Professional Documents
Culture Documents
On
Network Analyzer
Bachelor of Technology
in
Computer Science & Engineering
Submitted By
Rishabh Chauhan
2819124
Vikrant Chugh
2819280
CHAPTER 1: INTRODUCTION..................................................................................................
CHAPTER 5: ANALYSIS..............................................................................................................
CHAPTER 7: IMPLEMENTATION............................................................................................
CHAPTER 8: TESTING.................................................................................................................
P a g e 2 | 82
DECLARATION
I hereby declare that the work presented in this project report entitled “Network analyzer
“, in partial fulfilment of the requirement for the award of the degree of Bachelor of
Technology in Computer Science & Engineering., submitted to Kurukshetra University,
Kurukshetra, India is an authentic record of my work carried out during the period from
Sept 2022 to Jan 2022 under the guidance of Ms. Mani, Assistant Professor, CSE
Department.
I hereby declare that this submission is my work and that, to the best of my knowledge
and belief, it contains no material previously published or written by another person nor
material that to a substantial extent has been accepted for the award of any other degree
or diploma of the university or other institute of higher learning, except where due
acknowledgement has been made in the text.
Signature:
Signature:
P a g e 3 | 82
CERTIFICATE
This is to certify that the Project-I report (PROJ–CS-302A) entitled “Network analyzer “done by
2819124/ Rishabh Chauhan, 2819280/ Vikrant chugh, is an authentic work carried out by them at
PIET, Samalkha, Panipat under my guidance. The matter embodied in this project work has not
been submitted earlier for the award of any degree or diploma to the best of my knowledge and
belief.
P a g e 4 | 82
ACKNOWLEDGEMENT
It gives us a great sense of pleasure to present the report of the B. Tech Project undertaken
during B. Tech. Third Year. We owe a special debt of gratitude to Assistant Professor Ms. Mani,
Department of Computer Science & Engineering, PIET, Samalkha for his constant support and
guidance throughout our work. His sincerity, thoroughness and perseverance have been a
constant source of inspiration for us. It is only through his cognizant efforts that our endeavours
have seen the light of the day.
We also take the opportunity to acknowledge the contribution of Professor Dr. S C Gupta, Head,
Department of Computer Science & Engineering, PIET, Samalkha for his full support and
assistance during the development of the project.
We also do not like to miss the opportunity to acknowledge the contribution of all faculty
members of the department for their kind assistance and cooperation during the development of
our project. Last but not the least, we acknowledge our friends for their contribution to the
completion of the project.
Signature:
Signature:
P a g e 5 | 82
ABSTRACT
The system “Network analyzer”deals with NTA solutions can analyze all the entities or devices that
make up your network--whether they are managed or unmanaged. NTA solutions ingest telemetry
from multiple network devices like routers, switches, and firewalls to determine what "normal"
behavior for these devices looks like and how parts of your network are being accessed and by whom.
Everything touches the network, so this visibility extends all the way from headquarters to branch
offices, data centers, roaming users, and smart devices. Whether you are on-premises, in the cloud, or
some combination, NTA solutions can give you much needed visibility and context into what is
happening on your network. Traffic analysis is the process of intercepting and analyzing network
traffic in order to deduce information from communication. The size of the packets exchanged
between two hosts, details of the systems communicating, time and duration of communication are
some of the valuable information to an attacker.
P a g e 6 | 82
CHAPTER 1: INTRODUCTION
Analyzing the stability of a network starts with Monitor its performance, device capabilities, network
speed, and one more aspect that many network admins overlook: network traffic.
Network traffic analysis (NTA) is often the least considered aspect, but it influences many issues, like
performance degradation, and slowness for the users. Neglecting it can give way to security threats.
Network traffic analysis brings many important insights to your bandwidth management. With
extensive traffic data generated from end-to-end network traffic analysis of your network
P a g e 7 | 82
information from communication. The size of the packets exchanged between two hosts, details of
the systems communicating, time and duration of communication are some of the valuable
information to an attacker
For example, if an enterprise's network uses resource-intensive softwares like video streaming and
tele-presence other than through business-critical softwares, the bandwidth capacity for running
business operations will be minimal. This often negatively impacts productivity, affecting all
operations and often eroding revenues. That's a domino effect organizations should avoid.
In the Era of Computer Technology, we need to communicate and accelerate our life with the help of
Information and Technology. We all require certain types of services online, which requires less
workout or interference of human being. phones can help to overcome the trouble of the
customers of standing in queue and book any type of tickets. There is lack of research and
functionalities in the current system as well. We are in such an era today that our most of the work
has been shifted too personal computer. The development and implementation of smart software
which are more effective and simple than the current system. We feel hard to monitor with them
and sometimes it may be lost. The “Network analyzer” can be monitor easily anytime from any place
1.7 The Rational behind the System: Why do we need this System?
This software is develop for an enterprise's network uses resource-intensive softwares so as to
reduce load on resources and bandwidth .
P a g e 8 | 82
1.6.1 Benefits of the System: What are the potential benefits derived?
Upon implemented, the system could bring about significant tangible and intangible benefits:
Tangible Benefits
P a g e 9 | 82
himself.
Maintenance of the software is painless for its user. The
software will need no version updates and hence require
6. Maintainability
no maintenance until the user transforms the settings
accordingly.
Keeping in mind the target audience, the app will be
Ease of learning and designed for the generalized audience and hence will be
7.
Usability. easy to use. The software will be developed keep in mind
the HCIU principles.
Table 1.1: Intangible Benefits
P a g e 10 | 82
business operations will be minimal. This often negatively impacts productivity, affecting all
operations and often eroding revenues. That's a domino effect organizations should avoid.
Mainly this system focus on security and services to the layman so that they can fetch their details
whenever they require it is one of the main motto of this system.
P a g e 11 | 82
Project will be treated as constructive if it is proper evaluation of ip address. The developer
will be able to provide successful implementation of personal computer software in terms of
interactivity, effectiveness and efficiency.
Enhanced Features
Functionality Description
P a g e 12 | 82
Log Primary feature of this toolkit is to record
keystrokes made by the user ip
Functionality Description
1.14 Conclusion
The Chapter 1 includes the background study for the system. Studying the system has inferred the
purpose of the system and goals/ objectives of the system. After the purpose of the system is
identified, the developer then came up with the benefits of the system to its intended end-user and
how the system can benefit its users. The developer then cultivated the desirable features to be
implemented in the proposed system to resolve the problems that were identified in the problem
context section. The chapter has also included the deliverables the system will produce after it is
completed. The limitations for the system have also been identified that limits the scope of the
proposed project.
P a g e 13 | 82
CHAPTER 2: PROBLEM DESCRIPTION
2.1 Current Problem Description
After the analysis of preliminary investigation, the researcher has spotted and identified some of the
main problem areas of the software which are briefly described below:
.
How does Site24x7 network traffic monitor work?
Our network traffic Monitor tool collects flow export data from network devices, organizes them,
and presents actionable insights to users. First, you need to configure your devices that are the flow
exporters to export flows to Site24x7 On-Premise Poller, which is the NetFlow collector. Site24x7 is a
flow analyzer that processes raw data and presents it in intuitive formats for easy interpretation and
understanding.
Machine-to-machine traffic has been the biggest traffic generator of the decade. As a network
administrator, you need a network analyzer tool to keep an eye on your network. Additionally, you
need to track how much traffic is passing through your network. Also, management may want to
know about any bandwidth hog, intrusion, slowness, or unauthorized access.
P a g e 14 | 82
Figure 1.1
Spot peaks, heavy incoming traffic from a particular application, or a port that is clogged
with incomplete processes.
Obtain detailed stats and reports which you can use to quickly fix these issues.
Identify where the traffic is generated in a data center scenario.
Track traffic moving between the main office and branch offices.
Perform custom pings and monitor synthetic tests between branch offices using Site24x7
On-Premise Poller. This will also help you with security analysis, allowing you to detect
changes and anomalies in your network.
Test the quality of network bandwidth and ensure appropriate allocation.
To build this software, the researcher would have to undergo some major challenges during the
development like:
• Synchronization: The primary challenge in developing this project would be implementing the
concepts of web server to track intruder on time and show in log in order to sync with
prompt to fetch the relevant data.
P a g e 15 | 82
2.4.2 Technical Challenge
The challenges that would come on the way of the researcher while working on the technology area
are as follows:
• Shell script: The very first thing that I would like to mention here is the knowledge of
platform. Since, the system is going to be developed on Prompt and I am totally unknown
about this technology, off-course I have started learning it but still, I need to learn many of
shell script for successful development of this project.
• Creating Panels:We will create a panel for the Admin/Host as in form of Prompt . After
tracking, the host can identify the intruder IP and requst send coming and sending through
this network etc.
• Hardware Fragmentation: There are many types of different prompt that run this program . These
prompt have different confriguration and resolutions. Thus, developer must have to perform market
research to find out which handsets are most popular with the target audience and develop for
those first
2.5 Feasibility Study
Feasibility study is an analysis and evaluation of a proposed project to determine if it is feasible
technical, economically, timely and operationally. Feasibility study for the project is conducted to
analyze whether the proposed project is possible/ feasible to be developed within scheduled time,
available resources, within estimated budget. After feasibility study is done, it is evaluated whether
to proceed with the project or not. The feasibility study can be categorized into following four parts:
Technically feasibility
Economic feasibility
Schedule feasibility
Operational feasibility
2.5.1 Technical Feasibility
Technical feasibility is conducted to verify whether the project is feasible to be developed within the
available resources or not. The technical feasible takes into account the technical requirements for
the project, the technical resources required by the project for its successful and efficient
completion. The specific technical resources to be available for completing the project successfully
are given below:
P a g e 16 | 82
Hardware Resources
Software Resources
Resources of Execution
P a g e 17 | 82
associated with the project development. As for any system if the estimated benefits equal or
surpasses the expected costs that is calculated for the system then the project would be
economically feasible. Since the proposed system programming environment is based on which is
an open source platform, so there is less of investment in the development portion. And any
software or program that is produced needs to be tested which can be done without much
investment. Only required investment would be a physical device to test the system.
Schedule feasibility for a project is done to verify whether the project can be completed within
scheduled time or not as decided by the Gantt chart. Dates are fixed for each phase throughout the
project and it is to be ensured that the project is able to complete within the specified dates and the
schedule. If the project is able to be completed within the schedule, the scheduled feasibility is high.
Gantt chart is a project management tool that can be used to measure the scheduled feasibility of
the project. The proposed timeline for the software would consume approximately 38 weeks and
time management for each task is carried out aptly through Gantt chart.
Operational feasibility measures to which extent the proposed system resolves the problems
identified in the starting phase of the project; how the project intends to fulfil the requirements
identified during scope definition and how the system makes use of the opportunities identified
during scope definition. The project will be operationally feasible undoubtedly as the main motive is
to solve the problems of those who face problems in nowadays environment which are faced by
masses.
2.6 Conclusion
Chapter 2 is all about the problems identified in the current area of study i.e. the problems in ticket
environment. The developer has identified all the problems which is generally facing by the general
user. The problems have been documented along with the justification for each problem. After all
P a g e 18 | 82
the problems are identified, the developer’s next task was to provide appropriate solutions to
resolve the problems. For the same purpose, the solution corresponding to each problem has been
documented along with the justification. A feasibility study is then conducted for the system to
ensure that the proposed system is technically, operationally, economically feasible and can be
completed within a specified time frame. The feasibility study is successful, creating a further path
for the developer to move ahead with the project.
P a g e 19 | 82
CHAPTER 3: LITERATURE REVIEW
In order to fully comprehend the benefits of network traffic analysis for general users and the
genuine demand for it, the developer first did academic study by reading research papers, journals,
and other materials before constructing the proposed system. how the users will find it useful.
Additionally, it will assist the developer in enhancing the system's features.
P a g e 20 | 82
3.3.3 Python Scripting for Network
Python is necessary for network programming. Python's standard library fully supports network
protocols, data encoding and decoding, and other networking principles, and writing network
programmes in Python is easier than in C++. In the first example, programmers can use and access
the operating system's fundamental socket support using Python's libraries, and programmers can
design both connection-less and connection-oriented protocols.High-level access given by Python
libraries can also be used to access application-level network protocols. HTTP, FTP, and other
protocols fall within this category.
P a g e 21 | 82
Python GUI Programming - A Complete Reference Guide
By Alan D. Moore, B. M. Harwani (2019)
Python Object-Oriented Programming 4th Edition
Features of OOPS
By Steven F. Lott, Dusty Phillips(2021)
Table 3.1 Books References for Academic Research
Journals
Domain research is required as the project domain varies from case to case. Once this is done for a
particular module, the analysis can be tackled and the design of that particular module is easier to
use. During the research phase, researchers acknowledged that there are enough problems users
face in the ticket-purchasing environment. The application domain area focuses on Desktop or
Computer-based application and networking concepts. In order to fully understand user
requirements and key aspects of the system, researchers need to implement technologies that
mitigate the problems faced for handling requests by router.
3.4.1 Python
Python is commonly used for developing websites and software, task automation, data analysis, and
data visualization. Since it's relatively easy to learn, Python has been adopted by many non-
programmers such as accountants and scientists, for a variety of everyday tasks, like organizing
finances.
P a g e 22 | 82
A script is used to automate certain tasks in a program. It can run by itself and it is less code
intensive whereas modules in python is referred as a library which can not run by its own. It needs to
get imported in order to use it.
Python uses an interpreter to translate and run its code and that's why it's called a scripting
language.
A Python script normally can be full of functions that can be imported as a library of functions in
other scripts, or a python script can be a command that runs in Rhino.
There is a way to have Python definitions be both a library of functions and a direct command.
Figure 3.1
P a g e 23 | 82
Fig 3.2: Structure of a Packet
1. Monitoring IPs
2. Info about Packets
3. Filtering Packets Type
4. Live Packet Monitoring
5. Saving the Data
6. Light weight aplication
Table 3:Qualitative Analysis for Users
P a g e 24 | 82
3.7 Critical Evaluation of Literature Review
The evolution of the proposed system for the user is studied to conclude what features the end user
needs to improve the Network Monitoring tool. The review of the literature lays the groundwork for
further investigations that give an idea of the proposed system. Systems similar to the proposed
system were studied to establish a baseline for the system; What problems can developers have,
what features cannot be implemented in?
During the literature review, technical, academic and domain research was conducted to gain a deep
understanding of the features to be implemented in the proposed system and to examine them
implement technology. used in system implementation. Therefore, desk research will be conducted
as part of a literature review examining the work of others that will lead the developer to develop
the proposed system.
3.10 Conclusion
Chapter 3 includes review the literature of the past to establish a baseline for the proposed project.
Under literature review, existing systems have been studied to gather knowledge in the area of the
study; what features are new in the market and what all features the developer can integrate into
P a g e 25 | 82
his new system. The chapter also includes the information and resources that are a part of the
literature review and are studies or will be studied in future to collect the data and information
about the area of study.
P a g e 26 | 82
CHAPTER 4: RESEARCH METHODS
4.1.1 Primary Research
Primary research is defined as collecting data or the information about the domain of the study from
the real world directly, for the very first time about a given subject directly from the real world. It is
done to remove the confusion and ambiguity that came in the mind of the developer after
performing secondary research by actually asking such questions directly to the forum users and
considering their suggestions. The developer can use this research to move further in the
development of the project. The primary research methods used by the developer are questionnaire
and interview which are described below:
4.1.2 Questionnaire
A questionnaire consists of a series of questions printed on paper in a specific order to quickly elicit
the desired information from the target audience. Respondents are required to read and understand
the question and write their response in the space provided. Because the user is the type of user of
the proposed system. Developers distribute surveys among them.
Reasons for Conducting Surveys:
We chose surveys as our primary data collection method for the following reasons:
Questionnaires make it possible to reach the mass at the same time, regardless of their
geological location, taking less time and making maps more accurate.
Since the target users of the system are quite large in number, and it is impossible to reach
out to each of them individually to collect their requirements and suggestions.
Since, the statistical techniques can be applied to it the analysis of questionnaire is efficient
which is done in the terms of graphs and charts which are more accurate.
Users are free to answer questions anonymously, so there are more chances of obtaining
exact requirements.
It’s a cost-effective approach, as it can be emailed to the participants or be distributed as
paper-based questionnaire.
QUESTIONNAIRE
P a g e 27 | 82
Respected Sir/Mam,
First of all, we thank you for being a part of our survey. This survey asks about your experiences
using our network monitor to keep track of activities over your network.
The researcher is a final year student of Panipat Institute of Engineering & Technology, Panipat
pursuing B Tech in the stream of Computer Science. For primary research work and gathering data is
done by survey for final year project. Researcher is kindly requesting you to spare a few minutes to
go through the questions and help us to complete this survey by filling these below questions.
Questions have been carefully designed by following all the ethical guidelines for the research work
of the Kurukshetra University. The title of the project is “Network Traffic Monitor”. The purpose of
this survey is to find out the problems faced by the user while monitoring the network.
This survey will help the developer to know the various preferences of the user and to modify the
currently available system. The results of this evaluation will be very useful in getting necessary
details for developing an application.
Instruction
This questionnaire sections will help the researcher to estimate about the project research
deliverables. It is important that you answer all applicable questions thoroughly.
Section A: - This section is optional and comprises of your personal and professional details.
Section B: - Check the most suitable options from the questions below, you may check more than
one option based on the requirements.
Section C: - Feel free to share your views/ suggestions and help researcher to understand the basic
requirements.
Disclaimer
Your response to this survey or any particular question is completely confidential. Your identity will
not be revealed and the data here obtained will only be used for statistical purposes only.
SECTION A
Age
Gender
P a g e 28 | 82
Profession _____________________________
Qualification _____________________________
SECTION B
Question 1 Do you own a Laptop/Computer?
Justification This question will help the researcher to analyze the availability of computers among
the target audience so that the researcher can analyze the target audience app with an
ease.
If yes, then
Justification The analysis of above question will help researcher to analyze and whether to
implement some libraries input to fully utilize features of application.
Question 4 How would you like to monitor traffic, reason you preferred this?
CLI GUI
Fast packet transition Slow packet transition
Justification This question will help researcher to know about the requirements and desires of user.
SECTION C
Additional Requirement:
___________________________________________________________________________
____________________________________________________________________________
___________________________________________________________________________
____________________________________________________________________________
P a g e 29 | 82
Any Suggestion:
___________________________________________________________________________________
___________________________________________________________________________________
______________________________________________________________
____________________________________________________________________________
Table 4.3
Thank you for your cooperation and for providing the valuable information. Your concern and your
help are highly appreciated. Please ensure once, whether you answered every question in the
questionnaire or not. After fully completion of the questionnaire kindly deposit or submit this
questionnaire to the researcher.
Questionnaire for Developer
QUESTIONNAIRE
A STUDY TO ANALYZE HOW TO ENHANCE ONLINE BOOK TICKETING AT THE RAILWAY
ENVIRONMENT BY THE DEVELOPER USING ANDROID DEVICE
Respected Sir/Mam,
First of all, we thank you for being a part of our survey. This survey asks about your experiences
using our network monitor to keep track of activities over your network.
The researcher is a final year student of Panipat Institute of Engineering & Technology, Panipat
pursuing B Tech in the stream of Computer Science. For primary research work and gathering data is
done by survey for final year project. Researcher is kindly requesting you to spare a few minutes to
go through the questions and help us to complete this survey by filling these below questions.
Questions have been carefully designed by following all the ethical guidelines for the research work
of the Kurukshetra University. The title of the project is “Network Traffic Monitor”. The purpose of
this survey is to find out the problems faced by the user while monitoring the network.
This survey will help the developer to know the various preferences of the user and to modify the
currently available system. The results of this evaluation will be very useful in getting necessary
details for developing an application.
Instruction
This questionnaire sections will help the researcher to estimate about the project research
deliverables. It is important that you answer all applicable questions thoroughly.
Section A: - This section is optional and comprises of your personal and professional details.
Section B: - Check the most suitable options from the questions below, you may check more than
one option based on the requirements.
Section C: - Feel free to share your views/ suggestions and help researcher to understand the basic
P a g e 30 | 82
requirements.
Disclaimer
Your response to this survey or any particular question is completely confidential. Your identity will
not be revealed and the data here obtained will only be used for statistical purposes only.
SECTION A
Age
Gender
Profession _____________________________
Qualification _____________________________
Table 4.4
Question 1 Do you own a Laptop/Computer?
Justification This question will help the researcher to analyze the availability of computers among
the target audience so that the researcher can analyze the target audience app with
an ease.
If yes, then
Justification The analysis of above question will help researcher to analyze and whether to
implement some libraries input to fully utilize features of application.
Question 4 How would you like to monitor traffic, reason you preferred this?
CLI GUI
Fast packet transition Slow packet transition
Justification This question will help researcher to know about the requirements and desires of
user.
Question 5 What type of traffic report format would be suitable for you?
P a g e 31 | 82
Question 6 Do you want to back up your data?
Yes No
Question 7 What are the basic information, that you need to include for ticket booking?
Packet Size
Packet Number
Packet Type
Protocol Information
Source IP address
Destination IP address
Payload Data
Justification This will give an idea to the developer about what are the data to be fetched for a
particular module
Table 4.5 Questionnaire for Developer
Thank you for your cooperation and for providing the valuable information. Your concern and your
help are highly appreciated. Please ensure once, whether you answered every question in the
questionnaire or not. After fully completion of the questionnaire kindly deposit or submit this
questionnaire to the researcher.
4.1.3 Interview
An interview is a type of primary research method in which a set of questions is pre-planned and
presented face-to-face to the respondent. Questions are basically open. Used to compile detailed
information about a topic. For the proposed system, these questions were asked in interviews, and
the answers require a little elaboration to understand the requirements. The respondents of the
P a g e 32 | 82
proposed system are developers. The aim was to get an exclusive view of the user in order to gather
maximum information about system requirements.
Justification for Conducting Interview
The reason for choosing interview as a primary research method is as follows:
It provides first-hand information so more chances of getting actual facts and quality rich
data, new insights and conclusions.
It will help in gathering detailed information about the functionalities of the propose system
as it is best for investigating problems.
Apart from what they say, a person’s feelings, thoughts, gestures can be noticed which can
enable the interviewer to confirm that what they discuss is right or wrong.
Interview Questions for Developers
1. Which type of System would you like to use for Network Monitoring and why?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________
Justification: This will help the developer to know the mindset of the user whether the user
wants to run with the technology or just want to remain where he/she is. If the user replies
mobile application, then most of the questions marked by him/her will be valuable.
2. What do you use to store the data on the web? What will happen if the data will be lost?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________
Justification: This question will help researcher to understand the need of the cloud to save
the data online
3. Do you think that Network Monitoring of the system will be going to help you if yes please
specify how?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
P a g e 33 | 82
_____________________________________________________________________
Justification: This question will explain how this system is going to be useful for you. so, that it
is clear how it will helpful.
4. What is the probable problems that can come during the development phase of the
application?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________
Justification: The developer wants to know if there are any probable chances of errors or
mishaps that could come in the way of development. If there are any technology, chances
that has currently occurred which could hamper the ongoing development procedures.
5. Have there been any problems with the software? If yes, describe problems?
_____________________________________________________________________________
_____________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________
Justification: Its response will help to understand the problems faced by the retailers in the
existing software, so that those problems can be eliminated in the proposed system.
P a g e 34 | 82
system, as this is an important factor that can affect the implementation of the project. Extensive
research is conducted comparing and evaluating different platforms, programming languages,
databases, technologies, and methodologies to arrive at a conclusion that will be selected for the
proposed project.
Justification for Choosing Windows as a Platform
The decision of choosing one platform over other has always been a difficult task for the developer.
Each platform has its own pros and cons so it is inadequate to say that one platform is better than
other ones. Let’s see why Windows has been chosen over other OS platforms.
What is Windows?
Windows is a graphical operating system developed by Microsoft. Users can provide ways to view
and store files, run software, play games, watch videos, and connect to the Internet. It was released
for both home computers and professional work.
Microsoft introduced the first version as 1.0. It was released on November 10, 1983 for both home
computing and professional features of Windows. It has since been released for many versions of
Windows, not just the current version of Windows 10.
In 1993, the first commercial version of Windows was released, known as Windows NT 3.1. Later
versions Windows 3.5, 4/0 and Windows 2000 were introduced. When Microsoft released his
Windows XP in 2001, the company designed different versions for personal and business use.
Developed based on standard x86 hardware such as Intel and AMD processors. Therefore, it can run
on different brands of hardware. B. HP, Dell, and Sony computers, including home-built PCs.
Why Windows?
Microsoft Windows is definitely the most popular choice when it comes to computer operating
systems. According to StatCounter in May 2018, his 81.73% of all computer users were running some
version of Windows. Yes, more than 80% of his computer users. Clearly they are doing the right
thing. But what exactly is it about Windows that attracts so many users? Let's look at some factors.
P a g e 35 | 82
Figure 4.1
Better Application: Applications available for Windows tend to have superior features
compared to other platforms. I'm not saying Windows has the best software, because there
are actually some very well-designed programs designed for other platforms. But when you
look at the big picture, Windows-based applications stand out from the rest.
This example is Microsoft Office. It's available for both Windows and Mac users, but the
Windows experience is much better than the Mac version. Given the ubiquity of Microsoft
Office in the productivity arena, that alone is reason enough for businesses to choose
Windows over other operating systems.
Popular: The usage statistics speak for themselves regarding how popular Windows is. With
Windows being more familiar to people than any other operating system, it makes sense for
organizations to choose the option that will require less training and that users would be
more comfortable with using. Almost every computer user has used Windows at some point
but the opposite is not necessarily true.It also makes collaboration and compatibility with
other organizations run smoother. In the marketplace, Windows is the dominant operating
system. If a business wants to remain compatible with its partners and stakeholders, it must
be on the same platform.Partnerships and deals don't require the hassle of incompatible
files or mismatched features.
More Softwares: Arguably, Windows has software for the broadest range of platforms than
any other operating system. This has the advantage of giving users a wider range of options
to choose from. This creates a healthy "competition" for users and forces software
P a g e 36 | 82
developers to push the boundaries to create the best possible programs. Anything less than
best leads the user to select the next program on the list. This alone has an amazing effect
on motivating software developers to provide better solutions that meet their users' needs.
For less common operating systems, fewer software options are available to the user. This
limited choice also means that users only need to select the option with the highest
performance. Lack of competitive software development elements can lead to lazy
developers. Users are forced to use inferior products simply because there are no better
alternatives.
Justification for programming language selection (Python)
Python provides two levels of access to network services. At a low level, you have access to the
underlying socket support of the underlying operating system. This allows you to implement clients
and servers for both connection-oriented and connectionless protocols.
Python also has libraries that provide higher-level access to certain application-level network
protocols such as FTP, HTTP, etc.
1. It is easy to learn and read.
2. It is perfect for scripting tasks which is perfect for network automation.
3. Network vendors, especially Cisco have adopted Python as the language of choice.
4. Lots of network automation tools are written in Python.
5. Cisco already embed a Python shell in many switches.
6. Networks are getting bigger but IT teams are not, we need to find better ways to do more
with less.
7. Stand out from the crowd and improve your career prospects.
8. Python also has a great community, as one of the most popular programming languages in
use today, it is very easy to find a solution to your problems.
9. Python is already installed on Linux & MacOS and is now available on a lot of Networking
devices.
P a g e 37 | 82
early concept stages when changes are easier and less expensive.
It is essentially an ad hoc method of software maintenance.
It is a firefighting strategy that involves waiting for the issue to arise before attempting to
address it as soon as possible.
This model's primary goal is to pinpoint the issue and then find a quick solution.
In this model, changes are made as early as possible at the code level without accepting
potential future issues.
This model is a method for changing the software code without giving much thought to how
doing so would affect the overall architecture of the software system.
This model causes the software's structure to degrade quickly.
This methodology has following phase that developer will pursue while developing the system.
Code and fixes are very useful for technology-driven solutions in the early stages of
development. B. For technical activities, including research and development (R&D). For
example, an individual working on a machine learning-related research program where
project outcomes are uncertain and unpredictable may well meet their needs with this
model.
Additionally, software developers like to use this model when learning new technologies and
development tools. This allows you to quickly acquire enough expertise to contribute to
future development efforts. Additionally, this model allows engineers to shrink their thinking
space and focus only on what is most relevant to their work. This allows you to temporarily
forget about technology and product failures and focus on building what matters most in the
moment.
P a g e 38 | 82
The code and fix methodology is sometimes seen as a time saver and is a viable option for
low budget products. This is very common in software groups with many entry-level
engineers interested in experimenting, observing, and learning to improve their
programming skills. An example of this would be an individual or group project in a
university-level computer science program. In this case, students are given assignments to
practice basic aspects of the course.
Some software developers may enjoy their jobs because they are given complete autonomy
over the development process without formal direction from senior management. In this
environment, engineers typically control a project's build flow, scope, implementation
details, technology stack, and development tools, and there is no compulsory software
delivery structure. In a way, this can inspire creativity in engineers. The code-and-fix model is
also suitable for single contributors, skilled software engineers working independently on
specific technical aspects of the software, mainly problems that are difficult to solve and
require a lot of trial and error.
Justification for choosing Code & Fix-Model
After some discussion, the developer chooses Waterfall Model for the development of this system.
The most attractive factor for selection of V-Model is-
The key advantage is that it does its work cheaply and promptly.
Users do not always wait for an extended period of time. Rather, they want the changed
software supplied to them as soon as possible. As a result, the software maintenance team
must employ a quick-fix model in order to avoid the time-consuming Software maintenance
life cycle procedure.
This strategy is also useful when the software system must be maintained within strict
deadlines and with limited resources.
4.3 Conclusion
The fourth chapter is all about research methods. The researcher did primary and secondary
research, as well as technical study, to reach a final decision about user requirements, technologies,
and tools to be used. The developer used a variety of research approaches, including questionnaires
and interviews. The investigation was required to avoid wasting time later in the development
process. The researcher is now fairly certain of the system's characteristics and how to resolve
existing issues. After conducting extensive study on domain, technology, language, tools, and so on,
the developer is confident enough to create the suggested programme.
CHAPTER 5: ANALYSIS
SYSTEM ANALYSIS
P a g e 39 | 82
INTRODUCTION TO SYSTEM ANALYSIS
Existing System
In the existing system the exams are done only manually but in proposed system we have to
computerize the exams using this application.
Lack of security of data.
More man power.
Time consuming.
Consumes large volume of pare work.
Needs manual calculations
No direct role for the higher officials
Proposed System
The aim of proposed system is to develop a system of improved facilities. The proposed system can
P a g e 40 | 82
overcome all the limitations of the existing system. The system provides proper security and reduces
the manual work.
Security of data. Ensure data accuracy's.
Proper control of the higher officials.
Minimize manual data entry.
Minimum time needed for the various processing.
Greater efficiency.
Better service.
User friendliness and interactive.
Minimum time required.
FEASIBILITY STUDY
Feasibility study is made to see if the project on completion will serve the purpose of the
organization for the amount of work, effort and the time that spend on it. Feasibility study lets the
developer foresee the future of the project and the usefulness. A feasibility study of a system
proposal is according to its workability, which is the impact on the organization, ability to meet their
user needs and effective use of resources. Thus when a new application is proposed it normally goes
through a feasibility study .The document provide the feasibility of the project that is being designed
and lists various areas that were considered very carefully during the feasibility study of this project
such as Technical, Economic and Operational feasibilities. The following are its features:
TECHNICAL FEASIBILITY
The system must be evaluated from the technical point of view first. The assessment of this
feasibility must be based on an outline design of the system requirement in the terms of input,
output, programs and procedures. Having identified an outline system, the investigation must go on
to suggest the type of equipment, required method developing the system, of running the system
once it has been designed.
The project should be developed such that the necessary functions and performance are achieved
within the constraints. The project is developed within latest technology. Through the technology
may become obsolete after some period of time, due to the fact that never version of same software
supports older versions, the system may still be used. So there are minimal constraints involved with
this project. The system has been developed using Java the project is technically feasible for
development.
ECONOMIC FEASIBILITY
The developing system must be justified by cost and benefit. Criteria to ensure that effort is
concentrated on project, which will give best, return at the earliest. One of the factors, which affect
the development of a new system, is the cost it would require.
The following are some of the important financial questions asked during preliminary investigation:
P a g e 41 | 82
The costs conduct a full system investigation.
The cost of the hardware and software.
The benefits in the form of reduced costs or fewer costly errors.
Since the system is developed as part of project work, there is no manual cost to spend for the
proposed system. Also all the resources are already available, it give an indication of the system is
economically possible for development.
Web traffic can be analyzed by viewing the traffic statistics found in the web server log file, an
automatically-generated list of all the pages served. A hit is generated when any file is served. The
page itself is considered a file, but images are also files, thus a page with 5 images could generate 6
hits (the 5 images and the page itself). A page view is generated when a visitor requests any page
within the web site - a visitor will always generate at least one page view (the main page) but could
generate many more.. Web Traffic Analyzer is aimed towards the vendors who want to reach out to
the maximum cross-section of customer and common people who can be potential customer. This
project envisages bridging the gap between the seller, the retailer and the customer. Web Traffic
Analyzer should be user friendly, quick to learn' and reliable software for the above purpose. OSM is
intended to be a stand-alone product and should not depend on the availability of other software. It
should run on both UNIX and Windows based platform.
Web traffic is the amount of data sent and received by visitors to a web site. It is a large portion of
Internet traffic. This is determined by the number of visitors and the number of pages they visit.
Sites monitor the incoming and outgoing traffic to see which parts or pages of their site are popular
and if there are any apparent trends, such as one specific page being viewed mostly by people in a
particular country. There are many ways to monitor this traffic and the gathered data is used to help
structure sites, highlight security problems or indicate a potential lack of bandwidth – not all web
traffic is welcome. Some companies offer advertising schemes that, in return for increased web
traffic (visitors), pay for screen space on the site. Sites also often aim to increase their web traffic
through inclusion on search engines and through Search engine optimization.
P a g e 42 | 82
6.1 Introduction
The design phase starts when the developer is done with the research and analysis phase. The
design phase includes the transformation of user’s specifications and software components into the
software interface to build a platform for establishing the system. It covers the building of blue prints
of the system that include physical modelling using software engineering tools and methods.
In the design phase for the proposed system, the design is taking the requirements as the input and
will produce a guideline for the implementation as output. Three to four design elements are to be
produced for each and every module after completing the research and analysis part which will be
fed as input to the design.
Figure 6.1
P a g e 43 | 82
Figure 6.2
Model View Controller or MVC as it is popularly called, is a software design pattern for developing
web applications. A Model Visw Controller pattern is made up of the following three parts
• Model - The lowest level of the pattern which is responsible for maintaining data
• View - This is responsible for displaying all or a portion of the data to the user
• Controller - Software Code that controls the interactions between the model and
View MVC is popular as it isolates the application logic from the user interface layer and supports
separation of concerns. Here the Controller receives all requests for the application and then works
with the Model to prepare any data needed by the view. The View then uses the data prepared by
the Controller to generate a final presentable response. The MVC abstraction can be graphically
represented as follows
P a g e 44 | 82
Figure 6.3
Usecase Diagram for Web Traffic Monitor
Figure 6.4
P a g e 45 | 82
DataFlow Diagram Level 1
Figure 6.5
Figure 6.6
P a g e 46 | 82
ER Diagram For The Project
Figure 6.7
Identification of Need
The old manual system was suffering from a series of drawbacks. Since whole of the system was to
be maintained with hands the process of keeping, maintaining and retrieving the information was
very tedious and lengthy. The records were never used to be in a systematic order. there used to be
lots of difficulties in associating any particular transaction with a particular context. If any
information was to be found it was required to go through the different registers, documents there
would never exist anything like report generation. There would always be unnecessary consumption
of time while entering records and retrieving records. One more problem was that it was very
difficult to find errors while entering the records. Once the records were entered it was very difficult
to update these records. In present, work done in the electricity board is performed manually which
is a great headache for the department .The reason behind it is that there is lot of information to be
maintained and have to be kept in mind while running the business .For this reason we have
provided features Present system is partially automated (computerized), actually existing system is
quite laborious as one has to enter same information at three different places.
P a g e 47 | 82
Figure 6.7
P a g e 48 | 82
Figure 6.8
Data Dictionary
This is normally represented as the data about data. It is also termed as metadata some times which
gives the data about the data stored in the database. It defines each data term encountered during
the analysis and design of a new system. Data elements can describe files or the processes.
P a g e 49 | 82
Figure 6.9
.
Figure 6.10
P a g e 50 | 82
Figure 6.11
Figure 6.12
P a g e 51 | 82
Following are some rules, which defines the construction of data dictionary entries:
1. Words should be defined to understand for what they need and not the variable need by which
they may be described in the program.
2. Each word must be unique. We cannot have two definition of the same client.
3. Aliases or synonyms are allowed when two or more enters shows the same meaning. For example
a vendor number may also be called as customer number.
4. A self-defining word should not be decomposed. It means that the reduction of any information in
to subpart should be done only if it is really required that is it is not easy to understand directly.
Data dictionary includes information such as the number of records in file, the frequency a process
will run, security factor like pass word which user must enter to get excess to the information.
P a g e 52 | 82
CHAPTER 7: IMPLEMENTATION
Figure 7.1
Figure 7.2
P a g e 53 | 82
Figure 7.3
Figure 7.4
P a g e 54 | 82
Figure 7.5
Figure 7.6
P a g e 55 | 82
Outputs:
Figure 7.7
Figure 7.8
P a g e 56 | 82
Packets information displayed as the program runs:
Figure 7.9
Figure 7.10
P a g e 57 | 82
CHAPTER 8: TESTING
“... we have as many testers as we have developers. And testers spend all their time testing, and
developers spend half their time testing. We're more of a testing, a quality software organization
than we're a software organization.” – Bill Gates
(Information Week 2002)
8.1 Introduction
Testing is the process of exercising software with the intent of finding and correcting errors. The
objective of the testing is to uncover different classes of errors and to do so with a minimum amount
of time and effort. In order to provide highly acceptable and error free system, the system should
have to face the testing procedure and evaluation of each and every module and functionality.
(Mustafa & Khan, 2007)
P a g e 58 | 82
8.3.1 Type of Testing
Integration Testing
System Testing
Compatibility Testing
Testing
User Acceptance Testing
Usability Testing
GUI Testing
Documentation Testing
Table 8.1 Type of Testing
Testing
S. No Requirement
Technique
Testing of individual software component or modules of the
system. This type of testing is performed by the developers only
1. Unit Testing because it requires detailed knowledge of the internal program
design and code. It includes performing black box and white box
testing.
Testing of integration modules to verify combined functionality
Integration after integration. Various modules are integrated together and then
2.
Testing tested by the developer of the system to check whether the
modules work properly after integration.
Entire system is tested by the developer as per the requirements.
All the modules of the system are combined and check whether
3. System Testing
they work perfectly after being integrated into one system as a
whole.
4. Compatibility Compatibility testing is used to determine if the system causes any
Testing issues related to how it function in concern with the operating
P a g e 59 | 82
system and different type of system hardware and software. The
developer performs this type of testing on various hardware/
software platform to test the compatibility of the system on each
platform.
The testing is to be done to verify the design of the system whether
5. GUI Testing it satisfies the six predefined HCIU design principle and whether the
system is user friendly.
The purpose of doing a usability test is to determine whether a
product or document works with its intended users or readers. This
6. Usability Testing is to be done by evaluating a product through observing the real
people actually working on or using it so as to improve or enhance
the system. The end- users execute the system to test it
User Acceptance Testing tests that the system satisfies all the
essential user requirements and is performing to the acceptable
User Acceptance
7. level as expected by the customer. This is done by defining a set of
Testing
acceptance criteria which the system must satisfy before the
customer will accept it.
Documentation Documentation Testing is to be done to verify the system
8.
Testing documentation whether it is meaningful and user friendly or not.
Table 8.2 Testing Description
P a g e 60 | 82
4. Compatibility Testing 1 Sept 2019 5 Sept 2022
5. GUI Testing 6 Sept 2022 10th Sept 2022
6. Usability Testing 12th Sept 2022 22th Sept 2022
7. User Acceptance Testing 23th Sept 2022 27th Sept 2022
8. Documentation Testing 1 Oct2022 8th Oct 2022
Table 8.3 Testing Duration
P a g e 61 | 82
8.9.1 Justification for unit Testing
For the system produced named An Intelligent Railway Ticket Checker each module is tested and its
corresponding test case is produced. Therefore, individual test cases are produced for all the
modules. Unit testing is performed at the primary level for the system because for example if book
ticket functionality and scan ticket module are integrated before they are tested and a bug occurs, it
will be difficult to figure out which module the bug has occurred. Therefore, it will be useful to test
book ticket module after it is completed and scan ticket module separately after its completion to
figure out and remove the bugs easily.
(www.softwareTestingSoftware.com 2017)
Black Box Testing, also known as Functional Testing, is a software testing technique that exposes
only the functionalities and the design of the system; hiding the internal implementation/ structure
of the system. The internal code or the structure is not known to the user who is going to use the
system.
Justification for Black Box Testing
The testing is to be performed by the developer of the system but testing the functionalities of the
system and not going into the code of the system
P a g e 62 | 82
e. Modifications done for the errors found during testing.
f. Prepared the test result scripts.
The unit testing done included the testing of the following items:
1. Functionality of the entire module/forms.
2. Validations for user input.
3. Checking of the Coding standards to be maintained during coding.
4. Testing the module with all the possible test data.
5. Testing of the functionality involving all type of calculations etc.
6. Commenting standard in the source files.
After completing the Unit testing of all the modules, the whole system is integrated with all its
dependencies in that module. While System Integration, We integrated the modules one by one and
tested the system at each step. This helped in reduction of errors at the time of the system testing.
The steps involved during System testing are as follows:
Integration of all the modules/forms in the system.
Preparation of the possible test data with all the validation checks.
The System Testing done included the testing of the following items:
1. Functionality of the entire system as a whole.
2. User Interface of the system.
3. Testing the dependent modules together with all the possible test data scripts.
4. Verification and Validation testing.
5. Testing the reports with all its function ability.
After the completion of system testing, the next following phase was the
Acceptance Testing. Clients at their end did this and accepted the system with appreciation. Thus,
we reached the final phase of the project delivery.
There are other six tests, which fall under special category. They are described below:
Peak Load Test: It determines whether the system will handle the volume of activities that
occur when the system is at the peak of its processing demand. For example, test the system
by activating all terminals at the same time.
Storage Testing: It determines the capacity of the system to store transaction data on a disk
or in other files.
P a g e 63 | 82
Performance Time Testing: it determines the length of time system used by the system to
process transaction data. This test is conducted prior to implementation to determine how
long it takes to get a response to an inquiry, make a backup copy of a file, or send a
transmission and get a response.
Recovery Testing: This testing determines the ability of user to recover data or re-start
system after failure. For example, load backup copy of data and resume processing without
data or integrity loss.
Human Factors Testing: It determines how users will use the system when processing data
or preparing reports.
P a g e 64 | 82
CHAPTER 9: CRITICAL EVALUATION
1. Fast Processing ü ×
2. Machine independent ü ×
3. Best in UI ü ü
4. Apply Algo easily ü ×
5. Disk space (250MB) ü ü
6. Free ü ×
7. Open source ü ü
8. Best Price × ü
9. Alert × ü
10. Getting location from × ü
GPS
11. All header detected ü ×
P a g e 65 | 82
12. Easy to use ü ×
Table 9.1 Comparison with Another System
P a g e 66 | 82
9.3.3 Critical Appraisal
The developer has tried to impose all the proposed functionalities into the developed software. The
proposed requirements have successfully been mapped into real world system. Now, after the end
of implementation and testing phase, a security efficient app is ready to be deployed. There were
many setbacks during the development of system.
Analyzing the stability of a network starts with Monitor its performance, device capabilities, network
speed, and one more aspect that many network admins overlook: network traffic.
Network traffic analysis (NTA) is often the least considered aspect, but it influences many issues, like
performance degradation, and slowness for the users. Neglecting it can give way to security threats.
For example, if an enterprise's network uses resource-intensive applications like video streaming and
tele-presence other than through business-critical applications, the bandwidth capacity for running
business operations will be minimal. This often negatively impacts productivity, affecting all
operations and often eroding revenues. That's a domino effect organizations should avoid.
P a g e 67 | 82
CHAPTER 10: CONCLUSION
10.1 Success Criteria
The proposed system named “An Intelligent Railway Ticket Checker Application” has proved to be
significantly useful for the end-user as it meets all the requirement of the user as well as fulfils the
entire criterion that judge the quality and success of the system. The success for the proposed
system is achieved as it has met the success criteria and established what it was supposed to. The
system has resolved the issues that were discussed in the chapter 2 regarding the problems raised
and the solutions provided. The proposed system after evaluation has been found to successfully
guarantee the booking and checking at the real-time environment to the end- user and hence has
solved the problem what was expected.
10.4 What would have been done if given time to redo the project?
If the developer is provided a second chance to make this project then he would certainly make this
project a better one.
Implement of all the features in command prompt: If the developer gets a chance then
developer will implement all features in mobile.
Connect with WI FI server and Blueshell: The developer would like to connect with WI FI
server to show the all addresses list. Also, source and destination ip addresses and TCP
headers also at particular time
P a g e 68 | 82
Find problematic endpoints by parameters that are consuming unusually huge bandwidth in
the network, including source IPs, destination IPs, applications, and ports or protocols.
Integrating Various Modules in one Application: It will be quite challenging to integrate
various modules such as dection, memory, Control Logs, and many more at a single place.
P a g e 69 | 82
Gained lot of confidence: Before implementing the system, the developer was in a dilemma
how to implement the complex modules of the system. But gradually things became easier
after doing research work in each phase of the development which itself paved a pathway to
plan the logic and flow of the entire system. Although it required consistent and sincere
effort, but the developer became assure of one thing that ‘where there is a will, there is a
way’. This learning has motivated the developer to accept greater challenges by strongly
believing that to every problem there is a solution.
Last but not the least, this final year project gave a great learning and pleasant experience of
working on real time projects and created a deep interest in the mobile application development
field which will help in reaping benefits for having a bright career in future.
10.6 Conclusion
The documentation presents the proposed system’s report, how the system went through
various phases during its development. The developer started with the background study of
the system where he has inferred out the problems faced by a user in today’s environment
in context of booking ticket. The background study phase is followed by the literature review
which is a kind of research to gather knowledge in the current area of study to develop a
successful system.
The developer has conducted both primary and secondary research. It is concluded that to
gather the desired information about the proposed system, the developer had to go through
various steps. Questionnaire and Interviews are the data gathering techniques that have
been used to identify the need of the target people, the employees within an organization.
Questionnaires have got filled by the staffs/ employees while interviews have been
conducted by the administrators and the highly-authorized persons.
The analysis of the questionnaire and interviews and focus groups have helped the
developer to have a complete knowledge and understanding of the security measures of an
organization as the users were taken from different industrial sectors. Also, the technical
knowledge has been gained by taking the interview from the software developers and
software designers. Their opinions have been evaluated to get an in-depth knowledge of the
technologies and the databases on the basis of which the developer has decided to use
python script and BlueShell . In this way, the research part for the proposed project has been
completed.
The developer then continues with the system design part in which the system design is
prepared that includes the logical and physical designs of the system that further categorizes
to UML diagrams, Physical designs of the system, entity relationship diagram etc.
P a g e 70 | 82
Then comes the implementation phase that covers the implementation approach to be
followed by the developer to implement various modules of the system starting with a
module that has lower priority and moving towards the higher priority modules. Other than
that, a user manual as well as technical manual is provided that guides the user about the
flow of the system and how to use the system and installation instruction respectively.
Then various types of testing have been conducted to test the system and its various
modules . by conducting unit test, integration test, system test and many more.
At last the final project is critically evaluated to come to a conclusion, how the system can
built
P a g e 71 | 82
CHAPTER 11: REFERENCES
1] A practical guide to Bandwidth Management and Optimization Using Open Source Software, in
October 2006
[2] Bandwidth management position paper, (Aptivate, June 2007); How to accelerate your internet
[3] Bo Yu”Based on the network sniffer implement network analyzer Computer Application and
System Modeling (ICCASM), 2010 International Conference on Volume: 7, 2010, Page(s): V7-1 - V7-
[4] Dualwan (2009) Bandwidth Management and Traffic Optimization (2010). http://dualwan.org/
bandwidth-management.html [5]
Flickenger, R. (2006). How to accelerate your Internet: A Practical Guide to Bandwidth Management
and Optimization, Accessed on 20th November, 2010
[6] Graham, Robert. “Sniffing (network wiretap, sniffer) FAQ”. Version 0.3.3. 14 September 2011
[7] Ansari, Rajeev S.G. and Chandrasekhar H.S, “Packet Sniffing: Brief Introduction”, IEEE Potentials,
Dec 2002- Jan 2003, Volume: 21 Issue: 5, pp: 17 – 19
[8] A. Dabir, A. Matrawy, “Bottleneck Analysis of Traffic Monitor Using Wireshark”, 4th International
Conference on Innovations in Information Technology, 2007, IEEE Innovations '07, 18-20 Nov. 2007,
Page(s):158 – 162
[9] A scalable architecture for network traffic Monitor and analysis using free open source software.
[10] S. Floyd and V. Jacobson, Link-sharing and resource management models for packet networks,
IEEE Trans. Networking, vol. 3, 1995.
This academic article was published by The International Institute for Science, Technology and
Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and
Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about
the publisher can be found in the IISTE’s homepage: http://www.iiste.org
11.4 E-Books
NISARG GANDHEWAR, et al. , In-Google Android: An Emerging Software Platform For Mobile
Devices.
In- International Journal on Computer Science and Engineering ((IJCSE). Department of Computer
Science Nagpur University, Chandrapur, pp:1-8
References and Bibliography:
• http://www.bluedart.com/
• http://www.wampserver.com/en/
• http://www.php.net/
• http://www.tutorialspoint.com/mysql/
P a g e 72 | 82
• httpd.apache.org/docs/2.0/misc/tutorials.html
APPENDICES
P a g e 73 | 82
P a g e 74 | 82
P a g e 75 | 82
P a g e 76 | 82
P a g e 77 | 82
P a g e 78 | 82
P a g e 79 | 82
P a g e 80 | 82
P a g e 81 | 82
P a g e 82 | 82