Network Programming

Original price was: $ 13.00.Current price is: $ 12.00.

A Case Study Of Secured Client-Server Chat Application

Description

ABSTRACT
Several network systems are built to communicate with one another as well as made available through service-oriented architectures. In this project, the client server architecture is used to develop a chat application. Firstly a chat application is created for both Client and Server which is based on Transmission Control Protocol (TCP) where TCP is connection oriented protocol and is a reliable connection protocol.

As security is the key factor while communicating over a network,  so in this project, MySQL SSL protocol and hash function was used for the Database based on a numbers of benefits. The hash values of the real password and the random generated number (salt) is stored in the database. The original password is not stored on the system, making cracking of password much harder.

TABLE OF CONTENT
i  Title Page
ii  Certification
iii  Approval Page
iv Dedication
v. Acknowledgement
vi. Abstract
vii. Table of Contents
x. List of Tables
xi. List of Figures

CHAPTER ONE
1.1 Introduction
1.2 Background of the study
1.3 Statement of the problem
1.4 Objectives of the study
1.5 Significance of the study
1.6 Scope of the study
1.7 Limitations
1.8 Organization of the work
1.9 Definition of terms

CHAPTER TWO
Literature Review
2.1 Client-Server and other models
2.2 Client-Server communication
2.3 Host identification and service port
2.4 Sockets and socket based communication
2.5 TCP/IP Socket programming
2.6 Socket programming in Java
2.7 Secure internet programming
2.8 Overview of secure socket layer (SSL)
2.9 Security
2.10 Hash functions

CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.1 Methodology
3.2 Primary Data collection
3.2.1 Secondary Data collection
3.3 Analysis of the existing system
3.4 Limitations of the existing system
3.5 System Design
3.6 Database Design
3.7 System Flowchart
3.8 Top Down Diagram
3.9 Justification of the new system

CHAPTER FOUR
IMPLEMENTATION TESTING AND INTEGRATION
4.1 Choice of development tools
4.2 System Requirements
4.2.1 Software Requirements
4.2.2 Hardware Requirements
4.3 Implementation
4.4 Testing
4.4.1 Unit Test
4.4.2 System Test
Integration

CHAPTER FIVE
SUMMARY, RECOMMENDATIONS AND CONCLUSION
5.1 Summary
5.2 Limitations
5.3 Recommendations
5.4 BILL OF ENGINEERING MEASUREMENT AND EVALUATION
5 5.3 Conclusion
Bibliography
Appendix A:
Appendix B: SAMPLE OUTPUT
Appendix C: USER GUIDE

Additional information

Dimensions 5 × 90 × 11575 in