virtual network monitoring system
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project topics
Active In SP
**

Posts: 2,492
Joined: Mar 2010
#1
22-04-2010, 11:16 AM


VIRTUAL NETWORK MONITORING SYSTEM
Virtual Network Monitoring System:
The demand for cost and time saving technologies in combination with competitive pressures within corporate environments has made VPN (Virtual Private Network) technology an alternative option for enterprise network connectivity. However, the amount of available information and the speed at which technical landscapes are changing quickly outpaces typical VPN solutions being developed. Rapid development and abundant options create complexity for network designers with respect to choosing and implementing the proper VPN technology.

VIRTUAL NETWORK MONITORING SYSTEM is a Java tool to observe network traffic virtually. Network administrators facilitate to monitor VPN (PPTP / IPSec / SSH) and SSL (HTTPS) connectivity of wire line/wireless networks. The graphical representation makes it easy to visualize messages being sent between computer nodes. Users can also read messages not of the above types in plain text. Connection statistics can be used as a measure of network security. The PRO edition allows network administrators to monitor multiple and remote networks.

Modules:

¢ Capturing Packets
By choosing a network card can capture packets from the network.It will list out all the network devices in the system, when we select one of those devices this application will capture all the packets coming form that device.

¢ Drawing Connections
In the network traffic visualization, VPN and SSL connections are represented in colors other than black. When the packets are captured from the network card then it will captures all the IP addresses of the systems which are connected in the network.
¢ Plotting Network
Each message captured by VIRTUAL WATCH SYSTEM is represented graphically by an edge connecting two computers. Since messages are sent both ways ,when a message is passing from one system to another system then a edge connecting those two computers are drown dynamically.
¢ Dumping Text
All messages not sent through VPN nor SSL are printed onto the screen. The latest arriving message will be appear at the top of the table. Different filters will be developed to locate messages containing sensitive information.
¢ Collecting Statistics
Dynamic updating of the statistics table. The statistics table collects the fractions of secure connections and packets in the network. It will represent all the information how many packets are transferred in the subnet.
¢ Resolving IP Address:
VIRTUAL WATCH SYSTEM will support the functionalities of resolving IP addresses to hostnames depending on the capturing device.
¢ Set Filters:
By this application the system administrator is provided with the filters for the data security and graphical representation makes easy to the administrator to identify how many systems are connected and how many are active at present.


Introduction
This white paper reviews several important design issues that should be considered when evaluating Virtual Private Network (VPN) technology. Today, each network manager is responsible for a network that differs from other networks as much as individual people differ from one another. This uniqueness invariably causes issues when designing a VPN.

VPN technology is one of the most integrated technologies being deployed on todayâ„¢s networks. Every VPN solution interacts with existing sub-systems and crosses all business and operational practices. Based on their specific exposure and technological predispositions, peopleâ„¢s perceptions of VPN technologies differ significantly.

The demand for cost and time saving technologies in combination with competitive pressures within corporate environments has made VPN technology an alternative option for enterprise network connectivity. However, the amount of available information and the speed at which technical landscapes are changing quickly outpaces typical VPN solutions being developed. Rapid development and abundant options create complexity for network designers with respect to choosing and implementing the proper VPN technology.

At present, many vendorsâ„¢ VPN solutions are closer to using common practices, but interoperability issues with non-standards-based solutions create awkward manageability issues. Common practices used to configure control and monitor must be reexamined during the design of a VPN.
The goal of a successful VPN is to provide authenticated and authorized nodes with proper access to trusted networks in a seamless and automated fashion. This interaction must include client-to-client, client-to-gateway, or gateway-to-gateway connections. A VPN solution must provide centralized management, reliable service, and ensure the integrity and privacy of data transfers. These goals must be accomplished when traversing either a public or private network infrastructure

3.1 Purpose

The purpose of this document is to give the overview of the project and implimentation. The main aim of this project and implimentation is to observe network traffic virtually. Network administrators facilitate to monitor VPN (PPTP / IPSec / SSH) and SSL (HTTPS) connectivity of wire line/wireless networks. The graphical representation makes it easy to visualize messages being sent between computer nodes. Users can also read messages not of the above types in plain text. Connection statistics can be used as a measure of network security. The PRO edition allows network administrators to monitor multiple and remote networks. Virtual Network Monitoring System will focus on number of functionalities for monitoring network traffic and security.

3.2. Overview
VIRTUAL NETWORK MONITORING SYSTEM is a Java tool to observe network traffic virtually. Network administrators facilitate to monitor VPN (PPTP / IPSec / SSH) and SSL (HTTPS) connectivity of wire line/wireless networks. The graphical representation makes it easy to visualize messages being sent between computer nodes. Users can also read messages not of the above types in plain text. Connection statistics can be used as a measure of network security. The PRO edition allows network administrators to monitor multiple and remote networks.





Main functional features of the Virtual Watch System on Private Networks
3.2.1 Capturing Packets
3.2.2 Drawing Connections
3.2.3 Plotting Network
3.2.4 Dumping Text
3.2.5 Collecting Statistics
3.2.6 Resolving IP Addresses
4.0. System Analysis

4.1. Existing System

Restricted Access to Desirable Services
A firewall may well restrict certain inherently dangerous services which users of the protected network nevertheless want to use. Services for which proxy servers do not (yet) exist will effectively be blocked by proxy firewalls; newer services such as WAIS were not designed to work with firewalls and, by their very newness, are considered to be unsafe . Compromises by the designers of the security policy may be necessary in order to prevent the users from circumventing the firewall completely.
Decrease in Throughput
Firewalls may represent a significant bottleneck in communication between the protected network and the outside world. However, this is less of a problem than is generally assumed, as most firewalls can pass data at T1 rates (1.5 mpbs), while most sites are connected at rates less than T1.
Concentrated Security
While having security concentrated on one host has its advantages, a compromise of the firewall could be disastrous to hosts which are not running their own security software. The question is whether a more likely, but smaller, security breach is better or worse than a less likely large breach.
Complicancy
Both users and management may tend to become complacent about security when a firewall is installed. Investing time and money in a firewall is not particularly useful if other methods for stealing data or attacking systems are neglected. User security education is essential, since legitimate users are already inside the protected network. Physical security is also often neglected - implementing the most powerful firewalls and having the most carefully designed security policy is useless if someone can simply walk off with the server.


4.2. Proposed system

Our proposed system is Virtual Network Monitoring System,as the popularity of the Internet grew, businesses turned to it as a means of extending their own networks. First came intranets, which are password-protected sites designed for use only by company employees. Now, many companies are creating their own VIRTUAL NETWORK MONITORING SYSTEM(virtual private network) to accommodate the needs of remote employees and distant offices.

Basically, a VIRTUAL NETWORK MONITORING is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VIRTUAL NETWORK uses "virtual" connections routed through the Internet from the company's private network to the remote site or employee. In this article, you will gain a fundamental understanding of VIRTUAL NETWORkâ„¢s, and learn about basic VIRTUAL NETWORK components, technologies, tunneling and security.

There are two common types of VIRTUAL NETWORK Remote-access, also called a virtual private dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations.
Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VIRTUAL NETWORK MONITORING SYSTEM can be one of two types:
¢ Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VIRTUAL NETWORK to connect LAN to LAN.
¢ Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VIRTUAL NETWORK that connects LAN to LAN, and that allows all of the various companies to work in a shared environment
A well-designed VIRTUAL NETWORK uses several methods for keeping your connection and data secure:

¢ Firewalls
¢ Encryption
¢ IPSec
¢ AAA Server





4.3. Modules Of The Product

There are basically five modules for developing

¢ Capturing Packets
By choosing a network card can capture packets from the network.It will list out all the network devices in the system, when we select one of those devices this application will capture all the packets coming form that device.

¢ Drawing Connections
In the network traffic visualization, VPN and SSL connections are represented in colors other than black. When the packets are captured from the network card then it will captures all the IP addresses of the systems which are connected in the network.

¢ Plotting Network
Each message captured by VIRTUAL WATCH SYSTEM is represented graphically by an edge connecting two computers. Since messages are sent both ways ,when a message is passing from one system to another system then a edge connecting those two computers are drown dynamically.



¢ Dumping Text
All messages not sent through VPN nor SSL are printed onto the screen. The latest arriving message will be appear at the top of the table. Different filters will be developed to locate messages containing sensitive information.

¢ Collecting Statistics
Dynamic updating of the statistics table. The statistics table collects the fractions of secure connections and packets in the network. It will represent all the information how many packets are transferred in the subnet.


¢ Resolving IP Address:
VIRTUAL WATCH SYSTEM will support the functionalities of resolving IP addresses to hostnames depending on the capturing device.






















5.0. Operating Environment

5.1 HARDWARE SPECIFICATIONS:
Processor Name : Pentium-III
Processor Speed : 677 MHZ
RAM : 256 MB
Hard Disk Capacity : 20 GB

5.2 SOFTWARE SPECIFICATIONS:

Application Language : JAVA 1.4.X

Libraries : JPCAP, WINPCAP

Operating System : WINDOWS 2000
PROFESSIONAL
Use Search at http://topicideas.net/search.php wisely To Get Information About Project Topic and Seminar ideas with report/source code along pdf and ppt presenaion
Reply
svijee
Active In SP
**

Posts: 1
Joined: May 2010
#2
25-05-2010, 11:23 PM

Technology, language,platform etc used to create network monitoring tool
Reply
seminar class
Active In SP
**

Posts: 5,361
Joined: Feb 2011
#3
26-02-2011, 10:52 AM


.doc   Network Monitoring System.doc (Size: 27 KB / Downloads: 106)
Network Monitoring System
abstract

Network Monitoring System enables the local administrator to perform real time monitoring, data acquisition, data analysis and transmission .Here the administrator's work is made easier and simple.
Administrator is having options for new user registration, updating and deleting user accounts, enable or disable user accounts, time allotment of users, he can view the system details of any user, he can view the hardware and software defects in any system connected through the network, he can capture the system of any user using his system, detect failure in network and can access the full control of any user at any time, he can shutdown and reboot any system, chatting, and some other facilities in this system.
Whenever the administrator finds that a particular user performs an illegal activity, he can disable that user's account and the user is not permitted to log into the system.
The Administrator has some other options to view some details regarding the accounts and the registered users in the network. He can view the complaints, requests and feedback made by the users. He can view the logged users details such as current logic time, last logos time etc., time allotment list of all the users, system details of a particular user in the network etc..Only the registered user can use the service provided by flee System.
The services offered to the user are mailing, chatting, call services such as complain. request and feedback submission, and change password and view user's account details. Security features are also enhanced in the software by checking the user name, password and category. Time allotment for the user is done based on the user id. This system consists of mainly four modules namely failure detection, system details, user details and remote section.
Project description
The main objective of this project and implimentation is to develop a fullfledged system giving detailed information about local network of a Campus. This project and implimentation s focused mainly in administrative task.This software enables the local network administrator to view the entire network structure, to perform client control and real time monitoring, to find LAN traffic and failure detection and he can chat with the clients and check the complaints registered by them. The administrator can also change his password for ensuring security in the network.
Here the administrator monitors all the machines in the network and he has the facility to view the system configuration. He also monitor all the users logged on to the network and has the facility to , view the details of the users such as username, last logoOFFtime, last logintime, login date and privilege.
Administrator can perform real time monitoring by viewing the current connected machines in the network and logged in users and hence can find their processor, application and memory details. Administrator has the facility to know actual network structure, desktop capture, shutdown, restart and IogOFF a remote system from his sysem.
Administrator can defect the traffic ie. the frequency, delay and bandwidth of the network cable laid and hence he could take a decision whether to replace network cables of higher bandwidth and thereby get the speed of data transfer increased. Security features are also included to the software by checking username and password.
Administrator can send online messages to all remote systems in the network or send online messages to a particular users logged into remote system. Call registration facility is provided for the users to register his complaints and requests. Administrator has the facility to view the complaint registered by the user and send a reply back to the user. The users can also send feedback about the resources provided by tile organization. Administrator can find the software installed in a machine.
Reply
seminar paper
Active In SP
**

Posts: 6,455
Joined: Feb 2012
#4
15-03-2012, 12:45 PM

to get information about the topic "Network Monitoring System" full report ppt and related topic refer the link bellow

topicideashow-to-network-monitoring-system

topicideashow-to-virtual-network-monitoring-system

topicideashow-to-network-monitoring-system-communication--12305
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Message
Type your reply to this message here.


Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  ON THE EFFECTIVENESS OF MONITORING FOR INTRUSION DETECTION IN MOBILE AD HOC abstract seminar tips 2 802 09-05-2014, 09:43 AM
Last Post: seminar project topic
  Wireless Sensor Network Security model using Zero Knowledge Protocol project uploader 1 1,037 28-02-2014, 01:44 AM
Last Post: mspadmini19
  INTELLIGENT RAILWAY STATION MONITORING AND ALERT SYSTEM (IRSMAS) seminar-database 3 3,335 10-01-2014, 02:05 PM
Last Post: seminar project topic
  Network Assisted Mobile Computing with Optimal Uplink Query Processing pdf seminar projects maker 0 467 20-09-2013, 04:01 PM
Last Post: seminar projects maker
  The Content-Based Image Retrieval using the Pulse Coupled Neural Network PPT seminar projects maker 0 546 14-09-2013, 01:58 PM
Last Post: seminar projects maker
  AUTOMATED BUSINESS INTELLIGENCE NETWORK FOR SOFTWARE REQUIREMENT SPECIFICATIONS seminar projects maker 0 431 12-09-2013, 03:46 PM
Last Post: seminar projects maker
  The Awareness Network PPT project girl 1 588 02-09-2013, 01:43 PM
Last Post: Guest
  A Study on Topological Characteristics of Wireless Sensor Network pdf study tips 0 401 30-08-2013, 04:57 PM
Last Post: study tips
  Inter Bank Fund Transfer in Distributed Network smart paper boy 1 1,416 01-08-2013, 03:07 PM
Last Post: Guest
  Sensor Network Based Oilwell Health Monitoring and Intelligent Control pdf study tips 0 418 01-08-2013, 12:47 PM
Last Post: study tips