ABSTRACT
Several network systems are built to communicate with one another as well as made available through service-oriented architectures. In this project, the client server architecture is used to develop a chat application. Firstly a chat application is created for both Client and Server which is based on Transmission Control Protocol (TCP) where TCP is connection oriented protocol and is a reliable connection protocol. As security is the key factor while communicating over a network, so in this project, MySQL SSL protocol and hash function was used for the Database based on a numbers of benefits. The hash values of the real password and the random generated number (salt) is stored in the database. The original password is not stored on the system, making cracking of password much harder.
TABLE OF CONTENT
Title Page……………………………………………………………………….….i
Certification………………..………………………………………………….….ii
Approval Page………………………………………………………………..…iii
Dedication………………………………………………………………………...iv
Acknowledgement……………………………………………………...................v
Abstract…………………………………………………………………………..vi
Table of Contents………………………………………………………………...vii
List of Tables………………………………………………………………………x
List of Figures……………………………………………………………….……xi
Chapter 1:
1.1 Introduction…………………………………………………………………..1
1.2 Background of the study………………………………………………………2
1.3 Statement of the problem………………………………………………………4
1.4 Objectives of the study………………………………………………………..4
1.5 Significance of the study………………………………………………………5
1.6 Scope of the study…………………………………………………………….6
1.7 Limitations…………………………………………………………………….6
1.8 Organization of the work……………………………………………………..7
1.9 Definition of terms…………………………………………………………….8
Chapter 2: Literature Review
2.1 Client-Server and other models……………………………………………….10
2.2 Client-Server communication…………………………………………………11
2.3 Host identification and service port…………………………………………...12
2.4 Sockets and socket based communication…………………………………….13
2.5 TCP/IP Socket programming………………………………………………….14
2.6 Socket programming in Java………………………………………………….15
2.7 Secure internet programming…………………………………………………16
2.8 Overview of secure socket layer (SSL)……………………………………….16
2.9 Security………………………………………………………………………..17
2.10 Hash functions……………………………………………………………….19
Chapter 3: SYSTEM ANALYSIS AND DESIGN
3.1 Methodology………………………………………………………………….21
3.2 Primary Data collection……………… …………………………………....26
3. 2.1Secondary Data collection…………………………………………………26
3.3 Analysis of the existing system…………………………………………….26
3.4 Limitations of the existing system………………………………………….27
3.5 System Design…………………………………………………………….....27
3.6 Database Design…………………………………………………………….38
3.7 System Flowchart………..………………………………………………….40
3.8 Top Down Diagram…………………………………………………………41
3.9 Justification of the new system……………………………………………..41
Chapter 4: IMPLEMENTATION TESTING AND INTEGRATION
4.1 Choice of development tools…………..……………………….…………..42
4.2 System Requirements…………………………………………………….…43
4.2.1 Software Requirements……………………………………………………43
4.2.2 Hardware Requirements…………………………………………………..44
4.3 Implementation………………………………………………………………44
4.4 Testing………………………………………………………………………...51
4.4.1 Unit Test…………………………………………………………………….51
4.4.2 System Test………………………………………………………………..51
4.5 Integration…………………………………………………………………..52
Chapter 5: SUMMARY, RECOMMENDATIONS AND CONCLUSION
5.1 Summary………………………………………………………………….…...53
5.2 Limitations……………………………………………………………………53
5.3 Recommendations…………...………………………………………………54
5.4 BILL OF ENGINEERING MEASUREMENT AND EVALUATION………55
5.3 Conclusion..................................................................................................…...56
Bibliography………………………………………………………… …………58
Appendix A: PROGRAM CODES
Several network systems are built to communicate with one another as well as made available through service-oriented architectures. In this project, the client server architecture is used to develop a chat application. Firstly a chat application is created for both Client and Server which is based on Transmission Control Protocol (TCP) where TCP is connection oriented protocol and is a reliable connection protocol. As security is the key factor while communicating over a network, so in this project, MySQL SSL protocol and hash function was used for the Database based on a numbers of benefits. The hash values of the real password and the random generated number (salt) is stored in the database. The original password is not stored on the system, making cracking of password much harder.
TABLE OF CONTENT
Title Page……………………………………………………………………….….i
Certification………………..………………………………………………….….ii
Approval Page………………………………………………………………..…iii
Dedication………………………………………………………………………...iv
Acknowledgement……………………………………………………...................v
Abstract…………………………………………………………………………..vi
Table of Contents………………………………………………………………...vii
List of Tables………………………………………………………………………x
List of Figures……………………………………………………………….……xi
Chapter 1:
1.1 Introduction…………………………………………………………………..1
1.2 Background of the study………………………………………………………2
1.3 Statement of the problem………………………………………………………4
1.4 Objectives of the study………………………………………………………..4
1.5 Significance of the study………………………………………………………5
1.6 Scope of the study…………………………………………………………….6
1.7 Limitations…………………………………………………………………….6
1.8 Organization of the work……………………………………………………..7
1.9 Definition of terms…………………………………………………………….8
Chapter 2: Literature Review
2.1 Client-Server and other models……………………………………………….10
2.2 Client-Server communication…………………………………………………11
2.3 Host identification and service port…………………………………………...12
2.4 Sockets and socket based communication…………………………………….13
2.5 TCP/IP Socket programming………………………………………………….14
2.6 Socket programming in Java………………………………………………….15
2.7 Secure internet programming…………………………………………………16
2.8 Overview of secure socket layer (SSL)……………………………………….16
2.9 Security………………………………………………………………………..17
2.10 Hash functions……………………………………………………………….19
Chapter 3: SYSTEM ANALYSIS AND DESIGN
3.1 Methodology………………………………………………………………….21
3.2 Primary Data collection……………… …………………………………....26
3. 2.1Secondary Data collection…………………………………………………26
3.3 Analysis of the existing system…………………………………………….26
3.4 Limitations of the existing system………………………………………….27
3.5 System Design…………………………………………………………….....27
3.6 Database Design…………………………………………………………….38
3.7 System Flowchart………..………………………………………………….40
3.8 Top Down Diagram…………………………………………………………41
3.9 Justification of the new system……………………………………………..41
Chapter 4: IMPLEMENTATION TESTING AND INTEGRATION
4.1 Choice of development tools…………..……………………….…………..42
4.2 System Requirements…………………………………………………….…43
4.2.1 Software Requirements……………………………………………………43
4.2.2 Hardware Requirements…………………………………………………..44
4.3 Implementation………………………………………………………………44
4.4 Testing………………………………………………………………………...51
4.4.1 Unit Test…………………………………………………………………….51
4.4.2 System Test………………………………………………………………..51
4.5 Integration…………………………………………………………………..52
Chapter 5: SUMMARY, RECOMMENDATIONS AND CONCLUSION
5.1 Summary………………………………………………………………….…...53
5.2 Limitations……………………………………………………………………53
5.3 Recommendations…………...………………………………………………54
5.4 BILL OF ENGINEERING MEASUREMENT AND EVALUATION………55
5.3 Conclusion..................................................................................................…...56
Bibliography………………………………………………………… …………58
Appendix A: PROGRAM CODES