Digital School .Net Web Project

DIGITAL SCHOOL

Digital school .Net project deals with current education system. Digital school is defined as an integrated, intelligent and internet based solution for current education system. This project is based on internet which gives full support to students. This project describes the whole education system online to get better interaction between students and their faculties.

By using this application parents can be familiar with the school environment. They can know the complete details of syllabus, attendance and mark list. By this project students can get close to school environment. They can get every updates regarding their marks, syllabus, academic plans and fee. Students can write their exams online and get results instantly.

All parents will provide a visual presentation of their children’s performance and attendance in the form of charts. Parents can be able to provide the rights to pay fees online, access school Calendar, exam schedule, notice board and timetables. They can edit their accounts and also can send the feedback to faculties and management.

Faculties will be able to upload material, to make the participation forums. They can also plan the session and put deadlines. Students can do clarify their doubts to the teachers online. Faculties can access the library online and they can also view the student’s profile. They can give the feedback to parents based on their children’s performance.

All the copyrights will be provided by admin. The main rights are provided to admin he can do everything and can watch everybody’s profile. Admin can send regular sms and emails to students, parents and faculties. He can create time tables, exam syllabus and exam schedule. Admin can also create notice board, generate graphs, and can upload new excel sheets. He can send auto fees alert to parents.

Required fields:

Digital school provides a unique username and password. Parents, students and faculty will able to interact easily. They will be provided by account which will be active with recent activities. Parents or students can view their account and make changes. Admin will have information of every account.

Cool Cab Services .Net Web Project

COOL CAB SERVICES

Application Description (cool service):

Travel business now a days has become one of the large and popular businesses. In this travel business, car rental service plays a major role. Cool cab services are the most trusted and secured services. Cool cab service is a web application. Cool services offers cab rental and car hire in India. To improve our cool service it uses information technology. The main aim of this cool cab services is to provide best quality. We offer both man and machine, to our client.

As we understood the requirement of our clients we provide cars ranging from luxury to budget cabs, we even provide online cab hire service for corporate houses. We offer the best of rates, which are tailor made depending upon the facilities. We provide cabs with proper permits and documentation so that the clients need not face any problem or be hassled for the lack of documents.

We provide cab drivers who are educated, polite, and reliable. We even train our cab drivers to handle acute breakdowns. Our cab services include all categories of cars depending on our client requirements from luxury cars to budget cars.

Cool cab services mainly concentrate on quality, to fulfill this requirement we keep our vehicles well maintained and tested for delivering optimum and uninterrupted performance. A team of professionals in the travel business enables this system to design trips that suits to all budgets and preferences of the traveler. Our cool cab services workforce includes drivers and administrative staff well trained to discharge their duties with a lot of efficiency.

Usage of application:

Cool cab service is a web based application we offer an easy and simple service to our clients, we provide our service both with man and machine. User need to register with our application and give details. All the information given by the user will be maintained by the admin.

Once after registration user will be provided by unique credentials. User can submit trip details, money transaction can be done by card or cash. We provide a safe and secured drive to our clients.

User can even view more detailed information about our application, management manager, HR manager, moment manager, financial manager and quality assurance manager.

Modules of the Projects:

  • Admin module
  • HR module
  • Maintenance module
  • Movement module
  • Finance module
  • Quality Assurance module

Software Requirements:

  • WINDOWS OS
  • Visual Studio .Net Enterprise Edition
  • Visual Studio .Net Framework (Minimal for Deployment)
  • SQL Server

Inventory Control System VB.Net Project

The project titled “Inventory Control System” is to control the general stores department. Hindustan Shipyard Limited is an automation of issuing an item to different departments inside the organization, returning back the item to the stores if the department doesn’t have any need with the item or if the stock is full, issuing the receipt to the department to whom the item is being issued, checking the balance of the stock of each item, making a new purchase of an item if the store doesn’t contains the stock of that particular item.

The purchase of an item is indifferent modes i.e., local abroad and indigenous. If the item is purchased locally then it is said to be local. If the item is imported from other countries then it is said to be imported. If the item is purchased from any department inside the organization then it is said to be indigenous.

Inventory Control System purchase order form

The project contains five modules:

Issue Module, Returns Module, Receipts Module, Balance Module and Purchase Module.

The Issue Module contains the information about the item are issued by the department to various other department in the organization. This module contains the following fields as card code, item code, department code, work order number, document number, transaction date, rate of the item, quantity of the item to be issued, its value.

The Returns Module contains the information about the item are issued by the department to various other department in the organization. This module contains the same fields as in the issue module they are as follow fields card code, item code, department code, work order number, document number, rate of the item, transaction date, quantity of the item to be issued, its value.

The Receipts module contains the information about the item that are issued and address of the department to which the item was sold are the supplier details. The details contains the following fields as card code, item code, department Code, order number, document number, transaction date, rate of the item, quantity of the item to be issued, its supplier details.

Inventory Control System purchase report

The Balance module contains the information about the balance that is/was present before/after the issue of each item and about the new stock. This module contains the following fields as card code, item code, department code, rate of the item transaction code, transaction date, quantity of the item to be issued, its value.

The Purchase module contains the information about the purchase that made by the department. Whenever the department needs any new item, the value of the purchased item is calculated according to the mode of purchase i.e. local, abroad, indigenous. We can make addition of a new item, deletion, modification, etc for this file. It contains the fields such as item code, item desc, units, quality grade, item value.

Inventory control system is a client/server application.
Software requirements Visual Basic.Net front end, MS SQL Server back end.

SYSTEM REQUIREMENT SPECIFICATION

The data processing department is accepting many requests, which comes from different department. Currently the request like updates, stop details, issues, returns are done manually. So they would like to automate it.
We have to first understand this problem and produce a requirement documents based on understanding the problem.

End User: Office Staff

While studying the current system, after speaking with the director, front office staff we found the system as follows.

Whenever a new work comes, the work is divided into different parts and each part is submitted to the respective department. The respective department checks their work and the material needed for their work. If the material is sufficient for them for doing their work to carry out with it otherwise they send a request for Data Processing Department for the issue for the material. The data Processing Department then sends a request to stores department whether the mat is available or not. If the material is available they will issue it otherwise they will place as an order.
If the allocated material is more than sufficient, the respective departments will handover that extra material to Data Processing Department by a note. Then the Data Processing Department will update their respective stores. In automating the whole process we find that the inventory system consists of three main parts.

1. ISSUES:
This process is used to store the issue details of the item which is requested by the respective department.

2. RETURNS:
This process is used to store the return details of the item, which IS the respective department.

3. RECEIPTS:
This process is used to store the receipt details of the item, which is attested by the respective department.
After discussion with the staff the following decisions were taken regarding what the automated systems should do and what new environment will be.

1.    The format for each entry should be similar over currently being used.
2.    Entries might have errors, so system should be able to check for errors.
3.    Information about the items, departments, and work orders should be kept in permanent database.

Requirement Specification Document:

Introduction:

Purpose:

The purpose of this document is to describe the external requirement for the atomization of stock details. The atomization will provide management to accept item details and quality. It also describes the interface for the system.

Scope:

The document is the only one that describes the requirements of the system. It is meant for the use by and will also be the basis for validating the full system. Any change made to the requirements in future will have to go through a formal change approval process. The developer is responsible for asking for classification whenever necessary and will give any alteration without the permission of the client.

Conversion Methods:

Conversion methods are of four types these are parallel systems, direct cut over method, pilot method and phase in method. Each method has some advantages it offers and some problems that it may cause. However some situations force one method to be used over others, even though other methods may be more beneficial. In general, system conversion should be accomplished as quickly as possible. The present module contains the same fields as in the issue module they are as follows card code, item code, department code, work order number, document number, transaction date, rate of the item, quantity of the item to be issued., its value etc.,

Receipts Module:

This module contains the information about the items that are issued and their the details of the department to which the item was sold and the supplier details. This module contains the following fields as card code, item code, department code, order number, document number, transaction date, rate of the item, quantity of the item to be issued, its value, supplier details etc.

Balance Module:

This module contains the information about the balance that is/was present before/after the issue of each item and about the new stock. This module contains the following fields as card code, item code, department code, transaction date, rate of the item, quantity of the item to be issued, its value.

Purchase Order Master:

This module contains the information about the purchases that are made by the department. Whenever the department needs any new item, system is developed using ORACLE 7.3 as backend and VISUAL BASIC 6.0 as front end that helps us to create easier and flexible data entry.

The system automation that has been developed will be installed in the organization in a phased manner. This helps the end user who will be using the system in future to get a feel of the system. This also helps the end user to clarify their doubts and get rid any reservations or inhabitations that they have. The phased manner approach that the organization is implementing makes it possible systematic automated system.

CONCLUSION

After completing the proposed system successfully it is worth to talk about the limitations and advantages of the system.

LIMITATIONS:

This system is capable of fulfilling the current requirements, but it is required to make modification to meet the future requirements. Disk space to increased when information increases.

ADVANTAGES:

As all the screens are self explanatory it is easy to work with the system with a little training for new operator. The system eliminated the problem of the existing system and enhances its capability.

Inventory Management System VB.Net Project

Inventory Management System is a system which is used to keep track of sales and purchase of electronic goods. Its main objective is to keep track of stocks, sales and purchase of goods, maintain staff and customer information and generate reports.

The main functionalities of this system are as follows:

  • To maintain information about current availability of stock based on which it decides whether there is a need to purchase goods, if they are out of stock.
  • To display the information about dealer and also add information about new dealer.
  • To maintain the information about staff, their personal details such as contact number, name, address, qualification, birth date, etc.
  • To maintain the information about customer who visit the store for shopping.
  • It also provides discounts to customers who frequently visit the shop and purchase goods.
  • To provide information regarding sales and purchase of goods.
  • To provide information about sales summary.
  • The system can be accessed by administrator and accounts department.
  • It provides the functionality to create new user who can access the system.
  • It also provides the records of the defective products which the customers return back to the shop for replacement.
  • It also generates the purchase bill.

Inventory Management System Use Case Diagram

Project Scope

This document covers the requirements for the Inventory Management System. This Software will provide a graphical environment in which the users of the system will be able to perform various operations that are associated with storing, marinating, updating   and retrieving Stock information. The purpose of this is to guide developers in selecting a design that will be able to accommodate the full-scale application.

Product Perspective

The product Inventory Management system, is an independent product and does not depend on any other product or system. The product will automate various tasks associated with handling stock details and better organizing the Megastore information and  optimum performance, thus helping  the manager to ensure smooth working of these processes.

Inventory Management System Login Page

Product Features

The product, IMS will automate various tasks associated with handling stock details. The software will be used by the Megastores to Megastore the details of new and existing product. Periodically it will be used by the Megastores to input the total sales and sales rate information after the month/years. His software inherently makes automatic calculations on sales rate. And all this information is accessible to administrators and manager to keep track of their selling progress of the product. Also the software has a provision that will allow administrators to print the required reports of various products .

Inventory Management System Purchase Order Enquiry

User Classes and Characteristics

This software gives access to 2 kinds of users.

Administrator: The manager and Megastore administrator will have administrator access to add, delete and modify information Megastore in the database.

Authorized User: computer operator staff will have access to only view the data Megastored in the database in the form of formatted reports.

System Features

Login

Description and Priority

The login form is used all the users. This module has the highest priority when compared to all the other modules. This model allows the the user to enter his username and password in order to make use of the software.

Inventory Management System User Page & Manage AccountsStimulus/Response Sequences

This module has text boxes where the user can enter the his username name and password. If the necessary information is not provided or if invalid inputs are given by the user then the system will pop a message box.

Functional Requirements

Only authorized users are allowed to login.. If invalid user Name or password is given by the end-users then system should inform the user. If Unauthorized   users try to access then it should not allow the user to work on the System.

Data Entry module

Description and Priority

This module is used by data entry operator who is responsible for entering the details of products. The module requests that the Data entry Operator specify the function he/she would like to perform (either Add a product, update a product, or delete a product details).

In “Update a product” Once the Data entry Operator updates the necessary information ,the system updates the product record with the updated information.

In “Delete a product” Once the Data entry operator deletes the record, the system prompt s the user to confirm the deletion of the product.

Stock Entry Module

Description and Priority

This module allows the stock entry operator to add, delete or modify the product information from the system.

Stimulus/Response Sequences

The system requests the stock entry staff to specify the function she/he would like to perform(either Add stock, Update stock, Delete stock and Generate Report)

Functional Requirements

In “Add stock” Once the stock entry clerk provide the requested information, the system saves the stock and an appropriate message is displayed.

In “Update stock” the stock entry operator makes the desired changes to the stock details and at the same time the database will save the changes that are made by the stock entry operator.

In “Delete stock” if the clerk wishes to proceed with the deletion of the record on click of this the record is deleted from the system.

In “Report generation” the computed result of a particular product is displayed.

Download the complete Grocery Inventory Management System PHP & MySQL Project.

Network Print Spooler VB.Net Project

This project implements a network print spooler, which can accept multiple simultaneous print requests and handle them gracefully. The Client and Server architecture is built to receive the print requests from various users and aggregate all request in the server and manage them effectively according to the prioirity / rights / privileges of each and every user in the network.

The administrator of the network who is nothing but spooler manager can reorder jobs and remove any jobs from the queue and he as the final discretion as far as the processing of print requests are concerned .This project ensures the Network Sprint Spooler supports multiple requests from different users at the same time. In the Server, the queue status is displayed and the spooler manager re-orders the jobs and remove any jobs from the queue at his discretion.

The first is a client program that interacts with the user for accepting print requests of their documents files. The Client Program sends the request to the server program that runs in the network server to which the all the systems and printer are connected. The server program of this project  accepts requests from clients over the network, and serves them according the rights / permission / privileges.

Network Print Spooler Design

The connection between the Client program and server program is established by using TCP/IP protocols using the .NET components. The management hierarchy of the company is studied and the access rights, permission and privileges of each every user of the network printer is given and configured in the Server program of the project.

The administrator ie. Spool Manager is the authorized person to login with the administrator username and password and login and configured the rights and permission accordingly to the respective users.

Network Print Spooler Employee Details Entry Form

MODULES:

  1. Client –server architecture establishment module.
  2. Client side request processing module.
  3. Server side request processing module.
  4. Rights and permission checking and process module.
  5. Reporting and administration module.
  6. Client side request processing module:

In this model the client login into their resource by using login and his password. The client in the particular network will send a request to the server in the network. The request is about to take print in the network and ask whether the Printer are connected with the network and the request may be delete any. The response may be printer is connected in network, client can give request to see their file in server buffer to take print out, it can also delete any document file has been in server buffer by given request to server by him.

3) Server side request processing module:

In this module all the request from the client are process according to their priority. And all the request is process according to client request the response will be send the clients. The response may be yes printer is connected u can send the file or print is not connected so wait for some time.

4) Rights and permission checking and process module:

In this module the client will send set of files to the server to take print out. And that set of files will be store in the queue. The entire request from the server will process and find out he is authorized client if he is authorized client his request will    be store in queue and priority will be allocated according to the request time from the client and output will be given to the user. Using this module support display of the queue status, and allow users to remove their own jobs from the queue are delete according to the client request.

5) Reporting and administration module:

The administrator can login their area by admin user name and password. Admin is the one he has authority to control all the client system in the network. he has authorized   person to process all the request and send response to all the client in the network.

Placement Information System VB.Net Project

ABSTRACT:

The project entitled “PLACEMENT INFORMATION SYSTEMis developed with vb.net as front end and MS-Acces as back end. This system is developed to assist the placement and training cell of Karpagam Arts and Science College. The main purpose of this project is to store the students details and to find all the eligible candidate from UG and PG, satisfying the specified criteria.

This is a user friendly project that enables all kind of users to work with, even     without any prior knowledge of computer.

ABOUT THE PROJECT

The Placement Information System is a software project developed to assist the placement and training cell of Arts and Science College. The login form in the system checks for the validity of the user name and password. This ensures that only the authorized users are allowed to use the system.

The main modules in this project are student, check and report.

The module ‘student’ consists of two sections, UG and PG. All the academic and personal details of the students are maintained separately in this module. Provision for inserting, updating and deleting the records are made here.

The next is the checking module. Checking is done separately for UG and PG students.   In the checking module, the eligible candidates who can appear for the placement are found. This selection procedure is based on certain criteria, given by the company, like percentage of mark, the course being done by the student and the arrears.

The report module, which is the output module, produces the list of eligible students who can appear for the placement, along with all the necessary details.

ugtable

FIELD NAME DATA TYPE DESCRIPTION
rollno memo Rollnumber
name text Name of the student
gender text Gender
dept text Department
year number Year of study
batch text Batch
homename text Homename
place text Place
city text City
state text State
pin number Pincode
phno number Phone number
tenth number Tenth percentage mark
twelth number Tweth percentage mark
currentsem number Current semester
arrears text Arrears present or not
noarrears number No of Arrears
mark number Mark up to current semester
placed text Placed or not

Placement Information System Login Placement Information System Modules Placement Information System Student details

Remote Device Explorer System VB.Net Project

INTRODUCTION

This Remote Device Explorer System project is done specifically catering to the requirements of the educational institutes Computer Laboratory.   We create a Client Server architecture where in the Clients  software runs in  all students and staff systems and the server is maintained in the Network administrator System.

The Students and Staff ip addresses are maintained separately in a database.We use separate colors like green , red etc for identifying which of those system pen drive is accessed.  We track the various activities of the students and staff like taking print outs, Reading and writing CDs also files accessing , creating and modifying it.  We use VB.NET which is an Object Oriented Programming Language for the Construction of Client Server architecture. We use Sql Server  for storing the data like Ip address of the system etc.

For the alerts of various hardware and software usage, we use Special Controls in .net Platform. This Remote Device Explorer System project will help the network administrator to track the accessibility of its various node and  to monitor any misuse of the system resources.  At times, virus software which often get transmitted into the network through the pen drives is to monitored carefully. Also, the reports can be taken day wise or month wise etc for the usage of various network resources. This facility will enable the administrator and the management incharge to take necessary precautions in future to avoid any misuse of the Network resources.

Remote Device Explorer System Block  Diagram

Modules:

Modules:

  1. Identifying Systems in Network Group.
  2. Registration of Admin / Staff/ Student System.
  3. Monitoring of System Peripherals.
  4. Monitoring of Software Applications.
  5. Performance Comparison by admin.

Modules Description:

Identifying Systems in Network Group:

In this module, we are going to identify the number of System which all connected in the network. And all the system in the network has been categories by Admin, Staff, and Student.

Registration of Admin / Staff/ Student System:

In this module the user in the network has been register according to their category and authority. Admin is the one he has authority for monitoring and controlling the whole network (Staff/Students).The Staff in the network can register in the network by selecting user name and password (unique) according to his need. The Students in the network can register in the network by selecting user name and password (unique) according to his need. All the user name of student/staff has been maintain by the admin and admin user name and password has been maintained very secret in the network.

Monitoring of System Peripherals:

In this module server will monitor the number of user (students/staff) in the network and start monitor them. The admin will monitor that who are all using peripherals device like Pen drive, CD, Printer.

Monitoring of Software Applications:

In this module admin will monitor the user (staff/students) process by files, document, application used by users by file watcher, it also check client connection, web application also.

Performance Comparison by admin:

In this module the admin will calculate the performance of each user (staff/students) in the network by their process, and activity done in the system.

1. Identification of Admin / Client System

In this module, Server identifies the clients which are connected in the network. Server also categories the Client system as student and staff.

2. Monitoring of Remote Devices

In this module, Server get access to all clients which are using the Remote devices such as Pen drive, CD, Printer etc., also Server can get the details of processing of files and documents of clients by File Watcher.

3. Monitoring by Administrator

In this Module, Administrator monitoring the Remote Devices which are get connected in network. And also monitoring the individual access of the client , servers and remote devices.
Remote Device Explorer System System Flow Diagram
Existing System :

1) The hardware and systems are maintained only by using the Operating System security features.

2) No Usb slot access control are available.

3) No Acess control and tracking mechanism implemented for CDs,printers and Scanners.

4) No virus protection is updated and maintained.

Remote Device Explorer System Client
Remote Device Explorer System Client Connect
Proposed System :

Remote Device Explorer System is designed in such a way to categorize as staff and students systems. These IP   addresses are updated in a separate database to monitor each system based on category wise.   RDESServer has the user interactive GUI to display various device status from remote systems.

The colors like green, red are used for identifying staff and students system respectively which of those USB drive is accessed. Also the working status of various devices such as CDs, printers, scanners is tracked in this system.

RDESServer additionally has File monitoring facility such as creations, modifications and deletions of the files from remote systems. Remote Device Explorer is an enterprise endpoint security software solution providing network administrators with the ability to secure, monitor and control computer ports and external devices as part of an information security program.

The solution protects against internal data leakages occurring when confidential data is printed or copied from internal workstations and laptops to unauthorized portable storage devices through unmanaged USB, LTP, COM, Firewire and IEEE 1394 ports.

Advantages of Proposed System :

1)    Any hardware added to the network can be monitored and controlled for access.
2)    The integrated solution for complete network monitoring and maintenance is possible.

3)    The Reports functionality enables the administrator to bring about accountability
To the network access.

4)    This proposed Remote Device Explorer System protects the internal data leakage.

5)    The device explorer system is far safer and sophisticated compared to the operating system security features.

Remote Device Explorer System ServerRemote Device Explorer System Server Admin ConsoleSOFTWARE SPECIFICATION:

Environnent : VB.NET

Back End : SQL SERVER

Share Management System VB.Net Project

Abstract: Shares are issued when it is incorporated, or whenever it needs to raise more capital for new ventures expansions. The approval of the registrar of companies (ROC) and the securities and exchange board of India (SEBI) is a necessity.

Synopsis

A computerized share management system would be able to handle the following functions.

Modules

  • Maintain shareholders details and the share kept by them
  • Keep track of share transfer
  • Generate divided warrants
  • Provide information on shareholdings to the company management
  • Generate statuary reports

ABOUT THE PROJECT

INTRODUCTION

Share Management System is an application which manages the shares of a company. Every organization tries to build up their resources and increase their business.For increasing the business they need lots of funds.Raising the funds are of so many types among which issuing of shares is one of the methods.After issuing the shares a private sector converts to a public sector.When an organization becomes a public sector the responsibility and accountability also increases.

EXISTING SYSTEM

The Existing System is not a computerized system.In this method and dependency of human and paper work is lot.As it is depending on the human beings the processing of each and every transaction takes more time.Even though the computers are implemented the data is not centralized.Which leads to lot of difficulties.All  the transactions made by officials and customers needed to be recorded in their individual systems.And the security and privacy of data is always an issue.In order to have a secured database and centralized server the system is to be changed.

Entity Diagram for Customer

PROPOSED SYSTEM
A Proposed share management system is for removing all the disadvantages and difficulties raised by the Existing System.The proposed system is to create a complete application on the basis of client-server architecture.
The system is to provide a website for the shareholder through which the shareholders are get informed in every bid of the share.The facilities needed to be provided for the share holders are :

1.Online Applying for Shares

2.Online Share transfer Facilities

3.Daily Purchase and sales reports

Apart of creating a website for shareholder the system is to provide easy a management system for official and management where management can check out applications for the shares and allot the shares for individual customers.Where the system takes care of auto-generation of folio number and allotment of shares done properly.

For the officials the system is supporting with issuing of shares generating certificates and maintaining  the certificates details.

Share Management System

DEFINITION

Share management system refers to keeping track of the ownership of the shares of a company. A share represents part of a company. The shares department of this company maintains a share register to record details of each shareholder, including the number of shares he owns and the share certificates he holds.

DESCRIPTION

The Share Management System consists of three modules.

1.Share Holder

2.Management

3.Official

Share Holder

A person who applies for the shares will become as a share holder to that company.Each share holder is identified by a unique folio number .With this number only he/she can do all his/her transactions

Management

Management is nothing but the company who issues shares into the market based on their assets and in-order to increase their investment.Management will decide how many shares has to allot to a particular person and dividends also decided by the management.

Official:

These are the middle mans between the share holders and the management.These people are meant for the data entry purpose and for doing the share transactions.And also he/she will give information to the share holders regarding their share information.

SMTP Mail Server VB.Net Project

PRESENT STATUS  OF THE SYSTEM:

The existing SMTP Mail Server system that the client has security problems.In the current world of competition ,it is rather becoming a difficult task for the administration to keep a track on access rights  for different users at a given point of time.It becomes highly important for  the firm  to  have  a secure system  in which they provide strict access restrictions.The firm now requires an all new package that does exactly what other Provider do.

The management has put in a substantial amount of time in designing a system that perfectly matches their requirements.

The current SMTP Mail Server system has a login created for each user and has their mail box created or associated with each one of them. The administrator maintains them. This is a complex setting in which each user can send and receive mails throughout the world. Each user and his mailbox have to be taken care of by the administrator.

SMTP Mail Server VB.Net Project

PROPOSED SYSTEM

The SMTP Mail Server System ,which wanted by the end-user,is the proposed system.This project is designed by using the problem statement.Proposed system is the system in which it eliminates the problems in the existing system.

CONCLUSION

The objective of the SMTP Mail Server VB.Net Project deals with identifying multiple users within the same login domain and they will sign in into their personal logins which enables them to send and receive mails.

The system was tested successfully and has performed to the expectations. The goal of the system is achieved and problems are solved. Black box testing was conducted and errors were eliminated. The utility can be used by ASP.NET end users (multiple clients) and can be ensured sending and receiving of mails.

Finally the information is generated as per the specification of the users. The package is developed in a manner that it is user friendly and required help is provided at different levels.

SMTP Mail Server inbox

MODULE DESCRIPTION:

The SMTP Mail Server VB.Net project consists of the following five modules:

1.User administration.

2.Mail organization.

3.Message composition.

4.Message Address list

5.Message Deletion.

Mail Organization Module

This module deals the organization of mails. When the users are created ,a directory with     the user-id as its name should be created along with four sub directories:

Inbox, Compose and Address list.

The Compose box contains the transmitted messages.

The inbox contains all the incoming messages.

The Address list box contains the users details that can be recovered.

Message Composition Module

This module deals with composing messages . It forms the information such as:

“From” (Sender’s user-id), “To”(Receivers user-id), “Date of Transmission”, “Subject”, “Message” and “Attach” to be transmitted. The message is converted and stored as a file in the outbox of   the sender before it is being transmitted. The file name should be the combination of the  sender’s user-id and receiver’s user-id.

The contents of the file should follow the following format:

  • From:
  • To:
  • Date:
  • Subject:
  • Message:
  • Attach:

The module prompts the user for the file information that has to be transmitted. The messages

can be user-typed information at runtime or messages that are part of the file. The user is supposed to type in the message or specify the file name. Other information such as from whom, the message is transmitted, to whom, it is being transmitted, date of transmission are also accepted.

This information is stored in the following format:

  • From:
  • To:
  • Date of Transmission:
  • Subject:
  • Message:
  • Attach:

This information is stored in a file that has the name of the user-id concatenated along with the name of the receiver’s user-id . The composed messages is then stored in the outbox of the sender. This file remains till it is selected and transmitted by transmit module. Every user’s composed message is stored in the user’s outbox.

Message Address list Module

This module is responsible for having all the personal users addresses which have been stored in the user’s Address. Once the user create all the contents of the file are displayed in the view file. These Contents are, from whom the message has been sent, date on which it was received, subject and the message.

Message Deletion Module

This module allows a user to delete a message by letting him browse through a list of messages that is part of his inbox. An option to empty the delete folder is provided so that recovering of deleted message is not possible.

Output Screens:

  1. Authentication Page:
  2. User Registration Page:
  3. User Login Page :
  4. Main Page:
  5. Whenever we click the InBox in this page, we see the all messages.
  6. Whenever we click view in any message of this page, we see the message and attachments.
  7. Whenever we click the Inbox in the above page, then this page redirect to Inbox page.
  8. Whenever we mark in the checkbox of the corresponding messages and we click Delete in this page, then that messages are deleted.
  9. Whenever we click on the Last Hyper Link, then we see the last messages in the datagrid.
  10. Whenever we click on the First Hyper Link, then we see the First messages in the datagrid.
  11. Whenever we click on the Next Hyper Link, then we see the next messages in the datagrid.
  12. Whenever we click on the Previous Last Hyper Link, then we see the previous messages in the datagrid.
  13. Whenever we press the Compose button in this page, then it redirects the Compose page.
  14. Whenever we click the Attach Hyper Link, then The Upload page will be displayed
  15. Whenever we click the Browse button in Upload Page, This is Shown a Open Dialog Box for find the file path what file do you want to attach.
  16. When we open the file, then the selected file path is shown in text box. After that we can upload it file to compose form.
  17. After uploading the require attached file path is shown in attachments text box in the Compose page.
  18. Whenever we click the send button this message sent to mail box and the below screen displayed.
  19. Whenever we click the Addresslist button in the left side frame, then address lists are displayed in datagrid in right side frame of this page.
  20. Whenever we click the AddNewContact hyperlink in hthe right side frame of this page, then the blow page is displayed.
  21. After enter the all information in this page and we click the Save Button then all information is stored in database. And it will be displayed in the “View All Contacts” Page as shown in the below screen.
  22. We want to change the contact information of the Suresh in database. Then we click the update link of the required field. Then we saw below page with existing data of consider person. In this time this page allows to modify the fields.
  23. After the Modification, click the save button then it saves and it display the screen.
  24. Whenever we click the Group mail combo box, this displays the current Group mails and allows the new group registration. If we choose any group in this list then the group mail id are displayed in the TO Text Box of Compose page.
  25. Whenever we select the NewGroup in the Group Mail Combo box then it is redirect.
  26. Whenever we click the save button then New group id will be created.
  27. And it shows in another page
  28. When we want to add another id into to group id then click update of corresponding group id then it will shows the Group register page with information of that group.
  29. After modification the below page will be displayed.
  30. When we want to delete particular group id then we click delete of corresponding group id. Then it will be deleted.
  31. Whenever we click the “Proj. Description” Button, then it displays the Description of the project in Word Format.

System Resource Controller VB.Net Project

Prologue

Every system has resources which are very essential to have the designated task performed by the system as intended. Some of these resources are exposed to the outside world and some are not. Of all these only few can be controlled and others are not. This is to protect the system integrity and functionality from the novice and probing hands.

But   in times of technological and information age, there is lot of information   to be shared without having any troubles. The sharing may be with in local intranet or remote internet. In these cases we need look for some issues which place crucial role in the system performance also.

Details

In the above scenario, we may require to monitor and control the resources in a system for protecting as well as enhancing the performance of that system. But  the monitoring and controlling activities if done at local system level, the time and the effort needed are going to be unimaginably huge. In addition, the controlling/monitoring authority is not going to have a clear view of  ‘ what is what’ about the systems.

The solution for this kind of issues is having the controlling and monitoring power at one end. From this terminal or system the other systems/ computers in the local intranet or remote internet can be controlled or monitored as the administrator/ controlling authority wishes to do.

System Resource Controller Home Page

Requirements:

This proposed System Resource Controller solution requires a keen and carefully planned vision. As we are controlling the resources from a remote end, the network resource overloading is going to be a burden. Without causing much traffic the controlling has to be done.

We are proposed to use some nifty components from the Windows Operating System for the effective controlling of the system resources in the network.

At top level the issues that are going to be controlled monitored are…..

  • System Physical Resources
  • Software Resources of a System
  • The Network Resources
  • Finally, Analytical Results of Scrutinization

PRELIMINARY PLANNING / INVESTIGATION

To protect the system integrity and functionality from the novice and probing hands. In times of technological and information age, there is lot of information  to be shared without having any troubles. The sharing may be with in local intranet or remote internet. In these cases we need look for some issues which place crucial role in the system performance also.

The goals of  SRC is protect system integrity and functionality, and to maintain performance

Objectives:

To achieve the above goal we need to achieve the following sub-goals or objectives…

We need some nifty components from the Windows Operating System for the effective controlling of the system resources in the network.

At top level the issues that are going to be controlled monitored are…..

  • System Physical Resources
  • Software Resources of a System
  • The Network Resources
  • Finally, Analytical Results of Scrutinization.

System Resource Controller Find Domains

Module Description:

The System Resource Controller project is designed keeping in view of a Network Administrator’s requirements while administering the LAN.  As per the analysis results, the identified tasks should be achieved under single application in a much collaborative way providing complete required information at the finger tips of the Administrator.

During the module design phase, the first two modules concentrate on user interface design for all tasks and privilege verification and authentications. The remaining modules focuses on the different tasks both designing and techniques.

To recall, the identified tasks from the analysis are …

  1. Gets the list of different domains / sub domains
  2. Gets the list of different system under domains / sub domains
  3. Gets the list of system switched ON
  4. Gets the list of logins (login enumeration)
  5. Gets the list of processes running on each system
  6. Gets list of each system startup time (?)
  7. Get the information about the memory usage of each system
  8. Get the CPU usage / load of an individual system
  9. Get the hardware details of an individual system
  10. Get the software details of an individual system
  11. Broadcasts messages to all systems
  12. Sends messages to all systems under specific domain / sub domain
  13. Sends messages to an individual system
  14. Kills a process in a system
  15. Shuts down, Reboot or logs off a system

Module 1: Interface Design

One of the intrigued things while designing the System Resource Controller project is the interface design. It is some kind of one stop solution for the network administrator to perform most of the general and routine tasks.

System Resource Controller

The SRC has three layers of design …

  • Forms, where carefully placed controls are used to achieve different SRC tasks.
  • MDI form, which links all other forms together at one place for easy access.
  • Dialogs, which help the user / administrator in notifying some key events.

Sample forms are provided in the appendix

Module 2: Privileges & Authentication

In this module, we provide security for monitoring as well as controlling the resources of system under network. Security here is implemented in two stages. Stage one is from the existing Windows Network security policy, and stage two is from the SRC itself.

The Windows Network Security policy will take care of the privileges of different groups identified by the domains. This directly controls the accessibility of the systems under different domains of the same network. These policies can be set by the administrator only once according the organization needs.

The security adopted by the SRC on its own has another authentication system exclusively to access the SRC application itself. Administrator decides the users of the SRC application, along with different levels of access and utilization privileges.

We utilize the System.Web.Security namespace partially here to provide certain level of security.

System Resource Controller Graphical Representation

Module 3: Enumerating Domains & System

One of the preliminary tasks in SRC is to know how many systems are present in the given network. This can be achieved by proper usage of system related API calls in addition to exploiting the.NET network namespaces. Herein this module we are going to enumerate the list of domains present in the network and the systems connected under each domain.

For the purpose of enumerating we are taking the help of system.management namespace, which imbibes the WMI concept. We are concentrating on the following techniques to achieve our targets.

Module 4: Enumerating Users

Similar to the above task, the ‘Enumerating Users’ module also does the similar job. But here we are concentrating on the list of users rather than the systems and domains. This module enumerates the list of users from the Windows Network Authentication. It also gets the details of users and to which groups they belong.

For the purpose of enumerating we are taking the help of system.management namespace, which imbibes the WMI concept. We are concentrating on the following techniques to achieve our targets.

Module 5: Finding the Running Systems & Running Time

This module is little tricky. This module performs two different sub tasks.

  • Finding the working systems: This doesn’t mean that all the systems that are switched on. It goes a step ahead and finds out of all the systems that are on, which system is currently working (using system resources to perform some processes)
  • Finding the running time: This again is very difficult to find out how much time that each system is working. We are following a way round approach to find this. Our System Resource Controller is going to watch all the systems under network in the background. It notes down the time when the system boots up and shuts down, and calculates the difference to find out the approximately running time.

Module 6: Hardware Details

This module completely depends on WMI concepts to find out the hardware details. The GetObject method of the WMI namespace will be used here. Using this technique we can found the key hardware resource details.

These are the details we are trying to find out using the WMI.

  • Motherboard
  • Memory
  • Hard disc & Logical Discs
  • Network card
  • BIOS
  • Monitor
  • Display
  • Removable Drives
  • Processor

Module 7: Software Details

As in the above module, this module also totally relies on WMI.  Similar techniques will be used here to find out the details of software resources. But this doesn’t give accurate results as expected. WMI exposes only the resources that are active. Due to this reason, we can’t list out the software that is not actively running.

In any case, we can find out the OS details, and other software which were running services on OS. The other software information installed on that system can be retrieved as and when that software is running. Another glitch here is not all software products support information exchange through WMI object.

We may use Win32_InstalledSoftwareElement.Software namespace to optimize our search for installed software components.

Module 8: Enumerating Running Processes & Controlling

In this module, we are going to bring out three different things as and when they are running. This doesn’t mean that SRC is going to watch these issues for every second. This certainly adds up the already running processes and becomes extra load on CPU diminishing its performance.

  • Processes
  • Threads
  • Handles

WMI object doesn’t give differentiated list of processes, threads and handles, instead it gives all in a pool. We should programmatically regroup all these. We may even go to the extent of finding the length of each process, or thread in terms of time. The CPU utilization for all these processes will be done in a separate module which will be detailed in

Module 10

We are going to look at these issues, either at pre-defined intervals of time, and results will be logged for future reference or at the administrator click of a mouse button on the corresponding control. Of these the first option is not implemented in the current version, and is planned for the next release.

Module 9: Memory Utilization

This and the next modules are extension of the previous module. These modules use the same objects of WMI along with additional CIMV2 classes and namespaces to find out the memory and its utilization.

Generally, we will display the selected systems memory details under the following heads.

  • Page File
    • Total Size
    • In Use
    • In Use (Max)
    • Free
  • Physical Memory
    • Total
    • Available
  • Virtual Memory
    • Total Size
    • In Use
    • In Use (Max)
    • Free
  • Totals
    • Processes
    • Threads
    • Handles

This detailed structure of memory utilization will help the network administrator to find out the optimum utilization of memory. He can also control the memory leaks when some unnecessary processes, handles or threads are consuming extra chunks of memory by killing those. These killing processes, handles and threads will be dealt in same module but under another sub module.

Module 10: CPU Utilization

To find out the CPU utilization, we don’t require any separate WMI object. As said earlier, we can use the Module 8’s objects with little tweaking. We are going to exploit the CIMV2 sub classing options here.

In general, CPU will be used only to do one or the other kind of processing. All these processes can be listed out using the Module 8’s functionality. If we finds out each process, thread or handle’s CPU utilization along with its memory utilization, we can have total and averages of CPU utilization at any given point of time.

Module 11: Broadcasting & Sending Messages

These are the simplest tasks of the SRC project. There is nothing we need to do great programming to perform broadcasting and sending messages to groups of systems or even individual systems.

We can simply use the system calls (nothing but system network related API calls).

Module 12: Log Off, Reboot, & Shutdown

Module 13: Saving the Results

Module 14: Graph Display (*)

Module 15: Reports (*)

Conclusion

The project undertaken is useful for Controlling of System resources.

Useful for maintaining system integrity, functionality and  to increase performance of the system.

By the Use of VB.net process for execution makes it easier to work with and also it a very user interactive.