Вы находитесь на странице: 1из 14

Padmashree Dr. D. Y.

Patil

Polytechnic

Dr. D. Y. Patil Vidyanagar Sector-7, Nerul, Navi Mumbai-400706

CHATSERVER SYNOPSIS
Group Members:
Bhavya Patel Vikram Choudhary Keshav Pagar Kiran Kharat

Guided By: Mrs. Pranita Sangit


INTRODUCTION:
This project is based on networking concepts which uses some protocols of ISO-OSI layer model. It uses FTP protocol which is an application layer protocol for file transfer. In todays world we need to share files among clients for work. Therefore this project particularly focuses on main applications so that basic need of organization will be fulfilled.

Lets discuss different modules that we have considered as a part our project. 1. File 2. Chat monitoring.

1st module provides facility to send files like text and document file. Maximum size of file to be transferred is 1.5MB. File can be sent by client to client or client to server or server to client. However at one time file can be sent only to one user. User sends file by mentioning the IP address of the receiver.

2nd Module provides chat monitoring to monitor chatting between clients. Clients chat based on their work and helps in doing project. Server can interrupt connection of clients.

AIM AND OBJECTIVES:


Aim:To work on project to improve network performance and data transfer for easy and secured sharing of files between different users. Chat monitoring allows server to monitor users.

Objective: Main objective is to promote sharing of files (computer programs and/or data), to encourage indirect or implicit (via programs) use of remote computers, to shield a user from variations in file storage systems among hosts. To transfer data reliably and efficiently FTP, though usable directly by a user at a terminal, is designed mainly for use by programs. The attempt in this

specification is to satisfy the diverse needs of users of maxi-hosts, mini-hosts, personal workstations, and TACs, with a simple and easily implemented protocol design.

One of the primary activities found on the Internet is the transferring of files. Every minute of every day, Internet users download files from various websites and Webmasters upload files and web pages to their website. The most common method for transferring files over the Internet is via the File Transfer Protocol, or FTP.

With the explosion of the public Internet and e-commerce, private computers, and computer networks, if not adequately secured, are increasingly vulnerable to damaging attacks. And all computer users, from the most casual Internet surfers to large enterprises, could be affected by network security breaches.

Data transmitted via any type of network can be subject to interception by unauthorized parties. The perpetrators might eavesdrop on

communications or even alter the data packets being transmitted. Perpetrators can use various methods to intercept the data. IP spoong, for example, entails posing as an authorized party in the data transmission by using the Internet Protocol (IP) address of one of the data recipients.

Information has become an organizations most precious asset. Organizations have become increasingly dependent on the information since more information is being stored and processed on network-based systems. Intrusion detection has become an integral part of the information security process. But it is not technically feasible to build a system with no vulnerabilities; intrusion detection continues to be an important area of research.

PROJECT PROBLEM AND RELEVANT KNOWLEDGE:


There are some problems that can be occurred during file transfer irrelevant of size and source of files. Here are some security issues and different attacks and some concepts about integrity and confidentiality

Security Issues 1. Attacks from malicious nodes. 2. Authentication & integrity. 3. Confidentiality.

Attacks External Attacks 1. Nodes from outside of network. 2. Network congestion. Internal Attacks 1. Already authenticated. 2. Exclusion mechanism

(Denial-Of-Service attacks) Authentication & Integrity 1. Authentication of client towards the network. 2. Authentication of nodes towards a group. 3. Problem: Certificate verification 4. A central authority might be unavailable. 5. Integrity of data, key needed. Table No.1: Security

needed.

Confidentiality 1. Group keys. 2. Predefined-what if node get compromised? 3. Created on-the-fly. 4. Each node give contribution there a node joins

Socket Programming:
Define: Socket Programming is use to send and receive file and text message
using port and protocol of client and server device

Some concepts: Port: Port number of device Protocol: How Client-Server interact with each other. Service interface: How upper layer Port (Server) interact with lower layer Port (Client)

To send: Socket, connect write

To receive: Socket, bind, listen, accept read TCP endpoint: IP address + port number

Client Server Model:


The clientserver model is a distributed application structure in computing that partitions tasks or workloads between the providers of a resource or service, called servers, and service requesters, called clients. Often clients and servers communicate over a computer network on separate hardware, but both client and server may reside in the same system. A server is a host that is running one or more server programs which share their resources with clients. A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await incoming requests. The clientserver model was developed at Xerox PARC during the 1970s. It is now prevalent in computer networks. Email, the Web, network are typical examples of the model.

PROPOSED SYSTEM:
We propose a system of FTP after the failure of security protection like firewalls. While transferring data we use the traditional method of cryptography and file compression to avoid any security risks while transferring the confidential data from client to server. File compression techniques is not only used to transfer files of large quantity but also the garbage value it produces helps in data security. We also propose a simple client server chat system that exists in an organization.

HARDWARE AND SOFTWARE REQUIREMENTS:


It is necessary to specify all hardware and software requirements as our whole system is going to work on this specification. These specifications are minimum requirement that are required to build project. We have listed Software requirements and Hardware requirements to handle overall system architecture.

1. SOFTWARE REQUREMENTS:
This project works on Windows XP and uses C# technology. It is necessary to Install MS Windows Studio. It provides all these facilities. We have used .Net framework tool to meet overall software requirements. [4]

SOFTWARE REQUREMENTS

OPERATING SYSTEM TECHNOLOGY USED IDE TOOL USED

WINDOWS XP,7 C#.NET MS WINDOWS STUDIO,MS ACCESS .NET FRAMEWORK, Visual Studio 2008

Table No. 5: Software Requirements

2. HARDWARE REQUREMENTS:
This project works on Pentium 4 processor, Random access memory requirement is of min 1 GB. It is necessary to have minimum 80 GB space. It is necessary to include all the hardware requirements so that user can understand whether our hardware is will able to run this or not. It is very important to have sufficient space on the drive to store each and every files or data that is going to shared b/w two or more users or clients.

HARDWARE REQUIREMENTS PROCESS MOTHERBOARD RAM HARD DISK PENTIUM 4 GENUINE INTEL MIN 1 GB 80 GB Table N0 6: Hardware Requirements

1. DATA FLOW DIAGRAM:


Definition:- Data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system, modelling its process aspects.

Level 0 This context-level DFD is next "exploded", to produce a Level 0 DFD that shows some of the detail of the system being modelled. The Level 0 DFD shows how the system is divided into sub-systems (processes), each of which deals with one or more of the data flows to or from an external agent, and which

together provide all of the functionality of the system as a whole. It also identifies internal data stores that must be present in order for the system to do its job, and shows the flow of data between the various parts of the system.

User Client

FTP Server

Level 1 In Level 1 of DFD, the processes could be considered as the submodule(s) of function(s) of the project or module. Next level is Level 1 DFD. Some important points are:

Level 1 DFD must balance with the Level 0 it describes. Inputs going into a process are different from outputs leaving the process.

Continue to show data stores.

User Client

Request for file transfer FTP

Connect to the server IP

Server Data transferred successfully

Fig No 1: DFD

2. USE CASE DIAGRAM


Definition: It is a representation of a user's interaction with the system and depicting the specifications of a use case. A use case diagram can portray the different types of users of a system and the various ways that they interact with the system.
Login

Authentication

Select file

Server

Client

Transfer

Chat

Client 2 Client and server performing different function can be described using Use case diagram.

APPLICATION:
1. Used in large organisation for secure communication. 2. For file transfer over a network.

SCOPE OF THE PROJECT:


The data security can be implemented in large organizations where a lot of confidential data are shared with the employees of the organization. Any intruder getting a hold of the data will lead to a great threat to that organization. In a file sharing system, server is the place where all the data is stored and the clients try to communicate with it. Any intrusion in between data transfer may lead to higher security risks.

Conclusion:
Thus using client-server and socket programming concept we have designed Chat server application. First, the theoretical section, where We have learned lots of things in networking, such as the TCP/IP protocol (number one in network protocols) and how it works, windows sockets, and network programming which is one of the best programming domains in computers. Second, the technical section which let us become more familiar with a new programming language such as C#.NET and its network components. Finally we would like to thank our teacher Mrs. Pranita Sangit and all our instructors for helping us.

Вам также может понравиться