Upload
abhi-nav
View
222
Download
0
Embed Size (px)
Citation preview
8/2/2019 Access My Pc
1/40
ACCESS MY PC
PROJECT REPORT
Submitted by
VINEESH NARAYANAN
SIMY DAVIS
ANJANA GOPAKUMAR
AMBILY N.S.
ABSTRACT
Access My PC, as we call it, is a software that allows users to access devices connected
to their systems from remote locations. The process starts when the different users, who need the
facility, get registered through our website and download the application program for the said
facility. Once the software is installed on the home pc then the user can access the devices
connected to the system from any location using our website through the Internet.
A simple registration form is provided to the user wherein he can enter his name, address,
contact number, email id, login id and password. After filling up the proper information, the user
gets successfully registered for the application software. The user is authenticated for his login
name and password, which was provided to him during the registration process. If the user fails to
give his proper login id or password, an error message is displayed to him indicating that the
login id does not exist.
The user has the option for downloading the software to the particular system that he is
using. Once the system is installed in that system, say the Home PC, then the devices connected
to that system can be accessed easily using our website. Accessing the various devices connected
to the Home PC is the feature that is being implemented in the project. Every user will have a
particular Access code to be entered for getting access to this feature. If the Access code entered
8/2/2019 Access My Pc
2/40
TABLE OF CONTENTS
CHAPTER TITLE PAGE NO.
ABSTRACT iv
LIST OF TABLES vii
LIST OF FIGURES viii
1. INTRODUCTION 1
1.1 OVERVIEW OF THE PROJECT 1
1.1.1User Regi stration 1
1.1.2Login and Authentication 1
1.2 SYSTEM ARCHITECTURE 3
1.2.1 Home PC 3
1.2.2 Server 5
1.2.3 Remote PC 6
2. MODULES 7
2.1. FILE MANAGEMENT 7
2.1.1 View Files 7
2.1.2 Upload Files 7
2.1.3 Download Files 7
2.2DEVICE MANAGEMENT 8
2.3COMMAND EXECUTION 8
3. SYSTEM ENVIRONMENT 9
3.1CORE JAVA 9
3.2JSP 16
3.3HTML 20
4. SYSTEM ANALYSIS 22
8/2/2019 Access My Pc
3/40
5. SYSTEM REQUIREMENT 256. SYSTEM SPECIFICATION 267. SYSTEM DESIGN 27
7.1. MAJOR DESIGN ACTIVITIES 27
7.2. LOGICAL DESIGN 29
8. SYSTEM DEVELOPEMENT 309. SYSTEM IMPLEMENTATION 3110. TESTING 3211. SCREENSHOTS 3412. MAINTENANCE 4713. CONCLUSION 48
RESUME 49
REFERENCE 50
8/2/2019 Access My Pc
4/40
LIST OF TABLES
Table Page
1.1 User Information 2
8/2/2019 Access My Pc
5/40
LIST OF FIGURES
Figure Page
1.1: System Architecture 3
1.2Block Diagram of Home PC 4
1.3Block Diagram of Server 5
1.4Block Diagram of Remote PC 6
2.1Java Runtime Environment 10
2.2The General RMI Architecture 13
2.3Working of RMI 13
2.4JSP Architecture 16
2.5Processing of a JSP document 19
11.1Home Page 32
11.2Sign Up Form 33
11.3Forgot Password Form 34
11.4Welcome Page After Successful Login 35
11.5Home Page With User Options 36
11.6File Management Options Page 37
11.7View Files Page 38
11.8File Download Form 39
11.9File Upload Form 40
11.10Device Management Form 4111.11Command Execution Form 42
11.12User Settings 43
11.13Change Password Form 44
CHAPTER 1
INTRODUCTION
1.1 OVERVIEW OF THE PROJECT
Access My PC, as we call it, is software that allows users to access devices connected to
their systems from remote locations. The process starts when the different users, who need the
facility, get registered through our website and download the application program for the said
8/2/2019 Access My Pc
6/40
A simple registration form is provided to the user wherein he can enter his name,
address, contact number, email id, login id and password. After filling up the proper information,
the user gets successfully registered for the application software.
1.1.2Login and Authentication
The user is authenticated for his login name and password, which was provided to him
during the registration process. If the user fails to give his proper login id or password, an error
message is displayed to him indicating that the login id does not exist. If the login is successful
then the user is able to perform the following functions:
Software Download: The user has this option for downloading the software to the
particular system that he is using. Once the system is installed in that system, say
the Home PC, then the devices connected to that system can be accessed easily
using our website.
Access Devices: This is perhaps the purpose of Access My PC. Accessing the
various devices connected to the Home PC is the feature that is being
implemented here. Every user will have a particular Access code to be entered
for getting access to this feature. If the Access code entered is
8/2/2019 Access My Pc
7/40
wrong then the user get automatically logged out. Once the correct Access Code is
entered the user can access the device he wants. Logout: The user can sign out of
the login area any time using this function.
Table 1.1: User Information
FIELDS DATATYPE CONSTRAINT
ID STRING PRIMARY KEY
PWD PASSWORD
FNAME STRING
LNAME STRING
GENDER STRING
QUESTION STRING
ANSWER STRINGMONTH STRING
DAY INT
YEAR DOUBLE
ZIP DOUBLE
IP DOUBLE
SYSTEM STRING
The above table shows the user information.
8/2/2019 Access My Pc
8/40
1.2 SYSTEM ARCHITCTURE
The Basic System Architecture is shown below:
Server
Remote PC Home PC
Fig 1.1: System Architecture
The System architecture has to be designed keeping all the above functions in mind. We can see
that the system consists of mainly the following three parts:
1.2.1 Home PC
Home PC is the personal computer, which is owned by the user. The software that is Application
part resides on this computer. It gets the data from the device and transmits it to the remote PC
location and it also gives the status of the remote PC location. It has no level of user
authentication. But it is the application part of this system that checks for the user device
accessing. Home PC consists of mainly five modules namely:
Network Interface: This is the part of the application, which is connected to the network.
Data Manipulation Unit: This prepares the data from the devices to suitable for the
network transmission.
Device Access Module: This gets the data from the user from the interface corresponding
to each of the users.
Internet
8/2/2019 Access My Pc
9/40
Control Unit: Controls and coordinates each of the units in the Home PC. Device
Interface: Interface of the operating system of the PC with the device so as to facilitate
the communication between the two.
CONTROL
DATA
MANIPU
LATION
DEVICE
ACCESS
DEVICE
INTERF
ACE
Fig 1.2 Block Diagram of Home PC
The above figure represents the diagrammatic representation of Home PC module. The Home PC
consists of Data Manipulation and Device Access units. These two units are controlled by a
Control unit. The Home PC is connected to a Network Interface. It is also connected with the
devices via Device Interface.
1.2.2 Server
It is the master controller of the entire software. It consists of controlling Application level
program and it gets the requests from the users of the Remote PC. It also gives the instructions to
the Home PC. Server consists of mainly 5 modules namely:
Network Interface: It communicates with the Home PC as per the instruction from
the control module. It decides the protocol for communication and also the other
network related factors.
Control Module: It controls the entire server module
Database Monitor: It constantly checks the database and sends signals to the control
module according to the state changes of the system.
DEVICE
8/2/2019 Access My Pc
10/40
DATABASE
MONITORING
NETWORK
INTERFACING
MODULE
CONTROL
MODULE
Fig 1.3 Block Diagram of Server
The figure is a diagrammatic representation of the Server. The server is having a Database
Monitoring unit and a Network Interfacing unit. These two are controlled by a Control Module.
The Server module is connected to the Database and through that to a JSP document.
JAVA
SERVER
PAGES
8/2/2019 Access My Pc
11/40
1.2.3 Remote PC
Remote PC is the PC from where the user login for selecting and using a device in the Home PC.
For this he uses the http protocol. The server side programs and the client side programs are used
to make use of this Remote PC. It has the following modules:
Network Interface: It performs the network-based functions such as connecting to
server, receives and transmits the user data.
Data Manipulation Unit: In this the data from the network is converted
to their actual form and representation separates the control signals and data signals.
Control Module: It controls and coordinates the different modules. It also defines the
rules from the network. It handles the loss of data and configures the different units
for best performance.
Device Interface Regeneration: In this it creates the Graphical User Interface
according to the device and it also gives the Graphical User Interface according to the
device selected. It also receives the user inputs and responds accordingly.
Device user
interfacing
component
DataManipulation
Data
Processing
Module
Network
Interface
BROWSER
Fig 1 4 Block Diagram of Remote PC
8/2/2019 Access My Pc
12/40
The figure shows how the Remote PC works. It is having a Device-user interface component and
a Data manipulation unit. These are connected to a Data Processing module. It is also connected
to a Network interface.
CHAPTER 2
MODULES
FILE MANAGEMENT
DEVICE MANAGEMENT
COMMAND EXECUTION
Once you have registered in the website and downloaded the software in the Home PC,
you will be given a login name and a password. Using this, you can access your Home PC from
any remote system through internet. Then you will be able to do the above operations. Let's see
them in detail:
2.1. FILE MANAGEMENT
In file management section, you can do the following functions:
2.1.1 View Files:
Through this option, you can view the drives and directories of your Home PC while
you are using a Remote PC. You can also view the subfolders and files in the Home PC in a
hierarchical manner.
2.1.2 Upload Files:
In this option, you can transfer files from the Remote PC to your Home PC. The
uploaded files will be stored in a folder namely "Upload" in the Home PC.
2.1.3 Download Files:
This option enables the user to download the files from the Home PC to the Remote PC
he currently uses. The user can download files from the Home PC to the desired location of the
system that is currently in use.
2.2 DEVICE MANAGEMENT
Device management is the most enhanced option of ACCESS MY PC. With the help of
this option, the user can access the external devices attached to the Home PC. These can be
printer or webcam. The user can do the printing job in the printer that is connected to the Home
PC. Similarly, he can view the image that was captured by the webcam attached to the Home PC.
2.3. COMMAND EXECUTION
Command Execution is the option through which the user can execute commands in the
Home PC and its results can be viewed in the Remote PC. The command can be anything that can
be executed in the command prompt (eg: dir, copy icon, date, notepad etc.). The text results will
8/2/2019 Access My Pc
13/40
Core Java JSP (Java Server Pages)
HTML
3.1. Core Java
The Java language was derived from C++ but without many of the cumbersome, difficult-
to-use features of C++. Java's cross-platform capability originally addressed the problem that
applications for embedded devices must run on a wide variety of hardware (without the benefit of
a standardized operating system). Java has taken much of the C/C++ syntax, making
simplifications and revisions to suit to its own philosophy. Java is designed to be architecturally
neutral so it can run on multiple platforms. The same runtime code can run any platform which
supports Java.
To achieve its cross-architecture capabilities, the Java compiler generates architecturally
neutral byte code instructions. These instructions are designed to be both easy to interpret on any
machine and easily translated into native machine code on the
fly.
Java has a wide range of libraries (or packages) which can be used to extend the language.
Libraries are available for user interface objects (AWT or swing variants), I/O, a network library,
etc.
Fig 2.1 Java Runtime
8/2/2019 Access My Pc
14/40
great improvement over C++, Java's nominal predecessor. Indeed, initial experimental resultsshow greater programmer productivity and fewer program bugs for development with Java versus
C++.
8/2/2019 Access My Pc
15/40
Significant Java Features
Java is a fully object-oriented language and it can be used to:
create applets for viewing within a browser, standalone client-side application,
create standalone client-side applications
create middle-tier components (Servlets/JSP) for generating webpage with dynamic
content and parsing web pages coming back from the client
create middle tier component (Enterprise JavaBeans or EJB) for implementing business
logic and updating the database
create procedures that run within a database and are callable from other database
procedures
Java RMI
Remote Method Invocation (or RMI for short) allows us to execute methods on remote servers.
RMI is the acronym for Remote Method Invocation. As the name suggests, it helps you locate
and execute methods of remote objects.
Objects which have to be made available to other machines have to be exported to
something called a Remote Registry Server so that they can be invoked. Remote Registry Server
is a service that runs on the server and helps client's search and access objects on the server
remotely. Now, if an object has to be capable of being exported then it must implement the
Remote Interface present in the RMI package.
RMI uses something called a stub and a skeleton. The stub is present on the client side, and
the skeleton the server side. There are a number of events that have to take place beforehand
which help in the communication of the data. The stub is like a local object on the client side,
which acts like a proxy of the object on the server side. It provides the methods to the client
which can be invoked on the server. The Stub then
8/2/2019 Access My Pc
16/40
sends the method call to the Skeleton, which is present on the server side. The Skeleton then
implements the method on the server side.
The Stub and the Skeleton communicate with each other through something called a
Remote Reference Layer. This layer gives the stub and skeleton the capability to send data
using the TCP/IP protocol.
On the server end we associate a string variable with an object. The client tells the server
what object he wants to create by passing that string to the server, thus letting the server know
exactly what object you are talking about. All of these strings and objects are stored in the
Remote Registry Server on the server.
Remote Method Invocation (RMI) facilitates object function calls between Java Virtual
Machines (JVMs). JVMs can be located on separate computers - yet one JVM can invoke
methods belonging to an object stored in another JVM. Methods can even pass objects that a
foreign virtual machine has never encountered before, allowing dynamic loading of new classes
as required. This is a powerful feature.
8/2/2019 Access My Pc
17/40
The server must first bind its name to the registry
The client lookup the server name in the registry to establish remote references.
The Stub serializing the parameters to skeleton, the skeleton invoking the remote method
and serializing the result back to the stub.
RMI Client
callskeleton
RMI Server
return
Fig 2.4 Working of RMI
A client invokes a remote method, the call is first forwarded to stub. The stub is
responsible for sending the remote call over to the server-side skeleton The stub opening
a socket to the remote server, marshaling the object parameters and forwarding the data
stream to the skeleton.
Remote Machine
Fig 2.3 The General RMI
.n
3
to
K
8/2/2019 Access My Pc
18/40
A skeleton contains a method that receives the remote calls, unmarshals the parameters,
and invokes the actual remote object implementation
Step of developing an RMI System:
1. Define the remote interface
2. Develop the remote object by implementing the remote interface.
3. Develop the client program.
4. Compile the Java source files.
5. Generate the client stubs and server skeletons.
6. Start the RMI registry.
7. Start the remote server objects.
8. Run the client
The Remote Object
This interface (yes our remote object is actually an interface) will have only method
declarations. Hopefully you know that interfaces don't always have to have method bodies,
just declarations. The Remote Object will have a declaration for each method that you want
to export. This remote object would implement the Remote interface, which is present in the
Java.rmi package.
The Remote Object Implementation
This is a class that implements the Remote Object. If you implement the Remote Object, it's
common sense that you would override all of the methods in that object, so the remote object
implementation class would actually have all of the method bodies of the methods that we
want to export. This method will be extended from the UnicastRemoteObject class.
8/2/2019 Access My Pc
19/40
The Remote Server
This is a class that will act like a server to the client wanting to access remote methods.
Here's the place where you will bind any string with the object you want to export. The
binding process will be taken care of in this class.
The Remote Client
This is a class that will help you access the remote method. This is the end user, the client.
You will call the remote method from this class. You will use methods to search and invoke
that remote method.
3.2. JSP
Java Server Pages enables the development of dynamic web sites and it is based on Java
language. The simplest JSP document is a combination of Java statement and HTML tags. In a
JSP document, you can interrupt a Java statement with part of an HTML tag, or interrupt a tag
with part of a statement. We can't use ordinary English-language commands to create JSP
documents.JSP is a mix of Java and HTML needs to be translated into an ordinary HTML
document and sent to the user's Web browser.
To allow server side development JSP was developed by Sun Microsystem. Typical different
clients connecting via the Internet to a Web server. e.g. a well popular Apache Web server is
execute on Unix platform.
Java Server Pages or JSP for short is Sun's solution for developing dynamic web sites. JSP
provide excellent server side scripting support for creating database driven web applications. JSP
enable the developers to directly insert java code into jsp file, this
8/2/2019 Access My Pc
20/40
makes the development process very simple and its maintenance also becomes very easy. JSP
pages are efficient, it loads into the web servers memory on receiving the request very first time
and the subsequent calls are served within a very short period of time.
In today's environment most web sites servers dynamic pages based on user request. Database is
very convenient way to store the data of users and other things. JDBC provide excellent database
connectivity in heterogeneous database environment. Using JSP and JDBC its very easy to
develop database driven web application.
Fig 2.5 JSP Architecture
Java Server Pages (JSP) technology is the Java platform technology for delivering dynamic
content to web clients in a portable, secure and well-defined way. The Java Server Pages
specification extends the Java Servlet API to provide web application developers with a robust
framework for creating dynamic web content on the server using HTML, and XML templates,
and Java code, which is secure, fast, and independent of server platforms. JSP has been built on
top of the Servlet API and utilizes Servlet semantics. JSP has become the preferred request
handler and response mechanism. Although JSP technology is going to be a powerful successor to
basic Servlets, they have an evolutionary relationship and can be used in a cooperative and
complementary manner.
Servlets are powerful and sometimes they are a bit cumbersome when it comes to generating
complex HTML. Most servlets contain a little code that handles application logic and a lot more
code that handles output formatting. This can make it difficult to separate and reuse portions of
8/2/2019 Access My Pc
21/40
One of the main reasons why the Java Server Pages technology has evolved into what it is today
and it is still evolving is the overwhelming technical need to simplify application design by
separating dynamic content from static template display data. Another benefit of utilizing JSP is
that it allows to more cleanly separating the roles of web application/HTML designer from a
software developer. The JSP technology is blessed with a number of exciting benefits, which are
chronicled as follows:
1. The JSP technology is platform independent, in its dynamic web pages, its web servers, and its
underlying server components. That is, JSP pages perform perfectly without any hassle on any
platform, run on any web server, and web-enabled application server. The JSP pages can be
accessed from any web server.
2. The JSP technology emphasizes the use of reusable components. These components can be
combined or manipulated towards developing more purposeful components and page design. This
definitely reduces development time apart from the At development time, JSPs are very different
from Servlets, however, they are precompiled into Servlets at run time and executed by a JSP
engine which is installed on a Web-enabled application server such as BEA WebLogic and IBM
WebSphere.
JSP document
Translation
.java file
^ Compilation
.class file
.class file ready to run 4 -------
4 ---------------
Subsequent user Request
Run
Response document
,, Initialization Reinitialization
Fig 2.5 Processing of a JSP
8/2/2019 Access My Pc
22/40
3.3. HTML
HTML is a language used to develop web pages. HTML is the language interpreted by the
browser. Web pages are also called HTML documents. HTML stands for Hyper Text Markup
Language. An HTML file is a text file containing small markup tags. The markup tags tell the
web browser how to display the pages. An HTML file must have an htm or html file extension.
An HTML file can be created using a simple text editor.
HTML tags are instructions that are embedded into the text of the document. An HTML tag
is a signal to a browser that it should do something. HTML tags begin with an open angle bracket
(). The text between the start tag and end tag is the
element content. HTML tags are not case-sensitive.
HTML is not a computer programming language. It is a document mark up language.
There is a big difference. No knowledge of programming is necessary. HTML is designed to
specify how text and images are displayed or "rendered" on your computer screen. HTML
documents are generally viewed through a program called a browser. Netscape Navigator and
Internet Explorer are both browsers.
Basic Structure of An HTML Document. .An HTML document is divided into two sections.
These are the head and the body. The head is surrounded by tag. The body is
surrounded by tags.
CHAPTER 4 SYSTEM
ANALYSIS
System analysis is the process of identification of the objectives and requirements,
evaluation of alternative solutions and recommendation for a more feasible solution. In other
words, system analysis is the step-by-step process of gathering, recording and interpreting facts. It
is the reduction of an entire system by studying the various operations. It includes studying the
problems encountered in the present system and introducing a new computer system into an
organization. The main aim of analysis is to determine problem areas and decide on solutions to
reduce or eliminate them.
System analysis itself breaks into two stages. Preliminary and Detailed. During
preliminary analysis the analyst list the objectives of the proposed system. These findings come
together in the preliminary report. Once the preliminary report is approved, the system analysis
phase advances into a second stage. During detailed analysis required data and information are
collected and a detailed study is made.
During analysis, data are collected on the available files, decision points, and transactions
of the system using various tools like data flow diagram.
Feasibility Study
8/2/2019 Access My Pc
23/40
requested is feasible or not. The key considerations involved in the feasibility analysis are
technical, operational, and economic.
Technical Feasibility
Technical feasibility is the most important of all types of feasibility analysis. Technical
feasibility deals with hardware as well as software requirements. An idea from the outline design
to system requirements in terms of inputs outputs, files and procedures is drawn and the type of
hardware, software, and the methods required for running the systems are analyzed. Keeping in
mind of the above considerations, the resource availability at this company was observed. It was
found that the company has the sufficient resources to develop the current project; hence the
system is technically feasible.
Economic Feasibility
Economic analysis is the most frequently used method for evaluating the effectiveness of
the software, more commonly known as the cost /benefit analysis. The procedure is to determine
the benefits and savings that are expected from a candidate system and compare them with costs.
If the benefits outweigh cost, the decision is made to design and implement the system; otherwise
further alternatives have to be made. Here it is seen that no new hardware or software is needed
for the development of the system. Hence the project is economically feasible for development in
this company.
Schedule Feasibility
Schedule feasibility is concerned with the completion of the project development within
the fixed time span. It is an important factor as it can affect other factors like machine availability,
tools, cost development and delay in the development of other systems. Besides these, this project
is assigned to the student as an academic exercise to be completed within a fixed period of time.
Operational Feasibility
The purpose of the operational feasibility study is to determine whether the new system
would be used if it is developed and implemented, will there be resistance from users that will
undermine the possible application benefits etc. From the outputs of the meeting that was held
with the system users, it was found that all of them support the development of new system. The
positive response from them encouraged in building such a system.
CHAPTER 5
SYSTEM REQUIREMENT
After analyzing the requirements for our project we had come to the conclusion that our project
users require the following requirements.
Client's Requirements:
> Needs a network connection
8/2/2019 Access My Pc
24/40
> Needs a Java Runtime Environment
> Needs a database
CHAPTER 6
SYSTEM SPECIFICATION
The hardware and software requirements for the development phase of our project are:
Software Requirements :
Development Tools : Java, JSP, HTML
Back end : SQL Server 2000
Browser : Mozilla 2.0 or IE
Web Server : Apache Tomcat Server
Hardware Requirements :
Processor RAM
Capacity Hard Disk
Space Mouse
Keyboard Monitor
Floppy Disk Drive
: Pentium IV : 256
MB
: 40 GB
: MS Compatible :
Standard 104 Keys
: Standard 15"
: 1.44 MB
8/2/2019 Access My Pc
25/40
CHAPTER 7
SYSTEM DESIGN
The most creative and challenging phase of the system life cycle is system design. The term
design describes a final system and the process by which it is developed. It refers to the technical
specification that will be applied in implementing the candidate system. It also include the
construction of program s and program testing. The question involved here is "How the problem
is solved".
System design is a transition from the user-oriented document to the document-oriented program
or database personnel. It emphasizes translating performance specification into the design
specification and it involves conceiving and planning and then carrying out the plan for
generating the necessary reports and outputs. Design phase acts as the bridge between the
software requirements specifications and implementation phase , which satisfies the requirements
7.1. MAJOR SYSTEM DESIGN ACTIVITIES:
Input Design:
Input design is a process of converting user-oriented input to computer based format. It also
includes determining the record media ,method of input, speed of capture and entry into the
system. Input design consist of developing specification and procedures for data procedure for
data preparations, those necessary steps into put transaction data into usable form of processing,
data entry and activity of putting the data into computer for processing. Five objectives guiding
the design are input focus on controlling the amount of input required, avoiding delay, controlling
error and keeping the steps simple. The following are the details the system analyst decide while
designing
The data to input
The details of how data should be arranged or coded
The data item and transaction needed validation to detect errors.
All input processes have bee designed with at most care to avoid entry of any kind of invalid data
into the system. The input screens have been validated effectively in order to give the most
accurate input details. Points to be noted while designing the input screens are
Don't overcrowd the input screen
Keep the same style among the screens
Ask for confirmation of critical data
8/2/2019 Access My Pc
26/40
help in decision making. Output are also used to provide a permanent hard copy for the later
consultation. They are obtained in the form of response to the requests.
Program Design :
On the analysis based on the requirement the program design taking into consideration all
program aspects. The structure require, the control flow etc are decided for efficient functioning
of the system that was to be developed
7.2 LOGICAL DESIGN
Logical design describes the format of inputs, outputs, and procedures that meets the user
requirements.
The design covers the following:
Reviews the current physical system.
Prepares the output specification.
Prepares the Input specifications.
Prepares control specifications.
8/2/2019 Access My Pc
27/40
CHAPTER 8 SYSTEM
DEVELOPMENT
System development is a series of operations performed to manipulate data to produce output
from a computer system. This is highly dependent on the programming language used. The
principle activities during the development phase can be divided into two major related sequences
:
1. External system development
2. Internal system development
The major external system development activities are :
1. Implementation
2. Planning
3. Equipment acquisition
4. Installation
The major internal system development activities are :
1. Computer program development
2. Performance testing
CHAPTER 9 SYSTEM
IMPLEMENTATION
The implementation stage is the next step towards the problem solution. Here the details like
which coding language is used is decided and the coding is done in the specified language.
The implementation is the practical job of putting a theoretical design in the practice. It may
involve the complete implementation of a computer complex or the introduction of one small
subsystem.
The implementation phase of a project covers the period from the acceptance of the test design to
its satisfactory operation support by the appropriate user and operations manual. It is a major
operation across the whole organizational structure and requires a great deal of planning.
Planning for implementation must begin from the initial conception of the project. It requires a
thorough knowledge of the new system, its personal needs, hardware and software requirements,
file and procedure conversion activities, etc. Only the analyst is responsible for creating the new
system will possess this knowledge. He can plan, schedule and co- ordinate but has no executive
powers.
8/2/2019 Access My Pc
28/40
CHAPTER 10
TESTING
System testing is the stage of implementation, which is aimed at ensuring that the systemworks accurately and efficiently before live operation commences. Testing is vital to the success
of the system. An elaborate testing of data is prepared and the system is tested using this test data.
While testing error noted and corrections are made. The users are trained to operate the developed
system. Both hardware and software securities are made to run the developed system successfully
in future. Testing steps:
S Unit Testing
S Integration Testing
Validation Testing
Output Testing
User Acceptance Testing
Unit Testing
Unit testing focuses verification efforts on the smallest unit of software design, the module. This
is also known as "Module Testing". The modules are tested separately. This testing is carried out
during programming stage itself. In these testing steps each Module is found to be working
satisfactorily as regard to the expected output from the module.
In the project, we have done unit testing to test whether the each unit works in the desired
manner.
Integration Testing
Integration testing is a systematic technique for constructing tests to uncover errors Associated
within the interface. In this project, all the modules combined, and then entire
8/2/2019 Access My Pc
29/40
Program is tested as a whole. Thus in the integration testing step, all the errors uncovered are
corrected for the next testing steps.
We have also done integration testing after integrating the whole system.
Validation Testing
Validation testing is where requirements established as a part of software requirement analysis is
validated against the software that has been constructed. This test provides The final assurance
that the software meets all functional, behavioral and performance requirements .The errors,
which are uncovered during integration testing, are corrected during this phase.
Output Testing
After performing the validation testing, the next step is output testing of the proposed system
since no system could be useful if it does not produce the required output in the specific format.
The Output generated or displayed by the system under consideration is tested asking the users
about the format required by then. Here, the output is considered into two ways: one is on the
screen and the other is printed format.The output format on the screen is found to be correct as the
format designed according to the user needs .For the hard copy also, the output comes out as
specified by the user. Hence output testing doesn't result in any connection in the system.
User Acceptance Testing
User acceptance of a system is the key factor for the success of any system. The system under
consideration is tested for user acceptance by constantly keeping in touch with the prospective
system users at time of developing and making for SiteDownloader system.
8/2/2019 Access My Pc
30/40
The testing of the software began along with coding. Since the design was fully object-oriented,
first the interfaces were developed and tested. Then unit testing was done for every module in the
software for various inputs, such that each line of code is at least once executed After all modules
were coded the integration test were carried out. Some minor errors were found in the output at
the earlier stage and each of them was corrected. In the implementation of user interface part no
major errors were found. After the software was completely developed, the testing was done.
8/2/2019 Access My Pc
31/40
CHAPTER 11
SCREEN SHOTS
The form below will be displayed when you access the website.
Fig 11.1 Home
8/2/2019 Access My Pc
32/40
When a new user wants to register to the website, the following sign up form displays:
Fig 11.2 Sign Up Form
8/2/2019 Access My Pc
33/40
If the user forgets the password, there will be a help option as shown below:
There appears a welcome screen when the user logs in.
The options will be provided to the user after the log in
Fig 11.3 Forgot Password
Fig 11.4 Welcome Page After Successful
8/2/2019 Access My Pc
34/40
The File Management options are View Files, Upload, and Download
The View Files option can be accessed as shown below:
Fig 11.6 File Management Options
Fig 11.7 View Files
8/2/2019 Access My Pc
35/40
The File Download option is like shown below:
The File Upload option is like shown below:
Fig 11.8 File Download
Fig 11.9 File Upload
8/2/2019 Access My Pc
36/40
The Device Management options will be displayed in this page:
Fig 11.10 Device Management
8/2/2019 Access My Pc
37/40
The Command Execution option is provided in this page:
Home :: ViewFiles :: Download :: Upload :: Webcam :: Printer :: C ommaiidEKecution :: Help :: MyAccount
Fig 11.11 Command Execution Form
The User Settings page is shown below:
Done
8/2/2019 Access My Pc
38/40
CHAPTER 12
MAINTENANCE
Development is a single activity. Maintenance is a continuous activity. Maintenance
involves activities like inspections, corrections and enhancement. Once the system is delivered
and deployed, it enters the maintenance phase. The system need to be maintained not because of
some of its components wear out and need to be replaced, but because there are some residual
errors remaining in the system that must be removed as they are discovered. This includes
activities related to debugging the software after it goes live, changes required to address evolving
software and enhancement to meet changing customer requirements. So maintenance phase
involves : Understanding the effects of change. Testing the new parts.
Retesting the old parts that were not changed Making
changes-to both the code and the documents.
These changes have to be signed by the user before the change can be carried out. Since
requirement change request involves cost, user will be cautious while requesting the software
changes. The software will require continued support. The system maintenance means the
maintenance activities after and during the system development processes. This include activities
related to debugging the software after it goes live, changes acquired to meet change in users
requirement.
Three type of maintenance :
Corrective maintenance.
Adaptive maintenance.
Perfective maintenance.
Maintenance phase identifies if there are any changes required in the current system. If the
changes are identified, then an analysis is made to identify if the changes are really required. Cost
benefit analysis is a way to find out if the change is really essential
8/2/2019 Access My Pc
39/40
CHAPTER 13
CONCLUSION
Access My PC, in simple words, is a remote PC access software. This is done through a web site.
The user can register to the web site with a user name and password and can download the server section
of the software to his Home PC or Office PC. Thereafter, he can access his Home PC through a network
from anywhere.
The web site provides the access to the files and peripheral devices in the Home PC. The web site
also allows the user to manipulate the files and operate the remote devices such as printer or webcam. The
image captured by the webcam can be viewed by the user. Similarly, the user can do the printing jobs in a
printer attached to the Home PC.
It also provides the file viewing, uploading and downloading options to the user. The user can
execute commands in the command prompt of the Home PC and view the result in his current system.
All these provisions allow the user to access his PC from anywhere. This is an important milestone
in the enhancement of Internet. As the caption says, this software gives the user "anywhere PC access".
RESUME
The software we have developed can be used to access a PC remotely through our website while
connected to a network. This software allows the user to access his files and devices remotely. It gives a
user friendly interface to the Home PC through the network.
In future, this software can be upgraded with provisions like Remote Desktop Viewing and accessing.
Remote Desktop Architecture provides a vast area of development to the programmers. It can be also
upgraded with a video conferencing provision. All the file manipulation operations like creation, deletion,
renamig etc can be included in this website in future.
REFERENCES
8/2/2019 Access My Pc
40/40
http://www.google.com/