Beruflich Dokumente
Kultur Dokumente
SYSTEM
OVERALL DESCRIPTION
MODULE DESCRIPTION
Utilization Information
UTILIZATION INFORMATION
OPERATING
ENVIRONMENT
System Configuration
Frequency
: 500 MHz
Total Memory
: 256 MB
: 20 GB
CLIENT CONFIGURATION
Machine Used
: Pentium, AMD
Main Processor
: Intels 80856
Frequency
: 200 MHz
Total Memory
: 128 MB RAM
: 40 GB hard disk
Floppy Drive(s)
Keyboard
Mouse
: Compaq Mouse
Monitor Used
: Compaq SVGA
Printers
:Laser
Printers(HP
LaserJet)
SOFTWARE CONFIGURATION
Operating System
Front End
Network Architecture
Documentation
: TCP/IP
: Microsoft Word.
SYSTEM FEATURES
System Configuration
This project is developed using Microsoft Tools. Dot Net platforms
are used as front end .Minimum level of hardware is required to
maintain in this project.
SYSTEM DESIGN
DESIGN PLAN
Output Design
Computer output is the most important and direct source of
information to the user. One important feature of the system for the
user is the output procedures. Efficiency and intelligible design should
improve the system with the user. Without quality of output, the entire
system may appear to be so unnecessary.
Input Design:
A major part in the design of the system is the preparation of
the input. Input is necessary for the successful development and
implementation of the system. The input design is the link that ties the
information systems into the process of converting oriented inputs to
computer based formats.
The quality of the inputs determines the quality of the output.
Input specifications describe the manner in which data enter the system
for processing. Inaccurate input is the common cause of errors in data
processing. The input design is the process of converting user-oriented
Code Design
The main purpose of performing code design is to simplify
the coding to achieve better coding. The loading is prepared in such a
way that the internal procedures are more meaningful. Validation
manager is displayed for each column.
The loading of the variable is done in such a way that the other one
who has developed the package can understand its purpose.
MODULE DESIGN
Packet sniffers capture "binary" data passing through the network, most
if not all decent sniffers "decode" this data into a human readable form.
To make it even easier (for humans) another step occurs known as
"protocol analysis". There is a varying degree of the analysis that takes
place; some are simple, just breaking down the "packet" information.
Others are more complex giving "detailed" information about what it
sees on the packet (i.e., highlights a password for a service).
The information that travels across a network is sent in "packets." For
example, when an email is sent from one computer to another, it is first
broken up into smaller segments. Each segment has the destination
address attached, the source address, and other information such as the
number of packets and reassembly order. Once they arrive at the
destination, the packet's headers and footers are stripped away, and the
packets reconstituted.
Each packet usually contains three parts: 1) a header, which are the
instructions referring to the data within the packet; 2) the payload or
actual data in the packet; 3) the trailer or code telling the receiving
device that it is nearing the end of the packet. Positive usage of sniffer
is also its regular usage, which aim is to maintain network and system
working normally.
a. Capturing packets;
b. Recording and analyzing traffic;
c. Decrypting packets and displaying in clear text;
d. Converting data to readable format;
e. Showing relevant information like IP, protocol, host or
server name and so on.
UTILIZATION INFORMATION
DFD
DATA FLOW DIAGRAM
Computer processing
Used to indicate any processing performed by
a computer
Directional arrow
Connector
LEVEL 0
LEVEL1
SYSTEM IMPLEMENTATION
Implementation is the stage where theoretical design has been
turned into a working system. The main aim of this implementation
phase is to see whether the output created and inputs given are
according to the users requirements and specifications.
It also
there is no need to give any training to the users. Because they already
know their requirements and those who are using this project also
know well about this. Only a certain introduction and those with little
knowledge of English and computer can easily operate this system.
After the implementation of this project the system manager has to
maintain all its software and hardware. The system manager has to
upgrade the software frequently and whenever using a floppy the
system should be protected using Anti virus Software. UPS and other
electronic components should be connected. And this software also
maintains with login and password protection.
The stage consists of:
1. Testing the developed program with sample data.
2. Detection & correction of errors.
method.
An incredible IDE
Cross-language inheritance
FRONT END
A brief history of VB.net
Visual basic.net is one of the languages that are directed towards
meeting the objectives of the .net initiative of creating distributed
application. Visual basic .net is a powerful object-oriented language
that provides feature such as abstraction, encapsulation, inheritance and
polymorphism. In addition it provides many other features that did not
exist in the earlier version, such as multi inheritance and structured
exception handling.
FEATURES OF VISUAL BASIC .NET
Some of the key features introduced in visual basic .net are as follows:-
SYSTEM TESTING
System testing is the most vital that has to be enforced in any
system development cycle. This could be done as parallel activity
along
with
the
system
development
or
during
system
UNIT TESTING
Unit resting focuses verification efforts on the smallest unit of
software design .this is also known as Module Testing. In pay
Security Testing
Security testing is concerned with checking that the system and
its data are protected from accidental or malicious damage
Unlike other types of testing, this cannot really be tested by
planning system tests. The system must be secure against
unanticipated as well as anticipated attacks
VALIDATION TESTING
At the end of user testing, software is completely assembled as a
package, interfacing errors have now being uncovered and correcting
test begins. Software testing and validation are achieved through a
serious black box tests that demonstrate conformity with the
requirement.
OUTPUT TESTING
Next step is output testing of the proposed system. Since no system
could be useful if it does not produces the required output in the
specific format. The outputs are displayed by the system under
consideration and are tested by asking the user about the format of the
screen, as the format was designed in the system design phase
according to the needs. Hence output testing does not result in any
correction in the system.
USER ACCEPTANCE TESTING
Acceptance testing involves planning and execution of functional
tests ,performance test, and stress tests to verify that the implemented
system satisfies its requirements. Acceptance tests are typically
performed by quality assurance and/or customer organizations.
Functional and performance tests are performed to determine
the limitations of the system. Typically , acceptance
typically,
acceptance test will incorporate test cases developed during unit testing
and integration testing. Additional test cases are added to achieve
desired level of functional , performance, and stress testing of the entire
system. Tools of Special importance during acceptance testing include
a test Coverage analyzer, a timing analyzer, and a coding standards
checker. A test coverage analyzer records the control paths followed
for each test case. Timing analyzer reports the time spent in various
regions of the source code and different test cases.
A plan outlines the classes of tests to be conducted and test
procedure defines specific cases that will be used to demonstrate
conformity with requirements. Both the plan and the procedure are
designed to ensure that all functional requirements are achieved,
documentation is correct and other requirements are met. After the
validation test, one of the conditions exist.
They are,
The function or performance characteristics confirm to specification
and are accepted. A deviation from the specification is uncovered and a
deficiency list is created. The deviation or error discovered at this stage
in a project can rarely be corrected prior to scheduled completion. It is
necessary to negotiate with the customer to establish methods
FUTURE ENHANCEMANT
Internet based protocol analyzing system can be done.
Automatic network alert system to the system and network
administrator can be done.
BIBLIOGRAHY
* Visual basic 6.0 from the Ground Up
By
Gray Cornell
* Visual basic 6.0 Complete Reference
By
BPB Publication
* Visual basic 6.0 The Complete Reference
By
Noel Jerke , Tata Mcgraw Hill
*
*