Bachelor of Science by M.Kaja Maideen P.A.B.Shaik Syed Junaith
Bachelor of Science by M.Kaja Maideen P.A.B.Shaik Syed Junaith
Bachelor of Science by M.Kaja Maideen P.A.B.Shaik Syed Junaith
Submitted to Dr.Zakir Husain College in Partial Fulfilment of the requirements for the degree of
1. 2.
ACKNOWLEDGEMENT
Project work is the phase of the activity during our study in which we are expected to evince our creative thinking ability, We want to make a project which plays in useful part in human life. We thank the god almighty for his grace and without whose blessings we would have not completed this work. We express our thanks to
M.Sc.,
M.Phil., Phd. The Principal, Dr. Zakir husain College, Ilayangudi. For the Permission avail the laboratories and on some via.
Mr.S.E.A. Jafarullah
Khan
Science. for his exterior Support in this project. We indebted pure sincere and valuable thanks with deep sense,
department who has enhancing our efforts and ideas through his able guidance with a smiling face. For assigning the project and for his, valuable guidance, Identifying and enhancing our effort's, consistent and enthusiastic encouragement throughout the course of work which was immense help to complete this project successfully. We also express our thanks to all the staff who have helped and reasonable to prepare a nice shape. Finally I express my Heartiest thanks to my Class mates for their ability and Co-Operation.
Declaration
We hereby declare that his work done by us under the guidance of Mr.T.K.Mohamed Ismail computer science. We hereby declare that this work has not been carried out from any other project work and has not been submitted for similar degree. M.C.A., for the partial fulfillment of degree of
Contents
Chapter 1 : Introuction
Synopsis Company Profile Problem Definition
Page No
Synopsis
This project entitled as NETWORK WATCH MAIN is a network embedded package developed under Visual Basic 6.0 using with Winsock controls 2.0
The main aim of this project is watching clients activities remotely from the server.
Server Tools
Software Registration Network Monitor Messenger Full View Reports Password Setup Client Shut down
Client Tools
Client Logon Software Installation Client Desk Top
Problem Definition
This project is entitled as NETWORK WATCHMAN is a network embedded package developed under Microsoft Visual Basic 6.0 using with Winsock control 2.0 with the back end tool of Microsoft Access.
The main objective of this project is to monitoring the clients activities on the network from the server. This project is also implemented to control the client activity from the server.
With this project A clients activities such as logon user name, logon time, applications opened and application which is currently running.
This project is also extended to view the current activity with the graphical appearance. That is the clients current running applications
Through this project we may known up to four clients activities at a same time. We can change the view of appearance by full view of scope.
Problem Description
This project Network Watchman contains two types of works.
1. Administrative Tools:
This option is used to open the network monitor page on the server. Through this page a particular client can be controlled remotely. This option is further classified into many types.
2. Client Tools:
This option is used by the clients. This contains many Client
applications such as logon and connect to the server. Desk Top to opening applications.
Software Registration:
This option contains on the Administrator tool. This form is used to adding softwares which are accessed by the client. This form contains the input such as Software ID, Software Name and Applications Image File. These contents are stored on a Database table called softwares.
Network Monitor:
This form is the main form of this project. This project contains the full details of clients activities such as application which is currently running and applications which are opened particular client, client logon name, client logon time etc.,
This page is implemented by viewing the client activities up to four client at an time. Each screen contains full view, instant messenger and shut down particular client.
Full View:
This option is available on the Administrator Network Monitoring Form. This option is used to view the full scope of a particular clients activities.
This form contains the image box which shows the current application is image file.
Instant Messenger:
This option is also available on the Monitor Form. This is used to send message to particular client. The received message is shown on the particular client.
Shut down:
This option is also available on the Network Monitor Form. This is used to Shut down the particular client remotely from the server.
Password Setup:
The administrator logon name and password can be changed through this option. This page is also controlled by the administrator. The server form is strictly restricted to protect by password protection.
Report:
This shows a report which is represented the softwares registered on the server. This shows a neat format of contents such as software id, software name and image file. The report can be printed also.
Client Logon:
This option is available on the client package. Which is used to Connect to the server and logon particular user. After successfully connected and logon the client the clients information are shown on the servers Monitor form. That shows the logon user name, logon time. After successfully logon a client on the client this will shows the client installed softwares. The client can be open the particular softwares which are
When the client is opening a particular software then the software name and image file is shown on the servers monitor page.
System Analysis
Existing System :
That Organization contains the local area network like Novel Netware-2.2. The Novel Netware 2.2 is a local network operating system which is working under Ms Doss version. MS DOS is a character user interface (CUI). That Existing System in the organization is developed
under MS Foxpro 2.6 for MS doss. The software is fully accessed the data base on the network.
Proposed System
The Objective of the new system is to perform th functions more efficiently. The following are points, which above the new system better than the existing system. In the Computerized system, it reduces the burden of more clerical work like entering data many registers. In the new system it lists various reports to the consistency conditions. Very user friendly and menu driven system, so that any one with less knowledge on computer can use it. Reports can be produces easily without time delay.
Requirement Analysis:
Hardware Overview :
Our project is developed with minimum requirements of hardware. So this project can be run at any system. The recommended hardware overview is listed below.
Processor Clock Speed Ram Hard Disk Work Station Video Mouse Keyboard Monitor Multimedia
: : : : : : : : : :
Pentium IV Processor 2.0 GHZ 128 MB 40 GB Standard VGA Logitech scroll mouse Samsung Internet Keyboard Samsung 15 Color 52x CD rom, sound card
Software Overview :
Platform Front-end Tool Back-end Tool Winsock Control : : : : Windows Nt Visual Basic MS Access 97 Winsock 2.0
System Design
Structure Chart:
Structured chart is working tool and excellent way to keep track of the data collected for a system. There are several variations of a structue chart. Briefly, the analyst starts with a single input/processing/output (IPO) chart, and identifies the data elements along the line linking the module to a higher level parents.
From the DFD, the next step is the definition of the modules and their relationship to one another in a form called a structureed chart, using a data dictionary and other structure tools.
Structured design partitions a program into a small, independent module. They are arranged in a hierarchy that approximates module of the business area and is organized in a top-down mannner. A structure design is an attempt to minimize complexity and make a problem manageable by subdividing t in smaller segments, which is called modularization.
1. The format in which data are entered input media used to enter the input data to create. Three major approaches for entering data, Menus
formatted and prompts. 2. Allocated space for each field 3. Field sequence, which must match that in the source document.
Among these, menus and formatted forms are used in the proposed system, that simplifies computer data access are data entry.
Output Design:
Printed outputs are provided in order to prove the accuracy of the output data. Each output layout is given a name or litle, in this system whien the user types the input data we get the copy is output result will be displayed so this enquires the accuracy of the data.
data/information.
classified into three types. The are action, memory, reports forms.
Action Page:
It request the user to do something
Memory Page:
It is record as Histrocial data
Report Page:
It guides supervisors and other administration in their activities and it provides information about the job or details that need attention is used as a basis for decision making.
For our proect, we have used Visual Basic as Front end Tool, Visual Basic used Object Oriented Programming. It resolves around
readymade objects, and it is a event driven programming, that is all the activites in a program are triggered by one event or another.
Each Object has its own properties, determineing its position, size coour the appearance and nature of its feat and much more. Each object is own event handling procedures.
A programming language today, such as Visual Basic, differs greatly from Programming languages of just a few years ago. The visual nature of the windows operation system requires more advanced tools than were available a few years ago.
It would be supported relational data base moel software developed by Microsoft Corporation. It fullfiles the flixibility of Graphical User Interface (Gui).
Program:
A program is a set of instructions that make the computer do something such as perform accounting
Project
A project is a collection of files we create that comprises our windows applications
Application:
An application is a collection of one or more files that compile into an executable program. The rolle of programming tool has evolved over the past 45 years along with computer hardware. A programming today, such as visual
basic, differs greatly from programming languages of just a few years ago. The visual nature of the Windows operating system requires more advanced tools than were avialable a few years ago. Before windows
environments, a programming language was simple text-based tool with which you wrote programs. Today we need much more than just a
language; we need a graphical development that can work inside the windows system in create applications that take advantage of all the
graphical, multimedia, online, and multiprocessed activites that advantage of all the graphical, multimedia, online, and multiprocessed activites that
windows offers. Visual Basic such a tool. More than a language, visual basic lets you to generate applications taht interact with every apect of todays windows operating system. Although Visual Basic is a comprehensive programming tool, Vb Retains its Basic language Heritage. Designers in the late 1950s developed the Basic Programming language for beginning programmers. Basic was easier to use than other programming languages of the time, such as COBOL and FORTRAN. developing visual Basic. Visual Basic Features: Microsoft never forget VBS roots when
Control Events:
Every control we place on a form supports one or more events. For example, if we place a text box in the center of the Form Window and run the program, we can click the text box, enter the text in the text box,
double-click the text box, and ignore the text box. The text Box control
happens to support evets that can recognize when we have done anything to the control
Active X controls:
Active X controls are controls we can add to our toolbox window. If a tool you need does not appear on the toolbox, that tool might appear as an Active X control in the components dialog box or even as an add-on tool we can obtain from online services.
Our project uses Microsoft Windows Common Dialog box Control 6.0 and Microsft Internet Controls are the Active X controls.
About MS Access 97
For our Project we have used Microsoft Access as a Back- end Tool. This is a powerful Relational database program that was can use to store, retrieve and organizes information.
As we have seen Microsoft Access provides many ways to collect and organize business and personal information. But while Word are Excel area are fine for small to medium Projects. We may need the extra features speed and flexibility provided by MS ACCESS for longer jobs.
MICROSOFT ACCESS is a fully featured Database Management system that leads we collect, organize, find and display and points information about our personal and business life.
ACCESS is a RDBMS. It allows data third has been stored in different places (Various access tables) to be linked. Access can help to manage information in three important ways, Reduce redundancy data. Facility and sharing of information. Keep data accurate.
Coding Issues:
i) ii) iii) Declare a Variable. Define the scope of variable. Using the appropriate declaration statement.
Write and call sub and function Procedure. Write and call sub and function Procedures by using named arguments optional arguments.
Write and call sub and function Procedures that require and array as an argument.
Call Procedure from outside a module. Call Procedures access data by using the data controls and bound controls.
Add data to table by using the DB list or DB combo control. Add data to a table by using standard list box control.
System Testing
The System has been verified and validated by using test data and live data.
Each Module in our project is tested and validated carefully. All the datas are input in the each module and get the output. The output is tested carefully. While testing process we are perform the following type of tests.
The text protector module is tested in different ways by giving all the input. The encrypted text is tested by open the encrypted text file in a text editor.
The result of the System was checked, Whether it satisfies the specification of the system.
The result of the system was checked, whether it satisfies the specification of the system. Each module in this system has been tested independently and finally tested as a package.
Objectives
The Objective of testing are as follows: Testing is the process of executing a program with the indent of the finding on error. A good test case is one of that has a huge probability of finding as yet undiscovered error. A Successful test uncovers an as yet discovered error.
UNIT TESTING :
In Unit testing all the individual functions and modules were put to the test independently. By this method all the errors in coding were identified and corrected. In this project every module tested separately.
INTEGRATION TESTING :
The goal of integration testing is to detect design errors while focusing on testing the interconnection between the modules. This is a systematic technique for constructing the program structure, which at the same time conducting test to unclear errors associated with interfacing. The different strategies in integration testing are top down and bottom up integration the strategy adopted here is bottom up integration testing.
VALIDATION TESTING :
This test used for verifying the requirements such as completeness consistency and testability.
4. OUTPUT TESTING:
Asking the uses about the format required by them tests the outputs generated are displayed by the system under consideration. Here the output format is considered in two ways. One is the screen and another printed format. Some minor changes proposed by the user were done immediately. The output testing did not result in any correction in the system.
Quality attributes of interest include correctness, completeness, consistencies reliable in ability efficiency and conformance to standards and overall cost effectiveness.
Quality attributes of interest include correctness, completeness, consistencies, reliability, inability, efficiency and conformance to standards And overall cost effectiveness. Verification is rigorous mathematics demonstration that source code confirm to its specification. Validation is the process of determining compliance with the requirements.
8. Volume Testing
The System is also tested with huge volume of data. The fastness the data retrieval from the system and the data storage was checked.
Implementation
The system developed Network Watchman work correctly after testing. This project has agreed to use the new system as a secondary
This software package has been made user friendly and objects. So any user can handle this package very easily to training. The user should train first. That is the user should know how to create floors and counters and the posting products to particular floor.
The computerized new system will be used in parallel with the manual system, system. so as to monitor the functioning of the computerized
After the successful usage of the system the new, system will be implemented as a primary system by using a network.
Conclusion
With the Computerization of this Organization we have just paved a way for them to enter into the new era in maintaining records accurately and precisely with the cutting edge technology
We too have witnessed that the transaction becomes more faster and easier than it was before with the successful installation and error free relentless effort. Though we have made for product (project) noteworthy we have huge task of maintaining the product
BIBILIOGRAPHY
Visual Basic 6.0 Software Engineering Mastering Access 2000 Micro Soft Access 2000 Data Processing & System Analysis Teach Yourself Visual Basic 6.0
- Dan Fox - Roger S.Pressman - Mr.Jon Duckett - Mr. Habreken - Mr. V.K.Kapoor. - Mc Graw Hill Pub