Sie sind auf Seite 1von 20

SECURED NETWORK PACKET AUDITING SYSTEM

Project work by: P. SELVAM 6911261016

Project Guided by:


Dr. S. THIRUNIRAI SENTHIL MCA, M.Phil., Ph.D
Head of the Department Dept of Computer Science and Engineering PRIST UNIVERSITY, Puducherry.

INTRODUCTION
Area of Research - Transfer the data securely from Source to Destination without loss. Motivation of this Research Top 2 Concerns are: 1. Prevent the Network from traffic. 2. Ensure no Data loss at the destination.

ABSTRACT
The end-to-end nature of Internet congestion control is an important factor in its scalability and robustness. End-to-end congestion control algorithms alone are incapable of preventing the congestion collapse and unfair bandwidth allocations created by applications, which are unresponsive to network congestion. In this project, we propose and investigate a new congestion avoidance mechanism coupled with authenticated mode of data transfer called Secured Network Packet Auditing System (SNPAS).

SNPAS is a core-stateless congestion avoidance mechanism, which relies on the exchange of feedback between routers at the borders of a network in order to detect and restrict unresponsive traffic flows before they enter the network and to transmit the data securely by employing the cryptographic technique. This project helps to audit packets that are received or sent in a Network. It also ensures that the packets are transferred without loss in a network.

DRAWBACKS OF EXISTING SYSTEM


Packets are buffered in the routers present in the network which causes network traffic from undelivered packets arises when bandwidth is continuously consumed by packets that are dropped before reaching their ultimate destinations. Retransmission of undelivered packets is required to ensure no loss of data. Packets are undelivered due to the presence of Unfair bandwidth allocation in the Internet

ADVANTAGES OF PROPOSED SYSTEM


Buffering of packets is carried out in the edge routers rather than in the core routers . The packets are sent into the network based on the capacity of the network and hence there is no possibility of any undelivered packets present in the network. Absence of undelivered packets avoids overload due to retransmission. Fair allocation of bandwidth is ensured.

PHASE 1 Literature Survey. Implementing Data transfer to the Source router Module. Implementing Existing System. Analyzing Existing System Efficiency, Control Data loss. PHASE 2 Data transfer/Auditing All in one Tool Implementation. Comparing & Analyzing Proposed system with existing system. Adding User Interface in the Application. Placing Interface between Client and Server. Manual and Automated Testing with SW Test Automation Framework .

MY CONTRIBUTION

Literature Survey
Titles [1] YE TIAN, KAI XU, AND NIRWAN ANSARI TCP in Wireless Environments: Problems and Solutions IEEE Network Radio Communications, March 2008. [2] Purvang Dalal Dr. K.S. Dasgupta , TCP Performance Issues and
Related Enhancement Schemes over Network Environment , April 2012.

Work Done

1. In these Articles they showed that the TCP protocol employs congestion problem in networks. As a result the packets might be getting lost at the destination. 2. They introduced the slow start, fast recovery/fast retransmit, mechanisms that refer to avoid packet loss in networking. 3. Congestion collapse may be controlled by Sliding window.

Problem Identification Knowledge Gained

1. By studying this paper we can able to identify how congestion problem occurs in a network and how it can be resolved or prevented. From this paper I have studied the behavior of Data transfer over a network across routers to reach its ultimate destination and also how congestion problems can be resolved.

SOFTWARE REQUIREMENTS
Software : JAVA 1.3 Or Higher version
SWINGS

Operating System : WINDOWS XP or Higher Version

HARDWARE REQUIREMENTS
HARD DISK RAM PROCESSOR KEYBOARD MOUSE : : : : : 10 GB (Minimum) 128 MB (Minimum) PENTIUM III onwards TVS 108 keys Logitech (optical)

Project Modules

SOURCE MODULE The task of this Module is to send the packet to the Ingress router. INGRESS ROUTER MODULE An edge router operating on a flow passing it into a network is called an ingress router. ROUTER MODULE The task of this Module is to accept the packet from the Ingress router and send it to the Egress router. EGRESS ROUTER MODULE An edge router operating on a flow passing out of a network is called an egress router. DESTINATION MODULE The task of this Module is to accept the packet from the Egress router and store it in a file in the Destination machine.

ALGORITHM USED
LEAKY BUCKET
The leaky bucket analogy refers to a bucket with a hole in the bottom that causes it to "leak" at a certain rate corresponding to a traffic cell rate parameter.

TIME SLIDING WINDOW


The TSW is used to regulate the flow in regular time intervals using Rate Estimation algorithm. For each time slice if fixed packets are arrived it is transmitted. otherwise, waits until the packet is arrived.

FLOW DIAGRAM
Use case diagrams show the interaction between use cases, which represents system functionality, and actors, which represents the people or system that provide or receive information from the system.

Ingress router

Egress Router

Sender

Destination

Source

Router

Receiver

SYSTEM IMPLEMENTATION
SOURCE MODULE
Input Parameters:
Source Machine Name is retrieved from the OS. Destination Machine Name is typed by User. Message is typed by User.

Output Parameters:
Data Packets.

SOURCE WINDOW

INGRESS MODULE
Input Parameters:
Data Packets from Source Machine. Backward feedback from the Router.

Output Parameters:
Data Packets. Forward feedback.

INGRESS WINDOW

APPLICATIONS
This concept can be applied in LAN, WAN, MAN and in Internet in order to audit network packets and to prevent the traffic in the network. REFERENCE http://netresearch.ics.uci.edu Java Complete Reference Herbert Schildt

Thank U

Das könnte Ihnen auch gefallen