Vous êtes sur la page 1sur 3

3.

0 Research Methodology

The system is considered to be working when phase five has been completed. However, there are still a number of activities that take place after a system is completed. The two main activities are: 1) 2) Post Implementation Maintenance

The post-implementation activity takes place after a year to determine that whether the system is perfectly working or not, whether the system is satisfying the user needs or not, if not, changes are made to the system to make it perfect. It includes following tasks: 1) 2) 3) Correcting errors Resolving necessary changes Enhances or modifies the system

Thus, we can say that the system development life cycle is the set of activities that analysts and designers carry out to develop and implement an information system, includes preliminary investigation collection of data and determination of requirements, design of system, development of software and system testing and implementation. Process Model selected for our project: - Linear Sequential Model. The Sequential model suggests systematic and sequential approach to software development that begins at system level and project through the following activities:

This covers a detailed study of requirement of both the users and software. This activity is basically concerned with what of the system such as i) What are inputs in the system? ii) What are the different conditions? iii) What are the processes required? iv) What are the outputs accepted? 2. Design The design phase deals with the various concept of the system design such as data structure, software architecture and algorithms. This phase translates the requirements into representation of software. This stage answers the question of how. 3. Coding Coding refers to the translation of the design into machine redable form. The more detailed design, easier its coding and better its reliability. 4. Testing Once the code is written it should be tested rigorously for correctness of code and results. Testing May involved the individual units or whole system. It requirds detailed plan as to what, when and how to test. 5. Maintenance After software has been installed it may undergo some changes. Some this may occurs due to change in the users requirement, operating environment or error in the software that has not been fixed during testing. Maintenance insures that these changes are incorporated whenever necessary.

3.1 Device Management Local Device, Remote Device, and Device Class are the classes in the Java Bluetooth specification that form the Generic Access Profile and allow you to perform device management. These classes allow you to query some statistical information about your own Bluetooth device (Local Device) and also some information on the devices in the area (Remote Device). The Device Class object gives you information about the official class of device (CoD) as defined in the Bluetooth specification.

When we plan to do in any project we need to have a reason to do it. We need to answer questions like Who is responsible for the task? The resource person to be contacted? What will be done? When and how long will the activity be done? Where will it be done? Why should an activity be done?

We do all this in the analysis phase of our project building. It is in the analysis phase we learn about the system its plus point, its drawbacks, our approach to build the 3.2 EXISTING SYSTEM 3.2.1 Wi-Fi Most widely used wireless technology today, is Wi-Fi. Wi-Fi hotspots are deployed in shopping malls, cafes, public libraries etc. It gives internet access to Wi-Fi enabled laptops or to Wi-Fi enabled mobile phones for free or at a low cost to the ones in that hotspot area. A wireless network uses radio waves, just like cell phones, televisions and radios do. In fact, communication across a wireless network is a lot like two-way radio communication. Here's what happens: 1) A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. 2) A wireless router receives the signal and decodes it. It sends the information to the Internet using a physical, wired Ethernet connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter. The radios used for Wi-Fi communication are very similar to the radios used for walkie-talkies, cell phones and other devices. They can transmit and receive radio waves, and they can convert 1s and 0s into radio waves and convert the radio waves back into 1s and 0s.

Vous aimerez peut-être aussi