NETWORK PROGRAMMING USING JAVA SCRIPT (SECURED CLIENT-SERVER CHAT APPLICATION) - Project Topics & Materials - Gross Archive

Click To download full Project Materials

                                                       ABSTRACT
 
Several network systems are built to communicate with one another as well as made available through service-oriented architectures. In this project, the client server architecture is used to develop a chat application.  Firstly a chat application is created for both Client and Server which is based on Transmission Control Protocol (TCP) where TCP is connection oriented protocol and is a reliable connection protocol. As security is the key factor while communicating over a network, so in this project, MySQL SSL protocol and hash function was used for the Database based on a numbers of benefits. The hash values of the real password and the random generated number (salt) is stored in the database. The original password is not stored on the system, making cracking of password much harder.
 

TABLE OF CONTENT

Title Page……………………………………………………………………….….i
Certification………………..………………………………………………….….ii
Approval Page………………………………………………………………..…iii
Dedication………………………………………………………………………...iv
Acknowledgement……………………………………………………...................v
Abstract…………………………………………………………………………..vi
Table of Contents………………………………………………………………...vii
List of Tables………………………………………………………………………x
List of Figures……………………………………………………………….……xi
Chapter 1: 
1.1 Introduction…………………………………………………………………..1
1.2 Background of the study………………………………………………………2
1.3 Statement of the problem………………………………………………………4
1.4 Objectives of the study………………………………………………………..4
1.5 Significance of the study………………………………………………………5
1.6 Scope of the study…………………………………………………………….6
1.7 Limitations…………………………………………………………………….6
1.8 Organization of the work……………………………………………………..7
1.9 Definition of terms…………………………………………………………….8
 
Chapter 2: Literature Review
2.1 Client-Server and other models……………………………………………….10
2.2 Client-Server communication…………………………………………………11
2.3 Host identification and service port…………………………………………...12
2.4 Sockets and socket based communication…………………………………….13
2.5 TCP/IP Socket programming………………………………………………….14
2.6 Socket programming in Java………………………………………………….15
2.7 Secure internet programming…………………………………………………16
2.8 Overview of secure socket layer (SSL)……………………………………….16
2.9 Security………………………………………………………………………..17
2.10 Hash functions……………………………………………………………….19
 
Chapter 3:  SYSTEM ANALYSIS AND DESIGN
3.1 Methodology………………………………………………………………….21
3.2 Primary Data collection……………… …………………………………....26
3.    2.1Secondary Data collection…………………………………………………26
3.3    Analysis of the existing system…………………………………………….26
3.4    Limitations of the existing system………………………………………….27
3.5    System Design…………………………………………………………….....27
3.6    Database Design…………………………………………………………….38
3.7    System Flowchart………..………………………………………………….40
3.8    Top Down Diagram…………………………………………………………41
3.9    Justification of the new system……………………………………………..41
 
Chapter 4:  IMPLEMENTATION TESTING AND INTEGRATION
4.1 Choice of development tools…………..……………………….…………..42
4.2 System Requirements…………………………………………………….…43
4.2.1 Software Requirements……………………………………………………43
4.2.2 Hardware Requirements…………………………………………………..44
4.3 Implementation………………………………………………………………44
4.4 Testing………………………………………………………………………...51
4.4.1 Unit Test…………………………………………………………………….51
4.4.2 System Test………………………………………………………………..51
4.5 Integration…………………………………………………………………..52
 
Chapter 5:  SUMMARY, RECOMMENDATIONS AND CONCLUSION
5.1 Summary………………………………………………………………….…...53
5.2 Limitations……………………………………………………………………53
5.3 Recommendations…………...………………………………………………54
5.4 BILL OF ENGINEERING MEASUREMENT AND EVALUATION………55
5.3 Conclusion..................................................................................................…...56
Bibliography………………………………………………………… …………58
Appendix A: PROGRAM CODES 

TERMS AND CONDITIONS

Using our service is LEGAL and IS NOT prohibited by any university/college policies

You are allowed to use the original model papers you will receive in the following ways:

1. As a source for additional understanding of the subject

2. As a source for ideas for your own research (if properly referenced)

3. For PROPER paraphrasing ( see your university definition of plagiarism and acceptable paraphrase)

4. Direct citing ( if referenced properly)

Thank you so much for your respect to the authors copyright.


For complete Project

Visit www.grossarchive.com

Or call

+2348130686500

+2348093423853