cybercon documentation

Upload: ananda-suresh

Post on 06-Apr-2018

215 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/3/2019 CyberCon Documentation

    1/14

    CyberCon v1.0The Ultimate Cyber Control Software

    Submitted By,

    Shoaib Mohammed A, II B.E. EEE,

    [email protected]

    Paavai Engineering College,Paavai Nagar,Pachal,

    Namakkal-18.

  • 8/3/2019 CyberCon Documentation

    2/14

    System Requirements (Minimum)

    Pentium II or any equivalent processor (Client) Pentium III or any equivalent processor (Server)

    128 MB of system RAM

    Windows 98/XP Operating System (WinXP Recommended) LAN Connection between all Clients and Server

    Color Monitor which is compatible with 1024x768 Display

    Languages Used

    The whole of the CyberCon has been developed using Microsoft VisualBasic 6.0 for Front-End and Ms-Access for Back-End.

  • 8/3/2019 CyberCon Documentation

    3/14

    Abstract

    Until now, only a few centers had been the popular cyber centers becauseof their complete automation and human interruption freeness. But from now on,every cyber center, no matter small or large, has the same opportunity of getting

    popularity and fame.

    This is a prototype networking software which is just enough to deal up tothe complete automation of cyber centers. It helps cyber owners to forget theirworries about the login and logout time of their customers. It completelyautomates all the possible actions performed by humans in a cyber center. It alsooffers security and reliability. It is free from human errs and hence it providescomplete satisfaction to the customers also.

    This software which works by inter-network communication is possible ofmanaging multiple clients with a great ease. No Network Problems, no user

    queue for login. It is completely user friendly and hence it ensures that thecustomers like it the most.

    CyberCon

    I have named this software as CyberCon which stands for CyberConnector. As the name itself says, it is capable of connecting multiple systemsacross the cyber network. The CyberCon is capable of working on its own without any external guidance. With its built-in security policies, its offers completereliability for the CyberCon owner and users.

    The CyberCon owner just needs to Create a key (Card Number) to thelocal database specifying the time for the corresponding key. The next thing hehas to do is to give the key to users through cards (or through any other means).Then the user can go to any client system and use the card number for creatinga new account with user name and password. The time for the correspondingcard number is credited to his/her account. The user can then logon using thesame user name and password.

    The account will be valid till a non-zero balance. When the balance dropsto zero, the account is closed and the user is logged out automatically. Inaddition to this, the user can log out of the server at any time he wills. Thebalance will not be reduced after this and his account would be locked for futureuse. The user can later then logon and use the balance time.

    In addition to the feature of creating a new user, CyberCon also providesthe facility of renewing an invalidated account. So, the users can have theirunique User name and password without the fear of being deactivated.

  • 8/3/2019 CyberCon Documentation

    4/14

    Server

    The server system is the main system for a CyberCon network. All theclients are connected to the server. The Clients send their requests to the serverand the server processes the request and resends the processed output to the

    appropriate client. The server also monitors the working of the clients and keepstrack of the active clients.

    Working of Server

    Communication

    The CyberCon uses Microsoft Winsock control to communicate toits clients. The clients also use the same method to communicate to the Server.The Winsock control uses Port-to-Port communication which is a quite reliablemethod of communication across the network. An UDP protocol is used to

    establish the connection between the server and the client.

    Communication Language

    The server and client communicate to each other by passing thecommands (Messages) within Token values. There are totally four delimiterswhich specify which action to be performed and they are

    1. Command

    Whenever a command statement is encountered by the software,the command is executed with the highest priority

    2. Request

    Whenever a Request statement is encountered by the software, therequest is treated with least priority when compared to the priority of thecommand

    3. Display

    The display command is used to display any message. No processis made for the Display command. The message to be displayed is displayed tothe client through Balloon Message Boxes

    4. Pulse

    A pulse statement, unlike the above two statements is independentand has no token values. The pulse is sent only by the server to all its activeclients. The clients only work as long as the pulse is being received from the

  • 8/3/2019 CyberCon Documentation

    5/14

    server. So, when the server is shut down, the pulse being sent to its clients alsoshuts down. As a result, all the active clients lock themselves until any furtherpulse is received from the server. A grace period of 20 Seconds has been givenbefore the clients lock up within which the Server has to recover for the clients toremain open. This ensures that the server and clients are connected all the time

    and no loss of data packets takes place.

    Tokens

    The Token values specify what actions have to be performed bywhom and where. All the Tokens begin with a ''. This marksthe starting token whereas the ending token begins with a ''.

    Example

    [COMMAND]user1

    pass1

    XXXXXX

    In the above example, a command is given to the server that alogin request has been made by machine XXXXXX for username 'user1' andpassword 'pass1'.

    The server then processes the clients request and checks for theuser in the local database and checks whether the password is correct and thatwhether any time is remaining in that particular account. The server then sendsthe processed results as below

    If The Username & Password are correct and if there is a timebalance then a command as below is sent

    [COMMAND]

    User Data Storage

    The user datas are stored in a local database. The database is located inthe server and is protected from the client. The datas are accesses usingDatabase controls Ms-Access as Back end.

    Working of Client

    Protection

    It is easy to End any process through the Task Manager. Thus, it isalso feasible for the users to shut down the CyberCon client using the taskmanager. Thus, a separate policy has been created to By-Pass the system Taskmanager access. Thus, the client is secure from the danger of being closed.Whenever an attempt is made to shut down the client, an alert message is sent

  • 8/3/2019 CyberCon Documentation

    6/14

    to the server. In addition to the alert message sent to the server, the attemptmade to close the client is also averted by Over Riding the close requests sendby windows.

    User Friendly

    The CyberCon client is made as user friendly as possible. A clientinterface window remains open all the time. This menu has access to twofeatures, which include the Logout and the Call Help commands. The user isprivileged with the Real Time Updating of his Account details such as theBalance Time, the last login time etc. By pressing the logout button, the user islogged out of the server and the client is locked out until another login is madefrom the client.

  • 8/3/2019 CyberCon Documentation

    7/14

    The above picture shows the Login screen for the CyberCon client. Thereare three buttons namely Login, New Account and Renew Account usingwhich the user could do the appropriate action.

    DLL

    Plug-in have been provided for client for multiple purposes likeprocess management, system management etc. The reason for providing theDLL is due to the reason that they can be updated easily with out affecting themain program.

    Installing Procedures

    The CyberCon Server has to be unique and can be installed on preferably

    a higher configuration system. The server and client can be installed using theirrespective install shields. This doesnt do all. The main part of the CyberConstarts here. Now i have to setup the registry so as the Server and Client come toknow each other. This Feature provides from any external intruder from intrudinginto the server.

  • 8/3/2019 CyberCon Documentation

    8/14

    Setting up the Registry

    Client

    A Client needs to store the following data in the registry

    1. Machine IDThis enables the server to identify the appropriate client. A same

    copy of the Machine ID (MID) is stored in the server for recognition purpose.

    2. Machine IPThis is set just as a precautionary measure. This stores the IP of

    the Machine

    Finally we need to press the register button.

    Server

    The registering of the client details in the server is a complex one,but it is simplified in a method below

    All the three details have to be given first before giving 'Add'

    1. Machine ID - ListThe Machine ID of the client is given. The Exact ID stored in the

    client should be given

    2. Machine IP - ListThe Corresponding IP of the Machines with the above Machine ID

    is to be given. This could be quite confusing, but it is not a tough job.

    Finally we need to press the register button

  • 8/3/2019 CyberCon Documentation

    9/14

    Sever Registration

    Step 1: Enter your Machine ID and Machine IP of Your Client. You Can Add Multiple Clients. TheMachine ID should be Unique

  • 8/3/2019 CyberCon Documentation

    10/14

    NOTE: Improper Registry Setting will lead to Improper/Non working of CyberCon system

    Shutting Down the Task Manager

    The task manager has to be disabled manually (Permanent basis) by over ridingthe windows default settings using the "Task Disabler" provided with the CyberCon.

    Server Interface

    The server interface at the start up is show in the picture below. It contains fields

    to display the active clients and the users logged in. Also it has two check boxes foremergency purpose. Two Over Ride settings have been provided for use of theadministrator during the emergency.

    Manual Over Rides

    1) Stop Server Response

    This setting over rides any process performed by the server. But theclients remain opened and do not close. This could be used in a casewhen the administrator presumes to encounter any hacking step. All the

    hacks would be over ridden by cyber con. Under this circumstance, theuser cannot logout.

    2) Lock All Clients

    This is also another over ride setting in which all the cyber con clients arelocked up. No login attempt made would be succeeded. But the serverremains open. This could also be used at the time of discrepancies.

  • 8/3/2019 CyberCon Documentation

    11/14

    Server Interface with one active client and no user logged in

    Server Interface with One active client and one user Logged in

  • 8/3/2019 CyberCon Documentation

    12/14

    Server with Response Over Ride setting Enabled

    Status bar showing the Over ride status

  • 8/3/2019 CyberCon Documentation

    13/14

    A Simple CyberCon Network

    Client 1

    Client 3Client 2

    Server

    I/O Pipes

    Client 1

    Client 2

    Client 3

    Server

  • 8/3/2019 CyberCon Documentation

    14/14

    ADVANTAGES

    Complete automation gives us a great relief

    bord

    high standard environmentr Large scale

    tation

    I can go on specifying the advantage of this software as we all know that

    pplication

    This software is implemented for a small scale purpose i.e. LAN i.e. just

    onclusion

    In this software, I have put my innovative ideas and hope that the best of it

    I have presented my best through this software and hope that it would be

    Security features prevent maximum hacks User needs no external assistance User finds easy to work Saves a lot of Manual La A Lot of Paper work is reduce Provides the cyber center with a Cheap and best when compared to Lacks of Rupees given fo

    software ( Taking a agreement from Sify or any other such organizationscosts Lacks of rupees)No Account Expiry Limi

    there is no current implementation of this type of software in a small scale basis.

    A

    within a cyber center. Any future use of it would surely inspire for a large scaledevelopment in WAN basis.

    C

    would benefit for the future of the world. I am planning to develop a large scaleproject of this even if there is any least sign of success. But I surely do hope forthe best.

    liked by all.