COMMUNICATION
INDEX
01. INTRODUCTION
4.1 NORMALIZATION
4.4 SFD/DFD
09. BIBLIOGRAPHY
CHAPTER 1
INTRODUCTION
Aim:
Synopsis:
SYSTEM ANALYSIS
FEASIBILITY CONSIDERATIONS
To do a feasibility study, the economic, technical and behavioral factors in the system
development were considered.
The project developed, Encryption and Decryption was within budget and
producing the desired results.The labor or the human ware consisted of the
three group members of our project. The output consisted of getting the
desired results. Thus with the consideration of the inputs, the outputs were
achieved successfully. The project was within limit. The inputs didn’t overdo
the outputs.
Technical feasibility revolves around the technical support of the project. The
main infrastructure of the project included the project labs in the college
campus. The systems there were easily able to absorb the new s/w being
installed.The project thus was technically feasible. The equipment and the s/w
produced no problem. The project’s technical requirements were met. The
project could be made to work correctly, fulfilling its task, with the existing
s/w and personnel.
We consider the five nodes or more. communicate the each other nodes,
unwanted node also will communicate to neighbour node.
We consider the situation of a sender who wants to securely transmit messages
to a group of receivers. The problem is how can the sender do this in an environment
with the following constraints:
1) A fully trusted dealer to generate keys for the group members is not
available;
2) It is hard to estimate who will send encrypted messages to the group
members;
3) The system is key escrow free;
4) The group is dynamic, that is, a user may join or leave the group.
It is worth noticing that broadcast encryption [9] may also perform a similar
function to AGKA. However, in a broadcast encryption system, a trusted dealer is
usually required to maintain the group. Even though some broadcast encryption
systems are free from trusted dealers, they cannot offer forward secrecy and/or key
escrow freeness.
2.3 PROPOSED SYSTEM
Here, We have to solve the problem in existing system. The Main concept in
project to generate the group key.
We first formalize the notion of dynamic IBAAGKA without key escrow. In
this model, a trusted KGC is employed to generate the long-term private keys of
group members. Then the members can establish a public group encryption key so
that they can securely receive messages encrypted with this group encryption key.
Further, we also allow users to leave and join the group.
Based on the strongly unforgeable stateful IBBMS scheme, we extend the
static protocol in [24] into a dynamic IBAAGKA protocol without key escrow. In the
dynamic protocol, we require a group manager to record the messages sent by other
members.
CHAPTER 3
SYSTEM CONFIGURATION
INTRODUCTION
Nodes. These schemes maximize their performance when all the vehicles
advertise correct information about their positions, but position errors may drastically
reduce the performance of the dissemination process. We present a proactive
cooperative
ASP.NET still use HTTP to communicate to the browser and back, but it
brings added functionality that makes the communication process much richer. If any
files have the appropriate extension or contain code, the server routes those files to
ASP.NET for processing prior to sending them out to the client. The script or code is
then processed and the appropriate content is generated for transmission back to the
browser/client. Because processing takes place before the results are delivered to the
user, all manner of functionality can be built-in such as database access, component
usage and the ordinary programmatic functionality available with scripting languages.
ASP.NET applications can be coded using a plain text edited such as notepad,
although this not the most efficient method to use. Developing all the other resources
that might be required for a particular ASP.NET application, especially for the user
interface, may involve range of specialized tools including image-editing programs,
database programs and HTML editors.
ASP.NET also enables you to separate HTML design from the data
retrieval mechanism. Therefore changing the HTML deign does not
affect the program that retrieve data from the databases. Similarly,
server-side scripting ensures that changing data sources does not
require a change in HTML documents.
FEATURES OF ASP.NET
The most important server you can install is internet information server
(IIS) because you will need it to run your ASP.NET applications. There a number of
other servers specifically designed to work with the .NET Framework.
3.5 SQL-SERVER
Design goals
History
During the development of the .NET Framework, the class libraries were
originally written using a managed code compiler system called Simple Managed C
(SMC). In January 1999, Anders Hejlsberg formed a team to build a new language at
the time called Cool, which stood for "C-like Object Oriented Language".[16]
Microsoft had considered keeping the name "Cool" as the final name of the language,
but chose not to do so for trademark reasons. By the time the .NET project was
publicly announced at the July 2000 Professional Developers Conference, the
language had been renamed C#, and the class libraries and ASP.NET runtime had
been ported to C#.
C#'s principal designer and lead architect at Microsoft is Anders Hejlsberg, who
was previously involved with the design of Turbo Pascal, Embarcadero Delphi
(formerly Code Gear Delphi and Borland Delphi), and Visual J++. In interviews and
technical papers he has stated that flaws in most major programming languages (e.g.
C++, Java, Delphi, and Smalltalk) drove the fundamentals of the Common Language
Runtime (CLR), which, in turn, drove the design of the C# language itself.
James Gosling, who created the Java programming language in 1994, and Bill
Joy, a co-founder of Sun Microsystems, the originator of Java, called C# an
"imitation" of Java; Gosling further claimed that "[C# is] sort of Java with reliability,
productivity and security deleted."Klaus Kreft and Angelika Langer (authors of a C++
streams book) stated in a blog post that "Java and C# are almost identical
programming languages. Boring repetition that lacks innovation," "Hardly anybody
will claim that Java or C# are revolutionary programming languages that changed the
way we write programs," and "C# borrowed a lot from Java - and vice versa. Now
that C# supports boxing and unboxing, we'll have a very similar feature in
Java."Anders Hejlsberg has argued that C# is "not a Java clone" and is "much closer
to C++" in its design.
C# used to have a mascot called Andy (named after Anders Hejlsberg). It was retired
on 29 Jan 2004.
SUMMARY OF VERSIONS
C# 2.O Generics
Partial types
Anonymous methods
Iterators
Null able types
C# 3.0 Implicitly typed variables
Implicitly typed arrays
Anonymous types
Extension methods
Query expressions
Lambda expressions
Expression trees
C# 4.0 Dynamic binding
Named and optional arguments
Generic co- and contra variance
C# 5.0 Asynchronous methods
Compiler As a Service
Features
Libraries
The C# specification details a minimum set of types and class libraries that the
compiler expects to have available. In practice, C# is most often used with some
implementation of the Common Language Infrastructure (CLI), which is standardized
as ECMA-335 Common Language Infrastructure (CLI).
The following is a very simple C# program, a version of the classic "Hello, world"
example:
using System;
class ExampleClass
Console.WriteLine("Hello, world!");
Hello, world!
Each line has a purpose:
using System;
The above line of code tells the compiler to use 'System' as a candidate prefix
for types used in the source code. In this case, when the compiler sees use of the
'Console' type later in the source code, it tries to find a type named 'Console', first in
the current assembly, followed by all referenced assemblies. In this case the compiler
fails to find such a type, since the name of the type is actually 'System.Console'. The
compiler then attempts to find a type named 'System.Console' by using the 'System'
prefix from the using statement, and this time it succeeds. The using statement allows
the programmer to state all candidate prefixes to use during compilation instead of
always using full type names.
class ExampleClass
Above is a class definition. Everything between the following pair of braces describes
ExampleClass.
This declares the class member method where the program begins execution.
The .NET runtime calls the Main method. (Note: Main may also be called from
elsewhere, like any other method, e.g. from another method of ExampleClass.) The
static keyword makes the method accessible without an instance of ExampleClass.
Each console application's Main entry point must be declared static. Otherwise, the
program would require an instance, but any instance would require a program. To
avoid that irresolvable circular dependency, C# compilers processing console
applications (like that above) report an error if there is no static Main method. The
void keyword declares that Main has no return value.
Console.WriteLine("Hello, world!");
This line writes the output. Console is a static class in the System namespace.
It provides an interface to the standard input, output, and error streams for console
applications. The program calls the Console method WriteLine, which displays on the
console a line with the argument, the string "Hello, world!".
Implementations
ADO.NET
Features of ADO.NET
Interaction with the database is done through data commands – All operations on
the database are performed by using data commands. A data command can be a SQL
statement or a stored procedure. We can retrieve, insert, delete or modify data from a
database by executing data commands.
To create a database determines the name of the database, its owner (the
user who creates the database), its size, and the files and file groups used to store it.
Primary files: These files contain the startup information for the database.
The primary files are also used to store data. Every database has one primary
file.
Secondary files: These files hold all the data that does not fit in the primary
data file. Databases do not need secondary data files if the primary file is
large enough to hold all the data in the database. Some databases may be
large enough to need multiple secondary data files, or they may use
secondary files on separate disk drives to spread the data across multiple
disks.
Transaction log: These files hold the log information used to recover the
database. There must be at least one transaction log file for each database,
although there may be more than one. The minimum size for a log file is 512
kilobytes (KB).
When a database is created, all the files that comprise the database are filled
with zeros to overwrite any existing data left on the disk by previously deleted files.
Although this means that the files take longer to create, this action prevents the
operating system from having to fill the files with zeros when data is written to the
files for the first time during usual database operations. This improves the
performance of day-to-day operations.
The first step in creating a database is creating a plan that serves both as
a guide to be used when implementing the database and as a functional specification
for the database after it has been implemented. The complexity and detail of a
database design is dictated by the complexity and size of the database application as
well as the user population.
In planning the database, regardless of its size and complexity, use these basic steps:
Gather information.
GATHERING INFORMATION:
IDENTIFYING OBJECTS
During the process of gathering information, you must identify the key
objects or entities that will be managed by the database. The object can be a tangible
thing, such as a person or a product, or it can be a more intangible item, such as a
business transaction, a department in a company, or a payroll period. There are
usually a few primary objects, and after these are identified, the related items become
apparent. Each distinct item in your database should have a corresponding table.
The primary object in the pubs sample database included with Microsoft®
SQL Server™ 2000 is a book. The objects related to books within this company's
business are the authors who write the books, the publishers who manufacture the
books, the stores which sell them, and the sales transactions performed with the
stores. Each of these objects is a table in the database.
For this purpose, database developers use tools that range in technical
complexity from pencils and scratch paper to word processing or spreadsheet
programs, and even to software programs specifically dedicated to the job of data
modeling for database designs. Whatever tool you decide to use, it is important that
you keep it up-to-date.
SQL Server Enterprise Manager includes visual design tools such as the
Database Designer that can be used to design and create objects in the database.
Categorical columns
These columns classify or group the data and store a limited
selection of data such as true/false, married/single, VP/Director/Group
Manager, and so on.
Identifier columns
For example, the designer of the pubs database has created tables for
titles and publishers in the database. The titles table contains information for each
book: an identifier column named title_id; raw data columns for the title, the price of
the book, and the publishing date; and some columns with sales information for the
book. The table contains a categorical column named type, which allows the books to
be grouped by the type of content in the book. Each book also has a publisher, but the
publisher information is in another table; therefore, the titles table has a pub_id
column to store just the ID of the publisher. When a row of data is added for a book,
the publisher ID is stored with the rest of the book information.
Data Security
Designing Tables
When you design a database, you decide what tables you need, what
type of data goes in each table, which can access each table, and so on. As you create
and work with tables, you continue to make more detailed decisions about them.
The most efficient way to create a table is to define everything you need in the
table at one time, including its data restrictions and additional components. However,
you can also create a basic table, add some data to it, and then work with it for a
while. This approach gives you a chance to see what types of transactions are most
common and what types of data are frequently entered before you commit to a firm
design by adding constraints, indexes, defaults, rules, and other objects.
Columns in the table and the data type (and length, if required)
for each column.
SQL Server also contains many of the front-end tools of PC databases that
traditionally haven't been available as part of either mainframe or minicomputer
databases. In addition to using a dialect of Structured Query Language (SQL), GUI
applications can be used for the storage, retrieval, and administration of the database.
SQL Server permits client applications to control the information retrieved
from the server by using several specialized tools and techniques, including options
such as stored procedures, server-enforced rules, and triggers that permit processing
to be done on the server automatically. You don't have to move all processing to the
server, of course; you still can do appropriate information processing on the client
workstation.
You also can use a command-line interface to perform all operations with SQL
Server.
Introduction
a. Purpose
To solve the challenges facing in dissemination process. We present a
cooperative neighbor position verification (CNPV) protocol based on a proactive
approach to verify the correct location of neighbor and to send Warning Message
Dissemination..
Project Scope
Efficient schemes for warning message dissemination in vehicular ad hoc
networks (VANETs) use context information collected by vehicles about their
neighbor nodes to guide the dissemination process. Based on this information,
vehicles autonomously decide whether they are the most appropriate forwarding
Nodes. These schemes maximize their performance when all the vehicles advertise
correct information about their positions, but position errors may drastically reduce
the performance of the dissemination process. We present a proactive cooperative
Neighbor position verification protocol that detects nodes advertising false locations
and selects optimal forwarders to mitigate the impact of adversarial users. We
combine our mechanism with two warning dissemination schemes for VANETs and
demonstrate how the latter can benefit from the use of our security scheme in the
presence of malicious nodes trying to exploit known system vulnerabilities..
Overall Description
b. Product Perspective
.
User Classes and Characteristics
Module description:
1. Node Initialization.
2. Key Generation.
3. Message Sending.
Node Initialization:
To generate the more group node in node initialization. it have a one group
head that maintain the all node information. so any updation store the information in
group head first.
Key Generation:
First we create a group generation key. generate the private key and public key
in key generation due to security purpose. after that operation private key and public
key generate only a group key nodes.
Message Sending:
Sending the encrypt message to nodes its send only a group nodes. So
after we receive the message, message should decrypted. Its not sent the message to
ungroup node.
System Features
In the proposed system, we mainly focus on analyzing consumers’ needs for
new products. Many web logs deal with existing products. There, enterprises publish
descriptions of existing products in the internet and offer the possibility for readers to
leave comments. In general, consumers use this possibility to describe their
experiences and problems with the product. However, sometimes, suggestions for
new product features or even for completely new products are published.
User can interact with text area to enter the multiple line of
text.
c. Hardware Interfaces
Ethernet
Ethernet on the AS/400 supports TCP/IP, Advanced Peer-to-Peer
Networking (APPN) and advanced program-to-program communications (APPC).
ISDN
d. Software Interfaces
e. Communication Interfaces