Chat Server
Chat Server
Patil
Polytechnic
CHATSERVER SYNOPSIS
Group Members:
Bhavya Patel Vikram Choudhary Keshav Pagar Kiran Kharat
Lets discuss different modules that we have considered as a part our project. 1. File 2. Chat monitoring.
1st module provides facility to send files like text and document file. Maximum size of file to be transferred is 1.5MB. File can be sent by client to client or client to server or server to client. However at one time file can be sent only to one user. User sends file by mentioning the IP address of the receiver.
2nd Module provides chat monitoring to monitor chatting between clients. Clients chat based on their work and helps in doing project. Server can interrupt connection of clients.
Objective: Main objective is to promote sharing of files (computer programs and/or data), to encourage indirect or implicit (via programs) use of remote computers, to shield a user from variations in file storage systems among hosts. To transfer data reliably and efficiently FTP, though usable directly by a user at a terminal, is designed mainly for use by programs. The attempt in this
specification is to satisfy the diverse needs of users of maxi-hosts, mini-hosts, personal workstations, and TACs, with a simple and easily implemented protocol design.
One of the primary activities found on the Internet is the transferring of files. Every minute of every day, Internet users download files from various websites and Webmasters upload files and web pages to their website. The most common method for transferring files over the Internet is via the File Transfer Protocol, or FTP.
With the explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. And all computer users, from the most casual Internet surfers to large enterprises, could be affected by network security breaches.
Data transmitted via any type of network can be subject to interception by unauthorized parties. The perpetrators might eavesdrop on
communications or even alter the data packets being transmitted. Perpetrators can use various methods to intercept the data. IP spoong, for example, entails posing as an authorized party in the data transmission by using the Internet Protocol (IP) address of one of the data recipients.
Information has become an organizations most precious asset. Organizations have become increasingly dependent on the information since more information is being stored and processed on network-based systems. Intrusion detection has become an integral part of the information security process. But it is not technically feasible to build a system with no vulnerabilities; intrusion detection continues to be an important area of research.
Security Issues 1. Attacks from malicious nodes. 2. Authentication & integrity. 3. Confidentiality.
Attacks External Attacks 1. Nodes from outside of network. 2. Network congestion. Internal Attacks 1. Already authenticated. 2. Exclusion mechanism
(Denial-Of-Service attacks) Authentication & Integrity 1. Authentication of client towards the network. 2. Authentication of nodes towards a group. 3. Problem: Certificate verification 4. A central authority might be unavailable. 5. Integrity of data, key needed. Table No.1: Security
needed.
Confidentiality 1. Group keys. 2. Predefined-what if node get compromised? 3. Created on-the-fly. 4. Each node give contribution there a node joins
Socket Programming:
Define: Socket Programming is use to send and receive file and text message
using port and protocol of client and server device
Some concepts: Port: Port number of device Protocol: How Client-Server interact with each other. Service interface: How upper layer Port (Server) interact with lower layer Port (Client)
To receive: Socket, bind, listen, accept read TCP endpoint: IP address + port number
PROPOSED SYSTEM:
We propose a system of FTP after the failure of security protection like firewalls. While transferring data we use the traditional method of cryptography and file compression to avoid any security risks while transferring the confidential data from client to server. File compression techniques is not only used to transfer files of large quantity but also the garbage value it produces helps in data security. We also propose a simple client server chat system that exists in an organization.
1. SOFTWARE REQUREMENTS:
This project works on Windows XP and uses C# technology. It is necessary to Install MS Windows Studio. It provides all these facilities. We have used .Net framework tool to meet overall software requirements. [4]
SOFTWARE REQUREMENTS
WINDOWS XP,7 C#.NET MS WINDOWS STUDIO,MS ACCESS .NET FRAMEWORK, Visual Studio 2008
2. HARDWARE REQUREMENTS:
This project works on Pentium 4 processor, Random access memory requirement is of min 1 GB. It is necessary to have minimum 80 GB space. It is necessary to include all the hardware requirements so that user can understand whether our hardware is will able to run this or not. It is very important to have sufficient space on the drive to store each and every files or data that is going to shared b/w two or more users or clients.
HARDWARE REQUIREMENTS PROCESS MOTHERBOARD RAM HARD DISK PENTIUM 4 GENUINE INTEL MIN 1 GB 80 GB Table N0 6: Hardware Requirements
Level 0 This context-level DFD is next "exploded", to produce a Level 0 DFD that shows some of the detail of the system being modelled. The Level 0 DFD shows how the system is divided into sub-systems (processes), each of which deals with one or more of the data flows to or from an external agent, and which
together provide all of the functionality of the system as a whole. It also identifies internal data stores that must be present in order for the system to do its job, and shows the flow of data between the various parts of the system.
User Client
FTP Server
Level 1 In Level 1 of DFD, the processes could be considered as the submodule(s) of function(s) of the project or module. Next level is Level 1 DFD. Some important points are:
Level 1 DFD must balance with the Level 0 it describes. Inputs going into a process are different from outputs leaving the process.
User Client
Fig No 1: DFD
Authentication
Select file
Server
Client
Transfer
Chat
Client 2 Client and server performing different function can be described using Use case diagram.
APPLICATION:
1. Used in large organisation for secure communication. 2. For file transfer over a network.
Conclusion:
Thus using client-server and socket programming concept we have designed Chat server application. First, the theoretical section, where We have learned lots of things in networking, such as the TCP/IP protocol (number one in network protocols) and how it works, windows sockets, and network programming which is one of the best programming domains in computers. Second, the technical section which let us become more familiar with a new programming language such as C#.NET and its network components. Finally we would like to thank our teacher Mrs. Pranita Sangit and all our instructors for helping us.