Professional Documents
Culture Documents
A Project Report
Submitted to
KAKINADA
by
B.Vineela (20X41A0406)
BACHELOR OF TECHNOLOGY
IN
Mr. B.RAVI
(Associate Professor)
S.R.K INSTITUTE OF TECHNOLOGY
Enikepadu, Vijayawada – 521108
Andhra Pradesh
May 2024
CERTIFICATE
This is to certify that the project report entitled “Application of AI Chatbot using Gradio
Interface for Humans Mental Health disorders” is a bonafide record of work carried out
by Y.Venkatesh (20X41A0464), R.Akhil (20X41A0495), B.Venkaiah Chowdary
(20X41A0463), V.Anil (20X41A0462), K.Sai krishna (21X45A0423) under the guidance
and supervision in partial fulfilment of the requirements for award of the degree Bachelor of
Technology in Electronics and Communication of Jawaharlal Nehru Technological
University, Kakinada.
Dr.T. VISHNU PRIYA Dr.S.SRI GOWRI
ACKNOWLEDGEMENTS
The successful outcome of this project required valuable guidance and assistance
from many and we are extremely fortunate to have got this.
We acknowledge the support rendered by our guide Dr.T. VISHNU PRIYA, all through the
PROJECT TEAM
Y. Venkatesh (20X41A0464)
R. Akhil (20X41A0495)
B. Venkaiah Chowdary(20X41A0463)
V. Anil (20X41A0462)
K. Sai krishna (20X45A0423)
CONTENTS
ABSTRACT i
CHAPTER 7: RESULT 50
CHAPTER 8: CONCLUSION 53
REFERENCE
ABBREVIATIONS
Hugging Face: It is a company that provides tools for building applications using Machine
learning.
QLORA: Same as LORA. Compression of High prescion data into low data.
GRADIO: Python library allows users to creates machine learning modal user interface.
• The operations are tensor reshaping, slicing, and rearranging operation making your
code cleaner and intuitive.
ABSTRACT
An organization has a backup server, which is currently on its network. Apart from basic
protection like antivirus on the server, there are no other security implementations from a
network perspective. The backup server and the users are all on the same sub net. The project
understands the security issues in the design and suggests improvement plan by modifying
the network infrastructure and implementing appropriate security configurations in the
design.
CHAPTER 1
Introduction on Networking
The basic idea: healthy networks are a community of people who are constantly thinking
about ways to support one anther's growth and success.
“Networking” is not telling everyone you know you’re looking for a job. Asking people for
names of those employed in places where you want to work isn’t networking, nor is
approaching strangers to ask for jobs.
The most successful people view networking as an opportunity to connect with others to
share useful information and resources. That’s right: networking isn’t about asking for
assistance or collecting names. In the most perfect form, it’s about building relationships and
helping others. When you network, you should identify contacts to build mutually beneficial
relationships and follow up with them to nurture the potential for continued engagement and
interaction.
If you don’t like to ask for help and therefore avoid networking, this is great news.
Networking isn’t about asking for help, it’s about people helping each other. Identify what
value you add to a potential or existing relationship. Employers and others gravitate to people
who offer ideas. Know the answer to questions such as, “Why are you an asset?” and “What
do you offer?” Be generous with your resources, knowledge, and skills, and you’ll be
prepared to create two-way networking relationships that can make a big difference in your
career.
You’re busy and have a lot of things vying for your time and attention. Why should
“networking” be near the top of your list? Recent research by Career -XRoads has shown
that, “A job seeker who is referred is conservatively three to four times more likely to be
hired (some studies found that a job seeker who is referred is 14 times more likely to be
hired) than someone who applies for a position without a referral.”
Those are compelling statistics. When you consider how much better your chances of landing
an opportunity become when a current employee forwards your resume compared to applying
on your own, it is clear why it’s important to spend time making connections with people
who have the potential to send along your resume for consideration.
But, networking isn’t all about finding people who can get you a job — it’s about building
lasting, supportive, relationships. Many good things can come out of those relationships--
ideas, introductions, helpful suggestions, project proposals, and certainly a referral or
recommendation for a job or internship.
The short answer — everywhere! Networking happens every time you talk with a fellow
student, alumna, peer at work, supervisor, or the endless chance encounters you have with
people at school, work, and life in-general. The key to effective networking is curiosity,
expressed through effective communication and great questions.
There is also one very important issue to consider. Some of you may not have existing
networks that come from family or peer connections. And for those who do have existing
connections, you may be wondering how to expand your network. There are many ways to do
so! Please connect with our Career Communities to explore venues where you can begin or
expand your network.
Here are some further resources to help in your effectively building your network to support
your career success.
A network that can be connected within a city, for example, cable TV Connection.
It can be in the form of Ethernet, ATM, Token-ring and FDDI.
It has a higher range.
This type of network can be used to connect citizens with the various Organizations.
In this article, we bring to you the detailed information about the LAN(Local Area -Network)
1.6 LAN :
Local Area Network (LAN) is a collection of computers and other devices that are connected
together over a network and are all in the same location within a building like an office or
home.
A router serves as the hub where the majority of LAN's connect to the Internet. Home LAN's
often utilize a single router, but bigger LAN's may also use network switches to transmit
packets more effectively.
LAN's nearly always connect devices to the network via Ethernet, WiFi, or both of these
technologies. Ethernet is a physical network connection protocol that calls
for Ethernet cables. WiFi is a protocol for using radio waves to connect to a network.
Servers, desktop computers, laptops, printers, Internet of Things (IoT) devices, and even
game consoles can connect to LAN's. LAN's are frequently used in offices to give internal
staff members shared access to servers or printers that are linked to the network.
3. Types of LAN
Client/Server LAN's: Multiple devices (the clients) are connected to a main server in a
client/server LAN. The server controls network traffic, device access, application access,
and file storage. Any connected device that runs apps or accesses the Internet qualifies as
a client. Clients can use wired or wireless connections to connect to the server.
Peer-to-Peer LAN's: Peer-to-peer LAN's are often smaller because they lack a central
server and can’t support huge workloads like client/server LAN's can. Every device on a
peer-to-peer LAN contributes equally to the network’s operation. Through wired or
wireless connections to a switch or router, the devices share data and resources. Peer-to-
peer networks are the norm in homes.
The same physical network can have its traffic divided into two networks using virtual
LAN's, or VLANs. Imagine establishing two independent LAN’s in the same room, each
with its own router and Internet connection. Similar to that, but with only one router and one
Internet connection required, Vlan's divide networks virtually rather than physically.
VLAN’s are beneficial for network management, particularly in very large LAN's.
Administrators may much more simply control the network by segmenting it. (Sub nets,
another method of segmenting networks for increased efficiency, differ greatly from Vlan’s.)
Basically, Computer Network is a connection of two or more devices that are connected
through a medium in order to exchange information. With the help of a Computer Network,
you can easily send or receive data to or from a computing device.
A list Of Computer network features is given below.
o Communication speed
o File sharing
o Back up and Roll back is easy
o Software and Hardware sharing
o Security
o Scalability
o Reliability
1. Communication speed
Network provides us to communicate over the network in a fast and efficient manner. For
example, we can do video conferencing, email messaging, etc. over the internet. Therefore,
the computer network is a great way to share our knowledge and ideas.
2. File sharing
File sharing is one of the major advantage of the computer network. Computer network
provides us to share the files with each other.
Since the files are stored in the main server which is centrally located. Therefore, it is easy to
take the back up from the main server.
We can install the applications on the main server, therefore, the user can access the
applications centrally. So, we do not need to install the software on every machine. Similarly,
hardware can also be shared.
5. Security
Network allows the security by ensuring that the user has the right to access the certain files
and applications.
6. Scalability
Scalability means that we can add the new components on the network. Network must be
scalable so that we can extend the network by adding new devices. But, it decreases the speed
of the connection and data of the transmission speed also decreases, this increases the
chances of error occurring. This problem can be overcome by using the routing or switching
devices.
7. Reliability Computer
network can use the alternative source for the data communication in case of any hardware
failure.
1.8 Goals and Applications of Networks
A network consists of two or more nodes (e.g. computers) that are linked in order to share
resources (such as printers and CDs), exchange files, or allow electronic communications.
The computers on a network may be linked through cables, telephone lines, radio waves,
satellites, or infrared light beams.
Networking Elements :
The computer network includes the following networking elements:
Networking Security
Network Administrator controls access to the data and software on the network. A network
administrator assigns the user ID and password to the authorized person.
All the measures used to safeguard a computer network's integrity and the data on it are
collectively referred to as network security. Network security is crucial because it protects
sensitive data from online threats and guarantees the network's dependability. Multiple
security measures are used in successful network security plans to shield users and
organizations from malware and online threats like distributed denial of service.
Computers, servers, wireless networks, and other associated devices make up a network.
Many of these gadgets are open to possible intruders. Utilizing a range of hardware and
software tools on a network or as software as a service is necessary for network security. As
networks get increasingly complicated and businesses rely more on their networks and data to
operate, security becomes more crucial. As threat actors develop new ways to target these
more complex networks, security techniques must change.
Security is typically described as everyone's duty since every user on the network represents
a potential vulnerability in that network, regardless of the exact method or business security
plan.
o Privacy: Privacy means both the sender and the receiver expects confidentiality. The
transmitted message should be sent only to the intended receiver while the message
should be opaque for other users. Only the sender and receiver should be able to
understand the transmitted message as eavesdroppers can intercept the message.
Therefore, there is a requirement to encrypt the message so that the message cannot
be intercepted. This aspect of confidentiality is commonly used to achieve secure
communication.
o Message Integrity: Data integrity means that the data must arrive at the receiver
exactly as it was sent. There must be no changes in the data content during
transmission, either maliciously or accident, in a transit. As there are more and more
monetary exchanges over the internet, data integrity is more crucial. The data integrity
must be preserved for secure communication.
o End-point authentication: Authentication means that the receiver is sure of the
sender?s identity, i.e., no imposter has sent the message.
o Non-Repudiation: Non-Repudiation means that the receiver must be able to prove
that the received message has come from a specific sender. The sender must not deny
sending a message that he or she send. The burden of proving the identity comes on
the receiver. For example, if a customer sends a request to transfer the money from
one account to another account, then the bank must have a proof that the customer has
requested for the transaction.
Hardware and software technologies are used in conjunction to ensure network security.
Network security's main objective is to stop unauthorized access to or communication inside
a network.
A security officer or team decides upon an organization's network security plans and policies
to assist the organization in meeting security requirements. These security guidelines must be
followed by everyone using the network. Data can be compromised anywhere in the network
where an authorized user could access it, whether by a violent actor or by a negligent or
mistaken user.
In the modern environment, no method can guarantee complete security. However, measures
may be taken to protect data when it is sent across an unprotected network or the internet.
The most popular method is cryptography.
Encrypting plain-text data using cryptography makes it more difficult to decipher and
understand. Today, a variety of cryptographic algorithms are accessible, as follows:
The sender and the receiver share one secret key. The data is encrypted at the sender's end
using this secret key. Data is encrypted before being transferred to the recipient via a public
network. The recipient may readily decipher the encrypted data packets because they are both
aware of and possess the Secret Key.
Each user in this encryption scheme has a unique Secret Key that is not kept in the common
domain. The secret key is kept from the public. Every user has a unique but public key in
addition to a secret key. Senders encrypt the data using a public key that is always made
available to the public. Using the user's personal Secret Key, he can quickly decode the
encrypted data once he receives it. Rivest-Shamir-Adleman (RSA), a kind of public key
encryption, is an illustration.
3. Message Digest
In this approach, a hash value is computed and delivered in place of actual data. The second
end user generates its hash value and contrasts it with the most recent one. It is approved if
both hash values match; otherwise, it is refused.
Message Digest example using MD5 hashing. It is mostly utilized in authentication processes
when server passwords are compared against user passwords.
2.5 Tools and Software for Network Security
Network to network, and with time, there are changes in the security tools and rules available.
Strong security frequently requires various strategies, sometimes known as layered security
or defence, to provide organizations with the most feasible security controls. The following
are some examples of frequently used tools and software for network security:
1. Firewalls
Web pages, pop-ups, and other service entry and departure decisions are made by firewalls,
which are guardian services or devices. Depending on the needs, these firewalls utilize a
preset set of rules to help block or allow traffic. Depending on the requirements of the
system, firewalls might be either software- or hardware-based, or both.
2. Access Control
Access control enables businesses to stop unauthorized people and devices from connecting
to a specific network and to stop prospective attackers from accessing sensitive data. This
limits network access to users who are authorized to utilize the specified resources.
In most cases, a VPN encrypts the communication between an endpoint device and a network
via the internet. Additionally, VPN enables experts to verify the connection between the
network and the device. As a consequence, an online tunnel that is encrypted and safe is
created.
5. Wireless Security
In comparison to wireless networks, wired networks could be more secure. It would help if
you had control over the computers and people who may access the network of your business.
It would help if you had wireless security, especially in light of the fact that fraudsters are
increasingly extorting people for their private information.
6. Application Security
Applications' weak points may be tracked down and secured using a combination of software,
hardware, and processes, which makes it harder for hackers to access your network.
7. Behavioural Analysis
You need to have a solid understanding of the typical behaviour of your network if you want
to be able to spot abnormalities and different network breaches as they happen. Different
behavioural analytics solutions are available that may quickly identify unusual activity.
There are several difficulties in maintaining network security, such as the following:
The following is a list of some of the security software, hardware, and tools required to
guarantee that the network is, in fact, secure:
1. Wireshark
2. Nessus
3. Snort
4. Netcat
5. Metasploit
6. Aircrack
7. BackTrack
8. Cain and Abel
The following list includes a few of the several network security attack types:
1. Virus
It is a malicious file that may be downloaded, and after a user has opened it, it begins to
overwrite the computer's code with a new set of codes. The system files on the computer will
become corrupt as the infection spreads, which may cause the files on other computer
systems in the network to become corrupt as well.
2. Malware
It is one of the swiftest, most severe, and worst attack methods that aid in gaining
unauthorized access to a system or network of systems. The majority of malware is self-
replicating, which means that once it infects one system, it may quickly infect all other
computers linked to the network through the internet. Malware can corrupt any external
device that is plugged into the system.
Chapter 3
Backup server
A backup server is a computer system used to back up data from other servers and computers
on a network. It is a backup means of protecting data if the primary data is lost or destroyed.
A backup server is a particular computer designed to hold and replicate critical data stored in
the main servers. Its major role is to replicate and preserve essential data so that if the
genuine data is lost or breached, organizations can restore it quickly and continue normal
operations. It functions as a secure fallback in the event of potential data disasters.
Cloud-based backup servers store data on remote servers accessed via the internet.
Hybrid backup servers combine on-premises and cloud storage for added flexibility
and redundancy.
. In fairness, most companies today do back up their data rather diligently. Yet, one-third of
them experience problems with backup restoration. The dichotomy lies in the way a ‘backup
strategy’ is perceived.
For the majority, a backup strategy starts and ends with what to backup. For the rest, it’s
about what and which type of backup to implement.
In light of World Backup Day, let’s move the discussion from ‘why backup’ to the types of
backup. The former gives you a backup strategy while the latter gives you the right backup
strategy.
1. Full Backup
A full backup is the most complete type of backup where you clone all the selected data. This
includes files, folders, SaaS applications, hard drives and more. The highlight of a full backup
is the minimal time it requires to restore data. However, since as everything is backed up in
one go, it takes longer to backup compared to other types of backup.
The other common issue with running full backups is that it overloads storage space. That’s
why most businesses tend to run a full backup and occasionally follow it up with differential
or incremental backup. This reduces the burden on the storage space, increasing backup
speed.
2. Differential Backup
A differential backup straddles the line between a full and an incremental backup. This type
of backup involves backing up data that was created or changed since the last full backup. To
put it simply, a full backup is done initially, and then subsequent backups are run to include
all the changes made to the files and folders.
It lets you restore data faster than full backup since it requires only two backup components:
an initial full backup and the latest differential backup.
Day 2 – Schedule a differential backup. It will cover all the changes that took place between
Day 1 and Day 2
Day 3 – Schedule a differential backup. It will make a copy of all the data that has changed
from Day 2 (this includes the full backup on Day 1 + differential backup) and Day 3.
3. Incremental Backup
The first backup in an incremental backup is a full backup. The succeeding backups will only
store changes that were made to the previous backup. Businesses have more flexibility in
spinning these types of backups as often as they want, with only the most recent changes
stored.
Incremental backup requires space to store only the changes (increments), which allows for
lightning-fast backups.
3.5 The Right Backup Strategy With the Right Type of Backup
Which server backup methods are right for you?
Now that you better understand the differences between backup methods, it’s time to decide
what method or types of backup are best for you. Here are a few options to consider:
1. Monthly Image Backup, Weekly Full Backup, and Daily Differential Backups
2. Monthly Image Backup, Weekly Full Backup, and Daily Incremental Backups
3. Quarterly Image Backups, Monthly Full Backups, and Daily Incremental Backups
While it is best to set your backups to automatically run on a set schedule, it is also a good
idea to backup your files or create an image backup before making any type of system
changes like updating your Windows operating system or updating your Windows service
pack, adding new hardware, updating drivers, or making edits to your Windows registry.
Note: Whatever backup method you choose, it should at minimum follow the 3-2-1 backup
rule of keeping 3 copies of data, in at least 2 different media formats, with 1 copy or more
kept offsite.
There are numerous server backup storage options to choose from, but ultimately the decision
as to what data storage device or destination you choose is up to you. We recommend
selecting more than one data storage option or buying two of your storage devices of choice
so that you can have a secondary backup location that is preferably stored offsite.
Some NAS devices, such as Buffalo TeraStations, offer built-in replication and multiple
backup options. For optimum data protection, we recommend that you have one NAS device
onsite and a secondary NAS device stored at an offsite location and the NAS will replicate
your backup to your secondary NAS device.
Snapshot technology captures the state of a system at a specific point in time for quick
recovery.
Deduplication eliminates redundant data to optimize storage efficiency on backup
servers.
Implement a backup schedule that aligns with the organization's data retention policies
and recovery objectives.
Secure backup servers with encryption, access controls, and monitoring to protect
sensitive data.
3.7 Backup Server Management
Monitoring backup server performance and storage capacity helps prevent bottlenecks
and data loss.
Automate backup processes to streamline operations and reduce the risk of human error.
Conduct regular audits and updates to maintain the effectiveness and security of backup
servers.
3.8 Disaster Recovery with Backup Server
Backup servers play a crucial role in disaster recovery by providing copies of data for
restoration.
Regularly review and update the disaster recovery plan to adapt to evolving threats and
technological changes.
3.9 Advantages Of BackUp Server:
A backup server might seem like an additional expense for organizations, but in the longer
run, it
guarantees business protection from any kind of calamity. Following are the key advantages
associated with
the backup server:
1. Reliable Data Protection
What if your organization gets hit by a cyber-attack, natural disaster, hardware malfunction,
accidental
deletion, or other such incidents, and it caused significant data loss. If you didn’t have a
backup in place,
then how can you recover your data? With a backup server, you are always making a
duplicate of your
organization’s crucial data, so even if your organization encounters an issue causing data
loss, then
your backup solution will be there to protect you.
2. Enhanced Security for Important Data
Organizations today are collecting an unprecedented amount of data, which includes both
vital
information for extracting business insights and unimportant data. The data that is vital for
business should
be backed up to ensure that it can be restored in the hour of need. A backup server is such a
backup
media where you can continuously and automatically store your data crucial for business and
also make it
encrypted for enhanced security. This way, you are having multiple copies of the data, which
brings data
protection and data security.
.
Chapter 5