Professional Documents
Culture Documents
CHAPTER 1: INTRODUCTION
In the field of networking, the specialist area of network security consists of the
provisions made in an underlying computer network infrastructure, policies adopted
by the network administrator to protect the network and the network-accessible
resources from unauthorized access, and consistent and continuous monitoring and
measurement of its effectiveness (or lack) combined together.
The terms Network Security and Information Security are often used interchangeably.
Network Security is generally taken as providing protection at the boundaries of an
organization by keeping out intruders (hackers). Information Security, however,
explicitly focuses on protecting data resources from malware attack or simple
mistakes by people within an organization by use of Data Loss Prevention (DLP)
techniques. One of these techniques is to compartmentalize large networks with
internal boundaries. Employees have to cross these boundaries and be authenticated
when attempting to access protected information.
RECOGNITION OF NEED
INTRODUCTION
Before developing the new system, it is very important to study the existing system.
Sometimes it becomes hard to study existing system easily & suggest new system.
Study of existing system involves analyst of input, output, and type of operations.
How these operation are performed by existing system.
The system analyst has to find out what problem the existing system is facing .What
modifications have to be made in the existing system and how it can be improved in
an efficient manner so that it may satisfy the need of user? The system analyst a must
also know the scope of the problem by studying the system.
In order to understand the work of an existing system the system analyst has to
interact with the users. He has to survey to get knowledge about the existing system.
Hence in this stage the system analyst has to perform two basic steps:
1. To find out what the problem faced by users with current working system.
2. Activities of surveying and investigation
For the preliminary survey the system analyst developed through estimate and collect
sample of document. The system analyst makes take interviews only a few people and
use approximation
The survey and investigation has to be carried out by the system analyst for the
following purpose
All the questions are answered by investigation. This creates a rough image of how
the system is working. Its drawbacks are in system analyst mind. Initial investigation
means to find out what are the drawback of existing system and what are the problem
faced by user at working level, what are feelings of while working with current
system.
SCOPE OF PROJECT
TECHNOLOGY: 1) JAVA
Java:
Features
Simple
Object-oriented
Distributed
Robust
Secure
Architecture Neutral
Portable
Interpreted
High performance
Multithreaded
Java is simple.
What it means by simple is being small and familiar. Sun designed Java as
closely to C++ as possible in order to make the system more comprehensible, but
removed many rarely used, poorly understood, confusing features of C++. These
primarily include operator overloading, multiple inheritance, and extensive automatic
coercions. The most important simplification is that Java does not use pointers and
implements automatic garbage collection so that we don't need to worry about
dangling pointers, invalid pointer references, and memory leaks and memory
management.
Java is object-oriented.
This means that the programmer can focus on the data in his application and the
interface to it. In Java, everything must be done via method invocation for a Java
object. We must view our whole application as an object; an object of a particular
class. .
Java is distributed.
Java is robust.
Java is designed for writing highly reliable or robust software. Java puts a lot of
emphasis on early checking for possible problems, later dynamic (runtime) checking,
and eliminating situations that are error prone. The removal of pointers eliminates the
possibility of overwriting memory and corrupting data.
Java is secure.
Java is architecture-neutral.
Java is portable.
The portability actually comes from architecture-neutrality. But Java goes even
further by explicitly specifying the size of each of the primitive data types to eliminate
implementation-dependence. The Java system itself is quite portable. The Java
compiler is written in Java, while the Java run-time system is written in ANSI C with
a clean portability boundary.
Java is interpreted.
The Java compiler generates byte-codes. The Java interpreter executes the
translated byte codes directly on system that implements the Java Virtual Machine.
Java's linking phase is only a process of loading classes into the environment.
Java is high-performance.
Java is multithreaded.
Java provides support for multiple threads of execution that can handle
different tasks with a Thread class in the java. Lang Package. The thread class
supports methods to start a thread, run a thread, stop a thread, and check on the status
of a thread. This makes programming in Java with threads much easier than
programming in the conventional single-threaded C and C++ style.
Java is dynamic.
The Swing package is part of Java Foundation Classes (JFC) in the Java
platform. The JFC encompasses a group of features to help people build GUIs; Swing
provides all the components from buttons to split panes and tables.
It introduces Swings features and explains all the concepts we need to be able to
use Swing components effectively.
Swing provides many standard GUI components such as buttons, lists, menus
and textareas, which we combine to create our programs GUI. It also includes
containers such as windows and tool bars.
Layout Management:
Containers use layout managers to determine the size and position of the
components they contain. Borders affect the layout of Swing GUIs by making Swing
components larger. We can also use invisible components to affect layout.
Event Handling:
Event handling is how programs respond to external events, such as the user
pressing a mouse button. Swing programs perform all their painting and event
handling in the event-dispatching thread.
Painting:
Painting means drawing the components on-screen. Although its easy to
customize a components painting, most programs dont do anything more
complicated than customizing a components border.
These are some of the major concepts we need to know to build Swing GUIs
the containment hierarchy, layout management, event handling, painting, and
threads. These are some of the other important Swing features. They are
INTRODUCTION
1. Technical Feasibility
2. Economical Feasibility
3. Schedule Feasibility
4. Operational Feasibility
A feasibility study is conducted to select the best system that meets the performance
requirements. A system required performance is defined by a statement of the
identification of specific system objective & the description of output.
The process to make changes in the current system in order to achieve
new effective system.
The feasibility study includes complete initial analysis of all related
system. Therefore the study must be conducted in a manner that will reflect the
economic as well as technical feasibility of the system proposal.
2. TECHNICAL FEASIBILITY
In the technical feasibility the system analyst look between the requirements of
the organization, such as suggest input device which can enter a large amount of data
in effective time .Output devices which can produce output in a bulk in an effective
manner.
3. SCHEDULE FEASIBILITY
The estimation how long the system will take to develop & if it can be
completed in a given time period using some methods like payback period. The
project will fail if it takes too long to be completed before it is useful. Schedule should
be maintained by project team.
4. OPERATIONAL FEASIBILITY
Do the current work practices & procedures affect the working lives of those
affected by system?
For eg; system should be easily operable. There should not be complications for
user to enter details. It should also validate customers specification completely.
Unlock computer
Network Configuration
MODULE DESCRIPTION
LOCK COMPUTER
By processing the lock procedure we can lock the remote system.
In the network locking we need client system and server system to lock
the start menu, desktop and taskbar with the help of the password
UNLOCK COMPUTER
By processing the unlock procedure we can unlock the remote system.
With the help of password we can unlock the start menu, desktop and taskbar
NETWORK CONFIGURATION
This is the first module, which is used to select the IP address is going to
do the network lock process.
With the help of this network configuration, we can select the remote
system.
SOFTWARE CONFIGURATION:
LOCK COMPUTER
UNLOCK COMPUTER
NETWORK CONFIGURATION
WINLOCK
REMOTE
SYSTEM
LOCAL SYSTEM
ACTIVITY DIAGRAM
START
NETWORK CONFIGURATION
LOCK
COMPUTER UNLOCK
COMPUTER WINLOCK
STOP
DATA FLOW DIAGRAM (0 LEVEL)
NETWORK LOCKING
N ETWORK
CONFIGU RATION
REMOTE SYSTEM
DATA FLOW DIAGRAM (DFD LEVEL 1)
ADMINISTRATOR
CONFIGURE
IPADDRESS
SELECT
A DMINISTRATOR
REMOTE SYSTEM
SYSTEM
SELECT SYSTEM
LOCK SYSTEM
REMOTE SYSTEM
DATA FLOW DIAGRAM (DFD LEVEL 3)
A DMINISTRATOR
SYSTEM
SELECT SYSTEM
ENTER PASSWORD
UNLOCK SYSTEM
A DMINISTRATOR
SYSTEM
REMOTE SYSTEM
SELECT SYSTEM
PERFORM
WINLOCK OPERATIONS
REMOTE SYSTEM
CHAPTER 3: IMPLEMENTATION
It making the new system available to a prepared set of users (the deployment), and
positioning on-going support and maintenance of the system within the Performing
Organization (the transition). At a finer level of detail, deploying the system consists
of executing all steps necessary to educate the Consumers on the use of the new
system, placing the newly developed system into production, confirming that all data
required at the start of operations is available and accurate, and validating that
business functions that interact with the system are functioning properly. Transitioning
system support and maintenance mode of operation, with ownership of the new
User Training
The user is important person in the whole product. Though the system is validating all
requirements of users, if user does not know how the system so it is of no use.
Thus we have to train the user so that he can access the system efficiently.
Thus we should give idea to user how to use the system. We should provide all
executable files to user and hardware and software requirement of the system.
SYSTEM TESTING
Testing is not isolated to only one phase of the project but should be exercised
in all phases of the project. After developing each unit of the software product, the
developers go through an extensive testing process of the software.
After the development of software modules, developers perform a thorough unit
testing of each software component. They also perform integration testing of all
combined modules.
SYSTEM TESTING
It makes logical assumptions that if all parts of the system are correct
CODE TESTING
After implementing program it is essential to test that complete code
To ensure error free program
Testing checks for two types of errors
Syntax errors
Logical errors.
ADVANTAGES
1. Reliable
2. Economical
3. Easy to use and implement.
4. Prevent unwanted access to systems.
5. When the remote computer is being locked by Network lock,
- None can access remote documents,
- browse the remote computer,
- or use programs on remote computer.
APPLICATIONS
The project entitled Desktop Locking Has been developed o satisfy all proposed
requirements.
The system is highly scalable and user friendly. Almost all the system objectives have
been met. The system has been tested under all criteria.
All phases of development were conceived using methodologies. The software
executes successfully by fulfilling the objectives of the project. Further extensions to
this system can be made required with minor modifications.
REFERENCES
Books Referred:
1. Scott Oaks, Henry Wong, Mike Loukides (Editor), Java Threads Java Series,
OReilly & Associates.
2. Patrick Naughton, Herbert Schildt, Java 2: The Complete Reference, Third
Edition, Tata McGraw-Hill Publishing Company Limited.
3. David Flanagan, Java in a Nutshell, 2nd Edition, May 1997.