Network Intelligent Agent for Collision Detection with ...

1 downloads 0 Views 486KB Size Report
MCAS JOURNAL OF RESEARCH VOL – 1I. Network Intelligent Agent for Collision Detection with Bandwidth Calculation. Syed Navaz A.S1 and Syed Fiaz A.S.2.
MCAS JOURNAL OF RESEARCH VOL – 1I

Network Intelligent Agent for Collision Detection with Bandwidth Calculation Syed Navaz A.S1 and Syed Fiaz A.S.2 1 Assistant Professor, Department of Computer Science, Muthayammal College of Arts & Science, Namakkal, India 2Assistant Professor, Department of Computer Science and Engineering, Dhirajlal Gandhi College of Technology, Salem, India *email: [email protected] Abstract To develop a Network Fault Detection system which will automatically detect the problems in the Network and to develop an Intelligent which will detect the failure in network and uses FTP Protocol for transfer the files between server and client machine. To add the value to this system, Bandwidth calculation module is added. Which transfer files from server to client using FTP Protocol which intern calculates the Bandwidth. Network Fault Detection system will automatically detect the problems in the Network and to develop an Intelligent which will detect the failure in network and uses FTP Protocol for transfer the files between server and client machine. In this Paper, they can calculate the Bandwidth calculation for file transfer

1.0 INTRODUCTION A system is an orderly group of interdependent components linked together according to a plan to achieve a specific objective. Its main characteristics are organization, interaction, interdependence, integration and a central objective. 1.1 SYSTEM ANALYSIS System analysis and design are the application of the system approach to problem solving generally using computers. To reconstruct a system the analyst must consider its elements output and inputs, processors, controls feedback and environment.

Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. One aspect of analysis is defining the boundaries of the system and determining whether or not a candidate system should consider other related systems. During analysis data are collected on the available files decision points and transactions handled by the present system. This involves gathering information and using structured tools for analysis.

Client1

Client2

Network Management System

Client3

S E R V E R

2 EXISTING SYSTEM

MCAS JOURNAL OF RESEARCH VOL – 1I

2.1 DISADVANTAGES 



In the above figure client1 and client 2 can communicate with the server since there is Network connection and can upload the files. There is no network connectivity between client 3 and server, so client 3 cannot make any request to the server.





In this case client 3 has to wait for indefinite time in order to make connection with server. Downloading of files happens in a consequent manner and so takes a long time to complete. If connectivity is lost for some reason, the file has to be downloaded all over again from the beginning.

3 PROPOSED SYSTEM Client1

IA Client2

S

Network IA IA

E

Management

R

System

V

Client3

E R





In our proposed system our Network Fault Detection (NFD) will perform the test in order to check, client can able to communicate with the server. If there is no connectivity our Network Fault Detection (NFD) will generate log file and will be send a mail to member email id.



 

3.1 ADVANTAGES  

When we get the problem if we know the cause of the problem correctly then 50% of our work is over. This fault detection system is used to produce the information regarding the network failure or other problems.



Prevention is better than cure. The Network Fault Detection in this system will inform about the network problem even before it is going to take place. With this system we can save time and cost to a great extent. With the multi-threaded downloading option, multiple files can be downloaded faster. It will allow performing more than one operation simultaneously. If connectivity is lost in between, downloading can be resumed from that point later on.

MCAS JOURNAL OF RESEARCH VOL – 1I

problem even before it is going to take place.

4. PROBLEM STATEMENT As the Internet becomes a critical component of our society, a key challenge is to maintain network availability and reliability. The increasing number of networks is making downtime more costly. Network management tools and techniques must therefore become better at detecting and identifying network faults.



Here we can’t send the files more than 1MB.If we send more than 1MB file, the error report will send to user Email ID.

4.2 Modules 4.2.1 SERVER MODULE

Current fault management implementations generally rely on the expertise of a human network manager. As networks become more complex and changes occur more frequently, the human network manager will find it hard to maintain a sufficient level of expertise on a particular network’s behavior. Fault management research has covered approaches such as expert systems, finite state machines, advanced database techniques, and probabilistic methods.



Admin will login and can create new User. Admin is act in server-side.







Prevention is better than cure. The Network Fault Detection in this system will inform about the network

SYSTEM CONFIGURATION Admin can create the system details with IP Address and edit the details and delete .By using this IP Address, user can check the availability of user.



RECEIVING FILE PATH In server side, Admin is maintaining all the above details. When Client is transfer the files from client machine, server have to receive the file path. Admin have to start the server before transfer the files.



CHANGE PASSWORD Change password option is also available. Admin can change their password when it needs.

4.1 MERITS AND DEMERITS When we get the problem if we know the cause of the problem correctly then 50% of our work is over. This fault detection system is used to produce the information regarding the network failure or other problems.

USER SESSION Admin will login and can create new User. After creating new User admin can view the details of User, edit and delete the user details.

Intelligent agent is one that processes information collected by Simple Network Management Protocol agents and uses it to detect the network anomalies that typically precede a fault. The intelligent agent approach has several benefits. It can detect unknown faults and correlate information in space and time. Also it is possible to make an Intelligent Agent to detect the failure in one of the sub network’s components even before it can be occur.



LOGIN SESSION

4.2.2 

CLIENT MODULE

LOGIN SESSION

User can login and can transfer the files to the corresponding server.



NETWORK TRACKING

In this session, User can check the Fault Detection system which will detect the

MCAS JOURNAL OF RESEARCH VOL – 1I

problems in the Network and to develop an Intelligent which will detect the failure in network. And also detect the lan and local system availability also.



FILE TRANSFER AND BANDWIDTH CALCULATION

In this session, user can transfer the files from client machine to server machine. If user can send more than that limited size file, it will show some Message and that message is send to user E-mail. By mail, user can identify the problem. In this Paper main concept is Bandwidth calculation. Here while transfer the file from client to server user can calculate the bandwidth also.



CHANGE PASSWORD: Change password option is also available. User can change their password when it needs.

5. SYSTEM DESIGN 5.1 LOGICAL DESIGN Design for Web Apps encompasses technical and non-technical activities. The look and feel of content is developed as part of graphic design; the aesthetic layout of the user interface is created as part of interface design; and the technical structure of the Web App is modeled as part of architectural and navigational design. This argues that a Web engineer must design an interface so that it answers three primary questions for the end-user: 1. Where am I? – The interface should (1) provide an indication of the WebApp has been accessed and (2) inform the user of her location in the content. 2.

What can I do now? – The interface should always help the user understand his current options- what functions are available, what links are live, what content is relevant.

3.

Where have I been; where am I going? – The interface must facilitate navigation. Hence it must provide a “map” of where the user has been and what paths may be taken to move elsewhere in the WebApp.

5.2 DESIGN GOALS – the following are the design goals that are applicable to virtually every WebApp regardless of application domain, size, or complexity. 1. 2. 3. 4. 5.

Simplicity Consistency Identity Visual appeal Compatibility.

Design leads to a model that contains the appropriate mix of aesthetics, content, and technology. The mix will vary depending upon the nature of the WebApp, and as a consequence the design activities that are emphasized will also vary. THE ACTIVITIES OF THE DESIGN PROCESS 1. Interface design-describes the structure and organization of the user interface. Includes a representation of screen layout, a definition of the modes of interaction, and a description of navigation mechanisms. Interface Control mechanisms- to implement navigation options, the designer selects form one of a number of interaction mechanism; a. Navigation menus b. Graphic icons c. Graphic images Interface Design work flow- the work flow begins with the identification of user, task, and environmental requirements. Once user tasks have been identified, user scenarios are created and analyzed to define a set of interface objects and actions.

MCAS JOURNAL OF RESEARCH VOL – 1I

2. Aesthetic design-also called graphic design, describes the “look and feel” of the WebApp. Includes color schemes, geometric layout. Text size, font and placement, the use of graphics, and related aesthetic decisions. 3. Content design-defines the layout, structure, and outline for all content that is presented as part of the WebApp. Establishes the relationships between content objects. 4. Navigation design-represents the navigational flow between contents objects and for all WebApp functions. 5. Architecture design-identifies the overall hypermedia structure for the WebApp. Architecture design is tied to the goals establish for a WebApp, the content to be presented, the users who will visit, and the

navigation philosophy that has been established. a. Content architecture, focuses on the manner in which content objects and structured for presentation and navigation. b. WebApp architecture, addresses the manner in which the application is structure to manage user interaction, handle internal processing tasks, effect navigation, and present content. WebApp architecture is defined within the context of the development environment in which the application is to be implemented.

MVC Architecture

6. Component design-develops the detailed processing logic required to implement function.

a system and has to be analyzed and designed with the most consideration. The decisions made during the input design are:

6. INPUT DESIGN Input design is one of the most expensive phases of the operation of computerized system and is often the major problem of a system. A large number of problems with the system can usually be traced back to fault input design and method. Needless to say, therefore that the input data is the life block of



To provide cost effective method of input.



To achieve the highest possible level of accuracy.



To ensure that input is understood by the user.

MCAS JOURNAL OF RESEARCH VOL – 1I

System analysts decide the following input design details like, what data item to input, what medium to use, how the data should be arranged or coded data items and transaction needing validations to detect errors and at last the dialogue to guide users in providing input. Input data of a system may not be necessarily a raw data captured in the system form scratch. These can also be the output of another system or sub-system. The design of input covers all phases of input from the certain of initial data to actual entering the data to the system for processing.

7.

OUTPUT DESIGN Output design generally refers to the results and information that are generated by the system. For many end-users, output is the main reason for developing the system and the basis on which they evaluate the usefulness of the application. The objective of a system finds its shape in terms of output. The analysis of the objective of a system leads to determination of outputs. Outputs of a system can take various forms. The most common are reports, screens displays printed form, graphical drawing etc. the outputs vary in terms of their contents, frequency, timing and format. The users of the output, its purpose and sequence of details to be printed are all considered. When designing output, the system analyst must accomplish things like, to determine what information to be present, to decide whether to display or print the information and select the output medium to distribute the output to intended recipients. External outputs are those, whose destination will be outside the organization and which require special attention as the paper image of the organization. Internal outputs are those, whose destination is within the

organization. It is to be carefully designed, as they are the user’s main interface with the system. Interactive outputs are those, which the user uses in communication directly with the computer.

8. SYSTEM IMPLEMENTATION The purpose of System Implementation can be summarized as follows: making the new system available to a prepared set of users (the deployment), and positioning on-going support and maintenance of the system within the Performing Organization (the transition). At a finer level of detail, deploying the system consists of executing all steps necessary to educate the Consumers on the use of the new system, placing the newly developed system into production, confirming that all data required at the start of operations is available and accurate, and validating that business functions that interact with the system are functioning properly. Transitioning the system support responsibilities involves changing from a system development to a system support and maintenance mode of operation, with ownership of the new system moving from the Paper Team to the Performing Organization. A key difference between System Implementation and all other phases of the lifecycle is that all paper activities up to this point have been performed in safe, protected, and secure environments, where paper issues that arise have little or no impact on day-to-day business operations. Once the system goes live, however, this is no longer the case. Any miscues at this point will almost certainly translate into direct operational and/or financial impacts on the Performing Organization. It is through the careful planning, execution, and management of System Implementation activities that the

MCAS JOURNAL OF RESEARCH VOL – 1I

Paper Team can minimize the likelihood of these occurrences, and determine appropriate contingency plans in the event of a problem. 8.1 LIST OF PROCESS



This phase consists of the following processes: Prepare for System Implementation, where all steps needed in advance of actually deploying the application are performed, including preparation of both the production environment and the Consumer communities.



Deploy System, where the full deployment plan, initially developed during System Design and evolved throughout subsequent lifecycle phases, is executed and validated.



Transition to Performing Organization, where responsibility for and ownership of the application are transitioned from the Paper Team to the unit in the Performing Organization that will provide system support and maintenance.

9.0. CONCLUSION The paper ” Intelligent Agent for Network Fault Detection with Bandwidth Calculation” is developed using c# as the Front End with MS-SQL Server 2000 as the Back End. ADO.Net is used in this paper to link Dot Net and MS-SQL Server. Dot Net is a unified web platform that provides all the services necessarily required to build enterprise-class applications. Thus the paper conforms to the requirement specification stated in the beginning. This system is tested in LAN as well as WAN network and samples data are given. It shows

successful result and it meet all the constrains in the scope of the paper 10.0 FUTURE ENHANCEMENT: This system is developed as windows based application, it can be converted into memory resistant application .Each time users boots the system, it automatically checks for the fault detection. Literature Cited

1. Andreica, MI., Dragus¸ A., Sambotin, AD. and Apus¸ NT. (2010). Towards a (Multi-) UserCentric Stack of (Multi-) Point-to(Multi-) Point Communication Services”, in Proc. 5th Worksh. Enhanced Web Service. Technology. WEWST, Ayia Napa, Cyprus, 36–45. 2. Stanciu, V., Ionut¸ M. and Andreica. (2012). “Design and development of a UDP-Based Connection-Oriented Multi-Stream One-to-Many Communication Protocol. 3. Stalvig, P. (2007). “Introduction to the Stream Control Transmission Protocol (SCTP)” Oct. 4. Syed Fiaz, AS., Alsheba, I. and Meena, R. “Using Neural Networks to Create an Adaptive Character Recognition System”,2015. Discovery - The International Daily journal, 37(168), 53-58, ISSN 2278 – 5469 EISSN 2278 – 5450. 5. Stewart, R. RFC 4960 “Stream Control Transmission Protocol” September 2007. 6. David, A., Hayes, Jason, But., Grenville Armitage. (1998) ”Issues with Network Address Translation for SCTP”

MCAS JOURNAL OF RESEARCH VOL – 1I

7. Shwartz and Weiss, A. (1995). Large Deviations for Performance Analysis: Queues, Communications, and Computing. London, U.K.: Chapman & Hall. 8. Dembo and Zeitouni, O. (1998). Large Deviations Techniques and Applications, 2nd ed. New York: Springer-Verlag. 9. Elwalid and Mitra, D. (1993). “Effective bandwidth of general Markovian traffic sources and admission control of high speed networks,” IEEE/ACM Trans. Netw., vol. 1(3); 329–343.

10. Karthik Raj, C., Revanth, A. and Karthick, K. (2010). “Tactile Sensing System Using Artificial Neural Networks” Journal of Nano Science & Nano Technology, Vol 2, (6); 670-673. 11. Durairaj, K., Jeevanandham, S., Rajkumar, M. and Selvakumar, R. (2014). “Multi Interface Mobility Management with SIP and MIP (To Avoid Handoff Delay)” International Journal of Computer Science and Mobile Computing, 3(5); 184-191.

Suggest Documents