Documente Academic
Documente Profesional
Documente Cultură
ABSTRACT
1. ABSTRACT
This project is to implement the Client-Server Protocol Implementation. The
dream global communication is solved in a great deal by the introduction of Internet.
This made the necessity of networking in communication clear. The internet protocol
TCP/IP uses computers called gateways, which provide all interconnections among
physical networks. A gateway is a special purpose, dedicated computer that attaches to
two or more networks and routes packets from one to other. It will be having the
information regarding the network connected to it. The gateways exchange routing
information periodically to accommodate network changes and keeps their route upto-date.
This protocol permits a new core gateway to be added to the internet without
modifying the existing gateways. Whenever a new core gateway is added to the
existing internet it will be assigned to one or more neighbours with which it
communicates, the neighbours already members of the working internet have already
propagated routing information among themselves. Thus the gateway has to inform its
neighbours about the network it could reach so that they can update the routing table
and propagate the information to the remaining gateways in the internet.
INTRODUCTION
2. INTRODUCTION
2.1 Purpose:
The aim of this project is to implement Client Server Protocol Implementation.
The purpose of the project is to communicate between clients that are connected to
different servers.
2.2 Scope:
Adding and deleting a network to a gateway
Creating and displaying a route table for a gateway
Sending and updating the routing message
Create a log file
ICMP implemented for error correction and reporting
PROBLEM
DEFINITION
3. PROBLEM DEFINITION
INTRODUCTION
This project is to implement the client server protocol implementation by
using gateways.
SYSTEM
ANALYSIS
4. SYSTEM ANALYSIS
A graphical tool used to describe and analyze the moment of data through a
system manual or automated including the process, stores of data, and delays in the
system. Data Flow Diagrams are the central tool and the basis from which other
components are developed.The transformation of data from input to output, through
processes, may be described logically and independently of the physical components
associated with the system. The DFD is also know as a data flow graph or a bubble
chart.
Context Diagram:
The top-level diagram is often called a context diagram. It contains a single
process, but it plays a very important role in studying the current system. The context
diagram defines the system that will be studied in the sense that it determines the
boundaries. Anything that is not inside the process identified in the context diagram
will not be part of the system study. It represents the entire software element as a
single bubble with input and output data indicated by incoming and outgoing arrows
respectively.
1. Physical DFD
Structured analysis states that the current system should be first understand
correctly. The physical DFD is the model of the current system and is used to ensure
that the current system has been clearly understood. Physical DFDs shows actual
devices, departments, people etc., involved in the current system
2. Logical DFD
Logical DFDs are the model of the proposed system. They clearly should
show the requirements on which the new system should be built. Later during design
activity this is taken as the basis for drawing the systems structure charts.
10
DFD Symbols:
Dataflow:
Data move in a specific direction from an origin to a Destination.
Process:
People, procedures, or devices that use or produce (Transform) Data. The
physical component is not identified.
Source:
External sources or destination of data, which may be People , programs,
organizations or other entities.
Data Store:
Here data are stored or referenced by a process in the System
11
CONTEXT DIAGRAM
12
Level 1 Diagram
13
Level 2 Diagram
14
Level 2 Diagram
15
Level 2 Diagram
16
17
18
SEQUENCE DIAGRAMS
19
20
CLASS DIAGRAM
21
COLLABORATION DIAGRAMS
22
23
4.3 MODULES
Gateway module
Routing module
Display module
ICMP module
24
GATEWAY MODULE:
In this module we provide mechanisms for adding a new network to a
Gateway and deleting the existing network from the Gateway and displaying a routing
table for a Gateway.
ROUTING MODULE:
In this module there are three methods first, to create a route message, second
sending a routing message to other gateways, third updating the routing message.
DISPLAY MODULE:
In this module we develop an application program to know the date and time
the routing table is transferred to other gateway.
ICMP MODULE:
In this module the errors occurred by the invalid inputs given by the user or
any unexpected circumstances is reported to the gateway by using ICMP protocol.
25
Economic feasibility
Operational feasibility
Technical feasibility
26
Economic Feasibility:
This procedure is to determine the benefits and savings that are expected from
a candidate system and compare them with costs. If benefits outweigh costs, then the
decision is made to design and implement the system. Otherwise, further justification
or alterations in proposed system will have to be made if it is to have a chance of
being approved. This is an ongoing effort that improves in accuracy at each phase of
the system life cycle.
Operational Feasibility:
People are inherently resistant to change, and computers have been known to
facilitate change. It is understandable that the introduction of a candidate system
requires special effort to educate, sell, and train the staff on new ways of conducting
business.
Technical Feasibility:
Technical feasibility centers on the existing computer system (hardware,
software, etc.,) and to what extent it can support the proposed addition. If the budget
is a serious constraint, then the project is judged not feasible.
27
SOFTWARE
REQUIREMENT
SPECIFICATION
28
defined.
The models that depict information, function and behavior must be partitioned in a
29
30
Hardware Interfaces:
We use TCP/IP protocol for establishing connection and transmitting data over
the network. We use Ethernet for LAN.
Software Interfaces:
We use Oracle for storing database of clients who connects to the server
through JDBC & ODBC.
Security Requirements:
We provide authentication and authorization by passwords for each level of
access.
We implement IDEA algorithm for secure data transmission.
32
DOCUMENT DESIGN
33
6.DOCUMENT DESIGN
Hardware Requirements:
Processor
RAM
64MB to 512MB
Hard Disk
20GB to 80GB
Language
J2SDK 1.4.0
Protocols
TCP/IP, ICMP
Operating System
Windows NT/98/2000/XP
Software Requirements:
34
ABOUT SOFTWARE
7.ABOUT SOFTWARE
35
FEATURES OF JAVA :
36
JAVA IS PORTABLE:
One of the biggest advantages Java offers is that it is portable. An application
written in Java will run on all the major platforms. Any computer with a Java-based
37
JAVA IS OBJECT-ORIENTED:
38
To code, edit, debug and test the java programs, one needs to have a java
development environment. At the minimum this will consists of a java compiler
interpreter and applet viewer where applets can be tested.
Suns java development kit (JDK) latest version is 2.2 can be freely
downloaded from the Internet.Java compiler is available on DOS, Win95, WinNT,
Solaris and MAC etc.
The key considerations of Java are :
1. Object Oriented: Java purists everything is an object paradigm. The java object
model is simple and easy to extend.
2. Multithreaded: Java supports multithreaded programming which allows you to
write programs that do many things simultaneously.
3. Architecture-Neutral: the main problem facing programmers is that no guarantee
that if you write a program today, it will run tomorrow, even on the same machine.
Java language and JVM solves this problem, their goal is to provide Write once
Run anywhere anytime forever.
4. Distributed: Java is designed for the distributed environment of the Internet
because it handles TCP/IP protocols.
40
41
ABOUT
PROTOCOLS
42
8. PROTOCOLS
43
44
45
address. Gateway_Hosts is a file that is similar to that of the etc/hosts file that is
present in the system. It consists of the names and the corresponding IP addresses of
all the system names that are valid (like the loopback address, system IP etc.,) It can
be manipulated only by the system administrator.
Similarly Gateway_Hosts is the file for the entire network. It is present with the
server. Changes can be made to this file only by the network administrator under the
following conditions:
----addition of a new system into the network.
----deletion of a system from the network.
46
Once it is present in that file it is a valid client and the messages can be sent
and received from it by the server if not it is an invalid client and is discouraged by
sending an error message and it is not entered in the Hosts_Up.
Hosts_Up is a file in which all the nodes that are active to take part in the
communication are present. In order to make an entry into this file initially the
administrator has to Up it into the network after having received a signal from it if it
is not already present in the file.
So, if the clients IP so received happens to be a new valid IP it is checked for
its entry in the Hosts_Up file, if not present the file is updated with the name of the
system and the IP address.Now the session starts and both exchange information as
explained in TCP/IP and it also uses the TFTP for file transfer.
47
TESTING
48
9. TESTING
Software Testing is a critical element of software quality assurance and
represents the ultimate review of specification, design and coding, Testing presents an
interesting anomaly for the software engineer.
Testing Principles:
Test approach:
Testing can be done in two ways:
Bottom up approach
Top down approach
49
Bottom up Approach:
Testing can be performed starting from smallest and lowest level modules and
proceeding one at a time. For each module in bottom up testing a short program
executes the module and provides the needed data so that the module is asked to
perform the way it will when embedded with in the large system. When bottom level
modules are tested attention turns to those on the next level that use the lower level
once they are tested individually and then liked with the previously examined lower
level modules.
Topdown Approach:
This type of testing starts from upper level modules.Since the detailed
activities usually performed in the lower level routines are not provided stubs are
written.A stub is a module shell called by upper level module and that when reached
properly will return a message to the calling module indicating that proper interaction
occured.No attempt is made to verify the correctness of the lower level module.
Testing Stratergies:
A Strategy for software testing integrates software test cases into a series of
well planned steps that result in the successful construction of software. Software
testing is a broader topic for what is referred to as Verification and Validation.
Verification refers to the set of activities that ensure that the software correctly
implements a specific function. Validation refers he set of activities that ensure that
the software that has been built is traceable to customers requirements
50
Execute all loops at their boundaries and with in their operational bounds.
51
Top-down Integration:
Top down integrations is an incremental approach for construction of program
structure.
hierarchy, beginning with the main control program. Modules subordinate to the main
program are incorporated in the structure either in the breath-first or depth-first
manner.
Bottom-up Integration:
This method as the name suggests, begins construction and testing with atomic
modules i.e., modules at the lowest level. Because the modules are integrated in the
bottom up manner the processing required for the modules subordinate to a given
level is always available and the need for stubs is eliminated.
52
53
SCREENS
54
10.SCREENS
SUPERSERVER(GATEWAY):
55
SUPERSERVER:
56
SUPERSERVER(GATEWAY):
57
SERVER:
58
SERVER:
59
CLIENT:
60
CLIENT:
61
CLIENT:
62
CLIENT:
63
CLIENT:
64
CLIENT:
65
CONCLUSION
66
11. CONCLUSION
The main objective of the project, to interconnect different LANs through a
gateway and to maintain the record of various events and responses of the system is
achieved. This can be used in applications where in a communication between two or
more different networks is required.
Linux provides faster system-to-system communication than other operating
systems and the network happens to be highly secured from the administrators point
of view. The TCP / IP protocol developed in the course of this project is highly
reliable and deals with connection oriented systems.
Network security, which is the primary concern of todays communication
world, is successfully implemented using the IDEA algorithm. It provides a safe and
secure transmission as it involves multiple manipulations for encryption and so is it
with decryption.
The routing algorithm and the TFTP developed are linked with the modules of this
project, which finally resulted in the development of a Client-Server-Protocol-Impl.
67
BIBLIOGRAPHY
68
12. BIBLIOGRAPHY
Java Complte Reference 2.
Computer Networks, Third Edition - Andrew S. Tanenbaum
Modern Operating Systems - Andrew S. Tanenbaum
Software Engineering A Practitioner's Approach - Roger S. Pressman
An Integrated Approach to Software Engineering - Panjak Jalot
69