76
Synopsis

DOC

Embed Size (px)

Citation preview

Page 1: DOC

Synopsis

Page 2: DOC

Synopsis

“ADVANCED SECURED SYSTEM” deals with the Server based

Information and Maintenance of the Server. This system is used to reduce the workload

of the server. It provides mail services, chat services between the clients and it also

response to the client requests. This system is designed as a middleman between the

client and the server. This system provides all kinds of services to the clients like file

transfer, mail, chat etc... This system is cost-effective and provides a security like firewall

to the server. Though there are any software available in the market there is no popular

server in terms of cost and providing services. Developed in java platform will be an

advantage to this software. This can be used in various platforms.

The main objective of this software is to

Speed up the data transfer

Check for virus file

Provide mail, chat services

Strong authentication

Sharing resources

Flexibility

Page 3: DOC

Acknowledgement

Page 4: DOC

Acknowledgement

We would like to express our deep gratitude and sincere thanks to all who helped us to

complete this project work successfully.

Our sincere thanks to Principal, Madurai Kamaraj University College, for having

provided us facilities to do our project.

Our deep gratitude goes to Mr. Suresh Kumar, B.E., Head of the Department, for granting

us opportunity to do the project.

We sincerely thankful to Mr. Henry project guide, for his valuable suggestions and

guidance at time of need.

Our joy finds no boundary to expose our thanks to Mr.K. Anand, M.C.A., for extending

great help needed for our project.

Great thanks to out family, our project associates, our most valuable dear friends and all

those directly or indirectly helped us in this endeavor.

Last but not the least we thank the Almighty God who makes everything happen.

Page 5: DOC

CONTENTS

1. Introduction

1.1 Company Profile1.2 About the Project

2. System Analysis

2.1 Existing System2.2 Proposed System

3. Feasibility Study

3.1 Technical Feasibility3.2 Economical Feasibility3.3 Operational Feasibility

4. System Specification

4.1 Hardware Specification4.2 Software Specification

4.2.1 About the Software

5. System Design

5.1 Project Description5.2 Data Flow Diagram5.3 Database Design

6. System Testing And Implementation

6.1 Testing Fundamentals6.2 Unit Testing6.3 Integration Testing6.4 Acceptance Testing6.5 Implementation

7. Maintenance

Page 6: DOC

7.1 Corrective Maintenance7.2 Adaptive Maintenance7.3 Enhance Maintenance

8. Screen Layout

9. Conclusion

10. Future Scope of the Project

11. Bibliography

Page 7: DOC

1.1. Company Profile

Sky Soft Software Limited

SkySoft Software Limited is one of the leading Software Development

Companies in Chennai. This organization is collaborated with Lastech Software, it is

enterprises in designing and hosting of web pages of various companies, advertising the

product profiles of the same. It has also developed a package, Indoweb, an Indian

Language Software for Internet, using this company is able to design the web pages in

any Indian Language and host it through the service provider located in North America. It

has also recently launched the first website in the world to send mail in Tamil language;

the user need not download any Tamil Font in their system to run the package.

SkySoft Software (P) Ltd., has designed the website for TamilNadu and

Digital slides for Telugu website. This product was launched in the month of Aug.1996.

Setup in 1989, started the business of developing Regional Software in

DTP, Presentation Graphics and Image Processing Software. Recently the company has

launched Identification Card Software for printing of ID card for the Citizens of India.

The company’s Annual turnover averages Rs.1.2 Million. It operates in four state capitals

with resellers all over India.

The company maintains a news Magazine called TamilNadu Online on web,

which incidentally is the first ever Indian website Magazine on the web. The company

has so far trained more than 400 Professionals in JAVA, in a short span of 16 months.

Recently the company has opened an Office in Madurai and another one in Coimbatore.

Page 8: DOC

1.2 ABOUT THE PROJECT

The Project ”ADVANCED SECURED SYSTEM” deals with the Server

maintenance for a company.

The project consists of following modules:

File Transfer

E-mail

Resource Sharing

Chat

Web Page View

File Transfer:

File transfer is handled between client and the server. To share a file from

another client the requestor client sends the request to the server. The server then gets the

file from the client which provides the requested file. Then the server sends the file to the

requested client.

Mail:

With the advent of the Internet and its commercial

availability, the Universal e-mail have become a common

feature in today’s High-tech World. The ability to compose, sends, and

receives Electronic mail has been enormously popular. In this project

Page 9: DOC

E-Mail can be sent to the recipient without having to enter into the

Web browser.

Resource Sharing:

Server provides all applications, files and messages. If a client wants

applications from the server, the server grant permission to the particular Client

according to their authentication level, i.e., applications are shared between server and

clients. The client access the printer which are attached to the server when a request is

provided. The applications from the server are sent to the requested client by the

provider. Resources include devices such as CD, Floppy and Printer. The client access

these devices which are attached to the server when a request is provided.

Chat:

Chatting is talking to other people who are using the Internet at the same

time you are. Usually, this "talking" is the exchange of typed-in messages requiring one

site as the repository for the messages and a group of users who take part from

anywhere on the Internet. In some cases, a private chat can be arranged between two

parties who meet initially in a group chat. Chats can be ongoing or scheduled for a

particular time and duration.

Web Page View:

The user requests a web page from the server. If the page is available in the

server then the server provide a copy of the page and open the page in the client location.

Page 10: DOC

2. System Analysis

2.1. Existing System

The existing system is present in SKYSOFT SOFTWARE LIMITED. There

are some problems in sharing resources .The existing system must use a third

party tool to share the resources, provide a mail service within the clients, to

provide sharing of messages between a group of users through chat services.

In existing system when more than one users try to access the resources of the

Server, then the server processing speed decreases. When network traffic arises,

then the data transfer will go down very slow and there is a chance of data to be

lost. There is low level security in the existing system .The cost factor will be

high to provide the services like mailing, chatting. It reduces the response time

experienced by the clients.

Problems associated with the Existing System

Cost-effectiveness

Low level security

Network Traffic

Resource Sharing

Low Reliability

Performance problems

Page 11: DOC

Scalability

2.2 Proposed System

The proposed system will provide a good security and improves the performance of

the server. It provides network security and gives access to the resources in server. It

improves the response time to clients. It provides robust authentication. Table handling

using Oracle would increase the ease in handling data, quicker and timely retrieval of

data is possible with flexibility and portability. Keeping in view all these points and

problems of the existing system, the new system has been developed using Java Server

Page and Oracle.

Advantages of Proposed System

Increases the system Reliability

Centralized access

Minimum cost

High security

System design for better performance

DAP Concept

Page 12: DOC

3. FEASIBILITY STUDY

It is both necessary and prudent to evaluate the feasibility of a project at

the earliest possible time. Months or years of effort, thousands and millions of dollars,

and untold professional embarrassment can be averted if an ill-conceived system is

recognized early in the definition phase.

Feasibility and risk analysis are related in many ways. If project risk is great,

the feasibility of producing quality software is reduced. During product engineering,

however, we concentrate our attention on four primary areas of interest.

3.1. Technical Feasibility

Technical feasibility is the need of hardware and software, which are needed to

implement the proposed system in the organization. Technical requirements are to be fulfilled to

make the proposed system work. This should be necessarily predetermined so as to make the

system more competent.

3.2. Economical Feasibility

The Economical feasibility must satisfy the needs of the technical feasibility and the

operational feasibility. It involves the economic feasibility of developing and implementing the

proposed system.

3.3. Operational Feasibility

Page 13: DOC

The proposed system should use the internet level then the different types of end

users are involved in the system, so it solves the user’s needs and the organization needs. And it

supports the all users environment.

4. System Specification

4.1. Hardware Requirements

Processor Intel Pentium Family

Clock Speed 667 MHz

RAM 128 MB

Hard Disk 4 GB or higher

Monitor Display panel (640 x 480)

Mouse Logitech Serial Mouse

Keyboard Standard 104 enhanced keyboard

Cache Memory 11,011,968 Bytes

Virtual Memory 32 MB

Display Card Super Video Graphics Adapter (SVGA)

4.2. Software Requirements

Operating System : Windows 98/2000/XP/NT

Web Server : Apache Tomcat 4.1.7

Web Browser : Internet Explorer

Front-End Tool : HTML

Client side Script : JavaScript

Server side Script : Java Server Pages

Back-End Tool : Oracle 8.0

Page 14: DOC

4.2.1. About the Software

HTML (Hyper Text Markup Language)

HTML came to existence in 1970. The development of HTML was initiated by Tim

Burners Lee was later taken over by Dan Cannolly, Dave Ragett. The ancestor of HTML

is SGML (Standard Generalized Markup Language). SGML was developed by ISO

(International Standard Organization) and was first used by the US DOD (Department Of

Defense).

SGML and HTML have a parent-child relationship. HTML can be referred to

as subset of SGML HTTP protocol used to transfer HTML pages.

JavaScript

Java script is a compact; object based scripting language for developing client

and server Internet applications.

Netscape Navigator 2.0 interprets JavaScript statements embedded directly

in an HTML page, and live wire enables you to create server-based applications similar

to common gateway interface (CGI) programs.

Using JavaScript in HTML

JavaScript can be embedded in an HTML document in two ways:

Page 15: DOC

As statements and functions using the script tag

As events handlers using HTML tags

JavaScript supports functions, again without any special declarative

requirements, functions can be properties of objects, executing as loosely typed methods,

JavaScript statements can get and set exposed properties to query the state or alter the

performance of an applet or plug in.

JAVA SERVER PAGES (JSP)

The best way to understand Java Server Pages work is by contrasting

a Web server that supports Java Server Pages with Web server that doesn’t. JSP is easy

to learn, robust, scalable, and cross-platform.

Prior to the introduction of Java server Pages, the main function of

Tomcat Server was to serve static HTML pages. When someone requested a web page

from a web site using Tomcat server, the server would fetch a static HTML file form disk

or memory and send it out to the person’s browsers. The primary responsibility of

Tomcat Server was to act as an efficient interface between browser and a bunch of files

sitting on the Web server’s hard drive.

Apache Tomcat Server was not different from other Web servers in

this respect .The main function of any Web server is to server HTML files. It’s important

to understand how this process of serving an HTML file is carried out, so here are the

steps.

1. A user enters the Internet address of an HTML file into the address bat of

Web browsers and passes enter to request a Web page.

2. The browser sends a request for the Web page to a Web server such as

Tomcat server, Personal web server.

3. HTML file because the requested file has the extension.htm or html.

Page 16: DOC

4. The Web server retrieves the proper HTML file from disk or memory and

sends the files back to the browser.

5. The person’s web browser interprets the HTML file and the results are

displayed in the browser window.

What are Java Server Pages?

Java Server Pages (JSPs) are Web pages that contain server-side scripts in

addition to the usual mixture of text and HTML (Hypertext Markup Language) tags.

Server-side scripts are special commands you put in Web pages that are processed before

the pages are sent from your Personal Web Server to the Web browser of someone who's

visiting your Web site. . When you type a URL in the Address box or click a link on a

Web page, you're asking a Web server on a computer somewhere to send a file to the

Web browser (sometimes called a "client") on your computer. If that file is a normal

HTML file, it looks exactly the same when your Web browser receives it as it did before

the Web server sent it. After receiving the file, your Web browser displays its contents as

a combination of text, images, and sounds.

In the case of a Java Server Page, the process is similar, except there's

an extra processing step that takes place just before the Web server sends the file. Before

the Web server sends the Java Server Page to the Web browser, it runs all server-side

scripts contained in the page. Some of these scripts display the current date, time, and

other information. Others process information the user has just typed into a form, such as

a page in the Web site's guest book.

The Web server retrieves the proper HTML file from disk or memory and

sends the files back to the browser.

Page 17: DOC

HOW DO JAVA SERVER PAGES WORK?

A JSP page is just like any other HTML file. Java statements must be

placed within <% and %> tag delimiters. Only ode placed within these delimiters will be

executed as Java code.

Browser Reqt Server sends a

a JSPs Page reqt to the JSP

engine

Server sends JSP Engine sends

HTML back to Servlet HTML

the server output back to server.

What Do Java Server Pages Look Like?

The appearance of a Java Server Page depends on who or what is

viewing it. To the Web browser that receives it, and Java Server Page looks just like a

normal HTML page. If a visitor to your Web site views the source code of a Java Server

Page, that's what they see: a normal HTML page. However, the file located in the server

looks very different. In addition to text and HTML tags, you also see server-side scripts.

This is what the Java Server Page looks like to the Web server before it is processed and

sent in response to a request.

I NTEGRATING SCRIPTS INTO JAVA SERVER PAGES

An Java Server Page is primarily a scripting environment; we can

integrate scripts created with both JScript and VBscript into our Java Server Pages. It can

User’s Computer

S E R V E R

JSP Engine

JSP page is translated to a servlet And executed.

Page 18: DOC

be used other scripting languages with Java Server Pages as well. Any scripting language

that has a scripting engine can be used in an Java Server Page.

The easiest way to add a script to an Java server Page is by using the

script delimiters <% and %>. Any text enclosed within these delimiters will be processed

as a script.

What Do Server-Side Scripts Look Like?

Server-side scripts look a lot like HTML tags. However, instead of

starting and ending with lesser-than (<) and greater-than (>) brackets, they typically start

with <% and end with %>. The <% is called an opening tag, and the %> is called a

closing tag. In between these tags are the server-side scripts. You can insert server-side

scripts anywhere in your Web page--even inside HTML tags.

Using Variables, and Forms in Java Server Pages

Forms are a convenient way to communicate with visitors to your

Web site. Using forms, you can create a survey form and ask visitors to fill it out. When

they fill out the form, you can process the results automatically.

With forms, there are two steps: first you create the form, and then

you process it. To create a form for a Java Server Page, just create a standard HTML

form.

Java Server Pages provide a mechanism for processing forms that,

unlike CGI scripting, doesn't involve serious programming: the Request. Form.

Considering the form above, we may create the file bellow and get a response.

Creating a Variable

You'll probably want to do more with your forms than display their

contents in a Web page. For example, based on the contents of the form, you may want to

create a variable and insert that variable in different places of your response page. You

Page 19: DOC

may need to create a variable. To do that, just make up a name and set it equal to the

contents of the field.

Implicit Objects

Request

Response

Page Context

Session

Application

Request:

It defines an object that provides access to HTTP-protocol-specific header

information sent by the client.

Response:

It defines an object that provides the JSP with the capability to manipulate HTTP-

protocol-specific header information and return data to the client.

Page Context:

It provides access to the namespaces associated with a JSP page. It also provides

accessors to several other JSP implicit objects.

Session:

It is used to store objects in between client requests. It provides an almost state-full

HTTP interactivity.

Application:

It is most often used to access environment information. One of the more common

pieces of information accessed by the application object is objects that are stoed in the

Page 20: DOC

Servlet Context. These objects are stored there so that they will be available the whole

time the servlet engine is running.

Features of JSP

Platform independence:

The use of JSP adds versatility to a Web application by

enabling its execution on any computer.

Enhanced performance:

The compilation process in JSP produces faster results or

output.

Separation of logic from display:

The use of JSP permits the HTML specific static content and a

mixture of HTML, Java, and JSP specific dynamic content to be placed

in separate files.

Ease of administration:

The use of JSP eliminates the need for high-level technical

expertise, thereby helping Web developers, designers, content creators, and content

managers to work together and develop Java-based applications in less time and with less

effort.

Ease of use:

All JSP applications run on major Web servers and operating

systems, including Microsoft IIS, Netscape Enterprise Server, iPlanet

Web Server, and Apache Web Server. These applications are also

available on Windows NT, Windows 2000, and Solaris 7.

Page 21: DOC

About Oracle 8.0:

Relational Database Components:

The database component of Oracle is a Structured Query Language (SQL)

based, scalable, relational database with integrated Extensible Markup Language (XML)

support for Internet applications. Each of the following terms describes a fundamental

part of the architecture of the Oracle database component.

Database

A database is similar to a data file in that it is a storage place for data. Like a

data file, a database does not present information directly to a user; the user runs an

application that accesses data from the database and presents it to the user in an

understandable format.

Database systems are more powerful than data files in that data is more highly

organized. In a well-designed database, there are no duplicate pieces of data are grouped

together in a single structure or record, and relationships can be defined between these

structures, and records.

When working with data files, an application must be coded to work with the

specific structure of each data file. In contrast, a database contains a catalog that

applications use to determine how data is organized. Generic database applications can

use the catalog to present users with data from different databases dynamically, without

being tied to a specific data format.

A database typically has two main parts: first, the files holding the physical

database and second, the database management system (DBMS) software that

applications use to access data. The DBMS is responsible for enforcing the database

structure, including:

Page 22: DOC

Maintaining relationships between data in the database.

Ensuring that data is stored correctly, and that the rules defining data

relationships are not violated.

Recovering all data to a point of known consistency in case of system failures.

5. System Design

Introduction:

Based on the user requirements and the detailed analysis of a new system, the

new system must be designed. This is the phase of system designing. It is a most crucial

phase in the development of a system.

Normally, the design proceeds in two stages:

1. Preliminary or general design

2. Structure or detailed design

Preliminary or general design:

In the preliminary or general design, the features of the new system are specified.

The costs of implementing these features and the benefits to be derived are estimated. If

the project is still considered to be feasible, we move to the detailed design stage.

Structure or detailed design:

Page 23: DOC

In the detailed design stage, computer oriented work begins in earnest. At this

stage, the design of the system becomes more structure design is a blue print of a

computer system solution to a given problem having the same components and

interrelationship among the same components as the original problem. Input, output and

processing specification are drawn up in detail. In the design stage, the programming

language and the platform in which the new system will run are also decided.

There are several tools and techniques used for designing. These tools and

techniques are:

Flowchart

Data flow diagram

Data dictionary

Structured English

Decision table

Decision tree

In the system design part is considered after the successful compilation of the

problem analysis. The requirements which and specified in software requirements

specification is verified i.e. whether the requirement specified in it satisfies the user

needs.

5.1. Project Description

Advanced Secured System developed act as a middleman between the client and the

server. It reduces the work of the server and gives access to server resources to multiple

clients at same time. It reduces the response time experienced by the clients. This server

will be cost-effective when compared to other servers in the market. Other servers in real

time provide a single service. The server, which we have designed, is to meet the real

Page 24: DOC

time requirements .To share our thoughts with other clients in a network we can use chat

services where we can exchange out views in the form of typed-in messages. Chatting

can be provided as private chat and as well as multi-chat. This system in addition checks

whether virus file have affected the system and acts as a firewall to save the system from

viruses. If it finds a virus it will report to the server what action to be taken against the

virus file. The server can delete the file from the system or it can block the virus or it can

repair the virus and quarantine the infected file. If the users are on-line they can share the

messages through chatting, if the users are on offline they can share their views through

sending mail to the users in the network who himself registered them as the clients of our

system.

User Registration:

Authentication is the technique by which a process verifies that its

communication partner is who it is supposed to be and not an intruder. In order to provide

authentication in this project USER NAME AND PASSWORD has been

designed.

LOGIN

NEW USER

LOGIN:

Login button is used to display the Login Dialog Box. It has two text

fields and one buttons. User Name and password are entered in their respective fields.

Entered user name and password are send to the server and checked with its database.

If valid user, then the user is permitted to enter into the system and their names are

added to the list boxes of both the client and the server. If invalid user then the user

exits out of the system.

USER:

User button is used to display the New User Dialog Box. It contains the

fields such as User Name, password, First Name, Last Name-mail address, Age, Sex,

phone Security Question Answer. The new user can enter into the system by giving

Page 25: DOC

the details in their respective fields. If the user name and password are non-existence

they are considered as a valid user and sent to the server database.

Establish connection between a client and server. Store login ids of all users of

in the server database. Get the user name & password. Check for the correctness of user

name and password. If it is correct enable the user to use the services else move the user

to error page.

To provide a strong authentication for this system, each user will be provided with

a unique username and password. First the users must register in this system before they

access this system. In registration time, the users will have to answer the questions

provided by the system. The questions will be based on the networking side. If the users

answers the questions and the system will verify the answers and depending upon the

correct answers the system will generate a key. There are three types of categories

depending upon the key generated by the system.

First category of services will provide:

1. File Transfer

2. E-mail

3. Resource Sharing

4. Web page view

5. Chat

Second Category of services will provide:

1. File Transfer

2. E-mail

3. Web page View

Third category of services will provide

1. File Transfer

2. E-mail

Each time user enters the system it will check for strong authentication whether

the username and password is valid. If the authentication is valid, the services will be

provided to the user else the user will be move to error page. If the username a password

Page 26: DOC

will be sometimes wrong by misspelled so the user can be once again redirected to the

main page.

File Transfer:

If a user wants to access a file in the server he must make a request to the server.

There are three steps followed in File transfer

1. File search

2. Virus File check

3. DAP Concept

First step in File search, it receives a request from the user. The request will

be a file name. First the server finds all root drives in the system. It then searches

for all folders in the system. Then it moves to search for all the subfolders in the

system and it searches the requested file name will reside in subfolder. If it exists

then it will took the file and move to next step i.e. virus check else it reports the

requested file does not reside in the system.

Second step will receive the file name and check whether the file name

matches with the updated virus file in the database. If it exists then the server will

report the requested file is virus file else then it will move to next phase which is

transferring the file.

Third step uses DAP concept, i.e. check the file length. If the requested file is

a valid one then the server starts to transfer the file from server to client location.

After transferring the file, the server check for the file length. It checks the length

of the file, before and after transmission .If it equals then the file transfer will be

completed else the file transfer is corrupted. Then again it will transfer the file,

until the file transfer is completed.

E-Mail:

Mail is one of the services provided by this system. The ability to compose, send

receive; delete electronic mail has been enormously popular. In this project, E-Mail

Page 27: DOC

can be sent to the recipient without having to enter into the Web

browser. Electronic mail is one of the ways where we can send our

messages to a group of people. It is a mixture of text, drawings and

facsimile. Normally mail consists of two subsystems: the user agents,

which allow people to read and send email and the message transfer

agents, which move the messages fro the source to destination. The

message inside the envelope contains two parts: the header and the

body. The header contains control information for the user agents. The

body is entirely for the human recipient. To send an email a user must

provide the message, the destination address and possibly some other

parameters (e.g., the priority or security level). The message can be

produced with an editor built into the user agent. The destination

address must be in the format that the user agent can deal with. Many

user agents expect DNS addresses of the form mailbox@location.

When a user is started up to read an email, it will look at the

user’s mailbox

for incoming email before displaying anything on the screen. Then it

may announce the messages in the mailbox or display a on-line

summary of each one and wait for a command. In a sophisticated

system, the user can specify which fields to be displayed by providing

a user profile, a file describing the display format. The first field is

message no. The second field, Flags k meaning that the message is not

new but was read previously and kept in the mailbox. The third filed

tells how long the message is and the fourth field tells who send the

message. Finally, the subject field gives the brief summary what the

message is about.

Resource Sharing:

Resources may include, information retrieval, computer data processing,

transmission and storage, and any other functions performed, in whole or in part, by the

Page 28: DOC

use of a computer, computer network, computer software, or computer program. In this

project Resources related to hardware and software are used.

Server provides all applications, files and messages. If a client wants

applications from the server, the server grants permission to the particular client

according to their authentication level, i.e., applications is shared to clients. The client

can access the printer, which are attached to the server when a request is provided. If the

printer is connected in the server, and one or more clients request for print options then

the server will provide a queuing system. Then the service will be provided to each user

according to queue formed in the server. If the printer is not connected it will sent an

error message. The provider sends the applications from the server to the requested client.

Resources include devices such as CD, Floppy and Printer. The clients access these

devices, which are attached to the server when a request is provided. If one or more users

request the same device then the server will maintain a queue and provide the services to

the users according the queuing system maintained in the server.

Authentication is provided to client to access the devices from the server.

The example devices that can be accessed like Floppy Drive, Printer. Directories & files

are displayed on client machine and can be saved on the client machine according to the

Provided authentication.

Web page View:

The user requests a webpage in the server, if the page resides in the server then

the copy of the page will given to the client. In this service the page will be transferred

and immediately opened at the client window. This service will provide that the page will

reside in the server and it will be opened in the client side without any requirements. This

service is entirely different from transferring a file from the server. In that service the file

will be transferred to the client side and it will be saved on the client side and the user

may open the file according to his wish. But in webpage view the file will not be saved

on the client side, it will be opened on the client side and source file may reside in server.

Page 29: DOC

Chat:

Chatting means exchanging the information between the users. Usually this kind

of “talking” is the exchange of typed-in messages requiring one site as the repository for

the messages and a group of users who take part on the network. In some cases, a private

Chat can be arranged between two parties who meet initially in a group. Chat can be

ongoing or scheduled for a particular time and duration. Chat is one way of exchanging

our views. The chat can be selected on a certain topic such as politics, religion,

entertainment, education, business etc... The chat can be done with a group of people and

there are ways were we could exchange confidential matters through private chat. In our

system when we register ourselves as a user the system will provide you a username and

password. That username will be considered as your id for chatting.

5.2. Data Flow Diagram

A DFD is a modeling tool that allows us to show a system as a network of processes (mini systems) connected to each other by paths of data.

Data Flow:

Each arrow in a DFD Represents a path (or pipeline of conveyer belt) of data, called the Data Flow.

Process:

A process represents an automated or manual activity that transforms incoming data flows to outgoing data flows.

Data-Store:

A Data-Store holds the data (for reference), which the system cannot remember.External events and system responses ate From/To “Sources” or “Destination” of the system.

Page 30: DOC

Components of DFD:

The basic components of DFD are following

Source/Destination

Process

Data Source

DFD are based on the strategy of structured techniques, Namely:

1. Graphics

2. Top Down Approach

3. Separation of logical from the physical

4. Partitioning

DFD is do not show

How things begin & end

Loops

Decisions

System Flow Diagram

Start

Page 31: DOC

Login No Yes

Data Flow Diagram

1. User Validation

Enter Username &Password

Is Valid?

File Transfer Mail Resource sharing

Web Page View Chat

LOGIN

Registration

Page 32: DOC

Username, Password Username, Password, Login Key No Yes

2. File Transfer

No

Yes

Yes Virus

No

User validation

DBValid User

File ChatResource Mail Webpage

File Transfer

File Transfer

File Exists

Virus File

Error Page

File Not Found

Virus File

Page 33: DOC

If file length Not equals

If file length equals

3. Mail

Mail

DAP

File Transfer Completed

Inbox Compose

DB

Received Messages

Mail

Page 34: DOC

4. Resource Sharing

Floppy Drive Client Requests Had Drives Server Responds CD-Drive Printer

5. Web Page View

No

Yes

6. Chat

Client Server

Webpage Request

Page Exists

Webpage View

Webpage Not Found

Page 35: DOC

5.3. Database Design

Database Design is a crucial factor in the performance of a system both in

terms of system timings and in the case with which the system can be maintained or

modifies.

Table Name: Login

Field Name Data Type DescriptionUser Varchar Client codePwd Varchar PasswordKey Varchar Key

Table Name: Virus

Field Name Data Type DescriptionVirus Number Virus Name

Table Name: Mail

Field Name Data Type Description

Chat server

Client-1 Client-1

Page 36: DOC

Frm Varchar Sender’s NameTo Varchar Receiver’s NameSub Varchar SubjectTime Varchar TimeMsg Varchar Message

Input Design

The goal of designing input data is to make entry easy, free from errors and validations should be maintained such that end users feel comfortable and user friendly while entering data into the system. When the programmer approach input design the first task is to design the source document that captures the data and select media as used to enter into the computer.

User Entry

In this user entry enter the user id and password. It is used for perform the securable data operation.

6. SYSTEM TESTING AND IMPLEMENTATION

6.1. TESTING FUNDAMENTALS

Software testing is an important element of S/W quality assurance

and represents the ultimate review of specification, design and coding. The increasing

visibility of S/W as a system element and the costs associated with a S/W failure are

motivating forces for well planned, through testing.

Though the test phase is often thought of as separate and distinct

from the development effort--first develop, and then test--testing is a concurrent process

that provides valuable information for the development team.

Page 37: DOC

There are at least three options for integrating Project Builder into

the test phase:

Testers do not install Project Builder, use Project Builder functionality to

compile and source-control the modules to be tested and hand them off to

the testers, whose process remains unchanged.

The testers import the same project or projects that the developers use.

Create a project based on the development project but customized for the

testers (for example, it does not include support documents, specs, or

source), who import it.

A combination of the second and third options works best.

Associating the application with a project can be useful during the testing phase, as well.

We can create actions to automatically run test scripts or add script types and make them

dependent on the modules to test.

TESTING OBJECTIVES

There are several rules that can serve as testing objectives.

They are

1. Testing is a process of executing a program with the intent of finding an error.

2. A good test case is one that has a high probability of finding an undiscovered

error.

3. A successful test is one that uncovers an undiscovered error.

If testing is conducted successfully according to the objectives stated above, it

Page 38: DOC

will uncover errors in the software. Also, testing demonstrates that software functions

appear to the working according to specification, that performance requirements appear

to have been met.

Testing Principles:

All tests should be traceable to customer requirements. The objective of

software testing is to uncover errors.

Tests should be planned long before testing begins. Test planning can design as

soon as the requirements model is complete. All tests should be planned and designed

before any code has been generated.

The parento principle applies to software testing. The parento principle implies

that 80 percent of all errors uncovered during testing will likely be traceable to 20 percent

of all program modules.

The testing should begin “in the small” and progress toward testing “in the

large”. To be more effective testing should be conducted by an independent third party.

By “most effective”, testing means that has the highest probability of finding errors.

A successful test case is one that uncovers an as-yet-undiscovered error.

Software testability is how a computer program can be tested. The following list of

categories shows that this software has been tested.

Software testing is often referred as verification and validation. Verification

refers to the set of activities that ensures that the software correctly implements the

specific function. Validation refers to a different set of activities that ensures that the

software that has been built is traceable to the customer requirements.

Page 39: DOC

OBJECT ORIENTED TESTING

VALIDATION TESTING:

Validation testing is one, which checks the given data is a valid one, or

not. In our system, first stage username and password is checked. If it is a valid one, then

the services will provided to the user. Hence validation testing takes place at the earlier

part of our project. This is one of the most crucial one, which takes place at the all kind of

projects.

6.2.UNIT TESTING

Unit testing focuses the verification effort on the smallest unit of

S/W design i.e., the module. The unit testing is always white-box oriented and the step

can be conducted in parallel for modules.

During unit test, testers can use the same project or projects as the

developers, if functional units organize the project, or separate projects have been created

for functional units. The project or projects can also be exported, so unit test can take

place in a variety of environments and on a variety of platforms.

Unit testing comprises the set of test performed by an individual programmer prior

to integration of the unit into a larger system. There are different types of tests to be

performed on a programming unit. These may be classified as follows:

Functional Tests

Performance Tests

Stress Tests

Structure Tests

Page 40: DOC

Functional Test cases involves exercising the code with normal input values

for which the expected results are known, as well as boundary values and special

values.

Performance Testing determines the amount of execution time spent in

Various parts of the unit, program throughput, response time and device

utilization by the program unit.

Stress Tests are those tests designed to intentionally break the limit. A great

deal can be learnt about the strengths and limitations of a program by examining

the manner in which a program unit breaks.

Structure Tests are concerned with exercising the internal logic of a program and

traversing particular execution paths to exercise, deriving test date, determining the

criterion to be used, executing test cases.

UNIT TEST CONSIDERATIONS

The tests that occur as part of unit testing. The module ‘interface’ is

tested to ensure that information properly flows into and out of the program unit under

test. The ‘local data structures’ are examined to ensure that data stored temporarily

maintains its integrity during all steps in an algorithms execution.

‘Boundary Conditions’ are tested to ensure that the module operates

properly at boundaries established to limit or restrict processing. All ‘independent paths’

through the control structures are exercised to ensure that all statements in a module have

been executed at least once. Finally, all ‘error-handling paths’ are tested.

UNIT TEST PROCEDURES

Page 41: DOC

Unit testing is considered an equivalent to the coding step. After the

source level code has been developed, reviewed and verified for correct syntax, unit test

case design begins since a module is not a stand alone program, ‘driver’ and/or ‘stub’

S/W must be developed for each unit test.

In most applications, a driver is nothing more than a main program

that accepts test case data, passes such data to the module to be tested, and prints the

relevant results. The stubs serve to replace modules that are subordinates called by the

modules to be tested. A stub or a dummy stub or a dummy subprogram uses the

subordinate modules interface, may do minimal data manipulation, prints verification of

entry, and returns. The drivers and scrubs represent overhead i.e., both are S/W that must

be written but that is not delivered with the final S/W product. If the drivers and the stub

are kept simple, then the overhead is low.

In Our project, Unit testing takes place at every module. First stage

the file name is requested from the user. Then the server searches the file in the

system. If the file exists in the system then it will moves for virus checking. If the file

is a valid one then it will be transferred to the client location. After transferring the

file, it will check the length of the file before and after transmission. If the length

equals then the file transfer is completed otherwise we have to retransmit the file.

The Unit Test is carried out in this project, and is found successful. The

data is flowing correctly to all part of the project.

6.3. INTEGRATION TESTING

Page 42: DOC

It addresses the issues associated with the dual problems of verification and program

construction. Black box test case design techniques are the most prevalent during

integration, although a limited amount of white box testing may be used to ensure

converge of major control paths. Integration testing is a systematic technique for

constructing the program structure while at the same time conducting tests to uncover

errors associated with interfacing. The objective is to take unit-tested modules and build

a program structure that has been depicted by design.

Incremental Integration Strategies are

Top-Down Integration

Bottom-Up Integration

Test cases were designed so that all units tested modules were executed

from the main module and the reports were generated to check the results with the

expected results.

After has been integrated, a set of high order tests are conducted, validation

criteria must be tested.

In our project, integration testing checks if the validation part is

correct then user will allow to move to next step i.e. the home page where all kinds

of services resides. It means it will maintain a bridge to move to other modules and

integrate them.

Integration testing is a systematic technique for constructing the program

structure while at the same time conducting test to uncover errors associated with

interfacing. The objective is to take unit-tested modules and build a program structure

that has been dictated by design.

Page 43: DOC

TOP-DOWN INTEGRATION

This method is an incremental approach to the construction of

program structure. Modules are integrated by moving downward through the control

hierarchy, beginning with the main program module.

Importing the test project and setting up the testing environment

The process of importing a test project and

setting up a testing environment is the same as the process for importing a project and

setting up the environment for development.

Adding test scripts and test data to the project

You may need to add some items, such as test

scripts, to the project. In addition, you may need to add connection strings to database

accounts containing test data.

Remember that you can automate the running

of test scripts just as you can automate actions associated with the modules in your

application.

Page 44: DOC

Modifying actions and macros to facilitate testing

If actions specifying "run with debugging"

have not already been provided, you can either modify existing actions to include a debug

flag, or create new actions.

6.3. Acceptance Testing

This test was performed with the users of the system and made sure that

it performed as they expected. It was verified that all functionality required by the

user have been satisfied. So for, the system has been found defect free and is

working well.

6.4. IMPLEMENTATION

Once the system has been designed, the next step is to convert the

designed one in to actual code, so as to satisfy the user requirements as excepted. If the

system is approved to be error free it can be implemented.

When the initial design was done for the system, the department was

consulted for acceptance of the design so that further proceedings of the system

development can be carried on. After the development of the system a demonstration was

given to them about working of the system. The aim of the system illustration was to

identify any malfunctioning of the system.

Implementation includes proper training to end-users. The

Page 45: DOC

implemented software should be maintained for prolonged running of the software.

Initially the system was run parallel with manual system. The

system has been tested with data and has proved to be error-free and user-friendly.

Training was given to end -user about the software and its features.

7. MAINTENANCE

The term “software maintenance” is used to describe the

software engineering activities that occur following delivery of a software product to

the customer. The maintenance phase of the software life cycle is the time period in

which a software product performs useful work.

Maintenance activities involve making enhancement to

software products, adapting products to new environments and correcting problems.

Software product enhancement may involve providing new functional capabilities,

improving user display and modes of interaction, and upgrading external documents.

Adaptation of software to a new environment may involve moving the software to a

different machine. Problem correction involves modification and revalidation of

software to correct errors.

The enhancement of this project can be accomplished

easily. That is, any new functional capabilities can be added to the project by simply

Page 46: DOC

including the new module in the homepage and giving a hyperlink to that module.

Adaptation of this project to a new environment is also performed easily.

7.1. Corrective Maintenance

Even with the best quality assurance activities, it is likely that

they customer will uncover defects in the software. Corrective maintenance changes the

software to correct defects.

7.2. Adaptive Maintenance

An activity that modifies the software to properly interface with a

changing environment. The system has been modified so that various change include to

the new system.

In case of Fund Transfer, adoptive maintenance has been

performed, that is in earlier system (character based UNIX system) changes are fixed and

if any new changes are to be included, was a difficult task. Now provisions are given so

that the user can define various changes. Such as it designed to accommodate the new

change in further.

7.3. Enhancement Maintenance

Page 47: DOC

As software is used, the customer/user will recognize additional

functions that will provide benefit. Perceptive maintenance extends the software beyond

its original functional requirements.

In the case of Advanced secured system can be added new

functions such that the user can able to retrieve the information in a user friendly and it

will be very helpful for future development.

8. Screen Layouts

Page 48: DOC

9. Conclusion

This project incorporates all requirements of a Server. This system has

been developed as versatile and uses friendly as possible keeping in mind the

advanced features in this technology.

This is precisely where the ADVANCED SECURED SYSTEM fit

into place. This System supports and improves many of the core functionality of the

organization. Using such a system helps the organization in minimizing the time and

money consumed in fulfilling the day-to-day functionality’s and cutting down the

expenses incurred on the same. The real world requirements was satisfied by this system

which provides all services like e-mail, chat… The File Transfer is very effective where

this system uses the concept of DAP. E-mail is one of the service which we can send mail

Page 49: DOC

through the intranet. Resource sharing can be achieved through this system. In our day

today life, we have to move to third party to get mail, chat etc… But this problem is

solved using our system. So our system will be cost effective and used in any platform.

Using JSP and Oracle 8.0, the system was developed. As a whole, the

system was wellplanned and designed.

10. Future Scope of the Project

The project will be more users friendly with the future enhancement of

having the mailing facility, which will intimate the users to send their messages to

internet itself. As well as verification mails, warning mails and news updates to be send

to the using the automatic mailing facility. The enhancement also consists of making

private chat more effectively and connecting to ftp server for file transfer in the internet.

Further, this project can be proposed to use EJB for further deployment purposes. This

facility will make the Server a complete one.

Page 50: DOC

11. Bibliography

Book Name : Mastering JSP

Author : A. Russell Jones

Book Name : JSP Developer’s Guide

Author : Gregpuezek

Book Name : Oracle 8.0

Author : Cassel & Palmer

Page 51: DOC
Page 52: DOC
Page 53: DOC
Page 54: DOC