SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
MULTI ROUTER
      TRAFFIC MONITOR
INTRODUCTION
The traffic monitor is a tool or software used for monitoring the traffic load in a
network links. It allows the user to see traffic load on a network over time.
Multi Router Traffic Monitor is a network diagnostic tool that monitors local area
networks and provides a display of network statistics.
Network administrators can use these statistics to perform routine trouble-
shooting tasks, such as locating a server that is down, or that is receiving a
disproportionate number of work requests.
A router is a computer-networking device that forwards data packets across a
network toward their destinations, through a process known as routing. Routing
occurs at layer 3 (the network layer i.e. Internet protocol of the OSI seven layer
protocol stack.)
A router acts as a junction between two or more networks to transfer data
packets among them. A router is different from a switch. A switch connects
devices to form a local area network (LAN).
One easy illustration for the different functions of routers and switches is to think
of switches as neighborhood streets, and the router as the intersections with the
street signs.
Each house on the street has an address within a range on the block. In the
same way, a switch connects various devices each with their own IP addresses
on a LAN. However, the switch knows nothing about IP addresses except its
own management address.
Routers connect networks together the way that on-ramps or major intersections
connect streets to both highways and freeways, etc. The street signs at the
intersection (routing table) show which way the packets need to flow.
So for example, a router at home connects the Internet service provider's (ISP)
network (usually on an Internet address) together with the LAN in the home
(typically using a range of private IP addresses, see network address translation
(NAT)) and a single broadcast domain.
The switch connects devices together to form the LAN. Sometimes the switch
and the router are combined together in one single package sold as a multiple
port router.
AIM/OBJECTIVE OF THE PROPOSED SYSTEM
The proposed project is aimed to monitor the traffic and to route the network
traffic so that at any particular node, or route, the congestionb does not occur .
It collects the information and it will send back the raw data captured in a
network. MRTM ( Multi Router Traffic Monitor) records this data in a log on the
client along with previously recorded data for the device.
The software then creates a report from the logs, containing a list of details
detailing traffic for the selected node.


PROPOSED SYSTEM SOFTWARE REQUIREMENTS
Operating system :     Windows XP/2000
Software           :   JDK 1.3 or higher
Database           :   SQL Server 2000
Protocol           :   TCP/IP


PROPOSED SYSTEM HARDWARE REQUIREMENTS
Processor :    Intel Pentium PIII or higher
RAM        :   128 MB or higher
HDD        :   80 GB HDD
FDD        :   1.44 MB or higher
Monitor / Keyboard / CD drive


PROPOSED SYSTEM DESCRIPTION
Multi Router traffic Monitor is an advanced network traffic monitoring, analysis
and reporting. It works in all Windows based operating systems. It captures all
traffic transport over both Ethernet and WLAN networks.
Multi Router traffic Monitor decodes all major TCP/IP protocols. With Multi
Router traffic Monitor, we can easily filter the network traffic to focus on the
information that we are looking for.
Comprehensive reports and graphic views allows us to understand network
performance and usage quickly and identify problems in simple steps.
Multi Router traffic Monitor is a comprehensive and affordable solution to the
following problems: Troubleshooting network problems; Debugging new
applications with network communication involved.
Monitoring network traffic for performance, bandwidth usage, and security
reasons, analyzing network traffic to trace specific transactions or find security
breaches, Monitor employee Internet access, email communication and other
transactions to enforce company policies.
We need to generate reports on network usage and statistics for network
performance review and planning, network auditing and many other purposes.
FEATURES OF THE PROPOSED SYSTEM
In order to route packets, a router communicates with other routers using routing
protocols and using this information creates and maintains a routing table.
The routing table stores the best routes to certain network destinations, the
“routing metrics“ associated with those routes, and the path to the next hop
router.
1. Displays real-time upload and download traffic statistics of our Intranet
2. Monitors the traffic between our computer and Intranet and also monitors
   network usage on any network interfaces installed in our computer.
3. Real-time traffic accounting feature enables us to quickly see the total upload
   and download usage.
4. Highly beneficial to users who access Internet with monthly transfer limit.
5. Useful to network administrators to monitor LAN IP traffic on one or more
   network interfaces.


MODULES OF THE PROPOSED SYSTEM
1.   PEER - PEER COMMUNICATION: This module will enable all the clients
     would be able to connect to one another at the same instance of time


2.   PORT SCANNER: This module is used in the server side which scans all
     the necessary ports that are made available and classifies the used as well
     as unused ports. There are certain ports which are standard port number
     used by specific protocols namely port no 25 for SMTP, port on 21 for
     SNMP and so on. Hence this module will enable us to contionuously
     monitor the used as well as the unused ports


3.   NETWORK STATISTIC INFORMATION: This module displays all the
     network statistics information about the complete network details.
     This includes the following information
       IP address of the machine
       MAC address of the machine
       Port numbers used by each and every client
       Login time
       Logout time
       File transfer source time starting
       File transfer destination reception time
       Calculate time t seconds
4.   CONCURRENT FILE TRANSMIT ACCESS OR REQUEST: This module
     should enable concurrent machines to access concurrent files or several
     machines to access the same file at the same instance of time


5.   FILE SEARCH AND FILE ACKNOWLEDGEMENT: This module is used in
     the server side and the client will give a request to the server for a
     particular file name and the server will perform the search operation for the
     availability of the particular file and then will acknowledge to the particular
     cleint about the availability of the particular file


6.   SERVER PACKET SPLITTING: In the server side, each file is split into
     packets and each packet is sent to the respective or multiple clients
     depending on the number of requests.

7.   PACKET TRANSFER: This module is to send various packets from the
     server to the respective client accordingly.



PROJECT METHODOLOGY
The packets are sent from the server to the router and from the router to the
corresponding destination which is the respective client. Here we are using a
modifies version of the Leaky Bucket algorithm.
The Leaky Bucket algorithm is used to control the rate of the packet transfers in
a network. It is implemenetd as a single-server queue with constant service
time. If the bucket ( buffer) overflows, then packets are discarded.
Basically Leaky Bucket algorithm will allows to regulate the flow of packets in a
orderly manner with constant rate so that congestion is avoided and the traffic is
regulated or routed.
      Leaky Bucket algorithm enforces a constant output rate ( average rate)
      regardless of the burstiness o the input. It does nothing when input is idle.
      Here the host injects one packet per clock tick into the network. This
      results in a uniform flow of packets smoothing out bursts and reducing
      congestion
      When packets are of the same size ( as in ATM cells), the one packet per
      tick is consistent.
      For variable length packets though, it is better to allow a fixed number of
      bytes per tick. For example 1024 bytes will allow one 1024 byte packet or
      2 512 bytes packets per clock tick
In our project, we will send a file. We will determine the file size. Then calculate
the total number of packets as
                 N( Number of packets)= Total File size/ 1024
Here 1024 is the fixed packet size.
Now for these n packets a buffer or a queue is formed where the queue size is
fixed to allocate a few packets say for instance 20/30.
Hence from the queue each packet is sent at a fixed time interval sa “t” seconds
where the “t” seconds is specified as a constant rate by the user.
As and when the queue data goes out, the queue gets filled up. Once the queue
is completely full, then the buffer will not allow any other flow and hence the
buffer overflows.
From this queue the data goes out to the router and from the router to the
destination


While collecting information from the network's data stream, it displays
the following types of information:
      The source address of the computer that sent a frame onto the network.
      (This address is a unique hexadecimal (or base-16) number that identifies
      that computer on the network.)
      The destination address of the computer that received the frame.
      The protocols used to send the frame.
      The data, or a portion of the message being sent.


Hence at any particular time, the congestion will not occur and hence the tarffic
is diverted smoothly




       MULTI ROUTER
      TRAFFIC MONITOR

Contenu connexe

Plus de ncct

Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detectorncct
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protectionncct
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammerncct
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1ncct
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projectsncct
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects Bncct
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009ncct
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009ncct
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...ncct
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects Bncct
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S Pncct
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C Tncct
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projectsncct
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computingncct
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projectsncct
 
A S P
A S PA S P
A S Pncct
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S Pncct
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...ncct
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojectsncct
 
A S P
A S PA S P
A S Pncct
 

Plus de ncct (20)

Bot Robo Tanker Sound Detector
Bot Robo  Tanker  Sound DetectorBot Robo  Tanker  Sound Detector
Bot Robo Tanker Sound Detector
 
Distance Protection
Distance ProtectionDistance Protection
Distance Protection
 
Bluetooth Jammer
Bluetooth  JammerBluetooth  Jammer
Bluetooth Jammer
 
Crypkit 1
Crypkit 1Crypkit 1
Crypkit 1
 
I E E E 2009 Java Projects
I E E E 2009  Java  ProjectsI E E E 2009  Java  Projects
I E E E 2009 Java Projects
 
B E Projects M C A Projects B
B E  Projects  M C A  Projects  BB E  Projects  M C A  Projects  B
B E Projects M C A Projects B
 
J2 E E Projects, I E E E Projects 2009
J2 E E  Projects,  I E E E  Projects 2009J2 E E  Projects,  I E E E  Projects 2009
J2 E E Projects, I E E E Projects 2009
 
J2 M E Projects, I E E E Projects 2009
J2 M E  Projects,  I E E E  Projects 2009J2 M E  Projects,  I E E E  Projects 2009
J2 M E Projects, I E E E Projects 2009
 
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...Engineering  College  Projects,  M C A  Projects,  B E  Projects,  B Tech  Pr...
Engineering College Projects, M C A Projects, B E Projects, B Tech Pr...
 
B E M E Projects M C A Projects B
B E  M E  Projects  M C A  Projects  BB E  M E  Projects  M C A  Projects  B
B E M E Projects M C A Projects B
 
I E E E 2009 Java Projects, I E E E 2009 A S P
I E E E 2009  Java  Projects,  I E E E 2009  A S PI E E E 2009  Java  Projects,  I E E E 2009  A S P
I E E E 2009 Java Projects, I E E E 2009 A S P
 
Advantages Of Software Projects N C C T
Advantages Of  Software  Projects  N C C TAdvantages Of  Software  Projects  N C C T
Advantages Of Software Projects N C C T
 
Engineering Projects
Engineering  ProjectsEngineering  Projects
Engineering Projects
 
Software Projects Java Projects Mobile Computing
Software  Projects  Java  Projects  Mobile  ComputingSoftware  Projects  Java  Projects  Mobile  Computing
Software Projects Java Projects Mobile Computing
 
Final Year Engineering Projects
Final  Year  Engineering  ProjectsFinal  Year  Engineering  Projects
Final Year Engineering Projects
 
A S P
A S PA S P
A S P
 
I E E E 2009 A S P
I E E E 2009  A S PI E E E 2009  A S P
I E E E 2009 A S P
 
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...I E E E 2009  Real  Time  Projects,  I E E E 2009  Live  Projects,  I E E E 2...
I E E E 2009 Real Time Projects, I E E E 2009 Live Projects, I E E E 2...
 
Ieee Projects Ieeeprojects
Ieee Projects IeeeprojectsIeee Projects Ieeeprojects
Ieee Projects Ieeeprojects
 
A S P
A S PA S P
A S P
 

Dernier

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 

Dernier (20)

My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 

Java Abs Multi Router Traffic Monitor

  • 1. MULTI ROUTER TRAFFIC MONITOR INTRODUCTION The traffic monitor is a tool or software used for monitoring the traffic load in a network links. It allows the user to see traffic load on a network over time. Multi Router Traffic Monitor is a network diagnostic tool that monitors local area networks and provides a display of network statistics. Network administrators can use these statistics to perform routine trouble- shooting tasks, such as locating a server that is down, or that is receiving a disproportionate number of work requests. A router is a computer-networking device that forwards data packets across a network toward their destinations, through a process known as routing. Routing occurs at layer 3 (the network layer i.e. Internet protocol of the OSI seven layer protocol stack.) A router acts as a junction between two or more networks to transfer data packets among them. A router is different from a switch. A switch connects devices to form a local area network (LAN). One easy illustration for the different functions of routers and switches is to think of switches as neighborhood streets, and the router as the intersections with the street signs. Each house on the street has an address within a range on the block. In the same way, a switch connects various devices each with their own IP addresses on a LAN. However, the switch knows nothing about IP addresses except its own management address. Routers connect networks together the way that on-ramps or major intersections connect streets to both highways and freeways, etc. The street signs at the intersection (routing table) show which way the packets need to flow. So for example, a router at home connects the Internet service provider's (ISP) network (usually on an Internet address) together with the LAN in the home (typically using a range of private IP addresses, see network address translation (NAT)) and a single broadcast domain. The switch connects devices together to form the LAN. Sometimes the switch and the router are combined together in one single package sold as a multiple port router.
  • 2. AIM/OBJECTIVE OF THE PROPOSED SYSTEM The proposed project is aimed to monitor the traffic and to route the network traffic so that at any particular node, or route, the congestionb does not occur . It collects the information and it will send back the raw data captured in a network. MRTM ( Multi Router Traffic Monitor) records this data in a log on the client along with previously recorded data for the device. The software then creates a report from the logs, containing a list of details detailing traffic for the selected node. PROPOSED SYSTEM SOFTWARE REQUIREMENTS Operating system : Windows XP/2000 Software : JDK 1.3 or higher Database : SQL Server 2000 Protocol : TCP/IP PROPOSED SYSTEM HARDWARE REQUIREMENTS Processor : Intel Pentium PIII or higher RAM : 128 MB or higher HDD : 80 GB HDD FDD : 1.44 MB or higher Monitor / Keyboard / CD drive PROPOSED SYSTEM DESCRIPTION Multi Router traffic Monitor is an advanced network traffic monitoring, analysis and reporting. It works in all Windows based operating systems. It captures all traffic transport over both Ethernet and WLAN networks. Multi Router traffic Monitor decodes all major TCP/IP protocols. With Multi Router traffic Monitor, we can easily filter the network traffic to focus on the information that we are looking for. Comprehensive reports and graphic views allows us to understand network performance and usage quickly and identify problems in simple steps. Multi Router traffic Monitor is a comprehensive and affordable solution to the following problems: Troubleshooting network problems; Debugging new applications with network communication involved. Monitoring network traffic for performance, bandwidth usage, and security reasons, analyzing network traffic to trace specific transactions or find security breaches, Monitor employee Internet access, email communication and other transactions to enforce company policies. We need to generate reports on network usage and statistics for network performance review and planning, network auditing and many other purposes.
  • 3. FEATURES OF THE PROPOSED SYSTEM In order to route packets, a router communicates with other routers using routing protocols and using this information creates and maintains a routing table. The routing table stores the best routes to certain network destinations, the “routing metrics“ associated with those routes, and the path to the next hop router. 1. Displays real-time upload and download traffic statistics of our Intranet 2. Monitors the traffic between our computer and Intranet and also monitors network usage on any network interfaces installed in our computer. 3. Real-time traffic accounting feature enables us to quickly see the total upload and download usage. 4. Highly beneficial to users who access Internet with monthly transfer limit. 5. Useful to network administrators to monitor LAN IP traffic on one or more network interfaces. MODULES OF THE PROPOSED SYSTEM 1. PEER - PEER COMMUNICATION: This module will enable all the clients would be able to connect to one another at the same instance of time 2. PORT SCANNER: This module is used in the server side which scans all the necessary ports that are made available and classifies the used as well as unused ports. There are certain ports which are standard port number used by specific protocols namely port no 25 for SMTP, port on 21 for SNMP and so on. Hence this module will enable us to contionuously monitor the used as well as the unused ports 3. NETWORK STATISTIC INFORMATION: This module displays all the network statistics information about the complete network details. This includes the following information IP address of the machine MAC address of the machine Port numbers used by each and every client Login time Logout time File transfer source time starting File transfer destination reception time Calculate time t seconds
  • 4. 4. CONCURRENT FILE TRANSMIT ACCESS OR REQUEST: This module should enable concurrent machines to access concurrent files or several machines to access the same file at the same instance of time 5. FILE SEARCH AND FILE ACKNOWLEDGEMENT: This module is used in the server side and the client will give a request to the server for a particular file name and the server will perform the search operation for the availability of the particular file and then will acknowledge to the particular cleint about the availability of the particular file 6. SERVER PACKET SPLITTING: In the server side, each file is split into packets and each packet is sent to the respective or multiple clients depending on the number of requests. 7. PACKET TRANSFER: This module is to send various packets from the server to the respective client accordingly. PROJECT METHODOLOGY The packets are sent from the server to the router and from the router to the corresponding destination which is the respective client. Here we are using a modifies version of the Leaky Bucket algorithm. The Leaky Bucket algorithm is used to control the rate of the packet transfers in a network. It is implemenetd as a single-server queue with constant service time. If the bucket ( buffer) overflows, then packets are discarded. Basically Leaky Bucket algorithm will allows to regulate the flow of packets in a orderly manner with constant rate so that congestion is avoided and the traffic is regulated or routed. Leaky Bucket algorithm enforces a constant output rate ( average rate) regardless of the burstiness o the input. It does nothing when input is idle. Here the host injects one packet per clock tick into the network. This results in a uniform flow of packets smoothing out bursts and reducing congestion When packets are of the same size ( as in ATM cells), the one packet per tick is consistent. For variable length packets though, it is better to allow a fixed number of bytes per tick. For example 1024 bytes will allow one 1024 byte packet or 2 512 bytes packets per clock tick
  • 5. In our project, we will send a file. We will determine the file size. Then calculate the total number of packets as N( Number of packets)= Total File size/ 1024 Here 1024 is the fixed packet size. Now for these n packets a buffer or a queue is formed where the queue size is fixed to allocate a few packets say for instance 20/30. Hence from the queue each packet is sent at a fixed time interval sa “t” seconds where the “t” seconds is specified as a constant rate by the user. As and when the queue data goes out, the queue gets filled up. Once the queue is completely full, then the buffer will not allow any other flow and hence the buffer overflows. From this queue the data goes out to the router and from the router to the destination While collecting information from the network's data stream, it displays the following types of information: The source address of the computer that sent a frame onto the network. (This address is a unique hexadecimal (or base-16) number that identifies that computer on the network.) The destination address of the computer that received the frame. The protocols used to send the frame. The data, or a portion of the message being sent. Hence at any particular time, the congestion will not occur and hence the tarffic is diverted smoothly MULTI ROUTER TRAFFIC MONITOR