y%step process. Aach module has een developed and tested individually to o tain the necessary re$uired output in the desired form. The project has een done as user%friendly. The software developed has een designed and run to satisfy the re$uirements and needs of the organization as well as the end users. The system reduces the manual work of maintenance of the records. It has also resulted in $uick retrieval and reference of re$uired information# which is vital to the degrees of the organization. The entire system is documented and can e easily understood y the end users. The form are very user friendly and also easy to handle even y the eginners with very little effort and guidance
;.
Though the new system provides a 5eeping this in view# a provision has
modification9updating in the future. 'ny modification will not affect the normal working of the system. The system can e implemented as an online application with more fle"i ility. (onsidering chance that in future the need of the organization may increase develops this software. (oding is done in a way that when a change is made to the data ase ta le it can e easily. 's the codes are effectively 8ocumented and the codes are made as reusa le# the system is highly fle"i le to any future changes.
;I
BIBI+IO7RAPH%
+. @)'N(A*(? 3'7AN'# Pro/rammin/ Mi ro0oft (i0)a2 Ba0i .NET (er0ion $11<# 3P3 pu lications ;//> Adition ;. 3I77 A-<AN# 3I77L 1?77I*# )?(5@?)8 71?T5'# 'N8 TI2 2((')T1L Profe00iona2 (B.NET $11<# .rd Adition .. A7I'*. 2. '&'8# S!0tem Ana2!0i0 and De0i/n# 0algotia Pu lications +JJ> Adition. I. <?L(A (?= 'N8 P?77L F)3'N# Introd) tion to S'+ Server $111 3P3 pu lications +JJ6 Adition :. )?0A) *.P)A**2'N. Soft-are En/ineerin/. Tata 2c0raw%1ill Pu lishing company# -th Adition# ;//+. 4. 8 2 81'281A)A. S!0tem0 Pro/rammin/ and O#eratin/ S!0tem0. Tata 2c0raw%1ill Pu lishing (ompany# II Adition# ;//;.
;:
APPENDI6
A. DATA F+O& DIA7RAM
This is concerned with the transformation of re$uirements into data Msoftware architecture various notation are used in this stage. The most fre$uently used category of architectural design notation is directed graphs. There includes 8@8Hs# pertinence etc. The 8ata @low 8iagram is used as graphical notation to depict information flow. The o jective of this method is the derivation to program structure analysis and design. 8@8 is a structural analysis and design. It descri es the flow of data through out a system.
DFD S%MBO+S,
)epresents a process that transforms incoming data flow into out going dataflow. 8ata store at rest# temporary repository of data.
;4
+E(E+ 1
0 8IN @IN
(omputers
2? NIT ?)
IN0
'dmin -ideo
-ideo Interface
**IN0 P)?(A
;>
8isplays
2onitoring
-ideo Interface
*ervices
-iews
*hared )esources
;6
B. TAB+E DESI7N
Ta32e Name@ Admin +o/in Primar! "e!@ Admin Name FIE+D NAME '%Name '%Pass DATA T%PE -archar -archar ;/ +: SIAE DESCRIPTION 'dmin Name 'dmin Password
Ta32e Name @ Traffi Contro2 Primar! "e! @ TC*Code FIE+D NAME T(%(ode T(%8ate Traffic )ank IP'ddress (hange IP 'dd DATA T%PE -archar 8ate9Time Numeric -archar -archar +/ 6 J ;: ;: SIAE DESCRIPTION Traffic (ontrol (ode Traffic (ontrol 8ate Traffic )ank IP 'ddress (hange IP 'ddress
Ta32e Name @ Find Com#)ter0 Primar! "e! @ Ho0tName FIE+D NAME 1ostName IP'ddress DATA T%PE -archar -archar ;/ ;/ SIAE DESCRIPTION 1ost Name IP 'ddress
;J
SIAE
SIAE
./
C. SAMP+E CODIN7
Im#ort0 S!0tem.Net Im#ort0 S!0tem.Net.Dn0 P)32i C2a00 frmMDIMain In,erit0 S!0tem.&indo-0.Form0.Form Private S)3 frmMDIMainBC2o0in/CB!(a2 0ender A0 O3;e t4 B!(a2 e A0 S!0tem.Com#onentMode2.Can e2EventAr/0D Hand2e0 M!Ba0e.C2o0in/ BuitCD e.(ancel N True End S)3 Private S)3 3tFindCom#)ter0BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tFindCom#)ter0.C2i . 8im Ne 's New NetAnum 8im Ns 's NetAnum.Net)esource 8im i 's Integer 8im tIP1ostAntry 's IP1ostAntry 8im tIP'ddress 's *tring If Ne.?penCD Then 2e.(ursor N (ursors.&ait(ursor @or i N + To Ne.(ount Ns N Ne.Ne"t tIP'ddress N OO If Try tIP1ostAntry N )esolveCNs.)emoteName.*u stringC;DD Ns.8isplayType N NetAnum.)A*?F)(AP8I*P7'LTLPA.)A*?F)(A8I*P7'LTLPAP*erver Then
.+
tIP'ddress N tIP1ostAntry.'ddress7istC/D.To*tring (atch e" 's A"ception tIP'ddress N OC?fflineDO And Try lv(omputers.Items.'ddCNs.)emoteNameD lv(omputers.ItemsC/D.*u Items.'ddCtIP'ddressD And If Ne"t i 2e.(ursor N (ursors.8efault And If Ne.(loseCD End S)3 Private S)3 3t7oBC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3t7o.C2i . If lv(omputers.*electedItems.(ount Q / Then (urrent(omputerName N lv(omputers.*electedItems.ItemC/D.Te"t *tatus3ar.PanelsC+D.Te"t N O(omputer, O R (urrent(omputerName If lv(omputers.*electedItems.ItemC/D.*u Items.(ount Q + Then (urrent(omputerIP N lv(omputers.*electedItems.ItemC/D.*u ItemsC+D.Te"t And If And If If (urrent(omputerName N OO Then (all 2sg3o"CO*elect a (omputerO# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD t@ind(omputers.@ocusCD A"it *u And If @indProcessesCD End S)3
.;
F)n tion FindPro e00e0CD 8im t2achineName 's *tring N (urrent(omputerName If 2idCt2achineName# +# ;D N OSSO Then t2achineName N 2idCt2achineName# .D And If 8im tProcessesCD 's Process 8im i 's Integer 8im lvwP 's 7ist-iewItem Try lvProcess.Items.(learCD tProcesses N Process.0etProcessesCt2achineNameD @or i N / To F3oundCtProcessesD lvwP N lvProcess.Items.'ddCtProcessesCiD.ProcessName.ToFpperD If t2achineName TQ *ystem.Anvironment.2achineName Then lvwP.*u Items.'ddCOOD lvwP.*u Items.'ddCOOD lvwP.*u Items.'ddCtProcessesCiD.IdD Alse lvwP.*u Items.'ddCtProcessesCiD.2ain&indowTitleD lvwP.*u Items.'ddCtProcessesCiD.)espondingD lvwP.*u Items.'ddCtProcessesCiD.IdD And If Ne"t l lProcesses.Te"t N OProcesses, O R TrimC*trClvProcess.Items.(ountDD (atch lvProcess.Items.'ddCOArror Anumerating ItemsOD And Try End F)n tion
..
Private S)3 3tStartBC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tStart.C2i . timer2ain.Interval N Process2onitoringInterval timer2ain.Ana led N True End S)3 Private S)3 timerMainBTi .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 timerMain.Ti . @indProcessesCD End S)3 Private S)3 3tSto#BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tSto#.C2i . timer2ain.Ana led N @alse End S)3 Private S)3 3tEndPro e00BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tEndPro e00.C2i . If lvProcess.*electedItems.(ount Q / Then 8im Prc 's Process 8im t2achineName 's *tring N (urrent(omputerName If 2idCt2achineName# +# ;D N OSSO Then t2achineName N 2idCt2achineName# .D And If If t2achineName N *ystem.Anvironment.2achineName Then Try Prc Process.0etProcess3yIdClvProcess.*electedItemsC/D.*u ItemsC.D.Te"tD Prc.5illCD N
.I
lvProcess.Items.)emoveClvProcess.*electedItems.ItemC/DD l lProcesses.Te"t N OProcesses, O R TrimC*trClvProcess.Items.(ountDD (atch (all 2sg3o"CO(ould not close ProcessO# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD And Try Alse E(all 2sg3o"CO(ould not close Processes on a )emote 2achine.O# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD And If And If End S)3 Private S)3 3tNet-or.Me00a/in/BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tNet-or.Me00a/in/.C2i . If lv(omputers.Items.(ount N / Then (all 2sg3o"CONo (omputersO# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD t@ind(omputers.@ocusCD A"it *u And If tfrmNetwork2essaging.*how8ialogCD End S)3 Private S)3 3t(ideoMonitorin/BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3t(ideoMonitorin/.C2i . If lv(omputers.Items.(ount N / Then (all 2sg3o"CONo (omputersO# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD t@ind(omputers.@ocusCD
.:
A"it *u And If tfrm-ideo(apture.*how8ialogCD End S)3 Private S)3 3tServi e0BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tServi e0.C2i . tfrm*ervices.*how8ialogCD End S)3 Private S)3 3tS,are0BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tS,are0.C2i . tfrm*hares.*how8ialogCD End S)3 End C2a00
.4
D. SAMP+E INPUT
.>
.6
.J
I/
I+
I;
I.