Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Java Abs Multi Router Traffic Monitor


Published on

final Year Projects, Final Year Projects in Chennai, Software Projects, Embedded Projects, Microcontrollers Projects, DSP Projects, VLSI Projects, Matlab Projects, Java Projects, .NET Projects, IEEE Projects, IEEE 2009 Projects, IEEE 2009 Projects, Software, IEEE 2009 Projects, Embedded, Software IEEE 2009 Projects, Embedded IEEE 2009 Projects, Final Year Project Titles, Final Year Project Reports, Final Year Project Review, Robotics Projects, Mechanical Projects, Electrical Projects, Power Electronics Projects, Power System Projects, Model Projects, Java Projects, J2EE Projects, Engineering Projects, Student Projects, Engineering College Projects, MCA Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, Wireless Networks Projects, Network Security Projects, Networking Projects, final year projects, ieee projects, student projects, college projects, ieee projects in chennai, java projects, software ieee projects, embedded ieee projects, "ieee2009projects", "final year projects", "ieee projects", "Engineering Projects", "Final Year Projects in Chennai", "Final year Projects at Chennai", Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, Final Year Java Projects, Final Year ASP.NET Projects, Final Year VB.NET Projects, Final Year C# Projects, Final Year Visual C++ Projects, Final Year Matlab Projects, Final Year NS2 Projects, Final Year C Projects, Final Year Microcontroller Projects, Final Year ATMEL Projects, Final Year PIC Projects, Final Year ARM Projects, Final Year DSP Projects, Final Year VLSI Projects, Final Year FPGA Projects, Final Year CPLD Projects, Final Year Power Electronics Projects, Final Year Electrical Projects, Final Year Robotics Projects, Final Year Solor Projects, Final Year MEMS Projects, Final Year J2EE Projects, Final Year J2ME Projects, Final Year AJAX Projects, Final Year Structs Projects, Final Year EJB Projects, Final Year Real Time Projects, Final Year Live Projects, Final Year Student Projects, Final Year Engineering Projects, Final Year MCA Projects, Final Year MBA Projects, Final Year College Projects, Final Year BE Projects, Final Year BTech Projects, Final Year ME Projects, Final Year MTech Projects, Final Year M.Sc Projects, IEEE Java Projects, ASP.NET Projects, VB.NET Projects, C# Projects, Visual C++ Projects, Matlab Projects, NS2 Projects, C Projects, Microcontroller Projects, ATMEL Projects, PIC Projects, ARM Projects, DSP Projects, VLSI Projects, FPGA Projects, CPLD Projects, Power Electronics Projects, Electrical Projects, Robotics Projects, Solor Projects, MEMS Projects, J2EE Projects, J2ME Projects, AJAX Projects, Structs Projects, EJB Projects, Real Time Projects, Live Projects, Student Projects, Engineering Projects, MCA Projects, MBA Projects, College Projects, BE Projects, BTech Projects, ME Projects, MTech Projects, M.Sc Projects, IEEE 2009 Java Projects, IEEE 2009 ASP.NET Projects, IEEE 2009 VB.NET Projects, IEEE 2009 C# Projects, IEEE 2009 Visual C++ Projects, IEEE 2009 Matlab Projects, IEEE 2009 NS2 Projects, IEEE 2009 C Projects, IEEE 2009 Microcontroller Projects, IEEE 2009 ATMEL Projects, IEEE 2009 PIC Projects, IEEE 2009 ARM Projects, IEEE 2009 DSP Projects, IEEE 2009 VLSI Projects, IEEE 2009 FPGA Projects, IEEE 2009 CPLD Projects, IEEE 2009 Power Electronics Projects, IEEE 2009 Electrical Projects, IEEE 2009 Robotics Projects, IEEE 2009 Solor Projects, IEEE 2009 MEMS Projects, IEEE 2009 J2EE P

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

Java Abs Multi Router Traffic Monitor

  1. 1. MULTI ROUTER TRAFFIC MONITOR INTRODUCTION The traffic monitor is a tool or software used for monitoring the traffic load in a network links. It allows the user to see traffic load on a network over time. Multi Router Traffic Monitor is a network diagnostic tool that monitors local area networks and provides a display of network statistics. Network administrators can use these statistics to perform routine trouble- shooting tasks, such as locating a server that is down, or that is receiving a disproportionate number of work requests. A router is a computer-networking device that forwards data packets across a network toward their destinations, through a process known as routing. Routing occurs at layer 3 (the network layer i.e. Internet protocol of the OSI seven layer protocol stack.) A router acts as a junction between two or more networks to transfer data packets among them. A router is different from a switch. A switch connects devices to form a local area network (LAN). One easy illustration for the different functions of routers and switches is to think of switches as neighborhood streets, and the router as the intersections with the street signs. Each house on the street has an address within a range on the block. In the same way, a switch connects various devices each with their own IP addresses on a LAN. However, the switch knows nothing about IP addresses except its own management address. Routers connect networks together the way that on-ramps or major intersections connect streets to both highways and freeways, etc. The street signs at the intersection (routing table) show which way the packets need to flow. So for example, a router at home connects the Internet service provider's (ISP) network (usually on an Internet address) together with the LAN in the home (typically using a range of private IP addresses, see network address translation (NAT)) and a single broadcast domain. The switch connects devices together to form the LAN. Sometimes the switch and the router are combined together in one single package sold as a multiple port router.
  2. 2. AIM/OBJECTIVE OF THE PROPOSED SYSTEM The proposed project is aimed to monitor the traffic and to route the network traffic so that at any particular node, or route, the congestionb does not occur . It collects the information and it will send back the raw data captured in a network. MRTM ( Multi Router Traffic Monitor) records this data in a log on the client along with previously recorded data for the device. The software then creates a report from the logs, containing a list of details detailing traffic for the selected node. PROPOSED SYSTEM SOFTWARE REQUIREMENTS Operating system : Windows XP/2000 Software : JDK 1.3 or higher Database : SQL Server 2000 Protocol : TCP/IP PROPOSED SYSTEM HARDWARE REQUIREMENTS Processor : Intel Pentium PIII or higher RAM : 128 MB or higher HDD : 80 GB HDD FDD : 1.44 MB or higher Monitor / Keyboard / CD drive PROPOSED SYSTEM DESCRIPTION Multi Router traffic Monitor is an advanced network traffic monitoring, analysis and reporting. It works in all Windows based operating systems. It captures all traffic transport over both Ethernet and WLAN networks. Multi Router traffic Monitor decodes all major TCP/IP protocols. With Multi Router traffic Monitor, we can easily filter the network traffic to focus on the information that we are looking for. Comprehensive reports and graphic views allows us to understand network performance and usage quickly and identify problems in simple steps. Multi Router traffic Monitor is a comprehensive and affordable solution to the following problems: Troubleshooting network problems; Debugging new applications with network communication involved. Monitoring network traffic for performance, bandwidth usage, and security reasons, analyzing network traffic to trace specific transactions or find security breaches, Monitor employee Internet access, email communication and other transactions to enforce company policies. We need to generate reports on network usage and statistics for network performance review and planning, network auditing and many other purposes.
  3. 3. FEATURES OF THE PROPOSED SYSTEM In order to route packets, a router communicates with other routers using routing protocols and using this information creates and maintains a routing table. The routing table stores the best routes to certain network destinations, the “routing metrics“ associated with those routes, and the path to the next hop router. 1. Displays real-time upload and download traffic statistics of our Intranet 2. Monitors the traffic between our computer and Intranet and also monitors network usage on any network interfaces installed in our computer. 3. Real-time traffic accounting feature enables us to quickly see the total upload and download usage. 4. Highly beneficial to users who access Internet with monthly transfer limit. 5. Useful to network administrators to monitor LAN IP traffic on one or more network interfaces. MODULES OF THE PROPOSED SYSTEM 1. PEER - PEER COMMUNICATION: This module will enable all the clients would be able to connect to one another at the same instance of time 2. PORT SCANNER: This module is used in the server side which scans all the necessary ports that are made available and classifies the used as well as unused ports. There are certain ports which are standard port number used by specific protocols namely port no 25 for SMTP, port on 21 for SNMP and so on. Hence this module will enable us to contionuously monitor the used as well as the unused ports 3. NETWORK STATISTIC INFORMATION: This module displays all the network statistics information about the complete network details. This includes the following information IP address of the machine MAC address of the machine Port numbers used by each and every client Login time Logout time File transfer source time starting File transfer destination reception time Calculate time t seconds
  4. 4. 4. CONCURRENT FILE TRANSMIT ACCESS OR REQUEST: This module should enable concurrent machines to access concurrent files or several machines to access the same file at the same instance of time 5. FILE SEARCH AND FILE ACKNOWLEDGEMENT: This module is used in the server side and the client will give a request to the server for a particular file name and the server will perform the search operation for the availability of the particular file and then will acknowledge to the particular cleint about the availability of the particular file 6. SERVER PACKET SPLITTING: In the server side, each file is split into packets and each packet is sent to the respective or multiple clients depending on the number of requests. 7. PACKET TRANSFER: This module is to send various packets from the server to the respective client accordingly. PROJECT METHODOLOGY The packets are sent from the server to the router and from the router to the corresponding destination which is the respective client. Here we are using a modifies version of the Leaky Bucket algorithm. The Leaky Bucket algorithm is used to control the rate of the packet transfers in a network. It is implemenetd as a single-server queue with constant service time. If the bucket ( buffer) overflows, then packets are discarded. Basically Leaky Bucket algorithm will allows to regulate the flow of packets in a orderly manner with constant rate so that congestion is avoided and the traffic is regulated or routed. Leaky Bucket algorithm enforces a constant output rate ( average rate) regardless of the burstiness o the input. It does nothing when input is idle. Here the host injects one packet per clock tick into the network. This results in a uniform flow of packets smoothing out bursts and reducing congestion When packets are of the same size ( as in ATM cells), the one packet per tick is consistent. For variable length packets though, it is better to allow a fixed number of bytes per tick. For example 1024 bytes will allow one 1024 byte packet or 2 512 bytes packets per clock tick
  5. 5. In our project, we will send a file. We will determine the file size. Then calculate the total number of packets as N( Number of packets)= Total File size/ 1024 Here 1024 is the fixed packet size. Now for these n packets a buffer or a queue is formed where the queue size is fixed to allocate a few packets say for instance 20/30. Hence from the queue each packet is sent at a fixed time interval sa “t” seconds where the “t” seconds is specified as a constant rate by the user. As and when the queue data goes out, the queue gets filled up. Once the queue is completely full, then the buffer will not allow any other flow and hence the buffer overflows. From this queue the data goes out to the router and from the router to the destination While collecting information from the network's data stream, it displays the following types of information: The source address of the computer that sent a frame onto the network. (This address is a unique hexadecimal (or base-16) number that identifies that computer on the network.) The destination address of the computer that received the frame. The protocols used to send the frame. The data, or a portion of the message being sent. Hence at any particular time, the congestion will not occur and hence the tarffic is diverted smoothly MULTI ROUTER TRAFFIC MONITOR