You are on page 1of 2

MODULE DESCRIPTION

Modules Login Change Password Network Information Check shortest path Encryption Add Employee Decryption

Module 1: Login Module The Login Form module presents, site visitors with a form, with username and password fields. If the user enters a valid username/password combination they will be granted access to additional resources on website. Which additional resources they will have access to the network. This module initiates the software we have built and alerts all the system in the network, and the home system, brings all the system in network to its control. Module 2: Change Password This module allows administrators by role to change their password on their next page load or login, and/or expire their passwords after a period of time. Module 3: Network Information This module is Most of the organization they connect more numbers of systems to form a network to make their work easier to share their files and folders. While connecting we want to monitor the network system activities for secure purpose. This Project deals with monitoring the Network Screen Activities. It has two methodologies one for Client and another for Server.

Module 4: Check shortest path This module is to find the shortest path in the n/w for transferring the file with in less time. This is the main module of the project. In this, a list of paths to the particular destination is viewed. This can be done by entering IP address of destination. From the path list the shortest paths are identified and move the list to next module.

Module 5: Encryption This module Encryption is the conversion of data into a form, called a cipher text that cannot be easily understood by unauthorized people. In an encryption, the message or information (referred to as plaintext) is encrypted using an encryption algorithm, turning it into an unreadable cipher text.This is usually done with the use of an encryption key, which specifies how the message is to be encoded. In public-key schemes, the encryption key is published for anyone to use and encrypt messages. Module 6: Add Employee This module is us This module is used to add the employee details of the Project. After Register this details of employee username and password Authenticate on client side of this project f this project Module 7: Decryption Decryption is the process of converting encrypted data back into its original form, so it can be understood, An authorized party, however, is able to decode the ciphertext using a decryption algorithm, that usually requires a secret decryption key, that adversaries do not have access to.In publickey schemes,However, only the receiving party has access to the decryption key and is capable of reading the encrypted messages.

You might also like