Network Monitoring System
-
Upload
abhichoudhary87 -
Category
Documents
-
view
659 -
download
3
Transcript of Network Monitoring System
![Page 1: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/1.jpg)
NETWORK MONITORING SYSTEM
Presented by:-
Abhishek 1SS05CS004
Manish Kr Shashi 1SS05CS051
Rohit Kumar 1SS05CS088
Soumo Broto Gangoli 1SS05CS109
![Page 2: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/2.jpg)
Contents:
• Introduction
• What is network monitoring system?
• Why is it required?
• Requirements
• Project development
• Server side
• Client side
• Snapshots
• Conclusion
• Future Enhancements
![Page 3: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/3.jpg)
Introduction
Network Monitoring:-
• Network monitoring is spying for a good cause.
• The administrator keeps watch on the peers through a dedicated
system called server.
• The administrator has special privileges through which he can
terminate any process of any client computer.
![Page 4: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/4.jpg)
What is Network Monitoring System?
• A Network Monitoring System is a software that prevents unauthorized
access or work done by a client system connected to the network.
• The server accepts connection from the clients connected to it.
• It constantly monitors its peers and prevents the users from unauthorized
browsing, downloading and illicit access.
![Page 5: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/5.jpg)
Why is it required?
• This software is required to prevent unauthorized access of files
and data on a company or organizations’ LAN
• Also it can be used to prevent access of unwanted sites on the
internet.
• It can also be used to secure company’s data.
![Page 6: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/6.jpg)
Requirements
Software requirements:
• Windows 2000 and above operating system
• VB .net as the front end and Visual Basic as the back end
• Microsoft Visual studio 2008
Database Server configuration:
• Microsoft SQL Server 2005
![Page 7: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/7.jpg)
Requirements (contd)
Hardware requirements:
• Pentium III onwards computer processor
• 2.0 GHz processor
• 10 GB or higher hard disk
• 256 MB or above RAM
• 32 bit interface card
![Page 8: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/8.jpg)
Project development
• VB.Net is used to develop this project.
•There are two parts – Server and Client
•The server is the administrator who monitors all the clients in the network.
•The administrator has a unique id and password through which he logs on.
• A client also has a username-password to connect to the network.
• Facility is also provided to register new users.
•The administrator can see all the client information.
• Mysql database is used to maintain the record of client and server database.
•The server is password protected and prevents unauthorized access.
![Page 9: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/9.jpg)
Server side
• The server is a system that manages the resource used by the client connected to the network.
• The clients log on to the system using the password from the server.
• The server can constantly monitor the client systems connected to it.
• If the administrator find out any unauthorized access, he can terminate the process from his system.
• All the client details are stored in the database that can be only accessed by the administrator.
![Page 10: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/10.jpg)
Client side
• All the clients are connected to the server through LAN.
• The clients have to take the password from the server to connect to the network.
• If the peer system tries to run a process which is not allowed by the server, it can be terminated by the server
• Facility is also provided for the new users to register with the administrator.
![Page 11: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/11.jpg)
Snapshots
Fig:- The administrator login menu
![Page 12: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/12.jpg)
Snapshots ( continued)
![Page 13: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/13.jpg)
Snapshots ( continued)
Fig:- The control panel
![Page 14: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/14.jpg)
Snapshots ( continued)
Fig:- Third party software used
![Page 15: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/15.jpg)
Snapshots ( continued)
Fig:- The database
![Page 16: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/16.jpg)
Snapshots ( continued)
![Page 17: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/17.jpg)
Snapshots ( continued)
![Page 18: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/18.jpg)
Snapshots ( continued)
![Page 19: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/19.jpg)
Snapshots ( continued)
![Page 20: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/20.jpg)
Snapshots ( continued)
![Page 21: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/21.jpg)
Conclusion
• The software can be used on a LAN as well as WAN.
• It can be also applied on a small network such as our college.
![Page 22: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/22.jpg)
Future Enhancements
• It can be modified to be used on a wide network.
• Security can be enhanced by creating a stronger database.
• The privileges given to the administrator can be reduced.
![Page 23: Network Monitoring System](https://reader033.fdocuments.in/reader033/viewer/2022061118/5468f4f9af79598c5f8b46f7/html5/thumbnails/23.jpg)