Yash BMU Project
Yash BMU Project
“Desktop Support”
At
2022-25
Guided By: Submitted By:
Dr. Hetal Modi YashKumar Variya
1
BHAGWAN MAHAVIR COLLEGE OF COMPUTER APPLICATION
Constituent College of Bhagwan Mahavir University
principal.bmcca@bmusurat.ac.in 0261-6770125/23, +91-7575803091
www.bmusurat.ac.in VIP Road, Surat, Gujarat–395007
PROJECT PROPOSAL
Desktop Support
PROJECT TITLE
YashKumar Variya
SUBMITTED BY SUBMITTED TO
2
BHAGWAN MAHAVIR COLLEGE OF COMPUTER APPLICATION
Constituent College of Bhagwan Mahavir University
principal.bmcca@bmusurat.ac.in 0261-6770125/23, +91-7575803091
Certificate
This is to certify that the summer project entitled “Desktop Support” has been submitted by YashKumar Variya
Enrollment No. 2202020501051 at Bhagwan Mahavir College of Computer Application. As a partial fulfilment
of the requirement for the degree of Bachelor of Computer Application for the academic Year 2022-25.
Place: Surat
Date:
3
BHAGWAN MAHAVIR COLLEGE OF COMPUTER APPLICATION
Constituent College of Bhagwan Mahavir University
principal.bmcca@bmusurat.ac.in 0261-6770125/23, +91-7575803091
w www.bmusurat.ac.in VIP Road, Surat, Gujarat–395007
Date: - / /2025
Task Details
Project Supervisor:
Name & Sign
4
Acknowledgement
The reason of completing the project work successfully is not just our efforts but efforts of many people. The
people, who trusted us, guided us and encouraged us with every means. Guide is a person who provides you the
direction towards success, so I feel great pleasure to express our gratitude to our guides, our faculty members as
well as every person who helped us directly or indirectly with our project.
We are also indebted to our Professor Asst. Prof. Dr. Hetal Modi who provided constant encouragement, support
& valuable guidance before and during our project. It was her effort who led us to this place for project work. Her
guidance and suggestions were valuable.
We are also thankful to our all Faculties Members and specially to Our Principal Dr. Vikram Kaushik , to give us
opportunity to make us this project.
Thank you very much,
5
Preface
Before Tasking the Project Work for Foundation, It Is Quite Necessary To Have An Exact Idea The Work “Project”.
The Project Consist of Seven Letters Each Letter Has Its Own Significance As Follow.
We Happy to Hand Over This Project To The Bhagwan Mahavir College Of Computer
Application. This project is based on “Desktop Support” .
In a Computer Application studies, the partial training is very important. We can improve theoretical knowledge
by reading and attempting class but it is imperfect without getting partial knowledge.
Being an IT student, we should see every side of technical unit. It performs vital role in developing software and
situation opportunities and problem.
6
INDEX
Sr.no Topic Page.no
01. Introduction 9
04 System Design 19
7
6.1 Summary 30
6.2 Future Enhancements 30
8
INTRODUCTION
❖ Overview
❖ Vision
To emerge as a diversified and preferred institution of national and global repute,
fostering holistic development in the domain of Information Technology and
Computer Science.
9
❖ Mission
❖ Academic Programs
10
1.2 Project profile
YashKumar Variya
Submitted by
2202020501051
Enrollment Number
BSC-IT IMS
Course
:-
Project Duration
Programming :-
Languages
MySQL
Database Used
Windows 10 / Linux
Operating System
11
12
Literature review/ Background Study
In the current digital landscape, various systems and technologies are used
across the IT sector to handle tasks such as data management,
communication, automation, and security. These existing solutions
provide a foundation for innovation but also have limitations that leave
room for improvement.
ERP Systems
13
Technology Purpose / Usage
14
2.2 Recent Trend in Information Technology
15
System Analysis
16
DIAGRAM :
17
3.2 Problem Definition
18
System Design
19
|
v
+-------------------------------------------------------+
| **Infrastructure Layer** |
|-------------------------------------------------------|
| - Physical Servers - Network Equipment |
| - Storage Systems - Cloud Infrastructure (AWS, Azure) |
+-------------------------------------------------------+
Layer Descriptions:
User Interface Layer:
•
Interfaces for users (admin, IT staff, and clients) to access system features like
monitoring, reporting, or request handling.
Application Layer:
•
Core business logic, infrastructure control, automation scripts, alerting systems, and
APIs that enable third-party integrations.
Data Layer:
•
Centralized repositories for storing assets, user data, logs, and infrastructure
configurations.
Infrastructure Layer:
•
The actual hardware and virtual resources being managed, including servers, storage,
networking devices, and cloud services.
20
4.2 Data Flow Diagrams (DFD) :
21
22
23
4.3 Database Design
➢ The Users table stores details of all individuals who interact with the
system, including administrators, IT staff, and clients. Each user has a
unique ID, along with attributes such as name, email, role, and an
encrypted password for secure access.
➢ The Incidents table captures all issues reported related to assets, including
problems such as hardware failure or performance issues. Each incident
includes a unique ID, the related asset and user, a description of the issue,
24
the status (open, in progress, or closed), and a timestamp of when it was
reported.
25
Results and discussion
➢ The Login Screen serves as the entry point, where users securely access
the system using their credentials. Based on role-based access, users are
directed to their respective dashboards. The Admin Dashboard provides
an overview of system activity, such as the number of assets, pending
incidents, and recent maintenance logs. It also features quick access
buttons for user management, asset registration, and reports.
➢ During testing, the system demonstrated fast response times for typical
operations such as logging in, retrieving asset records, and submitting
incident reports, even when handling a moderate number of concurrent
users. Queries were optimized to ensure that database interactions did
not result in noticeable delays, keeping the average page load time under
2 seconds.
➢ The system also maintained high accuracy in data processing. All form
submissions, updates, and data retrievals were validated both on the
frontend and backend, reducing the risk of data inconsistencies or input
errors. Role-based access control was thoroughly tested to confirm that
users could only access functions relevant to their permissions.
2. No Mobile Application:
The system is optimized for desktop browsers and lacks a dedicated
mobile application, which limits accessibility for on-the-go users such as
field technicians.
3. Scalability Constraints:
While suitable for small to medium-sized organizations, the system may
require database and backend optimizations to handle larger datasets or
high user traffic efficiently.
4. Lack of Automation:
Routine tasks such as asset deprecation alerts or automated maintenance
reminders are not fully automated and must be manually triggered by
users.
28
6. Basic Role Management:
The role-based access control is functional but basic. It lacks advanced
permission granularity and audit trails for sensitive operations.
29
Conclusion and futurework
6.1 Summary
30
1. Real-Time Monitoring Integration:
Incorporating real-time monitoring tools for network devices and servers
would allow the system to detect failures or performance issues instantly,
enabling faster response times.
31
6. Improved Security Features:
Enhancing user authentication methods with multi-factor authentication
(MFA) and audit trails for user activities would provide greater system
security.
32