logo

How to Share Files Over Bluetooth

   

Added on  2022-08-16

19 Pages3901 Words12 Views
NEF 3001APPLIED PROJECT 1
SECURING COMPUTER FOLDERS WITH BLUETOOTH SYSTEM
How to Share Files Over Bluetooth_1
Contents
Introduction......................................................................................................................................1
1. System Architecture of the application....................................................................................2
2. The function of each subsystem and how it works..................................................................4
a) Initial Setup Management Subsystem..................................................................................4
b. Registration Management Subsystem...................................................................................5
c. Login Management Subsystem.............................................................................................5
d. Logout Management Subsystem...........................................................................................6
e. Search Management Subsystem...........................................................................................6
f. Bluetooth Management Subsystem......................................................................................7
g. Deletion Management Subsystem........................................................................................7
h. Device Listing Management Subsystem..............................................................................8
i. Change Password Management Subsystem..........................................................................9
j. Encryption and Decryption Management Subsystem...........................................................9
k. Notification Management Subsystem.................................................................................10
3.User Interphase of the system.....................................................................................................11
4.Implementation Technique about Visual Studio........................................................................12
a. Executive Summary of the IDE(Visual Studio).................................................................12
b. Reasons for using Visual Studio.........................................................................................12
c. Benefits of using Visual Studio over other IDE.................................................................13
Conclusion.....................................................................................................................................13
References......................................................................................................................................15
How to Share Files Over Bluetooth_2
Introduction
In society today due to advancements in technology, we ought to search for ways in which we
can solve our problem with ease, and in the process of solving them depending on what we are
solving it is always good to check the major issue being solved. In this case, we are building a
system that makes it easy for users to secure their computer folders using a Bluetooth system.
For the application to work properly, several factors have been considered when it comes to how
and what is in the folder. When it comes to the subsystems, things like distance and size of the
folder being secured is taken into consideration when securing the document.
The system contains many subsystems that work hand in hand to see that the primary functions
have been achieved at the end. Some of the subsystems found are encryption management,
decryption management, Bluetooth discovery management and also notification management
among many others.
The system will be designed in such a way that it will have an interface that supports Bluetooth
devices. Also as a consideration, the application should always start immediately when the PC is
turned and when the program connects to the mobile device. Another important aspect is that the
program should be able to encrypt folders immediately when the user moves away from the
computer. For this to work properly the program will have a handshake protocol that will be
added, which will run after every 5 seconds to check the Bluetooth connection. In the case,
where someone else is trying to login using a different mobile device then the owner will be
notified through a message.
This document explains all the approaches that will be taken to develop the system. The process
of developing an interactive user interface is also described.
1. System Architecture of the application
Different applications have a different architecture interface which is normally determined by the
users and the functioning requirements [1]. This can also be determined by the type of servers
How to Share Files Over Bluetooth_3
that will be used while developing the application. This section shows how the architecture of the
whole system will look like, and what will be achieved in different stages when subsystems are
communicating with each other. In this case, the subsystem and their corresponding databases
are shown. This is important because it shows where information is being stored and the
developer may now find ways in which they can extract the information and use it in the
querying process [2]. The following figure shows the various subsystems being used in the
application. They include the following:
Initial Setup Management
Encryption Management
Decryption Management
Change Password Management
Bluetooth Discovery Management
Login Management
Logout Management
Deletion Management
Registration Management
Device Listing Management
Notification Management
Search Management
How to Share Files Over Bluetooth_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Travelers Information System Architectural Design
|20
|3327
|125

Cloud Computing In Mobile Application
|5
|1709
|77

Multiplayer Card Game Architecture - PDF
|11
|1368
|272

Executive and Mobile Computing : Assignment
|8
|1968
|93

HRSC Document System Requirements
|12
|2581
|488

Protocols and Models of Communication Identification
|9
|1907
|76