11810621075 ramapriyan g
TRANSCRIPT
-
7/27/2019 11810621075 ramapriyan g
1/62
VIRTUAL ENGINEERING SYSTEM BASED ON
VIRTUAL ROUTING TOPOLOGY
By
RAMAPRIYAN G
(Reg. No: 11810621075)
VELTECH MULTITECH
Dr. RANGARAJAN Dr. SAKUNTHALA ENGINEERING COLLEGE
An ISO 9001:2000 Certified Institution
Accredited By National Board of Accreditation
#42&60, AvadiAlamathi Road, Chennai600 062.
A PROJECT REPORT
Submitted to the
Faculty of Information and Communication Engineering
MASTER OF COMPUTER APPLICATIONS
In the partial fulfillment of the requirements
For the award of the degree
Of
MASTER OF COMPUTER APPLICATIONS
ANNA UNIVERSITY: CHENNAI600 025
JULY2013
-
7/27/2019 11810621075 ramapriyan g
2/62
VELTECH MULTITECH
Dr. RANGARAJAN Dr. SAKUNTHALA ENGINEERING COLLEGE
An ISO 9001: 2008 Certified Institution
Accredited by National Board of Accreditation
Approved by AICTE, New Delhi(Owned by Vel Trust 1997)
BONAFIDE CERTIFICATE
Certified that this project report titled VIRTUAL ENGINEERING SYSTEM BASED
ON VIRTUAL ROUTING TOPOLOGY is the bonafide work of Mr.
G.RAMAPRIYAN(11810621075) who carried out the project work under my supervision.
Certified further, that to the best of my knowledge the work reported herein does not form part of
any other project report or dissertation on the basis of which a degree or award was conferred on
an earlier occasion on this or any other candidate.
INTERNAL SUPERVISIOR HEAD OF THE DEPARTMENT
INTERNAL EXAMINER EXTERNAL EXAMINER
-
7/27/2019 11810621075 ramapriyan g
3/62
ACKNOWLEDGEMENT
I sincerely thanks to Our Honorable Founder & Chairman of VELTECH
INSTITUTIONS COL. PROF.Dr. Vel R.RANGARAJAN, B.E.(Elec), B.E.(Mech),
M.S.(Auto), D.Sc and Vice-Chairman Dr. Smt R.SAKUNTHALA RANGARAGAN,
M.B.B.S for his sincere endeavor in educating us in their Premier institution.
I take this opportunity to thank the Principal Dr. V. PARTHASARATHY B.E., M.E.,
MBA., Ph.D of this prestigious VELTECH MULTITECH Dr. RANGARAJAN Dr.
SAKUNTHALA ENGINEERING COLLEGE, for his kind cooperation in completing this
project.
I express my sincere thanks to Mr. M.NEW BEGIN MCA.,M.Tech., Head Of The
Department for having inspired me and providing me with all the amenities inside our college
campus.
I sincerely thank my internal guide, Mrs.R. LATHA MCA,ME., whose guidance this
project would not have been completed successfully.
I express my sincere thanks and gratitude to MISS. R.SUPRAJA.M.C.A, Project
Developer, HINDUSTAN AUTOMATION SOLUTIONS my external guide, for his valuable
advice and guidance to complete the project.
I have great pleasure in expressing my profound sense of gratitude to the technical support
staff and the non- teaching staff of our department.
Finally I thank my parents and my friends who had helped me in doing this project
successfully. Special thanks to my lovable parents who provided not only the financial support
but also moral support and without whom this project would not have been possible at all.
-
7/27/2019 11810621075 ramapriyan g
4/62
-
7/27/2019 11810621075 ramapriyan g
5/62
ABSTRACT
To avoid network congestion and subsequent service disruptions is one of the key tasks
performed by contemporary network management systems. Given the simple but rigid routing
and forwarding functionalities in IP base environments, efficient resource management and
control solutions against dynamic traffic conditions is still yet to be obtained. An efficient traffic
engineering and management system that performs adaptive traffic control by using multiple
virtualized routing topologies.
The proposed system consists of two complementary components: offline link weight
optimization that takes as input the physical network topology and tries to produce maximum
routing path diversity across multiple virtual routing topologies for long term operation through
the optimized setting of link weights.
Based on these diverse paths, adaptive traffic control performs intelligent traffic splitting
across individual routing topologies in reaction to the monitored network dynamics at short
timescale. It provides traffic traces to the IGP base environments.
-
7/27/2019 11810621075 ramapriyan g
6/62
S.NO CONTENTS PAGE NO1. INTRODUCTION
1.1Company Profile1.2Introduction about the project 13
2 SYSTEM STUDY
2.1 Existing System
2.2 Disadvantages of Existing System
2.3 Proposed System and its Advantages2.4 Problem Definition and Description
5567
3 SYSTEM ANALYSIS
3.1 Hardware Specification
3.2 Software Specification3.3 Operational Feasibility
3.4 Economical feasibility
3.5 Technical feasibility
9999
10
4 SYSTEM DESIGN
4.1 Architectural Design4.2 Data Flow Diagram
4.3 UML Diagram
4.4 I/O Form Design
121314
18
5 CODING AND DEBUGGING
5.1 Functional DocumentationModule Explanation5.2 Special features of Languages
5.3 Sample Code
213438
6 TESTING6.1 Types of Testing6.2 User Interface Testing (form with validation)
4246
7 SYSTEM IMPLEMENTATION
7.1 Scope for Future Development 48
8 CONCLUSION
8.1 Bibliography
8.2 References
5155
-
7/27/2019 11810621075 ramapriyan g
7/62
INTRODUCTION
-
7/27/2019 11810621075 ramapriyan g
8/62
1
CHAPTER 1
1.INTRODUCTION
1.1 COMPANY PROFILE
We are Chennai based leading company engaged in supplying of electrical and
automation systems for various industrial segments. Hindustan Automation Solutions has always
been a customer oriented firm which makes sincere efforts to manufacture and supply latest and
useful software and hardware for its valuable clientele across India. Today's world revolves
around high technology & most companies have invested substantially in automated plants. For
this reason most manufacturing companies are looking for competent engineers with basic
aptitude towards automation and ability to work on varied brands of PLCs, Drives, MMI and
SCADA. High levels of technical skills are required to keep it going in operations &
maintenance. This prompted us to enter in this business domain.
The company has been offering industrial automation/process automation, since its
inception. We also provide trained manpower in PLC automation and after sales services to
several industries at nominal charges. Apart from this, our centre in Chennai offers excellent
training for engineering students, industry professionals, and freshers. We also conduct courses
in the field of PLC & SCADA which are extremely useful for companies interested in
automation trainings to update the skills of their technical persons, students undergoing summer
training, working professionals engaged in project/maintenance/production/design/application
engineering departments.
Our Mission
To provide unique solutions in safety application domain.
To offer all kinds of solutions in embedded processor technology.
To provide total solution to our customers right from design, development, manufacture,
supply, installation, and commissioning on turnkey basis.
Manufacture and supply outstanding software and hardware at cost efficient prices.
Our Experts
Our expert team of professionals comprises of software and hardware engineers, R&D
personnel, and other technocrats having mastery in embedded processor technology, process
-
7/27/2019 11810621075 ramapriyan g
9/62
2
automation etc. We, at Hindustan Automation Solutions are known for our quality PLC &
SCADA training and project related with software and hardware.
Our dedicated and innovative team is the only reason for our huge success in this
competitive market. Our people possess expertise in offering all sorts of after sales and services
in industrial automation/process automation fields at cost effective prices to our clientele which
is spread across the country. With their sincere and untiring efforts, we have gained a distinct
position in this business domain.
-
7/27/2019 11810621075 ramapriyan g
10/62
3
1.2 INTRODUCTION ABOUT THE PROJECT
Handling traffic dynamics in order to avoid network congestion and subsequent service
disruptions is one of the key tasks performed by contemporary network management systems.
Given the simple but rigid routing and forwarding functionalities in IP base environments,
efficient resource management and control solutions against dynamic traffic conditions is still yet
to be obtained. An efficient traffic engineering and management system that performs adaptive
traffic control by using multiple virtualized routing topologies.
The proposed system consists of two complementary components: offline link weight
optimization that takes as input the physical network topology and tries to produce maximum
routing path diversity across multiple virtual routing topologies for long term operation through
the optimized setting of link weights.
Based on these diverse paths, adaptive traffic control performs intelligent traffic splitting
across individual routing topologies in reaction to the monitored network dynamics at short
timescale. It provides traffic traces to the IGP base environments.
-
7/27/2019 11810621075 ramapriyan g
11/62
4
SYSTEM STUDY
-
7/27/2019 11810621075 ramapriyan g
12/62
5
CHAPTER 2
2.SYSTEM STUDY
2.1 Existing system
In Existing System, IGP-based TE mechanisms are only confined to offline operation and
hence cannot cope efficiently with significant traffic dynamics. There are well known reasons for
this limitation: IGP-based TE only allows forstatic traffic delivery through native IGP paths,
without flexible traffic splitting for dynamic load balancing.
In addition, changing IGP link weights in reaction to emerging network congestion may
cause routing re-convergence problems that potentially disrupt ongoing traffic sessions. In effect,
it has been recently argued that dynamic/online route re computation is to be considered harmful
even in the case of network failures, let alone for dealing with traffic dynamics.
Disadvantage
It exhibit operational inefficiencies due to frequent and significant traffic dynamics inoperational networks.
TE configuration is not deemed as an efficient approach for resource optimization. TE mechanisms are only confined to offline operation and hence cannot cope efficiently
with significant traffic dynamics.
An emerging network congestion may cause routing re-convergence problems thatpotentially disrupt ongoing traffic sessions.
Re-computation is to be considered harmful even in the case of network failures.
-
7/27/2019 11810621075 ramapriyan g
13/62
6
2.2 Proposed System And Its Advantages
In proposed system consists of two complementary components: offline link weightoptimization that takes as input the physical network topology and tries to produce
maximum routing path diversity across multiple virtual routing topologies for long term
operation through the optimized setting of link weights.
Based on these diverse paths, adaptive trafficcontrolperforms intelligent traffic splittingacross individual routing topologies in reaction to the monitored network dynamics at
short timescale.
According to our evaluation with real network topologies and traffic traces, the proposed system
is able to cope almost optimally with unpredicted traffic dynamics and, as such, it constitutes a
new proposal for achieving better quality of service and overall network performance in IP
networks.
ADVANTAGE
The two operational networks shows good path diversity performance. A high chance of achieving near-optimal Traffic Engineering performance. The global view of the network, enabling it to achieve a global optimum in traffic
control.
AMPLE can substantially reduce the Maximum Link Utilization for most of the traffictraces.
-
7/27/2019 11810621075 ramapriyan g
14/62
7
2.3 Problem Definition and Description
Problem and definition
IGP-based TE mechanisms are only confined to offline operation and hence cannot cope
efficiently with significant traffic dynamics. There are well known reasons for this limitation:
IGP-based TE only allows forstatic traffic delivery through native IGP paths, without flexible
traffic splitting for dynamic load balancing.
In addition, changing IGP link weights in reaction to emerging network congestion may
cause routing re-convergence problems that potentially disrupt ongoing traffic sessions. In effect,
it has been recently argued that dynamic/online route re computation is to be considered harmful
even in the case of network failures, let alone for dealing with traffic dynamics.
.
Descriptions
It exhibit operational inefficiencies due to frequent and significant traffic dynamics in
operational networks.TE configuration is not deemed as an efficient approach for
resource optimization.
TE mechanisms are only confined to offline operation and hence cannot cope efficiently
with significant traffic dynamics.An emerging network congestion may cause routing re-
convergence problems that potentially disrupt ongoing traffic sessions.
Re-computation is to be considered harmful even in the case of network failures.
-
7/27/2019 11810621075 ramapriyan g
15/62
8
SYSTEM ANALYSIS
-
7/27/2019 11810621075 ramapriyan g
16/62
9
CHAPTER 3
3.SYSTEM ANALYSIS
3.1 HARDWARE REQUIREMENTS:
System : Pentium IV 2.4 GHz.
Hard Disk : 40 GB.
Monitor : 15 VGA Color.
Mouse : Logitech.
Ram : 512 Mb.
3.2 SOFTWARE REQUIREMENTS
Operating system : Windows XP.
Coding Language : C# .NET
3.3 Operational Feasibility
All projects are feasible to give an unlimited resources and infinite time. Feasibility and
risk analyses are related in many ways. If project risk is great, the Feasibility of producing
quality software is reduced. It is the authority to decide the worth of the project.
3.3 Economical Feasibility
This study is carried out to check the economic impact that the system will have on the
organization. The amount of fund that the company can pour into the research and development
of the system is limited.
The expenditures must be justified. Thus the developed system as well within the
budget and this was achieved because most of the technologies used are freely available. Only
the customized products had to be purchased.
-
7/27/2019 11810621075 ramapriyan g
17/62
10
3.4 Technical Feasibility
The factor associated with technical feasibility is technology. Technical Feasibility exists
with computer system, with available resources to run my work. Therefore need does not arise to
go in for the updating of existing configuration.
Development Risk
The System element is designed so that necessary function and performance are achieved
within constraints.
Resource availability
The hardware and software resources are available to build the system
-
7/27/2019 11810621075 ramapriyan g
18/62
11
SYSTEM DESIGN
-
7/27/2019 11810621075 ramapriyan g
19/62
12
CHAPTER 4
4. SYSTEM DESIGN
4.1 Architectural Diagram
-
7/27/2019 11810621075 ramapriyan g
20/62
13
4.2 Data Flow Diagram
SERVER DESTINATION
IP Address
Browse aFile
no
Router
FIle Transfer
IP Address
Connecting..
Flle Received
SocketConnection
Browse areceived path
End
Connecting..
checkno
yes
Start FileReceiving
Routing
Carry & Forward Transmission
yes
File NotReceived
socketconnection?
yes
signal?
no
Adaptive Traffic Control
maximumlink utilization Performance
Graph
-
7/27/2019 11810621075 ramapriyan g
21/62
14
4.3 UML Diagram
4.3.1 USECASE DIAGRAM
-
7/27/2019 11810621075 ramapriyan g
22/62
15
4.3.2 CLASS DIAGRAM
-
7/27/2019 11810621075 ramapriyan g
23/62
16
4.3.3 ACTIVITY DIAGRAM:
DESTINATION
Select aReceiving Path
Connecting..
Browse
FILE RECEIVE
IP Address
Browse aFile
NO
Yes
FILE TRANSFER
socketconeection
TRANSACTIONFAILED
IP Address
Client socketconnection
checkNO
File NotReceived
Start FileReceiving
Yes
Traffic signal?Connecting..
Carry & Forward Transmission
maximumlink utilization Performance
Yes
ROUTING..
ROUTERSERVER
NO
GRAPH
Adaptive Traffic Control
-
7/27/2019 11810621075 ramapriyan g
24/62
17
4.3.4 Sequence Diagram
SERVER DESTINATIONROUTER
Socket Connection
Socket Connection
Start File Transfer
Routing
Bytes Received
File Transferred Success
File Received
Bytes Transferred
Routing Finish
Ackno ledgement
Acknowledgement
Adaptive Traffic Control
-
7/27/2019 11810621075 ramapriyan g
25/62
18
4.4 Input Design
The input design is the link between the information system and the user. It comprises the
developing specification and procedures for data preparation and those steps are necessary to put
transaction data in to a usable form for processing can be achieved by inspecting the computer to
read data from a written or printed document or it can occur by having people keying the data
directly into the system. The design of input focuses on controlling the amount of input required,
controlling the errors, avoiding delay, avoiding extra steps and keeping the process simple. The
input is designed in such a way so that it provides security and ease of use with retaining the
privacy. Input Design considered the following things:
What data should be given as input? How the data should be arranged or coded? The dialog to guide the operating personnel in providing input. Methods for preparing input validations and steps to follow when error occur.
-
7/27/2019 11810621075 ramapriyan g
26/62
19
OBJECTIVES
1.Input Design is the process of converting a user-oriented description of the input into a
computer-based system. This design is important to avoid errors in the data input process and
show the correct direction to the management for getting correct information from the
computerized system.
2.It is achieved by creating user-friendly screens for the data entry to handle large volume
of data. The goal of designing input is to make data entry easier and to be free from errors. The
data entry screen is designed in such a way that all the data manipulates can be performed. It also
provides record viewing facilities.
3. When the data is entered it will check for its validity. Data can be entered with the help
of screens. Appropriate messages are provided as when needed so that the user
will not be in maize of instant. Thus the objective of input design is to create an input layout that
is easy to follow
-
7/27/2019 11810621075 ramapriyan g
27/62
20
CODING
AND
DEBUGGING
-
7/27/2019 11810621075 ramapriyan g
28/62
21
CHAPTER 5
5. CODING AND DEBUGGING
5.1 FUNCTIONAL DOCUMENTATIONMODULE EXPLANATION
5.1.1 FUNCTIONAL DOCUMENTATION
Implementation is the stage of the project when the theoretical design is turned out into a
working system. Thus it can be considered to be the most critical stage in achieving a successful
new system and in giving the user, confidence that the new system will work and be effective.
The implementation stage involves careful planning, investigation of the existing system
and its constraints on implementation, designing of methods to achieve changeover and
evaluation of changeover methods.
MODUELS
Traffic Engineering System Server Routing Data Transmit Virtual Routing Topology
TRAFFIC ENGINEERING SYSTEM
MT-IGP paths according to the link weights computed. Monitored network and Thediverse traffic data such as incoming traffic volume and link utilizations. At each short-
time interval, In this engineering system holds on local traffic volume. It managing
monitoring agent. This functionality is handled by a centralized TE manager who has
complete knowledge of the network topology and periodically gathers the up-to-date
monitored traffic conditions of the operating network., who use this configuration for
-
7/27/2019 11810621075 ramapriyan g
29/62
22
remarking the multi-topology identifiers (MTIDs) of their locally originated traffic
accordingly.
SERVER ROUTING
To start the server. server enter the ip address to the destination for accept the datadownload. Server interact the client and check the processing traffic engineering system.
how opportunistic VRT to VRT communication complement the infrastructure-based
connectivity, so to speed up the download process. It is however easy to foresee that the
availability of onboard communication capabilities will also determine a significant
increase in the number of clients.
DATA TRANSMIT
Data transmit from server to receiver has be done by selecting the particular ip address ofthe receiver . data send through the traffic engineering system offline link weight
optimization that takes as input the physical networktopology and tries to produce
maximumrouting path diversity across multiple virtualrouting topologies for long term
operationthrough the optimized setting of link weights. Based on these diverse paths.
VIRTUAL ROUTING TOPOLOGY
Data traversal via virtual routing toplogy.If any traffic occurs.adaptive trafficcontrolperforms intelligent traffic splitting across individual routing topologies in reactionto the
monitored network dynamics at short timescale. unpredicted traffic dynamics and, as
such, it constitutes a new proposal for achieving better quality of service and overall
network performance in IP networks. Finally reached the destination .Routing topology
monitoring the network. to boost up the network strength.
-
7/27/2019 11810621075 ramapriyan g
30/62
23
SCREEN SHOTS
1.SERVER INITIAL STATE
-
7/27/2019 11810621075 ramapriyan g
31/62
24
2.VIRTUAL ROUTING
-
7/27/2019 11810621075 ramapriyan g
32/62
25
3.DESTINATION
-
7/27/2019 11810621075 ramapriyan g
33/62
26
4.TARGET WAIT FOR DATA
-
7/27/2019 11810621075 ramapriyan g
34/62
27
5.BROUSE FILE
-
7/27/2019 11810621075 ramapriyan g
35/62
28
6.SERVER STARTING
-
7/27/2019 11810621075 ramapriyan g
36/62
29
7.ROUTING
-
7/27/2019 11810621075 ramapriyan g
37/62
30
8.ROUTING PATHS
-
7/27/2019 11810621075 ramapriyan g
38/62
31
9.DESTINATION
-
7/27/2019 11810621075 ramapriyan g
39/62
32
10.BLIND CHART
-
7/27/2019 11810621075 ramapriyan g
40/62
33
11.CONSTRAINED CHART
-
7/27/2019 11810621075 ramapriyan g
41/62
34
5.2 SPECIAL FEATURES OF LANGUAGES
5.2.1 ABOUT C#.NET
C# is an elegant and type-safe object-oriented language that enables developers tobuild a variety of secure and robust applications that run on the .NET Framework. Visual C#
2008 provides an advanced code editor, convenient user interface designers, integrated debugger,
and many other tools to make it easier to develop applications based on version 3.0 of the C#
language and version 3.5 of the .NET Framework. Built-in or custom components, simplifying
the code of a page.
C# syntax is highly expressive, yet it is also simple and easy to learn. The curly-brace
syntax of C# will be instantly recognizable to anyone familiar with C, C++ or Java. Developers
who know any of these languages are typically able to begin to work productively in C# within a
very short time. C# syntax simplifies many of the complexities of C++ and provides powerful
features such as nullable value types, enumerations, delegates, lambda expressions and direct
memory access, which are not found in Java. C# supports generic methods and types, which
provide increased type safety and performance, and integrators, which enable implementers of
collection classes to define custom iteration behaviors that are simple to use by client code. In C#
3.0, Language-Integrated Query (LINQ) expressions make the strongly-typed query a first-classlanguage construct.
As an object-oriented language, C# supports the concepts of encapsulation, inheritance,
and polymorphism. All variables and methods, including the Main method, the application's
entry point, are encapsulated within class definitions. A class may inherit directly from one
parent class, but it may implement any number of interfaces. Methods that override virtual
methods in a parent class require the override keyword as a way to avoid accidental redefinition.
In C#, a struct is like a lightweight class; it is a stack-allocated type that can implement interfaces
but does not support inheritance.
In addition to these basic object-oriented principles, C# makes it easy to develop software
components through several innovative language constructs, including the following
Encapsulated method signatures called delegates, which enable type-safe event notifications.
-
7/27/2019 11810621075 ramapriyan g
42/62
35
Properties, which serve as assessors for private member variables. Attributes, which
provide declarative metadata about types at run time. Inline XML documentation comments.
Language-Integrated Query (LINQ) which provides built-in query capabilities across a variety of
data sources.
Interop enables C# programs to do almost anything that a native C++ application can do.
C# even supports pointers and the concept of "unsafe" code for those cases in which direct
memory access is absolutely critical.
The C# build process is simple compared to C and C++ and more flexible than in Java.
There are no separate header files, and no requirement that methods and types be declared in a
particular order. A C# source file may define any number of classes, structs, interfaces, and
events.
5.2.2 .NET Framework Platform Architecture
C# programs run on the .NET Framework, an integral component of Windows that
includes a virtual execution system called the common language runtime (CLR) and a unified set
of class libraries. The CLR is the commercial implementation by Microsoft of the common
language infrastructure (CLI), an international standard that is the basis for creating execution
and development environments in which languages and libraries work together seamlessly.
Source code written in C# is compiled into an intermediate language (IL) that conforms
to the CLI specification. The IL code and resources, such as bitmaps and strings, are stored on
disk in an executable file called an assembly, typically with an extension of .exe or .dll. An
assembly contains a manifest that provides information about the assembly's types, version,
culture, and security requirements.
When the C# program is executed, the assembly is loaded into the CLR, which might
take various actions based on the information in the manifest. Then, if the security requirements
are met, the CLR performs just in time (JIT) compilation to convert the IL code to native
machine instructions. The CLR also provides other services related to automatic garbage
collection, exception handling, and resource management. Code that is executed by the CLR is
-
7/27/2019 11810621075 ramapriyan g
43/62
36
sometimes referred to as "managed code," in contrast to "unmanaged code" which is compiled
into native machine language that targets a specific system. The following diagram illustrates the
compile-time and run-time relationships of C# source code files, the .NET Framework class
libraries, assemblies, and the CLR.
Language interoperability is a key feature of the .NET Framework. Because the IL code
produced by the C# compiler conforms to the Common Type Specification (CTS), IL code
generated from C# can interact with code that was generated from the .NET versions of Visual
Basic, Visual C++, or any of more than 20 other CTS-compliant languages. A single assembly
may contain multiple modules written in different .NET languages, and the types can reference
each other just as if they were written in the same language.
In addition to the run time services, the .NET Framework also includes an extensive
library of over 4000 classes organized into namespaces that provide a wide variety of useful
functionality for everything from file input and output to string manipulation to XML parsing, to
-
7/27/2019 11810621075 ramapriyan g
44/62
37
Windows Forms controls. The typical C# application uses the .NET Framework class library
extensively to handle common "plumbing" chores.
Most times, applications will ask for a particular version of the framework to be installed.
We'd recommend avoiding installing that particular version, and trying instead to install the most
up-to-date version of .NET, assuming your Windows OS supports it. Most .NET packages have
backwards compatibility, so an app asking for the 2.0 framework can usually get by with what's
packaged into the latest version:.Net Framework 4. Be sure, too, that you're settled up on your
Windows Update requests, as there may be relevant system patches that need installing before
.NET will fit comfortably on your system.
-
7/27/2019 11810621075 ramapriyan g
45/62
38
SAMPLE CODE
using System;using System.Collections.Generic;using System.ComponentModel;using System.Data;using System.Drawing;using System.Linq;using System.Text;
using System.Windows.Forms;using System.Net.Sockets;using System.Net;
using System.IO;using System.Globalization;
namespace ServerSource
{publicpartialclassForm1 : Form{
string ser1;string fileDes, fileini;int len;
public Form1(){
InitializeComponent();
}
privatevoid Form1_Load(object sender, EventArgs e){
btntransform.Enabled = false;this.openFileDialog1.Multiselect = true;
}
privatevoid btnbrowse_Click(object sender, EventArgs e){
txtFilePath.Text = "";
openFileDialog1.ShowDialog();txtFilePath.Text = openFileDialog1.FileName;fileDes = openFileDialog1.FileName;
if (fileDes == "openFileDialog1"){
lblError.Text = "";lblError.ForeColor = System.Drawing.Color.Red;lblError.Text = "Select a File first";txtFilePath.Text = "";
btntransform.Enabled = false;}else{
pictureBox7.Visible = true;pictureBox7.Image = ServerSource.Properties.Resources.loading;Application.DoEvents();System.Threading.Thread.Sleep(1000);pictureBox7.Image = ServerSource.Properties.Resources.upload_success;Application.DoEvents();
-
7/27/2019 11810621075 ramapriyan g
46/62
39
len = fileDes.Length;fileini = fileDes.Substring(fileDes.IndexOf("\\") + 1);btntransform.Enabled = true;
}}
privatevoid btntransform_Click(object sender, EventArgs e)
{send();
}
publicvoid send(){
try{
IPAddress[] ipAddress = Dns.GetHostAddresses(txtIp.Text);IPEndPoint ipEnd = newIPEndPoint(ipAddress[0], 5655);Socket clientSock = newSocket(AddressFamily.InterNetwork,
SocketType.Stream, ProtocolType.IP);string filePath = "";int count = 0;
fileDes = fileDes.Replace("\\", "/");while (fileDes.IndexOf("/") > -1){
filePath += fileDes.Substring(0, fileDes.IndexOf("/") + 1);fileDes = fileDes.Substring(fileDes.IndexOf("/") + 1);count++;
}
byte[] fileNameByte = Encoding.ASCII.GetBytes(fileDes);
lblError.Text = "";lblError.Text = "Buffering ...";byte[] fileData = File.ReadAllBytes(filePath + fileDes);
byte[] clientData = newbyte[4 + fileNameByte.Length + fileData.Length];byte[] fileNameLen = BitConverter.GetBytes(fileNameByte.Length);
fileNameLen.CopyTo(clientData, 0);fileNameByte.CopyTo(clientData, 4);fileData.CopyTo(clientData, 4 + fileNameByte.Length);
lblError.Text = "";lblError.Text = "Connection to server ...";clientSock.Connect(ipEnd);
lblError.Text = "";lblError.Text = "File sending...";pictureBox8.Image = ServerSource.Properties.Resources._2_computers;
Application.DoEvents();System.Threading.Thread.Sleep(2000);
clientSock.Send(clientData);
lblError.Text = "File sending...";
Application.DoEvents();
-
7/27/2019 11810621075 ramapriyan g
47/62
40
lblError.Text = "";lblError.Text = "Disconnecting...";clientSock.Close();
lblError.Text = "";lblError.Text = "File transferred.";
}
catch (Exception ex){
if (ex.Message == "A connection attempt failed because the connected
party did not properly respond after a period of time, or established connection failedbecause connected host has failed to respond")
{lblError.Text = "";lblError.Text = "No Such System Available Try other IP";
}else{
if (ex.Message == "No connection could be made because the targetmachine actively refused it")
{lblError.Text = "";lblError.Text = "File Sending fail. Because server not running.";
}else{
lblError.Text = "";lblError.Text = "File Sending fail." + ex.Message;
}}
}
}
}
}
-
7/27/2019 11810621075 ramapriyan g
48/62
41
SYSTEM TESTING
-
7/27/2019 11810621075 ramapriyan g
49/62
42
CHAPTER 6
6. SYSTEM TESTING
The purpose of testing is to discover errors. Testing is the process of trying to discover
every conceivable fault or weakness in a work product. It provides a way to check the
functionality of components, sub assemblies, assemblies and/or a finished product It is the
process of exercising software with the intent of ensuring that the
Software system meets its requirements and user expectations and does not fail in an
unacceptable manner. There are various types of test. Each test type addresses a specific testing
requirement.
6.1 TYPES OF TESTING
6.1.1 Unit testing
Unit testing involves the design of test cases that validate that the internal program logic is
functioning properly, and that program inputs produce valid outputs. All decision branches and
internal code flow should be validated. It is the testing of individual software units of the
application .it is done after the completion of an individual unit before integration. This is a
structural testing, that relies on knowledge of its construction and is invasive. Unit tests perform
basic tests at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process performs accurately
to the documented specifications and contains clearly defined inputs and expected results.
6.1.2Integration testing
Integration tests are designed to test integrated software components to determine if they
actually run as one program. Testing is event driven and is more concerned with the basic
outcome of screens or fields. Integration tests demonstrate that although the components were
individually satisfaction, as shown by successfully unit testing, the combination of components is
-
7/27/2019 11810621075 ramapriyan g
50/62
43
correct and consistent. Integration testing is specifically aimed at exposing the problems that
arise from the combination of components.
6.1.3 Functional Test
Functional tests provide systematic demonstrations that functions tested are available as
specified by the business and technical requirements, system documentation, and user manuals.
Functional testing is centered on the following items:
Valid Input : identified classes of valid input must be accepted.
Invalid Input : identified classes of invalid input must be rejected.
Functions : identified functions must be exercised.
Output : identified classes of application outputs must be exercised.
Systems/Procedures: interfacing systems or procedures must be invoked.
Organization and preparation of functional tests is focused on requirements, key functions, or
special test cases. In addition, systematic coverage pertaining to identify Business process flows;
data fields, predefined processes, and successive processes must be considered for testing.
Before functional testing is complete, additional tests are identified and the effective value of
current tests is determined.
6.1.4 System Test
System testing ensures that the entire integrated software system meets requirements. It tests a
configuration to ensure known and predictable results. An example of system testing is the
configuration oriented system integration test. System testing is based on process descriptions
and flows, emphasizing pre-driven process links and integration points.
6.1.5 White Box Testing
White Box Testing is a testing in which in which the software tester has knowledge of the
inner workings, structure and language of the software, or at least its purpose. It is purpose. It is
used to test areas that cannot be reached from a black box level.
-
7/27/2019 11810621075 ramapriyan g
51/62
44
6.1.6 Black Box Testing
Black Box Testing is testing the software without any knowledge of the inner workings,
structure or language of the module being tested. Black box tests, as most other kinds of tests,
must be written from a definitive source document, such as specification or requirements
document, such as specification or requirements document. It is a testing in which the software
under test is treated, as a black box .you cannot see into it. The test provides inputs and
responds to outputs without considering how the software works.
6.1.7 Unit Testing
Unit testing is usually conducted as part of a combined code and unit test phase of the
software lifecycle, although it is not uncommon for coding and unit testing to be conducted as
two distinct phases.
Test strategy and approach
Field testing will be performed manually and functional tests will be written in detail.
Test objectives
All field entries must work properly.
Pages must be activated from the identified link. The entry screen, messages and responses must not be delayed.
Features to be tested
Verify that the entries are of the correct format No duplicate entries should be allowed All links should take the user to the correct page
-
7/27/2019 11810621075 ramapriyan g
52/62
45
6.1.8 Integration Testing
Software integration testing is the incremental integration testing of two or more
integrated software components on a single platform to produce failures caused by interface
defects.
The task of the integration test is to check that components or software applications, e.g.
components in a software system orone step upsoftware applications at the company level
interact without error.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
6.1.9 Acceptance Testing
User Acceptance Testing is a critical phase of any project and requires significant
participation by the end user. It also ensures that the system meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects encountered.
6.1.10 The need of System testing
This test is done to ensure that the system can perform all of its functions in a realistic
operating environment. Checks are made to ensure that
The system is capable of handling all transactions during periods of peak load without failure or
unreasonable delays.
Peak Load occurs during busy seasons such as lunch breaks.
The system should be able to recover from failures caused due to power failures, hardware
problems etc.,
-
7/27/2019 11810621075 ramapriyan g
53/62
46
6.2 USER INTERFACE TESTING( FORM with Validation Testing)
Validation Testing is a procedure that demonstrates that a test for validating the data.
There are 4 types for Validation Testing. They are Required Field Validation, CompareValidation, Expression Validation, Custom Validation and Validation Summary. If there is an
error in Validation Testing the error messages will be displayed. For Required Field Validation,
the tools should not be empty. It should have some values. Compare validation is used for
password and e-mail address verification. Expression Validation is used to validate the date
format, e-mail address format and phone number formats and so on. The Custom Validation is
used to create a user defined validation. And in the Summary validation, all the validation are
grouped and displayed.
-
7/27/2019 11810621075 ramapriyan g
54/62
47
SYSTEM
IMPLEMENTATION
-
7/27/2019 11810621075 ramapriyan g
55/62
48
CHAPTER 7
7.SYSTEM IMPLEMENTATION
7.1 Scope for Future Development
In proposed system consists of two complementary components: offline link weight
optimization that takes as input the physical network topology and tries to produce maximum
routing path diversity across multiple virtual routing topologies for long term operation through
the optimized setting of link weights.Based on these diverse paths, adaptive traffic control
performs intelligent traffic splitting across individual routing topologies in reaction to the
monitored network dynamics at short timescale. According to our evaluation with real network
topologies and traffic traces, the proposed system is able to cope almost optimally with
unpredicted traffic dynamics and, as such, it constitutes a new proposal for achieving better
quality of service and overall network performance in IP networks.
The two operational networks shows good path diversity performance. A high chance of achieving near-optimal Traffic Engineering performance. The global view of the network, enabling it to achieve a global optimum in traffic
control.
AMPLE can substantially reduce the Maximum Link Utilization for most of the traffictraces.
-
7/27/2019 11810621075 ramapriyan g
56/62
49
CONCLUSION
-
7/27/2019 11810621075 ramapriyan g
57/62
50
CHAPTER 8
8.CONCLUSION
In this article we have introduced AMPLE, a novel TE system based on virtualized IGP
routing that enables short timescale traffic control against unexpected traffic dynamics using
multi topology IGP-based networks. The framework encompasses two major components,
namely, Offline Link Weight Optimization (OLWO) and Adaptive Traffic Control (ATC). The
OLWO component takes the physical network topology as the input and aims to produce
maximum IGP path diversity across multiple routing topologies through the optimized setting of
MT-IGP link weights. Based on these diverse paths, the ATC component performs intelligent
traffic splitting adjustments across individual routing topologies in reaction to the monitored
network dynamics at short timescale. A potential direction in our future work is to consider a
holistic TE paradigm based on AMPLE, which is able to simultaneously tackle both traffic and
network dynamics, for instance network failures.
-
7/27/2019 11810621075 ramapriyan g
58/62
51
8.1BIBLIOGRAPHY
Good Teachers are worth more than thousand books, we have them in Our
Department
References Made From:
1. User Interfaces in C#: Windows Forms and Custom Controls by Matthew MacDonald.
2. Applied Microsoft .NET Framework Programming (Pro-Developer) by Jeffrey Richter.
3. Practical .Net2 and C#2: Harness the Platform, the Language, and the Framework byPatrick Smacchia.
4. Data Communications and Networking, by Behrouz A Forouzan.
5. Computer Networking: A Top-Down Approach, by James F. Kurose.
6. Operating System Concepts,by Abraham Silberschatz.
7. M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D.A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, Above the clouds: A berkeley view
of cloud computing, University of California, Berkeley, Tech. Rep. USB-EECS-2009-
28, Feb 2009.
8. The apache cassandra project,http://cassandra.apache.org/.
9. L. Lamport, The part-time parliament, ACM Transactionson Computer Systems, vol. 16, pp. 133169, 1998.
http://cassandra.apache.org/http://cassandra.apache.org/http://cassandra.apache.org/http://cassandra.apache.org/ -
7/27/2019 11810621075 ramapriyan g
59/62
52
10.N. Bonvin, T. G. Papaioannou, and K. Aberer, Cost-efficientand differentiated data availability guarantees in data clouds,
in Proc. of the ICDE, Long Beach, CA, USA, 2010.
11. O. Regev and N. Nisan, The popcorn market. online marketsfor computational resources, Decision Support Systems,
vol. 28, no. 1-2, pp. 177189, 2000.
12. A. Helsinger and T. Wright, Cougaar: A robust configurablemulti agent platform, in Proc. of the IEEE Aerospace Conference,
2005.
13. J. Brunelle, P. Hurst, J. Huth, L. Kang, C. Ng, D. C. Parkes,M. Seltzer, J. Shank, and S. Youssef, Egg: an extensible and
economics-inspired open grid computing platform, in Proc.
of the GECON, Singapore, May 2006.
14. J. Norris, K. Coleman, A. Fox, and G. Candea, Oncall: Defeatingspikes with a free-market application cluster, in Proc.
of the International Conference on Autonomic Computing,
New York, NY, USA, May 2004.
15. C. Pautasso, T. Heinis, and G. Alonso, Autonomic resourceprovisioning for software business processes, Information
and Software Technology, vol. 49, pp. 6580, 2007.
-
7/27/2019 11810621075 ramapriyan g
60/62
53
16. A. Dan, D. Davis, R. Kearney, A. Keller, R. King, D. Kuebler,H. Ludwig, M. Polan, M. Spreitzer, and A. Youssef, Web
services on demand: Wsla-driven automated management,
IBM Syst. J., vol. 43, no. 1, pp. 136158, 2004.
17. M. Wang and T. Suda, The bio-networking architecture: abiologically inspired approach to the design of scalable, adaptive,
and survivable/available network applications, in Proc.
of the IEEE Symposium on Applications and the Internet,
2001.
18. N. Laranjeiro and M. Vieira, Towards fault tolerance inweb services compositions, in Proc. of the workshop on
engineering fault tolerant systems, New York, NY, USA,
2007.
19. C. Engelmann, S. L. Scott, C. Leangsuksun, and X. He,Transparent symmetric active/active replication for servicelevel
high availability, in Proc. of the CCGrid, 2007.
20. J. Salas, F. Perez-Sorrosal, n.-M. M. Pati and R. Jimenez-Peris, Ws-replication: a framework for highly available web
services, in Proc. of the WWW, New York, NY, USA, 2006,
-
7/27/2019 11810621075 ramapriyan g
61/62
54
web Sites Referred:
http://www.sourcefordgde.com
http://www.networkcomputing.com/
http://www.ieee.org
http://www.emule-project.net/
http://www.sourcefordgde.com/http://www.sourcefordgde.com/http://www.networkcomputing.com/http://www.networkcomputing.com/http://www.ieee.org/http://www.ieee.org/http://www.emule-project.net/http://www.emule-project.net/http://www.ieee.org/http://www.networkcomputing.com/http://www.sourcefordgde.com/ -
7/27/2019 11810621075 ramapriyan g
62/62
8.2REFERENCES
1 .NET IN 60 DAYS A MINUTE- BRUCE BRAWSTOW & TONY MARTIN
2. .NET PROGRAMMING BIBLE- TONY MARTIN
3 .NET DEVELOPERS GUIDE- GREG BUCZEK- TATA MSGRAW-HILL-EDITION
4. SQL 2005 BIBLE -CARYN.PRAGUE&MICHAELR.IRWIN