Font Size: a A A

The Analysis And Design Of Network Data Monitoring System

Posted on:2012-07-09Degree:MasterType:Thesis
Country:ChinaCandidate:H J PanFull Text:PDF
GTID:2218330338953385Subject:Software engineering
Abstract/Summary:PDF Full Text Request
With the development of Internet, computer network has stepped into people's daily life at a high speed and is playing a significant role. Though, the development of network has been accompanied by various problems, the most serious of which is security issues.The current development of computer network has such features as larger scale, more intense complexity, and more network load. Users'demand of network is rising and the inherent defects and holes of network are increasing. The security defects of the plan and design of subnet affect the quality of network. Therefore the network administration, system stability and network security have become an important aspect of network research.The research of packet sniffing system is important for the maintenance of network stability and the resolution of network security problem. Packet sniffing system can help to diagnose network routers and other connection equipment. It can also monitor the data transfer process. Thus, it can help the network administrator with administration and maintenance.In this paper, we did a lot of work to research on the problems above. At first, we selected network security and network monitoring as the research object, and described the popular network monitoring tools, especially the principle and the implement methods. This is very important to us to realize a new system. Meanwhile, the system requirements, skeleton design and module design were described. And then we give a simple description about the design algorithm and system structure.After completing the algorithm design, through the use of Visual C++for network programming, we implement intercepting the network data and simple protocol analysis functions, you can view the source and destination address of the packet, source and destination ports and the contents of data carried. Research should be able to tell from the above there are a considerable number of local area network data transmission still has expressly for the confidentiality of the data adversely. So people need to maintain the attention to the flow of network packets, and provide data encryption to prevent hacker getting the sensitive information. At last, we did some conclusion of the paper, and discussed the flaws of our algorithm. We also gave some expectations about our research combined with the recent and most popular technologies.
Keywords/Search Tags:Network monitoring, Winsock technology, Visual C + +, monitoring tools, datagram analysis
PDF Full Text Request
Related items