Virtual Network Monitoring System(Synopsis)

Published on June 2016 | Categories: Types, School Work | Downloads: 69 | Comments: 0 | Views: 318
of 11
Download PDF   Embed   Report

ieee projects titles,ieee projects list,ieee projects download,project titles in java,ieee projects on java,ieee projects for cse,ieee project,project ideas in java,ieee projects for ece,mba project list,mba project topics,mca project titles,project topics for computer science,java projects for engineering students,ieee projects for eee,mca project topics,topics for projects in java,computer project topics,java project topics,computer science project topics,ieee project titles,ideas for projects in java,ieee project titles for cse,ieee project topics for ece,ieee projects titles for cse,projects ideas in java,ieee projects titles 2010,ieee projects title,project topics for information technology,ieee project topics,ieee projects in java,ieee projects list 2010,mechanical project topics,final year project titles,mechanical projects ideas,ieee java projects 2010,mechanical project ideas,project topics in java,java projects ideas,engineering project topics,mba project titles,eee projects,projects for ece,ieee projects,mba projects list,java projects download,mba project,project for computer science,computer engineering projects,list of mba projects,topics for project,ieee project titles 2011,ece projects list,mba projects topics,mba projects download,ieee project titles for ece,project title in java,topics for java project,final year projects for information technology,mca projects in java,java mini project topics,,java projects topics,project for ece,projects titles in java,ece projects titles,java project topics list,topics of projects,java ieee projects,projects for computer science,download mba projectsieee it projects,mba project topics in finance,mba marketing project topics,list java projects,mca final year projects titles,mini project titles in java,it projects in java,mba project topics for marketing,mba projects in finance,new project topics in java,project ideas for engineering students,final year projects titles,project list in java,marketing topics for mba project,students projects,eee projects titles,mba projects,mba project topics in marketing,topics for project in java,projects in ieee,list of java projects,mba project title in marketing,mini project topics for mechanical,marketing project topics for mba,project topics for eee,topics for mini ,projects in java,java projects for mca,project for final year,mca project ideas,java project titles,ieee projects titles,ieee projects list,ieee projects download,project titles in java,ieee projects on java,ieee projects for cse,ieee project,project ideas in java,ieee projects for ece,mba project list,mba project topics,mca project titles,project topics for computer science,java projects for engineering students,ieee projects for eee,mca project topics,topics for projects in java,computer project topics,java project topics,computer science project topics,ieee project titles,ideas for projects in java,ieee project titles for cse,ieee project topics for ece,ieee projects titles for cse,projects ideas in java,ieee projects titles 2010,ieee projects title,project topics for information technology,ieee project topics,ieee projects in java,ieee projects list 2010,mechanical project topics,final year project titles,mechanical projects ideas,ieee java projects 2010,mechanical project ideas,project topics in java,java projects ideas,engineering project topics,mba project titles,eee projects,projects for ece,ieee projects,mba projects list,java projects download,mba project,project for computer science,computer engineering projects,list of mba projects,topics for project,ieee project titles 2011,ece projects list,mba projects topics,mba projects download,ieee project titles for ece,project title in java,topics for java project,final year projects for information technology,mca projects in java,java mini project topics,,java projects topics,project for ece,projects titles in java,ece projects titles,java project topics list,topics of projects,java ieee projects,projects for computer

Comments

Content


VIRTUAL NETWORK MONITORING
SYSTEM
Virtual Network Monitoring Syste!
The demand for cost and time saving technologies in combination with competitive
pressures within corporate environments has made VPN (Virtual Private Network)
technology an alternative option for enterprise network connectivity. However the
amount of available information and the speed at which technical landscapes are
changing !uickly outpaces typical VPN solutions being developed. "apid development
and abundant options create comple#ity for network designers with respect to choosing
and implementing the proper VPN technology.
V$"T%&' N(T)*"+ ,*N$T*"$N- ./.T(, is a 0ava tool to observe network
traffic virtually. Network administrators facilitate to monitor VPN (PPTP 1 $P.ec 1 ..H)
and ..' (HTTP.) connectivity of wire line1wireless networks. The graphical
representation makes it easy to visuali2e messages being sent between computer nodes.
%sers can also read messages not of the above types in plain te#t. 3onnection statistics
can be used as a measure of network security. The P"* edition allows network
administrators to monitor multiple and remote networks.
Mo"ules!
• #a$turing %a&kets
4y choosing a network card can capture packets from the network.$t will list out
all the network devices in the system when we select one of those devices this
application will capture all the packets coming form that device.
• 'rawing #onne&tions
$n the network traffic visuali2ation VPN and ..' connections
are represented in colors other than black. )hen the packets are captured from the
network card then it will captures all the $P addresses of the systems which are
connected in the network.
• %lotting Network
(ach message captured by V$"T%&' )&T3H ./.T(, is represented
graphically by an edge connecting two computers. .ince messages are sent both
ways when a message is passing from one system to another system then a edge
connecting those two computers are drown dynamically.
• 'u$ing Te(t
&ll messages not sent through VPN nor ..' are printed onto the screen. The
latest arriving message will be appear at the top of the table. 5ifferent filters will
be developed to locate messages containing sensitive information.
• #olle&ting Statisti&s
5ynamic updating of the statistics table. The statistics table collects the fractions
of secure connections and packets in the network. $t will represent all the
information how many packets are transferred in the subnet.
• Resol)ing I% A""ress!
V$"T%&' )&T3H ./.T(, will support the functionalities of resolving $P
addresses to hostnames depending on the capturing device.
• Set *ilters!
4y this application the system administrator is provided with the filters for the
data security and graphical representation makes easy to the administrator to
identify how many systems are connected and how many are active at present.
Intro"u&tion
This white paper reviews several important design issues that should be
considered when evaluating Virtual Private Network (VPN) technology. Today each
network manager is responsible for a network that differs from other networks as much as
individual people differ from one another. This uni!ueness invariably causes issues when
designing a VPN.
VPN technology is one of the most integrated technologies being deployed on today6s
networks. (very VPN solution interacts with e#isting sub7systems and crosses all
business and operational practices. 4ased on their specific e#posure and technological
predispositions people6s perceptions of VPN technologies differ significantly.

The demand for cost and time saving technologies in combination with competitive
pressures within corporate environments has made VPN technology an alternative option
for enterprise network connectivity. However the amount of available information and
the speed at which technical landscapes are changing !uickly outpaces typical VPN
solutions being developed. "apid development and abundant options create comple#ity
for network designers with respect to choosing and implementing the proper VPN
technology.
&t present many vendors6 VPN solutions are closer to using common practices but
interoperability issues with non7standards7based solutions create awkward manageability
issues. 3ommon practices used to configure control and monitor must be ree#amined
during the design of a VPN.
The goal of a successful VPN is to provide authenticated and authori2ed nodes with
proper access to trusted networks in a seamless and automated fashion. This interaction
must include client7to7client client7to7gateway or gateway7to7gateway connections. &
VPN solution must provide centrali2ed management reliable service and ensure the
integrity and privacy of data transfers. These goals must be accomplished when
traversing either a public or private network infrastructure
+,- %ur$ose
The purpose of this document is to give the overview of the pro8ect. The main aim of this
pro8ect is to observe network traffic virtually. Network administrators facilitate to
monitor VPN (PPTP 1 $P.ec 1 ..H) and ..' (HTTP.) connectivity of wire line1wireless
networks. The graphical representation makes it easy to visuali2e messages being sent
between computer nodes. %sers can also read messages not of the above types in plain
te#t. 3onnection statistics can be used as a measure of network security. The P"* edition
allows network administrators to monitor multiple and remote networks. Virtual Network
,onitoring .ystem will focus on number of functionalities for monitoring network traffic
and security.
O)er)iew
V$"T%&' N(T)*"+ ,*N$T*"$N- ./.T(, is a 0ava tool to observe network
traffic virtually. Network administrators facilitate to monitor VPN (PPTP 1 $P.ec 1 ..H)
and ..' (HTTP.) connectivity of wire line1wireless networks. The graphical
representation makes it easy to visuali2e messages being sent between computer nodes.
%sers can also read messages not of the above types in plain te#t. 3onnection statistics
can be used as a measure of network security. The P"* edition allows network
administrators to monitor multiple and remote networks.
,ain functional features of the Virtual )atch .ystem on Private Networks
9.:.; 3apturing Packets
9.:.: 5rawing 3onnections
9.:.9 Plotting Network
9.:.< 5umping Te#t
9.:.= 3ollecting .tatistics
9.:.> "esolving $P &ddresses
.,/, Syste Analysis
E(isting Syste
Restri&te" A&&ess to 'esira0le Ser)i&es
A frewall may well restrict certain inherently dangerous services which
users of the protected network nevertheless want to use. Services for
which proxy servers do not (yet) exist will efectively be blocked by
proxy frewalls newer services such as !A"S were not designed to
work with frewalls and# by their very newness# are considered to be
unsafe . $ompromises by the designers of the security policy may be
necessary in order to prevent the users from circumventing the frewall
completely.
'e&rease in T1roug1$ut
%irewalls may represent a signifcant bottleneck in communication
between the protected network and the outside world. &owever# this is
less of a problem than is generally assumed# as most frewalls can pass
data at '( rates ((.) mpbs)# while most sites are connected at rates
less than '(.
#on&entrate" Se&urity
!hile having security concentrated on one host has its advantages# a
compromise of the frewall could be disastrous to hosts which are not
running their own security software. 'he *uestion is whether a more
likely# but smaller# security breach is better or worse than a less likely
large breach.
#o$li&an&y
+oth users and management may tend to become complacent about
security when a frewall is installed. "nvesting time and money in a
frewall is not particularly useful if other methods for stealing data or
attacking systems are neglected. ,ser security education is essential#
since legitimate users are already inside the protected network.
-hysical security is also often neglected . implementing the most
powerful frewalls and having the most carefully designed security
policy is useless if someone can simply walk of with the server.
%ro$ose" syste
/ur proposed system is 0irtual 1etwork 2onitoring System#as the
popularity of the "nternet grew# businesses turned to it as a means of
extending their own networks. %irst came intranets# which are
password.protected sites designed for use only by company
employees. 1ow# many companies are creating their own VIRTUAL
NETWORK MONITORING SYSTEM(virtual private network) to
accommodate the needs of remote employees and distant o3ces.
+asically# a 0"4',A5 16'!/47 2/1"'/4"18 is a private network that
uses a public network (usually the "nternet) to connect remote sites or
users together. "nstead of using a dedicated# real.world connection
such as leased line# a 0"4',A5 16'!/47 uses 9virtual9 connections
routed through the "nternet from the company:s private network to the
remote site or employee. "n this article# you will gain a fundamental
understanding of 0"4',A5 16'!/4k;s# and learn about basic 0"4',A5
16'!/47 components# technologies# tunneling and security.
'here are two common types of 0"4',A5 16'!/47 Reote!a""ess#
also called a virtual private #ial!up network (V$%N)# is a user.to.
5A1 connection used by a company that has employees who need to
connect to the private network from various remote locations.
'hrough the use of dedicated e*uipment and large.scale encryption# a
company can connect multiple fxed sites over a public network such
as the "nternet. Site.to.site 0"4',A5 16'!/47 2/1"'/4"18 S<S'62
can be one of two types=
• Intranet!&ase# . "f a company has one or more remote
locations that they wish to >oin in a single private network# they
can create an intranet 0"4',A5 16'!/47 to connect 5A1 to
5A1.
• E'tranet!&ase# . !hen a company has a close relationship with
another company (for example# a partner# supplier or customer)#
they can build an extranet 0"4',A5 16'!/47 that connects 5A1
to 5A1# and that allows all of the various companies to work in a
shared environment
A well.designed 0"4',A5 16'!/47 uses several methods for keeping
your connection and data secure=
• %irewalls
• 6ncryption
• "-Sec
• AAA Server
Mo"ules O2 T1e %ro"u&t
There are basically five modules for developing
• #a$turing %a&kets
4y choosing a network card can capture packets from the network.$t will list out
all the network devices in the system when we select one of those devices this
application will capture all the packets coming form that device.
• 'rawing #onne&tions
$n the network traffic visuali2ation VPN and ..' connections
are represented in colors other than black. )hen the packets are captured from the
network card then it will captures all the $P addresses of the systems which are
connected in the network.
• %lotting Network
(ach message captured by V$"T%&' )&T3H ./.T(, is represented
graphically by an edge connecting two computers. .ince messages are sent both
ways when a message is passing from one system to another system then a edge
connecting those two computers are drown dynamically.
• 'u$ing Te(t
&ll messages not sent through VPN nor ..' are printed onto the screen. The
latest arriving message will be appear at the top of the table. 5ifferent filters will
be developed to locate messages containing sensitive information.
• #olle&ting Statisti&s
5ynamic updating of the statistics table. The statistics table collects the fractions
of secure connections and packets in the network. $t will represent all the
information how many packets are transferred in the subnet.
• Resol)ing I% A""ress!
V$"T%&' )&T3H ./.T(, will support the functionalities of resolving $P
addresses to hostnames depending on the capturing device.
O$erating En)ironent
3,- 4AR'WARE S%E#I*I#ATIONS!
Processor Name ? Pentium7$$$
Processor .peed ? >@@ ,HA
"&, ? :=> ,4
Hard 5isk 3apacity ? :B -4
3,5 SO*TWARE S%E#I*I#ATIONS!
&pplication 'anguage ? 0&V& ;.<.C
'ibraries ? 0P3&P )$NP3&P
*perating .ystem ? )$N5*). :BBB
P"*D(..$*N&'

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close