Professional Documents
Culture Documents
Synopsis
We would like to express our deep gratitude and sincere thanks to all who helped us to
complete this project work successfully.
Our sincere thanks to Principal, Madurai Kamaraj University College, for having
provided us facilities to do our project.
Our deep gratitude goes to Mr. Suresh Kumar, B.E., Head of the Department, for granting
us opportunity to do the project.
We sincerely thankful to Mr. Henry project guide, for his valuable suggestions and
guidance at time of need.
Our joy finds no boundary to expose our thanks to Mr.K. Anand, M.C.A., for extending
great help needed for our project.
Great thanks to out family, our project associates, our most valuable dear friends and all
those directly or indirectly helped us in this endeavor.
Last but not the least we thank the Almighty God who makes everything happen.
CONTENTS
1. Introduction
2. System Analysis
3. Feasibility Study
4. System Specification
5. System Design
7. Maintenance
9. Conclusion
11. Bibliography
1.1. Company Profile
SkySoft Software (P) Ltd., has designed the website for TamilNadu and
Digital slides for Telugu website. This product was launched in the month of Aug.1996.
• File Transfer
• Resource Sharing
• Chat
File Transfer:
File transfer is handled between client and the server. To share a file from
another client the requestor client sends the request to the server. The server then gets the
file from the client which provides the requested file. Then the server sends the file to the
requested client.
Mail:
Chat:
Chatting is talking to other people who are using the Internet at the same
time you are. Usually, this "talking" is the exchange of typed-in messages requiring one
site as the repository for the messages and a group of users who take part from
anywhere on the Internet. In some cases, a private chat can be arranged between two
parties who meet initially in a group chat. Chats can be ongoing or scheduled for a
server then the server provide a copy of the page and open the page in the client location.
2. System Analysis
Network Traffic
Resource Sharing
Low Reliability
Performance problems
Scalability
2.2 Proposed System
The proposed system will provide a good security and improves the performance of
the server. It provides network security and gives access to the resources in
server. It improves the response time to clients. It provides robust
authentication. Table handling using Oracle would increase the ease in
handling data, quicker and timely retrieval of data is possible with flexibility
and portability. Keeping in view all these points and problems of the existing
system, the new system has been developed using Java Server Page and
Oracle.
Centralized access
Minimum cost
High security
DAP Concept
3. FEASIBILITY STUDY
It is both necessary and prudent to evaluate the feasibility of a project at
the earliest possible time. Months or years of effort, thousands and millions of dollars,
and untold professional embarrassment can be averted if an ill-conceived system is
recognized early in the definition phase.
Feasibility and risk analysis are related in many ways. If project risk is great,
the feasibility of producing quality software is reduced. During product engineering,
however, we concentrate our attention on four primary areas of interest.
Technical feasibility is the need of hardware and software, which are needed to
implement the proposed system in the organization. Technical requirements are to be fulfilled to
make the proposed system work. This should be necessarily predetermined so as to make the
system more competent.
The Economical feasibility must satisfy the needs of the technical feasibility and the
operational feasibility. It involves the economic feasibility of developing and implementing the
proposed system.
The proposed system should use the internet level then the different types of end
users are involved in the system, so it solves the user’s needs and the organization needs. And it
supports the all users environment.
4. System Specification
4.1. Hardware Requirements
HTML came to existence in 1970. The development of HTML was initiated by Tim
Burners Lee was later taken over by Dan Cannolly, Dave Ragett. The ancestor of
HTML is SGML (Standard Generalized Markup Language). SGML was developed
by ISO (International Standard Organization) and was first used by the US DOD
(Department Of Defense).
JavaScript
Java script is a compact; object based scripting language for developing client
and server Internet applications.
Java Server Pages (JSPs) are Web pages that contain server-side scripts in
addition to the usual mixture of text and HTML (Hypertext Markup Language) tags.
Server-side scripts are special commands you put in Web pages that are processed before
the pages are sent from your Personal Web Server to the Web browser of someone who's
visiting your Web site. . When you type a URL in the Address box or click a link on a
Web page, you're asking a Web server on a computer somewhere to send a file to the
Web browser (sometimes called a "client") on your computer. If that file is a normal
HTML file, it looks exactly the same when your Web browser receives it as it did before
the Web server sent it. After receiving the file, your Web browser displays its contents as
a combination of text, images, and sounds.
In the case of a Java Server Page, the process is similar, except there's
an extra processing step that takes place just before the Web server sends the file. Before
the Web server sends the Java Server Page to the Web browser, it runs all server-side
scripts contained in the page. Some of these scripts display the current date, time, and
other information. Others process information the user has just typed into a form, such as
a page in the Web site's guest book.
The Web server retrieves the proper HTML file from disk or memory and
sends the files back to the browser.
Creating a Variable
You'll probably want to do more with your forms than display their
contents in a Web page. For example, based on the contents of the form, you may want to
create a variable and insert that variable in different places of your response page. You
may need to create a variable. To do that, just make up a name and set it equal to the
contents of the field.
Implicit Objects
Request
Response
Page Context
Session
Application
Request:
It defines an object that provides access to HTTP-protocol-specific header
information sent by the client.
Response:
It defines an object that provides the JSP with the capability to manipulate HTTP-
protocol-specific header information and return data to the client.
Page Context:
It provides access to the namespaces associated with a JSP page. It also provides
accessors to several other JSP implicit objects.
Session:
It is used to store objects in between client requests. It provides an almost state-full
HTTP interactivity.
Application:
It is most often used to access environment information. One of the more common
pieces of information accessed by the application object is objects that are stoed in the
Servlet Context. These objects are stored there so that they will be available the whole
time the servlet engine is running.
Features of JSP
Platform independence:
The use of JSP adds versatility to a Web application by
enabling its execution on any computer.
Enhanced performance:
The compilation process in JSP produces faster results or
output.
Ease of administration:
The use of JSP eliminates the need for high-level technical
expertise, thereby helping Web developers, designers, content creators, and content
managers to work together and develop Java-based applications in less time and with less
effort.
Ease of use:
All JSP applications run on major Web servers and operating
systems, including Microsoft IIS, Netscape Enterprise Server, iPlanet
Web Server, and Apache Web Server. These applications are also
available on Windows NT, Windows 2000, and Solaris 7.
A database is similar to a data file in that it is a storage place for data. Like a
data file, a database does not present information directly to a user; the user runs an
application that accesses data from the database and presents it to the user in an
understandable format.
Database systems are more powerful than data files in that data is more highly
organized. In a well-designed database, there are no duplicate pieces of data are grouped
together in a single structure or record, and relationships can be defined between these
structures, and records.
When working with data files, an application must be coded to work with the
specific structure of each data file. In contrast, a database contains a catalog that
applications use to determine how data is organized. Generic database applications can
use the catalog to present users with data from different databases dynamically, without
being tied to a specific data format.
A database typically has two main parts: first, the files holding the physical
database and second, the database management system (DBMS) software that
applications use to access data. The DBMS is responsible for enforcing the database
structure, including:
5. System Design
Introduction:
Based on the user requirements and the detailed analysis of a new system, the
new system must be designed. This is the phase of system designing. It is a most crucial
phase in the development of a system.
In the preliminary or general design, the features of the new system are specified.
The costs of implementing these features and the benefits to be derived are estimated. If
the project is still considered to be feasible, we move to the detailed design stage.
In the detailed design stage, computer oriented work begins in earnest. At this
stage, the design of the system becomes more structure design is a blue print of a
computer system solution to a given problem having the same components and
interrelationship among the same components as the original problem. Input, output and
processing specification are drawn up in detail. In the design stage, the programming
language and the platform in which the new system will run are also decided.
There are several tools and techniques used for designing. These tools and
techniques are:
Flowchart
Data flow diagram
Data dictionary
Structured English
Decision table
Decision tree
In the system design part is considered after the successful compilation of the
problem analysis. The requirements which and specified in software requirements
specification is verified i.e. whether the requirement specified in it satisfies the user
needs.
Advanced Secured System developed act as a middleman between the client and the
server. It reduces the work of the server and gives access to server resources to multiple
clients at same time. It reduces the response time experienced by the clients. This server
will be cost-effective when compared to other servers in the market. Other servers in real
time provide a single service. The server, which we have designed, is to meet the real
time requirements .To share our thoughts with other clients in a network we can use chat
services where we can exchange out views in the form of typed-in messages. Chatting
can be provided as private chat and as well as multi-chat. This system in addition checks
whether virus file have affected the system and acts as a firewall to save the system from
viruses. If it finds a virus it will report to the server what action to be taken against the
virus file. The server can delete the file from the system or it can block the virus or it can
repair the virus and quarantine the infected file. If the users are on-line they can share the
messages through chatting, if the users are on offline they can share their views through
sending mail to the users in the network who himself registered them as the clients of our
system.
User Registration:
Establish connection between a client and server. Store login ids of all users of
in the server database. Get the user name & password. Check for the correctness of user
name and password. If it is correct enable the user to use the services else move the user
to error page.
To provide a strong authentication for this system, each user will be provided with
a unique username and password. First the users must register in this system before they
access this system. In registration time, the users will have to answer the questions
provided by the system. The questions will be based on the networking side. If the users
answers the questions and the system will verify the answers and depending upon the
correct answers the system will generate a key. There are three types of categories
depending upon the key generated by the system.
First category of services will provide:
1. File Transfer
2. E-mail
3. Resource Sharing
4. Web page view
5. Chat
Second Category of services will provide:
1. File Transfer
2. E-mail
3. Web page View
Third category of services will provide
1. File Transfer
2. E-mail
Each time user enters the system it will check for strong authentication whether
the username and password is valid. If the authentication is valid, the services will be
provided to the user else the user will be move to error page. If the username a password
will be sometimes wrong by misspelled so the user can be once again redirected to the
main page.
File Transfer:
If a user wants to access a file in the server he must make a request to the server.
There are three steps followed in File transfer
1. File search
2. Virus File check
3. DAP Concept
First step in File search, it receives a request from the user. The request will
be a file name. First the server finds all root drives in the system. It then searches
for all folders in the system. Then it moves to search for all the subfolders in the
system and it searches the requested file name will reside in subfolder. If it exists
then it will took the file and move to next step i.e. virus check else it reports the
requested file does not reside in the system.
Second step will receive the file name and check whether the file name
matches with the updated virus file in the database. If it exists then the server will
report the requested file is virus file else then it will move to next phase which is
transferring the file.
Third step uses DAP concept, i.e. check the file length. If the requested file is
a valid one then the server starts to transfer the file from server to client location.
After transferring the file, the server check for the file length. It checks the length
of the file, before and after transmission .If it equals then the file transfer will be
completed else the file transfer is corrupted. Then again it will transfer the file,
until the file transfer is completed.
E-Mail:
Mail is one of the services provided by this system. The ability to compose, send
receive; delete electronic mail has been enormously popular. In this project, E-Mail
can be sent to the recipient without having to enter into the Web
browser. Electronic mail is one of the ways where we can send our
messages to a group of people. It is a mixture of text, drawings and
facsimile. Normally mail consists of two subsystems: the user agents,
which allow people to read and send email and the message transfer
agents, which move the messages fro the source to destination. The
message inside the envelope contains two parts: the header and the
body. The header contains control information for the user agents. The
body is entirely for the human recipient. To send an email a user must
provide the message, the destination address and possibly some other
parameters (e.g., the priority or security level). The message can be
produced with an editor built into the user agent. The destination
address must be in the format that the user agent can deal with. Many
user agents expect DNS addresses of the form mailbox@location.
When a user is started up to read an email, it will look at the
user’s mailbox
for incoming email before displaying anything on the screen. Then it
may announce the messages in the mailbox or display a on-line
summary of each one and wait for a command. In a sophisticated
system, the user can specify which fields to be displayed by providing
a user profile, a file describing the display format. The first field is
message no. The second field, Flags k meaning that the message is not
new but was read previously and kept in the mailbox. The third filed
tells how long the message is and the fourth field tells who send the
message. Finally, the subject field gives the brief summary what the
message is about.
Resource Sharing:
The user requests a webpage in the server, if the page resides in the server then
the copy of the page will given to the client. In this service the page will be transferred
and immediately opened at the client window. This service will provide that the page will
reside in the server and it will be opened in the client side without any requirements. This
service is entirely different from transferring a file from the server. In that service the file
will be transferred to the client side and it will be saved on the client side and the user
may open the file according to his wish. But in webpage view the file will not be saved
on the client side, it will be opened on the client side and source file may reside in server.
Chat:
Chatting means exchanging the information between the users. Usually this kind
of “talking” is the exchange of typed-in messages requiring one site as the repository for
the messages and a group of users who take part on the network. In some cases, a private
Chat can be arranged between two parties who meet initially in a group. Chat can be
ongoing or scheduled for a particular time and duration. Chat is one way of exchanging
our views. The chat can be selected on a certain topic such as politics, religion,
entertainment, education, business etc... The chat can be done with a group of people and
there are ways were we could exchange confidential matters through private chat. In our
system when we register ourselves as a user the system will provide you a username and
password. That username will be considered as your id for chatting.
Data Flow:
Each arrow in a DFD Represents a path (or pipeline of conveyer belt) of data,
called the Data Flow.
Process:
A process represents an automated or manual activity that transforms incoming
data flows to outgoing data flows.
Data-Store:
A Data-Store holds the data (for reference), which the system cannot remember.
External events and system responses ate From/To “Sources” or “Destination” of the
system.
Components of DFD:
The basic components of DFD are following
Source/Destination
Process
Data Source
1. Graphics
2. Top Down Approach
3. Separation of logical from the physical
4. Partitioning
Start
Login
No Is
Valid?
Yes
1. User Validation
LOGIN
Registration
User validation
Username,
Password Username,
Password,
Login Key
Vali
No
d
DB
User
Yes
2. File Transfer
File Transfer
File No
Exists File Not Found
Yes
Yes
Virus Virus Error Page
Virus File
File
No
File
Transfer
If file length
Not equals
DAP
3. Mail
Inbox Compose
DB
Received Messages
4. Resource Sharing
Floppy Drive
Client
Requests
Client Had Drives
Server
Server
Responds CD-Drive
Printer
Webpage Request
Page No
Exists Webpage Not Found
Yes
Webpage View
6. Chat
Chat server
Client-1 Client-1
Input Design
The goal of designing input data is to make entry easy, free from errors and
validations should be maintained such that end users feel comfortable and user friendly
while entering data into the system. When the programmer approach input design the first
task is to design the source document that captures the data and select media as used to
enter into the computer.
User Entry
In this user entry enter the user id and password. It is used for perform the
securable data operation.
and represents the ultimate review of specification, design and coding. The increasing
visibility of S/W as a system element and the costs associated with a S/W failure are
from the development effort--first develop, and then test--testing is a concurrent process
There are at least three options for integrating Project Builder into
compile and source-control the modules to be tested and hand them off to
Create a project based on the development project but customized for the
Associating the application with a project can be useful during the testing phase, as well.
We can create actions to automatically run test scripts or add script types and make them
TESTING OBJECTIVES
They are
2. A good test case is one that has a high probability of finding an undiscovered
error.
will uncover errors in the software. Also, testing demonstrates that software functions
Testing Principles:
All tests should be traceable to customer requirements. The objective of
software testing is to uncover errors.
Tests should be planned long before testing begins. Test planning can design as
soon as the requirements model is complete. All tests should be planned and designed
before any code has been generated.
The parento principle applies to software testing. The parento principle implies
that 80 percent of all errors uncovered during testing will likely be traceable to 20 percent
of all program modules.
The testing should begin “in the small” and progress toward testing “in the
large”. To be more effective testing should be conducted by an independent third party.
By “most effective”, testing means that has the highest probability of finding errors.
VALIDATION TESTING:
Validation testing is one, which checks the given data is a valid one, or
not. In our system, first stage username and password is checked. If it is a valid one, then
the services will provided to the user. Hence validation testing takes place at the earlier
part of our project. This is one of the most crucial one, which takes place at the all kind of
projects.
6.2.UNIT TESTING
S/W design i.e., the module. The unit testing is always white-box oriented and the step
During unit test, testers can use the same project or projects as the
developers, if functional units organize the project, or separate projects have been created
for functional units. The project or projects can also be exported, so unit test can take
Unit testing comprises the set of test performed by an individual programmer prior
to integration of the unit into a larger system. There are different types of tests to be
performed on a programming unit. These may be classified as follows:
Functional Tests
Performance Tests
Stress Tests
Structure Tests
Functional Test cases involves exercising the code with normal input values
for which the expected results are known, as well as boundary values and special
values.
Performance Testing determines the amount of execution time spent in
Various parts of the unit, program throughput, response time and device
utilization by the program unit.
Stress Tests are those tests designed to intentionally break the limit. A great
deal can be learnt about the strengths and limitations of a program by examining
the manner in which a program unit breaks.
Structure Tests are concerned with exercising the internal logic of a program and
traversing particular execution paths to exercise, deriving test date, determining the
The tests that occur as part of unit testing. The module ‘interface’ is
tested to ensure that information properly flows into and out of the program unit under
test. The ‘local data structures’ are examined to ensure that data stored temporarily
through the control structures are exercised to ensure that all statements in a module have
been executed at least once. Finally, all ‘error-handling paths’ are tested.
source level code has been developed, reviewed and verified for correct syntax, unit test
case design begins since a module is not a stand alone program, ‘driver’ and/or ‘stub’
that accepts test case data, passes such data to the module to be tested, and prints the
relevant results. The stubs serve to replace modules that are subordinates called by the
entry, and returns. The drivers and scrubs represent overhead i.e., both are S/W that must
be written but that is not delivered with the final S/W product. If the drivers and the stub
In Our project, Unit testing takes place at every module. First stage
the file name is requested from the user. Then the server searches the file in the
system. If the file exists in the system then it will moves for virus checking. If the file
is a valid one then it will be transferred to the client location. After transferring the
file, it will check the length of the file before and after transmission. If the length
equals then the file transfer is completed otherwise we have to retransmit the file.
The Unit Test is carried out in this project, and is found successful. The
It addresses the issues associated with the dual problems of verification and program
construction. Black box test case design techniques are the most prevalent during
integration, although a limited amount of white box testing may be used to ensure
converge of major control paths. Integration testing is a systematic technique for
constructing the program structure while at the same time conducting tests to uncover
errors associated with interfacing. The objective is to take unit-tested modules and build
a program structure that has been depicted by design.
Incremental Integration Strategies are
Top-Down Integration
Bottom-Up Integration
Test cases were designed so that all units tested modules were executed
from the main module and the reports were generated to check the results with the
expected results.
After has been integrated, a set of high order tests are conducted, validation
correct then user will allow to move to next step i.e. the home page where all kinds
of services resides. It means it will maintain a bridge to move to other modules and
integrate them.
structure while at the same time conducting test to uncover errors associated with
interfacing. The objective is to take unit-tested modules and build a program structure
program structure. Modules are integrated by moving downward through the control
setting up a testing environment is the same as the process for importing a project and
have not already been provided, you can either modify existing actions to include a
This test was performed with the users of the system and made sure that
it performed as they expected. It was verified that all functionality required by the
user have been satisfied. So for, the system has been found defect free and is
working well.
6.4. IMPLEMENTATION
Once the system has been designed, the next step is to convert the
designed one in to actual code, so as to satisfy the user requirements as excepted. If the
When the initial design was done for the system, the department was
consulted for acceptance of the design so that further proceedings of the system
development can be carried on. After the development of the system a demonstration was
given to them about working of the system. The aim of the system illustration was to
Initially the system was run parallel with manual system. The
system has been tested with data and has proved to be error-free and user-friendly.
Training was given to end -user about the software and its features.
7. MAINTENANCE
the customer. The maintenance phase of the software life cycle is the time period in
improving user display and modes of interaction, and upgrading external documents.
easily. That is, any new functional capabilities can be added to the project by simply
including the new module in the homepage and giving a hyperlink to that module.
they customer will uncover defects in the software. Corrective maintenance changes the
changing environment. The system has been modified so that various change include to
performed, that is in earlier system (character based UNIX system) changes are fixed and
if any new changes are to be included, was a difficult task. Now provisions are given so
that the user can define various changes. Such as it designed to accommodate the new
change in further.
functions that will provide benefit. Perceptive maintenance extends the software beyond
functions such that the user can able to retrieve the information in a user friendly and it
been developed as versatile and uses friendly as possible keeping in mind the
into place. This System supports and improves many of the core functionality of the
organization. Using such a system helps the organization in minimizing the time and
money consumed in fulfilling the day-to-day functionality’s and cutting down the
expenses incurred on the same. The real world requirements was satisfied by this system
which provides all services like e-mail, chat… The File Transfer is very effective where
this system uses the concept of DAP. E-mail is one of the service which we can send mail
through the intranet. Resource sharing can be achieved through this system. In our day
today life, we have to move to third party to get mail, chat etc… But this problem is
solved using our system. So our system will be cost effective and used in any platform.
Using JSP and Oracle 8.0, the system was developed. As a whole, the
system was wellplanned and designed.
10. Future Scope of the Project
The project will be more users friendly with the future enhancement of
having the mailing facility, which will intimate the users to send their messages to
internet itself. As well as verification mails, warning mails and news updates to be send
to the using the automatic mailing facility. The enhancement also consists of making
private chat more effectively and connecting to ftp server for file transfer in the internet.
Further, this project can be proposed to use EJB for further deployment purposes. This
facility will make the Server a complete one.
11. Bibliography