You are on page 1of 2

MODULE DESCRIPTION

Modules        Login Change Password Network Information Check shortest path Encryption Add Employee Decryption

Module 1: Login Module The Login Form module presents, site visitors with a form, with username and password fields. If the user enters a valid username/password combination they will be granted access to additional resources on website. Which additional resources they will have access to the network. This module initiates the software we have built and alerts all the system in the network, and the home system, brings all the system in network to its control. Module 2: Change Password This module allows administrators by role to change their password on their next page load or login, and/or expire their passwords after a period of time. Module 3: Network Information This module is Most of the organization they connect more numbers of systems to form a network to make their work easier to share their files and folders. While connecting we want to monitor the network system activities for secure purpose. This Project deals with monitoring the Network Screen Activities. It has two methodologies one for Client and another for Server.

a list of paths to the particular destination is viewed. that usually requires a secret decryption key. This is the main module of the project. In public-key schemes. In this. so it can be understood.However. turning it into an unreadable cipher text. which specifies how the message is to be encoded. After Register this details of employee username and password Authenticate on client side of this project f this project Module 7: Decryption Decryption is the process of converting encrypted data back into its original form. only the receiving party has access to the decryption key and is capable of reading the encrypted messages.Module 4: Check shortest path This module is to find the shortest path in the n/w for transferring the file with in less time. This can be done by entering IP address of destination. however. In an encryption. Module 5: Encryption This module Encryption is the conversion of data into a form. the message or information (referred to as plaintext) is encrypted using an encryption algorithm. is able to decode the ciphertext using a decryption algorithm. called a cipher text that cannot be easily understood by unauthorized people.This is usually done with the use of an encryption key. . An authorized party. From the path list the shortest paths are identified and move the list to next module. Module 6: Add Employee This module is us This module is used to add the employee details of the Project. the encryption key is published for anyone to use and encrypt messages.In publickey schemes. that adversaries do not have access to.