0% found this document useful (0 votes)
9 views

Dbms - Model Key

The document discusses controlling network usage in a multi-device environment. It aims to equally share network bandwidth between devices. The proposed methodology involves collecting information on the topic, sorting main points, creating a report, and implementing the project. The document also discusses literature review on software defined networking challenges and impacts.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views

Dbms - Model Key

The document discusses controlling network usage in a multi-device environment. It aims to equally share network bandwidth between devices. The proposed methodology involves collecting information on the topic, sorting main points, creating a report, and implementing the project. The document also discusses literature review on software defined networking challenges and impacts.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

MICRO PROJECT

PART A
Controlling Network Usage
1.0 AIM/Benefits of microproject:
Aim:-
• Controlling Network Usage
Benefits:-
• When it comes to the network, visibility equals security: You can't
control what you can't see. ...
• Get a Complete Picture of Everything on the Network. ...
• Close the Gaps of Existing Security Tools. ...
• Reduce Alert Overload and Prioritize Alerts for Faster Resolution.

2.0 Course Outcome:


• Configure various networking devices
• Analyze the functioning of the data communication and computer network

3.0 proposed methodology:


First of all, we are going to collect all the information about the topic “Controlling Network
Usage”, we are going to collect the information through our workbooks, internet, reference
book & also taking guidance of our subject teacher. After collecting, a lot of raw data, we are
going to sort out some main points with the help of subject teacher. We will make a primary
report of that collected information then check it out by subject teacher. After correction,
advice, reading. We will fare our work and make final report with chart.
4.0 Action plan:
Sr no Details of Activity Planned start Planned Name of
date finish date responsible
student
1 Discussion and finalization 01/03/2023 06/03/2023 Tanmay, Saniya
of topic Shivam, Rohit
2 Collect information about 06/03/2023 13/03/2023 Tanmay, Saniya
topic Shivam, Rohit
3 Collect information about 13/03/2023 15/03/2023 Tanmay, Saniya
topic Shivam, Rohit
4 Implementation of 15/03/2023 21/03/2023 Tanmay, Saniya
microproject Shivam, Rohit
5 Create a code of the 21/03/2023 27/03/2023 Tanmay, Saniya
microproject Shivam, Rohit
6 Report writing and 27/03/2023 01/04/2023 Tanmay, Saniya
completion of project Shivam, Rohit
7 Final submission of micro- 01/04/2023 10/04/2023 Tanmay, Saniya
project Shivam, Rohit
8 Seminar 10/04/2023 24/04/2023 Tanmay, Saniya
Shivam, Rohit

5.0 Resources Required:

Sr no Name of resources Specification Quantity Remark


and material
1 Computer System Window 1 Used
2 browser chorme 1 Used
3 Command prompt 1 used

Names Of Team Members With Roll No:-

Roll No Name Of Member Signature of Teacher


45 Tanmay Chaudhari
46 Saniya Nadaf
47 Rohit Chavan
48 Shivam Jagtap
Mrs.A.A.Deshpande
Name and sign of teacher
PART B
Controlling Network Usage

1.0 Rationale:
Controlling Network usage in multi homed environment project explains about how network
bandwidth can be equally shared between different electronic devices like personal computers,
laptops, pads, mobiles and other devices. This paper consists of introduction to robust rate
control for heterogeneous network access in multi homed environment and existing system
details and proposed system advantages with hardware and software requirements.
Every home consists of many electronic devices which has capability to access wireless
network but each device has different IEEE standards and with multiple networking
capabilities. Robust rate control scheme will provide solution for robust rate allocation for the
devices. Network access can be equally divided for every device equally. This system analyze
LAN Bandwidth test for providing equilibrium between devices.

2.0 Aim/Benefits:
Aim:-
• Controlling Network Usage
Benefits:-
• When it comes to the network, visibility equals security: You can't
control what you can't see. ...
• Get a Complete Picture of Everything on the Network. ...
• Close the Gaps of Existing Security Tools. ...
• Reduce Alert Overload and Prioritize Alerts for Faster Resolution.

3.0 course outcome:


• Configure various networking devices
• Analyze the functioning of the data communication and computer network

4.0 Literature Review:


A literature review essentially examines relevant literature for a specific field of study. It
creates a stable basis by examining what is already known about a chosen topic13. As a result,
a literature review opens new approaches for further studies and progresses in the
concerning field of research14. The review has its main goal in identifying the used methods
and concepts for effects and challenges in SDN development. 2.1. Approach Recognized and
approved journals and databases for both information system and computer science research
were used for the literature research. The used databases and journals are comprised of ACM
(dl.acm.org), AISeL (aisel.aisnet.org), IEEE (ieeexplore.ieee.org), Science Direct
(www.sciencedirect.com) and Springer Link (link.springer.com). The time range of the search
field was limited to years starting at 2010. Search queries on the time period before the year
2010 did not lead to relevant results, as the term software defined networking and especially
its abbreviation SDN was used for other topics. All search queries were attempted between
the 1st of June and 15th of June 2014. The defined keywords reflected the main purpose of
the literature review. Therefore, the following keywords were defined and used to search for
relevant articles and proceedings: (i) sdn challenge, (ii) “software defined networking”
challenge, (iii) sdn impact, (iv) “software defined networking” impact, (v) sdn evolution, (vi)
“software defined networking” evolution. The main task of the next step was to find relevant
articles for the literature review. The chosen approach was to scan all abstracts from the
published articles, which were obtained by searching using the defined keywords. After
scanning the abstracts and deciding whether they were relevant or not, the chosen articles
were saved for the next step.The initial search results of each database with the defined
keywords were as follows (“found” means the number of all articles returned by the queries
and “relevant” those papers chosen to investigate in detail): ACM (found: 824, relevant: 11),
AISeL (found: 50, relevant: 0), IEEE (found: 1290, relevant: 33), Science Direct (found: 241,
relevant: 12) (www.sciencedirect.com) and Springer Link (found: 108, relevant: 5). The high
number of identified articles versus relevant articles exists for several reasons. The keywords
were searched individually (i.e. each database was queried 6 times). Many articles appeared
several times during the search query, as various keywords provided overlapping results.
These doublets were removed. Second, most of the articles discussed and defined advanced
statistical and mathematical technologies not relevant to answering the research question.
Furthermore, several articles covered a completely different topic since SDN also can be an
abbreviation for other topics like “Supply and Demand Networks” or “Shareware Distribution
Network”. In order to evaluate whether the articles were relevant or not, every title and
abstract of the found articles was scanned and critically evaluated as to whether the content
would be helpful for the research focus. In total, 61 articles were defined as relevant. In the
next step every single one of the 61 articles was analyzed in depth and collected in a first
concept matrix. Furthermore, the used methods, the main idea, the outcome, and the final
classification – if relevant or not – were recorded in that matrix. Furthermore, during
transferring of the articles into the concept matrix, an additional detailed selection process
took place. Thus, a few articles were also classified as not relevant. The reason being that the
abstract defined “software defined networking” as the main part of the article, but largely
covered areas not relevant for the review. In the end, 44 articles were included in the
literature review. The final concept matrix is provided in the appendix. Finally, based on the
final concept matrix, categories and concepts were defined and are described in detail in the
following.
5.0 Actual Methodology Followed:
• We will do necessary correlation if required.
• We will take help from books also then after collecting information we
willimplement our project.
• After collecting a lot of raw data, we are going to sort out so main points
withthe subject teacher.
• We will make a primary report of that collected information and check it
out bysubject teacher.
• We will submit our project report.

6.0 Actual Resource used:


Sr no Name of the resources Quantity specification Remark
1 Computer System 1 Windows Used
2 Browser 1 chorme Used
3 Command prompt 1 used

7.0 Output Of the Microproject:


8.0 Skill Developed / learning out of this Micro-Project:-

Given below are the skill that develop by doing the microproject:-
1. Ability to work
2. Critical thinking and problem solving
3. Effective and analysis information
4. Curiosity and imagination
5. Gain knowledge about Data Hiding and Insertion.
6. Learned to Enter the Data.
7. Importance of Data.

9.0 Application of Microproject:

• The main goal of networking is "Resource sharing", and it is to make all programs,
data and equipment available to anyone on the network without the regard to the
physical location of the resource and the user.
• A second goal is to provide high reliability by having alternative sources of supply.
For example, all files could be replicated on two or three machines, so if one of
them is unavailable, the other copies could be available.
• Another goal is saving money. Small computers have a much better
price/performance ratio than larger ones. Mainframes are roughly a factor of ten
times faster than the fastest single chip microprocessors, but they cost thousand
times more. This imbalance has caused many system designers to build systems
consisting of powerful personal computers, one per user, with data kept on one or
more shared file server machines. This goal leads to networks with many
computers located in the same building. Such a network is called a LAN (local area
network).
• Another closely related goal is to increase the systems performance as the work
load increases by just adding more processors. With central mainframes, when
the system is full, it must be replaced by a larger one, usually at great expense and
with even greater disruption to the users.
Names Of Team Members With Roll No:-

Roll No Name Of Member Signature of Teacher


45 Tanmay Chaudhari
46 Saniya Nadaf
47 Rohit Chavan
48 Shivam Jagtap
Mrs.A.A.Deshpande
Name and sign of teacher

You might also like