Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, microcontroller projects, vlsi projects, dsp projects, free projects, project review, project report, project presentation, free source code, free project report, Final Year Projects, IEEE Projects, Final Year Projects in Chennai, Final Year IEEE Projects, final year projects, college projects, student projects, java projects, asp.net projects, software projects, software ieee projects, ieee 2009 projects, 2009 ieee projects, embedded projects, final year software projects, final year embedded projects, ieee embedded projects, matlab projects, final year java projects, final year asp.net projects, final year vb.net projects, vb.net projects, c# projects, final year c# projects, electrical projects, power electronics projects, motors and drives projects, robotics projects, ieee electrical projects, ieee power electronics projects, ieee robotics projects, power system projects, power system ieee projects, engineering projects, ieee engineering projects, engineering students projects, be projects, mca projects, mtech projects, btech projects, me projects, mtech projects, college projects, polytechnic projects, real time projects, ieee projects, non ieee projects, project presentation, project ppt, project pdf, project source code, project review, final year project, final year projects
Injustice - Developers Among Us (SciFiDevCon 2024)
Java Abs Multi Router Traffic Monitor
1. MULTI ROUTER
TRAFFIC MONITOR
INTRODUCTION
The traffic monitor is a tool or software used for monitoring the traffic load in a
network links. It allows the user to see traffic load on a network over time.
Multi Router Traffic Monitor is a network diagnostic tool that monitors local area
networks and provides a display of network statistics.
Network administrators can use these statistics to perform routine trouble-
shooting tasks, such as locating a server that is down, or that is receiving a
disproportionate number of work requests.
A router is a computer-networking device that forwards data packets across a
network toward their destinations, through a process known as routing. Routing
occurs at layer 3 (the network layer i.e. Internet protocol of the OSI seven layer
protocol stack.)
A router acts as a junction between two or more networks to transfer data
packets among them. A router is different from a switch. A switch connects
devices to form a local area network (LAN).
One easy illustration for the different functions of routers and switches is to think
of switches as neighborhood streets, and the router as the intersections with the
street signs.
Each house on the street has an address within a range on the block. In the
same way, a switch connects various devices each with their own IP addresses
on a LAN. However, the switch knows nothing about IP addresses except its
own management address.
Routers connect networks together the way that on-ramps or major intersections
connect streets to both highways and freeways, etc. The street signs at the
intersection (routing table) show which way the packets need to flow.
So for example, a router at home connects the Internet service provider's (ISP)
network (usually on an Internet address) together with the LAN in the home
(typically using a range of private IP addresses, see network address translation
(NAT)) and a single broadcast domain.
The switch connects devices together to form the LAN. Sometimes the switch
and the router are combined together in one single package sold as a multiple
port router.
2. AIM/OBJECTIVE OF THE PROPOSED SYSTEM
The proposed project is aimed to monitor the traffic and to route the network
traffic so that at any particular node, or route, the congestionb does not occur .
It collects the information and it will send back the raw data captured in a
network. MRTM ( Multi Router Traffic Monitor) records this data in a log on the
client along with previously recorded data for the device.
The software then creates a report from the logs, containing a list of details
detailing traffic for the selected node.
PROPOSED SYSTEM SOFTWARE REQUIREMENTS
Operating system : Windows XP/2000
Software : JDK 1.3 or higher
Database : SQL Server 2000
Protocol : TCP/IP
PROPOSED SYSTEM HARDWARE REQUIREMENTS
Processor : Intel Pentium PIII or higher
RAM : 128 MB or higher
HDD : 80 GB HDD
FDD : 1.44 MB or higher
Monitor / Keyboard / CD drive
PROPOSED SYSTEM DESCRIPTION
Multi Router traffic Monitor is an advanced network traffic monitoring, analysis
and reporting. It works in all Windows based operating systems. It captures all
traffic transport over both Ethernet and WLAN networks.
Multi Router traffic Monitor decodes all major TCP/IP protocols. With Multi
Router traffic Monitor, we can easily filter the network traffic to focus on the
information that we are looking for.
Comprehensive reports and graphic views allows us to understand network
performance and usage quickly and identify problems in simple steps.
Multi Router traffic Monitor is a comprehensive and affordable solution to the
following problems: Troubleshooting network problems; Debugging new
applications with network communication involved.
Monitoring network traffic for performance, bandwidth usage, and security
reasons, analyzing network traffic to trace specific transactions or find security
breaches, Monitor employee Internet access, email communication and other
transactions to enforce company policies.
We need to generate reports on network usage and statistics for network
performance review and planning, network auditing and many other purposes.
3. FEATURES OF THE PROPOSED SYSTEM
In order to route packets, a router communicates with other routers using routing
protocols and using this information creates and maintains a routing table.
The routing table stores the best routes to certain network destinations, the
“routing metrics“ associated with those routes, and the path to the next hop
router.
1. Displays real-time upload and download traffic statistics of our Intranet
2. Monitors the traffic between our computer and Intranet and also monitors
network usage on any network interfaces installed in our computer.
3. Real-time traffic accounting feature enables us to quickly see the total upload
and download usage.
4. Highly beneficial to users who access Internet with monthly transfer limit.
5. Useful to network administrators to monitor LAN IP traffic on one or more
network interfaces.
MODULES OF THE PROPOSED SYSTEM
1. PEER - PEER COMMUNICATION: This module will enable all the clients
would be able to connect to one another at the same instance of time
2. PORT SCANNER: This module is used in the server side which scans all
the necessary ports that are made available and classifies the used as well
as unused ports. There are certain ports which are standard port number
used by specific protocols namely port no 25 for SMTP, port on 21 for
SNMP and so on. Hence this module will enable us to contionuously
monitor the used as well as the unused ports
3. NETWORK STATISTIC INFORMATION: This module displays all the
network statistics information about the complete network details.
This includes the following information
IP address of the machine
MAC address of the machine
Port numbers used by each and every client
Login time
Logout time
File transfer source time starting
File transfer destination reception time
Calculate time t seconds
4. 4. CONCURRENT FILE TRANSMIT ACCESS OR REQUEST: This module
should enable concurrent machines to access concurrent files or several
machines to access the same file at the same instance of time
5. FILE SEARCH AND FILE ACKNOWLEDGEMENT: This module is used in
the server side and the client will give a request to the server for a
particular file name and the server will perform the search operation for the
availability of the particular file and then will acknowledge to the particular
cleint about the availability of the particular file
6. SERVER PACKET SPLITTING: In the server side, each file is split into
packets and each packet is sent to the respective or multiple clients
depending on the number of requests.
7. PACKET TRANSFER: This module is to send various packets from the
server to the respective client accordingly.
PROJECT METHODOLOGY
The packets are sent from the server to the router and from the router to the
corresponding destination which is the respective client. Here we are using a
modifies version of the Leaky Bucket algorithm.
The Leaky Bucket algorithm is used to control the rate of the packet transfers in
a network. It is implemenetd as a single-server queue with constant service
time. If the bucket ( buffer) overflows, then packets are discarded.
Basically Leaky Bucket algorithm will allows to regulate the flow of packets in a
orderly manner with constant rate so that congestion is avoided and the traffic is
regulated or routed.
Leaky Bucket algorithm enforces a constant output rate ( average rate)
regardless of the burstiness o the input. It does nothing when input is idle.
Here the host injects one packet per clock tick into the network. This
results in a uniform flow of packets smoothing out bursts and reducing
congestion
When packets are of the same size ( as in ATM cells), the one packet per
tick is consistent.
For variable length packets though, it is better to allow a fixed number of
bytes per tick. For example 1024 bytes will allow one 1024 byte packet or
2 512 bytes packets per clock tick
5. In our project, we will send a file. We will determine the file size. Then calculate
the total number of packets as
N( Number of packets)= Total File size/ 1024
Here 1024 is the fixed packet size.
Now for these n packets a buffer or a queue is formed where the queue size is
fixed to allocate a few packets say for instance 20/30.
Hence from the queue each packet is sent at a fixed time interval sa “t” seconds
where the “t” seconds is specified as a constant rate by the user.
As and when the queue data goes out, the queue gets filled up. Once the queue
is completely full, then the buffer will not allow any other flow and hence the
buffer overflows.
From this queue the data goes out to the router and from the router to the
destination
While collecting information from the network's data stream, it displays
the following types of information:
The source address of the computer that sent a frame onto the network.
(This address is a unique hexadecimal (or base-16) number that identifies
that computer on the network.)
The destination address of the computer that received the frame.
The protocols used to send the frame.
The data, or a portion of the message being sent.
Hence at any particular time, the congestion will not occur and hence the tarffic
is diverted smoothly
MULTI ROUTER
TRAFFIC MONITOR