Você está na página 1de 27

1

SYNOPSIS
The title of the project is REMOTE CONTROLLING SYSTEM. This project
mainly aims to control the Client systems. Most of you might have worked with Internet Transfer
Control which is very handy control when it comes to Internet Programming but there is another
control which even more robust and helps programmers creating more flexible applications.
User Datagram Protocol is a specification that defines a series of protocols used to
standardize how computers exchange information with each other. UDP provides
communication across interconnected networks that use diverse hardware architectures and
various operating systems. The protocols in UDP are arranged in a series of layers known as a
protocol stack. Each layer has its own functionality
In this project we can communicate with client through the UDP protocol. If we want to
communicate with client we must know the IP Address of the particular client. If we know the IP
Address we can easily communicate with client and server. For connecting with the ip address
we are getting the ip address of the clients and maintaining the details in Database.
In Multicast Solution the shutdown message will send many clients at a same time. The
Client Systems will react according to the server instruction.
The additional features of this application is 1.to transfer the files to the clients and 2.the
encryption and decryption using the SHA algorithm.
2

MODULES
Encryption & Decryption:
File Sending and Receiving:
Remote Shutdown
Peers Details

3

CHAPTER 1
PROJECT DESCRIPTION
1.1 INTRODUCTION
The title of the project is REMOTE CONTROLLING SYSTEM. This project
mainly aims to control the Client systems. Most of you might have worked with Internet Transfer
Control which is very handy control when it comes to Internet Programming but there is another
control which even more robust and helps programmers creating more flexible applications.
User Datagram Protocol is a specification that defines a series of protocols used to
standardize how computers exchange information with each other. UDP provides
communication across interconnected networks that use diverse hardware architectures and
various operating systems. The protocols in UDP are arranged in a series of layers known as a
protocol stack. Each layer has its own functionality
In this project we can communicate with client through the UDP protocol. If we want to
communicate with client we must know the IP Address of the particular client. If we know the IP
Address we can easily communicate with client and server. For connecting with the ip address
we are getting the ip address of the clients and maintaining the details in Database.
In Multicast Solution the shutdown message will send many clients at a same time. The
Client Systems will react according to the server instruction. The additional features of this
application are 1.to transfer the files to the clients and 2.the encryption and decryption using the
SHA algorithm.

4

CHAPTER 2
SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
The existing system is used manual. The user has been maintaining their system manually
is a tedious job. All the process must be done manually.
The users are interested to speed up the Operations and all the operations must be done
automatically. Existing system is the manual one which has the following drawbacks.
DRAW BACKS
Waste of time for manual operations.
Sometimes the operations done manually will prone to unsecured access.
Unauthenticated accessing.
Required information cannot be retrieved easily.
Manual processes will take time.
So the desire for the development of the proposed system had become essential.
2.2 PROPOSED SYSTEM
The proposed system is to computerize for maintaining secure of file operations. The aim
of the proposed system is the overcome the difficulties of the existing system.
FUNCTIONS OF THE PROPOSED SYSTEM
The proposed system is to computerize for various purposes and maintained securable
process. The latest technology will be used in the proposed system.
Advantages:
The required information can be secured easily.
We can encrypt & decrypt files easily and secured.
Time will not be wasted in the process.
Corrections can be made easily.
Wastage of manpower is reduced.
5

2.3 SYSTEM SPECIFICATION
2.3.1 HARDWARE SPECIFICATION
System : HCL
Processor : Pentium IV
Processor Speed : 2.80GHz
Main Storage : 512MB RAM
Hard Disk Capacity : 80GB
Floppy Disk Drive : 1.44MB
CD-ROM Drive : LG 52X Reader
Keyboard : 104 Keys
Mouse : Logitech
Monitor : Samsung 17 Color

2.3.2 SOFTWARE SPECIFICATION
Operating System : Windows XP
Front end : Visual Basic.Net
Back end : SQL 2000

2.3.3 ABOUT THE SOFTWARE
VB.NET
The system is developed using Visual Basic. NET, which is a very popular Microsoft
Product developed by Microsoft Corporation. This is one of the improved languages from basic
language. Visual basic. NET includes a variety of open active controls for user interfaces to
design application form. VB.NET is the multiple document inter face format (MDI).The user
interface is the part of the program that responds to the key press and mouse clicks. The action is
referred to as events of the form and controls in the form. VB.NET provides vast properties and
methods for each control, which helps to utilize all those, functions for record manipulations
Menu driven is one of the most effective controls in the VB.NET.In this menu driven the
menu names in a program appear in the menu bar when the user selects a menu, that menu open.
Each menu usually contains items arranged in a vertical list
6

These items are often grouped into functional groups with menu separaters.When the user
selects a menu item, that item appears highlighted; pressing enter or releasing the mouse button
opens that item. Each item should have a unique access character for users to choose commands
with keyboards. The user reaches the menu or menu item by pressing alt key and access
character. Short cuts are also useful to the user these keys are faster than access character in that
the user only needs to enter a shortcut to execute the corresponding menu item.
OVER VIEW OF .NET FRAMEWORK
The .NET framework is a new computing platform that simplifies application
development in the highly distributed environment of the internet.
The .NET framework is designed to fulfill the following objectives.To provide a consistent
object oriented programming environment whether object code is stored and executed locally,
but internet-distributed, or executed remotely.
To provide a code execution environment that minimizes software
deployment and versioning conflict.
To provide a code execution environment that guarantees safe execution of
code, including code created by an unknown or semi trusted third party.
To provide a code-execution environment that eliminates the performance
problems of scripted or interpreted environments.
To make the developer experience consist ant across widely varying types of
applications, such as windows-based applications and web-based applications.
To build all communication on industry standards to ensure that code based
on the .NET framework can integrate with any other code.
The .NET framework has two main components
Common Language Runtime (CLR).
NET framework class library.
Common Language Runtime (CLR).
The common language runtime is the foundation of the .NET framework .you can think
of the runtime as an agent that manages code at execution time, providing core services such as
7

memory management and thread management while also enforcing strict type safety and other
forms of code accuracy that ensure security and robustness.
In fact, the concept of code management is a fundamental principal of the runtime .Code
that targets the runtime isknown as managed code, while code that dose not target the runtime is
known as unmanaged code.
The .NET framework can be hosted by unmanaged components that load the common
language runtime into their processes and initiate the execution of managed code, thereby
creating a software environment that can explicit both managed and unmanaged features. The
.NET framework not only provides several runtime hosts, but also supports the development of
third-party runtime hosts.
Internet explore is an example of an unmanaged application that runtime (in the form of a
mime type extension).Using internet explorer to host the runtime enables you to embed managed
components or windows from controls in the HTML document
The Components Of CLR Are:
CTS =>Common Type System.
CLS =>Common Language Specification
CLS =>Common Language Specification
CIL =>Common Intermediate Language
JIT =>Just In Time Compiler
VES =>Virtual Execution System
CTS Common Type System
This is the range of types that the .NET runtime understands, and therefore that .NET
application can use. The common type system supports both object oriented programming like
java as well as procedural languages like c .It deals with two kinds of entities such objects and
values.
CLS-Common Language Specification
This is a subset of the CTS that all .NET languages are expected to support. The idea is the
any program that uses CLS-compliant types can interoperate with any .NET program written in
any language. If a component written in one language (say c#) is to be used from another
8

language (say VB.NET) then the component writer must adhere to type and structures defined by
CLS.
CIL-Common Intermediate Language
All compilers complying with CLR must generate an intermediate language
representation called common intermediate language (CIL). The CIL uses this intermediate
language to either generate native code or use just in compiler (JIT) complication to execute the
intermediate code on the fly.
JIT-Just In Time Compiler
The JIT or just in time compiler is the part of the runtime execution environment, which is
used to convert the intermediate language contained in the execution file, called assemblies , into
native executable code. The security policy settings are referred at this to decide if code being
compiled needs to be type safe.
VES-Virtual Execution System
Virtual execution system (VES) is more or less equivalent to the JVM (Java Virtual
Machine).VES loads, links and runs the programs written
for common language infrastructure contained in portable executable (PE) files.VES fulfill its
loader function by using information contained in the metadata and uses late binding (or linking)
to integrate modules compiled separately, which may even be written in different languages
NET Framework Class Library
The .NET framework library is a collection of reused types that tightly with the
common language runtime (CLR). The class library is object oriented, providing type from
which your own managed code can derive functionality. Managed codes are intermediate
language codes along with metadata contained in portable executable (PE) files.
This not only makes the .NET framework type easy to use, but also reduces the associated with
learning new features of the .NET framework
9

In addition, third party components can integrate seamlessly with classes in
the .NET framework .for example ,the .NET framework collection classes implement a set of
interfaces that you can use to develop you r own collection classes .your collection classes will
blend seamlessly with the classes in the .NET framework.One can use the .NET framework to
develop the following types of application and services.
Console application
Scripted and hosted application
Windows GUI application (windows forms)
VB.NET application
XML web services
Visual Basic .Net
Visual basic .NET preserves VBs general approach to programming with a SDK
development environment and click through forms to get at the underlying code.
Forms
A form is one of the most basic objects in which the application code and acts as a
container for the controls placed on it thus providing a visual interface. VB.NET initially
includes a default form; form1 file in each new project .Every form object has its properties,
events and methods associated with it.
Toolbox
The toolbox is an important window, which contains a set of controls. It contains the controls
to create our forms non-graphical components such as database connections and code fragments
that can be dragged directly from the toolbox into the code window.
Tabs
Different tabs are organized in the toolbox. Some of the tabs are
Data : Contains components that provide Access to data and data sources.
Components: Contains various components such as Reporting, message queuing etc.
10

Clipboard ring: Contains a list of the last few items that is copied to the system clipboard.
General: Empty by default, this is a place for us to store general controls, components,
and code fragments.
Win forms: Containing windows form controls is automatically available when windows
forms project is included in the project.
Web forms: Contains server side web form controls that are used to create web pages.
HTML tab: Contains controls that correspond to the standard HTML tags.
Properties Window
The properties window appears beneath the solution explorer on the right-hand of the
VS.NET main window. It displays the properties for the currently selected object in the main
window. Pressing key F4 also displays the properties window for the selected object.
Solution Explorer
Solution explorer window is similar to the project explorer window in the Bathe solution
explorer is a bit more advanced, since it allows us to construct solutions out of several different
projects including those written in different languages.
Class View
The class view window is somewhat similar to the solution explorer, in the it provides a view
into our solution and project. A view of classes, methods and properties rather than a view of
files are provided by the class view in the world of object-oriented world of .NET.
Server Explorer
Server explorer is an exciting new feature of VS.NET as it allows us to explore and
access server components in nice graphical environments. The server explorer lists the data
connections and the servers that are available to the user. It can be used to examine and
manipulate servers and the databases they contain in the server explorer.
Output Window
The output window is similar to the immediate window available in the previous version
of visual basic. The immediate window is used to view debug output from the application, and to
11

interact with the environment by entering bits of code or even calling procedures within the
users code.
Task List Window
Task list window is a feature that is used to provide a quick list of all the current build
and syntax errors in our application. The main advantage of using the task list is that by double-
clicking on an error listed in the window will take us right to the troublesome point in our code.
Web Development
Web development is now an integral part of visual basic.Net.The two major types of web
applications are web forms and web services. Web forms let you create web-based applications
with user interfaces. Are made up of code that can be called by other components on the internet
or applications that use internet protocols. Using web services, you can send and process data
using HTTP and XML messaging standards on the internet
Difference between visual basic 6.0 and visual basic.NET
Visual basic.NET is object oriented, but visual basic 6.0 is object based.
Multithreading is possible in a better way in .NET than in Visual Basic 6.0.
.NET supports ASP.NET.
A new concept name space is introduced.
Visual basic.NET is a platform independent.
Even the data types are considered as objects in visual basic.NET
In .NET structured error handling is possible.
Option have statement is removed (all array are zero based)
Unary operators are available.
Instead of COM components there is .NET components in visual basic.NET.But it
support COM components of visual basic 6.0.



12

SPECIAL FEATURES IN VB.NET:
VB.NET is an ideal programming language for developing sophisticated professional
application for Microsoft windows
It makes use of the graphical user interface for creating powerful applications, which
enables the user to interact easily within an application.
VB.NET provides many aspects such as easier comprehension, user friendliness and
faster application development, which help the developer to design the application more
effectively.
VB.NET provides the facilities such as log in dialog form, browser form, query form
,option dialog form and wizard from which enable the developer design the application
more effectively

BACK END
SQL SERVER 2000
Microsoft SQL Server 2000 is a full-featured relational database management system
(RDBMS) that offers a variety of administrative tools to ease the burdens of database
development, maintenance and administration.
Enterprise Manager is the main administrative console for SQL Server installations. It
provides you with a graphical "birds-eye" view of all of the SQL Server installations on our
network.
Query Analyzer offers a quick and dirty method for performing queries against any of our
SQL Server databases. It is a great way to quickly pull information out of a database in response
to a user request, test queries before implementing them in other applications, create/modify
stored procedures and execute administrative tasks.
SQL Profiler provides a window into the inner workings of your database. SQL Profiler
allows you to capture and replay system "traces" that log various activities. It is a great tool for
optimizing databases with performance issues or troubleshooting particular problems.
Service Manager is used to control the MSSQLServer (the main SQL Server process),
MSDTC (Microsoft Distributed Transaction Coordinator) and SQLServerAgent processes. An
icon for this service normally resides in the system tray of machines running SQL Server.
13


FEATURES OF SQL SERVER 2000
Internet Integration.
The SQL Server 2000 database engine includes integrated XML support. It also has the
scalability, availability, and security features required to operate as the data storage component
of the largest Web sites. The SQL Server 2000 programming model is integrated with the
Windows DNA architecture for developing Web applications.
Scalability and Availability.
The same database engine can be used across platforms ranging from laptop computers running
Microsoft Windows 98 through large, multiprocessor servers running Microsoft Windows
2000 Data Center Edition. SQL Server 2000 Enterprise Edition supports features such as
federated servers, indexed views, and large memory support that allow it to scale to the
performance levels required by the largest Web sites.
Enterprise-Level Database Features.
The SQL Server 2000 relational database engine supports the features required to support
demanding data processing environments. The database engine protects data integrity while
minimizing the overhead of managing thousands of users concurrently modifying the database.
SQL Server 2000 includes a set of administrative and development tools that improve upon the
process of installing, deploying, managing, and using SQL Server across several sites.

Data warehousing.
SQL Server 2000 includes tools for extracting and analyzing summary data for online analytical
processing. SQL Server also includes tools for visually designing databases and to analyze the
data.

14

CHAPTER 3
SYSTEM DESIGN
3.1 DESIGN NOTATIONS
3.1.1 SYSTEM FLOW DIAGRAM

Username &
Password
Authentication
System
Client
Details
File Sending
Encryption
Receiving
Instruction
Shutdown
Instruction
Sending
Decryption
File Receiving
Client Details
Client details
Yes
No
Exit
Fig.1 System Flow Diagram
15

3.1.2 DATA FLOW DIAGRAM
Level 0:




Level 1:
IP Details








IP Details



IP Details


Admin User
Multicast
Process
Peers







S
Admin
Multi Cast
Process
Unicast Process







S
File Recieve






S
User
USers
Customer






S
16

3.2 DESIGN PROCESS
3.2.1 INPUT DESIGN
Input design is one of the most important phase of the system design. Input design is the
process where the input received in the system are planned and designed, so as to get necessary
information from the user, eliminating the information that is not required. The input design is
the part of overall system design, which requires very careful attention. If the data going into the
system is incorrect then the processing and output will magnify the errors.
The objectives considered during input design are:
Flexibility and thoroughness of validation rules.
Screen design to ensure accuracy and efficiency of the input relationship with files.
Input design features can ensure the reliability of the system and produce result from
accurate data or they can result in the production of erroneous information.

17

3.1.2 DATABASE DESIGN
The database design involves creation of tables that are represented in physical database
as stored files. They have their own existence. Each table constitute of rows and columns where
each row can be viewed as record that consists of related information and column can be viewed
as field of data of same type. The table is also designed with some position can have a null value.
The database design of project is designed in such a way values are kept without
redundancy and with normalized format. Refer the appendix for screen shots of Database
Design.
Table 1: ClientDetails
Primary Key: ClientId











Column Name Data type Description
ClientId Int Client id
IPAddress Varchar Ip address
UsedBy Varchar User



18

CHAPTER 4
SYSTEM IMPLEMENTATION AND TESTING
4.1 SYSTEM TESTING
Testing is a series of different tests that whose primary purpose is to fully exercise the
computer based system. Although each test has a different purpose, all work should verify that
all system element have been properly integrated and performed allocated function. Testing is
the process of checking whether the developed system works according to the actual requirement
and objectives of the system.
The philosophy behind testing is to find the errors. A good test is one that has a high
probability of finding an undiscovered error. A successful test is one that uncovers the
undiscovered error. Test cases are devised with this purpose in mind. A test case is a set of data
that the system will process as an input. However the data are created with the intent of
determining whether the system will process them correctly without any errors to produce the
required output.
Types of Testing:
Unit testing
Integration testing
Validation testing
Output testing
User acceptance testing
Unit Testing
All modules were tested and individually as soon as they were completed and were
checked for their correct functionality.
Integration Testing
The entire project was split into small program; each of this single programs gives a
frame as an output. These programs were tested individually; at last all these programs where
combined together by creating another program where all these constructors were used. It give a
lot of problem by not functioning is an integrated manner.
19

The user interface testing is important since the user has to declare that the arrangements
made in frames are convenient and it is satisfied. when the frames where given for the test, the
end user gave suggestion. Based on their suggestions the frames where modified and put into
practice.
Validation Testing
At the culmination of the black box testing software is completely assembled as a package.
Interfacing errors have been uncovered and corrected and a final series of test i.e., Validation
succeeds when the software function in a manner that can be reasonably accepted by the
customer.
Output Testing
After performing the validation testing the next step is output testing of the proposed
system. Since the system cannot be useful if it does not produce the required output. Asking the
user about the format in which the system is required tests the output displayed or generated by
the system under consideration. Here the output format is considered in two ways. one is on
screen and another one is printed format. The output format on the screen is found to be
corrected as the format was designed in the system phase according to the user needs. And for
the hardcopy the output comes according to the specifications requested by the user.
User Acceptance System
An acceptance test as the objective of selling the user on validity and reliability of the system. It
verifies that the procedures operate to system specification and mat the integrity of vital is
maintained.






20

4.2 SYSTEM IMPLEMENTATION
System implementation is stage in the project where the theoretical design is turned
into the working system. The most crucial stage is giving the users confidence that the new
system will work effectively and efficiently.
The performance of reliability of the system is tested and it gained acceptance. The
system was implemented successfully. Implementation is a process that means converting a new
system in to operation. Proper implementation is essential to provide a reliable system to meet
organization requirements. During the implementation stage a live demon was undertaken and
made in front of end-users. The various features provided in the system were discussed during
implementation
It making the new system available to a prepared set of users (the deployment), and
positioning on-going support and maintenance of the system within the Performing Organization
(the transition). At a finer level of detail, deploying the system consists of executing all steps
necessary to educate the Consumers on the use of the new system, placing the newly developed
system into production, confirming that all data required at the start of operations is available and
accurate, and validating that business functions that interact with the system are functioning
properly. Transitioning the system support responsibilities involves changing from a system
development to a system support and maintenance mode of operation, with ownership of the new
system moving from the Project Team to the Performing Organization.
List of System implementation is the important stage of project when the theoretical
design is tuned into practical system. The main stages in the implementation are as follows:
Planning
Training
System testing and
Changeover Planning
Planning is the first task in the system implementation. Planning means deciding on the
method and the time scale to be adopted. At the time of implementation of any system people
from different departments and system analysis involve. They are confirmed to practical problem
of controlling various activities of people outside their own data processing departments.
21

The line managers controlled through an implementation coordinating committee. The
committee considers ideas, problems and complaints of user department, it must also consider;
The implication of system environment
Self selection and allocation form implementation tasks
Consultation with unions and resources available
Standby facilities and channels of communication

The purpose of Prepare for System Implementation is to take all possible steps to ensure
that the upcoming system deployment and transition occurs smoothly, efficiently, and flawlessly.
In the implementation of any new system, it is necessary to ensure that the Consumer community
is best positioned to utilize the system once deployment efforts have been validated. Therefore,
all necessary training activities must be scheduled and coordinated. As this training is often the
first exposure to the system for many individuals, it should be conducted as professionally and
competently as possible. A positive training experience is a great first step towards Customer
acceptance of the system.
During System Implementation it is essential that everyone involved be absolutely
synchronized with the deployment plan and with each other. Often the performance of
deployment efforts impacts many of the Performing Organizations normal business operations.
Consumers may experience a period of time in which the systems that they depend on to
perform their jobs are temporarily unavailable to them. They may be asked to maintain detailed
manual records or logs of business functions that they perform to be entered into the new system
once it is operational. Technical Services personnel may be required to assume significant
implementation responsibilities while at the same time having to continue current levels of
service on other critical business systems.
Technical Support personnel may experience unusually high volumes of support requests
due to the possible disruption of day-to-day processing. Because of these and other impacts, the
communication of planned deployment activities to all parties involved in the project is critical.
A smooth deployment requires strong leadership, planning, and communications. By this point in
the project lifecycle, the team will have spent countless hours devising and refining the steps to
22

be followed. During this preparation process the Project Manager must verify that all conditions
that must be met prior to initiating deployment activities have been met, and that the final green
light is on for the team to proceed. The final process within the System Development Lifecycle
is to transition ownership of the system support responsibilities to the Performing Organization.
In order for there to be an efficient and effective transition, the Project Manager should make
sure that all involved parties are aware of the transition plan, the timing of the various transition
activities, and their role in its execution.
Due to the number of project participants in this phase of the SDLC, many of the
necessary conditions and activities may be beyond the direct control of the Project Manager.
Consequently, all Project Team members with roles in the implementation efforts must
understand the plan, acknowledge their responsibilities, recognize the extent to which other
implementation efforts are dependent upon them, and confirm their commitment.
23

4.3 MODULE DESCRIPTION
Encryption & Decryption
File Sending and Receiving
Remote Shutdown
Peers Details
Encryption & Decryption
The art of protecting information by transforming it (encrypting it) into an unreadable
format, called cipher text. Only those who possess a secret key can decipher (or decrypt) the
message into plain text.
The goal of cryptography is to make it possible for two people to exchange a message in
such a way that other people cannot understand the message. There is no end to the number of
ways this can be done, but here we will be concerned with methods of altering the text in such a
way that the recipient can undo the alteration and discover the original text. The original text is
usually called cleartext and the encoded or altered text is called ciphertext. The conversion
from cleartext to ciphertext is called encoding or enciphering, and the opposite operation is
called decoding or deciphering. If you are trying to read a secret message that was not
intended for you and you initially dont know the encoding method.
File Sending and Receiving
File Sending and Receiving is one of the most useful features for transferring files using
sockets. This feature allows you to share all kinds of information with other people share on
Remote system.
This utility will transfer a file between two computers using a UDP port of your
choosing. One computer uses Passive mode and listens on a port for a connection from the other
computer, which will use Active mode to connect to the first computer via its IP address.
Regardless of the selection of which computer will use Passive mode and which will use Active
mode, files can be sent in either direction.

24

Remote Shutdown
Firstly, in order to remotely shutdown a computer on your network, youll need to make
sure you have Administrative access to that computer. Remote Shutdown allows to remotely
(over the network) shutdown and power off or switch Off mode any Windows NT/2000/XP
Workstation or Server. In addition, you can specify a message which will be displayed before the
computer will be shutdown and offer the user to know the shut downing time. This plan can
include many remote operations with different PCs that will be executed automatically according
with their schedule settings.
Peers Details
The server system holds the IP address of your client, means the remote user. An
Internet Protocol (IP) address is a numerical label that is assigned to devices participating in a
computer network that uses the Internet Protocol for communication between its nodes.

Remember, the IP address will be the public one. I ment the IP address that provided by your
internet provider. For example 10 people from your area using the service of internet from same
provider. And for 10 of them, it will display the same IP address

25

CHAPTER 5
CONCLUSION
The REMOTE CONTROLLING SYSTEM has been developed to satisfy all
proposed requirements. The system is highly scalable and user friendly. Almost all the system
objectives have been met. The system has been tested under all criteria. The system minimizes
the problem arising in the existing manual system and it eliminates the human errors to zero
level.
The software executes successfully by fulfilling the objectives of the project. Further
extensions to this system can be made required with minor modifications. The invention can be
implemented in digital electronic circuitry, or in computer hardware, firmware, software, or in
combinations of them. Apparatus of the invention can be implemented in a computer program
product tangibly embodied in a machine-readable storage device for execution by a
programmable processor; and method steps of the invention can be performed by a
programmable processor executing a program of instructions to perform functions of the
invention by operating on input data and generating output











26

CHAPTER 6
FUTURE ENHANCEMENTS
Nothing will be useful until it is update & enhanced timely just like IT field. In such a
way that this software can have more future enhancement such as
Authentication on administrator side can be moved for more secure accessing our
software.
Virtual reality for the products can be achieved with the development of technology
It can be enhanced according to the client user friendliness
Can be enhanced with blogs in future for tie up with different organization
Easy accessing.


27

BIBLIOGRAPHY
BOOKS
Elias Awath, SYSTEM ANALYSIS AND DESIGN,Tata Mc Graw Hill Publication,
Sixth Edition,2003
S.Ramachandran,COMPUTER AIDED DESIGN, Air Walk Publication, Third
Edition,2003
Richard Fairley,SOFTWARE ENGINEERING CONCEPTS,Tata Mc Graw Hill
Publication, Second Edition,1997
DISTRIBUTED .NET PROGRAMMING IN VB .NET by Tom Barnaby
PROFESSIONAL VB.NET, 2ND EDITION by Fred Barwell, et al
WEBSITES
http://www.sourceforge.net/
http://www.codeplex.com/
http://www.project.net/
http://www.gnu.org/projects/dotgnu/
http://freecode.com/

Você também pode gostar