Context And Preliminary Investigation Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

These are the era of computers and we know that all the transactions and process are carried through the help of computer network. And to make it secure we have to implement measures that make it more reliable, efficient, secure and trouble-free and for all these problems the solution is Network Shield. Network Shield is a total network security application. This application can be easily used within an organization and can be used also for the network having access to other network. It will be mainly used by the Network Adminstrator and Network Manager to verify security policies of their network.

System Administrator / Network manager: System Administrators are the users that have the responsibility of handling network, hardware's and software's of the organization.

Client / User: End user who are responsible for doing their work. These are the employees or client of organization.

Problem Context

Computer networks form a vital part of any modern workplace environment. There are various tasks that are being done from computers since a decade but still there are so many performance-compensating issues that make working within these computer networks an exorcism and even more painful in tracking down the correct source of a broad problem of a poor network. The major problems of these networks are these:

Port numbers are unique in the computer system. These ports range from:

Well Known Ports - [0 - 1023]

Registered Ports - [1024 - 49151]

Dynamic and/or Private Ports - [49152 - 65535]

Often when any program performs any task on your system, it uses the ports to do so and after the completion of the task it leaves that port open which can invite various network problems like - virus, intrusions etc. Also user cannot detect any open ports that are facing any problems continuously.

Now a days in the organizations for the clients that operate in the network, they are not allowed to access various illegal or prohibited sites, even then also it is being accessed and waste time and energy on it.

Many unauthorized user enter the network of the system somehow and either steal the data or activate some harmful software that hinders the performance of the system in that network and also the network. And there is no reliable way to prevent it.

Now days from several kind of attack the data have become too much volatile and endangered and the computer memory is not even safe to keep that data. And if somehow the memory crashes or corrupted it is impossible to retrieve the data in time and completely.

Sometimes even if a network administrator knows that a particular user from a known IP is harming the network, still he cannot stop the traffic from that IP. In this case administrator becomes helpless and has no other option for it.

Also if there is any application like this it doesn't have the cross platform features, either it will come for windows based architecture or Linux based architecture.

The traditional way of making a network secure is to implement any strong firewall or any software on the each client. To understand working of these application one needs a network training, also it may happen that the application is not compatible with other network application. When different applications are used to perform several task this may cause hindrance to system and network performance. Also the cost cannot be affordable as buying and installing different software's for the different purpose is not feasible. To avoid such condition there is a need of an application that comprises all different functionality in one (such as port scanner, packet filter, remote monitoring system, LAN network backup and recovery system, packet analyzer and many more) and it should be easy to install, understand and cost effective.

Project Rationale

Network Shield is a network security application for organization that consist of group of computers connected to each other to transfer or share their information and data. Any applications that have all functionality such as port scanner, packet filter, remote monitoring system, LAN network backup and recovery system, packet analyzer etc. is very useful as it will reduce cost as compare to buying different software for that purpose. Based in these details there are many benefits from this application that can effect directly or indirectly.

Objective of System Development

The basic objective of Network Shield is to provide an organization total network security from outside and within the network that also in a single application. The system provide user more effective, efficient, time saving, cost saving solution. As the developer has explained in the project background that what are the problem we are facing in any organization. Network Shield provides and eases to all those problems and helps the organization in better way.

Main Objective:

Port Scanner for network backbone

Packet Filter for network backbone

Network Monitoring for LAN

Digital Signature in LAN

Network Controller in LAN

Backup and Recovery in LAN

Project Scope

The main functionalities that will be included in the projects will be divided into two stages:

Backbone Network

Local Area Network

It will be mainly used by the Network Adminstrator to verify security policies of their network. It will prove important application to be installed on those areas where there are large number of computer connected to the server through a single backbone cable. So the main area of its functioning will be:


Defense Department

Stock Market

Small software Companies

Small organizations like school and college

The scope of the system for the user is very extensive, the system allows administrator to perform its routine security check. Also the client or the normal user in the organization can perform various tasks from the system these are as follows:

Complete network security by performing check for ports.

Can perform packet filtering.

Can performing network monitoring.

Can control unauthorized user to connect from the network.

Can generate report for all the activity being performed in the network.

Can control the task being performed on the network.

Can perform backup and recovery of file within client and server.

Project Functionalities

Core Functionalities

The functionalities are the main task that the application is performing:

Real Time Port Scanner and Detection for Network Backbone ƒ 

It is a port scanner that scans the port and detects open ports and those ports that are continuously being attacked, so that they can be blocked and secure the network.

Packet Filter for Network Backbone ƒ 

It will filter all the outgoing and incoming packets and drop any harmful packet and allow all non harmful packets to pass.

Network Monitoring in LAN ƒ 

It will provide surveillance to whole LAN and give detail information about the clients in the network. Also to track down what operation they are performing with their system and network and even prohibit them from accessing illegal websites.

Detail Information of packets traveling within the LAN and going outside through Network Backbone

Report Generation for Network Issues ƒ 

The application will generate any kind of report based on administrator queries.

Integrated Application (All in one application) ƒ 

The Network Shield will be an all in one application as all the above and below mentioned functionalities will be integrated in one single application.

Cross Platform Application ƒ 

Being a cross platform application makes Network Shield very useful in many areas.

Enhanced Functionalities

The additional task that the system will be performing:

Digital Signature in Terminal in LAN ƒ 

Any user who wants to connect with network has to pass the security check that is valid MAC, IP address and User authentication ID; otherwise he cannot perform any of the tasks in the network.

Customizable User Interface ƒ 

After having all this functionalities the interface of the application cannot be dull. So to provide better user management the interface of the application will be customizable.

Special Functionalities

The advance task that the system will be performing if I have time and ability:

Network Controller in LAN ƒ 

The application will control all the activities in the network so as to ensure that the user doesn't operate any illegal network application or software.

LAN Network Backup and Recovery ƒ 

It is a very useful functionality in Network Shield for the LAN management, due to this feature the user will be able to secure his data and recover it later on so that he may not loss any important data.

Project Planning

Project Development Plan

Project development plan is the most important thing in development of any project, but in this project if it fails, all the work fails. So developer has to take a sharp inspection on the schedule and the work done at each and every stage of project development. For time scheduling there are so many tools and techniques available in project management. In order to develop the system the developer has gone through the following project development plan:

Work Break Down Structure

A work breakdown structure is a deliverable -oriented grouping of work involved in a project that defines a total scope of project.

(Schewable, 2008, p. 175)

Gantt Chart

It is common tool for displaying project schedule information.

It contains milestones, summary tasks, individual task durations and arrow showing task dependency.

Gantt chart will be used for displaying project schedule information. Milestones information, summary task, individual task and task dependency of Gantt chart in report will represent how each and every task will be completed and it will represent the proper timing information of project.

(Schewable, 2008, p. 215)

Quality Management

Test Plan

Testing is a technique of identifying and correcting the errors. But for testers testing is a technique to try to make a system fail. A test ensures that the particular module or the component is bug free and is ready to be implemented. There are many approaches to testing, but effective testing of complex products is essentially a process of investigation, not merely a matter of creating and following rote procedure.

Test Plan & Strategies

White box Testing

This type of testing is based on knowledge of the internal logic of an application's code and the structure of the code. This is also known by different names like Glass Box Testing, Structural, open box testing. To do white box testing, I have to deal with the code so it is necessary to possess knowledge of coding and logic i.e. internal working of the code. The advantage is that all the bugs can be known during the coding time itself and can be fixed and no extra effort is needed. It helps in optimizing the code and removing the extra lines of code, unnecessary code which can be a threat at a later point of time.

Unit Testing

This type of testing is used in order to check if the particular module or unit of code is working fine. This is the micro level of testing. I will be doing this testing while the code is being written. The Unit Testing comes at the very basic level as it is carried out as and when the unit of the code is developed or a particular functionality is built. The modules for e.g., like port scanner, packet filter module would be tested individually.

Testing ID

Testing Fields / Data (Unit Testing)


Real Time Port Scanner

Nitin Sinha

Real Time Port Detector

Nitin Sinha

Digital Signature in Terminal

Nitin Sinha

Network Monitoring

Nitin Sinha

Network Controller

Nitin Sinha

Intrusion Detection

Nitin Sinha

Packet Filter

Nitin Sinha

Packet Analyzer

Nitin Sinha

LAN Backup

Nitin Sinha

LAN Recovery

Nitin Sinha

Black box Testing

In this type of testing there is no need to have any knowledge of the internal design or the code or the knowledge of the design or architecture is required. The testing under this type of strategy is totally focused on testing the requirements and the functionality of the application based on the requirements given. The testing will be effective based on the selection of appropriate data as per the functionality and using them and testing it against the requirements given to check for the positive and negative behaviour of the system.

Integration Testing

This type of testing is carried out in combination of modules to determine if they function together correctly. This is to see that the flow of information, flow of data, additions, and deletions are reflected in their respective locations etc. Testing two modules like network monitoring or network intrusion module to be able to find the free flow of information within each module and to be able to interchange the data without having errors.

Testing ID

Testing Fields / Data (Integration Testing)


Real Time Port Scanner + Real Time Port Detector

Nitin Sinha

Digital Signature in Terminal + Intrusion Detection

Nitin Sinha

Real Time Port Scanner + Real Time Port Detector + Packet Filter

Nitin Sinha

Network Monitoring + Packet Analyzer

Nitin Sinha

LAN Backup + LAN Recovery

Nitin Sinha

Network Monitoring + Network Controller

Nitin Sinha

System Testing

This type of testing is carried out after the application is developed as a whole and all other testing techniques like unit, integration testing will be carried out and that the flow of the information or data is as expected in the entire flow of the application and is based on overall requirements specifications, it covers all combined parts of a system.

Testing ID

Testing Fields / Data (System Testing)


Backbone Operation

Nitin Sinha/ Network Administrator

LAN Surveillance

Nitin Sinha/ Network Administrator

LAN Operation

Nitin Sinha/ Network Administrator

Stress Testing

Testing conducted to evaluate a system or component at or beyond the limits of its specified requirements to determine the load under which it fails and how. A graceful degradation under load leading to non-catastrophic failure is the desired result. Often Stress Testing is performed using the same process as Performance Testing but employing a very high level of simulated load.

Testing ID

Testing Fields / Data (Stress Testing)


Backbone Operation

Nitin Sinha

LAN Surveillance

Nitin Sinha

LAN Operation

Nitin Sinha

Acceptance Testing

The final testing based on specifications of the end-user or customer, or based on use by end-users/customers over some limited period of time to see that all the requirements of the user have been met and works as desired by the user. The user includes the administrative staff, faculty and the student who are going to use the system.

Testing ID

Testing Fields / Data (Acceptance Testing)


Requirement Completion

Nitin Sinha/ Network Administrator

System Acceptable

Nitin Sinha/ Network Administrator

Error Handling

Nitin Sinha/ Network Administrator


Nitin Sinha/ Network Administrator

These testing will be done after the implementation phase where system is divided into modules and coding and designing will be done according to each module.

Platform Testing

Platform testing will be done to insure whether the application is portable and interoperable in different platforms (Operating System). As this project being a cross platform application it is necessary to test whether it is giving identical results for different platforms.

Testing ID

Testing Fields / Data (Platform Testing)


Application functionality and performance

Nitin Sinha

API functionality

Nitin Sinha

Validating GUI

Validating installation

Success Criteria

A successful project is always based on the evaluation of the success criteria. Some important points that should be taken in considering for a success criteria are:

Meeting Projects Requirement:

I think the first and the foremost important element for a successful project includes the fulfilment of requirements.

Quality of software Developed:

The quality of the application developed satisfies the whole application needs.

Execution of project plan and activities:

Every project plan and activity should be executed in planned manner, at correct time for better result in project management and development.

Meeting Timeline:

Not Meeting the timeline is an offence that cannot be neglected at any cost. As it results in delayed system development, unnecessary cost increment and dissatisfaction of user.


Each & every functionality of the System should be well functioning so that the system would not fail at the critical juncture.

Research and Analysis:

Extensive research and analysis forms the basis of a successful project. It is said that the success of a project depends upon the way how good the research & analysis has been done for the success of the project.


The usability principles needs to be followed that would ensure a project to be successful.

Test Result Shown:

At the time of testing every result should be shown whether it is correct or incorrect. This result helps in later stage to verify how the system should perform and what was it performing. Then how the problem was tackled?

Documentation Provided with System:

Documentation is the soul of every system as it gives each and every detailed information's about the system. Documentation can maintain task involved in the system, the problems faced in the system while developing it, details of the task performed in the stages of system development, and also it comes handy in reviewing the system.