11810621075 ramapriyan g

Upload: mohankumar-ramachandran

Post on 02-Apr-2018

218 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 11810621075 ramapriyan g

    1/62

    VIRTUAL ENGINEERING SYSTEM BASED ON

    VIRTUAL ROUTING TOPOLOGY

    By

    RAMAPRIYAN G

    (Reg. No: 11810621075)

    VELTECH MULTITECH

    Dr. RANGARAJAN Dr. SAKUNTHALA ENGINEERING COLLEGE

    An ISO 9001:2000 Certified Institution

    Accredited By National Board of Accreditation

    #42&60, AvadiAlamathi Road, Chennai600 062.

    A PROJECT REPORT

    Submitted to the

    Faculty of Information and Communication Engineering

    MASTER OF COMPUTER APPLICATIONS

    In the partial fulfillment of the requirements

    For the award of the degree

    Of

    MASTER OF COMPUTER APPLICATIONS

    ANNA UNIVERSITY: CHENNAI600 025

    JULY2013

  • 7/27/2019 11810621075 ramapriyan g

    2/62

    VELTECH MULTITECH

    Dr. RANGARAJAN Dr. SAKUNTHALA ENGINEERING COLLEGE

    An ISO 9001: 2008 Certified Institution

    Accredited by National Board of Accreditation

    Approved by AICTE, New Delhi(Owned by Vel Trust 1997)

    BONAFIDE CERTIFICATE

    Certified that this project report titled VIRTUAL ENGINEERING SYSTEM BASED

    ON VIRTUAL ROUTING TOPOLOGY is the bonafide work of Mr.

    G.RAMAPRIYAN(11810621075) who carried out the project work under my supervision.

    Certified further, that to the best of my knowledge the work reported herein does not form part of

    any other project report or dissertation on the basis of which a degree or award was conferred on

    an earlier occasion on this or any other candidate.

    INTERNAL SUPERVISIOR HEAD OF THE DEPARTMENT

    INTERNAL EXAMINER EXTERNAL EXAMINER

  • 7/27/2019 11810621075 ramapriyan g

    3/62

    ACKNOWLEDGEMENT

    I sincerely thanks to Our Honorable Founder & Chairman of VELTECH

    INSTITUTIONS COL. PROF.Dr. Vel R.RANGARAJAN, B.E.(Elec), B.E.(Mech),

    M.S.(Auto), D.Sc and Vice-Chairman Dr. Smt R.SAKUNTHALA RANGARAGAN,

    M.B.B.S for his sincere endeavor in educating us in their Premier institution.

    I take this opportunity to thank the Principal Dr. V. PARTHASARATHY B.E., M.E.,

    MBA., Ph.D of this prestigious VELTECH MULTITECH Dr. RANGARAJAN Dr.

    SAKUNTHALA ENGINEERING COLLEGE, for his kind cooperation in completing this

    project.

    I express my sincere thanks to Mr. M.NEW BEGIN MCA.,M.Tech., Head Of The

    Department for having inspired me and providing me with all the amenities inside our college

    campus.

    I sincerely thank my internal guide, Mrs.R. LATHA MCA,ME., whose guidance this

    project would not have been completed successfully.

    I express my sincere thanks and gratitude to MISS. R.SUPRAJA.M.C.A, Project

    Developer, HINDUSTAN AUTOMATION SOLUTIONS my external guide, for his valuable

    advice and guidance to complete the project.

    I have great pleasure in expressing my profound sense of gratitude to the technical support

    staff and the non- teaching staff of our department.

    Finally I thank my parents and my friends who had helped me in doing this project

    successfully. Special thanks to my lovable parents who provided not only the financial support

    but also moral support and without whom this project would not have been possible at all.

  • 7/27/2019 11810621075 ramapriyan g

    4/62

  • 7/27/2019 11810621075 ramapriyan g

    5/62

    ABSTRACT

    To avoid network congestion and subsequent service disruptions is one of the key tasks

    performed by contemporary network management systems. Given the simple but rigid routing

    and forwarding functionalities in IP base environments, efficient resource management and

    control solutions against dynamic traffic conditions is still yet to be obtained. An efficient traffic

    engineering and management system that performs adaptive traffic control by using multiple

    virtualized routing topologies.

    The proposed system consists of two complementary components: offline link weight

    optimization that takes as input the physical network topology and tries to produce maximum

    routing path diversity across multiple virtual routing topologies for long term operation through

    the optimized setting of link weights.

    Based on these diverse paths, adaptive traffic control performs intelligent traffic splitting

    across individual routing topologies in reaction to the monitored network dynamics at short

    timescale. It provides traffic traces to the IGP base environments.

  • 7/27/2019 11810621075 ramapriyan g

    6/62

    S.NO CONTENTS PAGE NO1. INTRODUCTION

    1.1Company Profile1.2Introduction about the project 13

    2 SYSTEM STUDY

    2.1 Existing System

    2.2 Disadvantages of Existing System

    2.3 Proposed System and its Advantages2.4 Problem Definition and Description

    5567

    3 SYSTEM ANALYSIS

    3.1 Hardware Specification

    3.2 Software Specification3.3 Operational Feasibility

    3.4 Economical feasibility

    3.5 Technical feasibility

    9999

    10

    4 SYSTEM DESIGN

    4.1 Architectural Design4.2 Data Flow Diagram

    4.3 UML Diagram

    4.4 I/O Form Design

    121314

    18

    5 CODING AND DEBUGGING

    5.1 Functional DocumentationModule Explanation5.2 Special features of Languages

    5.3 Sample Code

    213438

    6 TESTING6.1 Types of Testing6.2 User Interface Testing (form with validation)

    4246

    7 SYSTEM IMPLEMENTATION

    7.1 Scope for Future Development 48

    8 CONCLUSION

    8.1 Bibliography

    8.2 References

    5155

  • 7/27/2019 11810621075 ramapriyan g

    7/62

    INTRODUCTION

  • 7/27/2019 11810621075 ramapriyan g

    8/62

    1

    CHAPTER 1

    1.INTRODUCTION

    1.1 COMPANY PROFILE

    We are Chennai based leading company engaged in supplying of electrical and

    automation systems for various industrial segments. Hindustan Automation Solutions has always

    been a customer oriented firm which makes sincere efforts to manufacture and supply latest and

    useful software and hardware for its valuable clientele across India. Today's world revolves

    around high technology & most companies have invested substantially in automated plants. For

    this reason most manufacturing companies are looking for competent engineers with basic

    aptitude towards automation and ability to work on varied brands of PLCs, Drives, MMI and

    SCADA. High levels of technical skills are required to keep it going in operations &

    maintenance. This prompted us to enter in this business domain.

    The company has been offering industrial automation/process automation, since its

    inception. We also provide trained manpower in PLC automation and after sales services to

    several industries at nominal charges. Apart from this, our centre in Chennai offers excellent

    training for engineering students, industry professionals, and freshers. We also conduct courses

    in the field of PLC & SCADA which are extremely useful for companies interested in

    automation trainings to update the skills of their technical persons, students undergoing summer

    training, working professionals engaged in project/maintenance/production/design/application

    engineering departments.

    Our Mission

    To provide unique solutions in safety application domain.

    To offer all kinds of solutions in embedded processor technology.

    To provide total solution to our customers right from design, development, manufacture,

    supply, installation, and commissioning on turnkey basis.

    Manufacture and supply outstanding software and hardware at cost efficient prices.

    Our Experts

    Our expert team of professionals comprises of software and hardware engineers, R&D

    personnel, and other technocrats having mastery in embedded processor technology, process

  • 7/27/2019 11810621075 ramapriyan g

    9/62

    2

    automation etc. We, at Hindustan Automation Solutions are known for our quality PLC &

    SCADA training and project related with software and hardware.

    Our dedicated and innovative team is the only reason for our huge success in this

    competitive market. Our people possess expertise in offering all sorts of after sales and services

    in industrial automation/process automation fields at cost effective prices to our clientele which

    is spread across the country. With their sincere and untiring efforts, we have gained a distinct

    position in this business domain.

  • 7/27/2019 11810621075 ramapriyan g

    10/62

    3

    1.2 INTRODUCTION ABOUT THE PROJECT

    Handling traffic dynamics in order to avoid network congestion and subsequent service

    disruptions is one of the key tasks performed by contemporary network management systems.

    Given the simple but rigid routing and forwarding functionalities in IP base environments,

    efficient resource management and control solutions against dynamic traffic conditions is still yet

    to be obtained. An efficient traffic engineering and management system that performs adaptive

    traffic control by using multiple virtualized routing topologies.

    The proposed system consists of two complementary components: offline link weight

    optimization that takes as input the physical network topology and tries to produce maximum

    routing path diversity across multiple virtual routing topologies for long term operation through

    the optimized setting of link weights.

    Based on these diverse paths, adaptive traffic control performs intelligent traffic splitting

    across individual routing topologies in reaction to the monitored network dynamics at short

    timescale. It provides traffic traces to the IGP base environments.

  • 7/27/2019 11810621075 ramapriyan g

    11/62

    4

    SYSTEM STUDY

  • 7/27/2019 11810621075 ramapriyan g

    12/62

    5

    CHAPTER 2

    2.SYSTEM STUDY

    2.1 Existing system

    In Existing System, IGP-based TE mechanisms are only confined to offline operation and

    hence cannot cope efficiently with significant traffic dynamics. There are well known reasons for

    this limitation: IGP-based TE only allows forstatic traffic delivery through native IGP paths,

    without flexible traffic splitting for dynamic load balancing.

    In addition, changing IGP link weights in reaction to emerging network congestion may

    cause routing re-convergence problems that potentially disrupt ongoing traffic sessions. In effect,

    it has been recently argued that dynamic/online route re computation is to be considered harmful

    even in the case of network failures, let alone for dealing with traffic dynamics.

    Disadvantage

    It exhibit operational inefficiencies due to frequent and significant traffic dynamics inoperational networks.

    TE configuration is not deemed as an efficient approach for resource optimization. TE mechanisms are only confined to offline operation and hence cannot cope efficiently

    with significant traffic dynamics.

    An emerging network congestion may cause routing re-convergence problems thatpotentially disrupt ongoing traffic sessions.

    Re-computation is to be considered harmful even in the case of network failures.

  • 7/27/2019 11810621075 ramapriyan g

    13/62

    6

    2.2 Proposed System And Its Advantages

    In proposed system consists of two complementary components: offline link weightoptimization that takes as input the physical network topology and tries to produce

    maximum routing path diversity across multiple virtual routing topologies for long term

    operation through the optimized setting of link weights.

    Based on these diverse paths, adaptive trafficcontrolperforms intelligent traffic splittingacross individual routing topologies in reaction to the monitored network dynamics at

    short timescale.

    According to our evaluation with real network topologies and traffic traces, the proposed system

    is able to cope almost optimally with unpredicted traffic dynamics and, as such, it constitutes a

    new proposal for achieving better quality of service and overall network performance in IP

    networks.

    ADVANTAGE

    The two operational networks shows good path diversity performance. A high chance of achieving near-optimal Traffic Engineering performance. The global view of the network, enabling it to achieve a global optimum in traffic

    control.

    AMPLE can substantially reduce the Maximum Link Utilization for most of the traffictraces.

  • 7/27/2019 11810621075 ramapriyan g

    14/62

    7

    2.3 Problem Definition and Description

    Problem and definition

    IGP-based TE mechanisms are only confined to offline operation and hence cannot cope

    efficiently with significant traffic dynamics. There are well known reasons for this limitation:

    IGP-based TE only allows forstatic traffic delivery through native IGP paths, without flexible

    traffic splitting for dynamic load balancing.

    In addition, changing IGP link weights in reaction to emerging network congestion may

    cause routing re-convergence problems that potentially disrupt ongoing traffic sessions. In effect,

    it has been recently argued that dynamic/online route re computation is to be considered harmful

    even in the case of network failures, let alone for dealing with traffic dynamics.

    .

    Descriptions

    It exhibit operational inefficiencies due to frequent and significant traffic dynamics in

    operational networks.TE configuration is not deemed as an efficient approach for

    resource optimization.

    TE mechanisms are only confined to offline operation and hence cannot cope efficiently

    with significant traffic dynamics.An emerging network congestion may cause routing re-

    convergence problems that potentially disrupt ongoing traffic sessions.

    Re-computation is to be considered harmful even in the case of network failures.

  • 7/27/2019 11810621075 ramapriyan g

    15/62

    8

    SYSTEM ANALYSIS

  • 7/27/2019 11810621075 ramapriyan g

    16/62

    9

    CHAPTER 3

    3.SYSTEM ANALYSIS

    3.1 HARDWARE REQUIREMENTS:

    System : Pentium IV 2.4 GHz.

    Hard Disk : 40 GB.

    Monitor : 15 VGA Color.

    Mouse : Logitech.

    Ram : 512 Mb.

    3.2 SOFTWARE REQUIREMENTS

    Operating system : Windows XP.

    Coding Language : C# .NET

    3.3 Operational Feasibility

    All projects are feasible to give an unlimited resources and infinite time. Feasibility and

    risk analyses are related in many ways. If project risk is great, the Feasibility of producing

    quality software is reduced. It is the authority to decide the worth of the project.

    3.3 Economical Feasibility

    This study is carried out to check the economic impact that the system will have on the

    organization. The amount of fund that the company can pour into the research and development

    of the system is limited.

    The expenditures must be justified. Thus the developed system as well within the

    budget and this was achieved because most of the technologies used are freely available. Only

    the customized products had to be purchased.

  • 7/27/2019 11810621075 ramapriyan g

    17/62

    10

    3.4 Technical Feasibility

    The factor associated with technical feasibility is technology. Technical Feasibility exists

    with computer system, with available resources to run my work. Therefore need does not arise to

    go in for the updating of existing configuration.

    Development Risk

    The System element is designed so that necessary function and performance are achieved

    within constraints.

    Resource availability

    The hardware and software resources are available to build the system

  • 7/27/2019 11810621075 ramapriyan g

    18/62

    11

    SYSTEM DESIGN

  • 7/27/2019 11810621075 ramapriyan g

    19/62

    12

    CHAPTER 4

    4. SYSTEM DESIGN

    4.1 Architectural Diagram

  • 7/27/2019 11810621075 ramapriyan g

    20/62

    13

    4.2 Data Flow Diagram

    SERVER DESTINATION

    IP Address

    Browse aFile

    no

    Router

    FIle Transfer

    IP Address

    Connecting..

    Flle Received

    SocketConnection

    Browse areceived path

    End

    Connecting..

    checkno

    yes

    Start FileReceiving

    Routing

    Carry & Forward Transmission

    yes

    File NotReceived

    socketconnection?

    yes

    signal?

    no

    Adaptive Traffic Control

    maximumlink utilization Performance

    Graph

  • 7/27/2019 11810621075 ramapriyan g

    21/62

    14

    4.3 UML Diagram

    4.3.1 USECASE DIAGRAM

  • 7/27/2019 11810621075 ramapriyan g

    22/62

    15

    4.3.2 CLASS DIAGRAM

  • 7/27/2019 11810621075 ramapriyan g

    23/62

    16

    4.3.3 ACTIVITY DIAGRAM:

    DESTINATION

    Select aReceiving Path

    Connecting..

    Browse

    FILE RECEIVE

    IP Address

    Browse aFile

    NO

    Yes

    FILE TRANSFER

    socketconeection

    TRANSACTIONFAILED

    IP Address

    Client socketconnection

    checkNO

    File NotReceived

    Start FileReceiving

    Yes

    Traffic signal?Connecting..

    Carry & Forward Transmission

    maximumlink utilization Performance

    Yes

    ROUTING..

    ROUTERSERVER

    NO

    GRAPH

    Adaptive Traffic Control

  • 7/27/2019 11810621075 ramapriyan g

    24/62

    17

    4.3.4 Sequence Diagram

    SERVER DESTINATIONROUTER

    Socket Connection

    Socket Connection

    Start File Transfer

    Routing

    Bytes Received

    File Transferred Success

    File Received

    Bytes Transferred

    Routing Finish

    Ackno ledgement

    Acknowledgement

    Adaptive Traffic Control

  • 7/27/2019 11810621075 ramapriyan g

    25/62

    18

    4.4 Input Design

    The input design is the link between the information system and the user. It comprises the

    developing specification and procedures for data preparation and those steps are necessary to put

    transaction data in to a usable form for processing can be achieved by inspecting the computer to

    read data from a written or printed document or it can occur by having people keying the data

    directly into the system. The design of input focuses on controlling the amount of input required,

    controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The

    input is designed in such a way so that it provides security and ease of use with retaining the

    privacy. Input Design considered the following things:

    What data should be given as input? How the data should be arranged or coded? The dialog to guide the operating personnel in providing input. Methods for preparing input validations and steps to follow when error occur.

  • 7/27/2019 11810621075 ramapriyan g

    26/62

    19

    OBJECTIVES

    1.Input Design is the process of converting a user-oriented description of the input into a

    computer-based system. This design is important to avoid errors in the data input process and

    show the correct direction to the management for getting correct information from the

    computerized system.

    2.It is achieved by creating user-friendly screens for the data entry to handle large volume

    of data. The goal of designing input is to make data entry easier and to be free from errors. The

    data entry screen is designed in such a way that all the data manipulates can be performed. It also

    provides record viewing facilities.

    3. When the data is entered it will check for its validity. Data can be entered with the help

    of screens. Appropriate messages are provided as when needed so that the user

    will not be in maize of instant. Thus the objective of input design is to create an input layout that

    is easy to follow

  • 7/27/2019 11810621075 ramapriyan g

    27/62

    20

    CODING

    AND

    DEBUGGING

  • 7/27/2019 11810621075 ramapriyan g

    28/62

    21

    CHAPTER 5

    5. CODING AND DEBUGGING

    5.1 FUNCTIONAL DOCUMENTATIONMODULE EXPLANATION

    5.1.1 FUNCTIONAL DOCUMENTATION

    Implementation is the stage of the project when the theoretical design is turned out into a

    working system. Thus it can be considered to be the most critical stage in achieving a successful

    new system and in giving the user, confidence that the new system will work and be effective.

    The implementation stage involves careful planning, investigation of the existing system

    and its constraints on implementation, designing of methods to achieve changeover and

    evaluation of changeover methods.

    MODUELS

    Traffic Engineering System Server Routing Data Transmit Virtual Routing Topology

    TRAFFIC ENGINEERING SYSTEM

    MT-IGP paths according to the link weights computed. Monitored network and Thediverse traffic data such as incoming traffic volume and link utilizations. At each short-

    time interval, In this engineering system holds on local traffic volume. It managing

    monitoring agent. This functionality is handled by a centralized TE manager who has

    complete knowledge of the network topology and periodically gathers the up-to-date

    monitored traffic conditions of the operating network., who use this configuration for

  • 7/27/2019 11810621075 ramapriyan g

    29/62

    22

    remarking the multi-topology identifiers (MTIDs) of their locally originated traffic

    accordingly.

    SERVER ROUTING

    To start the server. server enter the ip address to the destination for accept the datadownload. Server interact the client and check the processing traffic engineering system.

    how opportunistic VRT to VRT communication complement the infrastructure-based

    connectivity, so to speed up the download process. It is however easy to foresee that the

    availability of onboard communication capabilities will also determine a significant

    increase in the number of clients.

    DATA TRANSMIT

    Data transmit from server to receiver has be done by selecting the particular ip address ofthe receiver . data send through the traffic engineering system offline link weight

    optimization that takes as input the physical networktopology and tries to produce

    maximumrouting path diversity across multiple virtualrouting topologies for long term

    operationthrough the optimized setting of link weights. Based on these diverse paths.

    VIRTUAL ROUTING TOPOLOGY

    Data traversal via virtual routing toplogy.If any traffic occurs.adaptive trafficcontrolperforms intelligent traffic splitting across individual routing topologies in reactionto the

    monitored network dynamics at short timescale. unpredicted traffic dynamics and, as

    such, it constitutes a new proposal for achieving better quality of service and overall

    network performance in IP networks. Finally reached the destination .Routing topology

    monitoring the network. to boost up the network strength.

  • 7/27/2019 11810621075 ramapriyan g

    30/62

    23

    SCREEN SHOTS

    1.SERVER INITIAL STATE

  • 7/27/2019 11810621075 ramapriyan g

    31/62

    24

    2.VIRTUAL ROUTING

  • 7/27/2019 11810621075 ramapriyan g

    32/62

    25

    3.DESTINATION

  • 7/27/2019 11810621075 ramapriyan g

    33/62

    26

    4.TARGET WAIT FOR DATA

  • 7/27/2019 11810621075 ramapriyan g

    34/62

    27

    5.BROUSE FILE

  • 7/27/2019 11810621075 ramapriyan g

    35/62

    28

    6.SERVER STARTING

  • 7/27/2019 11810621075 ramapriyan g

    36/62

    29

    7.ROUTING

  • 7/27/2019 11810621075 ramapriyan g

    37/62

    30

    8.ROUTING PATHS

  • 7/27/2019 11810621075 ramapriyan g

    38/62

    31

    9.DESTINATION

  • 7/27/2019 11810621075 ramapriyan g

    39/62

    32

    10.BLIND CHART

  • 7/27/2019 11810621075 ramapriyan g

    40/62

    33

    11.CONSTRAINED CHART

  • 7/27/2019 11810621075 ramapriyan g

    41/62

    34

    5.2 SPECIAL FEATURES OF LANGUAGES

    5.2.1 ABOUT C#.NET

    C# is an elegant and type-safe object-oriented language that enables developers tobuild a variety of secure and robust applications that run on the .NET Framework. Visual C#

    2008 provides an advanced code editor, convenient user interface designers, integrated debugger,

    and many other tools to make it easier to develop applications based on version 3.0 of the C#

    language and version 3.5 of the .NET Framework. Built-in or custom components, simplifying

    the code of a page.

    C# syntax is highly expressive, yet it is also simple and easy to learn. The curly-brace

    syntax of C# will be instantly recognizable to anyone familiar with C, C++ or Java. Developers

    who know any of these languages are typically able to begin to work productively in C# within a

    very short time. C# syntax simplifies many of the complexities of C++ and provides powerful

    features such as nullable value types, enumerations, delegates, lambda expressions and direct

    memory access, which are not found in Java. C# supports generic methods and types, which

    provide increased type safety and performance, and integrators, which enable implementers of

    collection classes to define custom iteration behaviors that are simple to use by client code. In C#

    3.0, Language-Integrated Query (LINQ) expressions make the strongly-typed query a first-classlanguage construct.

    As an object-oriented language, C# supports the concepts of encapsulation, inheritance,

    and polymorphism. All variables and methods, including the Main method, the application's

    entry point, are encapsulated within class definitions. A class may inherit directly from one

    parent class, but it may implement any number of interfaces. Methods that override virtual

    methods in a parent class require the override keyword as a way to avoid accidental redefinition.

    In C#, a struct is like a lightweight class; it is a stack-allocated type that can implement interfaces

    but does not support inheritance.

    In addition to these basic object-oriented principles, C# makes it easy to develop software

    components through several innovative language constructs, including the following

    Encapsulated method signatures called delegates, which enable type-safe event notifications.

  • 7/27/2019 11810621075 ramapriyan g

    42/62

    35

    Properties, which serve as assessors for private member variables. Attributes, which

    provide declarative metadata about types at run time. Inline XML documentation comments.

    Language-Integrated Query (LINQ) which provides built-in query capabilities across a variety of

    data sources.

    Interop enables C# programs to do almost anything that a native C++ application can do.

    C# even supports pointers and the concept of "unsafe" code for those cases in which direct

    memory access is absolutely critical.

    The C# build process is simple compared to C and C++ and more flexible than in Java.

    There are no separate header files, and no requirement that methods and types be declared in a

    particular order. A C# source file may define any number of classes, structs, interfaces, and

    events.

    5.2.2 .NET Framework Platform Architecture

    C# programs run on the .NET Framework, an integral component of Windows that

    includes a virtual execution system called the common language runtime (CLR) and a unified set

    of class libraries. The CLR is the commercial implementation by Microsoft of the common

    language infrastructure (CLI), an international standard that is the basis for creating execution

    and development environments in which languages and libraries work together seamlessly.

    Source code written in C# is compiled into an intermediate language (IL) that conforms

    to the CLI specification. The IL code and resources, such as bitmaps and strings, are stored on

    disk in an executable file called an assembly, typically with an extension of .exe or .dll. An

    assembly contains a manifest that provides information about the assembly's types, version,

    culture, and security requirements.

    When the C# program is executed, the assembly is loaded into the CLR, which might

    take various actions based on the information in the manifest. Then, if the security requirements

    are met, the CLR performs just in time (JIT) compilation to convert the IL code to native

    machine instructions. The CLR also provides other services related to automatic garbage

    collection, exception handling, and resource management. Code that is executed by the CLR is

  • 7/27/2019 11810621075 ramapriyan g

    43/62

    36

    sometimes referred to as "managed code," in contrast to "unmanaged code" which is compiled

    into native machine language that targets a specific system. The following diagram illustrates the

    compile-time and run-time relationships of C# source code files, the .NET Framework class

    libraries, assemblies, and the CLR.

    Language interoperability is a key feature of the .NET Framework. Because the IL code

    produced by the C# compiler conforms to the Common Type Specification (CTS), IL code

    generated from C# can interact with code that was generated from the .NET versions of Visual

    Basic, Visual C++, or any of more than 20 other CTS-compliant languages. A single assembly

    may contain multiple modules written in different .NET languages, and the types can reference

    each other just as if they were written in the same language.

    In addition to the run time services, the .NET Framework also includes an extensive

    library of over 4000 classes organized into namespaces that provide a wide variety of useful

    functionality for everything from file input and output to string manipulation to XML parsing, to

  • 7/27/2019 11810621075 ramapriyan g

    44/62

    37

    Windows Forms controls. The typical C# application uses the .NET Framework class library

    extensively to handle common "plumbing" chores.

    Most times, applications will ask for a particular version of the framework to be installed.

    We'd recommend avoiding installing that particular version, and trying instead to install the most

    up-to-date version of .NET, assuming your Windows OS supports it. Most .NET packages have

    backwards compatibility, so an app asking for the 2.0 framework can usually get by with what's

    packaged into the latest version:.Net Framework 4. Be sure, too, that you're settled up on your

    Windows Update requests, as there may be relevant system patches that need installing before

    .NET will fit comfortably on your system.

  • 7/27/2019 11810621075 ramapriyan g

    45/62

    38

    SAMPLE CODE

    using System;using System.Collections.Generic;using System.ComponentModel;using System.Data;using System.Drawing;using System.Linq;using System.Text;

    using System.Windows.Forms;using System.Net.Sockets;using System.Net;

    using System.IO;using System.Globalization;

    namespace ServerSource

    {publicpartialclassForm1 : Form{

    string ser1;string fileDes, fileini;int len;

    public Form1(){

    InitializeComponent();

    }

    privatevoid Form1_Load(object sender, EventArgs e){

    btntransform.Enabled = false;this.openFileDialog1.Multiselect = true;

    }

    privatevoid btnbrowse_Click(object sender, EventArgs e){

    txtFilePath.Text = "";

    openFileDialog1.ShowDialog();txtFilePath.Text = openFileDialog1.FileName;fileDes = openFileDialog1.FileName;

    if (fileDes == "openFileDialog1"){

    lblError.Text = "";lblError.ForeColor = System.Drawing.Color.Red;lblError.Text = "Select a File first";txtFilePath.Text = "";

    btntransform.Enabled = false;}else{

    pictureBox7.Visible = true;pictureBox7.Image = ServerSource.Properties.Resources.loading;Application.DoEvents();System.Threading.Thread.Sleep(1000);pictureBox7.Image = ServerSource.Properties.Resources.upload_success;Application.DoEvents();

  • 7/27/2019 11810621075 ramapriyan g

    46/62

    39

    len = fileDes.Length;fileini = fileDes.Substring(fileDes.IndexOf("\\") + 1);btntransform.Enabled = true;

    }}

    privatevoid btntransform_Click(object sender, EventArgs e)

    {send();

    }

    publicvoid send(){

    try{

    IPAddress[] ipAddress = Dns.GetHostAddresses(txtIp.Text);IPEndPoint ipEnd = newIPEndPoint(ipAddress[0], 5655);Socket clientSock = newSocket(AddressFamily.InterNetwork,

    SocketType.Stream, ProtocolType.IP);string filePath = "";int count = 0;

    fileDes = fileDes.Replace("\\", "/");while (fileDes.IndexOf("/") > -1){

    filePath += fileDes.Substring(0, fileDes.IndexOf("/") + 1);fileDes = fileDes.Substring(fileDes.IndexOf("/") + 1);count++;

    }

    byte[] fileNameByte = Encoding.ASCII.GetBytes(fileDes);

    lblError.Text = "";lblError.Text = "Buffering ...";byte[] fileData = File.ReadAllBytes(filePath + fileDes);

    byte[] clientData = newbyte[4 + fileNameByte.Length + fileData.Length];byte[] fileNameLen = BitConverter.GetBytes(fileNameByte.Length);

    fileNameLen.CopyTo(clientData, 0);fileNameByte.CopyTo(clientData, 4);fileData.CopyTo(clientData, 4 + fileNameByte.Length);

    lblError.Text = "";lblError.Text = "Connection to server ...";clientSock.Connect(ipEnd);

    lblError.Text = "";lblError.Text = "File sending...";pictureBox8.Image = ServerSource.Properties.Resources._2_computers;

    Application.DoEvents();System.Threading.Thread.Sleep(2000);

    clientSock.Send(clientData);

    lblError.Text = "File sending...";

    Application.DoEvents();

  • 7/27/2019 11810621075 ramapriyan g

    47/62

    40

    lblError.Text = "";lblError.Text = "Disconnecting...";clientSock.Close();

    lblError.Text = "";lblError.Text = "File transferred.";

    }

    catch (Exception ex){

    if (ex.Message == "A connection attempt failed because the connected

    party did not properly respond after a period of time, or established connection failedbecause connected host has failed to respond")

    {lblError.Text = "";lblError.Text = "No Such System Available Try other IP";

    }else{

    if (ex.Message == "No connection could be made because the targetmachine actively refused it")

    {lblError.Text = "";lblError.Text = "File Sending fail. Because server not running.";

    }else{

    lblError.Text = "";lblError.Text = "File Sending fail." + ex.Message;

    }}

    }

    }

    }

    }

  • 7/27/2019 11810621075 ramapriyan g

    48/62

    41

    SYSTEM TESTING

  • 7/27/2019 11810621075 ramapriyan g

    49/62

    42

    CHAPTER 6

    6. SYSTEM TESTING

    The purpose of testing is to discover errors. Testing is the process of trying to discover

    every conceivable fault or weakness in a work product. It provides a way to check the

    functionality of components, sub assemblies, assemblies and/or a finished product It is the

    process of exercising software with the intent of ensuring that the

    Software system meets its requirements and user expectations and does not fail in an

    unacceptable manner. There are various types of test. Each test type addresses a specific testing

    requirement.

    6.1 TYPES OF TESTING

    6.1.1 Unit testing

    Unit testing involves the design of test cases that validate that the internal program logic is

    functioning properly, and that program inputs produce valid outputs. All decision branches and

    internal code flow should be validated. It is the testing of individual software units of the

    application .it is done after the completion of an individual unit before integration. This is a

    structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform

    basic tests at component level and test a specific business process, application, and/or system

    configuration. Unit tests ensure that each unique path of a business process performs accurately

    to the documented specifications and contains clearly defined inputs and expected results.

    6.1.2Integration testing

    Integration tests are designed to test integrated software components to determine if they

    actually run as one program. Testing is event driven and is more concerned with the basic

    outcome of screens or fields. Integration tests demonstrate that although the components were

    individually satisfaction, as shown by successfully unit testing, the combination of components is

  • 7/27/2019 11810621075 ramapriyan g

    50/62

    43

    correct and consistent. Integration testing is specifically aimed at exposing the problems that

    arise from the combination of components.

    6.1.3 Functional Test

    Functional tests provide systematic demonstrations that functions tested are available as

    specified by the business and technical requirements, system documentation, and user manuals.

    Functional testing is centered on the following items:

    Valid Input : identified classes of valid input must be accepted.

    Invalid Input : identified classes of invalid input must be rejected.

    Functions : identified functions must be exercised.

    Output : identified classes of application outputs must be exercised.

    Systems/Procedures: interfacing systems or procedures must be invoked.

    Organization and preparation of functional tests is focused on requirements, key functions, or

    special test cases. In addition, systematic coverage pertaining to identify Business process flows;

    data fields, predefined processes, and successive processes must be considered for testing.

    Before functional testing is complete, additional tests are identified and the effective value of

    current tests is determined.

    6.1.4 System Test

    System testing ensures that the entire integrated software system meets requirements. It tests a

    configuration to ensure known and predictable results. An example of system testing is the

    configuration oriented system integration test. System testing is based on process descriptions

    and flows, emphasizing pre-driven process links and integration points.

    6.1.5 White Box Testing

    White Box Testing is a testing in which in which the software tester has knowledge of the

    inner workings, structure and language of the software, or at least its purpose. It is purpose. It is

    used to test areas that cannot be reached from a black box level.

  • 7/27/2019 11810621075 ramapriyan g

    51/62

    44

    6.1.6 Black Box Testing

    Black Box Testing is testing the software without any knowledge of the inner workings,

    structure or language of the module being tested. Black box tests, as most other kinds of tests,

    must be written from a definitive source document, such as specification or requirements

    document, such as specification or requirements document. It is a testing in which the software

    under test is treated, as a black box .you cannot see into it. The test provides inputs and

    responds to outputs without considering how the software works.

    6.1.7 Unit Testing

    Unit testing is usually conducted as part of a combined code and unit test phase of the

    software lifecycle, although it is not uncommon for coding and unit testing to be conducted as

    two distinct phases.

    Test strategy and approach

    Field testing will be performed manually and functional tests will be written in detail.

    Test objectives

    All field entries must work properly.

    Pages must be activated from the identified link. The entry screen, messages and responses must not be delayed.

    Features to be tested

    Verify that the entries are of the correct format No duplicate entries should be allowed All links should take the user to the correct page

  • 7/27/2019 11810621075 ramapriyan g

    52/62

    45

    6.1.8 Integration Testing

    Software integration testing is the incremental integration testing of two or more

    integrated software components on a single platform to produce failures caused by interface

    defects.

    The task of the integration test is to check that components or software applications, e.g.

    components in a software system orone step upsoftware applications at the company level

    interact without error.

    Test Results: All the test cases mentioned above passed successfully. No defects encountered.

    6.1.9 Acceptance Testing

    User Acceptance Testing is a critical phase of any project and requires significant

    participation by the end user. It also ensures that the system meets the functional requirements.

    Test Results: All the test cases mentioned above passed successfully. No defects encountered.

    6.1.10 The need of System testing

    This test is done to ensure that the system can perform all of its functions in a realistic

    operating environment. Checks are made to ensure that

    The system is capable of handling all transactions during periods of peak load without failure or

    unreasonable delays.

    Peak Load occurs during busy seasons such as lunch breaks.

    The system should be able to recover from failures caused due to power failures, hardware

    problems etc.,

  • 7/27/2019 11810621075 ramapriyan g

    53/62

    46

    6.2 USER INTERFACE TESTING( FORM with Validation Testing)

    Validation Testing is a procedure that demonstrates that a test for validating the data.

    There are 4 types for Validation Testing. They are Required Field Validation, CompareValidation, Expression Validation, Custom Validation and Validation Summary. If there is an

    error in Validation Testing the error messages will be displayed. For Required Field Validation,

    the tools should not be empty. It should have some values. Compare validation is used for

    password and e-mail address verification. Expression Validation is used to validate the date

    format, e-mail address format and phone number formats and so on. The Custom Validation is

    used to create a user defined validation. And in the Summary validation, all the validation are

    grouped and displayed.

  • 7/27/2019 11810621075 ramapriyan g

    54/62

    47

    SYSTEM

    IMPLEMENTATION

  • 7/27/2019 11810621075 ramapriyan g

    55/62

    48

    CHAPTER 7

    7.SYSTEM IMPLEMENTATION

    7.1 Scope for Future Development

    In proposed system consists of two complementary components: offline link weight

    optimization that takes as input the physical network topology and tries to produce maximum

    routing path diversity across multiple virtual routing topologies for long term operation through

    the optimized setting of link weights.Based on these diverse paths, adaptive traffic control

    performs intelligent traffic splitting across individual routing topologies in reaction to the

    monitored network dynamics at short timescale. According to our evaluation with real network

    topologies and traffic traces, the proposed system is able to cope almost optimally with

    unpredicted traffic dynamics and, as such, it constitutes a new proposal for achieving better

    quality of service and overall network performance in IP networks.

    The two operational networks shows good path diversity performance. A high chance of achieving near-optimal Traffic Engineering performance. The global view of the network, enabling it to achieve a global optimum in traffic

    control.

    AMPLE can substantially reduce the Maximum Link Utilization for most of the traffictraces.

  • 7/27/2019 11810621075 ramapriyan g

    56/62

    49

    CONCLUSION

  • 7/27/2019 11810621075 ramapriyan g

    57/62

    50

    CHAPTER 8

    8.CONCLUSION

    In this article we have introduced AMPLE, a novel TE system based on virtualized IGP

    routing that enables short timescale traffic control against unexpected traffic dynamics using

    multi topology IGP-based networks. The framework encompasses two major components,

    namely, Offline Link Weight Optimization (OLWO) and Adaptive Traffic Control (ATC). The

    OLWO component takes the physical network topology as the input and aims to produce

    maximum IGP path diversity across multiple routing topologies through the optimized setting of

    MT-IGP link weights. Based on these diverse paths, the ATC component performs intelligent

    traffic splitting adjustments across individual routing topologies in reaction to the monitored

    network dynamics at short timescale. A potential direction in our future work is to consider a

    holistic TE paradigm based on AMPLE, which is able to simultaneously tackle both traffic and

    network dynamics, for instance network failures.

  • 7/27/2019 11810621075 ramapriyan g

    58/62

    51

    8.1BIBLIOGRAPHY

    Good Teachers are worth more than thousand books, we have them in Our

    Department

    References Made From:

    1. User Interfaces in C#: Windows Forms and Custom Controls by Matthew MacDonald.

    2. Applied Microsoft .NET Framework Programming (Pro-Developer) by Jeffrey Richter.

    3. Practical .Net2 and C#2: Harness the Platform, the Language, and the Framework byPatrick Smacchia.

    4. Data Communications and Networking, by Behrouz A Forouzan.

    5. Computer Networking: A Top-Down Approach, by James F. Kurose.

    6. Operating System Concepts,by Abraham Silberschatz.

    7. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view

    of cloud computing, University of California, Berkeley, Tech. Rep. USB-EECS-2009-

    28, Feb 2009.

    8. The apache cassandra project,http://cassandra.apache.org/.

    9. L. Lamport, The part-time parliament, ACM Transactionson Computer Systems, vol. 16, pp. 133169, 1998.

    http://cassandra.apache.org/http://cassandra.apache.org/http://cassandra.apache.org/http://cassandra.apache.org/
  • 7/27/2019 11810621075 ramapriyan g

    59/62

    52

    10.N. Bonvin, T. G. Papaioannou, and K. Aberer, Cost-efficientand differentiated data availability guarantees in data clouds,

    in Proc. of the ICDE, Long Beach, CA, USA, 2010.

    11. O. Regev and N. Nisan, The popcorn market. online marketsfor computational resources, Decision Support Systems,

    vol. 28, no. 1-2, pp. 177189, 2000.

    12. A. Helsinger and T. Wright, Cougaar: A robust configurablemulti agent platform, in Proc. of the IEEE Aerospace Conference,

    2005.

    13. J. Brunelle, P. Hurst, J. Huth, L. Kang, C. Ng, D. C. Parkes,M. Seltzer, J. Shank, and S. Youssef, Egg: an extensible and

    economics-inspired open grid computing platform, in Proc.

    of the GECON, Singapore, May 2006.

    14. J. Norris, K. Coleman, A. Fox, and G. Candea, Oncall: Defeatingspikes with a free-market application cluster, in Proc.

    of the International Conference on Autonomic Computing,

    New York, NY, USA, May 2004.

    15. C. Pautasso, T. Heinis, and G. Alonso, Autonomic resourceprovisioning for software business processes, Information

    and Software Technology, vol. 49, pp. 6580, 2007.

  • 7/27/2019 11810621075 ramapriyan g

    60/62

    53

    16. A. Dan, D. Davis, R. Kearney, A. Keller, R. King, D. Kuebler,H. Ludwig, M. Polan, M. Spreitzer, and A. Youssef, Web

    services on demand: Wsla-driven automated management,

    IBM Syst. J., vol. 43, no. 1, pp. 136158, 2004.

    17. M. Wang and T. Suda, The bio-networking architecture: abiologically inspired approach to the design of scalable, adaptive,

    and survivable/available network applications, in Proc.

    of the IEEE Symposium on Applications and the Internet,

    2001.

    18. N. Laranjeiro and M. Vieira, Towards fault tolerance inweb services compositions, in Proc. of the workshop on

    engineering fault tolerant systems, New York, NY, USA,

    2007.

    19. C. Engelmann, S. L. Scott, C. Leangsuksun, and X. He,Transparent symmetric active/active replication for servicelevel

    high availability, in Proc. of the CCGrid, 2007.

    20. J. Salas, F. Perez-Sorrosal, n.-M. M. Pati and R. Jimenez-Peris, Ws-replication: a framework for highly available web

    services, in Proc. of the WWW, New York, NY, USA, 2006,

  • 7/27/2019 11810621075 ramapriyan g

    61/62

    54

    web Sites Referred:

    http://www.sourcefordgde.com

    http://www.networkcomputing.com/

    http://www.ieee.org

    http://www.emule-project.net/

    http://www.sourcefordgde.com/http://www.sourcefordgde.com/http://www.networkcomputing.com/http://www.networkcomputing.com/http://www.ieee.org/http://www.ieee.org/http://www.emule-project.net/http://www.emule-project.net/http://www.ieee.org/http://www.networkcomputing.com/http://www.sourcefordgde.com/
  • 7/27/2019 11810621075 ramapriyan g

    62/62

    8.2REFERENCES

    1 .NET IN 60 DAYS A MINUTE- BRUCE BRAWSTOW & TONY MARTIN

    2. .NET PROGRAMMING BIBLE- TONY MARTIN

    3 .NET DEVELOPERS GUIDE- GREG BUCZEK- TATA MSGRAW-HILL-EDITION

    4. SQL 2005 BIBLE -CARYN.PRAGUE&MICHAELR.IRWIN