Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 34

NETWORK WATCHMAN

Submitted to Dr.Zakir Husain College in Partial Fulfilment of the requirements for the degree of

Bachelor of Science By M.Kaja Maideen


(Reg.No:A2115010) &

P.A.B.Shaik Syed Junaith


(Reg. No: A2115024)

Under the guidance of Mr.T.K. MOHAMED ISMAIL M.C.A.,


Department of Computer Science Dr. Zakir Husain College Ilayangudi-630 702.

Lec. T.K. Mohamed Ismail M.C.A., (Guide)

Prof.S.E.A.Jafarullah Khan M.Sc., M.Phil., B.Ed., (Head of the Department) Examiners

Place : Ilayangudi Date :

1. 2.

ACKNOWLEDGEMENT
Project work is the phase of the activity during our study in which we are expected to evince our creative thinking ability, We want to make a project which plays in useful part in human life. We thank the god almighty for his grace and without whose blessings we would have not completed this work. We express our thanks to

Dr.Mr.S.Liyakath Ali Khan

M.Sc.,

M.Phil., Phd. The Principal, Dr. Zakir husain College, Ilayangudi. For the Permission avail the laboratories and on some via.

We also express our sincere thanks to

Mr.S.E.A. Jafarullah

Khan

M.Sc., M.Phil., B.Ed., co-ordinate of the Department of Computer

Science. for his exterior Support in this project. We indebted pure sincere and valuable thanks with deep sense,

Mr.T.K.Mohamed Ismail, MCA.,

Lecturer in Computer science

department who has enhancing our efforts and ideas through his able guidance with a smiling face. For assigning the project and for his, valuable guidance, Identifying and enhancing our effort's, consistent and enthusiastic encouragement throughout the course of work which was immense help to complete this project successfully. We also express our thanks to all the staff who have helped and reasonable to prepare a nice shape. Finally I express my Heartiest thanks to my Class mates for their ability and Co-Operation.

Declaration
We hereby declare that his work done by us under the guidance of Mr.T.K.Mohamed Ismail computer science. We hereby declare that this work has not been carried out from any other project work and has not been submitted for similar degree. M.C.A., for the partial fulfillment of degree of

M. Kaja Maideen & P.A.B. Shaik Syed Junaith

Contents
Chapter 1 : Introuction
Synopsis Company Profile Problem Definition

Page No

Chapter 2 : Problem Description Chapter 3: System Analysis


Existing System Proposed System Need for New System

Chapter 4 : Requirement Analysis


Hardware Requirements Software Requirements

Chapter 5 : System Design


Data Flow Diagram Architectural Design

Chapter 6 : Software Specification


About Visual Basic About MS Access

Chapter 7 : System Testing


Types of Testing

Chapter 8 : Implementation Chapter 9 : Conclusion Chapter 10 : Bibliography Appendixes


Table Structure Screen Interface Coding Report

Synopsis

This project entitled as NETWORK WATCH MAIN is a network embedded package developed under Visual Basic 6.0 using with Winsock controls 2.0

The main aim of this project is watching clients activities remotely from the server.

This project consists:


Platform Front-end Tool Back-end Tool : : : Windows 98 Visual Basic 6.0 Ms Access

This project contains:

Server Tools
Software Registration Network Monitor Messenger Full View Reports Password Setup Client Shut down

Client Tools
Client Logon Software Installation Client Desk Top

Problem Definition
This project is entitled as NETWORK WATCHMAN is a network embedded package developed under Microsoft Visual Basic 6.0 using with Winsock control 2.0 with the back end tool of Microsoft Access.

The main objective of this project is to monitoring the clients activities on the network from the server. This project is also implemented to control the client activity from the server.

With this project A clients activities such as logon user name, logon time, applications opened and application which is currently running.

This project is also extended to view the current activity with the graphical appearance. That is the clients current running applications

logo is visible on the servers clients monitor form.

Through this project we may known up to four clients activities at a same time. We can change the view of appearance by full view of scope.

Problem Description
This project Network Watchman contains two types of works.

1. Administrative Tools:
This option is used to open the network monitor page on the server. Through this page a particular client can be controlled remotely. This option is further classified into many types.

2. Client Tools:
This option is used by the clients. This contains many Client

applications such as logon and connect to the server. Desk Top to opening applications.

Software Registration:
This option contains on the Administrator tool. This form is used to adding softwares which are accessed by the client. This form contains the input such as Software ID, Software Name and Applications Image File. These contents are stored on a Database table called softwares.

Network Monitor:
This form is the main form of this project. This project contains the full details of clients activities such as application which is currently running and applications which are opened particular client, client logon name, client logon time etc.,

This page is implemented by viewing the client activities up to four client at an time. Each screen contains full view, instant messenger and shut down particular client.

Full View:
This option is available on the Administrator Network Monitoring Form. This option is used to view the full scope of a particular clients activities.

This form contains the image box which shows the current application is image file.

Instant Messenger:
This option is also available on the Monitor Form. This is used to send message to particular client. The received message is shown on the particular client.

Shut down:
This option is also available on the Network Monitor Form. This is used to Shut down the particular client remotely from the server.

Password Setup:
The administrator logon name and password can be changed through this option. This page is also controlled by the administrator. The server form is strictly restricted to protect by password protection.

Report:
This shows a report which is represented the softwares registered on the server. This shows a neat format of contents such as software id, software name and image file. The report can be printed also.

Client Software Installation:


This option is available on the client package. This option is used to install particular software on the client. This work is also done by the administrator on the client. Here must install software which are

already registered on the server only.

Client Logon:
This option is available on the client package. Which is used to Connect to the server and logon particular user. After successfully connected and logon the client the clients information are shown on the servers Monitor form. That shows the logon user name, logon time. After successfully logon a client on the client this will shows the client installed softwares. The client can be open the particular softwares which are

installed on the client desk top.

When the client is opening a particular software then the software name and image file is shown on the servers monitor page.

System Analysis
Existing System :
That Organization contains the local area network like Novel Netware-2.2. The Novel Netware 2.2 is a local network operating system which is working under Ms Doss version. MS DOS is a character user interface (CUI). That Existing System in the organization is developed

under MS Foxpro 2.6 for MS doss. The software is fully accessed the data base on the network.

Limitations of Existing System:


The processing time is very slow. Large amount of space needed to install the existing system Message displayed is not user friendly. The package should not be updated. Existing data base can not be converted to other format of data base. The source contents of the existing system is difficult. The reports designed in the existing system is not in the neat format. It contains many unnecessary datas.

Proposed System
The Objective of the new system is to perform th functions more efficiently. The following are points, which above the new system better than the existing system. In the Computerized system, it reduces the burden of more clerical work like entering data many registers. In the new system it lists various reports to the consistency conditions. Very user friendly and menu driven system, so that any one with less knowledge on computer can use it. Reports can be produces easily without time delay.

Need for New System :


The New system rectified all the difficulties in the Existing System. The User friendliness of the new System makes convenient to be operated. There is less amount of memory is needed to run our project The source code can be easily understood. The report contains the necessary values with neat format. The report is designed in the Data Report package. So there is no any other software install to run thins project. This project is fully developed under Visual Basic with Winsock Control. This project is completely password protected. So the input data cannot be changed The client invoice system is developed with visual design. The server software contains the data flow view package. With this package we can clearly known about how the data flow to a particular client. There are several types of reports are developed with different types of queries.

Requirement Analysis:
Hardware Overview :
Our project is developed with minimum requirements of hardware. So this project can be run at any system. The recommended hardware overview is listed below.

Processor Clock Speed Ram Hard Disk Work Station Video Mouse Keyboard Monitor Multimedia

: : : : : : : : : :

Pentium IV Processor 2.0 GHZ 128 MB 40 GB Standard VGA Logitech scroll mouse Samsung Internet Keyboard Samsung 15 Color 52x CD rom, sound card

Software Overview :
Platform Front-end Tool Back-end Tool Winsock Control : : : : Windows Nt Visual Basic MS Access 97 Winsock 2.0

System Design
Structure Chart:

Structured chart is working tool and excellent way to keep track of the data collected for a system. There are several variations of a structue chart. Briefly, the analyst starts with a single input/processing/output (IPO) chart, and identifies the data elements along the line linking the module to a higher level parents.

From the DFD, the next step is the definition of the modules and their relationship to one another in a form called a structureed chart, using a data dictionary and other structure tools.

Structured design partitions a program into a small, independent module. They are arranged in a hierarchy that approximates module of the business area and is organized in a top-down mannner. A structure design is an attempt to minimize complexity and make a problem manageable by subdividing t in smaller segments, which is called modularization.

Primary Advantages of top-down design:


1. Critical interfaces are tested first. 2. Early versions of the design, through incomplete, are useful enough to assemble the real system. 3. The procedural characteristics define the other that determines processing.

Input / Output Form Design Input Design:


In input design user originated input are converted to a computer based format input data are collected and organized into a group of similar data once indentifier, appropriate media are selected for processing the goal of designing input data make data entry as easy, logical and free from errors as possible, inverting data operators need to know the following:

1. The format in which data are entered input media used to enter the input data to create. Three major approaches for entering data, Menus

formatted and prompts. 2. Allocated space for each field 3. Field sequence, which must match that in the source document.

Among these, menus and formatted forms are used in the proposed system, that simplifies computer data access are data entry.

Output Design:
Printed outputs are provided in order to prove the accuracy of the output data. Each output layout is given a name or litle, in this system whien the user types the input data we get the copy is output result will be displayed so this enquires the accuracy of the data.

Web site Design:


A Page is a tool with message or physical carriers of

data/information.

It can constitutes authority for action, pages are

classified into three types. The are action, memory, reports forms.

Action Page:
It request the user to do something

Memory Page:
It is record as Histrocial data

Report Page:
It guides supervisors and other administration in their activities and it provides information about the job or details that need attention is used as a basis for decision making.

About Visual Basic


Microsoft Visual Basic 6.0 the latest and greate incarnation of the Old Basic Language, gives you a complete windows application development system in one package. Visual basic lets us to write edit and test windows applications. In addition, Visual Basic includes tools we can use to create and compile help files, Active-X controls and even internet applications.

For our proect, we have used Visual Basic as Front end Tool, Visual Basic used Object Oriented Programming. It resolves around

readymade objects, and it is a event driven programming, that is all the activites in a program are triggered by one event or another.

Each Object has its own properties, determineing its position, size coour the appearance and nature of its feat and much more. Each object is own event handling procedures.

A programming language today, such as Visual Basic, differs greatly from Programming languages of just a few years ago. The visual nature of the windows operation system requires more advanced tools than were available a few years ago.

It would be supported relational data base moel software developed by Microsoft Corporation. It fullfiles the flixibility of Graphical User Interface (Gui).

Program:
A program is a set of instructions that make the computer do something such as perform accounting

Project
A project is a collection of files we create that comprises our windows applications

Application:
An application is a collection of one or more files that compile into an executable program. The rolle of programming tool has evolved over the past 45 years along with computer hardware. A programming today, such as visual

basic, differs greatly from programming languages of just a few years ago. The visual nature of the Windows operating system requires more advanced tools than were avialable a few years ago. Before windows

environments, a programming language was simple text-based tool with which you wrote programs. Today we need much more than just a

language; we need a graphical development that can work inside the windows system in create applications that take advantage of all the

graphical, multimedia, online, and multiprocessed activites that advantage of all the graphical, multimedia, online, and multiprocessed activites that

windows offers. Visual Basic such a tool. More than a language, visual basic lets you to generate applications taht interact with every apect of todays windows operating system. Although Visual Basic is a comprehensive programming tool, Vb Retains its Basic language Heritage. Designers in the late 1950s developed the Basic Programming language for beginning programmers. Basic was easier to use than other programming languages of the time, such as COBOL and FORTRAN. developing visual Basic. Visual Basic Features: Microsoft never forget VBS roots when

Visual basic provides:


Data security and data integrity A lot of graphical tools for easy operation. Data Manager application for connecting the running application to various RDBMS software like orcale access. Facility for the conversion of application file to execute files. Easy mechanism for data integrity and highly and independence. More than a language, visual basic lets you generate applications that interact with every aspect of todays windows operating system.

Control Events:
Every control we place on a form supports one or more events. For example, if we place a text box in the center of the Form Window and run the program, we can click the text box, enter the text in the text box,

double-click the text box, and ignore the text box. The text Box control

happens to support evets that can recognize when we have done anything to the control

Active X controls:
Active X controls are controls we can add to our toolbox window. If a tool you need does not appear on the toolbox, that tool might appear as an Active X control in the components dialog box or even as an add-on tool we can obtain from online services.

Our project uses Microsoft Windows Common Dialog box Control 6.0 and Microsft Internet Controls are the Active X controls.

About MS Access 97
For our Project we have used Microsoft Access as a Back- end Tool. This is a powerful Relational database program that was can use to store, retrieve and organizes information.

As we have seen Microsoft Access provides many ways to collect and organize business and personal information. But while Word are Excel area are fine for small to medium Projects. We may need the extra features speed and flexibility provided by MS ACCESS for longer jobs.

MICROSOFT ACCESS is a fully featured Database Management system that leads we collect, organize, find and display and points information about our personal and business life.

ACCESS is a RDBMS. It allows data third has been stored in different places (Various access tables) to be linked. Access can help to manage information in three important ways, Reduce redundancy data. Facility and sharing of information. Keep data accurate.

Implement User Interface Control Signal Application:


Display items by using list view control. Provide controls with images by using the image list control. Create tool bars by using the tool bar control.

Coding Issues:
i) ii) iii) Declare a Variable. Define the scope of variable. Using the appropriate declaration statement.

Write and call sub and function Procedure. Write and call sub and function Procedures by using named arguments optional arguments.

Write and call sub and function Procedures that require and array as an argument.

Call Procedure from outside a module. Call Procedures access data by using the data controls and bound controls.

Add data to table by using the DB list or DB combo control. Add data to a table by using standard list box control.

Access data by using code :


1. Navigate through and manipulate records in a record set. 2. Add, modify and delete records in a record set. 3. Find a record in a record set.

Debugging and Testing issues


Use the immediate window to check or change values. Explain purpose and usage for the local window.

System Testing
The System has been verified and validated by using test data and live data.

Each Module in our project is tested and validated carefully. All the datas are input in the each module and get the output. The output is tested carefully. While testing process we are perform the following type of tests.

The text protector module is tested in different ways by giving all the input. The encrypted text is tested by open the encrypted text file in a text editor.

Verified Test Data :


In this Case of testing the data was developed artificially and these data was applied to the system.

The result of the System was checked, Whether it satisfies the specification of the system.

The result of the system was checked, whether it satisfies the specification of the system. Each module in this system has been tested independently and finally tested as a package.

Objectives
The Objective of testing are as follows: Testing is the process of executing a program with the indent of the finding on error. A good test case is one of that has a huge probability of finding as yet undiscovered error. A Successful test uncovers an as yet discovered error.

UNIT TESTING :
In Unit testing all the individual functions and modules were put to the test independently. By this method all the errors in coding were identified and corrected. In this project every module tested separately.

INTEGRATION TESTING :
The goal of integration testing is to detect design errors while focusing on testing the interconnection between the modules. This is a systematic technique for constructing the program structure, which at the same time conducting test to unclear errors associated with interfacing. The different strategies in integration testing are top down and bottom up integration the strategy adopted here is bottom up integration testing.

VALIDATION TESTING :
This test used for verifying the requirements such as completeness consistency and testability.

4. OUTPUT TESTING:
Asking the uses about the format required by them tests the outputs generated are displayed by the system under consideration. Here the output format is considered in two ways. One is the screen and another printed format. Some minor changes proposed by the user were done immediately. The output testing did not result in any correction in the system.

TEST DATA AND OUTPUT :


The system has been verified and validated running. Test Data Live Data

RUN WITH TEST DATA :


The System is tested using sample data. Specification testing also done for each condition or combination of conditions. Modular approach is applied for testing independently and after interfacing the modules with the main menu.

RUN WITH LIVE DATA :


The system is tested with the data of the old system for a particular period and verified the old reports. The goal of the work product generated during development and modification of software.

Quality attributes of interest include correctness, completeness, consistencies reliable in ability efficiency and conformance to standards and overall cost effectiveness.

7. Verified By Live Data :


In this Case the real data are applied to the system and its results are checked with the original data was calculate manually. The goal of verification and validation activities to access and improve the quality of the work product generated during development and modification of software.

Quality attributes of interest include correctness, completeness, consistencies, reliability, inability, efficiency and conformance to standards And overall cost effectiveness. Verification is rigorous mathematics demonstration that source code confirm to its specification. Validation is the process of determining compliance with the requirements.

8. Volume Testing
The System is also tested with huge volume of data. The fastness the data retrieval from the system and the data storage was checked.

Implementation
The system developed Network Watchman work correctly after testing. This project has agreed to use the new system as a secondary

system along with the existing system.

This software package has been made user friendly and objects. So any user can handle this package very easily to training. The user should train first. That is the user should know how to create floors and counters and the posting products to particular floor.

The computerized new system will be used in parallel with the manual system, system. so as to monitor the functioning of the computerized

After the successful usage of the system the new, system will be implemented as a primary system by using a network.

Conclusion
With the Computerization of this Organization we have just paved a way for them to enter into the new era in maintaining records accurately and precisely with the cutting edge technology

We too have witnessed that the transaction becomes more faster and easier than it was before with the successful installation and error free relentless effort. Though we have made for product (project) noteworthy we have huge task of maintaining the product

BIBILIOGRAPHY

Visual Basic 6.0 Software Engineering Mastering Access 2000 Micro Soft Access 2000 Data Processing & System Analysis Teach Yourself Visual Basic 6.0

- Dan Fox - Roger S.Pressman - Mr.Jon Duckett - Mr. Habreken - Mr. V.K.Kapoor. - Mc Graw Hill Pub

You might also like