Anda di halaman 1dari 43

1.

INTRODUCTION
1.1ABOUT THE PROJECT
The project entitled Net Informer and Privacy keeper performs the system security on network. This project handles critical skill set for any organization that wants to monitor incoming traffic as well as monitor outgoing. The inference of information from o servation of traffic flow! for e"ample# analysis of the presence# a sence# amount# direction# and fre$uency of traffic are maintained. To optimize your network infrastructure for application performance# you need complete# enterprise%wide visi ility into the composition of traffic on every link. &ith this insight# you can $uickly identify the source of any performance pro lems# validate the impact of planned and unplanned changes within the network# and avoid unnecessary &'N costs. The network traffic analysis module Performance (enter# gives network professionals insight into how application traffic is impacting network performance. )eporter 'nalyzer is used in the Network monitoring

MISSION OF THE PROJECT


Net Informer and Priva ! "ee#er is created for the users. The 'utomation of the process is focused mainly. The Project is suita le for all types of users. The generation of reports is very easy. This project ena les the data security from the hackers. Perfect *cheduling.

1.$ S%STEM SPECIFICATION 1.$.1 HARD&ARE SPECIFICATION


Processor *peed )'2 capacity 1ard disk drive 5ey 3oard 2ouse (8 )9& 8rive Printer 2other oard (a inet 2onitor , , , , , , , , , , , Pentium I../ 01z + 03 +4/ 03 *amsung 2ultimedia +/6 keys 7ogitech . uttons :;" 70 8esk<et 1P Intel 'T= +> *amsung (olor

1.$.$ SOFT&ARE RE'UIREMENT SPECIFICATION


?perating *ystem @ront end used 3ack end used , , , &indows =P -isual 3asic.NAT ;//6 *B7 *erver ;///

O(ER(IE& OF SOFT&ARE Introd) tion to Front*End (ISUA+ BASIC.NET


-isual 3asic C-3D is a programming language ased on the original 8?* language called 3'*I( C3eginnersE 'll%purpose *ym olic Instruction (odeD. -3.NAT ;//:# an offshoot of -isual 3asic# is an o ject%oriented programming language ased on -3 that is implemented using the 2icrosoft .NAT framework. The asic synta" of the -isual 3asic language remains unchanged in -3.NAT ;//:# ut includes additional features such as structured e"ception handling and short circuited e"pressions to enhance the infrastructure of the programming language. 8evelopers have found -3.NAT to e controversial as some of the software and developmental changes clash with the original language within -3 and have caused compati ility issues. -isual *tudio .NAT is the predominant integrated development environment CI8AD that -3.NAT developers employ. -isual 3asic programmers supporting -3.NAT indicate that language constructs and user interface features in the newer system have caused programming issues within the original -3 system. 8evelopers using -3.NAT recognize that the upgraded -3 system incorporates contemporary o ject oriented programming paradigms in a more sta le environment than was originally thought possi le. -isual 3asic .NAT is a programming language that can e used to create

winforms or we app applications and create programming ased in any o ject%oriented programming language C??PD# '8?.NAT# 2ultithreading or &indows *ervices. -3.NAT programming utilizes concepts connected to string encryption# forms inheritance# regular e"pressions and deployment. T,e .NET Frame-or. Ar ,ite t)re The .NAT framework is a software technology that is directed towards connecting information# people# systems and devices seamlessly. The high level of software .

integration that has

een attempted through use of =27 we

services ena les the

creation of small# discrete# uilding lock types of applications. These applications are connected to other applications over the Internet. (entral to the .NAT framework architecture is the effort to provide support to for the ne"t generation solutions. The direction of change is to ensure that software deployment and versioning conflicts are avoided or minimized in the .NAT @ramework. Fser defined codes are released from the confines of the local storage systems and can e stored anywhere on a network and e"ecuted from any point in the network. Performance pro lems associated with scripted and interpreted environments are removed. (odes can e safely e"ecuted and the developer e"perience is consistent across widely varying types of applications# such as &indows ased applications and we ased applications. The thrust of design is towards creating a standard communication facility that is standardized so that .NAT codes can e integrated with other codes easily and seamlessly. 't the core of the .NAT infrastructure is the (ommon 7anguage )untime C(7)D and the .NAT @ramework class li rary. The runtime functions# like an agent# managing code at e"ecution time. It provides core services such as memory management# thread management and GremotingH. It enforces strict type safety and ensures code accuracy. This makes for security and ro ustness and provides a platform for running managed code. The .NAT @ramework provides several runtime hosts. It also supports the development of third%party runtime hosts. @or e"ample# '*P.NAT hosts the runtime to provide a scala le# server%side environment for managed code. '*P.NAT works directly with the runtime to ena le '*P.NAT applications and =27 &e services. The .NAT @ramework can e hosted y unmanaged components such as the Internet A"plorer. These load the common language runtime into their processes and initiate the e"ecution of managed code. This creates a software environment that can e"ploit oth managed and unmanaged features. This makes for mo ility of the code.

Advanta/e0 of (B.NET +. -3.NAT provides managed code e"ecution that runs under the (ommon 7anguage )untime C(7)D# resulting in ro ust# sta le and secure applications. 'll features of the .NAT framework are readily availa le in -3.NAT. ;. -3.NAT is totally o ject oriented. This is a major addition that -34 and other earlier releases didnEt have. .. The .NAT framework comes with '8?.NAT# which follows the disconnected paradigm# i.e. once the re$uired records are fetched the connection no longer e"ists. It also retrieves the records that are e"pected to e accessed in the immediate future. This enhances *cala ility of the application to a great e"tent. I. -3.NAT uses =27 to transfer data etween the various layers in the 8N'

'rchitecture i.e. data are passed as simple te"t strings. :. Arror handling has changed in -3.NAT. ' new Try%(atch%@inally lock has een introduced to handle errors and e"ceptions as a unit# allowing appropriate action to e taken at the place the error occurred thus discouraging the use of ?N A))?) 0?T? statement. This again credits to the maintaina ility of the code. 4. 'nother great feature added to -3.NAT is free threading against the -3 single% threaded apartment feature. In many situations developers need spawning of a new thread to run as a ackground process and increase the usa ility of the application.

INTRODUCTION TO BAC" END S'+ SER(ER $111


*B7 *erver is a data ase management system C832*D developed y 2icrosoft. *B7 *erver is relatively easy to manage through the use of graphical computing environment for almost every task of system and data ase administration. Feat)re0 of S'+ Server $111 Internet Inte/ration The *B7 *erver ;/// data ase engine includes integrated =27 support. It also has the scala ility# availa ility# and security features re$uired to operate as the data storage component of the largest &e sites. S a2a3i2it! and Avai2a3i2it! *B7 *erver ;/// Anterprise Adition supports features such as federated servers# inde"ed views# and large memory support that allow it to scale to the performance levels re$uired y the largest &e sites. Ea0e of in0ta22ation4 de#2o!ment4 and )0e *B7 *erver ;/// includes a set of administrative and development tools that improve upon the process of installing# deploying# managing# and using *B7 *erver across several sites. Ba .)# and re over! 832* must have a su system that is responsi le for recovery from hardware or software errors. @or e"ample# if a failure occurs while a data ase application updates a hundred rows of a ta le# the recovery su system must roll ack all previously e"ecuted updates to ensure that the corresponding data is consistent after the error occurs. Se )rit! and A)t,ori5ation *ecurity means that the data stored in a data ase is protected against any kind of unauthorized users or against a misuse. 'dditionally# some users may have only read access to the data# whereas others may have read and write access to the same data.

$. S%STEM STUD%
$.1 E6ISTIN7 S%STEM
The system# which is followed at present# is a partly computerized system. The system consists of various information related to the data security has to e maintained. In the e"isting system each and every time a reference should e made. There are no high possi ilities to commit errors and mistakes# which leads to produce the wrong statements to the management. )eport keeping is also not an easy work. Its @unctions such as Anumerating (omputers# 2essaging# and -ideo 2onitoring are not possi le to maintain the systems internally. The information provided y the present system has no communication with the administrators. $.1.1 DRA&BAC"S Aven though a part of it was computerized# the system has so many pitfalls. some of them are The lack of security Time consumption Perfect watching is not done y the administrators 2onitored details are not saved. (ontrolling of process is not possi le The e"isting system does not implement the restriction for the user to access data.

>

$.$ PROPOSED S%STEM


The proposed system of Net Informer and Priva ! "ee#er8 has messages to the desired system than that of the e"isting system. The proposed system allows security features y providing various right and privileges in according the data. 'll this aspects will ena le the usiness to function as an independent system. It also provides the latest technology em edded in the system# which will yield the desired result. een

incorporated the system details# such as 1ost name# IP address for )eceiving and sending

$.$.1 FEATURES
'dministers can find the computers on the network easily The system process can e start and stopped to control the systems. 2essage sending is possi le. -ideo files are saved in the ?utput file Fser friendly system 2aintenance of file is fle"i le. *tored data and procedures can e easily edited. )eports can e generated with case. The proposed system uses the ideal environment# windows environment# as it is the most popular multitasking system availa le today. The tool used to develop this proposed system was -3.NAT a 0FI for its fle"i ility and compati ility. The proposed system uses *B7 *erver# a data ase system with powerful 832* functions and easy accessing.

$.$.$ FEASIBI+IT% STUD%


Introd) tion ' feasi ility analysis involves a detailed assessment of the need# value and practicality of a systems development. @easi ility analysis forms the transparent decisions at crucial points during the developmental process as we determine whether it is operationally# economically and technically realistic to proceed with a particular course of action. @easi ility analysis can e used in each of the steps to assess the financial# technical and operational capacity to proceed with particular activities.

T!#e0 of fea0i3i2it!
' feasi ility analysis usually involves a thorough assessment of the financial CvalueD# technical CpracticalityD# and operational CneedD aspects of a proposal. In systems development projects# usiness managers are primarily responsi le for assessing the operational feasi ility of the system# and information technology CITD analysts are responsi le for assessing technical feasi ility. 3oth then work together to prepare a costK enefit analysis of the proposed system to determine its economic feasi ility. O#erationa2 fea0i3i2it! ' systems development project is likely to e operationally feasi le if it meets the EneedsE and e"pectations of the organization. Fser acceptance is an important determinant of operational feasi ility. It re$uires careful consideration of, (orporate culture! *taff resistance or receptivity to change! 2anagement support for the new system! The nature and level of user involvement in the development and implementation of the system! direct and indirect impacts of the new system on work practices! 'nticipated performance and outcomes of the new system compared with the e"isting system!

+/

Training re$uirements and other change management strategies! and GPay ackH periods Cie trade%off etween long%term organisational enefits and short%term inefficiencies during system development and implementationD.

Te ,ni a2 fea0i3i2it! ' systems development project may e regarded as technically feasi le or practical if the organization has the necessary e"pertise and infrastructure to develop# install# operate and maintain the proposed system. ?rganizations will need to make this assessment ased on, 5nowledge of current and emerging technological solutions! 'vaila ility of technically $ualified staff in%house for the duration of the project and su se$uent maintenance phase! 'vaila ility of infrastructure in%house to support the development and maintenance of the proposed system! &here necessary# the financial and9or technical capacity to procure appropriate infrastructure and e"pertise from outside! (apacity of the proposed system to accommodate increasing levels of use over the medium term! The capacity of the proposed system to meet initial performance e"pectations and accommodate new functionality over the medium term. E onomi fea0i3i2it! ' systems development project may e regarded as economically feasi le or good value to the organization if its anticipated enefits outweigh its estimated costs. 2any development costs are easier to identify. These costs may include the time# udget and staff resources invested during the design and implementation phase# as well as infrastructure# support# training and maintenance costs incurred after implementation. Nonetheless# it can also e difficult to accurately $uantify project costs when new technologies and comple" systems are involved. In these high%risk situations it may e

++

appropriate to use sophisticated cost% enefit analysis tools to make appropriate assessments of financial feasi ility.

+;

9. S%STEM DESI7N AND DE(E+OPMENT


9.1 INPUT DESI7N
Fser type a keyword in the search te"t o" for finding corresponding files from peers. If user does not type any keyword# then a message is displayed indicating the user to type a keyword. 'fter entering the keyword# the user must choose any of the options like documents# audio# video# image# code or software. when a user select document as the option then only the file types like .doc#.t"t etc for the related keyword are retrieved. The keyword is searched in one peer and if it is matched then those files are displayed# otherwise the search is continued in another peer. If the file is availa le# it is displayed. *imilarly# it searches all the peers connected with the networks and display the files that are found. Fser can also enter the minimum and ma"imum size of the file. The results will e displayed with the @ile name# 7ocation and *ize of file. The locations show the different peers in the network. Fser can select a searched file# and copy it and paste it to the local system. The user can also dou le click the file to view the selected file or open the containing folder of a searched file. Fser can also stop the search process while searching for a given keyword and clear the searched files from results panel y choosing the clear list option from the search menu. The peerlist option in settings menu shows the list of peers that are active in the network. Fsers can also add or remove file e"tensions for various options like video# audio etc.

+.

9.$ OUTPUT DESI7N


The output is designed to search and retrieve the documents# video# audio# image# software# code and all files9folders in peer to peer system in a network. (opy the searched file to local system and also view that files. The results are displayed ased on the keyword# the option chose# and also upon the file size specified.

The output of the system# if it differs from what was re$uired# it is due to an error. This output can e some numeric or alpha etic value# some formatted report# or some specific ehavior from the system. In case of an error there may e change in the format of out# some une"pected on developerEs part. ehavior from system# or some value different from the e discovered efore the system is e"pected is o tained. These errors can due to wrong analysis# wrong design# or some fault 'll these errors need to implemented at the customerEs site. Re#ort0 (harts for etter representation of data )eports can e customize on certain level Password protected reports *ummary reports for the e"act picture of the property at a particular time )eceipt or @olio printing @le"i le automatic invoice printing if desired

+I

9.9 DATABASE DESI7N


The most important aspect of uilding candidate system is data ase design. Instead of each program managing its own data# the authorized persons share data across applications with data ase software managing the data as an entity. It is a logical development# in the methods used y the computers to access and manipulates data stored in the various parts of computer system. It is information from several files is coordinated accessed and operated upon as though it is a single file. ' data ase is collections of inter related data stored with a minimum redundancy to serve many users $uickly and efficiently. The o jective is to make information access easy and $uick# ine"pensive and fle"i le to the Fser. Normalization is the process of efficiently organizing data in a data ase. There are two goals of the normalization process, eliminating redundant data Cfor e"ample# storing the same data in more than one ta leD and ensuring data dependencies make sense Conly storing related data in a ta leD. 3oth of these are worthy goals as they reduce the amount of space a data ase consumes and ensure that data is logically stored.

+:

9.: S%STEM DE(E+OPMENT


T,ere are Five Mod)2e0 in t,i0 Pro;e t 1. Net-or. En)meration $. Net-or. Me00a/in/ 9. (ideo Monitorin/ :. (ie- Servi e0 <. (ie- S,ared Re0o)r e0 Net-or. En)meration This module helps to find the computers are the network. The 1ost name# IP 'ddress is received for the computers stayed on the network. The Process name# the responding Id# *ession Id are retrieved on the monitoring resources. This allows the processes to start and stop. The Navigation of the system found on the network can e possi le. Net-or. Me00a/in/ The 2essages can e sent to the systems which are roaming in the network. The 1ost name is selected and a message window is appeared and the message typed and send to the target system (ideo Monitorin/ The -ideo is captured on the selected system and the output file is saved as .avi C'udio -ideo InterfaceD @ormat. The -ideo file is played from the saved selection. The video stored on the ?utput folder will contain monitored information. Avery detail regarding the network will e stored on the system. (ie- Servi e0 This module can help control our pc from any remote area e"ample to view the services in the systems on the network. The services provided on the various systems on the network can e viewed. (ie- S,ared Re0o)r e0 In this module can shows the various shared resources on the network. The -arious resources shared on the network is captured and notified to the users.

+4

:. S%STEM TESTIN7 AND IMP+EMENTATION


:.1 S%STEM TESTIN7
It is the stage of implementation# which ensures that system works accurately and effectively efore the live operation (ommences. It is a confirmation that all are correct and opportunity to show the users that the system must e tested with te"t data and show that the system will operate successfully and produce e"pected results under e"pected conditions. 3efore implementation# the proposed system must e tested with raw data to ensure that the module of the system works correctly and satisfactorily. The system must e tested with valid data to achieve its o jective. The purpose of system testing is to identify and correct errors in the candidate system. 's important as this phase is# it is one that is fre$uently compromised. Typically# the project the schedule or the user is eager to go directly to conversion. 'ctually# testing is done to achieve the system goal. Testing is vital to the parts of the system are correct! the goal will e successfully achieved. Inade$uate testing or non% testing leads to errors that may not appear until months later.

&,ite 3o= te0tin/


&hite o" testing# sometimes called glass% o" testing is a test case design method that uses the control structure of the procedural design to design to derive test cases. Fsing white o" testing methods# the software engineer can derive test cases. +. 0uarantee that all independent paths within a module have een e"ercised at least once. ;. A"ercise all logical decisions on their true and false sides. .. A"ecute all loops at their oundaries and within their operational ounds. I. A"ercise internal data structures to ensure their validity.

B2a . 3o= te0tin/


3lack o" testing# also called ehavioral testing# focuses on the functional re$uirements of the software. That is# lack o" testing ena les the software engineer to derive sets of input conditions that will fully e"ercise all functional re$uirements for a +>

program. 3lack o" testing is not an alternative to white o" techni$ues. )ather it is a complementary approach that is likely to uncover a different class of errors than white o" methods. 3lack o" testing attempts to find errors in the following categories. a. Incorrect or missing functions . Interface errors c. Arrors in a data structures or e"ternal data ase access d. 3ehavior or performance errors e. Initialization and termination errors. It is the stage of implementation# which ensures that system works accurately and effectively efore the live operation commences. It is a confirmation that all are correct and opportunity to show the users that the system must e tested with te"t data and show that the system will operate successfully and produce e"pected results under e"pected conditions. *oftware testing is a crucial element of software $uality assurance and represents the unlimited review of specification# design and coding. Testing represents an interesting anomaly for the software. 8uring earlier definition and development phase# it was attempted to uild software from an a stract concept to a tangi le implementation.

Unit te0tin/
Fnit tests perform asic tests at component level and test a specific usiness process# application# and9or system configuration. Fnit tests ensure that each path of a usiness process performs accurately to the documented specifications# functionality and contains clearly defined inputs and e"pected and e"pected results. The unit testing is conducted y preparing the following reports FTP K unit test plan FTP Preparation CTest *cenariosD FTP )eview FTP )esults

+6

@or e"ample we can take the login page and test y unit testing. In FTP Preparation Test *cenarios all the links in the page is taken for test. In FT? review all the links are tested for its target page or the result. In FTP result the testing results for all the links tested is given as passed or failed and if any error then it is noted to the particular developer and corrected. ' program represents the logical elements of a system. @or a program to run satisfactorily# it must compile and test data correctly and tie in properly with other programs. 'chieving an error free program is the responsi ility of the programmer. Program testing checks for two type of errors, synta" and logical. *ynta" error is a program statement that violates one or more rules of the language in which it is written. 'n improperly defined field dimension or error messages were generated computer. 7ogic error deals with incorrect data fields# out%of range items# and invalid com inations. *ince diagnostics do not determine logic errors the programmer must e"amine the output carefully. y the

O)t#)t Te0tin/
-arious outputs have een generated y the system. The system generated output and the desk%calculated values have een compared. 'll the output is perfect as the company desires. It egins with low volumes of transactions ased on live tone. The volume is increased until the ma"imum level for each transaction type is reached. The total system is also tested for recovery and fall ack# after various major failures to ensure that no data are lost during the emergency time.

Inte/ration te0tin/
Integration tests are done to test integrated software components were individually satisfactory# as shown y successful unit testing! the com ination of components is correct and consistent. Integration testing is specifically aimed at e"posing the pro lems that arise from the com ination of components.

+J

:.$ S%STEM IMP+EMENTATION


*ystem Implementation is the stage of the project when the theoretical design is tuned into working system. If the implementation system stage is not carefully controlled and planned# it can cause chaos. Thus it can e considered to e the most critical stage in achieving a successful new system and in giving the users a confidence that the system will work and e effective. The implementation stage in a project involves# (areful Planning investigation of the current system# checking constraints and the implementation. Training the staffs in the newly developed system. (ustomers also enefited through the developed system ' software application in general is implemented after navigating the complete life cycle method of a project. -arious life cycle processes such as re$uirement analysis# design phase# verification# testing and finally followed y the implementation phase results in a successful project management. 's the software is to e implemented in a high standard industrial sector# various factors such as application environment# user management# security# relia ility and finally performance are taken as key factors through out the design phase. These factors are analyzed step y step and the positive as well as negative outcomes are noted down efore the final implementation. *ecurity and authentication is maintained in oth user level as well as the

management level. The data is stored in *B7 *erver as )832*# which is highly relia le and simpler to use# the user level security is managed with the help of password options and sessions# which finally ensures that all the transactions are made securely.

;/

:.9 S%STEM MAINTENANCE


'll system is dynamic and su jects to constantly changing re$uirements. Affort must e devoted to adapting them and design must e fle"i le specified so that such changes can e easily implemented. This activity is called system maintenance. It includes improvement of system functions and correction of errors. SECURIT% Providing a user id and password to the users ensures security. *eparate login is maintained for administrators and guests. ?nly administrators are allowed to do changes in the project. They have all the rights to add# retrieve records. ?ther users are given only the rights to view the records. The users are not allowed to make any changes in the project. S!0tem Ba .)#0 3ack up for the entire data ase files are taken and stored in secondary storage devices like magnetic tapes and disks so that it is possi le to restore the system at the earliest. If there is a reakdown or collapse# then the system gives provision to restore data ase files. *toring data in a separate secondary device leads to an effective and efficient maintains of the system. Fi2e Maintenan e The master file has flags for maintains. 'fter the mentioned period# the rejection suppliers# unused data in the files will e deleted in the master file. This method is the increasing the memory to store the data. Amendment Pro ed)re *ystem should not e changed causally following informal re$uest. (hanges in one may affect others. To avoid unauthorized amendments# all re$uests for change must e channeled to an arson nominated y management. The person who initiates The specific file# amendment process must determine which system is involved. documents and procedures must e identified.

;+

T,e form for a)t,ori5in/ and ontro22in/ amendment0 are> 'mendment notification K it is used to accurately define and justify. 'mendments log K it records the estimated and actual completion of each activity defined y the author. 'mendment list K it provides a permanent record of all amendments made to documents within a documentation file. S!0tem A)dit It is an investigation to review performance of an operational system! to compare the actual with planned performance! to verify that started o jectives of system are still valid in present environment! and to evaluate the achievement of o jectives.

The initial system audit checks whether the o jectives and

enefits in the

feasi ility study have achieved. *u se$uent audits# carried out# as part of regular reviews of systems will e concerned with the continued achievement of enefits# any deviation from the master system specification and opportunities for improvement.

;;

<. CONC+USION
<.1 CONC+USION
The goal of the project Net Informer and Priva ! "ee#er successfully achieved. The implementation and testing has een done in a step% y%step process. Aach module has een developed and tested individually to o tain the necessary re$uired output in the desired form. The project has een done as user%friendly. The software developed has een designed and run to satisfy the re$uirements and needs of the organization as well as the end users. The system reduces the manual work of maintenance of the records. It has also resulted in $uick retrieval and reference of re$uired information# which is vital to the degrees of the organization. The entire system is documented and can e easily understood y the end users. The form are very user friendly and also easy to handle even y the eginners with very little effort and guidance

;.

<.$ FUTURE ENHANCEMENT


(onsidering chance that in future the need of the organization may increase develops this software. (oding is done in a way that when a change is made to the data ase ta le it can e easily. 's the codes are effectively documented and the codes are made as reusa le# the system is highly fle"i le to any future changes. The system can provide clear information to the user and any change could e made in the system easily. The main possi ility that can occur is the introduction of more information or field for the effective processing. 'nother possi ility is the user may re$uire more data. The ta les were created considering this possi ility into mind. *ince the system is developed in a structured manner# we can introduce new change with slight modification

Though the new system provides a 5eeping this in view# a provision has

ase for improving the efficiency of e added to this project.

operations# there are lots of further enhancements that can

een made in the system to facilitate easy

modification9updating in the future. 'ny modification will not affect the normal working of the system. The system can e implemented as an online application with more fle"i ility. (onsidering chance that in future the need of the organization may increase develops this software. (oding is done in a way that when a change is made to the data ase ta le it can e easily. 's the codes are effectively 8ocumented and the codes are made as reusa le# the system is highly fle"i le to any future changes.

;I

BIBI+IO7RAPH%
+. @)'N(A*(? 3'7AN'# Pro/rammin/ Mi ro0oft (i0)a2 Ba0i .NET (er0ion $11<# 3P3 pu lications ;//> Adition ;. 3I77 A-<AN# 3I77L 1?77I*# )?(5@?)8 71?T5'# 'N8 TI2 2((')T1L Profe00iona2 (B.NET $11<# .rd Adition .. A7I'*. 2. '&'8# S!0tem Ana2!0i0 and De0i/n# 0algotia Pu lications +JJ> Adition. I. <?L(A (?= 'N8 P?77L F)3'N# Introd) tion to S'+ Server $111 3P3 pu lications +JJ6 Adition :. )?0A) *.P)A**2'N. Soft-are En/ineerin/. Tata 2c0raw%1ill Pu lishing company# -th Adition# ;//+. 4. 8 2 81'281A)A. S!0tem0 Pro/rammin/ and O#eratin/ S!0tem0. Tata 2c0raw%1ill Pu lishing (ompany# II Adition# ;//;.

>. ?Mi ro0oft S'+ Server $111 Un2ea0,ed8

y )ay )ankins# Paul 3ertucci#

Paul <ensen I*3N, /4>;.;I4>J Pu lished y. *ams Pu lishing

;:

APPENDI6
A. DATA F+O& DIA7RAM
This is concerned with the transformation of re$uirements into data Msoftware architecture various notation are used in this stage. The most fre$uently used category of architectural design notation is directed graphs. There includes 8@8Hs# pertinence etc. The 8ata @low 8iagram is used as graphical notation to depict information flow. The o jective of this method is the derivation to program structure analysis and design. 8@8 is a structural analysis and design. It descri es the flow of data through out a system.

DFD S%MBO+S,

8efines a *ource or destination of a system.

Identifies data flow# data in motion

)epresents a process that transforms incoming data flow into out going dataflow. 8ata store at rest# temporary repository of data.

;4

Data F2o- Dia/ram

+E(E+ 1 )ABFA*T 'dmin Net Informer )A*P?N*A 0ANA)'7 )AP?)T*

+E(E+ 1
0 8IN @IN

(omputers

2? NIT ?)

IN0

'dmin -ideo

-ideo Interface
**IN0 P)?(A

;>

+eve2 $ (omputers @inding 'uthorized 'dmin Fser on Network

Process *ending 2essages

8isplays

2onitoring

-ideo Interface

*ervices

-iews

*hared )esources

Net Informer and Privacy 5eeper

;6

B. TAB+E DESI7N
Ta32e Name@ Admin +o/in Primar! "e!@ Admin Name FIE+D NAME '%Name '%Pass DATA T%PE -archar -archar ;/ +: SIAE DESCRIPTION 'dmin Name 'dmin Password

Ta32e Name @ Traffi Contro2 Primar! "e! @ TC*Code FIE+D NAME T(%(ode T(%8ate Traffic )ank IP'ddress (hange IP 'dd DATA T%PE -archar 8ate9Time Numeric -archar -archar +/ 6 J ;: ;: SIAE DESCRIPTION Traffic (ontrol (ode Traffic (ontrol 8ate Traffic )ank IP 'ddress (hange IP 'ddress

Ta32e Name @ Find Com#)ter0 Primar! "e! @ Ho0tName FIE+D NAME 1ostName IP'ddress DATA T%PE -archar -archar ;/ ;/ SIAE DESCRIPTION 1ost Name IP 'ddress

;J

Ta32e Name @ Com#)ter Pro e00

FIE+D NAME Process Name (aption )esponse *ession I8

DATA T%PE -archar -archar -archar -archar ;/ :/ ;/ ;:

SIAE

DESCRIPTION (omputer Process Name *ystem (aption )esponse *ession I8

Ta32e Name @ Me00a/in/

FIE+D NAME 1ostName 2essage

DATA T%PE -archar -archar ;/ :/

SIAE

DESCRIPTION 1ost Name 2essage

./

C. SAMP+E CODIN7
Im#ort0 S!0tem.Net Im#ort0 S!0tem.Net.Dn0 P)32i C2a00 frmMDIMain In,erit0 S!0tem.&indo-0.Form0.Form Private S)3 frmMDIMainBC2o0in/CB!(a2 0ender A0 O3;e t4 B!(a2 e A0 S!0tem.Com#onentMode2.Can e2EventAr/0D Hand2e0 M!Ba0e.C2o0in/ BuitCD e.(ancel N True End S)3 Private S)3 3tFindCom#)ter0BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tFindCom#)ter0.C2i . 8im Ne 's New NetAnum 8im Ns 's NetAnum.Net)esource 8im i 's Integer 8im tIP1ostAntry 's IP1ostAntry 8im tIP'ddress 's *tring If Ne.?penCD Then 2e.(ursor N (ursors.&ait(ursor @or i N + To Ne.(ount Ns N Ne.Ne"t tIP'ddress N OO If Try tIP1ostAntry N )esolveCNs.)emoteName.*u stringC;DD Ns.8isplayType N NetAnum.)A*?F)(AP8I*P7'LTLPA.)A*?F)(A8I*P7'LTLPAP*erver Then

.+

tIP'ddress N tIP1ostAntry.'ddress7istC/D.To*tring (atch e" 's A"ception tIP'ddress N OC?fflineDO And Try lv(omputers.Items.'ddCNs.)emoteNameD lv(omputers.ItemsC/D.*u Items.'ddCtIP'ddressD And If Ne"t i 2e.(ursor N (ursors.8efault And If Ne.(loseCD End S)3 Private S)3 3t7oBC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3t7o.C2i . If lv(omputers.*electedItems.(ount Q / Then (urrent(omputerName N lv(omputers.*electedItems.ItemC/D.Te"t *tatus3ar.PanelsC+D.Te"t N O(omputer, O R (urrent(omputerName If lv(omputers.*electedItems.ItemC/D.*u Items.(ount Q + Then (urrent(omputerIP N lv(omputers.*electedItems.ItemC/D.*u ItemsC+D.Te"t And If And If If (urrent(omputerName N OO Then (all 2sg3o"CO*elect a (omputerO# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD t@ind(omputers.@ocusCD A"it *u And If @indProcessesCD End S)3

.;

F)n tion FindPro e00e0CD 8im t2achineName 's *tring N (urrent(omputerName If 2idCt2achineName# +# ;D N OSSO Then t2achineName N 2idCt2achineName# .D And If 8im tProcessesCD 's Process 8im i 's Integer 8im lvwP 's 7ist-iewItem Try lvProcess.Items.(learCD tProcesses N Process.0etProcessesCt2achineNameD @or i N / To F3oundCtProcessesD lvwP N lvProcess.Items.'ddCtProcessesCiD.ProcessName.ToFpperD If t2achineName TQ *ystem.Anvironment.2achineName Then lvwP.*u Items.'ddCOOD lvwP.*u Items.'ddCOOD lvwP.*u Items.'ddCtProcessesCiD.IdD Alse lvwP.*u Items.'ddCtProcessesCiD.2ain&indowTitleD lvwP.*u Items.'ddCtProcessesCiD.)espondingD lvwP.*u Items.'ddCtProcessesCiD.IdD And If Ne"t l lProcesses.Te"t N OProcesses, O R TrimC*trClvProcess.Items.(ountDD (atch lvProcess.Items.'ddCOArror Anumerating ItemsOD And Try End F)n tion

..

Private S)3 3tStartBC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tStart.C2i . timer2ain.Interval N Process2onitoringInterval timer2ain.Ana led N True End S)3 Private S)3 timerMainBTi .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 timerMain.Ti . @indProcessesCD End S)3 Private S)3 3tSto#BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tSto#.C2i . timer2ain.Ana led N @alse End S)3 Private S)3 3tEndPro e00BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tEndPro e00.C2i . If lvProcess.*electedItems.(ount Q / Then 8im Prc 's Process 8im t2achineName 's *tring N (urrent(omputerName If 2idCt2achineName# +# ;D N OSSO Then t2achineName N 2idCt2achineName# .D And If If t2achineName N *ystem.Anvironment.2achineName Then Try Prc Process.0etProcess3yIdClvProcess.*electedItemsC/D.*u ItemsC.D.Te"tD Prc.5illCD N

.I

lvProcess.Items.)emoveClvProcess.*electedItems.ItemC/DD l lProcesses.Te"t N OProcesses, O R TrimC*trClvProcess.Items.(ountDD (atch (all 2sg3o"CO(ould not close ProcessO# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD And Try Alse E(all 2sg3o"CO(ould not close Processes on a )emote 2achine.O# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD And If And If End S)3 Private S)3 3tNet-or.Me00a/in/BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tNet-or.Me00a/in/.C2i . If lv(omputers.Items.(ount N / Then (all 2sg3o"CONo (omputersO# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD t@ind(omputers.@ocusCD A"it *u And If tfrmNetwork2essaging.*how8ialogCD End S)3 Private S)3 3t(ideoMonitorin/BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3t(ideoMonitorin/.C2i . If lv(omputers.Items.(ount N / Then (all 2sg3o"CONo (omputersO# 2sg3o"*tyle.(ritical ?r 2sg3o"*tyle.?5?nly# strTitleD t@ind(omputers.@ocusCD

.:

A"it *u And If tfrm-ideo(apture.*how8ialogCD End S)3 Private S)3 3tServi e0BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tServi e0.C2i . tfrm*ervices.*how8ialogCD End S)3 Private S)3 3tS,are0BC2i .CB!(a2 0ender A0 S!0tem.O3;e t4 B!(a2 e A0 S!0tem.EventAr/0D Hand2e0 3tS,are0.C2i . tfrm*hares.*how8ialogCD End S)3 End C2a00

.4

D. SAMP+E INPUT

.>

.6

.J

I/

I+

I;

I.

Anda mungkin juga menyukai