0% found this document useful (0 votes)
14 views18 pages

Final Ee

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views18 pages

Final Ee

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

Title : Network Monitoring System

Project Member Project Mentor


Polamarasetty Ribca Noel Mrs.B.Vasantha Rani
IT department
(21NM1A1242)
PRESENTATION OUTLINE

 ABSTRACT
 INTRODUCTION
 LITERATURE SURVEY
 DESIGN
 IMPLEMENTATION
 TESTING
 RESULTS

2
ABSTRACT

This abstract introduces a Network monitoring system (NMS) which supervises all computers in

network. It consists of two programs Client and Server, each run-on different terminals which have

different operating system that is platform independent like Windows or Linux. Server program has

task manager which shows process running on all clients. By using this task manager server can stop

any process running on client terminal forcefully. It can also capture remote desktop screen of client

for observing whatever activity is performed at that instant. It also provides chatting facility between

client and server. If client is having any difficulty he can chat with server. Client can also ask

question to server and server can reply. Furthermore, the NMS will offer a user-friendly interface,

enabling network administrators to easily configure, monitor, and manage the network. The intuitive

design will reduce the learning curve and improve overall user satisfaction.

3
INTRODUCTION
Project overview :
The network monitoring system refers to supervising all the components in a
network , be that LAN , WAN , MAN or GAN . Security was not a priority for the
original designers of the local area network protocols. Networks are assumed to be
private , isolated and physically secure , or else completely public . This assumption
is no longer true because of the growing commercial use of the internet and
computers connected in small network for the purpose of sharing a considerable
amount of private information is now being sent over public networks.
"NETWORK MONITORING SYSTEM" is the client-server based project. In
this project administrator can keep the track of user's running processes, time of
login and time of logout. Administrator can capture snapshot of clients desktop and
can also chat with them.
4
INTRODUCTION

Scope of Project :
There was no any computerized based system existing to provide all function which we
will provide in our proposed project. The scope of project extends to the network related
organization that is connected by LAN.

Thus this project can be used in wide application like Schools, Offices, Colleges,
Institutions and Cyber cafe's. More improvement can be made in this system if
necessary.

5
Literature Survey
• Remote Task Manager significantly reduces the total cost of network management in enterprise environments by
enabling IT personnel to control tasks, processes, services, devices, shared resources, events and computer
performance over LAN, WAN and the Internet. [1]
• The periodic distribution of new programs, patches and updates represent a large portion of an administrator's duties.
The challenge is to find the right tool to do the distribution with a minimum of fuss and muss. It turns out that you can
do a pretty good job at simple software distribution with minimal effort by just doing remote file copies combined
with creating jobs in each remote system to install the just copied file(s). [2]
• BB Flash Back is a leading screen recording program for Windows published by Blueberry Software. When the
record function is activated, screen activity is stored in a real time video file. This recording can then be replayed,
edited and enhanced with graphics, text or sound effects. [3]
• Screen capturing is designed to meet the complex requirements of technical and other workstation applications. It is
designed for easy integration into applications. The original colors of individual windows are preserved with any
combination of windows. Even when a window appears in false colors on the screen due to color table overrun, it is
captured in its original colors and is saved correctly.[4]
• Chatting on LAN approach enables cooperative work by using the LAN as an entry point for starting applications that
can offer more specific functionality for cooperative work.[5]
An Analysis of Twitter Data for Stock Market Prediction by Implemen 6
ting Logistic Regression through LSTM
DESIGN

Fig 1 : Use Case Diagram


An Analysis of Twitter Data for Stock Market Prediction by Implemen 7
ting Logistic Regression through LSTM
USE CASE DIAGRAM SPECIFICATION
• CONNECT_TO_SERVER: It is used to connect client to the server after proper authentication of the
client. Authentication is done by validating the user name and IP address of the client.
• MANAGE_REMOTE_TASK: Remote task manager manages processes running on all clients. By using
this task manager server can stop any process running on client terminal forcefully.
• CAPTURE_SCREENSHOT: It capture remote desktop screen of client for observing whatever activity
perform at that instant.
• Do_chatting: It is used for administrator and clients for chatting with each other. It also used for chatting
between client and client.
• GENERATE_REPORT: It is used for generate report which specifies time of the remote login, logoff,
restart and shutdown.

An Analysis of Twitter Data for Stock Market Prediction by Implemen 8


ting Logistic Regression through LSTM
DESIGN

Fig 2 : Class Diagram


An Analysis of Twitter Data for Stock Market Prediction by Implemen 9
ting Logistic Regression through LSTM
IMPLEMENTATION : LOGIN WINDOW

The above window is the first to appear at the server side. The window is named Admin_Login since it is used by
administrator for login purpose.

An Analysis of Twitter Data for Stock Market Prediction by Implemen 10


ting Logistic Regression through LSTM
IMPLEMENTATION

REMOTE TASK MANAGER 11


IMPLEMENTATION

SCREEN CAPTURE 12
IMPLEMENTATION

An Analysis of Twitter Data for Stock Market Prediction by Implemen 13


ting Logistic Regression through LSTM
Test cases : Test cases are designed such that all modules get tested at least
by one of test cases. For successful testing all test cases should pass i.e.
outcome should be as expected.

• Test 1➤ Test - To test administrator login with correct ID & Password.


• Test Description - This testing is performed for the authentication of user.
• Phase-Administrator Login.
• Setup A unique ID and password are setup in the database itself.
• Testing : Here the administrator ID and Password are checked. The ID is also tested for
different passwords and vice versa. An error message is displayed unless entered with
correct specified ID and password.
• Result : Verified ID and password
14
Test 2- Test for Chat application :

 Test Description - This test is performed to check the chat application between the client
and server.
 Testing - After initiating the chat application at client and server side, it is checked that
whether messages are passed correctly.
 Result - Chat application was tested successfully.

Test 3-Test for Screen Capturing :

 Test Description - This test is performed to see if the server can capture the remote desktop
screen without delay.
 Phase - Testing screen capturing.
 Testing - The capturing and actually viewing the remote screen depends on the performance
of the network (LAN).
 Result - Screen can be captured without any delay as well as it can be viewed in real-time.
15
➤ Test 4 - To test access of client's task manager :

➤ Test Description This testing is performed so that any illegal processes can be
stopped from being executed by client.

 Phase - Testing Remote Task Manager (RTM).

➤ Testing - Here new process is made to execute at client's side and we see
whether the task list at the server side is updated. After this is verified, a
warning message is sent to client to shutdown the process. If the client doesn't
respond to the warning message, the process is killed by server.

➤ Result - Warning messages are sent as well as process was killed


successfully.

An Analysis of Twitter Data for Stock Market Prediction by Implemen 16


ting Logistic Regression through LSTM
RESULT AND ANALYSIS
• Testing has been performed for verification of user name and password, connection establishment, chatting
application, remote task manager, screen capturing and general utility.
• In login form testing the administrator ID and Password are checked. The ID is also tested for different passwords
and vice versa. An error message is displayed unless entered with correct specified ID and password. After
Verifying ID and Password he can get access to system.
• After configuring Network adapter (Ethernet) card with proper IP address settings, the connectivity in computers
in the LAN are tested using PING command. Execute the server first and then specify the IP address/DNS name
in the client side. After checking the server is listening, sending request for connection from client side and
connection is established between server and client.
• After initiating the chat application at client and server side, it is checked that whether messages are passed
correctly. If yes then Chat application was tested successfully.
• In screen capturing the capturing and actually viewing the remote screen depends on the performance of the
network (LAN). Screen can be captured without any delay as well as it can be viewed in real-time. Here also we
got the required result. Also in general utility testing the system gives required result.
• After testing it was found that the output for given set of input was as expected. Hence gives the positive result.
17
Thank You

18

You might also like