Network Monitoring and Control System
Network Monitoring and Control System
ON
NETWORK MONITORING & CONTROL SYSTEM
BACHELOR’S OF SCIENCE
IN
INFORMATION TECHNOLOG
SUBMITTED
BY
KARAN LAWAND
2018-2019
1
A PROJECT REPORT
ON
NETWORK MONITORING & CONTROL SYSTEM
BACHELOR’S OF SCIENCE
IN
INFORMATION TECHNOLOGY
SUBMITTED
BY
KARAN LAWAND
Seat No -2016010082
PROJECT GUIDE
Mrs.shwetakhubchandani
2018-2019
2
Abstract
The Aim of this project is to develop software that monitors,control and analyzes
the status and behavior of the systems that make up and automates much of the
regular tasks of the system administer who is responsible for managing the entire
network
3
ACKNOWLEDGEMENT
I take this opportunity to express my profound gratitude and indebtedness to
our project guide Mrs. Shweta khubchandani for giving me this opportunity to
accomplish this project.
I am very much thankful to our Principal Dr. Ajit Kurup and our vice-
principal Dr. Srividya Murali for their kind co-operation in the completion of my
project.
I am also grateful to Mrs. Harman Preet Kaur, Head of Department for
being very much resourceful, kind and helpful. Their positive attitude, unassailable
optimism and unwavering faith in me assured that I come out of the words
whenever I encountered difficult.
Finally, I wish to thank our lab assistant and all my friends and the entire
Computer department who directly or indirectly helped me in the computer of this
project. Last but not the least I would thank my family without those support,
motivation and encouragement this would not have been possible.
4
DECLARATION
I the undersigned Master Karan Sudhakar Lawand hereby, declare that the
work embodied in this project work titled Network Monitoring & Control System
forms my own contribution to the research work carried out under the guidance of
Ms.Shweta khubchandani is a result of my own research work and has not been
previously submitted to any other University for any other Degree/ Diploma to this
or any other University.
Wherever reference has been made to previous works of others, it has been
clearly indicated as such and included in the bibliography.
I will abide and take all responsibility of all issues related to plagiarism/self-
plagiarism mentioned under UNIVERSITY GRANTS COMMISSION
(PROMOTION OF ACADEMIC INTEGRITY AND PREVENTION OF
PLAGIARISM IN HIGHER EDUCATIONAL INSTITUTIONS) REGULATIONS,
2018.
I, here by further declare that all information of this document has been
obtained and presented in accordance with academic rules and ethical conduct.
Certified by Submitted by
5
Plagirism Reports
6
7
8
9
INDEX
1 Introduction 7
1.1 background 8
1.2 scope 9
1.3 object 10
1.4 Appalicability 11
2 Survey of technology 12
14
2.1 proposed system
15
2.2 requirement Hardware
15
2.3 Software requirement
2.4 justification 16
3 System Analysis & Design 18
3.1 Module 19
3.2 User interface 22
3.2transition diagram 29
3.3DFD diagram 33
3.4 Activity diagram 35
3.5 Gant chart 38
10
References 67
8
11
1.INTRODUCTION
12
1.1BACKGROUND
13
1.2OBJECTIVE
Objective
Alerting.
Locking Inputdevices.
14
1.3 Scope of the Project
15
1.3 Applicability
This paper implementation that which is the outcome, would be used at the
frontdesk, other serves terminals and for administrative, and is also applicable to
lower and higher premiums facilities. Further development of this project is opened
to more research for scalable entities.
16
2. Survey of technology
Object Oriented:
Object-oriented programming (OOP) is a powerful way of organizing and
developing software. The short-form description of OOP is that it organizes a
program as a set of components called objects. objects exist independently of
each other, and they have rules for communicating with other object and for
telling those objects to do things. The Java language includes
setofclasslibrariesthatprovidebasicvariabletypes,systeminputandoutput
capabilities, and other functions. It also includes classes to support
networking, Internet protocols, and graphical user interface functions.
17
Platform Independence
Security:
Java provides security on several different levels. Initially, the
language was intended to make it incredibly hard to execute harming
code. By killing all pointers with the exception of a restricted type of
references to objects, Java is a significantly more secure language.
Another dimension of security is the bytecode verifier. Before a Java
program is run, a verifier checks each bytecode to ensure that
nothingsuspiciousisgoingon.
18
2.1 Proposed Approach:
The administrator can send a warning message to the client that he should
stop using the network resources in an incorrect manner. Steps can also be
taken to prevent the user from changing the contents of the machine. If after several
warning messages the user continues to use the network in an incorrect manner then
the administrator can take some corrective measures such as lock the input devices
or turn off the client machine
. The administrator can also use the software for transferring some files to the
desired machines. The software also helps to locate the IP address of the
machine, operating system and its version used by the client.
2.2REQUIREMENT HARDWARE
2.1.1Hardware requirements:
Hardware for implementing TCP/IP Networking.
CPU equivalent or above Intel Celeron 800 MHz.
RAM 128 MB or higher.
Update your content and presentation based on our User’s feedback. When we are
evaluating user feedback, look for trends rather than individual aberrations, such as
one person’s vehement dislike of our color scheme. Pay particular attention to the
ease of access to our information. Clients ought to have the capacity to discover
what they need rapidly.
As this application is for software development purpose we can set up the program
which is beneficial for the developers and which will help them to update their
knowledge in all terms.
For that we have to plan for on-going maintenance of our Web site. This is an area
often neglected in the initial design and budgeting of the application, but it is vital
to the success of the application. Plan to add new links, information, and featured
content continually. The Web is a live, immediately by keeping it fresh. Try to
provide new Updated links or Web pages.
COST AND BENEFITANALYSIS
The procedure includes fiscal estimation of beginning and on-going costs versus
anticipated return. Building conceivable proportions of the expenses and
advantages of explicit activities is frequently extremely troublesome. Practically
speaking, examiners attempt to assess expenses and advantages either by utilizing
review techniques or by illustration surmisings from market conduct. Money saving
advantage examination endeavors to put every important expense and advantages
on a typical worldly balance. A rebate rate is picked, which is then used to figure all
significant future expenses and advantages in present-esteem terms.
3. SYSTEM ANALYSIS AND DESIGN
1. Requirement:
It involves studying different algorithms, deciding on a platform (OS) to work on
and looking for different technologies to work with.
2. Analysis: in this phase, the appropriate algorithm and technology are selected,
the functions are defined and a feasibility study is carried out.
4. Design: the architecture, software flow rate, algorithm and user interface are
all designed here.
Requirement Specification
Modified
Analysis of System
Waterfall
Design of System
Coding
Fix Model
Code Testing & Maintenance
Steps: User interface configuration starts with the distinguishing proof of client, task,
and ecological prerequisites.
Users: Network Administrators of the Organization will use utilities
provided by Remote Desktop Monitor for performing various
Operations over Remote Clients.
Tasks:The user shall be able to view graphically all the client systems
connected to the Remote Desktop Monitor Server program.The user
shall be able to select any number of systems and accordingly perform
any of the operations available and applicable to that client.
Look up components
Construct nth
in library
iteration of system
Put new
Extract components
components in
if available
library
Build components if
unavailable
Functional Description
The main functions which are used to logically build the whole system given
below:
Read Input:
This function reads the input commands from user on the server
side by entering some data using Keyboard or through mouse click on
the menu
Establish Session:
This is the centralized and general server function which makes the
connection between client and server and create a separate session for
every connection. This stores information regarding each client
connection and sends it to appropriate handler.
Grab Image:
GrabImage is client-side function which continuously captures the
desktop screen image and sends it to the server.
BehavioralModel Description
Systemstates:
Server:
Always waiting for new clients
Showing data/images
Sending instructions or message to clients
Waiting for next event by the user or from a number of Clients
connected.
Controlling the selected client using mouse click.
Communicating with any no. of clients
Client:
Waiting for connection with the server
Waiting for next command
Performing actions according to the instructions sent by theserver
Sending reply to the server for an instruction.
State TransitionDiagram
State transition diagram represents the switch between various states of system and
depicts the condition for switching.
Invoke chat/controller
Request event
Capture event
Invoke connect process
Invoke image grabber
Display event
Close client event
Invoke customizedisplay
Go for waiting
Customizing Processing
display image Image process event
Invoke image compressor
Modify event
Invoke customize display
Chatting
Remote Control
Chat/Control event
Page26
Packages used in project
Java.netpackage:
This package provide a class to create a socket where the server listens
for client request.
Java.io package:
This package is used to handle the input/output error.
Javax.swingpackage:
This package consist the entire swing components like JTextField, JPanel
etc.
Java.awt.eventpackage:
This package used to encapsulate the information with the application.
com.sun.ima
3. Server Process – FlowChart
Start
Various
constants are
initialized here
Monitor a client or
The Server continuously
stop monitoring an
listens at the corresponding
existing client if one
exists port and the server side GUI is
Stop
3 Client Process – Flow Chart
Start
Connection established
between the client and the
Yes If
Administrat
or or
detects
Shutdown request or stop illegal
sending the images
No
Connection is lost and the
monitoring is stopped
The client keeps on running and
transferring the images of its desktop all
the time
Stop
Administrator Login
VALID INVALID
Establish
session Close client
event
Select client
Take app.
action
Select
operation
Customize
Chat Remote Grab
display
Control Image
Process
Image
& monitoring
Server Main
Server object
JDesktopPane object
1
1 MonitorWindow[ ] object
object Server
Socket [ ] Object
31
Client-Side
ClientChatWindow
Input Stream
Output Stream
Image Grabber
1
Buffered Image
1
Output Stream
Control Command
Input Stream
String Comdata
32
3.3 Planning and Scheduling
GANTT CHART
33
4.Test Cases Design
Programming testing is an examination directed to furnish partners with data about
the nature of the item or administration under test.
The essence of testing is to:
Track the errors to understand their causes and any patterns that may exist.
Revalidate the stability of solutions, including ensuring that the correction of
one error does not lead to introduction of another error somewhere else.
A primary purpose for this testing is to detect software failures so that defects
may be uncovered and corrected. Programming testing is an examination
directed to furnish partners with data about the nature of the item or
administration under test. of code: does it do what it is supposed to do and
what it needs to do.
34
35
36
37
38
39
40
5. Implementation And design
Presently, I'm not here to disclose to you that arrange observing programming can
understand the majority of your security needs, needs, and issues.That’s not what it’s built
for, and that that’s not what it does. What I can say, is that when appropriately designed, a
great system observing arrangement can be an incredible help to your standard security
regiment. And, for organizations without the resources for a full-fledged SIEM and SOC,
the tips below can be a good stop-gap solution for alerting on some critical issues.
Network discovery is the first step in configuring a network monitoring system. It is also an
essential tool for getting a security value from your configuration.
Page 41
Design
The architectural design represents the data structure and program components
that are required to build the system. It takes into account the architectural style
that the system will take, the structure and properties of the components that
make up the system, and the interrelationships that occur between all the
architectural components of a system.
Because it is a client-server model based on a component-based development
model, the main components of this system are classes that are used to build the
entire system and reused later. The architectural design represents the classes used
and how they interact with each other to provide a complete functionality.
N 5.1 Implementing Arrangements
SNMP stands for easy Network Management Protocol and consists of 3 key
components: managed devices, agents and network management systems (NMSS).
The protocol is a set of standards for communication with devices on a TCP/IP
network. The SNMP monitoring is useful for all those who are responsible for
servers and network devices such as hosts, routers, hubs and switches. It allows you
to keep track of network and bandwidth usage, and track important issues such as
uptime and traffic levels.
SNMP versions (SNMP V1, V2C or V3) may vary from device to device. If you
encounter problems when configuring your Windows SNMP tools, the Paessler
Support team will be happy to offer you its advice and support. In general, our
support team responds to inquiries within 24 hours. With SNMP tools just like the
SNMP tester, you'll sight and right issues. Just send your log files to our support
team for analysis
All in one, at no extra cost: this is our philosophy. With PRTG, the full range of
functions is included. There are no hidden fees or upgrades to pay. This is also true
if you want to use your monitoring for SNMP traps. Using PRTG as a trap receiver is
simple! We have created a sensor that is also available in the free version - to help
you get started.
SNMP traps: with SNMP monitoring, the monitoring software usually sends small
packets of data to the target devices to ask for various information. This in turn
triggers the response packets of the monitored devices for SNMP manager. The
Page 42
advantage of SNMP traps is that devices automatically send messages to the SNMP
server monitoring software in the event of critical incidents, without having to do
so first.
Page 43
5.2.1 Coding Efficiency
namespace Networks
{
publicpartialclassLogin : DevComponents.DotNetBar.Office2007Form
{
public Login()
{
Initialize Component();
}
Page 44
namespace Networks
{
partialclassLogin
{
///<summary>
/// Required designer variable.
///</summary>
private System.ComponentModel.IContainer components = null;
///<summary>
/// Clean up any resources being used.
///</summary>
///<param name="disposing">true if managed resources should be disposed; otherwise, false.</param>
protectedoverridevoid Dispose(bool disposing)
{
if (disposing && (components != null))
{
components. Dispose();
}
base. Dispose(disposing);
}
///<summary>
/// Required method for Designer support - do not modify
/// the contents of this method with the code editor.
///</summary>
privatevoidInitialize Component()
{
this.GroupPanel1 = new DevComponents.DotNetBar.Controls.GroupPanel();
this.BtnClose = new System.Windows.Forms.LinkLabel();
this.LabelX3 = new DevComponents.DotNetBar.LabelX();
this.PictureBox1 = new System.Windows.Forms.PictureBox();
this.LabelX2 = new DevComponents.DotNetBar.LabelX();
this.LabelX1 = new DevComponents.DotNetBar.LabelX();
this.TxtPassword = new DevComponents.DotNetBar.Controls.TextBoxX();
this.BtnLogin = new DevComponents.DotNetBar.ButtonX();
this.TxtUserName = new DevComponents.DotNetBar.Controls.TextBoxX();
this.GroupPanel1.SuspendLayout();
((System.ComponentModel.ISupportInitialize)(this.PictureBox1)).BeginInit();
this.SuspendLayout();
//
// GroupPanel1
//
this.GroupPanel1.CanvasColor = System.Drawing.SystemColors.Control;
this.GroupPanel1.ColorSchemeStyle = DevComponents.DotNetBar.eDotNetBarStyle.Office2007;
this.GroupPanel1.Controls.Add(this.BtnClose);
this.GroupPanel1.Controls.Add(this.LabelX3);
this.GroupPanel1.Controls.Add(this.PictureBox1);
this.GroupPanel1.Controls.Add(this.LabelX2);
this.GroupPanel1.Controls.Add(this.LabelX1);
this.GroupPanel1.Controls.Add(this.TxtPassword);
this.GroupPanel1.Controls.Add(this.BtnLogin);
this.GroupPanel1.Controls.Add(this.TxtUserName);
this.GroupPanel1.Location = new System.Drawing.Point(12, 10);
this.GroupPanel1.Name = "GroupPanel1";
this.GroupPanel1.Size = new System.Drawing.Size(352, 192);
//
Page 45
//
//
this.GroupPanel1.Style.BackColor2SchemePart = DevComponents.DotNetBar.eColorSchemePart.PanelBackground2;
this.GroupPanel1.Style.BackColorGradientAngle = 90;
this.GroupPanel1.Style.BackColorSchemePart = DevComponents.DotNetBar.eColorSchemePart.PanelBackground;
this.GroupPanel1.Style.BorderBottom = DevComponents.DotNetBar.eStyleBorderType.Solid;
this.GroupPanel1.Style.BorderBottomWidth = 1;
this.GroupPanel1.Style.BorderColorSchemePart = DevComponents.DotNetBar.eColorSchemePart.PanelBorder;
this.GroupPanel1.Style.BorderLeft = DevComponents.DotNetBar.eStyleBorderType.Solid;
this.GroupPanel1.Style.BorderLeftWidth = 1;
this.GroupPanel1.Style.BorderRight = DevComponents.DotNetBar.eStyleBorderType.Solid;
this.GroupPanel1.Style.BorderRightWidth = 1;
this.GroupPanel1.Style.BorderTop = DevComponents.DotNetBar.eStyleBorderType.Solid;
this.GroupPanel1.Style.BorderTopWidth = 1;
this.GroupPanel1.Style.CornerDiameter = 4;
this.GroupPanel1.Style.CornerType = DevComponents.DotNetBar.eCornerType.Rounded;
this.GroupPanel1.Style.TextAlignment = DevComponents.DotNetBar.eStyleTextAlignment.Center;
this.GroupPanel1.Style.TextColorSchemePart = DevComponents.DotNetBar.eColorSchemePart.PanelText;
this.GroupPanel1.Style.TextLineAlignment = DevComponents.DotNetBar.eStyleTextAlignment.Near;
this.GroupPanel1.TabIndex = 1;
this.GroupPanel1.TitleImagePosition = DevComponents.DotNetBar.eTitleImagePosition.Center;
//
// Buncos
//
this.BtnClose.AutoSize = true;
this.BtnClose.BackColor = System.Drawing.Color.Transparent;
this.BtnClose.Location = new System.Drawing.Point(319, 173);
this.BtnClose. Name = "Buncos";
this.BtnClose.Size = new System.Drawing.Size(24, 13);
this.BtnClose.TabIndex = 7;
this.BtnClose.TabStop = true;
this.BtnClose.Text = "Exit";
this.BtnClose.LinkClicked += new
System.Windows.Forms.LinkLabelLinkClickedEventHandler(this.BtnClose_LinkClicked);
//
// LabelX3
//
this.LabelX3.AutoSize = true;
this.LabelX3.BackColor = System.Drawing.Color.Transparent;
this.LabelX3.Location = new System.Drawing.Point(79, 21);
this.LabelX3.Name = "LabelX3";
this.LabelX3.Size = new System.Drawing.Size(248, 15);
this.LabelX3.TabIndex = 6;
this.LabelX3.Text = "Please Enter User Name and Password Pres login";
//
// PictureBox1
//
this.PictureBox1.BackColor = System.Drawing.Color.Transparent;
this.PictureBox1.Image = global::Networks.Properties.Resources.login;
this.PictureBox1.Location = new System.Drawing.Point(3, 0);
this.PictureBox1.Name = "PictureBox1";
this.PictureBox1.Size = new System.Drawing.Size(61, 59);
this.PictureBox1.SizeMode = System.Windows.Forms.PictureBoxSizeMode.StretchImage;
this.PictureBox1.TabIndex = 5;
this.PictureBox1.TabStop = false;
//
// LabelX2
//
this.LabelX2.AutoSize = true;
Page 46
this.LabelX2.BackColor = System.Drawing.Color.Transparent;
this.LabelX2.Location = new System.Drawing.Point(80, 108);
this.LabelX2.Name = "LabelX2";
this.LabelX2.Size = new System.Drawing.Size(67, 15);
this.LabelX2.TabIndex = 4;
this.LabelX2.Text = "PASSWORD";
//
// LabelX1
//
this.LabelX1.AutoSize = true;
this.LabelX1.BackColor = System.Drawing.Color.Transparent;
this.LabelX1.Location = new System.Drawing.Point(79, 59);
this.LabelX1.Name = "LabelX1";
this.LabelX1.Size = new System.Drawing.Size(68, 15);
this.LabelX1.TabIndex = 3;
this.LabelX1.Text = "USER NAME";
//
// TxtPassword
//
//
//
//
this.TxtPassword.Border.Class = "Textbox Border";
this.TxtPassword.Border.CornerType = DevComponents.DotNetBar.eCornerType.Rounded;
this.TxtPassword. Font = new System.Drawing.Font("Microsoft Sans Serif", 11.25F,
System.Drawing.FontStyle.Bold, System.Drawing.GraphicsUnit.Point, ((byte)(0)));
this.TxtPassword. Location = new System.Drawing.Point(174, 104);
this.TxtPassword. Name = "Tx Password";
this.TxtPassword.PasswordChar = '*';
this.TxtPassword. Size = new System.Drawing.Size(151, 32);
this.TxtPassword.TabIndex = 1;
//
// BtnLogin
//
this.BtnLogin.AccessibleRole = System.Windows.Forms.AccessibleRole.PushButton;
this.BtnLogin. Location = new System.Drawing.Point(207, 151);
this.BtnLogin. Name = "Benogin";
this.BtnLogin. Size = new System.Drawing.Size(75, 23);
this.BtnLogin.TabIndex = 2;
this.BtnLogin. Text = "Login";
this.BtnLogin. Click += new System.EventHandler(this. BtnLogin_Click);
//
// TX Username
//
//
//
//
this.TxtUserName.Border.Class = "Textbox Border";
this.TxtUserName.Border.CornerType = DevComponents.DotNetBar.eCornerType.Rounded;
this.TxtUserName. Font = new System.Drawing.Font("Microsoft Sans Serif", 11.25F,
System.Drawing.FontStyle.Bold, System.Drawing.GraphicsUnit.Point, ((byte)(0)));
this.TxtUserName. Location = new System.Drawing.Point(174, 58);
this.TxtUserName. Name = "TX Username";
this.TxtUserName. Size = new System.Drawing.Size(151, 32);
this.TxtUserName.TabIndex = 0;
//
// Login
//
this.AutoScaleDimensions = new System.Drawing.SizeF(6F, 13F);
Page 47
this.AutoScaleMode = System.Windows.Forms.AutoScaleMode.Font;
this.ClientSize = new System.Drawing.Size(377, 213);
this.Controls.Add(this.GroupPanel1);
this.DoubleBuffered = true;
this.FormBorderStyle = System.Windows.Forms.FormBorderStyle.FixedDialog;
this.MaximizeBox = false;
this.MinimizeBox = false;
this. Name = "Login";
this.StartPosition = System.Windows.Forms.FormStartPosition.CenterScreen;
this. Text = "Login";
this. Load += new System.EventHandler(this.Login_Load);
this.GroupPanel1.ResumeLayout(false);
this.GroupPanel1.PerformLayout();
((System.ComponentModel.ISupportInitialize)(this.PictureBox1)).EndInit();
this.ResumeLayout(false);
#end region
Page 48
5.3 Testing apparoches
The use of tools in Agile projects should complement, but not replace, the interaction of people.
In Agile software development projects, there are many tools that are used in various situations.
Some examples of tools are: developers use tools like SONAR for static analysis and code
coverage, JUnit for code coverage. Developers also use configuration management tools like
SVN, where they can check source code, unit tests. The configuration management tool will
compile and build the code with test frames.
Unit tests
minimum software components (modules) are tested.
Each unit (basic component) of the software is tested to verify that the detailed design of the
device has been correctly implemented.
The tests shall be carried out at Class level, and the minimum unit tests shall include
manufacturers and destructors.
In Back Box Testing, tests based on specifications are performed to find that each module
provides a specific output for particular input integration tests.
Interfaces and interaction between integrated components are tested.
A growing group of tested software components corresponding to elements of architectural
design are integrated and tested until the software functions as a system.
Beta Test
* A beta test is the second phase of the software test in which a sample of the target audience
tests the product. (Beta is that the second letter of the Greek alphabet. The term alpha testing
originally meant the first phase of testing in a software development process. The first phase
involves testing units, components and systems. Beta tests can be considered as “pre-release
tests".
* The purpose of beta testing is to put your application in the hands of actual users outside your
own engineering team to discover faults or problems from the user's point of view that you
would not want to have in your final, published version of the application. Example: Microsoft
and many other organizations release beta versions of their products for user testing.
5.4 Modification and improvement
The network monitoring and control system in the Modification of the so easily catch the data as
well as the switch to the data
In this system are required to the ip address and after the calculated process
Sender sends data to recipient accept data
This project is the improvement of all the information showing are easily
Only we have the address inserted to automatically display all information on
Test Case
Regression Tests:
The regression test focuses on the discovery of flaws after a major code change has taken place
specifically, it seeks to discover the regression of software, or old bugs that have returned. Such
regression occurs when the functionality of the software that previously functioned properly
Page 49
ceases to function as expected.
Stability Testing:
Stability testing is used to verify that the software is capable of continuous operation for or
beyond an acceptable period of time. This non-functional software activity.
User-friendliness Tests:
Usability testing is necessary to verify whether the user interface is easy to use and understand.
He's getting closer to using the app.
686. result and description
The network monitoring and control system in the result of us are inserted the Ip address and
after the calculated process
And another step is starting your monitor it means that the name of the server and the username,
password
The network monitoring and control system in the sending of e-mail are easily in this project in
the mail, AOD as well as tweet are included
To use an architectural decision that will make the application be as much as possible: modular,
well managed, fair, simple, easy to understand, user-friend
Page 50
Snapshots
Page 51
Page 52
Page 53
Page 54
Page 55
Page 56
Page 57
6.1 Test Report
In this project, the ip addresses are inserted correctly . the automatic system
calculated
The network monitoring system in the monitor name insert this means that the set as
the server name and the username are required. The regression test focuses on the
discovery of flaws after a major code change has taken place specifically, it seeks to
discover the regression of software, or old bugs that have returned. Such regression
occurs when the functionality of the software that previously functioned properly
ceases to function as expected.
Usability testing is necessary to verify whether the user interface is easy to use
and understand. He's getting closer to using the app.
Install Yandex. Translate on your mobile phone
Mobile version Developers User Agreement Help
Page 58
6.2 User Documentation
RAGISTER
USERNAME
PASSWORD
SUBMIT
Page 59
Page 60
7 . Conclusion
project closure issues were discussed and ways to evaluate a project were
discussed. Key elements of project closure were identified and discussed
and their importance in ensuring that project goals and objectives were
achieved was explored. You should now be able to plan for an effective
closure of the project. Problems often need to be resolved at the close-out
stage, and project managers need to be aware of potential problems.
Evaluation can take place at any time during the course of a project
and can have a significant impact on its continuation, in the direction of
golden success. Most projects end with an evaluation, and project team
leaders are generally invited to contribute. The evaluation may also take
place some time after a project has been concluded, to examine how well it
has achieved sits the long-term objective. You should now be able to
contribute with confidence to the planning and implementation of
evaluations.
Planning your personal development to improve your future
performance in project management was also discussed.
Page 61
Limitation of the system
Page 62
7.3 future scope of the project
Page 63
References
www.slideshare.net
www.infoworld.com
issuu.com
1000projects
Page 64