Sei sulla pagina 1di 64

MULTI-PROTOCOL BROWSER

A project Report Submitted to

MOTHER TERESA WOMENS UNIVERSITY KODAIKANAL


in partial fulfillment of the requirements for the award of the Degree of Master of Science in Computer Science Submitted by M.SUBA Reg.no : 113MCS018

Under the Guidance of Dr.(Mrs).S.RASATHIM.C.A, M.Phil.,

DEPARTMENT OF COMPUTER SCIENCE M.V.MGOVT. ARTS COLLEGE FOR WOMEN (Affiliated to Mother Teresa Womens University, Kodaikanal) Dindigul 624001 April 2013

CERTIFICATE
This is to certify that the Project entitled MULTI-PROTOCOL BROWSER is abonafide work done by M.SUBA, Reg No:113MCS018 submitted in partial fulfillment of requirements for the award of the degree Master of Science in Computer Science, M.V.M Govt. Arts College for Women, Dindigul during the academic year 2012-2013 under my supervision.

INTERNAL GUIDE

HEAD OF THE DEPARTMENT

Submitted for the Viva Voce Examination held on

INTERNAL EXAMINER

EXTERNAL E XAMINER

DECLARATION

M.SUBA M.Sc(Computer Science) 113MCS018 M.V.M Govt. Arts College for Women, Dindigul.

Hereby I declare that the project entitled MULTI-PROTOCOL BROWSER submitted to M.V.M Govt. Arts College for Women, Dindigul for the award of Degree of Master of Science in Computer Science, is my original work and that it has not been previously done for the award of any degree, diploma or any other title.

Signature of the Candidate

Place: Date:

ACKNOWLEDGEMENT

I hereby acknowledge my deep sense of gratitude and sincere thanks to Dr.Mrs. C.PadmaLatha M.Sc.,Ph.D., Principal, M.V.M Govt. Arts College for women, Dindigul for have permitted me to undergo the project work.

I am extremely thankful to Dr.Mrs.A.Pethalakshmi M.Sc., M.Phil., Ph.D., the Head, Department of Computer Science, for her encouragement in completing the project successfully.

I sincerely thank my guideDr.Mrs.A.Pethalakshmi M.Sc., M.Phil., Ph.D., the Head, Department of Computer Science,for herinspiring guidance and encouragement to complete the project work in a successful manner. I also express my sincere thanks to my class in-charge Mrs. S.RAJATHI M.C.A., M.Phil., Assistant professor and other staff members of our department for their support and assistance provided to complete the project work . I sincerely thank to our lab programmer Mrs.N.Manimala M.A., M.Phil., I deeply thank to my parents, sister and friends for their encouragement in preparing this work. Above all I thank the almighty for blessings showered all throughout the execution of the project work.

(M.SUBA)

CONTENTS

TABLE OF CONTENTS CHEPTER NO TITLE PAGE NO

1.

INTRODUTION 1.1 About the Project 1.2 About the Organization

2.

SYSTEM ANALYSIS 2.1 Existing System 2.2 Proposed System

3.

SYSTEM SPECIFICATION 3.1 Hardware Specification 3.2 Software Specification 3.3 Software Description

4.

SOFTWARE ARCHITECTURE 4.1 Modules 4.2 Modules Description

5.

SYSTEM DESIGN 4.3 Data Flow Diagram 4.4 DataBase Design

6. 7. 8.

SYSTEM TESTING SYSTEM IMPLEMENTATION CONCLUSION BIBLIOGRAPHY APPENDIX Screen Shots

ABSTRACT

The aim of this project is to implement a integrated application that allows to transfer files between a variety of systems, including Windows ,UNIX and MAC. It includes the samba client, NFS client, ftp client and web browser. It includes integration of protocols in a platform independent environment so that a single interface can support protocols like FTP, HTTP, SMB and NFS. The following points support our idea:o Internet Explorer supports protocols like HTTP, FTP but not NFS. o To use Samba protocol, Samba client is required in linux.

INTRODUCTION

CHAPTER 1 INTRODUCTION
1.1 ABOUT THE PROJECT Now days Many platform corporation has been raised with different empower and enrichment techniques. So people using different platform according to their requirement has raised enormously . So some page developed in various platform run across internet , which may loss some data because of cross platform nature.

The project is implemented in java. The user friendly interface is developed using swing. It contains a web-browser, ftp client, ntfs client and Samba client.

FTP Client: - FTP has had a long evolution over the years. The first proposed file transfer mechanisms in 1971 that were developed for implementation on hosts at M.I.T. (RFC 114). This was the start in the evolution of much friendly FTP protocol. The objectives of FTP are

1) To promote sharing of files (computer programs and/or data) 2) To encourage indirect or implicit (via programs) use of remote computers 3) To shield a user from variations in file storage systems among hosts 4) To transfer data reliably and efficiently.

NFS Client:- The Sun Network File system (NFS) protocol provides transparent remote access to shared files across networks. The NFS protocol is designed to be portable across different machines, operating systems, network architectures, and transport protocols. This portability is achieved through the use of Remote Procedure Call

(RPC).Implementations already exist for a variety of machines, from personal computers to supercomputers. The supporting mount protocol allows the server to hand out remote access privileges to a restricted set of clients. It performs the operating system-specific functions that allow, for example, to attach remote directory trees to some local file system. The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web. The standards development of HTTP was coordinated by the Internet Engineering Task Force (IETF) and the World Wide Web Consortium (W3C), culminating in the publication of a series of Requests for Comments (RFCs), most notably RFC 2616 (June 1999), which defines HTTP/1.1, the version of HTTP in common use. HTTP Browser: The Hypertext Transfer Protocol (HTTP) is an application-level

protocol for distributed, collaborative, hypermedia information systems. It is a generic, stateless, protocol which can be used for many tasks beyond its use for hypertext, such as name servers and distributed object management systems, through extension of its request methods, error codes and headers. A feature of HTTP is the typing and negotiation of data representation, allowing systems to be built independently of the data being transferred.

Samba Client:- The Common Internet File System (CIFS), also known as Server Message Block (SMB), is a network protocol whose most common use is sharing files on a Local Area Network (LAN). The protocol allows a client to manipulate files just as if they were on the local computer. Operations such as read, write, create, delete, and rename are all supported. The only difference being that the files are not on the local computer and are actually on a remote server. The CIFS protocol works by sending

packets from the client to the server. Each packet is typically a basic request of some kind, such as open file, close file, or read file. The server then receives the packet, checks to see if the request is legal, verifies the client has the appropriate file permissions, and finally executes the request and returns a response packet to the client.

Introduction to the Web Browser Interface PROTOCOL The information exchanged between devices on a network or other communications medium is governed by rules or conventions that can be set out in a technical specification called a communication protocol standard. The nature of the communication, the actual data exchanged and any state-dependent behaviors are defined by the specification. In digital computing systems, the rules can be expressed by algorithms and data structures. Expressing the algorithms in a portable programming language, makes the protocol software operating system independent. Operating systems are usually conceived of as consisting of a set of cooperating processes that manipulate a shared store (on the system itself) to communicate with each other. This communication is governed by well-understood protocols. These protocols can be embedded in the process code itself as small additional code fragments. In contrast, communicating systems have to communicate with each other using shared transmission media, because there is no common memory. Transmission is not necessarily reliable and can involve different hardware and operating systems on different systems. To implement a networking protocol, the protocol software modules are interfaced with a framework implemented on the machine's operating system. This framework implements the networking functionality of the operating system. The best known frameworks are the TCP/IP model and the OSI model.

At the time the Internet was developed, layering had proven to be a successful design approach for both compiler and operating system design and, given the similarities between programming languages and communication protocols, layering was applied to the protocols as well. This gave rise to the concept of layered protocols which nowadays forms the basis of protocol design. Systems typically do not use a single protocol to handle a transmission. Instead they use a set of cooperating protocols, sometimes called a protocol family or protocol suite. Some of the best known protocol suites include: IPX/SPX, X.25, AX.25, AppleTalk and TCP/IP. The protocols can be arranged based on functionality in groups, for instance there is a group of transport protocols. The functionalities are mapped onto the layers, each layer solving a distinct class of problems relating to, for instance: application-, transport-, internet- and network interface-functions.To transmit a message, a protocol has to be selected from each layer, so some sort of multiplexing/demultiplexing takes place. The selection of the next protocol is accomplished by extending the message with a protocol selector for each layer.

1.2 ABOUT THE ORGANIZATION

LAMBENT Academic support program to bridge the academics-industry divide


Every career aspiring student wants to study to get a job. LAMBENT focusses to support a student to complete his / her degree so as to get a job. LAMBENT academic support solutions enhance the employability to bridge the ever widening Academics-Industry divide. LAMBENT launched EdCademy, the academic support programme for Engineering, and Management students to provide the much needed support for the student to complete a degree so as to get a job. Under this programme, LAMBENT conducts Promptive Metrics based Learning (PML) methods to enhance the performance of students in their semester exams so that their placement prospects become better as they move to final year campus programmes. EdCademy at the outset offers three engines of support viz., Learning Engine (LE), Assessment Engine (AE), and Placement Engine (PE). EdCademy assures a better students performance rating in their core degree subjects and assessment essentials. This is achieved by continuous assessments that can be forced upon to every student by the concerned HoD by unlimited access to EdCademys Learning Engine (LE). Further, before the semester exam, a student can attempt many model papers of a particular subject which the student feels tough to pass or score high through the Assessment Engine (AE) of EdCademy. Final year students can also access for unlimited job positions through Placement Engine (PE) of EdCademy by which virtually an e-campus interview can be organized which could land a student in a job offer much before he / she completes the course. EdCademy is planned for other Universities in other states as well. EdCademy is well supported by EdClass, a product that makes a student to meet a tutor in a virtual class network (VCN)to clarify doubts and also to get quick lectures on important and difficult topics. There will be both live and pre-recorded sessions in EdClass. EdCademy with EdClass is sure to simplify the process of passing exams and getting degree with better grades. Students with EdCademy of LAMBENT can look for right placements with clients already getting the information and screening them for their performance which are given as footprints by the LAMPS system seamlessly in web network.

About LAMBENT
LAMBENT is World's first 4th generation education company that uses technology to efficiently synchronize manpower demand and supply in number and skills right from development to deployment. The size of India's addressable market, favorable demography, growing acceptance of technology-aided learning, and LAMBENT innovative Humanware Education And Deployment System (HEADS) coupled with its trademarked content enable rapid growth. Its business model is scalable nationally and internationally. LAMBENT Softsystems Limited is incepted in Mar 2001 as Lambent Softsystems P Ltd., with an objective of providing niche training solutions, customised software solutions, and placement consulting on contract as well as permanent basis to both Corporate and Institutional clients. The company successfully provided staffing solutions to premier clients during 2002 to 2004 viz., TI Group, TVS Group, Office Tiger, KSB Pumps, Infosys Technologies, HCL Technologies, Shasun Chemicals, Hexaware Technologies, Ashok Leyland, Seshasayee Paper & Boards among others. LAMBENT acquired ELMAQ EDUCATION, leading IT Training brand in the South in the year 2007 to move aggressively in Education & Training space. LAMBENT employs e-learning and has patented the education models which seamlessly control the complete learning life-cycle of a student from development to deployment in a web controlled framework. LAMBENT holds copyrighted econtents covering over a dozen domains and verticals. LAMBENT is promoted by Mr. S. Giridharan, as senior technocrat of Indian IT space who is a pioneer in Job oriented education of 90's. He has over 2 decades of experience in Education having been instrumental in the success of SSI and Radiant education brands. Giridharan later led ELMAQ education brand and subsequently sold to Lambent and merged all the businesses under LAMBENT. LAMBENT provides job linked next generation education through Integrated Learning Model (ILM). LAMBENT EdCenters, EdCampuses, and EdCademys are partnerled and in-campus online contact centers which are spread across India and South Asia providing education & placement through ILM.

Offerings

SCHOOLS

PRESCHOOL: Powerful and magnificent channel of 3 D animation videos specially designed for your child. Interactive learning just a click away. A program designed for your child keeping in mind the various levels of aspirations from basic to advanced. Come and explore this unique interactive education platform with your child today. With illustrations in the form of stories, games, quizzes and more..your child will find it engaging and you useful. Enjoy, explore and measure your child's development with interesting and captivating graphics like never before.

PRIMARY: Powerful and magnificent channel of 3 D animation videos specially designed for your child. Interactive learning just a click away. A program designed for your child keeping in mind the various levels of aspirations from basic to advanced. Come and explore this unique interactive education platform with your child today. With illustrations in the form of stories, games, quizzes and more. Your child will find it engaging and you useful. Enjoy, explore and measure your child's development with interesting and captivating graphics like never before.

MIDDLE: The best way to build a Nation is at Foundation The SMART C.A.P program - Learning Concepts.Application and Problem solving. Lays solid foundation for your preparation for Olympaids/NTSE and similar exams.

SECONDARY: LAMBENT is fully cognizant of your problems of getting the expert tutor, wasting more of your productive time in travelling, paying high fees, and still scoring less marks in your relentless pursuit to look for a perfect tuition support for your subjects.Our solution is to connect you to expert tutors live from the comfort of your home at a fraction of the tuition fee that you are paying or will be paying.

HIGHER SECONDARY:

TEST PREP

IITJEE: Our unique program provides the following contents to prepare you adequately for the rigors of the IITJEE exam: i. ii. 81 Exhaustive chapters covering all topics prescribed for IITJEE. 2500+ videos containing lectures by senior professors and top IITians covering everything from the very basic fundamentals and tips, tricks and shortcut methods to help you solve advanced level IIT JEE Problems. iii. Exposure to about 10000+ unique problems spread over the IITJEE syllabus iv. tate-of-the-Art Assessment Engine with an extensive online database of thousands of questions exactly on the level of IITJEE examination to build your speed and accuracy thereby ensuring nothing is left to chance v. 20 hours of access to IITJEE learning module and Assessment Engine.

AIEEE: Our unique program provides the following contents to prepare you adequately for the rigors of the AIEEE exam: vi. 60 chapters spanning all topics in AIEEE across physics, chemistry and mathematics vii. 1400+ videos containing lectures by senior professors covering everything from the very basic fundamentals and tips, tricks and shortcut methods to help you solve advanced level AIEEE Problems. viii. Exposure to about 5000+ unique problems spread over the AIEEE syllabus ix. State-of-the-Art Assessment Engine with an extensive online database of thousands of questions exactly on the level of AIEEE examination to build your speed and accuracy thereby ensuring nothing is left to chance. x.

Get access to AIEEE learning module and Assessment Engine.

OLYMPAID: The Central Board of Secondary Education conducts the National Informatics Olympiad in collaboration with the Indian Association for Research in Computing Science (IARCS), Mumbai, across the country and

abroad. The examination which is held in two stages is open to all the students of classes VIII to XII studying in CBSE schools as well as other Boards in the country. At lampsglow we believe the best way to build a Nation is at Foundation. The SMART C.A.P program - Learning Concepts. Application and Problem solving. The program lays a solid foundation for your childs preparation for Olympaids and similar exams.

NTSE: NCERT awards 1000 Scholarships to the talented students of Class VIII each year through its National Talent Search Scheme and then nurture the talent by way of providing financial assistance in the form of both monthly scholarship and annual book grant. At lampsglow we believe the best way to build a Nation is at Foundation. The SMART C.A.P program - Learning Concepts.Application and Problem solving. The program lays a solid foundation for your childs preparation for NTSE and similar exams.

UNDERGRADUATE/POST GRADUATE

IT SKILLS: LAMBENT brings 7 IT courses that matter most to the studies of an undergraduate or anyone looking to enhance their career at every stage of growth. To access all and read through those 7 star courses viz., Computer Fundamentals, MS-Office, C, C++, Java, Softskills, and Numerical Ability and more.

ENGINEERING STUDY: Taking education to your door steps. For all those students looking at improving and enhancing their academic endeavors LAMBENT offers video lessons that enhance the quality of your revisions and re revisions. Revisions that are the the most crucial part of exam preparation, are just a click away. Take the lessons anytime, anywhere at your convenience.

ENGINEERING PREP: For aspiring Engineers of Anna University and All India Engineering exams can pass your ANNA UNIVERSITY Engineering Semester or Engineering exams easily by scoring high marks. LAMBENT offers unlimited Access to MODEL TEST PAPERS through our online LAMBENT LAMPSGLOW anywhere, anytime to clear your arrears and to look for careers ! "Practice until you perfect - try it and experience the

perfection that you so much wanted. Appear in your exams with greater confidence. Engineering support tests has practice papers just for that."

Partners
A Distributor is appointed for each postal pin code. Distributor is authorized to sell all products displayed under LG through dealer's network. Distributor can enter LG site and create his/her own login under the distributors column at no cost basis which will be exclusively owned by the distributor. The entry Fee for a distributor per pin code is nominal considering the marketing support they would get in their region from us. A Distributor gets the edcredits in his/her login and also in his mobile phone as registered in LG. The distributor then appoints Dealers under his area of operation viz: the pin code for which the distributor has paid. A distributor has the freedom to appoint as many dealers as possible in the said pin code . Upon receiving payment from dealers , a distributor has to transfer part of EdCredits as agreed to the dealer which can done through by transferring the same from distributors login to dealers login. A distributor can sell the stocks to none other than registered and paid up dealers. Payment towards Edcredit transfer paid by dealer to distributor.

Clients Benefits
Industry that benefits out of HEADS model is wide. Both IT and non-IT verticals and domains are addressed. The divide between the academics and industry is ever widening especially after India is projected as a sole source for humanware in Information Technology sector. Institutions focus so much on IT that core industry suffers from lack of qualified and trained resources. LAMBENT as a strategy focuses in generating competent fresher for non-IT domains upto 70% of its business. It is expected that a lot of support would come from the student resources for non-IT positions considering the fact that the core industries pay-packs are better and the student's knowledge levels are low at the moment about non-IT opportunities. Further the HEADS model is strictly automated upto a job offer after a strict training and assessment.

A client company, as industry, is always looking at employable manpower resource as a fresher at volumes. With LAMBENT HEADS model, the client company can breathe easy and plan the project schedules better with pre-determined lead time in a proactive way. The LAMPS portal has its entry point for every such client who can enter their preferences, candidate's background, curriculum essentials with assessment criteria, and commit on a defined job offers. With rupee appreciating, it may sound interesting for companies to look into our onestop-shop solution of providing them with the exact set of their dream resources by taking care of the following:

The exact requirements of fresher and the lead-time before they have to be inducted into your actual project

Entry-level criteria The curriculum of training to be done on them The choice of colleges The choice of academic excellence The likely compensation package vs qualification and training performance The other wish-list in terms of job-fitment straight from the college

Once clients sign-up with us with all those crucial information as your specification, they are put up in their own digital-dashboard of what is going on from inside our automated learning system for their selected chunks of fresher registered through our dealer gateways. Rather their HR is directed through our digital window right from the time of the course enrolment up to the final grading out of the regular ILT sessions with strictly controlled assessments as per their specification What's more, the exactly matched resources to client's specification automatically get their Job Intent on your approval from their HR who operates in our system through a secured access login on a continuous basis. The specifications as well as their selected resources are secured and protected till the end. Enough flexibility is given in our model to ensure a client doesn't lose out any including the timeframe that they are waiting for. A client may not step out of their office to achieve this 100% matched-resource-making exercise. And all these may cost a client as low as 20% of the cost-burn otherwise spent on their own exercise of trial-runs!

Investors
LAMBENT is Indias only company to have seamelessly integrated education and placement end-to-end in partner based web network. LAMBENT focusses on the bottom of the pyramid, the Real India, the hugely recession-proof market having the continuous need for affordable education and a career growth path and guidance. LAMBENT came out with the IPO successfully in February 2009 and is now listed in BSE and NSE, India's premier stock exchanges. LAMBENT has consolidated its presence in Tamil Nadu as a principal job linked e-learning solution provider through partner driven network for the masses growing significantly from 35 odd partner centers just before IPO to 200 by Aug 2009. The company rolled out EdCampus, EdCademy, and EdCenters with EdClass that offer learning, jobs, metrics, and live lectures online and in-campus. The LAMBENT strives to provide the next generation education system that matches demand-supply in scale and quality, reach and spread, and bridges the Academics-Industry divide by technology-led, career integrated learning framework through its last mile stretching network. The future plans include providing end-to-end school solutions to guide every student from K-12 to Careers. Comprehensive industry demand aligned education shall be deployed to schools. LAMBENT believes strongly that students at their younger age are in a better position to seed with apt careers by way of skill developments with industry orientation suiting to their aptitude and the flair for excellence in a particular field.

SYSTEM ANALYSIS

CHAPTER 2 SYSTEM ANALYSIS


System analysis is a process of gathering the facts concerning the system breaking them into elements and relationship between elements. It provides a framework for visualizing the organizational and environmental factors that operate on a system. The quality of work performed by a machine is usually uniform, neat and more reliable when compared to doing the same operations manually.

2.1 EXISTING SYSTEM

Existing system based on single platform It cannot support multiple platform file system An additional modification is required for the implementing platform. File can corrupted or cannot be implement in various platform while implementation. May lead to Data Losses.

2.2 PROPOSED SYSTEM

This project includes integration of protocols in a platform independent environment so that a single interface can support protocols like FTP, HTTP, SMB and NFS.

The following points supports our idea: Internet Explorer supports protocols like HTTP, FTP but not NFS. To use Samba protocol, Samba client is required in linux.

SYSTEM SPECIFICATION

CHAPTER 3 SYSTEM SPECIFICATION


3.1 HARDWARE SPECIFICATION Processor RAM Hard disk FDD Monitor Mouse CD Drive Keyboard : : : : : : : : Pentium IV 128 MB 20 GB 1.44MB 14 inch 3 Button scroll 52 X 108 keys

3.2SOFTWARE SPECIFICATION Operating System Languages Backend : : : Windows 2000/xp/2007 VB.NET 2008 SQL SERVER

3.3 SOFTWARE DESCTIPTION .NET Framework Now that you are familiar with the major goals of the .NET Framework, let's briefly examine its architecture. As you can see in Figure 3.2, the .NET Framework sits on top of the operating system, which can be a few different flavors of Windows and consists of a number of components. . NET is essentially a system application that runs on Windows.

Fig: 3.1.1 .NET Framework Conceptually, the CLR and the JVM are similar in that they are both runtime infrastructures that abstract the underlying platform differences. However, while the JVM officially supports only the Java language, the CLR supports any language that can be represented in itsCommon Intermediate Language (CIL). The JVM executes byte code, so it can, in principle, support many languages, too. Unlike Java's byte code, though, CIL is never interpreted. Another conceptual difference between the two infrastructures is that Java code runs on any platform with a JVM, whereas .NET code runs only on platforms that support the CLR. The Common Language Runtime

At the heart of the .NET Framework is the common language runtime. The common language runtime is responsible for providing the execution environment that code written in a .NET language runs under. The common language runtime can be compared to the Visual Basic 6 runtime, except that the common language runtime is designed to handle all .NET languages, not just one, as the Visual Basic 6 runtime did for Visual Basic 6. The following list describes some of the benefits the common language runtime gives you:

Automatic memory management Cross-language debugging Cross-language exception handling Full support for component versioning Access to legacy COM components XCOPY deployment Robust security model You might expect all those features, but this has never been possible using Microsoft

development tools. Figure 4.1.2 shows where the common language runtime fits into the .NET Framework.

Fig: 3.1.2 The common language runtime.

Code written using a .NET language is known asmanaged code. Code that uses anything but the common language runtime is known as unmanaged code. The common language runtime provides a managed execution environment for .NET code, whereas theindividual runtimes of non-.NET languages provide an unmanaged execution environment. Inside the Common Language Runtime The common language runtime enables code running in its execution environment to have features such as security, versioning, memory management and exception handling because of the way .NET code actually executes. When you compiled Visual Basic 6 forms applications, you had the ability to compile down to native node or p-code.

Fig: 3.1.3 Visual Basic 6 compiler options dialog.

When you compile your applications in .NET, you aren't creating anything in native code. When you compile in .NET, you're converting your codeno matter what .NET language you're usinginto an assembly made up of an intermediate language called Microsoft Intermediate Language. The file format for the IL is known as PE (portable executable) format, which is a standard format for processor-specific execution.

When a user or another component executes your code, a process occur called just-intime (JIT) compilation, and it's at this point that the IL is converted into the specific machine language of the processor it's executing on. This makes it very easy to port a .NET application to any type of operating system on any type of processor because the IL is simply waiting to be consumed by a JIT compiler. When the IL code is JITted into machine-specific language, it does so on an as-needed basis. If your assembly is 10MB and the user is only using a fraction of that 10MB, only the required IL and its dependencies are compiled to machine language. This makes for a very efficient execution process. But during this execution, how does the common language runtime make sure that the IL is correct? Because the compiler for each language creates its own IL, there must be a process that makes sure what's compiling won't corrupt the system. The process that validates the IL is known asverification. Figure 4.1.4 demonstrates the process the IL goes through before the code actually executes.

Fig: 3.1.4 The JIT process and verification When code is JIT compiled, the common language runtime checks to make sure that the IL is correct. The rules that the common language runtime uses for verification are set forth in the Common Language Specification (CLS) and the Common Type System (CTS).

The .NET Framework Class Library The second most important piece of the .NET Framework is the .NET Framework class library (FCL). As you've seen, the common language runtime handles the dirty work of actually running the code you write. But to write the code, you need a foundation of available classes to access the resources of the operating system, database server, or file server. The FCL is made up of a hierarchy of namespaces that expose classes, structures, interfaces, enumerations, and delegates that give you access to these resources. The Structure of a .NET Application To understand how the common language runtime manages code execution, you must examine the structure of a .NET application. The primary unit of a .NET application is the assembly. An assembly is a self-describing collection of code, resources, and metadata. The assembly manifest contains information about what is contained within the assembly. The assembly manifest provides:

Identity information, such as the assemblys name and version number A list of all types exposed by the assembly A list of other assemblies required by the assembly A list of code access security instructions, including permissions required by the assembly and permissions to be denied the assembly Each assembly has one and only one assembly manifest, and it contains all the

description information for the assembly. However, the assembly manifest can be contained in its own file or within one of the assemblys modules. Compilation and Execution of a .NET Application When you compile a .NET application, it is not compiled to binary machine code; rather, it is converted to IL. This is the form that your deployed application takesone or more assemblies consisting of executable files and DLL files in IL form. At least one of these assemblies will contain an executable file that has been designated as the entry point for the application.

When execution of your program begins, the first assembly is loaded into memory. At this point, the common language runtime examines the assembly manifest and determines the requirements to run the program. It examines security permissions requested by the assembly and compares them with the systems security policy. If the systems security policy does not allow the requested permissions, the application will not run. If the application passes the systems security policy, the common language runtime executes the code. It creates a process for the application to run in and begins application execution. The .NET Framework base class library contains the base classes that provide many of the services and objects you need when writing your applications. The class library is organized into namespaces. A namespace is a logical grouping of types that perform related functions. Namespaces are logical groupings of related classes. The namespaces in the .NET base class library are organized hierarchically. The root of the .NET Framework is the System namespace. Other namespaces can be accessed with the period operator. A typical namespace construction appears as follows: System System.Data System.Data.SQLClient The first example refers to the System namespace. The second refers to the System.Data namespace. The third example refers to the System.Data.SQLClient namespace. Table 1.1 introduces some of the more commonly used .NET base class namespaces. Introduction to Object-Oriented Programming Programming in the .NET Framework environment is done with objects. Objects are programmatic constructs that represent packages of related data and functionality. Objects are self-contained and expose specific functionality to the rest of the application environment without detailing the inner workings of the object itself. Objects are created from a template called a class. The .NET base class library provides a set of classes from which you can create objects in your applications. You also can use the MicrosoftVisual Studio programming environment to create your own classes. This lesson introduces you to the concepts associated with object-oriented programming.

Objects, Members, and Abstraction An object is a programmatic construct that represents something. In the real world, objects are cars, bicycles, laptop computers, and so on. Each of these items exposes specific functionality and has specific properties. In your application, an object might be a form, a control such as a button, a database connection, or any of a number of other constructs. Each object is a complete functional unit, and contains all of the data and exposes all of the functionality required to fulfill its purpose. The ability of programmatic objects to represent real-world objects is called abstraction. Classes Are Templates for Objects Classes were discussed in Chapter 1 and represent user-defined reference types. Classes can be thought of as blueprints for objects: they define all of the members of an object, define the behavior of an object, and set initial values for data when appropriate. When a class is instantiated, an in-memory instance of that class is created. This instance is called an object. To review, a class is instantiated using the New (new) keyword as follows: Visual Basic .NET ' Declares a variable of the Widget type Dim myWidget As Widget ' Instantiates a new Widget object and assigns it to the myWidget ' variable myWidget = New Widget() When an instance of a class is created, a copy of the instance data defined by that class is created in memory and assigned to the reference variable. Individual instances of a class are independent of one another and represent separate programmatic constructs. There is generally no limit to how many copies of a single class can be instantiated at any time. To use a real-world analogy, if a car is an object, the plans for the car are the class. The plans can be used to make any number of cars, and changes to a single car do not, for the most part, affect any other cars. Objects and Members

Objects are composed of members. Members are properties, fields, methods, and events, and they represent the data and functionality that comprise the object. Fields and properties represent data members of an object. Methods are actions the object can perform, and events are notifications an object receives from or sends to other objects when activity happens in the application.

Object Models Simple objects might consist of only a few properties, methods, and perhaps an event or two. More complex objects might require numerous properties and methods and possibly even subordinate objects. Objects can contain and expose other objects as members. Similarly, every instance of the Form class contains and exposes a Controls collection that comprises all of the controls contained by the form. The object model defines the hierarchy of contained objects that form the structure of an object. Encapsulation Encapsulation is the concept that implementation of an object is independent of its interface. Put another way, an application interacts with an object through its interface, which consists of its public properties and methods. As long as this interface remains constant, the application can continue to interact with the component, even if implementation of the interface was completely rewritten between versions. Polymorphism Polymorphism is the ability of different classes to provide different implementations of the same public interfaces. In other words, polymorphism allows methods and properties of an object to be called without regard for the particular implementation of those members. There are two principal ways through which polymorphism can be provided: interface polymorphism and inheritance polymorphism. Interface Polymorphism An interface is a contract for behavior. Essentially, it defines the members a class should implement, but states nothing at all about the details of that implementation. An object

can implement many different interfaces, and many diverse classes can implement the same interface. All objects implementing the same interface are capable of interacting with other objects through that interface. Inheritance Polymorphism Inheritance allows you to incorporate the functionality of a previously defined class into a new class and implement different members as needed. A class that inherits another class is said to derive from that class, or to inherit from that class. A class can directly inherit from only one class, which is called the base class. The new class has the same members as the base class, and additional members can be added as needed. Additionally, the implementation of base members can be changed in the new class by overriding the base class implementation. Inherited classes retain all the characteristics of the base class and can interact with other objects as though they were instances of the base class. Microsoft Visual Basic.Net With its release for the .NET platform, the Visual Basic language has undergone dramatic changes. For example: 1. The language itself is now fully object-oriented. 2. Applications and components written in Visual Basic .NET have full access to the .NET Framework, an extensive class library that provides system and application services. 3. All applications developed using Visual Basic .NET run within a managed runtime environment, the .NET common language runtime. MICROSOFT OFFICE ACCESS

The previously known as Microsoft Access, is a DBMS that combines the relational with a and software-development tools. It is a member of the suite of applications, included

in the Professional and higher editions or sold separately. On May 12 2010, the current version of Microsoft Access 2010 was released by Microsoft in Office 2010; Microsoft Office Access 2007 was the prior version. MS Access stores data in its own format based on the Access Jet Database Engine. It can also import or link directly to stored in other applications and databases. and can use Microsoft Access to develop, and " can use it to build software applications. Like other, Access is supported by, an programming language that can reference a variety of objects including DAO (Data Access Objects), Data Objects, and many other ActiveX components. Visual objects used in forms and reports expose their methods and properties in the VBA programming environment, and VBA code modules may declare and call Windows functions. 1992: Microsoft released Access version 1.0 on 13 November 1992, and an Access 1.1 release in May 1993 to improve compatibility with other Microsoft products and to include the Access Basic programming language. 1993: Microsoft specified the minimum hardware requirements for Access v2.0 as: Microsoft Windows v3.1 with 4 MB of required, 6 MB RAM recommended; 8 MB of available space required, 14 MB hard disk space

recommended. The product shipped on seven 1.44 MB diskettes. The manual shows a 1993 copyright date.Originally, the software worked well with relatively small databases but testing showed that some circumstances caused. For example, file sizes over 10 MB proved problematic (note that most hard disks held less than 500 MB at the time this was in wide use), and the Getting Started manual warns about a number of circumstances where obsolete or incorrect configurations can cause. With the phasing out of Windows 95, 98 and ME, improved network reliability, and Microsoft having released 8 for the Jet, the reliability of Access databases has improvedand it supports both more data and a larger number of users. With Office 95, Microsoft Access 7.0 (a.k.a "Access 95") became part of the Microsoft Office Professional Suite, joining Microsoft Excel, Word, and PowerPoint and transitioning from Access Basic to Visual Basic for Applications (VBA). Since then, Microsoft has released new versions of Microsoft Access with each release of Microsoft Office. This includes Access 97 (version 8.0), Access 2000 (version 9.0), Access 2002 (version 10.0), Access 2003 (version 11.5), Access 2007 (version 12.0), and Access 2010 (version 14.0).Versions 3.0 and 3.5 of database engine (used by Access 7.0 and the later-released

Access 97 respectively) had a critical issue which made these versions of Access unusable on a computer with more than 1 GB of memory. While Microsoft fixed this problem for Jet 3.5/Access 97 post-release, it never fixed the issue with Jet 3.0/Access 95. The native Access database format (the Jet MDB Database) has also evolved over the years. Formats include Access 1.0, 1.1, 2.0, 7.0, 97, 2000, 2002, 2007, and 2010. The most significant transition was from the Access 97 to the Access 2000 format; which is not with earlier versions of Access. As of 2011 all newer versions of Access support the Access 2000 format. New features were added to the Access 2002 format which can be used by Access 2002, 2003, 2007, and 2010.MS Access 2007 introduced a new database format:. ACCDB supports complex such as multivalue and attachment fields. These new field types are essentially recordsets in fields and allow the storage of multiple values in one field. With Access 2010, a new version of the ACCDB format supports hosting on a SharePoint 2010 server for exposure to the web.Prior to the introduction of Access, and Fox dominated the desktop database market. Microsoft Access was the first mass-market database program for Windows. With Microsoft's purchase of FoxPro in 1992 and the incorporation of Fox's Rushmore routines into Access, Microsoft Access quickly became the dominant database for Windows - effectively eliminating the competition which failed to transition from the world. Access's initial codename was Cirrus; the forms engine was called Ruby. This was before saw the prototypes and decided that the language component should be co-developed as a separate expandable application, a project called Thunder. The two projects were developed separately as the underlying forms engines were incompatible with each other; however, these were merged together again after. Access was also the name of a communications program from Microsoft, meant to compete with and other programs. This proved a failure and was dropped. MS-SQL SERVER MS SQL Server is a powerful database management system and the user can create application that require little or no programming. It supports GUI features and an entire programming language, Visual Studio Application which can be used to develop richer and more developed application. There are quite a few reasons, the first being that SQL is a feature rich program that can handle any database related task you have. You can create places to store your data

build tools that make it easy to read and modify your database contents, and ask questions of your data. SQL is a relational database, a database that stores information about related objects. In MS SQL that database means a collection of tables that hold data. It collectively stores all the other related objects such as queries, forms and reports that are used to implement function effectively.

The MS SQL database can act as a back end database for .NET as a front end, MS SQL supports the user with its powerful database management functions. A beginner can create his/her own database very simply by some mouse clicks. Another good reason to use SQL as backend tool is that it is a component of the overwhelmingly popular Microsoft office software suite.

Internal Integration

The SQL Server 2000 database engine includes integrated XML support. It also the scalability, availability and security features required to operate as the data storage component of the largest web sites. The SQL Server 2000 programming models is integrated with the windows DNA architecture for developing web application, and SQL Server support feature such as English Query and Microsoft Search Service to incorporate user friendly queries and powerful search capabilities in web application.

Scalability and Availability

The same database engine can be used across platform ranging from laptop computing running Microsoft Windows 98 through large, multiprocessors servers running Microsoft Windows 2000 Data Center Edition.

SQL Server 2000 Enterprise Edition support feature such as federated servers, indexed views, and large memory support that allow it to scale to the performance levels required by the largest Web sites. FEATURES

Created by Microsoft and Sybase in the 80s. Is SQL Compliant - Uses ANSI SQL Supports SQL 92 standards - Uses T-SQL Stores data in a central location and delivers it to clients on request New Server Architecture Graphic Administration Tools Maintains ANSI standards and 6.x Compatibility Data integrity means reliability and accuracy of data. Integrity rules keep data consistent. Supports Client/Server model. Request response dialog. workload is split between the client and the server

SOFTWARE ARCHITECTURE

CHAPTER 4
4.1SOFTWARE ARCHITCTURE MODULE This project contains 4 modules. They are Protocol Implementation File Handler Browser with platform independent Web Crawling

4.2 MODULE DESCRIPTION Protocol implementation This module is to have a dynamic link library of protocol which would be selected according to the page and platform File Handler This module will check the pocket to identify from which platform and created in which language in order to instruct to Browser. Browser with Platform independent Thus by the support of above modules it provide independent browsing environment for user. Web crawling This is used to make the tool to interact with internet to support browsing , mailing and any activities through internet.

SYSTEM DESIGN

CHAPTER 5 SYSTEM DESIGN


5.1 DATA FLOW DIAGRAM

LEVEL1

5.2 DATA BASE DESIGN

BLACK TABLE

S.No 1 2

Field Name list ipli

Data Type Text Text

Description List

HISTORY TABLE S.No 1 2 3 4 IPL S.No 1 2 3 Field Name Internet Protocol Restricted Plats date Data Type Text Text Text Description Field Name Sino Site Date Time Data Type Number Text Number Number Descriptions S.NO site Date Time

date

FILE HISTORY TABLE S.No 1 2 3 Field Name Time Date Resource Data Type Text Text Text Description History Date

SYSTEM TESTING

CHAPTER 6
SYSTEM TESTING 6.1 TESTING INTRODUCTION: After finishing the development of any computer based application, the next complicated time consuming process is testing. During the time of testing only the development company knows that, how far the user requirements have been met. The testing methods applied to our project are as follows. Unit Testing Integration Testing Validation Testing Output Testing Acceptance Testing

TESTING METHODOLOGY UNIT TESTING Thus it was an networking tool , there are minimal uses of field and values, It was used in browser. Browser has not provide flexibility in runtime input. In unit testing each module is tested individually. It focuses the verification efforts on the smallest unit of software in the module. This is known as module testing. In the project all the modules are tested separately. For our project testing is performed at programming stage itself. In this testing each module project is found to work satisfactorily with regard to the expected output from the module. There are some validations for fields. The unit testing is performed now and then whenever a patch is delivered for each module. This makes our project standard. Unit testing comprises the set of tests performed by an individual programmer Prior to integration of the unit in to larger system. A program unit is usually small enough that the programmer who developed it can test it in a great detail. In unit testing the modules are independent of one another are tested, the test data for unit testing should follow each condition and option this testing helps to find out the errors in coding and option.

INTEGRATION TESTING Integration testing is the phase of software testing in which individual software modules are combined and tested as a group. In this project the parts of a module are tested first and then it will test some of its parts, integration testing is done successfully. As browser it has various sub forms and feature which are checked as properly interconnected. VALIDATION TESTING As like unit there are minimum field in work to be checked and validated.It begins after the integration testing is successfully assembled. Validation succeeds when the software functions in a manner that can be reasonably accepted by the client. In this project, the majority of the validation is done during the data entry operation where there is a maximum possibility of entering wrong data. Other validation will be performed in all process where correct details and data should be entered to get the required results. OUTPUT TESTING The form has been run trough according to software description. It was successful in running mode and perform as per user description. After performing the validation testing, the next step is output testing of the proposed system since no application would be termed as useful until it produces the required output in the specified format.

SYSTEM IMPLEMENTATION

CHAPTER 7
SYSTEM IMPLEMENTATION Implementation Implementation is the stage in the project where the theoretical design of the project is turned into a working system. It is a stage where the operation of the system is monitored to ensure that it continues to work effectively. Education and training of the users are also essential to ensure smooth functioning of the system. Multi protocol browser is tested and implement as multi platform browser , even it can work across various platform and file system, On before implementing it through as common tool each user must be knowledge with what is platform , file system and platform independent concept. It is design as realtime and common usage software must have real time feedback must be keenly monitored and changed to provide better solution.

CONCLUSION

CHAPTER 8
8.1 CONCLUSION

Thus develop a web browser is a software application for retrieving, presenting, and traversing information resources on the World Wide Web across multiple platform. An information resource is identified by a Uniform Resource Identifier (URI) and may be a web page, image, video, or other piece of content it was result in cross platform browser. Hyperlinks present in resources enable users easily to navigate their browsers to related resources. A web browser can also be defined as an application software or program designed to enable users to access, retrieve and view documents and other resources on the Internet.

FUTURE ENHANCEMENT Thus this tool successfully compile the software incompatibility so this technic can be implement on other commonly used software. Other this package can be add us add-on for already existing software. This software can be made as mobile application to across Android, Windows and Baba os

It should be ceded to some available software So that currently market running software can be made as platform independent. Multiple protocols caught and run through various available platform it should be made as runtime protocol and file system acceptor. Thus this tool successfully compile the software incompatibility so this technic can be implement on other commonly used software. Other this package can be add us add-on for already existing software.This software can be made as mobile application to across Android, Windows and Baba of os.

BIBLIOGRAPHY

CHAPTER 9 BIBLIOGRAPHY
BOOKS REFERENCE

STEVE HARRIS AND ROBMACDONALD,WEB DEVELOPMENT WITH VB.NET-APRES MATTHEW MACDONALD,MICROSOFT VISUAL BASIC.NET PROGRAMMERS COOKBOOK -TATA McGraw HILL EDITION

WEBSITE REFERENCE WWW.3SCHOOL.COM WWW.HRWORKINDIA.COM

Appendix

APPENDIX SCREEN SHOTS

10.1 SCREEN SHORTS

Figure 10.1.1 load protocol and file system

Figure 10.1.2 set protocol

Figure 10.1.3 set file system

Figure 10.1.4 Browser

Figure 10.1.6 history of browser

Potrebbero piacerti anche