LAN Security Manager PDF
LAN Security Manager PDF
LAN Security Manager PDF
Bachelor of Engineering
in
Computer Engineering
to
CERTIFICATE
This is to certify that the minor project entitled Local Area Network Manager, sub-
mitted by
Apart from the my efforts the success of any work depends largely on the encouragement
and guidelines of many others. We take this opportunity to express my gratitude to the
people who have been instrumental in the successful completion of this Minor project work.
We would like to express my heartfelt gratitude towards our Guide Assi Prof. Miss Prachi
Chaudhari for his support and valuable guidance which resulted in the successful completion
of this report.We would like to express my sincere gratitude to Head of Department Prof.
Dr. Girish K.Patnaik (Department of Computer Engineering), for his valuable guidance and
encouragement during the work.We would like to take opportunity to sincerely thanks to all
the concern individuals, family members, friends, who made my Spacial study success. We
also thanks all those people who helped me in anyway what so ever act some point in time.
Acknowledgements ii
Abstract 1
1 Introduction 2
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.2 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.3 Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
1.4 Problem Definition . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.5 Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.6 Objective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.7 Organization of the report . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.8 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 System Analysis 5
2.1 Literature Survey . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.2 Proposed System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.3 Feasibility study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3.1 Economical Feasibility . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3.2 Operational Feasibility . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.3.3 Technical Feasibility . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.4 Risk Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
2.5 Project Scheduling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.6 Effort Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
2.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4 System Design 12
4.1 System Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.1.1 Interfaces: The Heart of RMI . . . . . . . . . . . . . . . . . . . . . . 12
4.1.2 RMI Architecture Layers: . . . . . . . . . . . . . . . . . . . . . . . . 13
4.1.3 Stub and Skeleton Layer: . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.1.4 Remote Reference Layer: . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.1.5 Transport Layer: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.2 E-R diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.3 Database Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.3.1 Schema . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.4 Data Flow Diagram (up to level-2) . . . . . . . . . . . . . . . . . . . . . . . 17
4.5 Interface Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.5.1 User Interface Design . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.5.2 Module to Module Interaction (Using Collaboration Diagram) . . . . 18
4.6 Uml Diagrams . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.7 Use Case Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.7.1 Class Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.7.2 Sequence Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.7.3 Component Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.7.4 Deployment Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.7.5 State Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
4.7.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
5 Implementation 27
5.1 Implementation details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
5.1.1 Pd detection: . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
5.1.2 Files /folder/application . . . . . . . . . . . . . . . . . . . . . . . . . 28
5.2 5.2 Implementation environment . . . . . . . . . . . . . . . . . . . . . . . . . 28
5.3 5.3 Flow of system development . . . . . . . . . . . . . . . . . . . . . . . . . 28
5.4 5.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6 System Testing 31
6.1 TESTING STRATEGIES: . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.1.1 White-box tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.1.2 Black-box tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.1.3 Unit Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Bibliography 41
2.1 serverclient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
2.2 Gantt chart of LAN Manager . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1 fig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
4.2 fig.2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.3 fig.3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
4.4 fig.4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
4.5 fig.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
4.6 fig.6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
4.7 User interface component tree . . . . . . . . . . . . . . . . . . . . . . . . . . 17
4.8 fig . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
4.9 Event Diagram . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
4.10 Collaboration Diagram between Modules . . . . . . . . . . . . . . . . . . . . 20
4.11 Use Case Diagram for LAN Manager . . . . . . . . . . . . . . . . . . . . . . 21
4.12 Internal Use Case Diagram for LAN Manager . . . . . . . . . . . . . . . . . 22
4.13 Class Diagram for LAN Manager . . . . . . . . . . . . . . . . . . . . . . . . 23
4.14 Sequence Diagram for LAN Manger . . . . . . . . . . . . . . . . . . . . . . . 24
4.15 Component Diagram for LAN Manager . . . . . . . . . . . . . . . . . . . . . 25
4.16 Component Diagram for LAN Manager . . . . . . . . . . . . . . . . . . . . . 25
4.17 State Diagram for LAN Manager . . . . . . . . . . . . . . . . . . . . . . . . 26
7.1 fig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
7.2 fig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36
7.3 fig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7.4 fig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7.5 fig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
7.6 fig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
7.7 fig. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
This project deals with the functionalities of the terminal systems connected through a
network. This enhances the work efficiency of the administrator and also reduces the phys-
ical work strain. It can also be used to reduce the unnecessary power consumption in an
organization.
Collaborative architecture brings serious security challenges. One of these collaborative
solution is a remote desktop that provides a virtual graphical environment through a network
displayed on a thin client. As several thin clients access to the same host, conflicts or non
interference problems can raise.
Introduction
1.1 Introduction
We have seen many places where we have local area networks and lots of people using them
as per their own needs. In such scenarios we have to closely monitor the computers. Many
a times we need to lock the resources such as drives, folders or files on these computers to
restrict the users of making use of them.These are the common task that we do in our day to
day life but for this we dont have utility software. LAN Manager aims to develop a software
system that will be used as a remote control for PCs connected in a Local Area Network, this
software will be able to lock various resources such as Files, Folders, Applications, external
devices control and will also control the processes that are running on the remote computer.
This system does not connect to the machine but still can control its resources to lock or
unlock them. This way it save the processing powers of both the server and client computers,
thus speeding up the process.
1.2 Background
In the present generation systems, there is a need for the administrator has to go all around
the network in order to terminate any system that is left non-terminated.The administrator
has to take all the trouble of going to a particular system to access a file that is needed by
him.In order to get the system configuration details of any particular system, the admin-
istrator has to take the trouble of going to that system for obtaining the information.The
processes that are running in a particular system can be viewed only in that system itself
by using the present generation softwares.
1.6 Objective
Project mainly aims to write a software system that is used as a remote control for PCs
connected as a Local Area Network, this software is used to lock various resources such as
Drives, Folders, Files, Applications and Data Files, and it also control the processes that
are running on the remote computer. The software system also controls the login/logoff and
shutdown/restart events. The software has the ability to lock the USB as well as Removable
Drives. The software also to keep an eye on clients desktop i.e we can see what client is
doing on his desktop.
1.7 Summary
In this chapter, discussion about introduction to our project has been done. Next chapter
will discuss about System analysis
System Analysis
3. Modeling
4. Specification
5. Review
2. Jdk
3. MySql server
2. Connection window: This allows server to connect with clients by inserting IP address
of client.
3. Functionality Menu: This allows server to share files, folder or to download files and
folder. It also allows server to lock resources such application, files and folders. Another
use of this menu is to keep eye on clients desktop.
3.5 Summary
In this chapter, discussion about system requirement specification has been done. Next
chapter will discuss about system design.
System Design
System architecture of the system is nothing but the architecture of the RMI system in
java.
Remember that a Java interface does not contain executable code. RMI supports two
classes that implement the same interface. The first class is the implementation of the
behavior, and it runs on the server. The second class acts as a proxy for the remote service
and it runs on the client. This is shown in the following diagram. A client program makes
method calls on the proxy object, RMI sends the request to the remote JVM, and forwards
it to the implementation. Any return values provided by the implementation are sent back
to the proxy and then to the client’s program.
the first reply (this improves response time and possibly improves availability).
the program. In the AWT. Inheritance relationship between the user interface component
classes provided by the AWT.
1. Executable components
2. Code libraries
Implementation
Important phase in system development is the successful implementation of the new system
design. Implementation includes all those activities that take place to convert from the old
system to the new system or newly invented system.
2. Files lock/Application : In this module First of all the Server program will execute and
server will give the path of file which is on clients desktop and through BufferedInpu-
tReader the client will receive the file and convert it into byte array and then encrypt
it by adding decimal 5 into every byte of the array .
3. Folder lock: First of all the client program will execute and server will give the path
of folder which is on client desktop and server program will replace the guID of that
folder to convert it into recycle bin
4. Upload/download:Using this module we can transfer files between the client and the
server based on the IP address. This module will initialize TCP socket after that
with the help of input stream we will select the file which we want to share and after
5. Spying module:Using this module we can access the desktop of any remote system
by giving the desired systems IP address and port number we can get the desktop of
that system. It is useful for the teacher to monitor the activities of the student of
that organization.The administrator can be able to get the desktop of that particular
system and can warn the employees if they are doing any illegal activities.
In this module client program will take snapshots after certain interval of time and
paste it into robotactionqueue and will transfer it to server after this server program
will get the snapshots from robotactionlistner and the applet window will show the
clients desktop on server screen.
2. Language: java
5. Frontend : java
java technology. AWT(abstract window toolkit) use for implement graphical user interface.
AWT provide different components like
1. Button
2. listbox
3. checkbox
4. frame
5. container
6. radio button
7. combo box
All this component required for developing graphical user interface design of given system.
To enhance the quality of design swing component use to develop GUI design.
T111: Template Templates are used to create look and feel for the web application.
These are simply downloaded from the web and then changes are made to them according
to the user request. Cascading style sheets are used for formatting page layout, text, fonts
and images on the page. Cascading style sheets allow to position things on page down to
the exact pixel. Also, if a style is declared in the head section of a page, a change to the
style changes the style on the entire page.
T12: Logical Code: Details about the business logic and Core Java
5.4 Summary
In this chapter, discussion about Implementation has been done. Next chapter will discuss
about System Testing
System Testing
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the Software system meets its
requirements and user expectations and does not fail in an unacceptable manner. There are
various types of test. Each test type addresses a specific testing requirement
2. Interface errors,
2. Load testing: is the process of putting demand on a system or device and measuring its
response Load testing generally refers to the practice of modeling the expected usage
of a software program by simulating multiple users accessing the program concurrently.
As such, this testing is most relevant for multi-user systems, often one built using a
client/server model, such as web servers.
3. Stress Testing:In software testing, ”System stress test” refers to tests that put a greater
emphasis on robustness, availability, and error handling under a heavy load, rather
than on what would be considered correct behavior under normal circumstances. In
particular, the goals of such tests may be to ensure the software does not crash in
conditions of insufficient computational resources (such as memory or disk space),
unusually high concurrency, or denial of service attacks
7.1 Result
7.1.1 Enter IP address:
8.1 Conclusion
This is to conclude that the project that we undertook was worked upon with a sincere effort.
Most of the requirements have been fulfilled up to the mark and the requirements which have
been remaining, can be completed with a short extension. It is easy to use, since it uses the
GUI provided in the user dialog. User friendly screens are provided. The application is easy
to use and interactive. It has been thoroughly tested and implemented.
2. We can increase the functionality in terms of actions that we can perform from a server
on a client.
3. We can use encryption and decryption techniques while sending files and information
from 1 PC to another in a network.
4. We can make all the Login information on server requiring the clients to connect and
access the information to authenticate.
[1] Bone, Mike, Wayman, Dr. James L., and Blackburn, Duane. Evaluating FacialRecog-
nition Technology for Drug Control Applications. ONDCP International Counter-
drug Technology Symposium: Facial Recognition Vendor Test. Department of Defense
Counterdrug Technology Development Program Office, June 2001.
[2] Gross, Ralph, Shi, Jianbo, and Cohn, Jeffrey F. Quo vadis Face Recognition. Third-
Workshop on Empirical Evaluation Methods in Computer Vision. Kauai: December
2001.
[3] Penev, Penio S., and Atick, Joseph J. Local Feature Analysis: A General Statisti-
calTheory for Object Representation. Network: Computation in Neural Systems, Vol.
7, No. 3, pp. 477-500, 1996.
[5] All, Anne. Triple DES dare you. ATM Marketplace.com. 19 Apr. 2002.