You are on page 1of 82

A Project Report

On
Network Analyzer

Submitted in partial fulfilment of the requirements


for the award of the degree of

Bachelor of Technology
in
Computer Science & Engineering

Submitted By
Rishabh Chauhan
2819124

Vikrant Chugh
2819280

Under the Supervision of


Ms. Mani Singh
Assistant Professor, CSE Department

Panipat Institute of Engineering & Technology, Samalkha, Panipat


Affiliated to

Kurukshetra University Kurukshetra, India (2021-2022)


Table of Contents
DECLARATION.............................................................................................................................ii
CERTIFICATE..............................................................................................................................iii
ACKNOWLEDGEMENTS ..........................................................................................................iv
ABSTRACT....................................................................................................................................v
LIST OF TABLES.......................................................................................................................xiii
LIST OF FIGURES......................................................................................................................xiv
LIST OF SYMBOLS.....................................................................................................................xv
LIST OF ABBREVIATIONS .....................................................................................................xvi

CHAPTER 1: INTRODUCTION..................................................................................................

CHAPTER 2: PROBLEM DESCRIPTION.................................................................................

CHAPTER 3: LITERATURE REVIEW......................................................................................

CHAPTER 4: RESEARCH METHODS.......................................................................................

CHAPTER 5: ANALYSIS..............................................................................................................

CHAPTER 6: SYSTEM DESIGN..................................................................................................

CHAPTER 7: IMPLEMENTATION............................................................................................

CHAPTER 8: TESTING.................................................................................................................

CHAPTER 9: CRITICAL EVALUATION..................................................................................

CHAPTER 10: CONCLUSION.....................................................................................................

CHAPTER 11: REFERENCES......................................................................................................

P a g e 2 | 82
DECLARATION

I hereby declare that the work presented in this project report entitled “Network analyzer
“, in partial fulfilment of the requirement for the award of the degree of Bachelor of
Technology in Computer Science & Engineering., submitted to Kurukshetra University,
Kurukshetra, India is an authentic record of my work carried out during the period from
Sept 2022 to Jan 2022 under the guidance of Ms. Mani, Assistant Professor, CSE
Department.

I hereby declare that this submission is my work and that, to the best of my knowledge
and belief, it contains no material previously published or written by another person nor
material that to a substantial extent has been accepted for the award of any other degree
or diploma of the university or other institute of higher learning, except where due
acknowledgement has been made in the text.

Name: Vikrant chugh

Roll No.: 2819280

Signature:

Name: Rishabh Chauhan

Roll No.: 2819124

Signature:

P a g e 3 | 82
CERTIFICATE

This is to certify that the Project-I report (PROJ–CS-302A) entitled “Network analyzer “done by
2819124/ Rishabh Chauhan, 2819280/ Vikrant chugh, is an authentic work carried out by them at
PIET, Samalkha, Panipat under my guidance. The matter embodied in this project work has not
been submitted earlier for the award of any degree or diploma to the best of my knowledge and
belief.

Ms . Mani Mr. Gaurav Gambhir

(Project Guide) (Project Coordinators)

P a g e 4 | 82
ACKNOWLEDGEMENT

It gives us a great sense of pleasure to present the report of the B. Tech Project undertaken
during B. Tech. Third Year. We owe a special debt of gratitude to Assistant Professor Ms. Mani,
Department of Computer Science & Engineering, PIET, Samalkha for his constant support and
guidance throughout our work. His sincerity, thoroughness and perseverance have been a
constant source of inspiration for us. It is only through his cognizant efforts that our endeavours
have seen the light of the day.

We also take the opportunity to acknowledge the contribution of Professor Dr. S C Gupta, Head,
Department of Computer Science & Engineering, PIET, Samalkha for his full support and
assistance during the development of the project.

We also do not like to miss the opportunity to acknowledge the contribution of all faculty
members of the department for their kind assistance and cooperation during the development of
our project. Last but not the least, we acknowledge our friends for their contribution to the
completion of the project.

Name: Vikrant chugh

Roll No.: 2819280

Signature:

Name: Rishabh Chauhan

Roll No.: 2819124

Signature:

P a g e 5 | 82
ABSTRACT

The system “Network analyzer”deals with NTA solutions can analyze all the entities or devices that
make up your network--whether they are managed or unmanaged. NTA solutions ingest telemetry
from multiple network devices like routers, switches, and firewalls to determine what "normal"
behavior for these devices looks like and how parts of your network are being accessed and by whom.
Everything touches the network, so this visibility extends all the way from headquarters to branch
offices, data centers, roaming users, and smart devices. Whether you are on-premises, in the cloud, or
some combination, NTA solutions can give you much needed visibility and context into what is
happening on your network. Traffic analysis is the process of intercepting and analyzing network
traffic in order to deduce information from communication. The size of the packets exchanged
between two hosts, details of the systems communicating, time and duration of communication are
some of the valuable information to an attacker.

P a g e 6 | 82
CHAPTER 1: INTRODUCTION

1.1 Topic of the System


Title: - “Network analyzer”

1.2 Project Abstract


The system “Network analyzer”deals with NTA solutions can analyze all the entities or devices that
make up your network--whether they are managed or unmanaged. NTA solutions ingest telemetry
from multiple network devices like routers, switches, and firewalls to determine what "normal"
behavior for these devices looks like and how parts of your network are being accessed and by
whom.
Everything touches the network, so this visibility extends all the way from headquarters to branch
offices, data centers, roaming users, and smart devices. Whether you are on-premises, in the cloud,
or some combination, NTA solutions can give you much needed visibility and context into what is
happening on your network. Traffic analysis is the process of intercepting and analyzing network
traffic in order to deduce information from communication. The size of the packets exchanged
between two hosts, details of the systems communicating, time and duration of communication are
some of the valuable information to an attacker.

1.3 Purpose of the System

Analyzing the stability of a network starts with Monitor its performance, device capabilities, network
speed, and one more aspect that many network admins overlook: network traffic.

Network traffic analysis (NTA) is often the least considered aspect, but it influences many issues, like
performance degradation, and slowness for the users. Neglecting it can give way to security threats.

Network traffic analysis brings many important insights to your bandwidth management. With
extensive traffic data generated from end-to-end network traffic analysis of your network

1.4 Target User


Traffic analysis is the process of intercepting and analyzing network traffic in order to deduce

P a g e 7 | 82
information from communication. The size of the packets exchanged between two hosts, details of
the systems communicating, time and duration of communication are some of the valuable
information to an attacker
For example, if an enterprise's network uses resource-intensive softwares like video streaming and
tele-presence other than through business-critical softwares, the bandwidth capacity for running
business operations will be minimal. This often negatively impacts productivity, affecting all
operations and often eroding revenues. That's a domino effect organizations should avoid.

1.5 Topic Background


As we know that the internet plays an important role in every individual's life and everything in this
world is evolving as per the technology development. At the outset of present day period,
Computers played a major role in computing and as the technology expands everything has changed
and the computers became workstation computers, super computers and so on. Later developed
the personal computer technology and now mobility got to be everything. Everything made simple
using mobility.
From last 2 decades, the utilization of personal computer devices has incredibly increased, which has
led to ease of carrying out day to day activities. In addition, with the advancement of wireless
technologies, wireless networks have taken over the entire world. Nowadays, business and financial
transactions can be done easily and securely, anywhere and anytime. Using the Internet,
connections can be established with any devices almost anywhere in the world and can share
necessary information amongst them.

1.6 Problem Context

In the Era of Computer Technology, we need to communicate and accelerate our life with the help of
Information and Technology. We all require certain types of services online, which requires less
workout or interference of human being. phones can help to overcome the trouble of the
customers of standing in queue and book any type of tickets. There is lack of research and
functionalities in the current system as well. We are in such an era today that our most of the work
has been shifted too personal computer. The development and implementation of smart software
which are more effective and simple than the current system. We feel hard to monitor with them
and sometimes it may be lost. The “Network analyzer” can be monitor easily anytime from any place

1.7 The Rational behind the System: Why do we need this System?
This software is develop for an enterprise's network uses resource-intensive softwares so as to
reduce load on resources and bandwidth .

P a g e 8 | 82
1.6.1 Benefits of the System: What are the potential benefits derived?

Upon implemented, the system could bring about significant tangible and intangible benefits:

 Tangible Benefits

S. No. Tangible Benefits Description

Users doesn’t have to pay anything for using this system


Everything in this system is free of cost. Even user have
1. No investment
flexibility to use any interface there is no restriction in the
system.
2. Accessibility of system This system can be accessible anywhere if the user wants
 Intangible Benefits Table 1.1

S. No. Intangible Benefits Description

It reduces our effort to great extent. E.g. if we want to


buy any ticket then we have go to the ticket counter and
1. Reduces effort we see that there is long queue is there so to overcome
this just book your ticket with this system by just filling
some detail.
This system ensures that user gets the value of their time
2. Time Saving and don't have to rely upon anybody else for placing their
order.
The software that is developed would facilitate its end
3. Friendly User Interface users with interactive graphical interfaces that would be
easily adaptable.
The user interface will be user-friendly and easy to use
4. Customer Satisfaction which will result in improved satisfaction of the
customers.
5. Transparency This system will provide transparency in the ticket
booking system as the ticket will be booked by the person

P a g e 9 | 82
himself.
Maintenance of the software is painless for its user. The
software will need no version updates and hence require
6. Maintainability
no maintenance until the user transforms the settings
accordingly.
Keeping in mind the target audience, the app will be
Ease of learning and designed for the generalized audience and hence will be
7.
Usability. easy to use. The software will be developed keep in mind
the HCIU principles.
Table 1.1: Intangible Benefits

1.7 Objectives of the System

1.7.1 Project Objectives


In order to achieve the aim of the system, it is necessary to achieve the objectives of the system. The
prime objective is to design such a system for users which will resolve the problem enterprise's
network uses resource-intensive softwares so as to reduce load on resources and bandwidth . It will
provide transparency in the system If an enterprise's network uses resource-intensive softwares like
video streaming and tele-presence other than through business-critical softwares, the bandwidth
capacity for running business operations will be minimal. This often negatively impacts productivity,
affecting all operations and often eroding revenues. That's a domino effect organizations should
avoid.
It monitor illegally usage of system will be there or not. The other objectives are summarized below:
 This system is basically consisting of only one phase i.e. the admin of software. These
software is internally sub divided into two part first code panel, second output Monitor
panel . All the interaction of users will be done through command prompt with his interface

1.7.2 Learning Objectives


The proposed system will allow the developer to attain relevant knowledge and concepts in
specializing window based software development and authoring tool. The objectives are
disreputably emphasized on its concepts and ideas rather than trained expertise. The developer
would have to undergo various sections of software development, project management, human
computer interaction, usability factors along with the mechanisms of development principles so as
to produce highly reusable quality software on time. But the prime aim to cyber security concepts is
to increase preferred output with user satisfaction within less effort and time

1.8 Scope of the System


The proposed system will be beneficial in a number of ways that the “Network analyzer Software” is
actually about If an enterprise's network uses resource-intensive softwares like video streaming and
tele-presence other than through business-critical softwares, the bandwidth capacity for running

P a g e 10 | 82
business operations will be minimal. This often negatively impacts productivity, affecting all
operations and often eroding revenues. That's a domino effect organizations should avoid.

Mainly this system focus on security and services to the layman so that they can fetch their details
whenever they require it is one of the main motto of this system.

1.9 Limitation of the System


Limitations are always a part of every project. The project scope is limited to a confined boundary as
listed below:
 The system is being developed for only laptop/desktop.
 The user will need the internet connection to monitor the ip addresses.
 The software will be run on command prompt.

1.10 Assumptions Made


This system is although easy to use in terms of its functionalities but even then, there are some
assumptions that need to be made before the development of the system:
 Users need to have basic knowledge of windows.
 Good knowledge of English and basics of Internet is required, i.e. user needs to be a
computer literate.
 The smartphone users have not yet encountered any secure solution to protect their data
from being stolen or mishandled
 The user who would be using the software, is expected to have a pc with a good quality of
processor.

1.11 Success Criteria


Success Factors depends upon the depth of understanding and experience gained from the softwares
viewed for the review and how efficiently the developer cracks the problems faced in the software
that lead to development of such an software.
 Software is properly working and compatible with mentioned windows OS. Software will be
useless if it is unable to run properly on the physical device. There should not be any
anomalous or false functioning during its working on physical device.
 System meets all requirements of the proposed solution. If the software provides desired
operations and produces expected output i.e. if it is meeting user requirements, passing of
above test cases. Software must fulfil the core as well as enhanced system requirements
mentioned above.

P a g e 11 | 82
 Project will be treated as constructive if it is proper evaluation of ip address. The developer
will be able to provide successful implementation of personal computer software in terms of
interactivity, effectiveness and efficiency.

1.12 Functionalities of the System


The proposed system having some core, enhanced and some special functionality. So, let’s
knowthem one by one and use of this functionality in this system.

Enhanced Features

Functionality Description

Segregation of logs This feature segregate the logs

Table 1.3: Enhanced Features


Core Feature
Functionality Description

Host panel/ There is prompt where host can write script


and analize the packet
Admin Panel

Track and detect An IP is detected and on the basis of it. Host


can segregate unknown IP

Discover IP Discover which IP addresses are interacting


with your application servers, and if they are
safe for your network

P a g e 12 | 82
Log Primary feature of this toolkit is to record
keystrokes made by the user ip

Pack and Unpack Unpacking and unpacking of TCP ,UDP and


ICMP

Table 1.4: Core Feature


Special Features

Functionality Description

Gain visibility Gain visibility on Layer 7 application traffic

Table 1.2: Special Features

1.14 Conclusion
The Chapter 1 includes the background study for the system. Studying the system has inferred the
purpose of the system and goals/ objectives of the system. After the purpose of the system is
identified, the developer then came up with the benefits of the system to its intended end-user and
how the system can benefit its users. The developer then cultivated the desirable features to be
implemented in the proposed system to resolve the problems that were identified in the problem
context section. The chapter has also included the deliverables the system will produce after it is
completed. The limitations for the system have also been identified that limits the scope of the
proposed project.

P a g e 13 | 82
CHAPTER 2: PROBLEM DESCRIPTION
2.1 Current Problem Description
After the analysis of preliminary investigation, the researcher has spotted and identified some of the
main problem areas of the software which are briefly described below:

2.1.1 Description of Problem Area


 If an enterprise's network uses resource-intensive applications like video streaming and
tele-presence other than through business-critical applications, the bandwidth capacity for
running business operations will be minimal. This often negatively impacts productivity,
affecting all operations and often eroding revenues. That's a domino effect

Benefits of using network traffic Monitor:

 Helps analyze bandwidth issues


 Identifies the top talkers
 Improves the user experience

.
How does Site24x7 network traffic monitor work?

Our network traffic Monitor tool collects flow export data from network devices, organizes them,
and presents actionable insights to users. First, you need to configure your devices that are the flow
exporters to export flows to Site24x7 On-Premise Poller, which is the NetFlow collector. Site24x7 is a
flow analyzer that processes raw data and presents it in intuitive formats for easy interpretation and
understanding.

Benefits of network traffic Monitor

Machine-to-machine traffic has been the biggest traffic generator of the decade. As a network
administrator, you need a network analyzer tool to keep an eye on your network. Additionally, you
need to track how much traffic is passing through your network. Also, management may want to
know about any bandwidth hog, intrusion, slowness, or unauthorized access.

P a g e 14 | 82
Figure 1.1

By using a network traffic Monitor tool, you can:

 Spot peaks, heavy incoming traffic from a particular application, or a port that is clogged
with incomplete processes.
 Obtain detailed stats and reports which you can use to quickly fix these issues.
 Identify where the traffic is generated in a data center scenario.
 Track traffic moving between the main office and branch offices.
 Perform custom pings and monitor synthetic tests between branch offices using Site24x7
On-Premise Poller. This will also help you with security analysis, allowing you to detect
changes and anomalies in your network.
 Test the quality of network bandwidth and ensure appropriate allocation.

2.4 Nature of Challenge

2.4.1 Domain Challenge

To build this software, the researcher would have to undergo some major challenges during the
development like:

• Synchronization: The primary challenge in developing this project would be implementing the
concepts of web server to track intruder on time and show in log in order to sync with
prompt to fetch the relevant data.

P a g e 15 | 82
2.4.2 Technical Challenge

The challenges that would come on the way of the researcher while working on the technology area
are as follows:

• Shell script: The very first thing that I would like to mention here is the knowledge of
platform. Since, the system is going to be developed on Prompt and I am totally unknown
about this technology, off-course I have started learning it but still, I need to learn many of
shell script for successful development of this project.

• Integrating Various Modules in one Application: It will be quite challenging to integrate


various modules such as dection, memory, Control Logs, and many more at a single place.

• Creating Panels:We will create a panel for the Admin/Host as in form of Prompt . After
tracking, the host can identify the intruder IP and requst send coming and sending through
this network etc.
• Hardware Fragmentation: There are many types of different prompt that run this program . These
prompt have different confriguration and resolutions. Thus, developer must have to perform market
research to find out which handsets are most popular with the target audience and develop for
those first
2.5 Feasibility Study
Feasibility study is an analysis and evaluation of a proposed project to determine if it is feasible
technical, economically, timely and operationally. Feasibility study for the project is conducted to
analyze whether the proposed project is possible/ feasible to be developed within scheduled time,
available resources, within estimated budget. After feasibility study is done, it is evaluated whether
to proceed with the project or not. The feasibility study can be categorized into following four parts:
 Technically feasibility
 Economic feasibility
 Schedule feasibility
 Operational feasibility
2.5.1 Technical Feasibility
Technical feasibility is conducted to verify whether the project is feasible to be developed within the
available resources or not. The technical feasible takes into account the technical requirements for
the project, the technical resources required by the project for its successful and efficient
completion. The specific technical resources to be available for completing the project successfully
are given below:

P a g e 16 | 82
Hardware Resources

S. No. Hardware Resources


1. Processor- Core i3 and later version
2. RAM (Memory) - 2 GB and more
3. Monitor – Any standard monitor
4. Pen Drive, Mouse, Printer, Keyboard
5. System Type- 64-bit OS
6. Hard Drive– More than 80 GB
7. Accessories – Internet connection.
Windows USB driver for Windows: To connect an -powered device with the
8.
development environment over USB for USB Debugging.
Table 2.1: Hardware Resources

Software Resources

S. No. Software Resources


1. Python interpreter
2. Window 7 or later
3. Command prompt
4. powershell
5. Cybersecurity tool
Table 2.2: Software Resources

Resources of Execution

S. No. Resources for Execution


1. Operating system - 4.0 and later
Smartphone - GPS enabled personal computer phone, Rear Camera (minimum 3.2
2.
MP), Internet services like Personal computer Data.
3. CPU: 600 MHZ
4. RAM: 100 MB (estimated)
5. Disk space: 50 MB (estimated)
6. A good data/internet connection for customers
Table 2.3: Resources for Execution

2.5.2 Economic Feasibility


The main purpose of conducting economic feasibility is to identify the financial benefits and costs

P a g e 17 | 82
associated with the project development. As for any system if the estimated benefits equal or
surpasses the expected costs that is calculated for the system then the project would be
economically feasible. Since the proposed system programming environment is based on which is
an open source platform, so there is less of investment in the development portion. And any
software or program that is produced needs to be tested which can be done without much
investment. Only required investment would be a physical device to test the system.

2.5.3 Schedule Feasibility

Schedule feasibility for a project is done to verify whether the project can be completed within
scheduled time or not as decided by the Gantt chart. Dates are fixed for each phase throughout the
project and it is to be ensured that the project is able to complete within the specified dates and the
schedule. If the project is able to be completed within the schedule, the scheduled feasibility is high.
Gantt chart is a project management tool that can be used to measure the scheduled feasibility of
the project. The proposed timeline for the software would consume approximately 38 weeks and
time management for each task is carried out aptly through Gantt chart.

2.5.4 Operational Feasibility

Operational feasibility measures to which extent the proposed system resolves the problems
identified in the starting phase of the project; how the project intends to fulfil the requirements
identified during scope definition and how the system makes use of the opportunities identified
during scope definition. The project will be operationally feasible undoubtedly as the main motive is
to solve the problems of those who face problems in nowadays environment which are faced by
masses.

Conclusion of Feasibility Study


The project is technically feasible since the hardware, software and the resources needed for
executing the system are ready. After evaluating the cost and benefits incurred on and derived from
the system, it is concluded that the project is economically feasible. The project will be completed on
time and deadlines will be followed as scheduled in the Gantt chart. The system will be socially
acceptable and will satisfy the needs of users.

2.6 Conclusion
Chapter 2 is all about the problems identified in the current area of study i.e. the problems in ticket
environment. The developer has identified all the problems which is generally facing by the general
user. The problems have been documented along with the justification for each problem. After all

P a g e 18 | 82
the problems are identified, the developer’s next task was to provide appropriate solutions to
resolve the problems. For the same purpose, the solution corresponding to each problem has been
documented along with the justification. A feasibility study is then conducted for the system to
ensure that the proposed system is technically, operationally, economically feasible and can be
completed within a specified time frame. The feasibility study is successful, creating a further path
for the developer to move ahead with the project.

P a g e 19 | 82
CHAPTER 3: LITERATURE REVIEW

3.1 Introduction to Literature Review


A literature review is a description of what work has already been done by other researchers related
to the present topic. It is conducted using published books, journals and other research papers and is
a baseline for present research. The following are the purpose of a literature review:
 To perform critical evaluation of already conducted research to find out their ideas, strength,
weakness and their methodologies.
 To have an overview of already existing suggestions related to the subject, review the findings
and views of others.
 To answer certain questions and remove confusions related to the present topic.
3.2 Advanced Preliminary Research
The idea came to the mind of developer while learning computer networks and an eagerness to
learn about how packets travel through network. The communication between computers in a
network is done through packets.The developer has the idea to monitor the traffic using a quick
python script. The developed system will save time for network administrators of any organization.
Python programming language can be used to automate manual tasks by writing simple scripts. It is
a convenient tool for the server and networking devices for managing tasks and configurations. The
main idea behind analyzing any traffic is to keep a check on the flow of data over network and to
find that thereis no suspicious ip connected to the network performing any nefarious activity. But as
it is a python script it may not be able to access packets over large group of networks as there count
may be in millions or larger.

3.3 Academic Research

In order to fully comprehend the benefits of network traffic analysis for general users and the
genuine demand for it, the developer first did academic study by reading research papers, journals,
and other materials before constructing the proposed system. how the users will find it useful.
Additionally, it will assist the developer in enhancing the system's features.

3.3.1 Packets Format


In order to monitor network traffic one should have knowledge of networking concepts such as
types of protocols and packet structure.

3.3.2 Software Methodology and Software Engineering Concepts


In order to offer a user-satisfactory system on schedule, the developer has to research for the
methodology i.e. Code & Fix method in which product is tested and re-released.

P a g e 20 | 82
3.3.3 Python Scripting for Network

Python is necessary for network programming. Python's standard library fully supports network
protocols, data encoding and decoding, and other networking principles, and writing network
programmes in Python is easier than in C++. In the first example, programmers can use and access
the operating system's fundamental socket support using Python's libraries, and programmers can
design both connection-less and connection-oriented protocols.High-level access given by Python
libraries can also be used to access application-level network protocols. HTTP, FTP, and other
protocols fall within this category.

3.3.4 Project Management Principles


To complete the development smoothly, project management strategies such as scheduling,
feasibility, and risk analysis will be considered.
The books, journals and online articles referred for doing academic research are as follows:
 Books

Topic Book Referred


Pressman, R. (2005). Software Engineering: A Practitioner's
Approach. 5th ed. Boston, Mass.: McGraw-Hill.
Shelly Cashman (2002). System Analysis and design,2nd Ed., Shelly
Cashman Series, Sydney.
Software Development Valacich, J., George, J. and Hoffer, J. (2001). Essentials of
Life Cycle systems analysis and design. Upper Saddle River, N.J.:
Prentice Hall.
Kendall and Kendall (2005); System Analysis and Design,4th Ed, New
York: Prentice Hall.
Foundations of Python Network Programming
By Brandon Rhodes, John Goerzen Collins, C et al. (2012).
Python Network Programming
By Abhishek Ratan, Eric Chou, Pradeeban Kathiravelu, Dr. M. O.
Networking with Python
Faruque Sarker.
Mastering Python Networking 3rd Edition
By Eric Chou

Python GUI Python GUI Programming with Tkinter


By Alan D. Moore (2018)

P a g e 21 | 82
Python GUI Programming - A Complete Reference Guide
By Alan D. Moore, B. M. Harwani (2019)
Python Object-Oriented Programming 4th Edition
Features of OOPS
By Steven F. Lott, Dusty Phillips(2021)
Table 3.1 Books References for Academic Research

 Journals

Topic Journals Referred


D’Alconzo, A., Drago, I., Morichetta, A., Mellia, M., & Casas, P. (2019).
A survey on big data for network traffic monitoring and analysis. IEEE
Transactions on Network and Service Management, 16(3), 800-813.

Adewale, A. A., Matthews, V. O., Adelakun, A. A., Amase, W., &


Alashiri, O. Packet Sniffer for Users End Network Performance
Monitoring using Python Programming.
Network Monitoring
Babić, I., Maksimović, A., Nedeljković, S., Jovanović, M., Čabarkapa,
with Python M., & Randjelović, D. (2019). Useful Python libraries for creating IDS
software. In Thematic conference proceedings of international
significance. Vol. 2/International scientific conference" Archibald Reiss
Days", Belgrade, 6-7 November 2019. (pp. 337-347). Belgrade:
University of Criminal Investigation and Police Studies.

Kumar, A. Network Traffic Evaluations Using Python Based Framework


for Security and Traffic Fingerprinting.

Table 3.2 Journals References for Academic Research

3.4 Domain Research

Domain research is required as the project domain varies from case to case. Once this is done for a
particular module, the analysis can be tackled and the design of that particular module is easier to
use. During the research phase, researchers acknowledged that there are enough problems users
face in the ticket-purchasing environment. The application domain area focuses on Desktop or
Computer-based application and networking concepts. In order to fully understand user
requirements and key aspects of the system, researchers need to implement technologies that
mitigate the problems faced for handling requests by router.

3.4.1 Python
Python is commonly used for developing websites and software, task automation, data analysis, and
data visualization. Since it's relatively easy to learn, Python has been adopted by many non-
programmers such as accountants and scientists, for a variety of everyday tasks, like organizing
finances.

P a g e 22 | 82
A script is used to automate certain tasks in a program. It can run by itself and it is less code
intensive whereas modules in python is referred as a library which can not run by its own. It needs to
get imported in order to use it.
Python uses an interpreter to translate and run its code and that's why it's called a scripting
language.
A Python script normally can be full of functions that can be imported as a library of functions in
other scripts, or a python script can be a command that runs in Rhino.

There is a way to have Python definitions be both a library of functions and a direct command.

The key is to add these statements to the end of the file:

Figure 3.1

3.4.2 Network Packets


A network packet is the basic unit of data that is grouped and sent over a computer network, usually
a packet-switched network such as the Internet. Each packet or block of data is part of a complete
message and contains associated address information that helps identify the sending computer and
the recipient of the message.
A network packet consists of three parts: packet header, payload and trailer. The size and structure
of network packets depend on the underlying network structure or the protocol used. Conceptually,
network packets are similar to postal packets. In this scenario, the header is the box or envelope, the
payload is the content, and the trailer is the signature. The header contains instructions related to
the data in the packet.
Network packets work by choosing the best available route to a destination. This is the route that all
other packets in the message will use, making network traffic more efficient when load balancing
different devices. For example, if a device encounters a problem while sending a message, the
packet is rerouted through routers to ensure that the entire message reaches its destination.

P a g e 23 | 82
Fig 3.2: Structure of a Packet

3.5 Market Review


A packet sniffer is a software or hardware tool for intercepting, logging, and analyzing network traffic
and data. These tools help identify, classify, and troubleshoot network traffic by application type,
source, and destination. There are various tools on the market, but most rely on an application
program interface (API) known as pcap (for Unix-like systems) or libcap (for Windows systems) to
capture network traffic. . The best packet sniffers then analyze this data to identify the cause of the
problem so that it can be prevented in the future.
To truly understand the power of packet sniffers, it is important to build a solid knowledge base of
Internet routing. Let's start from the beginning. Every email you send, every web page you open, and
every file you share is spread across the Internet in thousands of small, manageable chunks called
data packets. These packets are sent through a protocol stack called Transmission Control
Protocol/Internet Protocol (TCP/IP). TCP/IP is divided into four layers: application protocol layer, TCP
(Transmission Control Protocol) layer, IP (Internet Protocol) layer, and hardware layer.

3.6 Product Analysis

3.6.1 Qualitative Analysis


 For Users

S. No. Features Proposed System

1. Monitoring IPs 
2. Info about Packets 
3. Filtering Packets Type 
4. Live Packet Monitoring 
5. Saving the Data 
6. Light weight aplication 
Table 3:Qualitative Analysis for Users

P a g e 24 | 82
3.7 Critical Evaluation of Literature Review

The evolution of the proposed system for the user is studied to conclude what features the end user
needs to improve the Network Monitoring tool. The review of the literature lays the groundwork for
further investigations that give an idea of the proposed system. Systems similar to the proposed
system were studied to establish a baseline for the system; What problems can developers have,
what features cannot be implemented in?

During the literature review, technical, academic and domain research was conducted to gain a deep
understanding of the features to be implemented in the proposed system and to examine them
implement technology. used in system implementation. Therefore, desk research will be conducted
as part of a literature review examining the work of others that will lead the developer to develop
the proposed system.

3.8 Critical Evaluation of Market Review


In this part research is done on the similar systems available in the market. After comparing the
existing systems, there are some drawbacks or the cons in the systems which are identified. Above
system shows that there are few apps available in the market that are similar to the proposed app.
The app to be developed provides such type of functionality that is required for each and every
online booking in today’s era. The research conducted results in the need to features like
presentation of packet, identifying packet data and saving packet informations in real time. While
developing the proposed system, the developer can utilize the information provided by the similar
apps and also can integrate own new ideas into the existing ideas. Since the similar apps have
proven to be very effective in real world, and the entire research provides support to the developer
for better understanding in creating the whole app. The proposed app thus will be efficient in
enhancing the shopping experience at retail environment.

3.9 Critical Success Factor


The Backup Facility in better presentation of packet, identifying packet data and saving packet
informations in real time feature the proposed system will be providing to its users are the critical
functionalities of this project. The developer needs to complete all the features identified during the
literature review; secondary research that are to be implemented in order to deliver an efficient
system to the end-user.

3.10 Conclusion
Chapter 3 includes review the literature of the past to establish a baseline for the proposed project.
Under literature review, existing systems have been studied to gather knowledge in the area of the
study; what features are new in the market and what all features the developer can integrate into

P a g e 25 | 82
his new system. The chapter also includes the information and resources that are a part of the
literature review and are studies or will be studied in future to collect the data and information
about the area of study.

P a g e 26 | 82
CHAPTER 4: RESEARCH METHODS
4.1.1 Primary Research
Primary research is defined as collecting data or the information about the domain of the study from
the real world directly, for the very first time about a given subject directly from the real world. It is
done to remove the confusion and ambiguity that came in the mind of the developer after
performing secondary research by actually asking such questions directly to the forum users and
considering their suggestions. The developer can use this research to move further in the
development of the project. The primary research methods used by the developer are questionnaire
and interview which are described below:

4.1.2 Questionnaire
A questionnaire consists of a series of questions printed on paper in a specific order to quickly elicit
the desired information from the target audience. Respondents are required to read and understand
the question and write their response in the space provided. Because the user is the type of user of
the proposed system. Developers distribute surveys among them.
Reasons for Conducting Surveys:
We chose surveys as our primary data collection method for the following reasons:
 Questionnaires make it possible to reach the mass at the same time, regardless of their
geological location, taking less time and making maps more accurate.
 Since the target users of the system are quite large in number, and it is impossible to reach
out to each of them individually to collect their requirements and suggestions.
 Since, the statistical techniques can be applied to it the analysis of questionnaire is efficient
which is done in the terms of graphs and charts which are more accurate.
 Users are free to answer questions anonymously, so there are more chances of obtaining
exact requirements.
 It’s a cost-effective approach, as it can be emailed to the participants or be distributed as
paper-based questionnaire.

Questionnaire for Customer

QUESTIONNAIRE

A STUDY TO ANALYZE HOW TO ENHANCE NETWORK TRAFFIC MONITORING


Table 4.1

P a g e 27 | 82
Respected Sir/Mam,
First of all, we thank you for being a part of our survey. This survey asks about your experiences
using our network monitor to keep track of activities over your network.
The researcher is a final year student of Panipat Institute of Engineering & Technology, Panipat
pursuing B Tech in the stream of Computer Science. For primary research work and gathering data is
done by survey for final year project. Researcher is kindly requesting you to spare a few minutes to
go through the questions and help us to complete this survey by filling these below questions.
Questions have been carefully designed by following all the ethical guidelines for the research work
of the Kurukshetra University. The title of the project is “Network Traffic Monitor”. The purpose of
this survey is to find out the problems faced by the user while monitoring the network.
This survey will help the developer to know the various preferences of the user and to modify the
currently available system. The results of this evaluation will be very useful in getting necessary
details for developing an application.
Instruction
This questionnaire sections will help the researcher to estimate about the project research
deliverables. It is important that you answer all applicable questions thoroughly.
Section A: - This section is optional and comprises of your personal and professional details.
Section B: - Check the most suitable options from the questions below, you may check more than
one option based on the requirements.
Section C: - Feel free to share your views/ suggestions and help researcher to understand the basic
requirements.
Disclaimer
Your response to this survey or any particular question is completely confidential. Your identity will
not be revealed and the data here obtained will only be used for statistical purposes only.

SECTION A
Age
Gender

P a g e 28 | 82
Profession _____________________________
Qualification _____________________________

SECTION B
Question 1 Do you own a Laptop/Computer?

Justification This question will help the researcher to analyze the availability of computers among
the target audience so that the researcher can analyze the target audience app with an
ease.

If yes, then

Question 2 Which Operating system do you use?

Windows Unix/Linux MacOS


Justification The above question will help researcher to analyze the compatibility issues related to
smart phones. So, that the researcher can think of implementing advance features
within the application.

Question 3 Do you have python installed on your computer?

Justification The analysis of above question will help researcher to analyze and whether to
implement some libraries input to fully utilize features of application.

Question 4 How would you like to monitor traffic, reason you preferred this?

CLI GUI
Fast packet transition Slow packet transition
Justification This question will help researcher to know about the requirements and desires of user.

Table 4.2 Questionnaire for Customer

SECTION C
Additional Requirement:
___________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________
____________________________________________________________________________

P a g e 29 | 82
Any Suggestion:
___________________________________________________________________________________
___________________________________________________________________________________
______________________________________________________________
____________________________________________________________________________
Table 4.3
Thank you for your cooperation and for providing the valuable information. Your concern and your
help are highly appreciated. Please ensure once, whether you answered every question in the
questionnaire or not. After fully completion of the questionnaire kindly deposit or submit this
questionnaire to the researcher.
Questionnaire for Developer

QUESTIONNAIRE
A STUDY TO ANALYZE HOW TO ENHANCE ONLINE BOOK TICKETING AT THE RAILWAY
ENVIRONMENT BY THE DEVELOPER USING ANDROID DEVICE
Respected Sir/Mam,
First of all, we thank you for being a part of our survey. This survey asks about your experiences
using our network monitor to keep track of activities over your network.
The researcher is a final year student of Panipat Institute of Engineering & Technology, Panipat
pursuing B Tech in the stream of Computer Science. For primary research work and gathering data is
done by survey for final year project. Researcher is kindly requesting you to spare a few minutes to
go through the questions and help us to complete this survey by filling these below questions.
Questions have been carefully designed by following all the ethical guidelines for the research work
of the Kurukshetra University. The title of the project is “Network Traffic Monitor”. The purpose of
this survey is to find out the problems faced by the user while monitoring the network.
This survey will help the developer to know the various preferences of the user and to modify the
currently available system. The results of this evaluation will be very useful in getting necessary
details for developing an application.
Instruction
This questionnaire sections will help the researcher to estimate about the project research
deliverables. It is important that you answer all applicable questions thoroughly.
Section A: - This section is optional and comprises of your personal and professional details.
Section B: - Check the most suitable options from the questions below, you may check more than
one option based on the requirements.
Section C: - Feel free to share your views/ suggestions and help researcher to understand the basic

P a g e 30 | 82
requirements.
Disclaimer
Your response to this survey or any particular question is completely confidential. Your identity will
not be revealed and the data here obtained will only be used for statistical purposes only.
SECTION A
Age
Gender

Profession _____________________________
Qualification _____________________________
Table 4.4
Question 1 Do you own a Laptop/Computer?

Justification This question will help the researcher to analyze the availability of computers among
the target audience so that the researcher can analyze the target audience app with
an ease.

If yes, then

Question 2 Which Operating system do you use?

Windows Unix/Linux MacOS


Justification The above question will help researcher to analyze the compatibility issues related to
smart phones. So, that the researcher can think of implementing advance features
within the application.

Question 3 Do you have python installed on your computer?

Justification The analysis of above question will help researcher to analyze and whether to
implement some libraries input to fully utilize features of application.

Question 4 How would you like to monitor traffic, reason you preferred this?

CLI GUI
Fast packet transition Slow packet transition
Justification This question will help researcher to know about the requirements and desires of
user.
Question 5 What type of traffic report format would be suitable for you?

MS EXCEL Report Graphical Report (Charts) CSV format

If other, please specify: …………………………


Justification This question will let the researcher to know that what type of reports will be
preferred by the users

P a g e 31 | 82
Question 6 Do you want to back up your data?

Yes No

Question 7 What are the basic information, that you need to include for ticket booking?

Packet Information Yes No

Packet Size

Packet Number

Packet Type

Protocol Information

Source IP address

Destination IP address

Source Port Number

Destination Port Number

Payload Data

Any other information, please specify………………………….

Justification This will give an idea to the developer about what are the data to be fetched for a
particular module
Table 4.5 Questionnaire for Developer

Thank you for your cooperation and for providing the valuable information. Your concern and your
help are highly appreciated. Please ensure once, whether you answered every question in the
questionnaire or not. After fully completion of the questionnaire kindly deposit or submit this
questionnaire to the researcher.

4.1.3 Interview
An interview is a type of primary research method in which a set of questions is pre-planned and
presented face-to-face to the respondent. Questions are basically open. Used to compile detailed
information about a topic. For the proposed system, these questions were asked in interviews, and
the answers require a little elaboration to understand the requirements. The respondents of the

P a g e 32 | 82
proposed system are developers. The aim was to get an exclusive view of the user in order to gather
maximum information about system requirements.
Justification for Conducting Interview
The reason for choosing interview as a primary research method is as follows:
 It provides first-hand information so more chances of getting actual facts and quality rich
data, new insights and conclusions.
 It will help in gathering detailed information about the functionalities of the propose system
as it is best for investigating problems.
 Apart from what they say, a person’s feelings, thoughts, gestures can be noticed which can
enable the interviewer to confirm that what they discuss is right or wrong.
Interview Questions for Developers

1. Which type of System would you like to use for Network Monitoring and why?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________

Justification: This will help the developer to know the mindset of the user whether the user
wants to run with the technology or just want to remain where he/she is. If the user replies
mobile application, then most of the questions marked by him/her will be valuable.

2. What do you use to store the data on the web? What will happen if the data will be lost?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________
Justification: This question will help researcher to understand the need of the cloud to save
the data online

3. Do you think that Network Monitoring of the system will be going to help you if yes please
specify how?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________

P a g e 33 | 82
_____________________________________________________________________
Justification: This question will explain how this system is going to be useful for you. so, that it
is clear how it will helpful.

4. What is the probable problems that can come during the development phase of the
application?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________

Justification: The developer wants to know if there are any probable chances of errors or
mishaps that could come in the way of development. If there are any technology, chances
that has currently occurred which could hamper the ongoing development procedures.

5. Have there been any problems with the software? If yes, describe problems?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________
Justification: Its response will help to understand the problems faced by the retailers in the
existing software, so that those problems can be eliminated in the proposed system.

Table 4.6 Interview Question for Developer

4.2 Secondary Research


Secondary research usually precedes primary research. This means that we collect information from
previously published books, journals and research articles that are third party authenticated sources.
It is done to learn from mistakes made by others in related fields because it is better to learn from
other people's mistakes and save time than to repeat the same mistakes.

4.2.1 Technical Research


This refers to the technical part of research, meaning research related to the choice of platforms,
programming languages, databases, technologies, and methodologies. Conducting a technical study
of the proposed project is carried out before starting the design and implementation stage of the

P a g e 34 | 82
system, as this is an important factor that can affect the implementation of the project. Extensive
research is conducted comparing and evaluating different platforms, programming languages,
databases, technologies, and methodologies to arrive at a conclusion that will be selected for the
proposed project.
Justification for Choosing Windows as a Platform
The decision of choosing one platform over other has always been a difficult task for the developer.
Each platform has its own pros and cons so it is inadequate to say that one platform is better than
other ones. Let’s see why Windows has been chosen over other OS platforms.
What is Windows?

Windows is a graphical operating system developed by Microsoft. Users can provide ways to view
and store files, run software, play games, watch videos, and connect to the Internet. It was released
for both home computers and professional work.
Microsoft introduced the first version as 1.0. It was released on November 10, 1983 for both home
computing and professional features of Windows. It has since been released for many versions of
Windows, not just the current version of Windows 10.
In 1993, the first commercial version of Windows was released, known as Windows NT 3.1. Later
versions Windows 3.5, 4/0 and Windows 2000 were introduced. When Microsoft released his
Windows XP in 2001, the company designed different versions for personal and business use.
Developed based on standard x86 hardware such as Intel and AMD processors. Therefore, it can run
on different brands of hardware. B. HP, Dell, and Sony computers, including home-built PCs.
Why Windows?
Microsoft Windows is definitely the most popular choice when it comes to computer operating
systems. According to StatCounter in May 2018, his 81.73% of all computer users were running some
version of Windows. Yes, more than 80% of his computer users. Clearly they are doing the right
thing. But what exactly is it about Windows that attracts so many users? Let's look at some factors.

P a g e 35 | 82
Figure 4.1
 Better Application: Applications available for Windows tend to have superior features
compared to other platforms. I'm not saying Windows has the best software, because there
are actually some very well-designed programs designed for other platforms. But when you
look at the big picture, Windows-based applications stand out from the rest.
This example is Microsoft Office. It's available for both Windows and Mac users, but the
Windows experience is much better than the Mac version. Given the ubiquity of Microsoft
Office in the productivity arena, that alone is reason enough for businesses to choose
Windows over other operating systems.

 Popular: The usage statistics speak for themselves regarding how popular Windows is. With
Windows being more familiar to people than any other operating system, it makes sense for
organizations to choose the option that will require less training and that users would be
more comfortable with using. Almost every computer user has used Windows at some point
but the opposite is not necessarily true.It also makes collaboration and compatibility with
other organizations run smoother. In the marketplace, Windows is the dominant operating
system. If a business wants to remain compatible with its partners and stakeholders, it must
be on the same platform.Partnerships and deals don't require the hassle of incompatible
files or mismatched features.

 More Softwares: Arguably, Windows has software for the broadest range of platforms than
any other operating system. This has the advantage of giving users a wider range of options
to choose from. This creates a healthy "competition" for users and forces software

P a g e 36 | 82
developers to push the boundaries to create the best possible programs. Anything less than
best leads the user to select the next program on the list. This alone has an amazing effect
on motivating software developers to provide better solutions that meet their users' needs.
For less common operating systems, fewer software options are available to the user. This
limited choice also means that users only need to select the option with the highest
performance. Lack of competitive software development elements can lead to lazy
developers. Users are forced to use inferior products simply because there are no better
alternatives.
Justification for programming language selection (Python)
Python provides two levels of access to network services. At a low level, you have access to the
underlying socket support of the underlying operating system. This allows you to implement clients
and servers for both connection-oriented and connectionless protocols.
Python also has libraries that provide higher-level access to certain application-level network
protocols such as FTP, HTTP, etc.
1. It is easy to learn and read.
2. It is perfect for scripting tasks which is perfect for network automation.
3. Network vendors, especially Cisco have adopted Python as the language of choice.
4. Lots of network automation tools are written in Python.
5. Cisco already embed a Python shell in many switches.
6. Networks are getting bigger but IT teams are not, we need to find better ways to do more
with less.
7. Stand out from the crowd and improve your career prospects.
8. Python also has a great community, as one of the most popular programming languages in
use today, it is very easy to find a solution to your problems.
9. Python is already installed on Linux & MacOS and is now available on a lot of Networking
devices.

4.2.2 Development Methodology


The Code-and-Fix model is perhaps the most widely used development methodology in software
engineering. It starts with little or no initial planning. They will start development immediately and
fix any problems that arise until the project is completed.
Code and Correction is an attractive option when faced with tight development schedules, as it
allows you to start developing code immediately and see results immediately.
Unfortunately, if you run into major architectural problems late in the process, you'll have to rewrite
a large portion of your application. Alternative development models help identify these issues in the

P a g e 37 | 82
early concept stages when changes are easier and less expensive.
 It is essentially an ad hoc method of software maintenance.
 It is a firefighting strategy that involves waiting for the issue to arise before attempting to
address it as soon as possible.
 This model's primary goal is to pinpoint the issue and then find a quick solution.
 In this model, changes are made as early as possible at the code level without accepting
potential future issues.
 This model is a method for changing the software code without giving much thought to how
doing so would affect the overall architecture of the software system.
 This model causes the software's structure to degrade quickly.

Phases of Code & Fix-Model Methodology

Table 4.7 Phases of V-Model Methodology

This methodology has following phase that developer will pursue while developing the system.
 Code and fixes are very useful for technology-driven solutions in the early stages of
development. B. For technical activities, including research and development (R&D). For
example, an individual working on a machine learning-related research program where
project outcomes are uncertain and unpredictable may well meet their needs with this
model.
 Additionally, software developers like to use this model when learning new technologies and
development tools. This allows you to quickly acquire enough expertise to contribute to
future development efforts. Additionally, this model allows engineers to shrink their thinking
space and focus only on what is most relevant to their work. This allows you to temporarily
forget about technology and product failures and focus on building what matters most in the
moment.

P a g e 38 | 82
 The code and fix methodology is sometimes seen as a time saver and is a viable option for
low budget products. This is very common in software groups with many entry-level
engineers interested in experimenting, observing, and learning to improve their
programming skills. An example of this would be an individual or group project in a
university-level computer science program. In this case, students are given assignments to
practice basic aspects of the course.
 Some software developers may enjoy their jobs because they are given complete autonomy
over the development process without formal direction from senior management. In this
environment, engineers typically control a project's build flow, scope, implementation
details, technology stack, and development tools, and there is no compulsory software
delivery structure. In a way, this can inspire creativity in engineers. The code-and-fix model is
also suitable for single contributors, skilled software engineers working independently on
specific technical aspects of the software, mainly problems that are difficult to solve and
require a lot of trial and error.
Justification for choosing Code & Fix-Model
After some discussion, the developer chooses Waterfall Model for the development of this system.
The most attractive factor for selection of V-Model is-
 The key advantage is that it does its work cheaply and promptly.
 Users do not always wait for an extended period of time. Rather, they want the changed
software supplied to them as soon as possible. As a result, the software maintenance team
must employ a quick-fix model in order to avoid the time-consuming Software maintenance
life cycle procedure.
 This strategy is also useful when the software system must be maintained within strict
deadlines and with limited resources.

4.3 Conclusion
The fourth chapter is all about research methods. The researcher did primary and secondary
research, as well as technical study, to reach a final decision about user requirements, technologies,
and tools to be used. The developer used a variety of research approaches, including questionnaires
and interviews. The investigation was required to avoid wasting time later in the development
process. The researcher is now fairly certain of the system's characteristics and how to resolve
existing issues. After conducting extensive study on domain, technology, language, tools, and so on,
the developer is confident enough to create the suggested programme.

CHAPTER 5: ANALYSIS
SYSTEM ANALYSIS

P a g e 39 | 82
INTRODUCTION TO SYSTEM ANALYSIS

information to recommend improvements on the system. It is a problem solving activity that


requires intensive communication between the system users and system developers. System
analysis or study is an important phase of any system development process. The system is studied to
the minutest System analysis is a process of gathering and interpreting facts, diagnosing problems
and the detail and analyzed. The system analyst plays the role of the interrogator and dwells deep
into the working of the present system. The system is viewed as a whole and the input to the system
are identified. The outputs from the organizations are traced to the various processes. System
analysis is concerned with becoming aware of the problem, identifying the relevant and decisional
variables, analyzing and synthesizing the various factors and determining an optimal or at least a
satisfactory solution or program of action. A detailed study of the process must be made by various
techniques like interviews, questionnaires etc. The data collected by these sources must be
scrutinized to arrive to a conclusion. The conclusion is an understanding of how the system
functions. This system is called the existing system. Now the existing system is subjected to close
study and problem areas are identified. The designer now functions as a problem solver and tries to
sort out the difficulties that the enterprise faces. The solutions are given as proposals. The proposal
is then weighed with the existing system analytically and the best one is selected. The proposal is
presented to the user for an endorsement by the user. The proposal is reviewed on user request and
suitable changes are made. This is loop that ends as soon as the user is satisfied with proposal.
Preliminary study is the process of gathering and interpreting facts, using the information for further
studies on the system. Preliminary study is problem solving activity that requires intensive
communication between the system users and system developers. It does various feasibility studies.
In these studies a rough figure of the system activities can be obtained, from which the decision
about the strategies to be followed for effective system study and analysis can be taken.

Existing System

In the existing system the exams are done only manually but in proposed system we have to
computerize the exams using this application.
 Lack of security of data.
 More man power.
 Time consuming.
 Consumes large volume of pare work.
 Needs manual calculations
 No direct role for the higher officials

Proposed System
The aim of proposed system is to develop a system of improved facilities. The proposed system can

P a g e 40 | 82
overcome all the limitations of the existing system. The system provides proper security and reduces
the manual work.
 Security of data. Ensure data accuracy's.
 Proper control of the higher officials.
 Minimize manual data entry.
 Minimum time needed for the various processing.
 Greater efficiency.
 Better service.
 User friendliness and interactive.
 Minimum time required.

FEASIBILITY STUDY

Feasibility study is made to see if the project on completion will serve the purpose of the
organization for the amount of work, effort and the time that spend on it. Feasibility study lets the
developer foresee the future of the project and the usefulness. A feasibility study of a system
proposal is according to its workability, which is the impact on the organization, ability to meet their
user needs and effective use of resources. Thus when a new application is proposed it normally goes
through a feasibility study .The document provide the feasibility of the project that is being designed
and lists various areas that were considered very carefully during the   feasibility study of this project
such as Technical, Economic and Operational feasibilities. The following are its features:

TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first. The assessment of this
feasibility must be based on an outline design of the system requirement in the terms of input,
output, programs and procedures. Having identified an outline system, the investigation must go on
to suggest the type of equipment, required method developing the system, of running the system
once it has been designed.

Technical issues raised during the investigation are:


 Does the existing technology sufficient for the suggested one?
 Can the system expand if developed?

The project should be developed such that the necessary functions and performance are achieved
within the constraints. The project is developed within latest technology. Through the technology
may become obsolete after some period of time, due to the fact that never version of same software
supports older versions, the system may still be used. So there are minimal constraints involved with
this project. The system has been developed using Java the project is technically feasible for
development.

ECONOMIC FEASIBILITY
The developing system must be justified by cost and benefit. Criteria to ensure that effort is
concentrated on project, which will give best, return at the earliest. One of the factors, which affect
the development of a new system, is the cost it would require.
The following are some of the important financial questions asked during preliminary investigation:

P a g e 41 | 82
 The costs conduct a full system investigation.
 The cost of the hardware and software.
 The benefits in the form of reduced costs or fewer costly errors.

Since the system is developed as part of project work, there is no manual cost to spend for the
proposed system. Also all the resources are already available, it give an indication of the system is
economically possible for development.

2.1 PRODUCT PERSPECTIVE

Web traffic can be analyzed by viewing the traffic statistics found in the web server log file, an
automatically-generated list of all the pages served. A hit is generated when any file is served. The
page itself is considered a file, but images are also files, thus a page with 5 images could generate 6
hits (the 5 images and the page itself). A page view is generated when a visitor requests any page
within the web site - a visitor will always generate at least one page view (the main page) but could
generate many more.. Web Traffic Analyzer is aimed towards the vendors who want to reach out to
the maximum cross-section of customer and common people who can be potential customer. This
project envisages bridging the gap between the seller, the retailer and the customer. Web Traffic
Analyzer should be user friendly, quick to learn' and reliable software for the above purpose. OSM is
intended to be a stand-alone product and should not depend on the availability of other software. It
should run on both UNIX and Windows based platform.

2.2 PRODUCT FUNCTIONS

Web traffic is the amount of data sent and received by visitors to a web site. It is a large portion of
Internet traffic. This is determined by the number of visitors and the number of pages they visit.
Sites monitor the incoming and outgoing traffic to see which parts or pages of their site are popular
and if there are any apparent trends, such as one specific page being viewed mostly by people in a
particular country. There are many ways to monitor this traffic and the gathered data is used to help
structure sites, highlight security problems or indicate a potential lack of bandwidth – not all web
traffic is welcome. Some companies offer advertising schemes that, in return for increased web
traffic (visitors), pay for screen space on the site. Sites also often aim to increase their web traffic
through inclusion on search engines and through Search engine optimization.

CHAPTER 6: SYSTEM DESIGN

P a g e 42 | 82
6.1 Introduction
The design phase starts when the developer is done with the research and analysis phase. The
design phase includes the transformation of user’s specifications and software components into the
software interface to build a platform for establishing the system. It covers the building of blue prints
of the system that include physical modelling using software engineering tools and methods.
In the design phase for the proposed system, the design is taking the requirements as the input and
will produce a guideline for the implementation as output. Three to four design elements are to be
produced for each and every module after completing the research and analysis part which will be
fed as input to the design.

Figure 6.1

P a g e 43 | 82
Figure 6.2

Model View Controller or MVC as it is popularly called, is a software design pattern for developing
web applications. A Model Visw Controller pattern is made up of the following three parts
• Model - The lowest level of the pattern which is responsible for maintaining data
• View - This is responsible for displaying all or a portion of the data to the user
• Controller - Software Code that controls the interactions between the model and
View MVC is popular as it isolates the application logic from the user interface layer and supports
separation of concerns. Here the Controller receives all requests for the application and then works
with the Model to prepare any data needed by the view. The View then uses the data prepared by
the Controller to generate a final presentable response. The MVC abstraction can be graphically
represented as follows

P a g e 44 | 82
Figure 6.3
Usecase Diagram for Web Traffic Monitor

Figure 6.4

P a g e 45 | 82
DataFlow Diagram Level 1

Figure 6.5

Figure 6.6

P a g e 46 | 82
ER Diagram For The Project

Figure 6.7

Identification of Need
The old manual system was suffering from a series of drawbacks. Since whole of the system was to
be maintained with hands the process of keeping, maintaining and retrieving the information was
very tedious and lengthy. The records were never used to be in a systematic order. there used to be
lots of difficulties in associating any particular transaction with a particular context. If any
information was to be found it was required to go through the different registers, documents there
would never exist anything like report generation. There would always be unnecessary consumption
of time while entering records and retrieving records. One more problem was that it was very
difficult to find errors while entering the records. Once the records were entered it was very difficult
to update these records. In present, work done in the electricity board is performed manually which
is a great headache for the department .The reason behind it is that there is lot of information to be
maintained and have to be kept in mind while running the business .For this reason we have
provided features Present system is partially automated (computerized), actually existing system is
quite laborious as one has to enter same information at three different places.

P a g e 47 | 82
Figure 6.7

Following points should be well considered:


 Documents and reports that must be provided by the new system: there can also be few
reports, which can help management in decision-making and cost controlling, but since
these reports do not get required attention, such kind of reports and information were also
identified and given required attention.
 Details of the information needed for each document and report.
 The required frequency and distribution for each document.
 Probable sources of information for each document and report.
 With the implementation of computerized system, the task of keeping records in an
organized manner will be solved. The greatest of all is the retrieval of information, which will
be at the click of the mouse. So the proposed system helps in saving the time in different
operations and making information flow easy giving valuable reports.

P a g e 48 | 82
Figure 6.8

Data Dictionary
This is normally represented as the data about data. It is also termed as metadata some times which
gives the data about the data stored in the database. It defines each data term encountered during
the analysis and design of a new system. Data elements can describe files or the processes.

Following are some major symbols used in the data dictionary


 = equivalent to
 + and
 [] either/ or
 () Optional entry

P a g e 49 | 82
Figure 6.9
.

Figure 6.10

P a g e 50 | 82
Figure 6.11

Figure 6.12

P a g e 51 | 82
Following are some rules, which defines the construction of data dictionary entries:
1. Words should be defined to understand for what they need and not the variable need by which
they may be described in the program.
2. Each word must be unique. We cannot have two definition of the same client.
3. Aliases or synonyms are allowed when two or more enters shows the same meaning. For example
a vendor number may also be called as customer number.
4. A self-defining word should not be decomposed. It means that the reduction of any information in
to subpart should be done only if it is really required that is it is not easy to understand directly.

Data dictionary includes information such as the number of records in file, the frequency a process
will run, security factor like pass word which user must enter to get excess to the information.

P a g e 52 | 82
CHAPTER 7: IMPLEMENTATION

Code for Sniffing the Packets:

Figure 7.1

Figure 7.2

P a g e 53 | 82
Figure 7.3

Code for spoofing IP for monitoring all devices on network:

Figure 7.4

P a g e 54 | 82
Figure 7.5

Figure 7.6

P a g e 55 | 82
Outputs:

First check IP address and update in the program:

Figure 7.7

Update iface index in the program:

Figure 7.8

P a g e 56 | 82
Packets information displayed as the program runs:

Figure 7.9

Figure 7.10

P a g e 57 | 82
CHAPTER 8: TESTING
“... we have as many testers as we have developers. And testers spend all their time testing, and
developers spend half their time testing. We're more of a testing, a quality software organization
than we're a software organization.” – Bill Gates
(Information Week 2002)

8.1 Introduction
Testing is the process of exercising software with the intent of finding and correcting errors. The
objective of the testing is to uncover different classes of errors and to do so with a minimum amount
of time and effort. In order to provide highly acceptable and error free system, the system should
have to face the testing procedure and evaluation of each and every module and functionality.
(Mustafa & Khan, 2007)

8.2 Need of Testing


The significance of the testing phase is done to verify and validate the completed system. So that it
will executed and presented the way it was expected and all the functionalities function as were
defined in the project specification form. The testing does not require that the developer has to test
each and every section of code to verify the bugs and recover from the errors and bugs that are
present in it but its objective is to uncover the situations that could impact the system or the project
or can lead in making the project unsuccessful. Thus, testing is done to enhance the quality of the
system produced so that it is acceptable by the intended user with satisfaction.The highlights of this
chapter include:
 The different types of testing done.
 The duration taken to test.
 The person(s) involved.
 The reported errors.
 The measures taken.

8.3 Test Plan


Software development processes typically focus on avoiding errors, detecting and correcting the
software faults that do occur and predicting reliability after development. The test process,
techniques and tools are significant contributors to effective and efficient testing and quality
assurance. (Mustafa & Khan, 2007).Various testing techniques to be implemented for proposed
system are given in the next section.

P a g e 58 | 82
8.3.1 Type of Testing

Unit Testing (Black Box & White Box Testing)

Integration Testing

System Testing

Compatibility Testing
Testing
User Acceptance Testing

Usability Testing

GUI Testing

Documentation Testing
Table 8.1 Type of Testing

Testing
S. No Requirement
Technique
Testing of individual software component or modules of the
system. This type of testing is performed by the developers only
1. Unit Testing because it requires detailed knowledge of the internal program
design and code. It includes performing black box and white box
testing.
Testing of integration modules to verify combined functionality
Integration after integration. Various modules are integrated together and then
2.
Testing tested by the developer of the system to check whether the
modules work properly after integration.
Entire system is tested by the developer as per the requirements.
All the modules of the system are combined and check whether
3. System Testing
they work perfectly after being integrated into one system as a
whole.
4. Compatibility Compatibility testing is used to determine if the system causes any
Testing issues related to how it function in concern with the operating

P a g e 59 | 82
system and different type of system hardware and software. The
developer performs this type of testing on various hardware/
software platform to test the compatibility of the system on each
platform.
The testing is to be done to verify the design of the system whether
5. GUI Testing it satisfies the six predefined HCIU design principle and whether the
system is user friendly.
The purpose of doing a usability test is to determine whether a
product or document works with its intended users or readers. This
6. Usability Testing is to be done by evaluating a product through observing the real
people actually working on or using it so as to improve or enhance
the system. The end- users execute the system to test it
User Acceptance Testing tests that the system satisfies all the
essential user requirements and is performing to the acceptable
User Acceptance
7. level as expected by the customer. This is done by defining a set of
Testing
acceptance criteria which the system must satisfy before the
customer will accept it.
Documentation Documentation Testing is to be done to verify the system
8.
Testing documentation whether it is meaningful and user friendly or not.
Table 8.2 Testing Description

8.3.2 Pass/Fail Criteria


 The produced system meets all the specifications mentioned in the project specification
form and all the requirements of the user gathered during the research phase.
 All the modules/ functionalities are implemented in a way that the desired system produced
runs without any bugs and quickly.
 System is to be verified for the usability that depends upon proven Human-Computer
Interaction (HCI) principles and aims to achieve in the application ease of use, Navigation,
time for completion and errors removal.

8.4 Point of Contact of Troubleshooting Purpose

8.5 Testing Duration


S. No. Testing Technique Start Date End Date
1. Unit Testing 1st Aug 2022 10th Aug 2022
2. Integration Testing 10th Aug 2019 15 Aug 2019
3. System testing 16 Aug 2019 27thAug 2019

P a g e 60 | 82
4. Compatibility Testing 1 Sept 2019 5 Sept 2022
5. GUI Testing 6 Sept 2022 10th Sept 2022
6. Usability Testing 12th Sept 2022 22th Sept 2022
7. User Acceptance Testing 23th Sept 2022 27th Sept 2022
8. Documentation Testing 1 Oct2022 8th Oct 2022
Table 8.3 Testing Duration

8.6 Criteria of Test Cases


The system must comply with the success criteria mentioned in the specification. Some of the
requirements are:
 Product Management Module should work efficiently.
 Transaction Management Module should work efficiently.
 Synchronization must work efficiently.
 System should satisfy all user requirements.
 UI should have a consistent layout and must follow the HCIU principle.
 The App should be easy to use.
(Note: For more details, please refer to section of PSF)

8.7 Technical requirements for Testing


S. No. Technical Requirements
1. Operating system - Android 4.0 and later
2. Pc and wifi
3. CPU: 600 MHZ
4. RAM: 50 MB (estimated)
5. Disk space: 10 MB (estimated)
6. A good data/internet connection for customers
Table 8.4 Technical requirements for Testing

8.8 Users Involved in Testing


The developer will play the role of tester.
8.9 Unit Testing
In order to test each small part of the developed system individual test cases were developed. Unit
testing was very helpful as it helped the developer to test individual units of source code. This is
performed before any other testing because it is easy to find out bugs at lower level that is at
module level than to find them at integration or system level. It is performed at two levels; black box
test cases are made and then white box testing is done. Two levels of unit testing were basically
conducted, namely black box (also called functional testing) and white box (also called logical
testing).

P a g e 61 | 82
8.9.1 Justification for unit Testing
For the system produced named An Intelligent Railway Ticket Checker each module is tested and its
corresponding test case is produced. Therefore, individual test cases are produced for all the
modules. Unit testing is performed at the primary level for the system because for example if book
ticket functionality and scan ticket module are integrated before they are tested and a bug occurs, it
will be difficult to figure out which module the bug has occurred. Therefore, it will be useful to test
book ticket module after it is completed and scan ticket module separately after its completion to
figure out and remove the bugs easily.

8.9.2 Black box testing (Functional Testing)

Figure 8.1 Black Box

(www.softwareTestingSoftware.com 2017)
Black Box Testing, also known as Functional Testing, is a software testing technique that exposes
only the functionalities and the design of the system; hiding the internal implementation/ structure
of the system. The internal code or the structure is not known to the user who is going to use the
system.
 Justification for Black Box Testing

The testing is to be performed by the developer of the system but testing the functionalities of the
system and not going into the code of the system

THE STEPS IN THE SOFTWARE TESTING


The steps involved during Unit testing are as follows:
a. Preparation of the test cases.
b. Preparation of the possible test data with all the validation checks.
C. Complete code review of the module.
d. Actual testing done manually.

P a g e 62 | 82
e. Modifications done for the errors found during testing.
f. Prepared the test result scripts.
The unit testing done included the testing of the following items:
1. Functionality of the entire module/forms.
2. Validations for user input.
3. Checking of the Coding standards to be maintained during coding.
4. Testing the module with all the possible test data.
5. Testing of the functionality involving all type of calculations etc.
6. Commenting standard in the source files.

After completing the Unit testing of all the modules, the whole system is integrated with all its
dependencies in that module. While System Integration, We integrated the modules one by one and
tested the system at each step. This helped in reduction of errors at the time of the system testing.
The steps involved during System testing are as follows:
 Integration of all the modules/forms in the system.

 Preparation of the test cases.

 Preparation of the possible test data with all the validation checks.

 Actual testing done manually.

 Recording of all the reproduced errors.

 Modifications done for the errors found during testing.

 Prepared the test result scripts after rectification of the errors.

The System Testing done included the testing of the following items:
1. Functionality of the entire system as a whole.
2. User Interface of the system.
3. Testing the dependent modules together with all the possible test data scripts.
4. Verification and Validation testing.
5. Testing the reports with all its function ability.
After the completion of system testing, the next following phase was the
Acceptance Testing. Clients at their end did this and accepted the system with appreciation. Thus,
we reached the final phase of the project delivery.

There are other six tests, which fall under special category. They are described below:

 Peak Load Test: It determines whether the system will handle the volume of activities that
occur when the system is at the peak of its processing demand. For example, test the system
by activating all terminals at the same time.

 Storage Testing: It determines the capacity of the system to store transaction data on a disk
or in other files.

P a g e 63 | 82
 Performance Time Testing: it determines the length of time system used by the system to
process transaction data. This test is conducted prior to implementation to determine how
long it takes to get a response to an inquiry, make a backup copy of a file, or send a
transmission and get a response.

 Recovery Testing: This testing determines the ability of user to recover data or re-start
system after failure. For example, load backup copy of data and resume processing without
data or integrity loss.

 Procedure Testing: It determines the clarity of documentation on operation and uses of


system by having users do exactly what manuals request. For example, powering down
system at the end of week or responding to paper-out light on printer.

 Human Factors Testing: It determines how users will use the system when processing data
or preparing reports.

P a g e 64 | 82
CHAPTER 9: CRITICAL EVALUATION

9.1 Critical Evaluation


After completion of the project from the developer side, it’s time for critically evaluating the project
by mapping the project and its requirements with the specifications given in the project specification
form. Since the developer has made an extensive research on the system’s functionalities, made a
broad analysis of the same. After research and analysis, developer has designed the system to set
the goals which were further implemented and then tested to recover any errors if were present in
the system so as to produce a bug free system. Now time has come to critically evaluate the system
that includes the complete assessment of the system. The critical evaluation is not done module by
module but whole system is evaluated to determine the quality, significance and worth of the
system.

9.2. Factors of Benefit (Usefulness of System to Target Audience)


The developed system renders much usefulness to the target users because the system is able to
solve the problems mentioned in the problem description section of CHAPTER 2. The usefulness of
the system was discussed in the tangible and intangible benefits of section 1.7. Some of the
usefulness and benefits are recapitulated below:

9.3 Comparison with Other Systems


S. No. Features NM Market

1. Fast Processing ü ×
2. Machine independent ü ×
3. Best in UI ü ü
4. Apply Algo easily ü ×
5. Disk space (250MB) ü ü
6. Free ü ×
7. Open source ü ü
8. Best Price × ü
9. Alert × ü
10. Getting location from × ü
GPS
11. All header detected ü ×

P a g e 65 | 82
12. Easy to use ü ×
Table 9.1 Comparison with Another System

9.3.1 Success Assessment


The success assessment consists of analyzing whether the output received matches to what was
proposed. It consists of comparing the project outcomes to the results expected. The present project
meets all the requirements mentioned in PSF. It fulfils the scope and boundary of the project. The
following results prove it:
Criteria Result Success Degree (out of 10)

User interaction YES 9


Project management YES 9
Project requirements YES 10
Secured app YES 8
Testing YES 9
Quality YES 9
Graphical interface YES 9
Academic goals achieved YES 10
Project objective achieved YES 9
Feedback YES 9
9+9+10+8+9+9+9+10+9+9 = 91/100
Overall Success Rating of the system
Success Rate: 91%
Table 9.2 Success Assessment

9.3.2 Degree of Success


The rate of success of any project is determined on the mapping of the requirements documented
for the proposed system in the project specification form. The system should satisfy the quality
standards for project development and implementation should be feasible.

Figure 9.1 Degree of success

P a g e 66 | 82
9.3.3 Critical Appraisal
The developer has tried to impose all the proposed functionalities into the developed software. The
proposed requirements have successfully been mapped into real world system. Now, after the end
of implementation and testing phase, a security efficient app is ready to be deployed. There were
many setbacks during the development of system.

Analyzing the stability of a network starts with Monitor its performance, device capabilities, network
speed, and one more aspect that many network admins overlook: network traffic.

Network traffic analysis (NTA) is often the least considered aspect, but it influences many issues, like
performance degradation, and slowness for the users. Neglecting it can give way to security threats.

For example, if an enterprise's network uses resource-intensive applications like video streaming and
tele-presence other than through business-critical applications, the bandwidth capacity for running
business operations will be minimal. This often negatively impacts productivity, affecting all
operations and often eroding revenues. That's a domino effect organizations should avoid.

P a g e 67 | 82
CHAPTER 10: CONCLUSION
10.1 Success Criteria
The proposed system named “An Intelligent Railway Ticket Checker Application” has proved to be
significantly useful for the end-user as it meets all the requirement of the user as well as fulfils the
entire criterion that judge the quality and success of the system. The success for the proposed
system is achieved as it has met the success criteria and established what it was supposed to. The
system has resolved the issues that were discussed in the chapter 2 regarding the problems raised
and the solutions provided. The proposed system after evaluation has been found to successfully
guarantee the booking and checking at the real-time environment to the end- user and hence has
solved the problem what was expected.

10.2 Limitations and Errors in the Developed System:


 The project is strictly mobile based and all the features are for Android based mobile only.
 For some of the features the mobile should have internet & GPS enabled.
 A user must login into the system for accessing all the features.
10.3 Future Enhancement
 Set alerts to get notified if the traffic crosses a threshold value. or when the link is down
 Gain insights into future traffic trends, and plan your organization's bandwidth resources for
forecast and capacity planning
 Prioritize traffic with QoS policies, and evaluate how functional they are with CBQoS

10.4 What would have been done if given time to redo the project?
If the developer is provided a second chance to make this project then he would certainly make this
project a better one.
 Implement of all the features in command prompt: If the developer gets a chance then
developer will implement all features in mobile.
 Connect with WI FI server and Blueshell: The developer would like to connect with WI FI
server to show the all addresses list. Also, source and destination ip addresses and TCP
headers also at particular time

10.5 Computational Challenges


Using handlers, services and auto updating of data in a single activity was the main computational
challenge in the system as the developer had to do several things in single activity like:
 Detect unusual traffic spikes that might be because of internal or external security attacks
and block that specific traffic

P a g e 68 | 82
 Find problematic endpoints by parameters that are consuming unusually huge bandwidth in
the network, including source IPs, destination IPs, applications, and ports or protocols.
 Integrating Various Modules in one Application: It will be quite challenging to integrate
various modules such as dection, memory, Control Logs, and many more at a single place.

10.6 Learning Experience Gathered


 Learnt a lot from research work: In the preliminary stage of the project, the developer was
quite confused about what features to be included in the system. So, the developer carried
out secondary research by studying the research works of various authors and pointing out
what all mistakes they have done. It helped in gathering intense knowledge about the
subject domain and critically analysing similar systems in terms of their features and
drawbacks. Finally, the developer conducted primary research to gather real time user
requirements.
 Learned to manage stress and time: While working through the different phases of SDLC,
the developer played various roles as follows: analyser, researcher, database and mobile app
developer and tester. This gave the developer the skill to manage both stress and time
efficiently. The developer was able to complete the project within the scheduled time period
overcoming all stresses and time constraints that came during the development phase.
 Gained technical expertise: The implementation of the system required not only to apply
learning outcomes achieved during academics but also a clear understanding of various
mobile technologies. It required studying various books and articles to grab the concepts of
android app development, various services, MySQL database concepts, Web Services etc. It
ultimately helped in widening the technical knowledge and to gain a mastery over different
languages and tools like command prompt , Python script, shell script etc.
 Had an experience of project management: The project gave a wonderful experience and
feeling of working as if in some corporate world. The developer also played a vital role of a
project manager by getting the completed-on time, delivering a quality system, fulfilling user
requirements, using fact finding techniques to collect requirements. Divide and conquer
approach was used to divide the entire project into small tasks and completing them
according to the schedule prepared in the Gantt chart.
 How to resolve errors and learn from them: While implementing the system, the developer
encountered many errors and exceptions which were corrected after applying various
methods. This gave an understanding how to debug and rectify errors using top down
approach. Also, the developer came to know how to find errors and fix them which is very
unique skill needed to deliver an error free system.

P a g e 69 | 82
 Gained lot of confidence: Before implementing the system, the developer was in a dilemma
how to implement the complex modules of the system. But gradually things became easier
after doing research work in each phase of the development which itself paved a pathway to
plan the logic and flow of the entire system. Although it required consistent and sincere
effort, but the developer became assure of one thing that ‘where there is a will, there is a
way’. This learning has motivated the developer to accept greater challenges by strongly
believing that to every problem there is a solution.
Last but not the least, this final year project gave a great learning and pleasant experience of
working on real time projects and created a deep interest in the mobile application development
field which will help in reaping benefits for having a bright career in future.

10.6 Conclusion
 The documentation presents the proposed system’s report, how the system went through
various phases during its development. The developer started with the background study of
the system where he has inferred out the problems faced by a user in today’s environment
in context of booking ticket. The background study phase is followed by the literature review
which is a kind of research to gather knowledge in the current area of study to develop a
successful system.
 The developer has conducted both primary and secondary research. It is concluded that to
gather the desired information about the proposed system, the developer had to go through
various steps. Questionnaire and Interviews are the data gathering techniques that have
been used to identify the need of the target people, the employees within an organization.
Questionnaires have got filled by the staffs/ employees while interviews have been
conducted by the administrators and the highly-authorized persons.
 The analysis of the questionnaire and interviews and focus groups have helped the
developer to have a complete knowledge and understanding of the security measures of an
organization as the users were taken from different industrial sectors. Also, the technical
knowledge has been gained by taking the interview from the software developers and
software designers. Their opinions have been evaluated to get an in-depth knowledge of the
technologies and the databases on the basis of which the developer has decided to use
python script and BlueShell . In this way, the research part for the proposed project has been
completed.
 The developer then continues with the system design part in which the system design is
prepared that includes the logical and physical designs of the system that further categorizes
to UML diagrams, Physical designs of the system, entity relationship diagram etc.

P a g e 70 | 82
 Then comes the implementation phase that covers the implementation approach to be
followed by the developer to implement various modules of the system starting with a
module that has lower priority and moving towards the higher priority modules. Other than
that, a user manual as well as technical manual is provided that guides the user about the
flow of the system and how to use the system and installation instruction respectively.
Then various types of testing have been conducted to test the system and its various
modules . by conducting unit test, integration test, system test and many more.
At last the final project is critically evaluated to come to a conclusion, how the system can
built

P a g e 71 | 82
CHAPTER 11: REFERENCES

1] A practical guide to Bandwidth Management and Optimization Using Open Source Software, in
October 2006
[2] Bandwidth management position paper, (Aptivate, June 2007); How to accelerate your internet
[3] Bo Yu”Based on the network sniffer implement network analyzer Computer Application and
System Modeling (ICCASM), 2010 International Conference on Volume: 7, 2010, Page(s): V7-1 - V7-
[4] Dualwan (2009) Bandwidth Management and Traffic Optimization (2010). http://dualwan.org/
bandwidth-management.html [5]
Flickenger, R. (2006). How to accelerate your Internet: A Practical Guide to Bandwidth Management
and Optimization, Accessed on 20th November, 2010
[6] Graham, Robert. “Sniffing (network wiretap, sniffer) FAQ”. Version 0.3.3. 14 September 2011
[7] Ansari, Rajeev S.G. and Chandrasekhar H.S, “Packet Sniffing: Brief Introduction”, IEEE Potentials,
Dec 2002- Jan 2003, Volume: 21 Issue: 5, pp: 17 – 19
[8] A. Dabir, A. Matrawy, “Bottleneck Analysis of Traffic Monitor Using Wireshark”, 4th International
Conference on Innovations in Information Technology, 2007, IEEE Innovations '07, 18-20 Nov. 2007,
Page(s):158 – 162
[9] A scalable architecture for network traffic Monitor and analysis using free open source software.
[10] S. Floyd and V. Jacobson, Link-sharing and resource management models for packet networks,
IEEE Trans. Networking, vol. 3, 1995.
This academic article was published by The International Institute for Science, Technology and
Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and
Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about
the publisher can be found in the IISTE’s homepage: http://www.iiste.org

11.4 E-Books
NISARG GANDHEWAR, et al. , In-Google Android: An Emerging Software Platform For Mobile
Devices.
In- International Journal on Computer Science and Engineering ((IJCSE). Department of Computer
Science Nagpur University, Chandrapur, pp:1-8
References and Bibliography:
• http://www.bluedart.com/
• http://www.wampserver.com/en/
• http://www.php.net/
• http://www.tutorialspoint.com/mysql/

P a g e 72 | 82
• httpd.apache.org/docs/2.0/misc/tutorials.html

APPENDICES

APPENDIX A: Approved Project Synopsis

APPENDIX B: Turnitin Report

APPENDIX C: 1st Mid-term Evaluation

APPENDIX D: 2nd Mid-term Evaluation

P a g e 73 | 82
P a g e 74 | 82
P a g e 75 | 82
P a g e 76 | 82
P a g e 77 | 82
P a g e 78 | 82
P a g e 79 | 82
P a g e 80 | 82
P a g e 81 | 82
P a g e 82 | 82

You might also like