Network Monitoring System with Simple IP Subnet Calculator System Design

Design is multi-step process that focuses on data structure software architecture, procedural details, (algorithms etc.) and interface between modules. The design process also translates the requirements into the presentation of software that can be accessed for quality before coding begins.

Computer software design changes continuously as new methods; better analysis and broader understanding evolved. Software Design is at relatively early stage in its revolution.

Therefore, Software Design methodology lacks the depth, flexibility and quantitative nature that are normally associated with more classical engineering disciplines. However techniques for software designs do exist, criteria for design qualities are available and design notation can be applied.

OUTPUT DESIGN

In the project, if the employee has to communicate with other employees they can communicate through send and receive message.

INTERFACE DESIGN

The ODBC (Open Database Connectivity) interface is a pure .NET to execute SQL statement. The ODBC provides a set classes and interfaces that can be used by developers to write database applications. Basic ODBC interactions in its simplest form, can be broken down into four steps:

1. Open a connection to the database. 

2. Execute a SQL statement

3. Process the result

4. Close the connection to the database

Network Monitoring System with Simple IP Subnet Calculator Requirement Determination

Existing system

The existing system has been maintained manually. The system, which has been maintained manually, had been complex and complicated. There were many chances to loss the data and the work wouldn’t be an effective and efficient one. Manual operation is always been complicated to the organizations for maintaining the records. In the existing system

  • In this system we can’t monitor who all are accessing the files at the same time.
  • It’s difficult to find which are the files are updated and renamed.

Drawbacks of the existing system 

  • Maintenance of the system is very difficult.
  • Employee’s attentions are needed for maintaining the system.
  • There is a possibility for getting inaccurate results.
  • User friendliness is very less.
  • It consumes more time for processing the activities.

Proposed system

  • Considering the anomalies in the existing system computerization of the whole activity is being suggested after initial analysis by the organization.
  •  In this system we can monitor who all are accessing the files in the network at the same time.
  • When monitoring the connected systems, we can easily found what are the files updated and renamed.

ADVANTAGES OF THE PROPOSED SYSTEM

  • Fully Secured                                              
  • Role based access
  • Ease in maintenance                               
  • Notification about the modification 

Network Monitoring System with Simple IP Subnet Calculator Tool ER Diagrams

External Entities

External entities are outside the system but they either supply input data into the system or use the system output, they are entities which the designer has no control. Square or rectangle may represent external entities that supply data into a system or some times called sources. External entities that use the system data are sometimes called sinks.

network moinitoring ER diagram

Network Monitoring System with Simple IP Subnet Calculator Tool Modules

Admin

            The Login module consists of username and password. This process is for authenisation.The  user name and password is correct it is link into next page. This process is done in login. 

 Network Monitoring System:

The most of the organization they connect more numbers of systems to form a network to make their work easier to share their files and folders. While connecting we want to monitor the network system activities for secure purpose. This Project deals with monitoring the Network Screen Activities. It has two methodologies one for Client and another for Server. In the proposed system we introduce current session option to monitor the network systems at the same time and in the accesses folder option shows the username and user accessed folders. While client logins to the server, the Client IP Address and System names are added to the server. Server will display all the user names, from server we can monitor the particular Client Screen Activities like that currently opened screens, what are all the files created, modified and deleted. 

 IP CALCULATOR SUBNET

 The calculator module certain process

  • Internet protocol
  • Network type
  • Calculate          

The calculate is used to calculate the network type and it class. The other process are prefix,net.mas,maximum number of host,network,broadcast,iprange,maximum number of subnets, wanted number of hosts. 

Internet protocol:

                The Internet protocol is used to know about the network type. The protocol is enter in the textbox and calculates. It will show the network type. If wrong protocol is entering in the textbox. It will show the error message.

Network type:

                The Network used to describes the class.

      • Class A:0:   127 255
      • Class B:128:191 255
      • ClassC:192:223 255
      • ClassD:224:239 255
      • ClassE:239:254 255          

Calculate:

                The Calculate is used to calculate the internet protocol and network type.In this system Maximum number of subnet is display.

Network Monitoring System with Simple IP Subnet Calculator Tool DFD Diagrams

In this section discussed about data flow diagram, Entity relationship diagram. these things are represented as diagrams with proper notation.

Data Flow Diagram

The data flow diagram is one of the most improvement tools used by the system analyst DeMacro (1978) Nad Gand Sarson (1979) popularized the use if the data flow diagram as modeling tools through their structured system analysis methodologies.

There are four kinds of system components

Process

Process show what system does. Each process has one or more data inputs and produce one or more data output, Circles in a data flow diagram represent process. Each process has unique name and number. This name and number appear inside the circle that represents the processes in a data flow diagram.

This process is represented as circle

 Data Stores

File or data store is depositary of data. They contain data that is retained in the system. Processes can enter the data into a data store or retrieve data from the data store. Each data store is represented by thin line in the data flow diagram and each data store has a unique name.

The data store is represented in form of a line

 

Data Flows

Dataflow model the passage of data in the system and are represented lines joining system components. An arrow indicates the direction of the flow and the line labeled by the name of the data flow.

Network Monitoring System with Simple IP Subnet Calculator Tool Software Requirements

 Little importance was given to this phases in the early days of software development. Hence need for the requirements analysis phase arose. The requirement analyst has to identify the requirements by tacking to these people and understanding their needs. In situations where the software is to automated a currently manuals process, most of the needs can be understood by observing the current practice.

  Performance Requirements

The project must the end user requirements. Accuracy and fast must be imposed in the Project.                                                

           The project is development as easy as possible for the sake of end user. The project has to be developed with view of satisfying the future requirements and future enhancement.

The tool has been finally implemented satisfying the needs specified by the company. As per the performance is concerned this system said is performing

This processing as well as tine taken to generate well reports where also even when large amount of data was used. The system is designed in such a way that even when large amount of data used for processing there would less performance degradation. 

 Interface requirements

 Hardware Interface

The stranded input device like keyboard and mouse are to get input. The output will be generated and display in the monitor. The reports can also be exported to a SQL-server document are text file. The stranded printer in used to take outputs.

 Software Interface

The design part and interface id done the front end ASP.Net and SQL server as a backend of the project. 

 Operational requirements

The database or databases that are being failed over to the stand by server cannot be used for anything else. But databases on the standby server not being used for failover can still be used normally.

When it comes time for actual failover, you much one of two things to make your application work either rename the standby server the same name as the failed production server(and the IP address),

Network Monitoring System with Simple IP Subnet Calculator Tool Project Source Code

Most of the organization they connect more numbers of systems to form a network to make their work easier to share their files and folders. While connecting we want to monitor the network system activities for secure purpose. This Project deals with monitoring the Network Screen Activities.

It has two methodologies one for Client and another for Server. In the proposed system we introduce current session option to monitor the network systems at the same time and in the accesses folder option shows the username and user accessed folders.

While client logins to the server, the Client IP Address and System names are added to the server. Server will display all the user names, from server we can monitor the particular Client Screen Activities like that currently opened screens, what are all the files created, modified and deleted.

Network Monitoring System with Simple IP Subnet Calculator Tool Project Report

Network monitoring system with simple IP subnet calculator tool project is implemented in Asp.Net web technologies and C#.Net programming language. Main aim of this project is to develop a security system or analyzing system inside a locally connected system inside organization and a IP subnet calculator tool is used for only class c IP. 

In every organization systems are connected to a network to make work easier for sharing files and folders. Security is important in locally connected system and there should be a monitory system on client and server side. In this project current sessions monitory method is introduced and using this system we can know folders that are accessed by users by displaying user names. Usernames and IP addresses are stored in server when client login to the system. From server we can select clients IP address and monitory modified files, new folders and deleted files. 

In working environment remote system monitoring is performed regularly for installations, deployment, solving issues and other operations. Remote desktop operations are also performed from homes. 

This project report covers detailed explanation of every topic with ER diagrams, dfd diagrams, user case diagrams. 

Download Network monitoring system with simple IP subnet calculator tool asp.net project report and source code.

Knowledge Processing out Sourcing User Case Diagram

Knowledge processing out sourcing user case diagrams explains about different procedures that are followed to develop this application. This diagram shows identifying exciting user, create new account, contact details, online application, view client details, view carrier details, view feedback. These are the step by step functionalities that are followed in this application.

Computer science students can use this project as mini and major projects. Students can download project report with source code from this site.

user case diagrams hr managemnt

Download Knowledge processing our sourcing project source code and project report.

Knowledge Processing out Sourcing Project

Knowledge processing our sourcing project is implemented in asp.net platform. Main aim of this project is to develop a online web portal for providing services for software companies and employees.

In present trend out sourcing is seen in business filed but here we propose a new business idea in which KPO will act as a mediator between client and employee.