You are on page 1of 96

A Project Report on

“LAN MESSENGER”
At

Available at www.mindstien.com 1
Abstract
____________________________________________________________________________________________________________
____________________________________________________________________________________________________________

Being able to send announcements to your employees is


crucial to any company’s success. LAN Messenger allows
company to inform their personnel about any important
event or incidents in a matter of seconds.

LAN Messenger is compatible with Windows 95/98,


Windows Me, Windows NT 4.0 as well as Windows 2000
and XP. It runs on any TCP/IP based Local Area Network
(LAN). The LAN messenger is optimized for minimum
network traffic and features and intuitive user interface
allowing company employees to spend very little time
learning this software.

LAN messenger main function is of intra-office


communication. It can support number of users and no
configuration is required and it easily works after
installation. It does not require a server. It has the facility
of automatic detecting users. It can send and receive
instant messages efficiently. It also encrypts the data which
is transferred for better security. It is compatible in all
major versions of Windows. LAN messenger is an office
popup which replaces WinPopup (Winpop) messenger
which is also a LAN messenger that is supplied with
Windows 9x/NT and unfortunately it does not work in
Windows 2000 and XP.

Available at www.mindstien.com 2
INDEX
TOPICS PAGE NO.

____________________________________

1. COMPANY PROFILE 7
Introduction 8
National Internet Backbone(NIB) 11
Service Provided by BSNL 13
Objective of the company 14

2. INTRODUCTION 16
Introduction 17
Network Classification 17
Types of Network 19
Basic hardware Components 28

3. PROJECT OVERVIEW 34
Introduction 35
User Requirement Specification 35
Architecture 37
Analysis 42

4. DESIGN OF THE SOFTWARE 43


Introduction 44
Chat Protocol Design 44
File Transfer Design 49
Voice Chat Design 50
User-Interface Design 50

5. PROCEDURE OF CREATING SOFTWARE 53


Concept of the Software 54
Steps to Create Software 54

6. INTRODUCTION TO SOFTWARE 59
Software Used 60
Microsoft Visual Studio 60
Features 62
Supported Products 63
Visual Studio 2008 67
Comparison of Product 70

7. SOFTWARE TECHNOLOGY-VB.NET 71
Introduction to VB.NET 72
Available at www.mindstien.com 3
Versions of VB.Net 72
Visual Basic 76
.Net Framework 78

8. BROADBAND TECHNOLOGY 80
Introduction 81
Broadband Technology 85
BSNL Broadband 95

9. CONCLUSION 97

10. FUTURE EXPANSION 98

11. BIBLIOGRAPHY 99

Available at www.mindstien.com 4
CHAPTER 1

COMPANY PROFILE

________________
 Introduction
 National Internet Backbone(NIB)
 Service Provided by BSNL
 Objective of the company

 INTRODUCTION
Available at www.mindstien.com 5
Bharat Sanchar Nigam Ltd. (BSNL) main building in southern Mumbai.

Bharat Sanchar Nigam Ltd. formed in October, 2000, is


World's 7th largest Telecommunications Company
providing comprehensive range of telecom services in
India: Wire line, CDMA mobile, GSM Mobile, Internet,
Broadband, Carrier service, MPLS-VPN, VSAT, VoIP
services, IN Services etc. Within a span of five years it has
become one of the largest public sector unit in India.

BSNL has installed Quality Telecom Network in the


country and now focusing on improving it, expanding the
network, introducing new telecom services with ICT
applications in villages and wining customer's confidence.
Today, it has about 47.3 million line basic telephone
capacity, 4 million WLL capacity, 20.1 Million GSM
Capacity, more than 37382 fixed exchanges, 18000

Available at www.mindstien.com 6
BTS, 287 Satellite Stations, 480196 Rkm of OFC Cable,
63730 Rkm of Microwave Network connecting 602
Districts, 7330 cities/towns and 5.5 Lakhs villages.

BSNL is the only service provider, making focused efforts


and planned initiatives to bridge the Rural-Urban Digital
Divide ICT sector. In fact there is no telecom operator in
the country to beat its reach with its wide network giving
services in every nook & corner of country and operates
across India except Delhi & Mumbai. Whether it is
inaccessible areas of Siachen glacier and North-eastern
region of the country. BSNL serves its customers with its
wide bouquet of telecom services.

BSNL is numero uno operator of India in all services in its


license area. The company offers vide ranging & most
transparent tariff schemes designed to suite every
customer.

BSNL cellular service, CellOne, has more than 17.8 million


cellular customers, garnering 24 percent of all mobile
users as its subscribers. That means that almost every
fourth mobile user in the country has a BSNL connection.
In basic services, BSNL is miles ahead of its rivals, with
35.1 million Basic Phone subscribers i.e. 85 per cent
share of the subscriber base and 92 percent share in
revenue terms.

BSNL has more than 2.5 million WLL subscribers and 2.5
million Internet Customers who access Internet through
various modes viz. Dial-up, Leased Line, DIAS, Account
Less Internet(CLI). BSNL has been adjudged as the
NUMBER ONE ISP in the country.

Available at www.mindstien.com 7
BSNL has set up a world class multi-gigabit, multi-protocol
convergent IP infrastructure that provides convergent
services like voice, data and video through the same
Backbone and Broadband Access Network. At present
there are 0.6 million DataOne broadband customers.
The company has vast experience in Planning,
Installation, network integration and Maintenance of
Switching & Transmission Networks and also has a world
class ISO 9000 certified Telecom Training Institute.

Scaling new heights of success, the present turnover of


BSNL is more than Rs.351,820 million (US $ 8 billion)
with net profit to the tune of Rs.99,390 million (US $
2.26 billion) for last financial year. The infrastructure
asset on telephone alone is worth about Rs.630,000
million (US $ 14.37 billion).

BSNL plans to expand its customer base from present 47


millions lines to 125 million lines by December 2007 and
infrastructure investment plan to the tune of Rs. 733 crores
(US$ 16.67 million) in the next three years.

The turnover, nationwide coverage, reach, comprehensive


range of telecom services and the desire to excel has
made BSNL the No. 1 Telecom Company of India.

BSNL Registered Office Bharat Sanchar Bhavan


Harish Chandra Mathur
Lane
Janpath, New Delhi-110
001

BSNL Corporate Office Bharat Sanchar Bhavan


Harish Chandra Mathur
Lane
Janpath, New Delhi-110
001

Available at www.mindstien.com 8
 National Internet Backbone(NIB) of BSNL

The National Internet Backbone of BSNL consists


of 432 Point of Presence( POP) that gives it the
capability of transporting IP traffic from every
hook and corner of the country. This
network provides internet services to more than 1
million dial-up customers including about 3.5 lakh
customers on CLI basis.

2nd in the line of IP network, BSNL commissioned


a state-of-the-art Multi Protocol Label Switching
(MPLS) NETWORK TAKING India into the next
stage of the IP evolution. This network has 10
physical nodes with all district headquarters
designated as virtual nodes. This network has
opened up a new market segment of secure and
reliable Virtual Private Networks (VPNs) for
Corporate customers.

The latest endeavor of BSNL is a world-class


multi-gigabit multi-protocol, convergent IP
infrastructure which will provide voice, data and
video services through the same backbone. In
Available at www.mindstien.com 9
terms of infrastructure for broadband services,
this would put India at par with more advanced
nations. Designated as NIB-II this will be
implemented in the form of four projects.

• Project 1 involves building up of MPLS


backbone
• Project 2.1 is for narrow band access
• Project 2.2 is for broadband access
• Project 3 is to put systems and processes
in place to integrate network built in The
other projects and provide services like
messaging, billing etc.

All the above projects in form of NIB-II are at


different stages of implementation and as per
schedule .They will be operational in the third
quarter of this year.

The services that will be available to customers


when NIB-II is in place:

• Narrowband and broadband Internet access.


• Virtual Private Network.
• Managed OPE
• Value Added Services like encryption, firewall
and NAT
• Messaging: Plain Vanilla and feature rich
• Data Center Services: web hosting and web-
collocation.
• Content based Services: e.g. video multicast,
video on demand, interactive gaming

Available at www.mindstien.com 10
 Service Provided by BSNL

BSNL provides almost every telecom service in India. Following


are the main telecom services provided by BSNL:

• Universal Telecom Sevices : Fixed wireline services &


Wireless in Local loop (WLL) using CDMA Technology
called bfone and Tarang respectively. As of December 31,
2007, BSNL has 81% marketshare of fixed lines.

• Cellular Mobile Telephone Services: BSNL is major


provider of Cellular Mobile Telephone services using GSM
platform under the brand name CellOne[2]. Prepaid cellular
services of BSNL are know as Excel. As of March 31, 2007
BSNL has 17% share of mobile telephony in the country.

• Internet: BSNL provides internet services through dial-up


connection (Sancharnet) as Prepaid, (NetOne) as Postpaid
and ADSL broadband (DataOne). BSNL has around 50%
market share in broadband in India. BSNL has planned
aggressive rollout in broadband for current financial year.

Intelligent Network (IN): BSNL provides IN services like


televoting, toll free calling, premium calling etc.

If we talk about broadband than following types of services are


provided by the company and is forward looking to improvize the
services.

Services available through Broadband


• High speed Internet Access: This is the
always-on Internet access service with speed
ranging from 256 kbps to 8 Mbps.

Available at www.mindstien.com 11
• Multicasting: This is to provide video
multicast services for application in distance
education, telemedicine etc
• Dial VPN Service: This service allows remote
users to access their private network securely
over the NIB-II infrastructure.
• Video and Audio Conferencing:
• Content based Services: Like Video on
Demand, Interactive Gaming, Live and time
shifted TV

 Objective

1. To provide high speed Internet connectivity


(upto 8 Mbps)

2. To provide Virtual Private Network (VPN)


service to the broadband customers

3. To provide dial VPN service to MPLS VPN


customers.

4. To provide multicast video services, video-


on-demand, etc. through the Broadband
Remote Access Server (BRAS).

5. To provide a means to bill for the aforesaid


services by either time-based or volume-
based billing. It shall provide the customer
with the option to select the services through
web server

6. To provide both pre-paid and post paid


broadband services

Available at www.mindstien.com 12
VISION, MISSION AND OBJECTIVE OF BSNL

VISION
To become the largest telecom Service Provider in Asia.

MISSION
i. To provide world class State-of-art technology telecom
services to its customers on demand at competitive prices.

ii. To Provide world class telecom infrastructure in its area of


operation and to contribute to the growth of the country's
economy.

OBJECTIVES
• To be the Lead Telecom Services Provider.

• To provide quality and reliable fixed telecom service to our


customer and there by increase customer's confidence.

• To provide mobile telephone service of high quality and


become no. 1 GSM operator in its area of operation.

• To provide point of interconnection to other service provider


as per their requirement promptly.

• To facilitate R & D activity in the country.

• Contribute towards:
i. National Plan Target of 500 million subscriber base for India
by 2010.
ii. Broadband customers base of 20 million in India by 2010 as
per Broadband Policy 2004.
iii. Providing telephone connection in villages as per
government policy.
iv. Implementation of Triple play as a regular commercial
proposition.

Available at www.mindstien.com 13
CHAPTER 2

INTRODUCTION TO COMPUTER
NETWORK

__________________
 Introduction
 Network classification
 Types of networks
 Basic hardware components

Available at www.mindstien.com 14
Definition: Computer network is a group of interconnected
computers. Networks may be classified according to a wide variety
of characteristics.

 Introduction:

A computer network is a collection of computers and devices


connected to each other. The network allows computers to
communicate with each other and share resources and
information. The Advanced Research Projects Agency (ARPA)
designed "Advanced Research Projects Agency Network"
(ARPANET) for the United States Department of Defense. It
was the first computer network in the world in late 1960s and
early 1970s.

 Network classification:

The following list presents categories used for classifying


networks

 Connection method
Computer networks can also be classified according to the
hardware and software technology that is used to interconnect the
individual devices in the network, such as Optical fiber, Ethernet,
Wireless LAN, HomePNA, Power line communication or G.hn.

Ethernet uses physical wiring to connect devices. Frequently


deployed devices include hubs, switches, bridges and/or routers.

Wireless LAN technology is designed to connect devices without


wiring. These devices use radio waves or infrared signals as a
transmission medium.

Available at www.mindstien.com 15
ITU-T G.hn technology uses existing home wiring (coaxial cable,
phone lines and power lines) to create a high-speed (up to 1
Gigabit/s) local area network.

 Scale
Networks are often classified as Local Area Network (LAN), Wide
Area Network (WAN), Metropolitan Area Network (MAN),
Personal Area Network (PAN), Virtual Private Network (VPN),
Campus Area Network (CAN), Storage Area Network (SAN), etc.
depending on their scale, scope and purpose. Usage, trust levels
and access rights often differ between these types of network - for
example, LANs tend to be designed for internal use by an
organization's internal systems and employees in individual
physical locations (such as a building), while WANs may connect
physically separate parts of an organization to each other and may
include connections to third parties.

 Functional relationship (network architecture)


Computer networks may be classified according to the functional
relationships which exist among the elements of the network, e.g.,
Active Networking, Client-server and Peer-to-peer (workgroup)
architecture.

 Network topology
Computer networks may be classified according to the network
topology upon which the network is based, such as bus network,
star network, ring network, mesh network, star-bus network, tree
or hierarchical topology network. Network topology signifies the
way in which devices in the network see their logical relations to
one another. The use of the term "logical" here is significant. That
is, network topology is independent of the "physical" layout of the
network. Even if networked computers are physically placed in a
linear arrangement, if they are connected via a hub, the network
has a Star topology, rather than a bus topology. In this regard the
visual and operational characteristics of a network are distinct; the
logical network topology is not necessarily the same as the
Available at www.mindstien.com 16
physical layout. Networks may be classified based on the method
of data used to convey the data, these include digital and analog
networks.

 Types of networks

Below is a list of the most common types of computer networks.

 Personal area network:

A personal area network (PAN) is a computer network used


for communication among computer devices close to one
person. Some examples of devices that are used in a PAN are
printers, fax machines, telephones, PDAs and scanners. The
reach of a PAN is typically about 20-30 feet (approximately 6-9
meters), but this is expected to increase with technology
improvements.

Available at www.mindstien.com 17
 Local area network:

A local area network (LAN) is a computer network


covering a small physical area, like a home, office, or small group
of buildings, such as a school, or an airport. Current wired LANs
are most likely to be based on Ethernet technology, although new
standards like ITU-T G.hn also provide a way to create a wired
LAN using existing home wires (coaxial cables, phone lines and
power lines).

For example, a library may have a wired or wireless


LAN for users to interconnect local devices (e.g., printers and
servers) and to connect to the internet. On a wired LAN, PCs in the
library are typically connected by category 5 (Cat5) cable, running
the IEEE 802.3 protocol through a system of interconnected
devices and eventually connect to the Internet. The cables to the
servers are typically on Cat 5e enhanced cable, which will support
IEEE 802.3 at 1 Gbit/s. A wireless LAN may exist using a
different IEEE protocol, 802.11b, 802.11g or possibly 802.11n.
The staff computers (bright green in the figure) can get to the color
printer, checkout records, and the academic network and the
Internet. All user computers can get to the Internet and the card

Available at www.mindstien.com 18
catalog. Each workgroup can get to its local printer. Note that the
printers are not accessible from outside their workgroup.

Typical library network, in a branching tree topology


and controlled access to resources

All interconnected devices must understand the


network layer (layer 3), because they are handling multiple subnets
(the different colors). Those inside the library, which have only
10/100 Mbit/s Ethernet connections to the user device and a
Gigabit Ethernet connection to the central router, could be called
"layer 3 switches" because they only have Ethernet interfaces and
must understand IP. It would be more correct to call them access
routers, where the router at the top is a distribution router that
connects to the Internet and academic networks' customer access
routers.

The defining characteristics of LANs, in contrast to


WANs (wide area networks), include their higher data transfer
rates, smaller geographic range, and lack of a need for leased
telecommunication lines. Current Ethernet or other IEEE 802.3
LAN technologies operate at speeds up to 10 Gbit/s. This is the
data transfer rate. IEEE has projects investigating the
standardization of 100 Gbit/s, and possibly 400 Gbit/s.

 Campus area network

A campus area network (CAN) is a computer network


made up of an interconnection of local area networks (LANs)
within a limited geographical area. It can be considered one form
of a metropolitan area network, specific to an academic setting.

Available at www.mindstien.com 19
In the case of a university campus-based campus area
network, the network is likely to link a variety of campus buildings
including; academic departments, the university library and student
residence halls. A campus area network is larger than a local area
network but smaller than a wide area network (WAN) (in some
cases).

The main aim of a campus area network is to facilitate


students accessing internet and university resources. This is a
network that connects two or more LANs but that is limited to a
specific and contiguous geographical area such as a college
campus, industrial complex, office building, or a military base. A
CAN may be considered a type of MAN (metropolitan area
network), but is generally limited to a smaller area than a typical
MAN. This term is most often used to discuss the implementation
of networks for a contiguous area. This should not be confused
with a Controller Area Network. A LAN connects network devices
over a relatively short distance. A networked office building,
school, or home usually contains a single LAN, though sometimes
one building will contain a few small LANs (perhaps one per
room), and occasionally a LAN will span a group of nearby
buildings. In TCP/IP networking, a LAN is often but not always
implemented as a single IP subnet.

Available at www.mindstien.com 20
 Metropolitan area network

A metropolitan area network (MAN) is a network that


connects two or more local area networks or campus area networks
together but does not extend beyond the boundaries of the
immediate town/city. Routers, switches and hubs are connected to
create a metropolitan area network

 Wide area network

A wide area network (WAN) is a computer network that


covers a broad area (i.e. any network whose communications links
cross metropolitan, regional, or national boundaries [1]). Less

Available at www.mindstien.com 21
formally, a WAN is a network that uses routers and public
communications links. Contrast with personal area networks
(PANs), local area networks (LANs), campus area networks
(CANs), or metropolitan area networks (MANs), which are usually
limited to a room, building, campus or specific metropolitan area
(e.g., a city) respectively. The largest and most well-known
example of a WAN is the Internet. A WAN is a data
communications network that covers a relatively broad geographic
area (i.e. one city to another and one country to another country)
and that often uses transmission facilities provided by common
carriers, such as telephone companies. WAN technologies
generally function at the lower three layers of the OSI reference
model: the physical layer, the data link layer, and the network
layer.
 Global area network

A global area networks (GAN) specification is in


development by several groups, and there is no common definition.
In general, however, a GAN is a model for supporting mobile
communications across an arbitrary number of wireless LANs,
satellite coverage areas, etc. The key challenge in mobile
communications is "handing off" the user communications from
one local coverage area to the next. In IEEE Project 802, this
Available at www.mindstien.com 22
involves a succession of terrestrial WIRELESS local area networks
(WLAN).

 Virtual private network

A virtual private network (VPN) is a computer


network in which some of the links between nodes are carried by
open connections or virtual circuits in some larger network (e.g.,
the Internet) instead of by physical wires. The link-layer protocols
of the virtual network are said to be tunneled through the larger
network when this is the case. One common application is secure
communications through the public Internet, but a VPN need not
have explicit security features, such as authentication or content
encryption. VPNs, for example, can be used to separate the traffic
of different user communities over an underlying network with
strong security features.
Available at www.mindstien.com 23
A VPN may have best-effort performance, or may have
a defined service level agreement (SLA) between the VPN
customer and the VPN service provider. Generally, a VPN has a
topology more complex than point-to-point.

A VPN allows computer users to appear to be editing


from an IP address location other than the one which connects the
actual computer to the Internet.

 Internetwork

Internetworking involves connecting two or more


distinct computer networks or network segments via a common
routing technology. The result is called an internetwork (often
shortened to internet). Two or more networks or network segments
connected using devices that operate at layer 3 (the 'network' layer)
of the OSI Basic Reference Model, such as a router. Any
interconnection among or between public, private, commercial,
industrial, or governmental networks may also be defined as an
internetwork.

Available at www.mindstien.com 24
In modern practice, the interconnected networks use the
Internet Protocol. There are at least three variants of internetwork,
depending on who administers and who participates in them:

• Intranet
• Extranet
• Internet

Intranets and extranets may or may not have


connections to the Internet. If connected to the Internet, the intranet
or extranet is normally protected from being accessed from the
Internet without proper authorization. The Internet is not
considered to be a part of the intranet or extranet, although it may
serve as a portal for access to portions of an extranet.

>Intranet

An intranet is a set of networks, using the Internet


Protocol and IP-based tools such as web browsers and file transfer
applications, that is under the control of a single administrative
entity. That administrative entity closes the intranet to all but
specific, authorized users. Most commonly, an intranet is the
internal network of an organization. A large intranet will typically
have at least one web server to provide users with organizational
information

>Extranet

An extranet is a network or internetwork that is


limited in scope to a single organization or entity but which also
has limited connections to the networks of one or more other
usually, but not necessarily, trusted organizations or entities (e.g., a
company's customers may be given access to some part of its
intranet creating in this way an extranet, while at the same time the
customers may not be considered 'trusted' from a security
standpoint). Technically, an extranet may also be categorized as a
CAN, MAN, WAN, or other type of network, although, by

Available at www.mindstien.com 25
definition, an extranet cannot consist of a single LAN; it must have
at least one connection with an external network.

> Internet

The Internet is a specific internetwork. It consists of a


worldwide interconnection of governmental, academic, public, and
private networks based upon the networking technologies of the
Internet Protocol Suite. It is the successor of the Advanced
Research Projects Agency Network (ARPANET) developed by
DARPA of the U.S. Department of Defense. The Internet is also
the communications backbone underlying the World Wide Web
(WWW). The 'Internet' is most commonly spelled with a capital 'I'
as a proper noun, for historical reasons and to distinguish it from
other generic internetworks.

Participants in the Internet use a diverse array of


methods of several hundred documented, and often standardized,
protocols compatible with the Internet Protocol Suite and an
addressing system (IP Addresses) administered by the Internet
Assigned Numbers Authority and address registries. Service
providers and large enterprises exchange information about the
reachability of their address spaces through the Border Gateway
Protocol (BGP), forming a redundant worldwide mesh of
transmission paths.

 Basic hardware components

All networks are made up of basic hardware building


blocks to interconnect network nodes, such as Network Interface
Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition,
some method of connecting these building blocks is required,
usually in the form of galvanic cable (most commonly Category 5
cable). Less common are microwave links (as in IEEE 802.12) or
optical cable ("optical fiber"). An ethernet card may also be
required.

Available at www.mindstien.com 26
 Network interface cards

A network card, network adapter or NIC (network


interface card) is a piece of computer hardware designed to allow
computers to communicate over a computer network. It provides
physical access to a networking medium and often provides a low-
level addressing system through the use of MAC addresses.

 Repeaters

Available at www.mindstien.com 27
A repeater is an electronic device that receives a signal
and retransmits it at a higher power level, or to the other side of an
obstruction, so that the signal can cover longer distances without
degradation. In most twisted pair Ethernet configurations, repeaters
are required for cable which runs longer than 100 meters.

 Hubs

A hub contains multiple ports. When a packet arrives at


one port, it is copied unmodified to all ports of the hub for
transmission. The destination address in the frame is not changed
to a broadcast address.

 Bridges

Available at www.mindstien.com 28
A network bridge connects multiple network segments
at the data link layer (layer 2) of the OSI model. Bridges do not
promiscuously copy traffic to all ports, as hubs do, but learn which
MAC addresses are reachable through specific ports. Once the
bridge associates a port and an address, it will send traffic for that
address only to that port. Bridges do send broadcasts to all ports
except the one on which the broadcast was received.

Bridges learn the association of ports and addresses by


examining the source address of frames that it sees on various
ports. Once a frame arrives through a port, its source address is
stored and the bridge assumes that MAC address is associated with
that port. The first time that a previously unknown destination
address is seen, the bridge will forward the frame to all ports other
than the one on which the frame arrived.

Bridges come in three basic types:

1. Local bridges: Directly connect local area networks (LANs)


2. Remote bridges: Can be used to create a wide area network
(WAN) link between LANs. Remote bridges, where the
connecting link is slower than the end networks, largely have
been replaced by routers.
3. Wireless bridges: Can be used to join LANs or connect
remote stations to LANs.

 Switches

Available at www.mindstien.com 29
A switch is a device that forwards and filters OSI layer
2 datagrams (chunk of data communication) between ports
(connected cables) based on the MAC addresses in the packets.[5]
This is distinct from a hub in that it only forwards the packets to
the ports involved in the communications rather than all ports
connected. Strictly speaking, a switch is not capable of routing
traffic based on IP address (OSI Layer 3) which is necessary for
communicating between network segments or within a large or
complex LAN. Some switches are capable of routing based on IP
addresses but are still called switches as a marketing term. A
switch normally has numerous ports, with the intention being that
most or all of the network is connected directly to the switch, or
another switch that is in turn connected to a switch.[6]

Switch is a marketing term that encompasses routers


and bridges, as well as devices that may distribute traffic on load
or by application content (e.g., a Web URL identifier). Switches
may operate at one or more OSI model layers, including physical,
data link, network, or transport (i.e., end-to-end). A device that
operates simultaneously at more than one of these layers is called a
multilayer switch.

Overemphasizing the ill-defined term "switch" often


leads to confusion when first trying to understand networking.
Many experienced network designers and operators recommend
starting with the logic of devices dealing with only one protocol
level, not all of which are covered by OSI. Multilayer device
selection is an advanced topic that may lead to selecting particular
implementations, but multilayer switching is simply not a real-
world design concept.

Available at www.mindstien.com 30
 Routers

Routers are networking devices that forward data


packets between networks using headers and forwarding tables to
determine the best path to forward the packets. Routers work at the
network layer.

Available at www.mindstien.com 31
CHAPTER 3

PROJECT OVERVIEW

__________________
 Introduction
 User Requirement Specification
 Architecture
 Analysis

Available at www.mindstien.com 32
 Introduction

As a part of the project based on Software, I have


developed a LAN Messenger which supports facility like instant
messaging. A LAN messenger software is mostly used in the
companies to send messages to the employees rather than
announcing because announcing information may cause
disturbance in the working environment. For example, if a
company head want to convey some information to a particular
employee than announcing the information may disturb the
working environment or disclose the information to other
employees if private. So to avoid such circumstances this software
is used.

A LAN messenger is an instant messaging program


designed for use within a single local area network (LAN).

There are advantages using a LAN messenger over a


normal instant messenger. The LAN messenger runs inside a
company or private LAN, so only people who are inside the
firewall will have access to the system. Communication data does
not leave the LAN and the system can also not be spammed from
the outside. This software can also be used for file transfer, voice
chat and conference. Now we will see about requirements stated
for the software, architectural design in the deployment and the
module view and various steps in the development of this software.

 User Requirements Specification:

The following is a description of the requirements specified by


the users of the LAN Messenger thought the software created by
me carries only the requirement of messaging but different other
requirement specification is also mentioned.

1. The user of this software do not need to enter any kind of

Available at www.mindstien.com 33
password or username to operate it. They are automatically

connected as soon as this software is installed in every

computer of a network.

2. The software must be able to serve as an instant messaging

system i.e. any person who is using the software must be

able to send simple text messages to another person who has

the software installed.


3. A user of this software must be able to transfer any kind of
file to any other user of the software who is currently
online.
4. A user of this software must be able to perform voice chat
i.e. send voice messages, with any
other user of the software who is currently online.
5. The user who is invited to the voice chat or who is the
receiver of a particular file must be given
the choice to decline the offer or accept it.
6. The message will popup on the receiver screen as an alert to

the message received from another pc.

7. This software provides better security by encrypting the data.

8. The user is recognized by his name in the network rather

than the IP address.

9. All the pcs in the network are displayed on the screen as

Available at www.mindstien.com 34
follows in a treeview.

 Architecture of LAN messenger:

The following is the architecture of LAN messenger with facilities


like instant messaging, voice chat, file transfer and conference. It is
divided in to two views: 1. Deployment View and 2. Module View.

1. Deployment view:-
Client Side Software Server Side Software
Friend List GUI L Registration Online User Log In
Manager A process Information process
N Handler handler handler

Network handler
Voice Text File Control Conference
Chat Message Transfer Messages Message
Hander Handler Handler Handler Handler

Network handler
Figure 1. This diagram shows the architecture of the software in the deployment view with various
facilities like voice chat, text message, file transfer and conference

Available at www.mindstien.com 35
Figure 1. describes the architecture of the software system
in the allocation view. The software created by me
support only text messaging so in its architecture only
text message handler and control message handler will
only appear. On the server side, since there is no login or
registration required in the software created by me, both
this handler will not be present but a handler that
automatic controls the availability of the pc in the local
network must be present. In many cases, in LAN
messenger no server side client is required because the
Pcs are connected in a common network without access
to the server. So this architecture is based on the server
connection. The client side software is deployed on the
user’s computer and the server side software is deployed
on the pre-decided server.
In the client side software, the network
handler is used to communicate and send various
messages over the network. The text message handler is
to handle the text messages sent between the users. The
voice chat handler and the file transfer handler,
similarly, handle the voice chat and the file transfer
between the clients. The temporary message store is used
to store the messages temporarily when the user disables
the message receiving on his software. The friend list
manager is used to manage the friends of the user, which
includes deciding whether a particular user is a friend or

Available at www.mindstien.com 36
not, whether the user wants to receive messages from a
particular user or not.

On the server side, the network handler functions


similarly. It is used to send and receive various messages. The
registration process handler is used to handle the registration of new
users and make sure that the same user-id is not registered for more
than one user. The log in process handler helps in the log in process
of the user. It checks whether the user-id is registered or not and the
validity of the password entered. The list of all the online users is
maintained by the online user information handler.

 Module View
We describe the logical structure of the
architecture using the module view. The module view for
the software of the client and the server is given
separately. It shows how the various modules in the
system are interrelated to each other.

1. Architecture of Client Side Software

Figure 2 describes the architecture of the client side


software using the logical view. It describes how the

various modules communicate. All the modules which

receive and handle the various types of messages receive


and send these messages through the network handler.

The message handling modules also depend on the GUI

Available at www.mindstien.com 37
to receive different user messages like send a text
message, send a file etc. The GUI depends on the friend

list manager for display of the various online users, the


user’s friends and to decide whether a particular message

must be displayed to a user. It further uses the message

store module in order to display messages that are

received by the user’s software when the user had decided


that he does not want the messages temporarily.

2. Architecture of Server Side Software


Figure 3 describes the architecture of the server side
software using the logical view. It shows the interdependence
between the various modules. The network module is the main
base for the other modules and is used by them to receive and
send messages from and to the network. The registration module is
the one which checks whether the user-id that a particular user is
using to register already exists or not. If the user-id is new, it stores
the password corresponding to that id. The log in process module is
the one which is used whenever a user wants to log in into the
software. It checks with the registration module if the username
exists and determines whether the user must be allowed to be
logged in with that user-id or not depending on the password
entered. It also handles the messages regarding the logging out of a
user. The online user module maintains a list of all the users who
are currently online. It gets the information from the log in process
module.
Available at www.mindstien.com 38
Available at www.mindstien.com 39
 Analysis

The various uses cases that the software is required to address are:

1. It must have the facility of voice chat, conference and file


transfer among the computers in the network.

2. A user sending a text message to any other available user.

3. It must works in all the versions of windows.

4. If message transfer is successful than a feedback must be sent to


the message creator pc.

LAN Messenger is compatible with Windows 95/98,


Windows Me, Windows NT 4.0 as well as Windows 2000
and XP. It runs on any TCP/IP based Local Area Network
(LAN). The LAN messenger is optimized for minimum
network traffic and features and intuitive user interface
allowing company employees to spend very little time
learning this software.

Available at www.mindstien.com 40
CHAPTER 4

DESIGN OF THE SOFTWARE

__________________
 Introduction to Designing the software
 Chat protocol Design
 File Transfer Design
 Voice chat Design
 User-Interface Design

Available at www.mindstien.com 41
 Introduction of Designing the software

This software i.e. LAN messenger can be


produced in all languages like C, C++, JAVA, VB.NET,
Visual C#, etc. I have created this software using VB.Net
language. The coding and stimulation of this software is
made using Microsoft Visual Studio 2008. Since I have
created software based on chat i.e. transfer of text messages
various protocols related to it are discussed.

 Chat protocol Design

The deployments of the software will be required to


communicate using some of the protocol discussed in this section
. This protocol essentially specifies the messages the client will be
required to exchange with another client in order to be able to
perform a particular task like text messaging. This protocol will
enable the clients to communicate in a standard manner.
1. Types of packets:
Every packet that a user sends has a header attached to it
which is used to identify the type of the packet and the information
required for the processing of the packet. Fig. 4 describes the general
structure of the packet. The sequence number is a unique Id which
is attached to the front of each packet. This is used for identifying
the uniqueness of the packet. For every information sent by the
sender, the intended receiver sends an acknowledgement by

Available at www.mindstien.com 42
replying to the transmitter. If the sender does not receive an

acknowledgement within the time limit than he understands that


information is not received and replies again or take necessary
actions.

Sequence Type of packet Data required Data carried by


Number for processing the packet
Figure4. General Packet Structure.

The following are the different types of packets used according to


its application in creating the software.
a. REGISTER: This type of packet is sent by a client when he
wants to register with the network
using a new user-id. The structure of this type of
packet is as follows:
Register User name Ip address
(Max 15 character)

b. Log In: This type of packet is sent by a client whenever he


wants to login into the network. He sends the username,
along with the IP address that he had used earlier to
register with the network. The structure of the packet is
as follows:
Log In User name Ip address
(Max 15 character)

c. REGISTER_REPLY_OK: This packet is sent by the


Lan to a client if the registration of
the client is successful. The structure of

Available at www.mindstien.com 43
the packet is as follows:
REGISTER_REPLY_OK User name
(Max 15 character)

d. REGISTER_REPLY_FAIL: This packet is sent by the LAN or the

device through which all pcs are


connected to the client if the registration
of the client fails, which is the case
when the username used by the client
already exists in the serves database.
The structure of the packet is as follows:
REGISTER_REPLY_FAIL User name
(Max 15 character)

e. LOG_IN_SUCCESSFUL: This packet is sent by the device to the

client if the log-in process of


the client is successful. The structure of
the packet is as follows:
LOG_IN_SUCCESSFUL User name
(Max 15 character)

f. LOG_IN _FAIL: This packet is sent by the device in the network to


the client if the log-in process of the client is not
successful, which is the case when pair of the
username or Ip address sent by the client does not
match that in the database of the network. The
structure of the packet is as follows:

LOG_IN _FAIL User name(Max 15 character)


Available at www.mindstien.com 44
g. USER_LIST: This packet is sent by the device in network to the
client, after he logs in. It contains the user-ids of all
the users, currently online, along with their IP
addresses, which will enable to directly contact the
user when needed. Multiple packets may be
needed to be sent the entire list. So the packet also
contains the number of packets needed along with
the packet id. The structure of the packet is as
follows:
USER_LIST Total Number of Packet Number of users
Packets to be Number in this packet
send
<Username, Ip address>

h. USER_LIST_UPDATE: This packet is sent by the server to all

the existing online clients whenever a

new user logs in, using a multicast. It

contains the user-id and the IP address of

the newly logged in user. The structure of

this packet is same as the one used for

USER_LIST.
i. USER_LOG_OFF: This packet is sent by a client when the user
decides to log off. It sends this packet using
multicast to the group that is joined in by
all the users when they log in. The

Available at www.mindstien.com 45
structure of the packet is as follows:
USER_LOG_OFF User name
(Max 15 character)

j.TEXT_MESSAGE: This type of a packet is sent by a client


when he sends a text message to another client. The text message,
depending upon its size, may be sent in multiple packets. This
packet also contains the number of packets that are required for
the message along with the number of the current packet in that
set. It also contains a unique id, which is used to signify the
number of this text message in the entire conversation among the
two clients. The sender after sending the entire text message
expects the receiver to acknowledge each of the packets, in the set
of packets sent for the message. The receiver sends an
acknowledge for each packet of the text message it receives in
which it includes the Id of the message and the number of the
packet in that message. In order to deal with loses, the sender starts
a timer as soon as it sends the packets and if it does not receive
acknowledgements for all the packets from the receiver before
this timer it resends those packets for which the acknowledgement
is not required. Similarly, the receiver also starts a timer as soon as
it receives the first packet from the batch of packets which
constitute a message. If all the packets for this message are not
received before the timer expires, it resets the timer and informs the
sender about this. The structure of this type of packet is given as
follows:

TEXT_MESSAGE User-id of sender Unique-id of message


Number of packets for this message Packet Number
Text to be sent

All the packets related to messaging as explained above are


send as datagram packets.
Available at www.mindstien.com 46
Besides Chat protocol design there are various other design
that can be included in this software if wanted. These design
improvise the software facilities like file transfer, conference, voice
chat,etc.

 File Transfer Design


When a user decides to transfer a file or a directory, he sends a
FILE_TO_BE_SENT packet containing the name of the file or
directory he wants to send. When the intended recipient replies
with a FILE_ACCEPT, packet he waits for the sender to start the
file transfer. The sender, when he receives this packet, starts the
transfer through by using a stream connection (TCP). This type of a
connection is used in order to ensure a reliable and in-line delivery
of the file that is to be transferred. For each file to be sent, the
sender first sends the name of the file and the size of the file to be
sent and then waits for the receiver to send an OK packet. The
sender starts the transfer after he receives this packet. If the sender
wants to transfer a directory, then he first sends a message,
containing the name of the directory, which tells the receiver that
he about to be receiving files which must be put in a particular
directory. The receiver creates a new directory under that name
and waits for the files to be sent. When all the contents of the
directory are finished, the sender sends a END_DIR message,
which allows the receiver to know that the current directly has
been completely sent. All the files are treated as binaries.

Available at www.mindstien.com 47
 VOICE CHAT DESIGN
When a user decides to transfer a file or a directory, he sends a
VOICE_CALL packet containing the name of the file or
directory he wants to send. When the intended recipient
replies with a VOICE_CALL_ACCEPT, the caller starts a
stream connection (TCP) to connect to the already waiting
recipient. We decided to use the ITU G.117 standard as the codec
for the encoding of the voice of the users. This is a logarithmic
pulse modulation scheme which samples the input analog voice at
8 KHz to get a bit stream of 64Kbps.
 User Interface Design
In order to make the user interface easy to use, we would
have a graphical interface. The software developed by me has only
the features of text messaging and its plan and design is shown
below.
This software is created by me in which it has function of ping and
send only. The column below IP address shows the tree view of
the computer connected in network as described earlier. The row
above IP address shows the name of the receiver

Available at www.mindstien.com 48
LAN messenger can also have the user-interface facilities which
includes log-in, voice chat, conference and file transfer
created using JAVA software is shown below. This is only the
sample or visual view of what can be created in this software. The
interface would consist of mainly three types of screens which are
the login screen, the online users’ list screen and the messaging
screen. The plan and design of these screens is given in Figure 5 to
Figure 7 which was created in Java but this can also be possible
using vb.net.

Figure5. Design of Login Screen

This is the view of the log-in screen which requires password for log-in
purpose. The software created by me does not require any password setting.
It only requires the Ip address and username, the user are automatically
logged on as soon as they upload the software with a network of number of
computer.

Available at www.mindstien.com 49
Fig. 7. Design of the Messaging Screen

Fig.6 Online User-list Screen

Available at www.mindstien.com 50
CHAPTER 5

PROCEDURE OF CREATING SOFTWARE

_________________________________________________________________________

 Concept of the software


 Steps to create software

Available at www.mindstien.com 51
 Concept of the software
The concept of the software is very simple. Logic behind this
software is of course related to messaging among the group of
computer in the network. The logic behind this software is
explained below. For example, there are 10 pcs connected to each
other directly or through LAN or through a server. Each of this pcs
must be identified by their name rather than their IP address i.e. 1 pc
can be name as ‘A’, second as ‘B’ and so on. Now a person named
as ‘A’ would like to send message to ‘D’ . The message send by
‘A’ appears on ‘D’ as a popup. So Winpopup messenger is also
know as a LAN messenger. And it is compatible in most version of
Windows as discussed earlier. This software is created in VB.Net
using a tool named Microsoft Visual Studio which is used to create
as well as to stimulate the software.

 Steps to create software:

1. As you can see in figure 1. this is the software Microsoft


visual studio. You can see three white screen. The top left window
is the place where we write the program based on vb.net. The
bottom right indicates the output of the program. Top right is the
solution explorer which indicates the recent program files. As
shown in figure 2. to supports different file extensions.

Available at www.mindstien.com 52
Figure 1. Microsoft visual studio software.

figure 2. Supports different file format.

2. After entering the code in the top left block which support a

Available at www.mindstien.com 53
definite format form.vb . After creating and saving file click on the

build solution in the build tool to check the the errors in the coding.

The bottom shows output which shows 1 succeed, 0 failed, 0

skipped which means there are no errors in the program.

Figure.3

3. After clicking on build solution, if there are no errors

than click on debug which will show the command


start debugging(figure 4) which will show the program

Available at www.mindstien.com 54
output as shown in figure5.
Figure 4.

Figure 5. Ouput of the program

Available at www.mindstien.com 55
Since no computer is installed in a network no name in the tree

view is seen but as soon as it is connected between two or more

computer in a network than tree view of the computers is seen

below the label Ip address.

As shown in figure 4. the send button is used to send message

and ping button is used to check the connection between the

computers in the network.

If computers are connected in the network than output shown

in figure6. is obtained
Figure 6. Number of pcs connected

Available at www.mindstien.com 56
CHAPTER 6

INTRODUCTION TO SOFTWARE

__________________
 Software Used
 Microsoft Visual Studio
 Supported products
 Visual Studio 2008
 Comparison of products

Available at www.mindstien.com 57
 Software Used

Microsoft Visual Studio 2008

 Microsoft Visual Studio

Developed by Microsoft
Operating System- Microsoft Windows

Microsoft Visual Studio is an

Integrated Development Environment ([IDE]) from Microsoft. It

can be used to develop console and graphical user interface

applications along with Windows Forms applications, web sites

, web applications, and web services in both native code together

with managed code for all platforms supported by

Microsoft Windows, Windows Mobile, Windows CE,

.NET Framework, .NET Compact Framework and

Microsoft Silverlight.

Visual Studio includes a code editor supporting

IntelliSense as well as code refactoring. The integrated debugger

works both as a source-level debugger and a machine-level

debugger. Other built-in tools include a forms designer for building

GUI applications, web designer, class designer, and

database schema designer. It allows plug-ins to be added that

enhance the functionality at almost every level - including adding

Available at www.mindstien.com 58
support for source control systems (like Subversion

and Visual SourceSafe) to adding new toolsets like editors and

visual designers for domain-specific languages or toolsets for other

aspects of the software development lifecycle (like

the Team Foundation Server client: Team Explorer).

Visual Studio supports languages by means of

language services, which allow any programming language to be

supported (to varying degrees) by the code editor and debugger,

provided a language-specific service has been authored. Built-in

languages include C/C++ (via Visual C++), VB.NET (via

Visual Basic .NET), and C# (via Visual C#). Support for other

languages such as Chrome, F#, Python, and Ruby among others

has been made available via language services which are to be

installed separately. It also supports XML/XSLT,

HTML/XHTML, JavaScript and CSS. Language-specific versions

of Visual Studio also exist which provide more limited language

services to the user. These individual packages are called

Microsoft Visual Basic, Visual J#, Visual C#, and Visual C++.

Currently, Visual Studio 2008 and 2005 Professional

Editions, along with language-specific versions (Visual Basic,

C++, C#, J#) of Visual Studio 2005 are available for free to

Available at www.mindstien.com 59
students as downloads via Microsoft's DreamSpark program.

Visual Studio 2010 is currently in development.

Layout of the software:

 Features
It has following features

Code Editor:- Visual Studio, like any other IDE, includes a

code editor that supports syntax highlighting

and code completion using IntelliSense for not

Available at www.mindstien.com 60
only variables, functions and methods but also

language constructs like loops and queries

Debugger:- Visual Studio includes a debugger that works

both as a source-level debugger as well as

machine-level debugger.

Designer:- Visual Studio includes a host of visual designers

to aid in the development of applications. These

tools include:

Visual Studio 2005 in Designer view


The WPF Designer in Visual Studio 2008
Visual Studio Web Designer in code editor view
Visual Studio 2005 in Class Designer view
WinForms Designer
Web designer
WPF Designer
Class designer
Data designer
Mapping designer

Besides this it consists of several other tools.


 Supported Products

Microsoft Visual C++


Microsoft Visual C++ is Microsoft's implementation of the C

and C++ compiler and associated languages services and

specific tools for integration with the Visual Studio IDE. It

Available at www.mindstien.com 61
can compile either in C mode or C++ mode. For C, it follows

the ISO C standard with parts of C99 spec along with MS-

specific additions in the form of libraries. For C++, it follows

the ANSI C++ spec along with a few C++0x features. It also

supports the C++/CLI spec to write managed code, as well as

mixed mode code (a mix of native and managed code).

Microsoft positions Visual C++ for development in native

code or code that contains both native as well as managed

components. Visual C++ supports COM as well as the MFC

library. For MFC development, it provides a set of wizards

for creating and customizing MFC boilerplate code, and

creating GUI applications using MFC. Visual C++ can also

use the Visual Studio forms designer to design UI

graphically. Visual C++ can also be used with the

Windows API. It also supports the use of intrinsic

functions,[31] which are functions recognized by the compiler

itself and not implemented as a library. Intrinsic functions

are used to expose the SSE instruction set of modern CPUs.

Visual C++ also includes the OpenMP (version 2.0) spec.


Available at www.mindstien.com 62
Microsoft Visual C#
Microsoft Visual C# is Microsoft's implementation of the C#

language, that targets the .NET Framework, along with the

language services that lets the Visual Studio IDE support C#

projects. While the language services are a part of Visual

Studio, the compiler is available separately as a part of the

.NET Framework. The Visual C# 2008 compiler supports

version 3.0 of the C# language specifications. Visual C#

supports the Visual Studio Class designer, Forms designer,

and Data designer among others.

Microsoft Visual Basic

Microsoft Visual Basic is Microsoft's implementation of the

VB.NET language and associated tools and language

services. It was introduced with Visual Studio .NET (2002).

Microsoft has positioned Visual Basic for

Rapid Application Development. Visual Basic can be used to

author both console applications as well as GUI applications.

Like Visual C#, Visual Basic also supports the Visual Studio

Available at www.mindstien.com 63
Class designer, Forms designer, and Data designer among

others. Like C#, the VB.NET compiler also is available as a

part of .NET Framework but the language services, that let

VB.NET projects be developed with Visual Studio, are

available as a part of the latter.

Microsoft Visual Web Developer

Microsoft Visual Web Developer is used to create web sites,

web application and web services using ASP.NET. Either C#

or VB.NET languages can be used. Visual Web Developer

can use the Visual Studio Web Designer to graphically

design web page layouts.

Team Foundation Server

Included only with Visual Studio Team System, Team

Foundation Server is intended for collaborative

software development projects and acts as the server side

backend providing source control, data collection, reporting,

and project tracking functionality. It also includes the Team

Explorer, the client tool for TFS services, which is

integrated inside Visual Studio Team System.


Available at www.mindstien.com 64
 Visual Studio 2008

Visual Studio 2008, codenamed Orcas, was released to MSDN

subscribers on 19 November 2007 alongside .NET Framework 3.5.

The codename Orcas is, like Whidbey, a reference to an island in

Puget Sound, Orcas Island. The source code for the Visual Studio

2008 IDE will be available under a shared source license to some

of Microsoft's partners and ISVs. Microsoft released Service Pack

1 for Visual Studio 2008 on 11 August 2008.

Visual Studio 2008 is focused on development of

Windows Vista, 2007 Office system, and Web applications. For

visual design, a new Windows Presentation Foundation visual

designer and a new HTML/CSS editor influenced by

Microsoft Expression Web are included. J# is not included. Visual

Studio 2008 requires .NET Framework 3.5 and by default

configures compiled assemblies to run on .NET Framework 3.5,

but it also supports multi-targeting which lets the developers

choose which version of the .NET Framework (out of 2.0, 3.0, 3.5,

Silverlight CoreCLR or .NET Compact Framework) the assembly

runs on. Visual Studio 2008 also includes new code analysis tools,

including the new Code Metrics tool. For Visual C++, Visual

Available at www.mindstien.com 65
Studio adds a new version of Microsoft Foundation Classes (MFC

9.0) that adds support for the visual styles and UI controls

introduced with Windows Vista. For native and managed code

interoperability, Visual C++ introduces the STL/CLR, which is a

port of the C++ Standard Template Library (STL) containers and

algorithms to managed code. STL/CLR defines STL-like

containers, iterators and algorithms that work on C++/CLI

managed objects.

Visual Studio 2008 features a XAML based designer

(codenamed Cider), workflow designer, LINQ to SQL designer

(for defining the type mappings and object encapsulation for SQL

Server data), XSLT debugger, JavaScript Intellisense support,

JavaScript Debugging support, support for UAC manifests, a

concurrent build system, among others. It ships with an enhanced

set of UI widgets, both for WinForms and WPF. It also includes a

multithreaded build engine (MSBuild) to compile multiple source

files (and build the executable file) in a project across multiple

threads simultaneously. It also includes support for compiling

PNG compressed icon resources introduced in Windows Vista.

An updated XML Schema designer will ship separately some time

after the release of Visual Studio 2008.

Available at www.mindstien.com 66
The Visual Studio debugger includes features targeting

easier debugging of multi-threaded applications. In debugging

mode, in the Threads window, which lists all the threads, hovering

over a thread will display the stack trace of that thread in

tooltips.[61] The threads can directly be named and flagged for

easier identification from that window itself. In addition, in the

code window, along with indicating the location of the currently

executing instruction in the current thread, the currently executing

instructions in other threads are also pointed out. The

Visual Studio debugger supports integrated debugging of the

.NET Framework 3.5 BCL. It can dynamically download the BCL

source code and debug symbols and allow stepping into the BCL

source during debugging. Currently a limited subset of the BCL

source is available, with more library support planned for later in

the year.

Available at www.mindstien.com 67
 Comparision of different Products.

Target Visual
Extern Setup MSDN Target Itaniu Studio
Extens Class Refact Debug
Product al Project Integr Native m Tools
ions Designer oring ging
Tools s ation 64 bit Proces for
sors Office

Visual reduce reduce reduce


MSDN
Studio minima d d d
No Expres No No No No
Expres l functio functio functio
s
s nality nality nality

Visual reduce
Studio d
Yes Yes Yes Yes Yes Yes Yes No No
Standa functio
rd nality

Visual
Studio
Yes Yes Yes Yes Yes Yes Yes Yes No Yes
Profess
ional

Visual
Studio
Team Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes
System
editions

Available at www.mindstien.com 68
CHAPTER 7

SOFTWARE TECHNOLOGY- VB.NET

__________________
 Introduction to VB.Net
 Versions of VB.net
 Visual Basic
 .NET framework

Available at www.mindstien.com 69
 Introduction to VB.Net

Visual Basic (VB), formerly called Visual Basic .NET (VB.NET),

is an object-oriented computer language that can be viewed as an

evolution of Microsoft's Visual Basic (VB) implemented on the

Microsoft .NET framework.

 Versions of VB.net

As of November 2007, there are four versions of Visual Basic

.NET that were implemented by The Visual Basic Team

Available at www.mindstien.com 70
Visual Basic .NET (VB 7)

The original Visual Basic .NET was released alongside Visual C#

and ASP.NET in 2002. C# — widely touted as Microsoft's answer

to Java — received the lion's share of media attention, while

VB.NET (sometimes known as VB7) was not as widely

covered.[citation needed] Its introduction has been controversial, as

significant changes were made that broke backward compatibility

with older versions and caused a rift within the developer

community.

Visual Basic .NET 2003 (VB 7.1)

Visual Basic .NET 2003 was released with version 1.1 of

the .NET Framework. New features included support for the

.NET Compact Framework and a better VB upgrade wizard.

Improvements were also made to the performance and reliability

of the .NET IDE (particularly the background compiler) and

runtime.

In addition, Visual Basic .NET 2003 was also available in

the Visual Studio .NET 2003 Academic Edition (VS03AE).

VS03AE is distributed to a certain number of scholars from each

country for free.

Available at www.mindstien.com 71
Visual Basic 2005 (VB 8.0)

Visual Basic 2005 is the name used to refer to the update to Visual

Basic .NET, Microsoft having decided to drop the .NET portion of

the title.

For this release, Microsoft added many features, including:

• Edit and Continue


• Design-time expression evaluation
• The My pseudo-namespace (overview, details), which
provides:
o easy access to certain areas of the .NET Framework that
otherwise require significant code to access
o dynamically-generated classes (notably My.Forms)
• Improvements to the VB-to-VB.NET converter [2]
• The Using keyword, simplifying the use of objects that
require the Dispose pattern to free resources
• Just My Code, which hides boilerplate code written by the
Visual Studio .NET IDE
• Data Source binding, easing database client/server
development

The above functions (particularly My) are intended to reinforce

Visual Basic .NET's focus as a rapid application development

platform and further differentiate it from C#.

Visual Basic 2005 introduced features meant to fill in the gaps

between itself and other "more powerful" .NET languages, adding:

• .NET 2.0 languages features such as:


[3]
o generics

Available at www.mindstien.com 72
o Partial classes, a method of defining some parts of a
class in one file and then adding more definitions later;
particularly useful for integrating user code with auto-
generated code
o Nullable Types
• XML comments that can be processed by tools like NDoc to
produce "automatic" documentation
• Operator overloading
• Support for unsigned integer data types commonly used in
other languages

'IsNot' operator patented

One other feature of Visual Basic 2005 is the IsNot

operator that makes 'If X IsNot Y' equivalent to 'If Not

X Is Y', which gained notoriety when it was found to be the

subject of a Microsoft patent application.

Visual Basic 2005 Express

As part of the Visual Studio product range, Microsoft

created a set of free development environments for hobbyists and

novices, the Visual Studio 2005 Express series. One edition in the

series is Visual Basic 2005 Express Edition, which was succeeded

by Visual Basic 2008 Express Edition in the 2008 edition of Visual

Studio Express.

The Express Editions are targeted specifically for people

learning a language. They have a streamlined version of the user

interface, and lack more advanced features of the standard

Available at www.mindstien.com 73
versions. On the other hand, Visual Basic 2005 Express Edition

does contain the Visual Basic 6.0 converter, so it is a way to

evaluate feasibility of conversion from older versions of Visual

Basic.

Visual Basic 2008 (VB 9.0)

Visual Basic 9.0 was released together with the

Microsoft .NET Framework 3.5 on November 19, 2007.

For this release, Microsoft added many features, including:

• A true conditional operator If (boolean, value, value) to


replace the IIF function.
• Anonymous types
• Support for LINQ
• Lambda expressions
• XML Literals
• Type Inference

Visual Basic 'VBx' (VB 10.0)

Visual Basic 10, also known as VBx, will provide support

for the Dynamic Language Runtime (DLR). VB 10 is planned to

be part of Silverlight 2.0

 Visual Basic

Visual Basic (VB) is the third-generation event-driven

programming language and integrated development environment

(IDE) from Microsoft for its COM programming model. VB is


Available at www.mindstien.com 74
also considered a relatively easy to learn and use programming

language, because of its graphical development features and

BASIC heritage.

Visual Basic was derived from BASIC and enables the

rapid application development (RAD) of graphical user interface

(GUI) applications, access to databases using Data Access Objects,

Remote Data Objects, or ActiveX Data Objects, and creation of

ActiveX controls and objects. Scripting languages such as VBA

and VBScript are syntactically similar to Visual Basic, but perform


Available at www.mindstien.com 75
differently.

A programmer can put together an application using the

components provided with Visual Basic itself. Programs written in

Visual Basic can also use the Windows API, but doing so requires

external function declarations.

The final release was version 6 in 1998. Microsoft's

extended support ended in March 2008 and the designated

successor was Visual Basic .NET (now known simply as Visual

Basic).

 .NET Frame work

The Microsoft .NET Framework is a software framework

available with several Microsoft Windows operating systems. It

includes a large library of coded solutions to prevent common

programming problems and a virtual machine that manages the

execution of programs written specifically for the framework.

The .NET Framework is a key Microsoft offering and is intended

to be used by most new applications created for the Windows

platform.

The framework's Base Class Library provides a large

range of features including user interface, data and data access,

database connectivity, cryptography, web application development,

Available at www.mindstien.com 76
numeric algorithms, and network communications. The class

library is used by programmers, who combine it with their own

code to produce applications.

Programs written for the .NET Framework execute in a

software environment that manages the program's runtime

requirements. Also part of the .NET Framework, this runtime

environment is known as the Common Language Runtime (CLR).

The CLR provides the appearance of an application virtual

machine so that programmers need not consider the capabilities of

the specific CPU that will execute the program. The CLR also

provides other important services such as security, memory

management, and exception handling. The class library and the

CLR together constitute the .NET Framework.

Version 3.0 of the .NET Framework is included with

Windows Server 2008 and Windows Vista. The current version of

the framework can also be installed on Windows XP and the

Windows Server 2003 family of operating systems. A reduced

"Compact" version of the .NET Framework is also available on

Windows Mobile platforms, including smartphones.


Available at www.mindstien.com 77
CHAPTER 8

BROADBAND TECHNOLOGY

_________________
 Introduction
 Broadband Technology
 Bsnl Broadband

Available at www.mindstien.com 78
 Introduction

Definition:--- Broadband

A type of data transmission in which a single medium (wire)


can carry several channels at once. Cable TV, for example,
uses broadband transmission. Broadband technology can
transmit data, audio, and video all at once over long
distances

But the term broadband can have different meanings in


different contexts. The term's meaning has undergone substantial
shifts.

In Telecommunication

Broadband in telecommunications refers to a signaling method that

includes or handles a relatively wide range of frequencies, which

Available at www.mindstien.com 79
may be divided into channels or frequency bins. Broadband is

always a relative term, understood according to its context. The

wider the bandwidth, the greater the information-carrying capacity.

In radio, for example, a very narrow-band signal will carry

Morse code; a broader band will carry speech; a still broader band

is required to carry music without losing the high audio

frequencies required for realistic sound reproduction. A television

antenna described as "normal" may be capable of receiving a

certain range of channels; one described as "broadband" will

receive more channels. In data communications an analogue

modem will transmit a bandwidth of 56 kilobits per seconds

(kbit/s) over a telephone line; over the same telephone line a

bandwidth of several megabits per second can be handled by

ADSL, which is described as broadband (relative to a modem over

a telephone line, although much less than can be achieved over a

fibre optic circuit).

In data communications

Broadband in data can refer to broadband networks or

broadband Internet and may have the same meaning as above, so

that data transmission over a fiber optic cable would be referred to

as broadband as compared to a telephone modem operating at

Available at www.mindstien.com 80
56,000 bits per second.

However, broadband in data communications is

frequently used in a more technical sense to refer to data

transmission where multiple pieces of data are sent simultaneously

to increase the effective rate of transmission, regardless of data

signaling rate. In network engineering this term is used for

methods where two or more signals share a medium.

In DSL
The various forms of digital subscriber line (DSL)

services are broadband in the sense that digital information is sent

over a high-bandwidth channel above the baseband voice channel

on a single pair of wires.

In Ethernet
A baseband transmission sends one type of signal using a

medium's full bandwidth, as in 100BASE-T Ethernet. Ethernet,

however, is the common interface to broadband modems such as

DSL data links, and has a high data rate itself, so is sometimes

referred to as broadband. Ethernet provided over cable modem is a

common alternative to DSL.

In power-line communication

Power lines have also been used for various types of data

Available at www.mindstien.com 81
communication. Although some systems for remote control are

based on narrowband signaling, modern high-speed systems use

broadband signaling to achieve very high data rates. One example

is the ITU-T G.hn standard, which provides a way to create a

high-speed (up to 1 Gigabit/s) Local area network using existing

home wiring (including power lines, but also phone lines and

coaxial cables).

In video
Broadband in analog video distribution is traditionally

used to refer to systems such as cable television, where the

individual channels are modulated on carriers at fixed

frequencies. In this context, baseband is the term's antonym,

referring to a single channel of analog video, typically in

composite form with an audio subcarrier. The act of demodulating

converts broadband video to baseband video.

However, broadband video in the context of streaming

Internet video has come to mean video files that have bitrates high

enough to require broadband Internet access in order to view

them.

Broadband video is also sometimes used to describe

IPTV Video on demand.

Available at www.mindstien.com 82
 Broadband Technology

The standard broadband technologies in most areas are

DSL and cable modems. Newer technologies in use include VDSL

and pushing optical fiber connections closer to the subscriber in

both telephone and cable plants. Fiber-optic communication, while

only recently being used in fiber to the premises and fiber to the

curb schemes, has played a crucial role in enabling Broadband

Internet access by making transmission of information over larger

distances much more cost-effective than copper wire technology.

In a few areas not served by cable or ADSL, community

organizations have begun to install Wi-Fi networks, and in some

cities and towns local governments are installing municipal Wi-Fi

networks. As of 2006, broadband mobile Internet access has

become available at the consumer level in some countries, using

the HSDPA and EV-DO technologies. The newest technology

being deployed for mobile and stationary broadband access is

WiMAX.

Available at www.mindstien.com 83
DSL (ADSL/SDSL)

Multilinking Modems

Roughly double the dial-up rate can be achieved with

multilinking technology. What is required are two modems, two

phone lines, two dial-up accounts, and ISP support for

multilinking, or special software at the user end. This inverse

multiplexing option was popular with some high-end users before

ISDN, DSL and other technologies became available.

Diamond and other vendors had created dual phone line

modems with bonding capability. The data rate of dual line

modems is faster than 90 kbit/s. The Internet and phone charge will

be twice the ordinary dial-up charge.

Load balancing takes two internet connections and feeds

them into your network as one double data rate, more resilient
Available at www.mindstien.com 84
internet connection. By choosing two independent internet

providers the load balancing hardware will automatically use the

line with least load which means should one line fail, the second

one automatically takes up the slack.

ISDN

Integrated Service Digital Network (ISDN) is one of the

oldest broadband digital access methods for consumers and

businesses to connect to the Internet. It is a telephone data service

standard. Broadband service is usually compared to ISDN-BRI

because this was the standard broadband access technology that

formed a baseline for the challenges faced by the early broadband

providers. These providers sought to compete against ISDN by

offering faster and cheaper services to consumers.

A basic rate ISDN line (known as ISDN-BRI) is an ISDN

line with 2 data "bearer" channels (DS0 - 64 kbit/s each). Using

ISDN terminal adapters (erroneously called modems), it is possible

to bond together 2 or more separate ISDN-BRI lines to reach

bandwidths of 256 kbit/s or more. The ISDN channel bonding

technology has been used for video conference applications and

broadband data transmission.

Primary rate ISDN, known as ISDN-PRI, is an ISDN line

Available at www.mindstien.com 85
with 23 DS0 channels and total bandwidth of 1,544 kbit/s (US

standard). ISDN E1 (European standard) line is an ISDN lines with

30 DS0 channels and total bandwidth of 2,048 kbit/s. Because

ISDN is a telephone-based product, a lot of the terminology and

physical aspects of the line are shared by the ISDN-PRI used for

voice services. An ISDN line can therefore be "provisioned" for

voice or data and many different options, depending on the

equipment being used at any particular installation, and depending

on the offerings of the telephone company's central office switch.

Most ISDN-PRI's are used for telephone voice communication

using large PBX systems, rather than for data. One obvious

exception is that ISPs usually have ISDN-PRI's for handling ISDN

data and modem calls.

It is mainly of historical interest that many of the earlier ISDN data

lines used 56 kbit/s rather than 64 kbit/s "B" channels of data. This

caused ISDN-BRI to be offered at both 128 kbit/s and 112 kbit/s

rates, depending on the central office's switching equipment.

Advantages:

1. Constant data rate at 64 kbit/s for each DS0 channel.


2. Two way broadband symmetric data transmission, unlike
ADSL.
3. One of the data channels can be used for phone conversation
without disturbing the data transmission through the other

Available at www.mindstien.com 86
data channel. When a phone call is ended, the bearer channel
can immediately dial and re-connect itself to the data call.
4. Call setup is very quick.
5. Low latency
6. ISDN Voice clarity is unmatched by other phone services.
7. Caller ID is almost always available for no additional fee.
8. Maximum distance from the central office is much greater
than it is for DSL.
9. When using ISDN-BRI, there is the possibility of using the
low-bandwidth 16 kbit/s "D" channel for packet data and for
always on capabilities.

Disadvantages:

1. ISDN offerings are dwindling in the marketplace due to the


widespread use of faster and cheaper alternatives.
2. ISDN routers, terminal adapters ("modems"), and telephones
are more expensive than ordinary POTS equipment, like dial-
up modems.
3. ISDN provisioning can be complicated due to the great
number of options available.
4. ISDN users must dial in to a provider that offers ISDN
Internet service, which means that the call could be
disconnected.
5. ISDN is billed as a phone line, to which is added the bill for
Internet ISDN access.
6. "Always on" data connections are not available in all
locations.
7. Some telephone companies charge unusual fees for ISDN,
including call setup fees, per minute fees, and higher rates
than normal for other services.

Wired Ethernet

Where available, this method of broadband connection to

the Internet would indicate that the Internet access is very fast.

Available at www.mindstien.com 87
However, just because Ethernet is offered doesn't mean that the

full 10, 100, or 1000 Mbit/s connection is able to be utilized for

direct Internet access. In a college dormitory for example, the 100

Mbit/s Ethernet access might be fully available to on-campus

networks, but Internet access bandwidths might be closer to 4xT-1

data rate (6 Mbit/s). If you are sharing a broadband connection

with others in a building, the access bandwidth of the leased line

into the building would of course govern the end-user's data rate.

However, in certain locations, true Ethernet broadband

access might be available. This would most commonly be the case

at a POP or a data center, and not at a typical residence or

business. When Ethernet Internet access is offered, it could be

fiber-optic or copper twisted pair, and the bandwidth will conform

to standard Ethernet data rates of up to 10 Gbit/s. The primary

advantage is that no special hardware is needed for Ethernet.

Ethernet also has a very low latency.

Rural broadband

One of the great challenges of broadband is to provide

service to potential customers in areas of low population density,

such as to farmers, ranchers, and small towns. In cities where the

population density is high, it is easy for a service provider to

Available at www.mindstien.com 88
recover equipment costs, but each rural customer may require

expensive equipment to get connected.

Several rural broadband solutions exist, though each has

its own pitfalls and limitations. Some choices are better than

others, but are dependent on how proactive the local phone

company is about upgrading their rural technology.

Wireless Internet Service Provider (WISPs) are rapidly

becoming a popular broadband option for rural areas.

Satellite Internet

This employs a satellite in geostationary orbit to relay

data from the satellite company to each customer. Satellite Internet

is usually among the most expensive ways of gaining broadband

Internet access, but in rural areas it may only compete with cellular

broadband. However, costs have been coming down in recent years

to the point that it is becoming more competitive with other

broadband options.

Satellite Internet also has a high latency problem caused

by the signal having to travel 35,000 km (22,000 miles) out into

space to the satellite and back to Earth again. The signal delay can

be as much as 500 milliseconds to 900 milliseconds, which makes

this service unsuitable for applications requiring real-time user

Available at www.mindstien.com 89
input such as certain multiplayer Internet games and first-person

shooters played over the connection. These problems are more

than tolerable for just basic email access and web browsing and in

most cases are barely noticeable.There is no simple way to get

around this problem..

Advantages

1. True global broadband Internet access availability


2. Mobile connection to the Internet (with some providers)

Disadvantages

1. High latency compared to other broadband services,


especially 2-way satellite service
2. Unreliable: drop-outs are common during travel, inclement
weather, and during sunspot activity
3. The narrow-beam highly directional antenna must be
accurately pointed to the satellite orbiting overhead
4. The Fair Access Policy limits heavy usage, if applied by the
service provider
5. VPN use is discouraged, problematic, and/or restricted with
satellite broadband, although available at a price
6. One-way satellite service requires the use of a modem or
other data uplink connection
7. Satellite dishes are very large. Although most of them
employ plastic to reduce weight, they are typically between
80 and 120 cm (30 to 48 inches) in diameter.

Cellular broadband

Cellular phone towers are very widespread, and as

cellular networks move to third generation (3G) networks they can

support fast data; using technologies such as EVDO, HSDPA and


Available at www.mindstien.com 90
UMTS.

These can give broadband access to the Internet, with a

cell phone, with Cardbus, ExpressCard, or USB cellular modems,

or with cellular broadband routers, which allow more than one

computer to be connected to the Internet using one cellular

connection.

Power-line Internet

This is a new service still in its infancy that may

eventually permit broadband Internet data to travel down standard

high-voltage power lines. However, the system has a number of

complex issues, the primary one being that power lines are

inherently a very noisy environment. Every time a device turns on

or off, it introduces a pop or click into the line. Energy-saving

devices often introduce noisy harmonics into the line. The system

must be designed to deal with these natural signaling disruptions

and work around them.

Wireless ISP

This typically employs the current low-cost 802.11 Wi-Fi

radio systems to link up remote locations over great distances, but

can use other higher-power radio communications systems as well.

Traditional 802.11b was licensed for omnidirectional

Available at www.mindstien.com 91
service spanning only 100-150 meters (300-500 ft). By focusing

the signal down to a narrow beam with a Yagi antenna it can

instead operate reliably over a distance of many miles.

Rural Wireless-ISP installations are typically not

commercial in nature and are instead a patchwork of systems built

up by hobbyists mounting antennas on radio masts and towers,

agricultural storage silos, very tall trees, or whatever other tall

objects are available. There are currently a number of companies

that provide this service.

iBlast

iBlast was the brand name for a theoretical bandwidth

(7 Mbit/s), one-way digital data transmission technology from a

Digital TV station to users that was developed between June 2000

to October 2005.

Advantages:

1. Low cost, broadband data transmission from TV station to


users. This technology can be used for transmitting website /
files from Internet.

Disadvantages:

1. One way data transmission.


2. Privacy/security.
3. Lack of 8VSB tuner built into many consumer electronic
devices needed to receive the iBlast signal.

Available at www.mindstien.com 92
 BSNL Broadband

BSNL is in the process of commissioning of a world

class, multi-gigabit, multi-protocol, convergent IP infrastructure

through National Internet Backbone-II (NIB-II), that will provide

convergent services through the same backbone and broadband

access network. The Broadband service will be available on DSL

technology (on the same copper cable that is used for connecting

telephone), on a countrywide basis spanning 198 cities.

In terms of infrastructure for broadband services NIB-II would put

India at par with more advanced nations. The services that would

be supported includes always-on broadband access to the Internet

for residential and business customers, Content based services,

Video multicasting, Video-on-demand and Interactive gaming,

Audio and Video conferencing, IP Telephony, Distance learning,

Messaging: plain and feature rich, Multi-site MPLS VPNs with

Quality of Service (QoS) guarantees. The subscribe will be able to

access the above services through Subscriber Service Selection

System (SSSS) portal.

Available at www.mindstien.com 93
Broadband Service by Bsnl

Many of the services are the provided by BSNL. This

service is being provided on existing copper wire infrastructure. In

addition to the High Speed Internet Service being provided through

this technology, other services such as VPN, Multicasting, Video

Conferencing, Video-on-Demand, Broadcast application etc have

also been added.

Available at www.mindstien.com 94
 CONCLUSION:

Thus LAN Messenger is compatible software.

LAN messenger main function is of intra-office


Communication. This software is easy to use.
Automatically detects the computers in the network
and can be used with number of computers in the network.
It successfully transmits the data with better security in
Local Network.

Available at www.mindstien.com 95
 FUTURE EXPANSION:

The software created by me includes the function of pinging and

send message to a single or all the computers in the network. But

other facilities as follows:

-File Transfer

-Voice Chat

-Conference

and many more entertaining functions like minigames,

video conference can be created. But since it is used in intra-office

Communication these entertaining functions may not be included

but the above three facilities are the essential part of it.

Available at www.mindstien.com 96

You might also like