Top Banner

of 64

Multi User Protocol

Apr 14, 2018

Download

Documents

Mohana Sundaram
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/30/2019 Multi User Protocol

    1/64

    MULTI-PROTOCOL BROWSER

    A project Report Submitted to

    MOTHER TERESA WOMENS UNIVERSITY KODAIKANAL

    in partial fulfillment of the requirements for the award of the Degree of

    Master of Science in Computer Science

    Submitted by

    M.SUBA

    Reg.no : 113MCS018

    Under the Guidance of

    Dr.(Mrs).S.RASATHIM.C.A, M.Phil.,

    DEPARTMENT OF COMPUTER SCIENCE

    M.V.MGOVT. ARTS COLLEGE FOR WOMEN

    (Affiliated to Mother Teresa Womens University, Kodaikanal)

    Dindigul624001

    April 2013

  • 7/30/2019 Multi User Protocol

    2/64

    CERTIFICATE

    This is to certify that the Project entitled MULTI-PROTOCOL BROWSER is

    abonafide work done by M.SUBA, Reg No:113MCS018 submitted in partial fulfillment

    of requirements for the award of the degree Master of Science in Computer Science,

    M.V.M Govt. Arts College for Women, Dindigul during the academic year 2012-2013

    under my supervision.

    INTERNAL GUIDE HEAD OF THE DEPARTMENT

    Submitted for the VivaVoce Examination held on

    INTERNAL EXAMINER EXTERNAL E XAMINER

  • 7/30/2019 Multi User Protocol

    3/64

    DECLARATION

    M.SUBA

    M.Sc(Computer Science)

    113MCS018

    M.V.M Govt. Arts College for Women,

    Dindigul.

    Hereby I declare that the project entitled MULTI-PROTOCOL BROWSER

    submitted to M.V.M Govt. Arts College for Women, Dindigul for the award of

    Degree of Master of Science in Computer Science, is my original work and that it has

    not been previously done for the award of any degree, diploma or any other title.

    Signature of the Candidate

    Place:

    Date:

  • 7/30/2019 Multi User Protocol

    4/64

    ACKNOWLEDGEMENT

    I hereby acknowledge my deep sense of gratitude and sincere thanks to Dr.Mrs.C.PadmaLatha M.Sc.,Ph.D., Principal, M.V.M Govt. Arts College for women, Dindigul

    for have permitted me to undergo the project work.

    I am extremely thankful to Dr.Mrs.A.Pethalakshmi M.Sc., M.Phil., Ph.D., the Head,

    Department of Computer Science, for her encouragement in completing the project

    successfully.

    I sincerely thank my guideDr.Mrs.A.Pethalakshmi M.Sc., M.Phil., Ph.D., the

    Head, Department of Computer Science,for herinspiring guidance and encouragement

    to complete the project work in a successful manner.

    I also express my sincere thanks to my class in-charge Mrs. S.RAJATHI M.C.A.,

    M.Phil., Assistant professor and other staff members of our department for theirsupport and assistance provided to complete the project work .

    I sincerely thank to our lab programmer Mrs.N.Manimala M.A., M.Phil.,

    I deeply thank to my parents, sister and friends for their encouragement in preparing

    this work.

    Above all I thank the almighty for blessings showered all throughout the execution of

    the project work.

    (M.SUBA)

  • 7/30/2019 Multi User Protocol

    5/64

    CONTENTS

  • 7/30/2019 Multi User Protocol

    6/64

    TABLE OF CONTENTS

    CHEPTER

    NO

    TITLE PAGE NO

    1.

    2.

    3.

    4.

    5.

    6.

    7.

    8.

    INTRODUTION

    1.1 About the Project

    1.2 About the Organization

    SYSTEM ANALYSIS

    2.1 Existing System

    2.2 Proposed System

    SYSTEM SPECIFICATION

    3.1 Hardware Specification

    3.2 Software Specification

    3.3 Software Description

    SOFTWARE ARCHITECTURE

    4.1 Modules

    4.2 Modules Description

    SYSTEM DESIGN

    4.3 Data Flow Diagram

    4.4 DataBase Design

    SYSTEM TESTING

    SYSTEM IMPLEMENTATION

    CONCLUSION

    BIBLIOGRAPHY

    APPENDIX

    Screen Shots

  • 7/30/2019 Multi User Protocol

    7/64

    ABSTRACT

    The aim of this project is to implement a integrated application that allows to transfer

    files between a variety of systems, including Windows ,UNIX and MAC. It includes the

    samba client, NFS client, ftp client and web browser. It includes integration of protocols

    in a platform independent environment so that a single interface can support protocols

    like FTP, HTTP, SMB and NFS.

    The following points support our idea:-

    o Internet Explorer supports protocols like HTTP, FTP but not NFS.o To use Samba protocol, Samba client is required in linux.

  • 7/30/2019 Multi User Protocol

    8/64

    INTRODUCTION

  • 7/30/2019 Multi User Protocol

    9/64

    CHAPTER 1

    INTRODUCTION

    1.1 ABOUT THE PROJECT

    Now days Many platform corporation has been raised with different empower andenrichment techniques.

    So people using different platform according to their requirement has raisedenormously .

    So some page developed in various platform run across internet , which may losssome data because of cross platform nature.

    The project is implemented in java. The user friendly interface is developed using

    swing. It contains a web-browser, ftp client, ntfs client and Samba client.

    FTP Client: - FTP has had a long evolution over the years. The first proposed file

    transfer mechanisms in 1971 that were developed for implementation on hosts at M.I.T.

    (RFC 114). This was the start in the evolution of much friendly FTP protocol. The

    objectives of FTP are

    1) To promote sharing of files (computer programs and/or data)

    2) To encourage indirect or implicit (via programs) use of remote computers

    3) To shield a user from variations in file storage systems among hosts

    4) To transfer data reliably and efficiently.

  • 7/30/2019 Multi User Protocol

    10/64

    NFS Client:- The Sun Network File system (NFS) protocol provides transparent remote

    access to shared files across networks. The NFS protocol is designed to be portable

    across different machines, operating systems, network architectures, and transport

    protocols. This portability is achieved through the use of Remote Procedure Call

    (RPC).Implementations already exist for a variety of machines, from personal

    computers to supercomputers.

    The supporting mount protocol allows the server to hand out remote access privileges to

    a restricted set of clients. It performs the operating system-specific functions that allow,

    for example, to attach remote directory trees to some local file system.

    The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,

    collaborative, hypermedia information systems. HTTP is the foundation of data

    communication for the World Wide Web.

    The standards development of HTTP was coordinated by the Internet Engineering Task

    Force (IETF) and the World Wide Web Consortium (W3C), culminating in the

    publication of a series ofRequests for Comments (RFCs), most notably RFC 2616 (June

    1999), which defines HTTP/1.1, the version of HTTP in common use.

    HTTP Browser: - The Hypertext Transfer Protocol (HTTP) is an application-level

    protocol for distributed, collaborative, hypermedia information systems. It is a generic,

    stateless, protocol which can be used for many tasks beyond its use for hypertext, such

    as name servers and distributed object management systems, through extension of its

    request methods, error codes and headers. A feature of HTTP is the typing and

    negotiation of data representation, allowing systems to be built independently of the

    data being transferred.

    Samba Client:- The Common Internet File System (CIFS), also known as Server

    Message Block (SMB), is a network protocol whose most common use is sharing files on

    a Local Area Network (LAN). The protocol allows a client to manipulate files just as if

    they were on the local computer. Operations such as read, write, create, delete, and

    rename are all supported. The only difference being that the files are not on the local

    computer and are actually on a remote server. The CIFS protocol works by sending

    http://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/World_Wide_Web_Consortiumhttp://en.wikipedia.org/wiki/Requests_for_Commentshttp://tools.ietf.org/html/rfc2616http://tools.ietf.org/html/rfc2616http://en.wikipedia.org/wiki/Requests_for_Commentshttp://en.wikipedia.org/wiki/World_Wide_Web_Consortiumhttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/World_Wide_Web
  • 7/30/2019 Multi User Protocol

    11/64

    packets from the client to the server. Each packet is typically a basic request of some

    kind, such as open file, close file, or read file. The server then receives the packet,

    checks to see if the request is legal, verifies the client has the appropriate file

    permissions, and finally executes the request and returns a response packet to the client.

    Introduction to the Web Browser Interface

    PROTOCOL

    The information exchanged between devices on a network or other communications

    medium is governed by rules or conventions that can be set out in a technicalspecification called a communication protocol standard. The nature of the

    communication, the actual data exchanged and any state-dependent behaviors are

    defined by the specification.

    In digital computing systems, the rules can be expressed by algorithms and data

    structures. Expressing the algorithms in a portable programming language, makes the

    protocol software operating system independent.

    Operating systems are usually conceived of as consisting of a set of cooperating

    processes that manipulate a shared store (on the system itself) to communicate with

    each other. This communication is governed by well-understood protocols. These

    protocols can be embedded in the process code itself as small additional code fragments.

    In contrast, communicating systems have to communicate with each other using shared

    transmission media, because there is no common memory. Transmission is not

    necessarily reliable and can involve different hardware and operating systems on

    different systems.

    To implement a networking protocol, the protocol software modules are interfaced with

    a framework implemented on the machine's operating system. This framework

    implements the networking functionality of the operating system. The best known

    frameworks are the TCP/IP model and the OSI model.

    http://en.wikipedia.org/wiki/State_%28computer_science%29http://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/TCP/IP_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/TCP/IP_modelhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/State_%28computer_science%29
  • 7/30/2019 Multi User Protocol

    12/64

    At the time the Internet was developed, layering had proven to be a successful design

    approach for both compiler and operating system design and, given the similarities

    between programming languages and communication protocols, layering was applied to

    the protocols as well. This gave rise to the concept of layered protocols which nowadays

    forms the basis of protocol design.

    Systems typically do not use a single protocol to handle a transmission. Instead they use

    a set of cooperating protocols, sometimes called a protocol family or protocol suite.

    Some of the best known protocol suites include: IPX/SPX, X.25, AX.25, AppleTalkand

    TCP/IP.

    The protocols can be arranged based on functionality in groups, for instance there is agroup of transport protocols. The functionalities are mapped onto the layers, each layer

    solving a distinct class of problems relating to, for instance: application-, transport-,

    internet- and network interface-functions.To transmit a message, a protocol has to be

    selected from each layer, so some sort of multiplexing/demultiplexing takes place. The

    selection of the next protocol is accomplished by extending the message with a protocol

    selector for each layer.

    http://en.wikipedia.org/wiki/IPX/SPXhttp://en.wikipedia.org/wiki/X.25http://en.wikipedia.org/wiki/AX.25http://en.wikipedia.org/wiki/AppleTalkhttp://en.wikipedia.org/wiki/TCP/IPhttp://en.wikipedia.org/wiki/TCP/IPhttp://en.wikipedia.org/wiki/AppleTalkhttp://en.wikipedia.org/wiki/AX.25http://en.wikipedia.org/wiki/X.25http://en.wikipedia.org/wiki/IPX/SPX
  • 7/30/2019 Multi User Protocol

    13/64

    1.2 ABOUT THE ORGANIZATION

    LAMBENT Academic support program to bridge the academics-industry divide

    Every career aspiring student wants to study to get a job. LAMBENT focusses tosupport a student to complete his / her degree so as to get a job. LAMBENT academic

    support solutions enhance the employability to bridge the ever widening Academics-Industry

    divide.

    LAMBENT launched EdCademy, the academic support programme for Engineering,

    and Management students to provide the much needed support for the student to complete a

    degree so as to get a job. Under this programme, LAMBENT conducts Promptive Metrics

    based Learning (PML) methods to enhance the performance of students in their semester

    exams so that their placement prospects become better as they move to final year campus

    programmes. EdCademy at the outset offers three engines of support viz., Learning Engine

    (LE), Assessment Engine (AE), and Placement Engine (PE).

    EdCademy assures a better students performance rating in their core degree subjects

    and assessment essentials. This is achieved by continuous assessments that can be forced

    upon to every student by the concerned HoD by unlimited access to EdCademys LearningEngine (LE). Further, before the semester exam, a student can attempt many model papers of

    a particular subject which the student feels tough to pass or score high through the

    Assessment Engine (AE) of EdCademy. Final year students can also access for unlimited job

    positions through Placement Engine (PE) of EdCademy by which virtually an e-campus

    interview can be organized which could land a student in a job offer much before he / she

    completes the course.

    EdCademy is planned for other Universities in other states as well. EdCademy is well

    supported by EdClass, a product that makes a student to meet a tutor in a virtual class

    network (VCN)to clarify doubts and also to get quick lectures on important and difficult

    topics. There will be both live and pre-recorded sessions in EdClass.

    EdCademy with EdClass is sure to simplify the process of passing exams and getting

    degree with better grades. Students with EdCademy of LAMBENT can look for right

    placements with clients already getting the information and screening them for theirperformance which are given as footprints by the LAMPS system seamlessly in web network.

  • 7/30/2019 Multi User Protocol

    14/64

    About LAMBENT

    LAMBENT is World's first 4th generation education company that uses technology to

    efficiently synchronize manpower demand and supply in number and skills right from

    development to deployment. The size of India's addressable market, favorable demography,

    growing acceptance of technology-aided learning, and LAMBENT innovative Humanware

    Education And Deployment System (HEADS) coupled with its trademarked content enable

    rapid growth. Its business model is scalable nationally and internationally.

    LAMBENT Softsystems Limited is incepted in Mar 2001 as Lambent Softsystems P

    Ltd., with an objective of providing niche training solutions, customised software solutions,

    and placement consulting on contract as well as permanent basis to both Corporate andInstitutional clients. The company successfully provided staffing solutions to premier clients

    during 2002 to 2004 viz., TI Group, TVS Group, Office Tiger, KSB Pumps, Infosys

    Technologies, HCL Technologies, Shasun Chemicals, Hexaware Technologies, Ashok

    Leyland, Seshasayee Paper & Boards among others. LAMBENT acquired ELMAQ

    EDUCATION, leading IT Training brand in the South in the year 2007 to move aggressively

    in Education & Training space. LAMBENT employs e-learning and has patented the

    education models which seamlessly control the complete learning life-cycle of a student from

    development to deployment in a web controlled framework. LAMBENT holds copyrighted e-

    contents covering over a dozen domains and verticals.

    LAMBENT is promoted by Mr. S. Giridharan, as senior technocrat of Indian IT space

    who is a pioneer in Job oriented education of 90's. He has over 2 decades of experience in

    Education having been instrumental in the success of SSI and Radiant education brands.

    Giridharan later led ELMAQ education brand and subsequently sold to Lambent and merged

    all the businesses under LAMBENT.

    LAMBENT provides job linked next generation education through Integrated

    Learning Model (ILM). LAMBENT EdCenters, EdCampuses, and EdCademys are partner-

    led and in-campus online contact centers which are spread across India and South Asia

    providing education & placement through ILM.

    Offerings

  • 7/30/2019 Multi User Protocol

    15/64

    SCHOOLS PRESCHOOL: Powerful and magnificent channel of 3 D animation videos

    specially designed for your child. Interactive learning just a click away. A

    program designed for your child keeping in mind the various levels of

    aspirations from basic to advanced. Come and explore this unique interactive

    education platform with your child today. With illustrations in the form of

    stories, games, quizzes and more..your child will find it engaging and you

    useful. Enjoy, explore and measure your child's development with interesting

    and captivating graphics like never before.

    PRIMARY: Powerful and magnificent channel of 3 D animation videosspecially designed for your child. Interactive learning just a click away. A

    program designed for your child keeping in mind the various levels of

    aspirations from basic to advanced. Come and explore this unique interactive

    education platform with your child today. With illustrations in the form of

    stories, games, quizzes and more. Your child will find it engaging and you

    useful. Enjoy, explore and measure your child's development with interesting

    and captivating graphics like never before.

    MIDDLE: The best way to build a Nation is at Foundation The SMARTC.A.P program - Learning Concepts.Application and Problem solving. Lays

    solid foundation for your preparation for Olympaids/NTSE and similar exams.

    SECONDARY: LAMBENT is fully cognizant of your problems of getting theexpert tutor, wasting more of your productive time in travelling, paying high

    fees, and still scoring less marks in your relentless pursuit to look for a perfect

    tuition support for your subjects.Our solution is to connect you to expert tutors

    live from the comfort of your home at a fraction of the tuition fee that you are

    paying or will be paying.

    HIGHER SECONDARY:

  • 7/30/2019 Multi User Protocol

    16/64

    TEST PREP

    IITJEE: Our unique program provides the following contents to prepare youadequately for the rigors of the IITJEE exam:

    i. 81 Exhaustive chapters covering all topics prescribed for IITJEE.ii. 2500+ videos containing lectures by senior professors and top IITians

    covering everything from the very basic fundamentals and tips, tricks

    and shortcut methods to help you solve advanced level IIT JEE

    Problems.

    iii. Exposure to about 10000+ unique problems spread over the IITJEEsyllabus

    iv. tate-of-the-Art Assessment Engine with an extensive online databaseof thousands of questions exactly on the level of IITJEE examination

    to build your speed and accuracy thereby ensuring nothing is left to

    chance

    v. 20 hours of access to IITJEE learning module and Assessment Engine.AIEEE: Our unique program provides the following contents to prepare you

    adequately for the rigors of the AIEEE exam:

    vi. 60 chapters spanning all topics in AIEEE across physics, chemistryand mathematics

    vii. 1400+ videos containing lectures by senior professors coveringeverything from the very basic fundamentals and tips, tricks and

    shortcut methods to help you solve advanced level AIEEE Problems.

    viii. Exposure to about 5000+ unique problems spread over the AIEEEsyllabus

    ix. State-of-the-Art Assessment Engine with an extensive online databaseof thousands of questions exactly on the level of AIEEE examination

    to build your speed and accuracy thereby ensuring nothing is left to

    chance.

    x. Get access to AIEEE learning module and Assessment Engine. OLYMPAID: The Central Board of Secondary Education conducts the

    National Informatics Olympiad in collaboration with the Indian Association

    for Research in Computing Science (IARCS), Mumbai, across the country and

  • 7/30/2019 Multi User Protocol

    17/64

    abroad. The examination which is held in two stages is open to all the students

    of classes VIII to XII studying in CBSE schools as well as other Boards in the

    country. At lampsglow we believe the best way to build a Nation is at

    Foundation. The SMART C.A.P program - Learning Concepts. Application

    and Problem solving. The program lays a solid foundation for your childs

    preparation for Olympaids and similar exams.

    NTSE: NCERT awards 1000 Scholarships to the talented students of ClassVIII each year through its National Talent Search Scheme and then nurture the

    talent by way of providing financial assistance in the form of both monthly

    scholarship and annual book grant. At lampsglow we believe the best way to

    build a Nation is at Foundation. The SMART C.A.P program - Learning

    Concepts.Application and Problem solving. The program lays a solid

    foundation for your childs preparation for NTSE and similar exams.

    UNDERGRADUATE/POST GRADUATE

    IT SKILLS: LAMBENT brings 7 IT courses that matter most to the studies ofan undergraduate or anyone looking to enhance their career at every stage of

    growth. To access all and read through those 7 star courses viz., Computer

    Fundamentals, MS-Office, C, C++, Java, Softskills, and Numerical Ability

    and more.

    ENGINEERING STUDY: Taking education to your door steps. For all thosestudents looking at improving and enhancing their academic endeavors

    LAMBENT offers video lessons that enhance the quality of your revisions and

    re revisions. Revisions that are the the most crucial part of exam preparation,

    are just a click away. Take the lessons anytime, anywhere at your

    convenience.

    ENGINEERING PREP: For aspiring Engineers of Anna University and AllIndia Engineering exams can pass your ANNA UNIVERSITY Engineering

    Semester or Engineering exams easily by scoring high marks. LAMBENT

    offers unlimited Access to MODEL TEST PAPERS through our online

    LAMBENT LAMPSGLOW anywhere, anytime to clear your arrears and to

    look for careers ! "Practice until you perfect - try it and experience the

  • 7/30/2019 Multi User Protocol

    18/64

    perfection that you so much wanted. Appear in your exams with greater

    confidence. Engineering support tests has practice papers just for that."

    Partners

    A Distributor is appointed for each postal pin code. Distributor is authorized to sell all

    products displayed under LG through dealer's network. Distributor can enter LG site and

    create his/her own login under the distributors column at no cost basis which will be

    exclusively owned by the distributor. The entry Fee for a distributor per pin code is nominal

    considering the marketing support they would get in their region from us. A Distributor gets

    the edcredits in his/her login and also in his mobile phone as registered in LG.

    The distributor then appoints Dealers under his area of operation viz: the pin code for

    which the distributor has paid. A distributor has the freedom to appoint as many dealers as

    possible in the said pin code . Upon receiving payment from dealers , a distributor has to

    transfer part of EdCredits as agreed to the dealer which can done through by transferring the

    same from distributors login to dealers login.

    A distributor can sell the stocks to none other than registered and paid up dealers.

    Payment towards Edcredit transfer paid by dealer to distributor.

    Clients Benefits

    Industry that benefits out of HEADS model is wide. Both IT and non-IT verticals and

    domains are addressed. The divide between the academics and industry is ever widening

    especially after India is projected as a sole source for humanware in Information Technology

    sector. Institutions focus so much on IT that core industry suffers from lack of qualified and

    trained resources.

    LAMBENT as a strategy focuses in generating competent fresher for non-IT domains

    upto 70% of its business. It is expected that a lot of support would come from the student

    resources for non-IT positions considering the fact that the core industries pay-packs are

    better and the student's knowledge levels are low at the moment about non-IT opportunities.

    Further the HEADS model is strictly automated upto a job offer after a strict training and

    assessment.

  • 7/30/2019 Multi User Protocol

    19/64

    A client company, as industry, is always looking at employable manpower resource as

    a fresher at volumes. With LAMBENT HEADS model, the client company can breathe easy

    and plan the project schedules better with pre-determined lead time in a proactive way. The

    LAMPS portal has its entry point for every such client who can enter their preferences,

    candidate's background, curriculum essentials with assessment criteria, and commit on a

    defined job offers.

    With rupee appreciating, it may sound interesting for companies to look into our one-

    stop-shop solution of providing them with the exact set of their dream resources by taking

    care of the following:

    The exact requirements of fresher and the lead-time before they have to be inductedinto your actual project

    Entry-level criteria The curriculum of training to be done on them The choice of colleges The choice of academic excellence The likely compensation package vs qualification and training performance The other wish-list in terms of job-fitment straight from the college

    Once clients sign-up with us with all those crucial information as your specification, they

    are put up in their own digital-dashboard of what is going on from inside our automated

    learning system for their selected chunks of fresher registered through our dealer gateways.

    Rather their HR is directed through our digital window right from the time of the course

    enrolment up to the final grading out of the regular ILT sessions with strictly controlled

    assessments as per their specification What's more, the exactly matched resources to client'sspecification automatically get their Job Intent on your approval from their HR who operates

    in our system through a secured access login on a continuous basis.

    The specifications as well as their selected resources are secured and protected till the

    end. Enough flexibility is given in our model to ensure a client doesn't lose out any including

    the timeframe that they are waiting for. A client may not step out of their office to achieve

    this 100% matched-resource-making exercise. And all these may cost a client as low as 20%

    of the cost-burn otherwise spent on their own exercise of trial-runs!

  • 7/30/2019 Multi User Protocol

    20/64

    Investors

    LAMBENT is Indias only company to have seamelessly integrated education and

    placement end-to-end in partner based web network. LAMBENT focusses on the bottom of

    the pyramid, the Real India, the hugely recession-proof market having the continuous need

    for affordable education and a career growth path and guidance.

    LAMBENT came out with the IPO successfully in February 2009 and is now listed in

    BSE and NSE, India's premier stock exchanges. LAMBENT has consolidated its presence in

    Tamil Nadu as a principal job linked e-learning solution provider through partner driven

    network for the masses growing significantly from 35 odd partner centers just before IPO to

    200 by Aug 2009. The company rolled out EdCampus, EdCademy, and EdCenters with

    EdClass that offer learning, jobs, metrics, and live lectures online and in-campus.

    The LAMBENT strives to provide the next generation education system that matches

    demand-supply in scale and quality, reach and spread, and bridges the Academics-Industry

    divide by technology-led, career integrated learning framework through its last mile

    stretching network.

    The future plans include providing end-to-end school solutions to guide every student

    from K-12 to Careers. Comprehensive industry demand aligned education shall be deployed

    to schools. LAMBENT believes strongly that students at their younger age are in a better

    position to seed with apt careers by way of skill developments with industry orientation

    suiting to their aptitude and the flair for excellence in a particular field.

  • 7/30/2019 Multi User Protocol

    21/64

    SYSTEM ANALYSIS

  • 7/30/2019 Multi User Protocol

    22/64

    CHAPTER 2

    SYSTEM ANALYSIS

    System analysis is a process of gathering the facts concerning the system breaking them

    into elements and relationship between elements. It provides a framework for visualizing the

    organizational and environmental factors that operate on a system. The quality of work

    performed by a machine is usually uniform, neat and more reliable when compared to doing

    the same operations manually.

    2.1EXISTING SYSTEM

    Existing system based on single platform It cannot support multiple platform file system An additional modification is required for the implementing platform. File can corrupted or cannot be implement in various platform while

    implementation.

    May lead to Data Losses.

    2.2PROPOSED SYSTEM

    This project includes integration of protocols in a platform independentenvironment so that a single interface can support protocols like FTP, HTTP,

    SMB and NFS.

    The following points supports our idea:-

    Internet Explorer supports protocols like HTTP, FTP but not NFS. To use Samba protocol, Samba client is required in linux.

  • 7/30/2019 Multi User Protocol

    23/64

    SYSTEM SPECIFICATION

  • 7/30/2019 Multi User Protocol

    24/64

    CHAPTER 3

    SYSTEM SPECIFICATION

    3.1 HARDWARE SPECIFICATION

    Processor : Pentium IV

    RAM : 128 MB

    Hard disk : 20 GB

    FDD : 1.44MB

    Monitor : 14 inch

    Mouse : 3 Button scroll

    CD Drive : 52 X

    Keyboard : 108 keys

    3.2SOFTWARE SPECIFICATION

    Operating System : Windows 2000/xp/2007

    Languages : VB.NET 2008

    Backend : SQL SERVER

  • 7/30/2019 Multi User Protocol

    25/64

    3.3 SOFTWARE DESCTIPTION

    .NET Framework

    Now that you are familiar with the major goals of the .NET Framework, let's briefly

    examine its architecture. As you can see in Figure 3.2, the .NET Framework sits on top of the

    operating system, which can be a few different flavors of Windows and consists of a number

    of components. . NET is essentially a system application that runs on Windows.

    Fig: 3.1.1 .NET Framework

    Conceptually, the CLR and the JVM are similar in that they are both runtime infrastructures

    that abstract the underlying platform differences. However, while the JVM officially supports

    only the Java language, the CLR supports any language that can be represented in

    itsCommon Intermediate Language (CIL). The JVM executes byte code, so it can, in

    principle, support many languages, too. Unlike Java's byte code, though, CIL is never

    interpreted. Another conceptual difference between the two infrastructures is that Java code

    runs on any platform with a JVM, whereas .NET code runs only on platforms that support the

    CLR.

    The Common Language Runtime

  • 7/30/2019 Multi User Protocol

    26/64

    At the heart of the .NET Framework is the common language runtime. The common

    language runtime is responsible for providing the execution environment that code written in

    a .NET language runs under. The common language runtime can be compared to the Visual

    Basic 6 runtime, except that the common language runtime is designed to handle all .NET

    languages, not just one, as the Visual Basic 6 runtime did for Visual Basic 6. The following

    list describes some of the benefits the common language runtime gives you:

    Automatic memory management Cross-language debugging Cross-language exception handling Full support for component versioning Access to legacy COM components XCOPY deployment Robust security model

    You might expect all those features, but this has never been possible using Microsoft

    development tools. Figure 4.1.2 shows where the common language runtime fits into the

    .NET Framework.

    Fig: 3.1.2 The common language runtime.

  • 7/30/2019 Multi User Protocol

    27/64

    Code written using a .NET language is known asmanaged code. Code that uses

    anything but the common language runtime is known as unmanaged code. The common

    language runtime provides a managed execution environment for .NET code, whereas

    theindividual runtimes of non-.NET languages provide an unmanaged execution

    environment.

    Inside the Common Language Runtime

    The common language runtime enables code running in its execution environment to have

    features such as security, versioning, memory management and exception handling because

    of the way .NET code actually executes. When you compiled Visual Basic 6 forms

    applications, you had the ability to compile down to native node or p-code.

    Fig: 3.1.3 Visual Basic 6 compiler options dialog.

    When you compile your applications in .NET, you aren't creating anything in native

    code. When you compile in .NET, you're converting your codeno matter what .NET

    language you're usinginto an assembly made up of an intermediate language called

    Microsoft Intermediate Language.

    The file format for the IL is known as PE (portable executable) format, which is a standard

    format for processor-specific execution.

  • 7/30/2019 Multi User Protocol

    28/64

    When a user or another component executes your code, a process occur called just-in-

    time (JIT) compilation, and it's at this point that the IL is converted into the specific machine

    language of the processor it's executing on. This makes it very easy to port a .NET

    application to any type of operating system on any type of processor because the IL is simply

    waiting to be consumed by a JIT compiler.

    When the IL code is JITted into machine-specific language, it does so on an as-needed

    basis. If your assembly is 10MB and the user is only using a fraction of that 10MB, only the

    required IL and its dependencies are compiled to machine language. This makes for a very

    efficient execution process. But during this execution, how does the common language

    runtime make sure that the IL is correct? Because the compiler for each language creates its

    own IL, there must be a process that makes sure what's compiling won't corrupt the system.

    The process that validates the IL is known asverification. Figure 4.1.4 demonstrates the

    process the IL goes through before the code actually executes.

    Fig: 3.1.4 The JIT process and verification

    When code is JIT compiled, the common language runtime checks to make sure that the

    IL is correct. The rules that the common language runtime uses for verification are set forth

    in the Common Language Specification (CLS) and the Common Type System (CTS).

  • 7/30/2019 Multi User Protocol

    29/64

    The .NET Framework Class Library

    The second most important piece of the .NET Framework is the .NET Framework class

    library (FCL). As you've seen, the common language runtime handles the dirty work of

    actually running the code you write. But to write the code, you need a foundation of available

    classes to access the resources of the operating system, database server, or file server. The

    FCL is made up of a hierarchy of namespaces that expose classes, structures, interfaces,

    enumerations, and delegates that give you access to these resources.

    The Structure of a .NET Application

    To understand how the common language runtime manages code execution, you must

    examine the structure of a .NET application. The primary unit of a .NET application is the

    assembly. An assembly is a self-describing collection of code, resources, and metadata. The

    assembly manifest contains information about what is contained within the assembly.

    The assembly manifest provides:

    Identity information, such as the assemblys name and version number A list of all types exposed by the assembly A list of other assemblies required by the assembly A list of code access security instructions, including permissions required by the

    assembly and permissions to be denied the assembly

    Each assembly has one and only one assembly manifest, and it contains all the

    description information for the assembly. However, the assembly manifest can be contained

    in its own file or within one of the assemblys modules.

    Compilation and Execution of a .NET Application

    When you compile a .NET application, it is not compiled to binary machine code;

    rather, it is converted to IL. This is the form that your deployed application takesone or

    more assemblies consisting of executable files and DLL files in IL form. At least one of these

    assemblies will contain an executable file that has been designated as the entry point for the

    application.

  • 7/30/2019 Multi User Protocol

    30/64

    When execution of your program begins, the first assembly is loaded into memory. At

    this point, the common language runtime examines the assembly manifest and determines the

    requirements to run the program. It examines security permissions requested by the assembly

    and compares them with the systems security policy. If the systems security policy does not

    allow the requested permissions, the application will not run. If the application passes the

    systems security policy, the common language runtime executes the code. It creates a

    process for the application to run in and begins application execution.

    The .NET Framework base class library contains the base classes that provide many of

    the services and objects you need when writing your applications. The class library is

    organized into namespaces. A namespace is a logical grouping of types that perform related

    functions. Namespaces are logical groupings of related classes. The namespaces in the .NET

    base class library are organized hierarchically. The root of the .NET Framework is the

    System namespace. Other namespaces can be accessed with the period operator. A typical

    namespace construction appears as follows:

    System

    System.Data

    System.Data.SQLClient

    The first example refers to the System namespace. The second refers to the System.Data

    namespace. The third example refers to the System.Data.SQLClient namespace. Table 1.1

    introduces some of the more commonly used .NET base class namespaces.

    Introduction to Object-Oriented Programming

    Programming in the .NET Framework environment is done with objects. Objects are

    programmatic constructs that represent packages of related data and functionality. Objects are

    self-contained and expose specific functionality to the rest of the application environment

    without detailing the inner workings of the object itself. Objects are created from a template

    called a class. The .NET base class library provides a set of classes from which you can

    create objects in your applications. You also can use the MicrosoftVisual Studio

    programming environment to create your own classes. This lesson introduces you to the

    concepts associated with object-oriented programming.

  • 7/30/2019 Multi User Protocol

    31/64

    Objects, Members, and Abstraction

    An object is a programmatic construct that represents something. In the real world,

    objects are cars, bicycles, laptop computers, and so on. Each of these items exposes specific

    functionality and has specific properties. In your application, an object might be a form, a

    control such as a button, a database connection, or any of a number of other constructs. Each

    object is a complete functional unit, and contains all of the data and exposes all of the

    functionality required to fulfill its purpose. The ability of programmatic objects to represent

    real-world objects is called abstraction.

    Classes Are Templates for Objects

    Classes were discussed in Chapter 1 and represent user-defined reference types.

    Classes can be thought of as blueprints for objects: they define all of the members of an

    object, define the behavior of an object, and set initial values for data when appropriate.

    When a class is instantiated, an in-memory instance of that class is created. This instance is

    called an object. To review, a class is instantiated using the New (new) keyword as follows:

    Visual Basic .NET

    ' Declares a variable of the Widget type

    Dim myWidget As Widget

    ' Instantiates a new Widget object and assigns it to the myWidget

    ' variable

    myWidget = New Widget()

    When an instance of a class is created, a copy of the instance data defined by that class

    is created in memory and assigned to the reference variable. Individual instances of a class

    are independent of one another and represent separate programmatic constructs.

    There is generally no limit to how many copies of a single class can be instantiated at

    any time. To use a real-world analogy, if a car is an object, the plans for the car are the class.

    The plans can be used to make any number of cars, and changes to a single car do not, for the

    most part, affect any other cars.

    Objects and Members

  • 7/30/2019 Multi User Protocol

    32/64

    Objects are composed of members. Members are properties, fields, methods, and events,

    and they represent the data and functionality that comprise the object. Fields and properties

    represent data members of an object. Methods are actions the object can perform, and events

    are notifications an object receives from or sends to other objects when activity happens in

    the application.

    Object Models

    Simple objects might consist of only a few properties, methods, and perhaps an event

    or two. More complex objects might require numerous properties and methods and possibly

    even subordinate objects. Objects can contain and expose other objects as members.

    Similarly, every instance of the Form class contains and exposes a Controls collection

    that comprises all of the controls contained by the form. The object model defines the

    hierarchy of contained objects that form the structure of an object.

    Encapsulation

    Encapsulation is the concept that implementation of an object is independent of its

    interface. Put another way, an application interacts with an object through its interface, which

    consists of its public properties and methods. As long as this interface remains constant, the

    application can continue to interact with the component, even if implementation of the

    interface was completely rewritten between versions.

    Polymorphism

    Polymorphism is the ability of different classes to provide different implementations

    of the same public interfaces. In other words, polymorphism allows methods and properties

    of an object to be called without regard for the particular implementation of those members.

    There are two principal ways through which polymorphism can be provided: interface

    polymorphism and inheritance polymorphism.

    Interface Polymorphism

    An interface is a contract for behavior. Essentially, it defines the members a class

    should implement, but states nothing at all about the details of that implementation. An object

  • 7/30/2019 Multi User Protocol

    33/64

    can implement many different interfaces, and many diverse classes can implement the same

    interface. All objects implementing the same interface are capable of interacting with other

    objects through that interface.

    Inheritance Polymorphism

    Inheritance allows you to incorporate the functionality of a previously defined class

    into a new class and implement different members as needed. A class that inherits another

    class is said to derive from that class, or to inherit from that class. A class can directly inherit

    from only one class, which is called the base class. The new class has the same members as

    the base class, and additional members can be added as needed. Additionally, the

    implementation of base members can be changed in the new class by overriding the base

    class implementation. Inherited classes retain all the characteristics of the base class and can

    interact with other objects as though they were instances of the base class.

    Microsoft Visual Basic.Net

    With its release for the .NET platform, the Visual Basic language has undergone

    dramatic changes.

    For example:

    1. The language itself is now fully object-oriented.

    2. Applications and components written in Visual Basic .NET have full access to the .NET

    Framework, an extensive class library that provides system and application services.

    3. All applications developed using Visual Basic .NET run within a managed runtime

    environment, the .NET common language runtime.

    MICROSOFT OFFICE ACCESS

    The previously known as Microsoft Access, is a DBMS that combines the relationalwith a and software-development tools. It is a member of the suite of applications, included

  • 7/30/2019 Multi User Protocol

    34/64

    in the Professional and higher editions or sold separately. On May 12 2010, the current

    version of Microsoft Access 2010 was released by Microsoft in Office 2010; Microsoft

    Office Access 2007 was the prior version.

    MS Access stores data in its own format based on the Access Jet Database Engine. It

    can also import or link directly to stored in other applications and databases.

    and can use Microsoft Access to develop, and " can use it to build software applications.

    Like other, Access is supported by, an programming language that can reference a variety of

    objects including DAO (Data Access Objects), Data Objects, and many other ActiveX

    components. Visual objects used in forms and reports expose their methods and properties in

    the VBA programming environment, and VBA code modules may declare and call Windowsfunctions.

    1992: Microsoft released Access version 1.0 on 13 November 1992, and an Access 1.1

    release in May 1993 to improve compatibility with other Microsoft products and to include

    the Access Basic programming language. 1993: Microsoft specified the minimum hardware

    requirements for Access v2.0 as: Microsoft Windows v3.1 with 4 MB of required, 6 MB

    RAM recommended; 8 MB of available space required, 14 MB hard disk space

    recommended. The product shipped on seven 1.44 MB diskettes. The manual shows a 1993

    copyright date.Originally, the software worked well with relatively small databases but

    testing showed that some circumstances caused. For example, file sizes over 10 MB proved

    problematic (note that most hard disks held less than 500 MB at the time this was in wide

    use), and the Getting Started manual warns about a number of circumstances where obsolete

    or incorrect configurations can cause. With the phasing out of Windows 95, 98 and ME,

    improved network reliability, and Microsoft having released 8 for the Jet, the reliability of

    Access databases has improvedand it supports both more data and a larger number of users.

    With Office 95, Microsoft Access 7.0 (a.k.a "Access 95") became part of the Microsoft

    Office Professional Suite, joining Microsoft Excel, Word, and PowerPoint and transitioning

    from Access Basic to Visual Basic for Applications (VBA). Since then, Microsoft has

    released new versions of Microsoft Access with each release of Microsoft Office. This

    includes Access 97 (version 8.0), Access 2000 (version 9.0), Access 2002 (version 10.0),

    Access 2003 (version 11.5), Access 2007 (version 12.0), and Access 2010 (version

    14.0).Versions 3.0 and 3.5 of database engine (used by Access 7.0 and the later-released

  • 7/30/2019 Multi User Protocol

    35/64

    Access 97 respectively) had a critical issue which made these versions of Access unusable on

    a computer with more than 1 GB of memory. While Microsoft fixed this problem for Jet

    3.5/Access 97 post-release, it never fixed the issue with Jet 3.0/Access 95.

    The native Access database format (the Jet MDB Database) has also evolved over the years.

    Formats include Access 1.0, 1.1, 2.0, 7.0, 97, 2000, 2002, 2007, and 2010. The most

    significant transition was from the Access 97 to the Access 2000 format; which is not with

    earlier versions of Access. As of 2011 all newer versions of Access support the Access 2000

    format. New features were added to the Access 2002 format which can be used by Access

    2002, 2003, 2007, and 2010.MS Access 2007 introduced a new database format:. ACCDB

    supports complex such as multivalue and attachment fields. These new field types are

    essentially recordsets in fields and allow the storage of multiple values in one field. With

    Access 2010, a new version of the ACCDB format supports hosting on a SharePoint 2010

    server for exposure to the web.Prior to the introduction of Access, and Fox dominated the

    desktop database market. Microsoft Access was the first mass-market database program for

    Windows. With Microsoft's purchase of FoxPro in 1992 and the incorporation of Fox's

    Rushmore routines into Access, Microsoft Access quickly became the dominant database for

    Windows - effectively eliminating the competition which failed to transition from the world.

    Access's initial codename was Cirrus; the forms engine was called Ruby. This was before

    saw the prototypes and decided that the language component should be co-developed as a

    separate expandable application, a project called Thunder. The two projects were developed

    separately as the underlying forms engines were incompatible with each other; however,

    these were merged together again after. Access was also the name of a communications

    program from Microsoft, meant to compete with and other programs. This proved a failure

    and was dropped.

    MS-SQL SERVER

    MS SQL Server is a powerful database management system and the user can create

    application that require little or no programming. It supports GUI features and an entire

    programming language, Visual Studio Application which can be used to develop richer and

    more developed application.

    There are quite a few reasons, the first being that SQL is a feature rich program

    that can handle any database related task you have. You can create places to store your data

  • 7/30/2019 Multi User Protocol

    36/64

    build tools that make it easy to read and modify your database contents, and ask questions of

    your data. SQL is a relational database, a database that stores information about related

    objects. In MS SQL that database means a collection of tables that hold data. It collectively

    stores all the other related objects such as queries, forms and reports that are used to

    implement function effectively.

    The MS SQL database can act as a back end database for .NET as a front end, MS

    SQL supports the user with its powerful database management functions. A beginner can

    create his/her own database very simply by some mouse clicks. Another good reason to use

    SQL as backend tool is that it is a component of the overwhelmingly popular Microsoft office

    software suite.

    Internal Integration

    The SQL Server 2000 database engine includes integrated XML support. It also the

    scalability, availability and security features required to operate as the data storage component

    of the largest web sites. The SQL Server 2000 programming models is integrated with the

    windows DNA architecture for developing web application, and SQL Server support feature

    such as English Query and Microsoft Search Service to incorporate user friendly queries and

    powerful search capabilities in web application.

    Scalability and Availability

    The same database engine can be used across platform ranging from laptop

    computing running Microsoft Windows 98 through large, multiprocessors servers running

    Microsoft Windows 2000 Data Center Edition.

  • 7/30/2019 Multi User Protocol

    37/64

    SQL Server 2000 Enterprise Edition support feature such as federated servers,

    indexed views, and large memory support that allow it to scale to the performance levels

    required by the largest Web sites.

    FEATURES

    Created by Microsoft and Sybase in the 80s. Is SQL Compliant - Uses ANSI SQL Supports SQL92 standards - Uses T-SQL Stores data in a central location and delivers it to clients on request New Server Architecture Graphic Administration Tools Maintains ANSI standards and 6.x Compatibility Data integrity means reliability and accuracy of data. Integrity rules keep data consistent. Supports Client/Server model. Request response dialog.

    workload is split between the client and the server

  • 7/30/2019 Multi User Protocol

    38/64

    SOFTWARE ARCHITECTURE

  • 7/30/2019 Multi User Protocol

    39/64

    CHAPTER 4

    4.1SOFTWARE ARCHITCTURE

    MODULE

    This project contains 4 modules. They are

    Protocol Implementation File Handler Browser with platform independent Web Crawling

    4.2 MODULE DESCRIPTION

    Protocol implementation

    This module is to have a dynamic link library of protocol which would beselected according to the page and platform

    File Handler

    This module will check the pocket to identify from which platform and createdin which language in order to instruct to Browser.

    Browser with Platform independent

    Thus by the support of above modules it provide independent browsingenvironment for user.

    Web crawling

    This is used to make the tool to interact with internet to support browsing ,mailing and any activities through internet.

  • 7/30/2019 Multi User Protocol

    40/64

    SYSTEM DESIGN

  • 7/30/2019 Multi User Protocol

    41/64

    CHAPTER 5

    SYSTEM DESIGN

    5.1 DATA FLOW DIAGRAM

  • 7/30/2019 Multi User Protocol

    42/64

    LEVEL1

    5.2 DATA BASE DESIGN

    BLACK TABLE

    S.No Field Name Data Type Description

    1 list Text List

    2 ipli Text

  • 7/30/2019 Multi User Protocol

    43/64

    HISTORY TABLE

    S.No Field Name Data Type Descriptions

    1 Sino Number S.NO

    2 Site Text site

    3 Date Number Date4 Time Number Time

    IPL

    S.No Field Name Data Type Description

    1 Internet Protocol Text

    2 Restricted Plats Text

    3 date Text date

    FILE HISTORY TABLE

    S.No Field Name Data Type Description

    1 Time Text History

    2 Date Text Date

    3 Resource Text

  • 7/30/2019 Multi User Protocol

    44/64

    SYSTEM TESTING

  • 7/30/2019 Multi User Protocol

    45/64

    CHAPTER 6

    SYSTEM TESTING

    6.1 TESTING

    INTRODUCTION:

    After finishing the development of any computer based application, the next

    complicated time consuming process is testing. During the time of testing only the

    development company knows that, how far the user requirements have been met. The testing

    methods applied to our project are as follows.

    Unit Testing Integration Testing Validation Testing Output Testing Acceptance Testing

    TESTING METHODOLOGY

    UNIT TESTING

    Thus it was an networking tool , there are minimal uses of field and values, It was

    used in browser. Browser has not provide flexibility in runtime input. In unit testing each

    module is tested individually. It focuses the verification efforts on the smallest unit of

    software in the module. This is known as module testing.

    In the project all the modules are tested separately. For our project testing is

    performed at programming stage itself. In this testing each module project is found to work

    satisfactorily with regard to the expected output from the module. There are some validations

    for fields. The unit testing is performed now and then whenever a patch is delivered for each

    module. This makes our project standard. Unit testing comprises the set of tests performed

    by an individual programmer

    Prior to integration of the unit in to larger system. A program unit is usually small

    enough that the programmer who developed it can test it in a great detail. In unit testing the

    modules are independent of one another are tested, the test data for unit testing should followeach condition and option this testing helps to find out the errors in coding and option.

  • 7/30/2019 Multi User Protocol

    46/64

    INTEGRATION TESTING

    Integration testing is the phase of software testing in which individual software

    modules are combined and tested as a group. In this project the parts of a module are tested

    first and then it will test some of its parts, integration testing is done successfully. As

    browser it has various sub forms and feature which are checked as properly interconnected.

    VALIDATION TESTING

    As like unit there are minimum field in work to be checked and validated.It begins

    after the integration testing is successfully assembled. Validation succeeds when the software

    functions in a manner that can be reasonably accepted by the client. In this project, the

    majority of the validation is done during the data entry operation where there is a maximum

    possibility of entering wrong data. Other validation will be performed in all process where

    correct details and data should be entered to get the required results.

    OUTPUT TESTING

    The form has been run trough according to software description. It was successful in

    running mode and perform as per user description. After performing the validation testing,

    the next step is output testing of the proposed system since no application would be termed as

    useful until it produces the required output in the specified format.

  • 7/30/2019 Multi User Protocol

    47/64

    SYSTEM IMPLEMENTATION

  • 7/30/2019 Multi User Protocol

    48/64

    CHAPTER 7

    SYSTEM IMPLEMENTATION

    Implementation

    Implementation is the stage in the project where the theoretical design of the

    project is turned into a working system. It is a stage where the operation of the system ismonitored to ensure that it continues to work effectively. Education and training of the users

    are also essential to ensure smooth functioning of the system.

    Multi protocol browser is tested and implement as multi platform browser , even it can work

    across various platform and file system, On before implementing it through as common tool

    each user must be knowledge with what is platform , file system and platform independent

    concept. It is design as realtime and common usage software must have real time feedback

    must be keenly monitored and changed to provide better solution.

  • 7/30/2019 Multi User Protocol

    49/64

    CONCLUSION

  • 7/30/2019 Multi User Protocol

    50/64

    CHAPTER 8

    8.1 CONCLUSION

    Thus develop a web browser is a software application for retrieving, presenting, and

    traversing information resources on the World Wide Web across multiple platform. An

    information resource is identified by a Uniform Resource Identifier(URI) and may be a web

    page, image, video, or other piece of content it was result in cross platform browser.

    Hyperlinks present in resources enable users easily to navigate their browsers to related

    resources. A web browser can also be defined as an application software or program designed

    to enable users to access, retrieve and view documents and other resources on the Internet.

    http://en.wikipedia.org/wiki/Software_applicationhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Hyperlinkshttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Hyperlinkshttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Software_application
  • 7/30/2019 Multi User Protocol

    51/64

    FUTURE ENHANCEMENT

    Thus this tool successfully compile the software incompatibility so this technic can be

    implement on other commonly used software.

    Other this package can be add us add-on for already existing software.

    This software can be made as mobile application to across Android, Windows and Baba

    os

    It should be ceded to some available software So that currently market running

    software can be made as platform independent.

    Multiple protocols caught and run through various available platform it should be

    made as runtime protocol and file system acceptor.

    Thus this tool successfully compile the software incompatibility so this technic can be

    implement on other commonly used software.

    Other this package can be add us add-on for already existing software.This software

    can be made as mobile application to across Android, Windows and Baba of os.

  • 7/30/2019 Multi User Protocol

    52/64

    BIBLIOGRAPHY

    CHAPTER 9

    BIBLIOGRAPHY

    BOOKS REFERENCE

  • 7/30/2019 Multi User Protocol

    53/64

    STEVE HARRIS AND ROBMACDONALD,WEB DEVELOPMENTWITH VB.NET-APRES

    MATTHEW MACDONALD,MICROSOFT VISUAL BASIC.NETPROGRAMMERS COOKBOOK -TATA McGraw HILL EDITION

    WEBSITE REFERENCE

    WWW.3SCHOOL.COMWWW.HRWORKINDIA.COM

  • 7/30/2019 Multi User Protocol

    54/64

    Appendix

    APPENDIX

    SCREEN SHOTS

  • 7/30/2019 Multi User Protocol

    55/64

    10.1 SCREEN SHORTS

    Figure 10.1.1 load protocol and file system

  • 7/30/2019 Multi User Protocol

    56/64

    Figure 10.1.2 set protocol

  • 7/30/2019 Multi User Protocol

    57/64

    Figure 10.1.3 set file system

  • 7/30/2019 Multi User Protocol

    58/64

    Figure 10.1.4 Browser

  • 7/30/2019 Multi User Protocol

    59/64

    Figure 10.1.6 history of browser

  • 7/30/2019 Multi User Protocol

    60/64

  • 7/30/2019 Multi User Protocol

    61/64

  • 7/30/2019 Multi User Protocol

    62/64

  • 7/30/2019 Multi User Protocol

    63/64

  • 7/30/2019 Multi User Protocol

    64/64