You are on page 1of 69

Client Server Protocol Implementation

ABSTRACT
1
Client Server Protocol Implementation
1. ABSTRACT
This project is to implement the Client-Server Protocol Implementation. The
dream global communication is solved in a great deal by the introduction of Internet.
This made the necessity of networing in communication clear. The internet protocol
TCP!IP uses computers called gateways" which provide all interconnections among
physical networs. # gateway is a special purpose" dedicated computer that attaches to
two or more networs and routes pacets from one to other. It will be having the
information regarding the networ connected to it. The gateways e$change routing
information periodically to accommodate networ changes and eeps their route up-
to-date.
This protocol permits a new core gateway to be added to the internet without
modifying the e$isting gateways. %henever a new core gateway is added to the
e$isting internet it will be assigned to one or more neighbours with which it
communicates" the neighbours already members of the woring internet have already
propagated routing information among themselves. Thus the gateway has to inform its
neighbours about the networ it could reach so that they can update the routing table
and propagate the information to the remaining gateways in the internet.
&
Client Server Protocol Implementation
INTRODUCTION
'
Client Server Protocol Implementation
2. INTRODUCTION
2.1 Purpose:
The aim of this project is to implement Client Server Protocol Implementation.
The purpose of the project is to communicate between clients that are connected to
different servers.

2.2 Scope:
#dding and deleting a networ to a gateway
Creating and displaying a route table for a gateway
Sending and updating the routing message
Create a log file
IC(P implemented for error correction and reporting
)
Client Server Protocol Implementation
PROBLEM
DEFINITION
*
Client Server Protocol Implementation
3. PROBLEM DEFINITION
INTRODUCTION
This project is to implement the client server protocol implementation by
using gateways.
3.1 Exisi!" S#se$
The present system is having different networs for each department. %here
in the files has to be manually transferred. which is not a good way of practice of file
transfer" for that we have given this proposed system. %here the file transfer is done
through the networs.
3.2 Propose% S#se$
In the proposed system all the sub-networs are added to the gateway and the
transfer of the different document and file taes place through this gate way. %here
we can not only reduce the delay in file transfer but also we can maintain the log.
+
Client Server Protocol Implementation
SYSTEM
ANALYSIS
,
Client Server Protocol Implementation
&. S'STEM ANAL'SIS
System #nalysis is first stage according to System -evelopment .ife Cycle
model. This System #nalysis is a process that starts with the analyst.
#nalysis is a detailed study of the various operations performed by a system and
their relationships within and outside the system. /ne aspect of analysis is defining the
boundaries of the system and determining whether or not a candidate should consider
other related systems. -uring analysis" data is collected from the available files" decision
points" and transactions handled by the present system.
0
Client Server Protocol Implementation
&.1 DATAFLO( DIA)RAMS:
# graphical tool used to describe and analy1e the moment of data through a
system manual or automated including the process" stores of data" and delays in the
system. -ata 2low -iagrams are the central tool and the basis from which other
components are developed.The transformation of data from input to output" through
processes" may be described logically and independently of the physical components
associated with the system. The -2- is also now as a data flow graph or a bubble
chart.
Co!ex Di*"r*$:
The top-level diagram is often called a 3context diagram. It contains a single
process" but it plays a very important role in studying the current system. The conte$t
diagram defines the system that will be studied in the sense that it determines the
boundaries. #nything that is not inside the process identified in the conte$t diagram
will not be part of the system study. It represents the entire software element as a
single bubble with input and output data indicated by incoming and outgoing arrows
respectively.
4
Client Server Protocol Implementation
T#pes o+ %** +,o- %i*"r*$s:
-2-s are two types
1. P.#sic*, DFD
Structured analysis states that the current system should be first understand
correctly. The physical -2- is the model of the current system and is used to ensure
that the current system has been clearly understood. Physical -2-s shows actual
devices" departments" people etc." involved in the current system
2. Lo"ic*, DFD
.ogical -2-s are the model of the proposed system. They clearly should
show the re5uirements on which the new system should be built. .ater during design
activity this is taen as the basis for drawing the system6s structure charts.
17
Client Server Protocol Implementation
DFD S#$/o,s:
D**+,o-:
-ata move in a specific direction from an origin to a -estination.
Process:
People" procedures" or devices that use or produce 8Transform9 -ata. The
physical component is not identified.

Source:
:$ternal sources or destination of data" which may be People " programs"
organi1ations or other entities.

D** Sore:
;ere data are stored or referenced by a process in the System
11
Client Server Protocol Implementation

CONTE0T DIA)RAM
2ig< =ero level diagram
1&
Client Server Protocol Implementation
Le1e, 1 Di*"r*$
1'
Client Server Protocol Implementation
Le1e, 2 Di*"r*$
1)
Client Server Protocol Implementation
Le1e, 2 Di*"r*$
1*
Client Server Protocol Implementation
Le1e, 2 Di*"r*$
1+
Client Server Protocol Implementation
&.2 UML DIA)RAMS:
Usec*se %i*"r*$ o+ C,ie!:
2ig ).&.1 Client services
1,
Client Server Protocol Implementation
Usec*se %i*"r*$ o+ A%$i!isr*or:
2ig ).&.& #dministrator services
10
Client Server Protocol Implementation
SE2UENCE DIA)RAMS
Se3ue!ce %i*"r*$ +or c,ie!:
14
Client Server Protocol Implementation
Se3ue!ce Di*"r*$ +or A%$i!isr*or:
&7
Client Server Protocol Implementation
CLASS DIA)RAM
2ig ).1.' Total 2low of #ctions
&1
Client Server Protocol Implementation
COLLABORATION DIA)RAMS
Co,,*/or*io! %i*"r*$ +or c,ie!:
&&
Client Server Protocol Implementation
Co,,*/or*io! %i*"r*$ +or A%$i!isr*or:
&'
Client Server Protocol Implementation
&.3 MODULES
This CSPI have the following modules.
)*e-*# $o%u,e
Roui!" $o%u,e
Disp,*# $o%u,e
ICMP $o%u,e
&)
Client Server Protocol Implementation
&.& MODULE DESCRIPTION
)ATE(A' MODULE:
In this module we provide mechanisms for adding a new networ to a
>ateway and deleting the e$isting networ from the >ateway and displaying a routing
table for a >ateway.
ROUTIN) MODULE:
In this module there are three methods first" to create a route message" second
sending a routing message to other gateways" third updating the routing message.
DISPLA' MODULE:
In this module we develop an application program to now the date and time
the routing table is transferred to other gateway.
ICMP MODULE:
In this module the errors occurred by the invalid inputs given by the user or
any une$pected circumstances is reported to the gateway by using IC(P protocol.
&*
Client Server Protocol Implementation
&.4 FEASIBILIT' ANAL'SIS:
2easibility study is a important phase in the software development process. It
enables the developer to have an assessment of the product being developed. It refers
to the feasibility study of the product in terms of the product" operational use and
technical support re5uired for implementing it.
2easibility study should be performed on the basis of various criteria and
parameters. The various feasibility studies are<
:conomic feasibility
/perational feasibility
Technical feasibility
&+
Client Server Protocol Implementation
Eco!o$ic Fe*si/i,i#:
This procedure is to determine the benefits and savings that are e$pected from
a candidate system and compare them with costs. If benefits outweigh costs" then the
decision is made to design and implement the system. /therwise" further justification
or alterations in proposed system will have to be made if it is to have a chance of
being approved. This is an ongoing effort that improves in accuracy at each phase of
the system life cycle.
Oper*io!*, Fe*si/i,i#:
People are inherently resistant to change" and computers have been nown to
facilitate change. It is understandable that the introduction of a candidate system
re5uires special effort to educate" sell" and train the staff on new ways of conducting
business.
Tec.!ic*, Fe*si/i,i#:
Technical feasibility centers on the e$isting computer system 8hardware"
software" etc."9 and to what e$tent it can support the proposed addition. If the budget
is a serious constraint" then the project is judged not feasible.
&,
Client Server Protocol Implementation
SOFTARE
RE!UIREMENT
SPECIFICATION
&0
Client Server Protocol Implementation
4. SOFT(ARE RE2UIREMENT SPECIFICATION
4.1 De+i!iio! o+ SRS:
Software ?e5uirement Specification is the starting point of the software
developing activity. #s system grew more comple$ it became evident that the goal of
the entire system cannot be easily comprehended. ;ence the need for the re5uirement
phase arose. The software project is initiated by the client needs. The S?S is the
means of translating the ideas of the minds of client into a formal document.
4.2 Re3uire$e! A!*,#sis:
This stage is to obtain a clear picture of the needs and re5uirements of the end-
user and also the organi1ation. #nalysis involves interaction between the clients and
the analysis. @sually analysts research a problem from any 5uestions ased and
reading e$isting documents. The analysts have to uncover the real needs of the user
even if they don6t now them clearly. -uring analysis it is essential that a complete
and consistent set of specifications emerge for the system.
:ach ?e5uirement analysis method has a uni5ue point of view. ;owever all
analysis methods are related by a set of operational principles. They are
The information domain of the problem must be represented and understood.
The functions that the software is to perform must be defined.
The behavior of the software as a conse5uence of e$ternal events must be
defined.
The models that depict information" function and behavior must be partitioned in a
hierarchical or layered fashion.
The analysis process must move from essential information to implementation
detail.
&4
Client Server Protocol Implementation
4.3 Re3uire$e! Speci+ic*io!:
Speci+ic*io! Pri!cip,es:
Software ?e5uirements Specification plays an important role in creating
5uality software solutions. Specification is basically a representation process.
?e5uirements are represented in a manner that ultimately leads to successful software
implementation.
?e5uirements may be specified in a variety of ways. ;owever there are some
guidelines worth following< -
?epresentation format and content should be relevant to the problem
Information contained within the specification should be nested
-iagrams and other notational forms should be restricted in number
and consistent in use.
?epresentations should be revisable.
So+-*re Re3uire$e!s Speci+ic*io!s:
The software re5uirements specification is produced at the culmination of the
analysis tas. The function and performance allocated to the software as a part of
system engineering are refined by establishing a complete information description" a
detailed functional and behavioral description" and indication of performance
re5uirements and design constraints" appropriate validation criteria and other data
pertinent to re5uirements.
'7
Client Server Protocol Implementation
Exer!*, I!er+*ce Re3uire$e!s:

User I!er+*ces:
This includes >@I standards" error messages for invalid inputs by users"
standard buttons and functions that will appear on the screen.
5*r%-*re I!er+*ces:
%e use TCP!IP protocol for establishing connection and transmitting data over
the networ. %e use :thernet for .#A.
So+-*re I!er+*ces:
%e use /racle for storing database of clients who connects to the server
through B-CC D /-CC.
Securi# Re3uire$e!s:
%e provide authentication and authori1ation by passwords for each level of
access.
%e implement I-:# algorithm for secure data transmission.
So+-*re 2u*,i# Ari/ues:
'1
Client Server Protocol Implementation
Product is adaptable to any changes.Such as the product can be modified to
transfer not only te$t but also image" audio" video files.
Product is reliable due to the file encryption and authentication.
That means the data is not lost or goes into wrong hands.
Product is portable i.e. it can run between only two connected systems or a
large networ of computers.

Product is maintainable i.e. in future the properties of the product can be
changed to meet the re5uirements.

'&
Client Server Protocol Implementation
DOCUMENT DESI"N
''
Client Server Protocol Implementation
6.DOCUMENT DESI)N
6.1 S'STEM DESI)N:
5*r%-*re Re3uire$e!s:
Processor : Intel P-IE based system
RAM : +)(C to *1&(C
5*r% Dis7 : &7>C to 07>C
So+-*re Re3uire$e!s:
L*!"u*"e : B&S-F 1.).7
Prooco,s : TCP!IP" IC(P
Oper*i!" S#se$ : %indows AT!40!&777!GP
')
Client Server Protocol Implementation
ABOUT SOFTARE
8.ABOUT SOFT(ARE
'*
Client Server Protocol Implementation
8.1 O9ER9IE( OF :A9A:
Bava is a powerful object-oriented programming language. It has generated a
lot of e$citement because it maes it possible to program for Internet by creating
#pplets. Programs that can be embedded in web page. The conte$t of an applet can be
an animation with sound" an interactive game or a ticer tape. %ith constantly
updated stoc prices. #pplets can be just little decorations to liven up web page" or
they can be serious applications lie %ord processor or Spreadsheet.
Cut Bava is more than a programming language for writing #pplets. It is being
used more and more for writing standalone applications as well. It is becoming so
popular that many people believe it will become standard language for both general
purpose and Internet programming.
There are many bu11words associated with Bava" but because of its spectacular
growth in popularity" a new bu11word has appeared ubi5uitous. Indeed" all indications
are that it will soon be everywhere.
Bava builds on the strength of CHH. It has taen the best features of CHH and
discarded the more problematic and error prone parts. To this lean core" it has added
garbage collection 8automatic memory management9" multithreading 8the capacity for
one program to do more than one thing at a time9" security capabilities. This result is
that Bava is simple" elegant" and powerful and easy-to-use.
FEATURES OF :A9A :
'+
Client Server Protocol Implementation
Bava is object-oriented language and supports encapsulation" inheritance"
polymorphism and dynamic binding" but does not support multiple
inheritance. :very thing in java is an object e$cept some primitive datatypes.
Bava is portable architecture neutral that is java programs once compiled can
be e$ecuted on any machine that is enabled.
B#E# is distributed in its approach and used for internet programming.
Bava is robust" secured" high performing and dynamic in nature.
Bava supports multithreading. There for different parts of the program can be
e$ecuted at the same time.
:A9A IS PORTABLE:
/ne of the biggest advantages Bava offers is that it is portable. #n application
written in Bava will run on all the major platforms. #ny computer with a Bava-based
',
Client Server Protocol Implementation
browser can run the applications or #pplets written in the Bava-Programming-
.anguage. # programmer no longer has to write one program to run on a (acintosh"
another program to run on a %indows-machine still another to run on a @AIG-
machine and so on. In other words" with Bava developers write their programs only
once.
The Eirtual (achine is what gives Bava is cross platform capabilities. ?ather
being compiled into machine language" which is different for each /S6s and computer
architecture" Bava code is compiled into Cyte codes.
%ith other languages" the program code is compiled into a language that the
computer can understand. The problem is that other computers with different machine
instruction set cannot understand that language. Bava code on the other hand is
compiled into Cyte-Code rather than a machine language. These byte codes go to the
BE(" which e$ecutes them directly or translates them into the language that is
understood by the machine running it.
In summary" these means that with the B-CC #PI e$tending Bava" a
programmer writing Bava code can access all the major ?-C(S on any platform that
supports the BE(.
:A9A IS OB:ECT;ORIENTED:
'0
Client Server Protocol Implementation
The Bava programming language is /CB:CT-/?I:AT:-" which maes
program design focus on what you are dealing with" rather than on how your are
going to do something. This maes it more useful for programming in sophisticated
projects" because one can brea the things into understandable components. # big
benefit is that these components can then be reused.
/bject-/riented .anguages use the paradigm of classes. In simplest term" a
class includes both the data and the functions to operate on data. Iou can create an
instance of a class" also called an object" which will have all the data members and
functionality of its class. Cecause of this" you can thin of a class as being lie
template" with each object being a specific instance of a particular type of class.
The class paradigm allows one to encapsulate data so that specific data values
are those using the data cannot see the function implementation. :ncapsulation maes
it possible to mae the changes in code without breaing other programs that use that
code.
If for e$ample" the implementation of a function is changed" the change is
invisible to any programmer who invoes that function" and does not affect his!her
program" e$cept hopefully to improve it.
Bava includes inheritance" or the ability to derive new classes from e$isting
classes. The derived class" is also called as Sub-Class" inherits all the data in the
functions of the e$isting class.
:A9A DE9OLPMENT EN9IRONMENT:
'4
Client Server Protocol Implementation
To code" edit" debug and test the java programs" one needs to have a java
development environment. #t the minimum this will consists of a java compiler
interpreter and applet viewer where applets can be tested.
Sun6s java development it 8B-F9 latest version is &.& can be freely
downloaded from the Internet.Bava compiler is available on -/S" %in4*" %inAT"
Solaris and (#C etc.
T.e 7e# co!si%er*io!s o+ :*1* *re <
1. /bject /riented< Bava purist6s 3everything is an objectJ paradigm. The java object
model is simple and easy to e$tend.
&. (ultithreaded< Bava supports multithreaded programming which allows you to
write programs that do many things simultaneously.
'. #rchitecture-Aeutral< the main problem facing programmers is that no guarantee
that if you write a program today" it will run tomorrow" even on the same machine.
Bava language and BE( solves this problem" their goal is to provide %rite once
?un anywhere anytime forever.
). -istributed< Bava is designed for the distributed environment of the Internet
because it handles TCP!IP protocols.
)7
Client Server Protocol Implementation
Bava had a profound effect on the Internet. The reason for this is Bava e$pands
the universe of objects that can be about freely on the Internet. There are two types of
objects we transmit over the networ" passive and dynamic.
Aetwor programs also present serious problems in the areas of security and
portability. %hen we download a normal program we ris viral infection. Bava
provides a firewall to overcome these problems. Bava concerns about these problems
by applets. Cy using a Bava compatible %eb browser we can download Bava applets
without fear of viral infection.
)1
Client Server Protocol Implementation
ABOUT
PROTOCOLS
)&
Client Server Protocol Implementation
<. PROTOCOLS
<.1 O9ER9IE( OF ICMP:
Internet protocol provides an unreliable connectionless data gram delivery
service" and that a data gram travels from client to server until it reaches one that can
delivery it directly to its final destination. If a gateway cannot route or deliver a data
gram or if the gateway detects an unusual condition" lie networ condition" that
effects its ability to forward the data gram" it needs to instruct the original source to
tae action to avoid or correct the problem
To allow gateways in an internet to report errors or provide information about
une$pected circumstance" the designers added a special purpose message mechanism
to the TCP!IP protocol the mechanism" nown as the IAT:?A:T C/AT?/.
(:SS#>: P?/T/C/. 8IC(P9
.ie all other traffic" IC(P messages travel across the internet in the data
portion of IP datagrams.The ultimate destination of an IC(P message is not an
application program or user on the destination machine" however" but the Internet
protocol software on that machine that is" when an IC(P error message arrives"
the IC(P software module handles it. /f course" if IC(P determines that a particular
higher level protocol or application program has caused a problem" it will inform the
appropriate module.
The IC(P allows gateways to send error of control message to other gateways
or hostsK IC(P provides communication between the Internet protocol software on
one machine and the Internet protocol software on the another.
)'
Client Server Protocol Implementation
ERROR REPORTIN) 9s ERROR CORRECTION:

Technically" IC(P is an error reporting mechanism it provides a way of
gateways that encounter an error to report the error the original source.
#lthough the protocol specification outlines intended uses of IC(P and
suggests possible action to tae in response to error reports" IC(P does not fully
specify the action to be taen for each possible error. It taes action to correct the
problem.
TESTIN) DESTINATION REAC5ABILIT' AND STATUS:
TCP!IP protocols provide facilities to help networ managers or users identify
networ problems. /ne of the most fre5uently used debugging tools invoes the
IC(P echo re5uest and echo reply message. # host or gateway sends an IC(P echo
re5uest message to a specified destination. #ny machine that receives an echo
re5uests formalities an echo reply and returns to the original sender. The re5uest
contains an optional data area the reply contains the copies of the data sent in the
re5uest. The echo re5uest and the associated reply can used to test whether a
destination is reachable and responding. Cecause both the re5uest and reply travel in
IP datagrams" successful receipt of a reply verifies and major piees of transport
system wor.
))
Client Server Protocol Implementation
<.2 O9ER9IE( OF TCP=IP
IP %**"r*$s i! * "*e-*#:
>ateways in a TCP!IP Internet form a cooperative" inter connected structure.
-atagrams pass from client to server until they reach a gateway that can deliver the
datagram directly.
The usual IP routing algorithm employs an Internet routing table or IP routing
table. /n each machines that stores information about possible destination and how to
reach them. Cecause both gateways and hosts route datagrams" both have IP routing
table. %henever the IP routing software in a host or gateway needs to transmit a
-atagram" it consults the routing table to decide whether to send the -atagram. If
every routing table contained information about every possible destination address" it
would be impossible to eep the tables current. 2urthermore" because the number of
possible destinations is large machines would have insufficient space to store the
information.
)*
Client Server Protocol Implementation
)*e-*# M*i!e!*!ce Si"!i+ic*!ce:
# gateway is a comple$ mechanism consisting of several routers that Inter-
connects several networs. It has several clients re5uesting for connection and servers
waiting to sendLreceive data pacets.
%henever a client comes up with a re5uest" the server identifies it by means of
an IP address" which is uni5ue to every system in the networ. The client is
authenticated by cross checing its IP address with a file named >ateway ;osts.
The >ateway ;osts 2ile is used for maintaining the details of Aetwor.It
mainly consists of details regarding the router name and its corresponding IP
address. >atewayM;osts is a file that is similar to that of the 3etc!hostsJ file that is
present in the system. It consists of the names and the corresponding IP addresses of
all the system names that are valid 8lie the loopbac address" system IP etc."9 It can
be manipulated only by the system administrator.
Similarly >atewayM;osts is the file for the entire networ. It is present with the
server. Changes can be made to this file only by the networ administrator under the
following conditions<
----addition of a new system into the networ.
----deletion of a system from the networ.
)+
Client Server Protocol Implementation
/nce it is present in that file it is a valid client and the messages can be sent
and received from it by the server if not it is an invalid client and is discouraged by
sending an error message and it is not entered in the ;ostsM@p.
;ostsM@p is a file in which all the nodes that are active to tae part in the
communication are present. In order to mae an entry into this file initially the
administrator has to @p it into the networ after having received a signal from it if it
is not already present in the file.
So" if the clients IP so received happens to be a new valid IP it is checed for
its entry in the ;ostsM@p file" if not present the file is updated with the name of the
system and the IP address.Aow the session starts and both e$change information as
e$plained in TCP!IP and it also uses the T2TP for file transfer.
),
Client Server Protocol Implementation
TESTIN"
)0
Client Server Protocol Implementation
>. TESTIN)
Software Testing is a critical element of software 5uality assurance and
represents the ultimate review of specification" design and coding" Testing presents an
interesting anomaly for the software engineer.
Tesi!" Pri!cip,es:
#ll tests should be traceable to end user re5uirements
Tests should be planned long before testing begins
Testing should begin on a small scale and progress towards testing in
large
:$haustive testing is not possible
To be most effective testing should be conducted by a independent
third party
Tes *ppro*c.:
Testing can be done in two ways<
Cottom up approach
Top down approach
)4
Client Server Protocol Implementation
Boo$ up Appro*c.:
Testing can be performed starting from smallest and lowest level modules and
proceeding one at a time. 2or each module in bottom up testing a short program
e$ecutes the module and provides the needed data so that the module is ased to
perform the way it will when embedded with in the large system. %hen bottom level
modules are tested attention turns to those on the ne$t level that use the lower level
once they are tested individually and then lied with the previously e$amined lower
level modules.
Top%o-! Appro*c.:
This type of testing starts from upper level modules.Since the detailed
activities usually performed in the lower level routines are not provided stubs are
written.# stub is a module shell called by upper level module and that when reached
properly will return a message to the calling module indicating that proper interaction
occured.Ao attempt is made to verify the correctness of the lower level module.
Tesi!" Sr*er"ies:
# Strategy for software testing integrates software test cases into a series of
well planned steps that result in the successful construction of software. Software
testing is a broader topic for what is referred to as Eerification and Ealidation.
Eerification refers to the set of activities that ensure that the software correctly
implements a specific function. Ealidation refers he set of activities that ensure that
the software that has been built is traceable to customer6s re5uirements
*7
Client Server Protocol Implementation
>.1 U!i Tesi!":
@nit testing focuses verification effort on the smallest unit of software design
that is the module. @sing procedural design description as a guide" important control
paths are tested to uncover errors within the boundaries of the module. The unit test
is normally white bo$ testing oriented and the step can be conducted in parallel for
multiple modules.
>.2 B,*c7 Box Tesi!":

In this strategy some test cases are generated as input conditions that fully
e$ecute all functional re5uirements for the program.This testing has been uses to find
errors in the following categories<
a9 Incorrect or missing functions
b9 Interface errors
c9 :rrors in data structure or e$ternal database access
d9 Performance errors
e9 Initiali1ation and termination errors.
In this testing only the output is checed for the correctness.The logical flow of
data is not checed.
>.3 (.ie Box Tesi!":
In this the test cases are generated on the logic of each module by drawing
flow graphs of that module and logical decisions are tested on all the cases.It has been
used to generate the test cases in the following cases<
>uarantee that all independent paths have been e$ecuted.
:$ecute all logical decision on their true and false sides.
:$ecute all loops at their boundaries and with in their operational bounds.
:$ecute internal data structures to ensure their validity.
*1
Client Server Protocol Implementation
>.& I!e"r*io! Tesi!":
Integration testing is a systematic techni5ue for constructing the program
structure" while conducting test to uncover errors associated with the interface. The
objective is to tae unit tested methods and build a program structure that has been
dictated by design.
Top;%o-! I!e"r*io!:
Top down integrations is an incremental approach for construction of program
structure. (odules are integrated by moving downward through the control
hierarchy" beginning with the main control program. (odules subordinate to the main
program are incorporated in the structure either in the breath-first or depth-first
manner.
Boo$;up I!e"r*io!:
This method as the name suggests" begins construction and testing with atomic
modules i.e." modules at the lowest level. Cecause the modules are integrated in the
bottom up manner the processing re5uired for the modules subordinate to a given
level is always available and the need for stubs is eliminated.
*&
Client Server Protocol Implementation
>.4 9*,i%*io! Tesi!":
#t the end of integration testing software is completely assembled as a
pacage. Ealidation testing is the ne$t stage" which can be defined as successful when
the software functions in the manner reasonably e$pected by the customer.
?easonable e$pectations are those defined in the software re5uirements specifications.
Information contained in those sections form a basis for validation testing approach.
>.6 S#se$ Tesi!":
System testing is actually a series of different tests whose primary purpose is
to fully e$ercise the computer-based system. #lthough each test has a different
purpose" all wor to verify that all system elements have been properly integrated to
perform allocated functions.
>.8 Securi# Tesi!":
#ttempts to verify the protection mechanisms built into the system.
>.< Per+or$*!ce Tesi!":
This method is designed to test runtime performance of software within the
conte$t of an integrated system..
*'
Client Server Protocol Implementation
SCREENS
*)
Client Server Protocol Implementation
1?.SCREENS
SUPERSER9ER@)ATE(A'A:
**
Client Server Protocol Implementation
SUPERSER9ER:
%hen server is connected to gateway this screen is displayed
*+
Client Server Protocol Implementation
SUPERSER9ER@)ATE(A'A:
*,
Client Server Protocol Implementation
SER9ER:
*0
Client Server Protocol Implementation
SER9ER:
*4
Client Server Protocol Implementation
CLIENT:
+7
Client Server Protocol Implementation
CLIENT:
+1
Client Server Protocol Implementation
CLIENT:
+&
Client Server Protocol Implementation
CLIENT:
+'
Client Server Protocol Implementation
CLIENT:
+)
Client Server Protocol Implementation
CLIENT:
+*
Client Server Protocol Implementation
CONCLUSION
++
Client Server Protocol Implementation
11. CONCLUSION
The main objective of the project" to interconnect different .#As through a
gateway and to maintain the record of various events and responses of the system is
achieved. This can be used in applications where in a communication between two or
more different networs is re5uired.
.inu$ provides faster system-to-system communication than other operating
systems and the networ happens to be highly secured from the administrator6s point
of view. The TCP ! IP protocol developed in the course of this project is highly
reliable and deals with connection oriented systems.
Aetwor security" which is the primary concern of today6s communication
world" is successfully implemented using the I-:# algorithm. It provides a safe and
secure transmission as it involves multiple manipulations for encryption and so is it
with decryption.
The routing algorithm and the T2TP developed are lined with the modules of this
project" which finally resulted in the development of a Client-Server-Protocol-Impl.
+,
Client Server Protocol Implementation
BIBLIO"RAP#Y
+0
Client Server Protocol Implementation
12. BIBLIO)RAP5'
Bava Complte ?eference &.
Computer Aetwors" Third :dition - #ndrew S. Tanenbaum
(odern /perating Systems - #ndrew S. Tanenbaum
Software :ngineering # PractitionerNs #pproach - ?oger S. Pressman
#n Integrated #pproach to Software :ngineering - Panja Balot
+4

You might also like