multi user protocol
TRANSCRIPT
-
7/30/2019 Multi User Protocol
1/64
MULTI-PROTOCOL BROWSER
A project Report Submitted to
MOTHER TERESA WOMENS UNIVERSITY KODAIKANAL
in partial fulfillment of the requirements for the award of the Degree of
Master of Science in Computer Science
Submitted by
M.SUBA
Reg.no : 113MCS018
Under the Guidance of
Dr.(Mrs).S.RASATHIM.C.A, M.Phil.,
DEPARTMENT OF COMPUTER SCIENCE
M.V.MGOVT. ARTS COLLEGE FOR WOMEN
(Affiliated to Mother Teresa Womens University, Kodaikanal)
Dindigul624001
April 2013
-
7/30/2019 Multi User Protocol
2/64
CERTIFICATE
This is to certify that the Project entitled MULTI-PROTOCOL BROWSER is
abonafide work done by M.SUBA, Reg No:113MCS018 submitted in partial fulfillment
of requirements for the award of the degree Master of Science in Computer Science,
M.V.M Govt. Arts College for Women, Dindigul during the academic year 2012-2013
under my supervision.
INTERNAL GUIDE HEAD OF THE DEPARTMENT
Submitted for the VivaVoce Examination held on
INTERNAL EXAMINER EXTERNAL E XAMINER
-
7/30/2019 Multi User Protocol
3/64
DECLARATION
M.SUBA
M.Sc(Computer Science)
113MCS018
M.V.M Govt. Arts College for Women,
Dindigul.
Hereby I declare that the project entitled MULTI-PROTOCOL BROWSER
submitted to M.V.M Govt. Arts College for Women, Dindigul for the award of
Degree of Master of Science in Computer Science, is my original work and that it has
not been previously done for the award of any degree, diploma or any other title.
Signature of the Candidate
Place:
Date:
-
7/30/2019 Multi User Protocol
4/64
ACKNOWLEDGEMENT
I hereby acknowledge my deep sense of gratitude and sincere thanks to Dr.Mrs.C.PadmaLatha M.Sc.,Ph.D., Principal, M.V.M Govt. Arts College for women, Dindigul
for have permitted me to undergo the project work.
I am extremely thankful to Dr.Mrs.A.Pethalakshmi M.Sc., M.Phil., Ph.D., the Head,
Department of Computer Science, for her encouragement in completing the project
successfully.
I sincerely thank my guideDr.Mrs.A.Pethalakshmi M.Sc., M.Phil., Ph.D., the
Head, Department of Computer Science,for herinspiring guidance and encouragement
to complete the project work in a successful manner.
I also express my sincere thanks to my class in-charge Mrs. S.RAJATHI M.C.A.,
M.Phil., Assistant professor and other staff members of our department for theirsupport and assistance provided to complete the project work .
I sincerely thank to our lab programmer Mrs.N.Manimala M.A., M.Phil.,
I deeply thank to my parents, sister and friends for their encouragement in preparing
this work.
Above all I thank the almighty for blessings showered all throughout the execution of
the project work.
(M.SUBA)
-
7/30/2019 Multi User Protocol
5/64
CONTENTS
-
7/30/2019 Multi User Protocol
6/64
TABLE OF CONTENTS
CHEPTER
NO
TITLE PAGE NO
1.
2.
3.
4.
5.
6.
7.
8.
INTRODUTION
1.1 About the Project
1.2 About the Organization
SYSTEM ANALYSIS
2.1 Existing System
2.2 Proposed System
SYSTEM SPECIFICATION
3.1 Hardware Specification
3.2 Software Specification
3.3 Software Description
SOFTWARE ARCHITECTURE
4.1 Modules
4.2 Modules Description
SYSTEM DESIGN
4.3 Data Flow Diagram
4.4 DataBase Design
SYSTEM TESTING
SYSTEM IMPLEMENTATION
CONCLUSION
BIBLIOGRAPHY
APPENDIX
Screen Shots
-
7/30/2019 Multi User Protocol
7/64
ABSTRACT
The aim of this project is to implement a integrated application that allows to transfer
files between a variety of systems, including Windows ,UNIX and MAC. It includes the
samba client, NFS client, ftp client and web browser. It includes integration of protocols
in a platform independent environment so that a single interface can support protocols
like FTP, HTTP, SMB and NFS.
The following points support our idea:-
o Internet Explorer supports protocols like HTTP, FTP but not NFS.o To use Samba protocol, Samba client is required in linux.
-
7/30/2019 Multi User Protocol
8/64
INTRODUCTION
-
7/30/2019 Multi User Protocol
9/64
CHAPTER 1
INTRODUCTION
1.1 ABOUT THE PROJECT
Now days Many platform corporation has been raised with different empower andenrichment techniques.
So people using different platform according to their requirement has raisedenormously .
So some page developed in various platform run across internet , which may losssome data because of cross platform nature.
The project is implemented in java. The user friendly interface is developed using
swing. It contains a web-browser, ftp client, ntfs client and Samba client.
FTP Client: - FTP has had a long evolution over the years. The first proposed file
transfer mechanisms in 1971 that were developed for implementation on hosts at M.I.T.
(RFC 114). This was the start in the evolution of much friendly FTP protocol. The
objectives of FTP are
1) To promote sharing of files (computer programs and/or data)
2) To encourage indirect or implicit (via programs) use of remote computers
3) To shield a user from variations in file storage systems among hosts
4) To transfer data reliably and efficiently.
-
7/30/2019 Multi User Protocol
10/64
NFS Client:- The Sun Network File system (NFS) protocol provides transparent remote
access to shared files across networks. The NFS protocol is designed to be portable
across different machines, operating systems, network architectures, and transport
protocols. This portability is achieved through the use of Remote Procedure Call
(RPC).Implementations already exist for a variety of machines, from personal
computers to supercomputers.
The supporting mount protocol allows the server to hand out remote access privileges to
a restricted set of clients. It performs the operating system-specific functions that allow,
for example, to attach remote directory trees to some local file system.
The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed,
collaborative, hypermedia information systems. HTTP is the foundation of data
communication for the World Wide Web.
The standards development of HTTP was coordinated by the Internet Engineering Task
Force (IETF) and the World Wide Web Consortium (W3C), culminating in the
publication of a series ofRequests for Comments (RFCs), most notably RFC 2616 (June
1999), which defines HTTP/1.1, the version of HTTP in common use.
HTTP Browser: - The Hypertext Transfer Protocol (HTTP) is an application-level
protocol for distributed, collaborative, hypermedia information systems. It is a generic,
stateless, protocol which can be used for many tasks beyond its use for hypertext, such
as name servers and distributed object management systems, through extension of its
request methods, error codes and headers. A feature of HTTP is the typing and
negotiation of data representation, allowing systems to be built independently of the
data being transferred.
Samba Client:- The Common Internet File System (CIFS), also known as Server
Message Block (SMB), is a network protocol whose most common use is sharing files on
a Local Area Network (LAN). The protocol allows a client to manipulate files just as if
they were on the local computer. Operations such as read, write, create, delete, and
rename are all supported. The only difference being that the files are not on the local
computer and are actually on a remote server. The CIFS protocol works by sending
http://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/World_Wide_Web_Consortiumhttp://en.wikipedia.org/wiki/Requests_for_Commentshttp://tools.ietf.org/html/rfc2616http://tools.ietf.org/html/rfc2616http://en.wikipedia.org/wiki/Requests_for_Commentshttp://en.wikipedia.org/wiki/World_Wide_Web_Consortiumhttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/Internet_Engineering_Task_Forcehttp://en.wikipedia.org/wiki/World_Wide_Web -
7/30/2019 Multi User Protocol
11/64
packets from the client to the server. Each packet is typically a basic request of some
kind, such as open file, close file, or read file. The server then receives the packet,
checks to see if the request is legal, verifies the client has the appropriate file
permissions, and finally executes the request and returns a response packet to the client.
Introduction to the Web Browser Interface
PROTOCOL
The information exchanged between devices on a network or other communications
medium is governed by rules or conventions that can be set out in a technicalspecification called a communication protocol standard. The nature of the
communication, the actual data exchanged and any state-dependent behaviors are
defined by the specification.
In digital computing systems, the rules can be expressed by algorithms and data
structures. Expressing the algorithms in a portable programming language, makes the
protocol software operating system independent.
Operating systems are usually conceived of as consisting of a set of cooperating
processes that manipulate a shared store (on the system itself) to communicate with
each other. This communication is governed by well-understood protocols. These
protocols can be embedded in the process code itself as small additional code fragments.
In contrast, communicating systems have to communicate with each other using shared
transmission media, because there is no common memory. Transmission is not
necessarily reliable and can involve different hardware and operating systems on
different systems.
To implement a networking protocol, the protocol software modules are interfaced with
a framework implemented on the machine's operating system. This framework
implements the networking functionality of the operating system. The best known
frameworks are the TCP/IP model and the OSI model.
http://en.wikipedia.org/wiki/State_%28computer_science%29http://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/TCP/IP_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/OSI_modelhttp://en.wikipedia.org/wiki/TCP/IP_modelhttp://en.wikipedia.org/wiki/Operating_systemhttp://en.wikipedia.org/wiki/State_%28computer_science%29 -
7/30/2019 Multi User Protocol
12/64
At the time the Internet was developed, layering had proven to be a successful design
approach for both compiler and operating system design and, given the similarities
between programming languages and communication protocols, layering was applied to
the protocols as well. This gave rise to the concept of layered protocols which nowadays
forms the basis of protocol design.
Systems typically do not use a single protocol to handle a transmission. Instead they use
a set of cooperating protocols, sometimes called a protocol family or protocol suite.
Some of the best known protocol suites include: IPX/SPX, X.25, AX.25, AppleTalkand
TCP/IP.
The protocols can be arranged based on functionality in groups, for instance there is agroup of transport protocols. The functionalities are mapped onto the layers, each layer
solving a distinct class of problems relating to, for instance: application-, transport-,
internet- and network interface-functions.To transmit a message, a protocol has to be
selected from each layer, so some sort of multiplexing/demultiplexing takes place. The
selection of the next protocol is accomplished by extending the message with a protocol
selector for each layer.
http://en.wikipedia.org/wiki/IPX/SPXhttp://en.wikipedia.org/wiki/X.25http://en.wikipedia.org/wiki/AX.25http://en.wikipedia.org/wiki/AppleTalkhttp://en.wikipedia.org/wiki/TCP/IPhttp://en.wikipedia.org/wiki/TCP/IPhttp://en.wikipedia.org/wiki/AppleTalkhttp://en.wikipedia.org/wiki/AX.25http://en.wikipedia.org/wiki/X.25http://en.wikipedia.org/wiki/IPX/SPX -
7/30/2019 Multi User Protocol
13/64
1.2 ABOUT THE ORGANIZATION
LAMBENT Academic support program to bridge the academics-industry divide
Every career aspiring student wants to study to get a job. LAMBENT focusses tosupport a student to complete his / her degree so as to get a job. LAMBENT academic
support solutions enhance the employability to bridge the ever widening Academics-Industry
divide.
LAMBENT launched EdCademy, the academic support programme for Engineering,
and Management students to provide the much needed support for the student to complete a
degree so as to get a job. Under this programme, LAMBENT conducts Promptive Metrics
based Learning (PML) methods to enhance the performance of students in their semester
exams so that their placement prospects become better as they move to final year campus
programmes. EdCademy at the outset offers three engines of support viz., Learning Engine
(LE), Assessment Engine (AE), and Placement Engine (PE).
EdCademy assures a better students performance rating in their core degree subjects
and assessment essentials. This is achieved by continuous assessments that can be forced
upon to every student by the concerned HoD by unlimited access to EdCademys LearningEngine (LE). Further, before the semester exam, a student can attempt many model papers of
a particular subject which the student feels tough to pass or score high through the
Assessment Engine (AE) of EdCademy. Final year students can also access for unlimited job
positions through Placement Engine (PE) of EdCademy by which virtually an e-campus
interview can be organized which could land a student in a job offer much before he / she
completes the course.
EdCademy is planned for other Universities in other states as well. EdCademy is well
supported by EdClass, a product that makes a student to meet a tutor in a virtual class
network (VCN)to clarify doubts and also to get quick lectures on important and difficult
topics. There will be both live and pre-recorded sessions in EdClass.
EdCademy with EdClass is sure to simplify the process of passing exams and getting
degree with better grades. Students with EdCademy of LAMBENT can look for right
placements with clients already getting the information and screening them for theirperformance which are given as footprints by the LAMPS system seamlessly in web network.
-
7/30/2019 Multi User Protocol
14/64
About LAMBENT
LAMBENT is World's first 4th generation education company that uses technology to
efficiently synchronize manpower demand and supply in number and skills right from
development to deployment. The size of India's addressable market, favorable demography,
growing acceptance of technology-aided learning, and LAMBENT innovative Humanware
Education And Deployment System (HEADS) coupled with its trademarked content enable
rapid growth. Its business model is scalable nationally and internationally.
LAMBENT Softsystems Limited is incepted in Mar 2001 as Lambent Softsystems P
Ltd., with an objective of providing niche training solutions, customised software solutions,
and placement consulting on contract as well as permanent basis to both Corporate andInstitutional clients. The company successfully provided staffing solutions to premier clients
during 2002 to 2004 viz., TI Group, TVS Group, Office Tiger, KSB Pumps, Infosys
Technologies, HCL Technologies, Shasun Chemicals, Hexaware Technologies, Ashok
Leyland, Seshasayee Paper & Boards among others. LAMBENT acquired ELMAQ
EDUCATION, leading IT Training brand in the South in the year 2007 to move aggressively
in Education & Training space. LAMBENT employs e-learning and has patented the
education models which seamlessly control the complete learning life-cycle of a student from
development to deployment in a web controlled framework. LAMBENT holds copyrighted e-
contents covering over a dozen domains and verticals.
LAMBENT is promoted by Mr. S. Giridharan, as senior technocrat of Indian IT space
who is a pioneer in Job oriented education of 90's. He has over 2 decades of experience in
Education having been instrumental in the success of SSI and Radiant education brands.
Giridharan later led ELMAQ education brand and subsequently sold to Lambent and merged
all the businesses under LAMBENT.
LAMBENT provides job linked next generation education through Integrated
Learning Model (ILM). LAMBENT EdCenters, EdCampuses, and EdCademys are partner-
led and in-campus online contact centers which are spread across India and South Asia
providing education & placement through ILM.
Offerings
-
7/30/2019 Multi User Protocol
15/64
SCHOOLS PRESCHOOL: Powerful and magnificent channel of 3 D animation videos
specially designed for your child. Interactive learning just a click away. A
program designed for your child keeping in mind the various levels of
aspirations from basic to advanced. Come and explore this unique interactive
education platform with your child today. With illustrations in the form of
stories, games, quizzes and more..your child will find it engaging and you
useful. Enjoy, explore and measure your child's development with interesting
and captivating graphics like never before.
PRIMARY: Powerful and magnificent channel of 3 D animation videosspecially designed for your child. Interactive learning just a click away. A
program designed for your child keeping in mind the various levels of
aspirations from basic to advanced. Come and explore this unique interactive
education platform with your child today. With illustrations in the form of
stories, games, quizzes and more. Your child will find it engaging and you
useful. Enjoy, explore and measure your child's development with interesting
and captivating graphics like never before.
MIDDLE: The best way to build a Nation is at Foundation The SMARTC.A.P program - Learning Concepts.Application and Problem solving. Lays
solid foundation for your preparation for Olympaids/NTSE and similar exams.
SECONDARY: LAMBENT is fully cognizant of your problems of getting theexpert tutor, wasting more of your productive time in travelling, paying high
fees, and still scoring less marks in your relentless pursuit to look for a perfect
tuition support for your subjects.Our solution is to connect you to expert tutors
live from the comfort of your home at a fraction of the tuition fee that you are
paying or will be paying.
HIGHER SECONDARY:
-
7/30/2019 Multi User Protocol
16/64
TEST PREP
IITJEE: Our unique program provides the following contents to prepare youadequately for the rigors of the IITJEE exam:
i. 81 Exhaustive chapters covering all topics prescribed for IITJEE.ii. 2500+ videos containing lectures by senior professors and top IITians
covering everything from the very basic fundamentals and tips, tricks
and shortcut methods to help you solve advanced level IIT JEE
Problems.
iii. Exposure to about 10000+ unique problems spread over the IITJEEsyllabus
iv. tate-of-the-Art Assessment Engine with an extensive online databaseof thousands of questions exactly on the level of IITJEE examination
to build your speed and accuracy thereby ensuring nothing is left to
chance
v. 20 hours of access to IITJEE learning module and Assessment Engine.AIEEE: Our unique program provides the following contents to prepare you
adequately for the rigors of the AIEEE exam:
vi. 60 chapters spanning all topics in AIEEE across physics, chemistryand mathematics
vii. 1400+ videos containing lectures by senior professors coveringeverything from the very basic fundamentals and tips, tricks and
shortcut methods to help you solve advanced level AIEEE Problems.
viii. Exposure to about 5000+ unique problems spread over the AIEEEsyllabus
ix. State-of-the-Art Assessment Engine with an extensive online databaseof thousands of questions exactly on the level of AIEEE examination
to build your speed and accuracy thereby ensuring nothing is left to
chance.
x. Get access to AIEEE learning module and Assessment Engine. OLYMPAID: The Central Board of Secondary Education conducts the
National Informatics Olympiad in collaboration with the Indian Association
for Research in Computing Science (IARCS), Mumbai, across the country and
-
7/30/2019 Multi User Protocol
17/64
abroad. The examination which is held in two stages is open to all the students
of classes VIII to XII studying in CBSE schools as well as other Boards in the
country. At lampsglow we believe the best way to build a Nation is at
Foundation. The SMART C.A.P program - Learning Concepts. Application
and Problem solving. The program lays a solid foundation for your childs
preparation for Olympaids and similar exams.
NTSE: NCERT awards 1000 Scholarships to the talented students of ClassVIII each year through its National Talent Search Scheme and then nurture the
talent by way of providing financial assistance in the form of both monthly
scholarship and annual book grant. At lampsglow we believe the best way to
build a Nation is at Foundation. The SMART C.A.P program - Learning
Concepts.Application and Problem solving. The program lays a solid
foundation for your childs preparation for NTSE and similar exams.
UNDERGRADUATE/POST GRADUATE
IT SKILLS: LAMBENT brings 7 IT courses that matter most to the studies ofan undergraduate or anyone looking to enhance their career at every stage of
growth. To access all and read through those 7 star courses viz., Computer
Fundamentals, MS-Office, C, C++, Java, Softskills, and Numerical Ability
and more.
ENGINEERING STUDY: Taking education to your door steps. For all thosestudents looking at improving and enhancing their academic endeavors
LAMBENT offers video lessons that enhance the quality of your revisions and
re revisions. Revisions that are the the most crucial part of exam preparation,
are just a click away. Take the lessons anytime, anywhere at your
convenience.
ENGINEERING PREP: For aspiring Engineers of Anna University and AllIndia Engineering exams can pass your ANNA UNIVERSITY Engineering
Semester or Engineering exams easily by scoring high marks. LAMBENT
offers unlimited Access to MODEL TEST PAPERS through our online
LAMBENT LAMPSGLOW anywhere, anytime to clear your arrears and to
look for careers ! "Practice until you perfect - try it and experience the
-
7/30/2019 Multi User Protocol
18/64
perfection that you so much wanted. Appear in your exams with greater
confidence. Engineering support tests has practice papers just for that."
Partners
A Distributor is appointed for each postal pin code. Distributor is authorized to sell all
products displayed under LG through dealer's network. Distributor can enter LG site and
create his/her own login under the distributors column at no cost basis which will be
exclusively owned by the distributor. The entry Fee for a distributor per pin code is nominal
considering the marketing support they would get in their region from us. A Distributor gets
the edcredits in his/her login and also in his mobile phone as registered in LG.
The distributor then appoints Dealers under his area of operation viz: the pin code for
which the distributor has paid. A distributor has the freedom to appoint as many dealers as
possible in the said pin code . Upon receiving payment from dealers , a distributor has to
transfer part of EdCredits as agreed to the dealer which can done through by transferring the
same from distributors login to dealers login.
A distributor can sell the stocks to none other than registered and paid up dealers.
Payment towards Edcredit transfer paid by dealer to distributor.
Clients Benefits
Industry that benefits out of HEADS model is wide. Both IT and non-IT verticals and
domains are addressed. The divide between the academics and industry is ever widening
especially after India is projected as a sole source for humanware in Information Technology
sector. Institutions focus so much on IT that core industry suffers from lack of qualified and
trained resources.
LAMBENT as a strategy focuses in generating competent fresher for non-IT domains
upto 70% of its business. It is expected that a lot of support would come from the student
resources for non-IT positions considering the fact that the core industries pay-packs are
better and the student's knowledge levels are low at the moment about non-IT opportunities.
Further the HEADS model is strictly automated upto a job offer after a strict training and
assessment.
-
7/30/2019 Multi User Protocol
19/64
A client company, as industry, is always looking at employable manpower resource as
a fresher at volumes. With LAMBENT HEADS model, the client company can breathe easy
and plan the project schedules better with pre-determined lead time in a proactive way. The
LAMPS portal has its entry point for every such client who can enter their preferences,
candidate's background, curriculum essentials with assessment criteria, and commit on a
defined job offers.
With rupee appreciating, it may sound interesting for companies to look into our one-
stop-shop solution of providing them with the exact set of their dream resources by taking
care of the following:
The exact requirements of fresher and the lead-time before they have to be inductedinto your actual project
Entry-level criteria The curriculum of training to be done on them The choice of colleges The choice of academic excellence The likely compensation package vs qualification and training performance The other wish-list in terms of job-fitment straight from the college
Once clients sign-up with us with all those crucial information as your specification, they
are put up in their own digital-dashboard of what is going on from inside our automated
learning system for their selected chunks of fresher registered through our dealer gateways.
Rather their HR is directed through our digital window right from the time of the course
enrolment up to the final grading out of the regular ILT sessions with strictly controlled
assessments as per their specification What's more, the exactly matched resources to client'sspecification automatically get their Job Intent on your approval from their HR who operates
in our system through a secured access login on a continuous basis.
The specifications as well as their selected resources are secured and protected till the
end. Enough flexibility is given in our model to ensure a client doesn't lose out any including
the timeframe that they are waiting for. A client may not step out of their office to achieve
this 100% matched-resource-making exercise. And all these may cost a client as low as 20%
of the cost-burn otherwise spent on their own exercise of trial-runs!
-
7/30/2019 Multi User Protocol
20/64
Investors
LAMBENT is Indias only company to have seamelessly integrated education and
placement end-to-end in partner based web network. LAMBENT focusses on the bottom of
the pyramid, the Real India, the hugely recession-proof market having the continuous need
for affordable education and a career growth path and guidance.
LAMBENT came out with the IPO successfully in February 2009 and is now listed in
BSE and NSE, India's premier stock exchanges. LAMBENT has consolidated its presence in
Tamil Nadu as a principal job linked e-learning solution provider through partner driven
network for the masses growing significantly from 35 odd partner centers just before IPO to
200 by Aug 2009. The company rolled out EdCampus, EdCademy, and EdCenters with
EdClass that offer learning, jobs, metrics, and live lectures online and in-campus.
The LAMBENT strives to provide the next generation education system that matches
demand-supply in scale and quality, reach and spread, and bridges the Academics-Industry
divide by technology-led, career integrated learning framework through its last mile
stretching network.
The future plans include providing end-to-end school solutions to guide every student
from K-12 to Careers. Comprehensive industry demand aligned education shall be deployed
to schools. LAMBENT believes strongly that students at their younger age are in a better
position to seed with apt careers by way of skill developments with industry orientation
suiting to their aptitude and the flair for excellence in a particular field.
-
7/30/2019 Multi User Protocol
21/64
SYSTEM ANALYSIS
-
7/30/2019 Multi User Protocol
22/64
CHAPTER 2
SYSTEM ANALYSIS
System analysis is a process of gathering the facts concerning the system breaking them
into elements and relationship between elements. It provides a framework for visualizing the
organizational and environmental factors that operate on a system. The quality of work
performed by a machine is usually uniform, neat and more reliable when compared to doing
the same operations manually.
2.1EXISTING SYSTEM
Existing system based on single platform It cannot support multiple platform file system An additional modification is required for the implementing platform. File can corrupted or cannot be implement in various platform while
implementation.
May lead to Data Losses.
2.2PROPOSED SYSTEM
This project includes integration of protocols in a platform independentenvironment so that a single interface can support protocols like FTP, HTTP,
SMB and NFS.
The following points supports our idea:-
Internet Explorer supports protocols like HTTP, FTP but not NFS. To use Samba protocol, Samba client is required in linux.
-
7/30/2019 Multi User Protocol
23/64
SYSTEM SPECIFICATION
-
7/30/2019 Multi User Protocol
24/64
CHAPTER 3
SYSTEM SPECIFICATION
3.1 HARDWARE SPECIFICATION
Processor : Pentium IV
RAM : 128 MB
Hard disk : 20 GB
FDD : 1.44MB
Monitor : 14 inch
Mouse : 3 Button scroll
CD Drive : 52 X
Keyboard : 108 keys
3.2SOFTWARE SPECIFICATION
Operating System : Windows 2000/xp/2007
Languages : VB.NET 2008
Backend : SQL SERVER
-
7/30/2019 Multi User Protocol
25/64
3.3 SOFTWARE DESCTIPTION
.NET Framework
Now that you are familiar with the major goals of the .NET Framework, let's briefly
examine its architecture. As you can see in Figure 3.2, the .NET Framework sits on top of the
operating system, which can be a few different flavors of Windows and consists of a number
of components. . NET is essentially a system application that runs on Windows.
Fig: 3.1.1 .NET Framework
Conceptually, the CLR and the JVM are similar in that they are both runtime infrastructures
that abstract the underlying platform differences. However, while the JVM officially supports
only the Java language, the CLR supports any language that can be represented in
itsCommon Intermediate Language (CIL). The JVM executes byte code, so it can, in
principle, support many languages, too. Unlike Java's byte code, though, CIL is never
interpreted. Another conceptual difference between the two infrastructures is that Java code
runs on any platform with a JVM, whereas .NET code runs only on platforms that support the
CLR.
The Common Language Runtime
-
7/30/2019 Multi User Protocol
26/64
At the heart of the .NET Framework is the common language runtime. The common
language runtime is responsible for providing the execution environment that code written in
a .NET language runs under. The common language runtime can be compared to the Visual
Basic 6 runtime, except that the common language runtime is designed to handle all .NET
languages, not just one, as the Visual Basic 6 runtime did for Visual Basic 6. The following
list describes some of the benefits the common language runtime gives you:
Automatic memory management Cross-language debugging Cross-language exception handling Full support for component versioning Access to legacy COM components XCOPY deployment Robust security model
You might expect all those features, but this has never been possible using Microsoft
development tools. Figure 4.1.2 shows where the common language runtime fits into the
.NET Framework.
Fig: 3.1.2 The common language runtime.
-
7/30/2019 Multi User Protocol
27/64
Code written using a .NET language is known asmanaged code. Code that uses
anything but the common language runtime is known as unmanaged code. The common
language runtime provides a managed execution environment for .NET code, whereas
theindividual runtimes of non-.NET languages provide an unmanaged execution
environment.
Inside the Common Language Runtime
The common language runtime enables code running in its execution environment to have
features such as security, versioning, memory management and exception handling because
of the way .NET code actually executes. When you compiled Visual Basic 6 forms
applications, you had the ability to compile down to native node or p-code.
Fig: 3.1.3 Visual Basic 6 compiler options dialog.
When you compile your applications in .NET, you aren't creating anything in native
code. When you compile in .NET, you're converting your codeno matter what .NET
language you're usinginto an assembly made up of an intermediate language called
Microsoft Intermediate Language.
The file format for the IL is known as PE (portable executable) format, which is a standard
format for processor-specific execution.
-
7/30/2019 Multi User Protocol
28/64
When a user or another component executes your code, a process occur called just-in-
time (JIT) compilation, and it's at this point that the IL is converted into the specific machine
language of the processor it's executing on. This makes it very easy to port a .NET
application to any type of operating system on any type of processor because the IL is simply
waiting to be consumed by a JIT compiler.
When the IL code is JITted into machine-specific language, it does so on an as-needed
basis. If your assembly is 10MB and the user is only using a fraction of that 10MB, only the
required IL and its dependencies are compiled to machine language. This makes for a very
efficient execution process. But during this execution, how does the common language
runtime make sure that the IL is correct? Because the compiler for each language creates its
own IL, there must be a process that makes sure what's compiling won't corrupt the system.
The process that validates the IL is known asverification. Figure 4.1.4 demonstrates the
process the IL goes through before the code actually executes.
Fig: 3.1.4 The JIT process and verification
When code is JIT compiled, the common language runtime checks to make sure that the
IL is correct. The rules that the common language runtime uses for verification are set forth
in the Common Language Specification (CLS) and the Common Type System (CTS).
-
7/30/2019 Multi User Protocol
29/64
The .NET Framework Class Library
The second most important piece of the .NET Framework is the .NET Framework class
library (FCL). As you've seen, the common language runtime handles the dirty work of
actually running the code you write. But to write the code, you need a foundation of available
classes to access the resources of the operating system, database server, or file server. The
FCL is made up of a hierarchy of namespaces that expose classes, structures, interfaces,
enumerations, and delegates that give you access to these resources.
The Structure of a .NET Application
To understand how the common language runtime manages code execution, you must
examine the structure of a .NET application. The primary unit of a .NET application is the
assembly. An assembly is a self-describing collection of code, resources, and metadata. The
assembly manifest contains information about what is contained within the assembly.
The assembly manifest provides:
Identity information, such as the assemblys name and version number A list of all types exposed by the assembly A list of other assemblies required by the assembly A list of code access security instructions, including permissions required by the
assembly and permissions to be denied the assembly
Each assembly has one and only one assembly manifest, and it contains all the
description information for the assembly. However, the assembly manifest can be contained
in its own file or within one of the assemblys modules.
Compilation and Execution of a .NET Application
When you compile a .NET application, it is not compiled to binary machine code;
rather, it is converted to IL. This is the form that your deployed application takesone or
more assemblies consisting of executable files and DLL files in IL form. At least one of these
assemblies will contain an executable file that has been designated as the entry point for the
application.
-
7/30/2019 Multi User Protocol
30/64
When execution of your program begins, the first assembly is loaded into memory. At
this point, the common language runtime examines the assembly manifest and determines the
requirements to run the program. It examines security permissions requested by the assembly
and compares them with the systems security policy. If the systems security policy does not
allow the requested permissions, the application will not run. If the application passes the
systems security policy, the common language runtime executes the code. It creates a
process for the application to run in and begins application execution.
The .NET Framework base class library contains the base classes that provide many of
the services and objects you need when writing your applications. The class library is
organized into namespaces. A namespace is a logical grouping of types that perform related
functions. Namespaces are logical groupings of related classes. The namespaces in the .NET
base class library are organized hierarchically. The root of the .NET Framework is the
System namespace. Other namespaces can be accessed with the period operator. A typical
namespace construction appears as follows:
System
System.Data
System.Data.SQLClient
The first example refers to the System namespace. The second refers to the System.Data
namespace. The third example refers to the System.Data.SQLClient namespace. Table 1.1
introduces some of the more commonly used .NET base class namespaces.
Introduction to Object-Oriented Programming
Programming in the .NET Framework environment is done with objects. Objects are
programmatic constructs that represent packages of related data and functionality. Objects are
self-contained and expose specific functionality to the rest of the application environment
without detailing the inner workings of the object itself. Objects are created from a template
called a class. The .NET base class library provides a set of classes from which you can
create objects in your applications. You also can use the MicrosoftVisual Studio
programming environment to create your own classes. This lesson introduces you to the
concepts associated with object-oriented programming.
-
7/30/2019 Multi User Protocol
31/64
Objects, Members, and Abstraction
An object is a programmatic construct that represents something. In the real world,
objects are cars, bicycles, laptop computers, and so on. Each of these items exposes specific
functionality and has specific properties. In your application, an object might be a form, a
control such as a button, a database connection, or any of a number of other constructs. Each
object is a complete functional unit, and contains all of the data and exposes all of the
functionality required to fulfill its purpose. The ability of programmatic objects to represent
real-world objects is called abstraction.
Classes Are Templates for Objects
Classes were discussed in Chapter 1 and represent user-defined reference types.
Classes can be thought of as blueprints for objects: they define all of the members of an
object, define the behavior of an object, and set initial values for data when appropriate.
When a class is instantiated, an in-memory instance of that class is created. This instance is
called an object. To review, a class is instantiated using the New (new) keyword as follows:
Visual Basic .NET
' Declares a variable of the Widget type
Dim myWidget As Widget
' Instantiates a new Widget object and assigns it to the myWidget
' variable
myWidget = New Widget()
When an instance of a class is created, a copy of the instance data defined by that class
is created in memory and assigned to the reference variable. Individual instances of a class
are independent of one another and represent separate programmatic constructs.
There is generally no limit to how many copies of a single class can be instantiated at
any time. To use a real-world analogy, if a car is an object, the plans for the car are the class.
The plans can be used to make any number of cars, and changes to a single car do not, for the
most part, affect any other cars.
Objects and Members
-
7/30/2019 Multi User Protocol
32/64
Objects are composed of members. Members are properties, fields, methods, and events,
and they represent the data and functionality that comprise the object. Fields and properties
represent data members of an object. Methods are actions the object can perform, and events
are notifications an object receives from or sends to other objects when activity happens in
the application.
Object Models
Simple objects might consist of only a few properties, methods, and perhaps an event
or two. More complex objects might require numerous properties and methods and possibly
even subordinate objects. Objects can contain and expose other objects as members.
Similarly, every instance of the Form class contains and exposes a Controls collection
that comprises all of the controls contained by the form. The object model defines the
hierarchy of contained objects that form the structure of an object.
Encapsulation
Encapsulation is the concept that implementation of an object is independent of its
interface. Put another way, an application interacts with an object through its interface, which
consists of its public properties and methods. As long as this interface remains constant, the
application can continue to interact with the component, even if implementation of the
interface was completely rewritten between versions.
Polymorphism
Polymorphism is the ability of different classes to provide different implementations
of the same public interfaces. In other words, polymorphism allows methods and properties
of an object to be called without regard for the particular implementation of those members.
There are two principal ways through which polymorphism can be provided: interface
polymorphism and inheritance polymorphism.
Interface Polymorphism
An interface is a contract for behavior. Essentially, it defines the members a class
should implement, but states nothing at all about the details of that implementation. An object
-
7/30/2019 Multi User Protocol
33/64
can implement many different interfaces, and many diverse classes can implement the same
interface. All objects implementing the same interface are capable of interacting with other
objects through that interface.
Inheritance Polymorphism
Inheritance allows you to incorporate the functionality of a previously defined class
into a new class and implement different members as needed. A class that inherits another
class is said to derive from that class, or to inherit from that class. A class can directly inherit
from only one class, which is called the base class. The new class has the same members as
the base class, and additional members can be added as needed. Additionally, the
implementation of base members can be changed in the new class by overriding the base
class implementation. Inherited classes retain all the characteristics of the base class and can
interact with other objects as though they were instances of the base class.
Microsoft Visual Basic.Net
With its release for the .NET platform, the Visual Basic language has undergone
dramatic changes.
For example:
1. The language itself is now fully object-oriented.
2. Applications and components written in Visual Basic .NET have full access to the .NET
Framework, an extensive class library that provides system and application services.
3. All applications developed using Visual Basic .NET run within a managed runtime
environment, the .NET common language runtime.
MICROSOFT OFFICE ACCESS
The previously known as Microsoft Access, is a DBMS that combines the relationalwith a and software-development tools. It is a member of the suite of applications, included
-
7/30/2019 Multi User Protocol
34/64
in the Professional and higher editions or sold separately. On May 12 2010, the current
version of Microsoft Access 2010 was released by Microsoft in Office 2010; Microsoft
Office Access 2007 was the prior version.
MS Access stores data in its own format based on the Access Jet Database Engine. It
can also import or link directly to stored in other applications and databases.
and can use Microsoft Access to develop, and " can use it to build software applications.
Like other, Access is supported by, an programming language that can reference a variety of
objects including DAO (Data Access Objects), Data Objects, and many other ActiveX
components. Visual objects used in forms and reports expose their methods and properties in
the VBA programming environment, and VBA code modules may declare and call Windowsfunctions.
1992: Microsoft released Access version 1.0 on 13 November 1992, and an Access 1.1
release in May 1993 to improve compatibility with other Microsoft products and to include
the Access Basic programming language. 1993: Microsoft specified the minimum hardware
requirements for Access v2.0 as: Microsoft Windows v3.1 with 4 MB of required, 6 MB
RAM recommended; 8 MB of available space required, 14 MB hard disk space
recommended. The product shipped on seven 1.44 MB diskettes. The manual shows a 1993
copyright date.Originally, the software worked well with relatively small databases but
testing showed that some circumstances caused. For example, file sizes over 10 MB proved
problematic (note that most hard disks held less than 500 MB at the time this was in wide
use), and the Getting Started manual warns about a number of circumstances where obsolete
or incorrect configurations can cause. With the phasing out of Windows 95, 98 and ME,
improved network reliability, and Microsoft having released 8 for the Jet, the reliability of
Access databases has improvedand it supports both more data and a larger number of users.
With Office 95, Microsoft Access 7.0 (a.k.a "Access 95") became part of the Microsoft
Office Professional Suite, joining Microsoft Excel, Word, and PowerPoint and transitioning
from Access Basic to Visual Basic for Applications (VBA). Since then, Microsoft has
released new versions of Microsoft Access with each release of Microsoft Office. This
includes Access 97 (version 8.0), Access 2000 (version 9.0), Access 2002 (version 10.0),
Access 2003 (version 11.5), Access 2007 (version 12.0), and Access 2010 (version
14.0).Versions 3.0 and 3.5 of database engine (used by Access 7.0 and the later-released
-
7/30/2019 Multi User Protocol
35/64
Access 97 respectively) had a critical issue which made these versions of Access unusable on
a computer with more than 1 GB of memory. While Microsoft fixed this problem for Jet
3.5/Access 97 post-release, it never fixed the issue with Jet 3.0/Access 95.
The native Access database format (the Jet MDB Database) has also evolved over the years.
Formats include Access 1.0, 1.1, 2.0, 7.0, 97, 2000, 2002, 2007, and 2010. The most
significant transition was from the Access 97 to the Access 2000 format; which is not with
earlier versions of Access. As of 2011 all newer versions of Access support the Access 2000
format. New features were added to the Access 2002 format which can be used by Access
2002, 2003, 2007, and 2010.MS Access 2007 introduced a new database format:. ACCDB
supports complex such as multivalue and attachment fields. These new field types are
essentially recordsets in fields and allow the storage of multiple values in one field. With
Access 2010, a new version of the ACCDB format supports hosting on a SharePoint 2010
server for exposure to the web.Prior to the introduction of Access, and Fox dominated the
desktop database market. Microsoft Access was the first mass-market database program for
Windows. With Microsoft's purchase of FoxPro in 1992 and the incorporation of Fox's
Rushmore routines into Access, Microsoft Access quickly became the dominant database for
Windows - effectively eliminating the competition which failed to transition from the world.
Access's initial codename was Cirrus; the forms engine was called Ruby. This was before
saw the prototypes and decided that the language component should be co-developed as a
separate expandable application, a project called Thunder. The two projects were developed
separately as the underlying forms engines were incompatible with each other; however,
these were merged together again after. Access was also the name of a communications
program from Microsoft, meant to compete with and other programs. This proved a failure
and was dropped.
MS-SQL SERVER
MS SQL Server is a powerful database management system and the user can create
application that require little or no programming. It supports GUI features and an entire
programming language, Visual Studio Application which can be used to develop richer and
more developed application.
There are quite a few reasons, the first being that SQL is a feature rich program
that can handle any database related task you have. You can create places to store your data
-
7/30/2019 Multi User Protocol
36/64
build tools that make it easy to read and modify your database contents, and ask questions of
your data. SQL is a relational database, a database that stores information about related
objects. In MS SQL that database means a collection of tables that hold data. It collectively
stores all the other related objects such as queries, forms and reports that are used to
implement function effectively.
The MS SQL database can act as a back end database for .NET as a front end, MS
SQL supports the user with its powerful database management functions. A beginner can
create his/her own database very simply by some mouse clicks. Another good reason to use
SQL as backend tool is that it is a component of the overwhelmingly popular Microsoft office
software suite.
Internal Integration
The SQL Server 2000 database engine includes integrated XML support. It also the
scalability, availability and security features required to operate as the data storage component
of the largest web sites. The SQL Server 2000 programming models is integrated with the
windows DNA architecture for developing web application, and SQL Server support feature
such as English Query and Microsoft Search Service to incorporate user friendly queries and
powerful search capabilities in web application.
Scalability and Availability
The same database engine can be used across platform ranging from laptop
computing running Microsoft Windows 98 through large, multiprocessors servers running
Microsoft Windows 2000 Data Center Edition.
-
7/30/2019 Multi User Protocol
37/64
SQL Server 2000 Enterprise Edition support feature such as federated servers,
indexed views, and large memory support that allow it to scale to the performance levels
required by the largest Web sites.
FEATURES
Created by Microsoft and Sybase in the 80s. Is SQL Compliant - Uses ANSI SQL Supports SQL92 standards - Uses T-SQL Stores data in a central location and delivers it to clients on request New Server Architecture Graphic Administration Tools Maintains ANSI standards and 6.x Compatibility Data integrity means reliability and accuracy of data. Integrity rules keep data consistent. Supports Client/Server model. Request response dialog.
workload is split between the client and the server
-
7/30/2019 Multi User Protocol
38/64
SOFTWARE ARCHITECTURE
-
7/30/2019 Multi User Protocol
39/64
CHAPTER 4
4.1SOFTWARE ARCHITCTURE
MODULE
This project contains 4 modules. They are
Protocol Implementation File Handler Browser with platform independent Web Crawling
4.2 MODULE DESCRIPTION
Protocol implementation
This module is to have a dynamic link library of protocol which would beselected according to the page and platform
File Handler
This module will check the pocket to identify from which platform and createdin which language in order to instruct to Browser.
Browser with Platform independent
Thus by the support of above modules it provide independent browsingenvironment for user.
Web crawling
This is used to make the tool to interact with internet to support browsing ,mailing and any activities through internet.
-
7/30/2019 Multi User Protocol
40/64
SYSTEM DESIGN
-
7/30/2019 Multi User Protocol
41/64
CHAPTER 5
SYSTEM DESIGN
5.1 DATA FLOW DIAGRAM
-
7/30/2019 Multi User Protocol
42/64
LEVEL1
5.2 DATA BASE DESIGN
BLACK TABLE
S.No Field Name Data Type Description
1 list Text List
2 ipli Text
-
7/30/2019 Multi User Protocol
43/64
HISTORY TABLE
S.No Field Name Data Type Descriptions
1 Sino Number S.NO
2 Site Text site
3 Date Number Date4 Time Number Time
IPL
S.No Field Name Data Type Description
1 Internet Protocol Text
2 Restricted Plats Text
3 date Text date
FILE HISTORY TABLE
S.No Field Name Data Type Description
1 Time Text History
2 Date Text Date
3 Resource Text
-
7/30/2019 Multi User Protocol
44/64
SYSTEM TESTING
-
7/30/2019 Multi User Protocol
45/64
CHAPTER 6
SYSTEM TESTING
6.1 TESTING
INTRODUCTION:
After finishing the development of any computer based application, the next
complicated time consuming process is testing. During the time of testing only the
development company knows that, how far the user requirements have been met. The testing
methods applied to our project are as follows.
Unit Testing Integration Testing Validation Testing Output Testing Acceptance Testing
TESTING METHODOLOGY
UNIT TESTING
Thus it was an networking tool , there are minimal uses of field and values, It was
used in browser. Browser has not provide flexibility in runtime input. In unit testing each
module is tested individually. It focuses the verification efforts on the smallest unit of
software in the module. This is known as module testing.
In the project all the modules are tested separately. For our project testing is
performed at programming stage itself. In this testing each module project is found to work
satisfactorily with regard to the expected output from the module. There are some validations
for fields. The unit testing is performed now and then whenever a patch is delivered for each
module. This makes our project standard. Unit testing comprises the set of tests performed
by an individual programmer
Prior to integration of the unit in to larger system. A program unit is usually small
enough that the programmer who developed it can test it in a great detail. In unit testing the
modules are independent of one another are tested, the test data for unit testing should followeach condition and option this testing helps to find out the errors in coding and option.
-
7/30/2019 Multi User Protocol
46/64
INTEGRATION TESTING
Integration testing is the phase of software testing in which individual software
modules are combined and tested as a group. In this project the parts of a module are tested
first and then it will test some of its parts, integration testing is done successfully. As
browser it has various sub forms and feature which are checked as properly interconnected.
VALIDATION TESTING
As like unit there are minimum field in work to be checked and validated.It begins
after the integration testing is successfully assembled. Validation succeeds when the software
functions in a manner that can be reasonably accepted by the client. In this project, the
majority of the validation is done during the data entry operation where there is a maximum
possibility of entering wrong data. Other validation will be performed in all process where
correct details and data should be entered to get the required results.
OUTPUT TESTING
The form has been run trough according to software description. It was successful in
running mode and perform as per user description. After performing the validation testing,
the next step is output testing of the proposed system since no application would be termed as
useful until it produces the required output in the specified format.
-
7/30/2019 Multi User Protocol
47/64
SYSTEM IMPLEMENTATION
-
7/30/2019 Multi User Protocol
48/64
CHAPTER 7
SYSTEM IMPLEMENTATION
Implementation
Implementation is the stage in the project where the theoretical design of the
project is turned into a working system. It is a stage where the operation of the system ismonitored to ensure that it continues to work effectively. Education and training of the users
are also essential to ensure smooth functioning of the system.
Multi protocol browser is tested and implement as multi platform browser , even it can work
across various platform and file system, On before implementing it through as common tool
each user must be knowledge with what is platform , file system and platform independent
concept. It is design as realtime and common usage software must have real time feedback
must be keenly monitored and changed to provide better solution.
-
7/30/2019 Multi User Protocol
49/64
CONCLUSION
-
7/30/2019 Multi User Protocol
50/64
CHAPTER 8
8.1 CONCLUSION
Thus develop a web browser is a software application for retrieving, presenting, and
traversing information resources on the World Wide Web across multiple platform. An
information resource is identified by a Uniform Resource Identifier(URI) and may be a web
page, image, video, or other piece of content it was result in cross platform browser.
Hyperlinks present in resources enable users easily to navigate their browsers to related
resources. A web browser can also be defined as an application software or program designed
to enable users to access, retrieve and view documents and other resources on the Internet.
http://en.wikipedia.org/wiki/Software_applicationhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Hyperlinkshttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Internethttp://en.wikipedia.org/wiki/Application_softwarehttp://en.wikipedia.org/wiki/Hyperlinkshttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Web_pagehttp://en.wikipedia.org/wiki/Uniform_Resource_Identifierhttp://en.wikipedia.org/wiki/World_Wide_Webhttp://en.wikipedia.org/wiki/Software_application -
7/30/2019 Multi User Protocol
51/64
FUTURE ENHANCEMENT
Thus this tool successfully compile the software incompatibility so this technic can be
implement on other commonly used software.
Other this package can be add us add-on for already existing software.
This software can be made as mobile application to across Android, Windows and Baba
os
It should be ceded to some available software So that currently market running
software can be made as platform independent.
Multiple protocols caught and run through various available platform it should be
made as runtime protocol and file system acceptor.
Thus this tool successfully compile the software incompatibility so this technic can be
implement on other commonly used software.
Other this package can be add us add-on for already existing software.This software
can be made as mobile application to across Android, Windows and Baba of os.
-
7/30/2019 Multi User Protocol
52/64
BIBLIOGRAPHY
CHAPTER 9
BIBLIOGRAPHY
BOOKS REFERENCE
-
7/30/2019 Multi User Protocol
53/64
STEVE HARRIS AND ROBMACDONALD,WEB DEVELOPMENTWITH VB.NET-APRES
MATTHEW MACDONALD,MICROSOFT VISUAL BASIC.NETPROGRAMMERS COOKBOOK -TATA McGraw HILL EDITION
WEBSITE REFERENCE
WWW.3SCHOOL.COMWWW.HRWORKINDIA.COM
-
7/30/2019 Multi User Protocol
54/64
Appendix
APPENDIX
SCREEN SHOTS
-
7/30/2019 Multi User Protocol
55/64
10.1 SCREEN SHORTS
Figure 10.1.1 load protocol and file system
-
7/30/2019 Multi User Protocol
56/64
Figure 10.1.2 set protocol
-
7/30/2019 Multi User Protocol
57/64
Figure 10.1.3 set file system
-
7/30/2019 Multi User Protocol
58/64
Figure 10.1.4 Browser
-
7/30/2019 Multi User Protocol
59/64
Figure 10.1.6 history of browser
-
7/30/2019 Multi User Protocol
60/64
-
7/30/2019 Multi User Protocol
61/64
-
7/30/2019 Multi User Protocol
62/64
-
7/30/2019 Multi User Protocol
63/64
-
7/30/2019 Multi User Protocol
64/64