Overcomes the bottlenecks of the original architecture and propose improvements. Incurs minimal overhead in throughput, latency and jitter for achieving good performance than the existing system. Protects network bandwidth. Multi-hop topologies
Using third party software ( Antivirus , Firewall ..,) for detect and block
unwanted packet. Hackers easy to hack user pc. Antivirus does not identify a new protocol user, who updates an application in every virus.
Draw Backs
Time-consuming Complaints delay Tedious and Complex Slow updating and retrieval of information
Time consumed is reduced. On-the-fly content viewing. Parse and decode an variety of network protocol.
Start
A pair of filters
Yes
Start Filtering ?
Wait indefinitely
Pings devices.
Stop Stop
Flow Chart
Start
Yes
Start Sniffing ?
Wait indefinitely
Create sockets.
Stop
1) Flow of packets
Start
No
Port Busy ?
Stop
Stop
Flow Chart
1) Range of ports
Test Cases
Works well at the network layer. Incurs minimal overhead in throughput, latency and jitter. Protects network bandwidth and the end hosts in the presence of attackers. Creating multi-hop topologies. Achievement of better performance Faster data transfer rate. Provides efficient user interface.