Project Report
Project Report
On
Cyber Cafe Management System
2010
Staff in-charge
Head of Department
Internal Examiner
External Examiner
Thodupuzha
Date.
ACKNOWLEDGEMENT
On the occasion of presenting this project report, we wish to
express our deep and profound feelings of gratitude to a number of persons
who have contributed to the completion of this project.
First of all we express our deep gratitude to Almighty, the
supreme guide, for bestowing his blessings upon us in our entire endeavor.
We are grateful to our respected Principal Dr. Lathakumari B for
providing all facilities for the development of our project.
We also express our heartfelt gratitude to Mrs. Bindu Baby
Thomas our Head of the Department for rendering all possible help and
support during the development, implementation and presentation of the
project.
We are extremely grateful to Mr. Sijo Thomas lecturer-in-charge
of our project for his valuable guidance and encouragement throughout our
humble endeavor.
TABLE OF CONTENTS
CHAPTER
TITLE
NO.
PAGE NO.
SYNOPSIS
1.
INTRODUCTION
2.
SOFTWARE ENVIRONMENT
2.1
3.
4.
5.
SOFTWARE SELECTION
SYSTEM ANALYSIS
3.1
EXISTING SYSTEM
3.2
3.3
PROPOSED SYSTEM
3.4
3.5
PROBLEM DEFINITION
3.6
SYSTEM CONFIGURATION
3.7
FEASIBILITY STUDY
10
11
4.1
11
LOGIN
11
4.3
CABIN SETTINGS
11
11
4.5
RECHARGE
11
4.6
BILLING
11
4.7
REPORTS
12
12
SYSTEM TESTING
14
5.1
Unit Testing
14
5.2
Integration Testing
14
5.3
15
5.4
15
6.
5.5
Functional Test
15
5.6
Performance Test
16
5.7
Stress Test
17
5.8
Structure Test
17
5.9
Validation Test
18
18
18
19
IMPLEMENTATION
20
6.1
20
6.2
SYSTEM MAINTAINANCE
21
7.
23
8.
USER TRAINING
24
8.1
INTRODUCTION
24
8.2
USERS MANUAL
24
9.
CONCLUSION
25
9.1
25
10.
REFERENCES
25
11.
APPENDIX I
26
26
APPENDIX II
28
12.1 DFD
28
33
12.
33
APPENDIX III
35
35
APPENDIX IV
43
14.1 OVERVIEW
43
SYNOPSIS
Computers have become a way of life for todays high society. Many aspects of
modern life that we have come to accept as common place would not be possible
if there were no computers. Today computers are use extensively in many areas of
business, industry, science, education etc.
The major advantage of computer is its speed that makes it able
to give some useful information very quickly. This speed also opens new
approaches to problem solving and data processing. Another feature is its
accuracy. Though the computers do only what is instructed at every instant, these
instructions are taken into account and accurate informations are produced.
Computer can hold data and instruction in an electronic representation in internal
memory and this data can be retrieved at any time
The project entitled Cyber Caf Management System is a software
package, which can be used in cyber cafs for managing the clients computer
efficiently. Now a days cyber terrorism, which is mainly undergone through
internet cafs, need to be tackled properly. Thereby, it is indeed necessary to store
the valid information of the user who comes for internet access. The system being
used, the time at which the user logs in and logs out should be recorded
systematically.
In this modern era, a number of people access the internet frequently by
means of cyber cafes. For such frequent users, a prepaid account shall be
maintained and discounted rates may be charged from them. While walkthrough
users, who are less frequent, are charged a fixed rate. By using the LAN
connections in the cyber cafes we can automate this process very easily. This
system comprises of the following modules:
The server module, which is handled by the administrator can create new
accounts for prepaid users and also store the details of walkthrough customers.
While in the client module, which is handled by users themselves, the user should
give his/her user-id and password to start browsing. After they are logged out, the
time and amount will be automatically generated at the server module and the bill
is provided to the user.
This system is developed in JAVA language with My SQL as backend. The
system is a menu driven one. User-friendly menus will help both the administrator
and the clients to work on it without any operational difficulty.
INTRODUCTION
In this project an attempt is made to design a computer system for
the CYBER CAF that makes the management of recording user details, internet
usage and billing much easier. The objective of this software is to maintain the
details of users, cabins and login history. Through this system we provide facility
of prepaid and postpaid accounts respectively for Account Users and
Walkthrough Users. It has the features like adding, viewing, editing of user
details, cabin details, recharge option for prepaid users, billing, tariff settings,
etc.
The Software powered by JAVA assures clear and efficient services to
the agency. This easy-to-operate system helps to access and modify user details,
provides efficient billing facility. The software is designed to provide Reliable
and error free information. The database is driven by My SQL thus providing
portability. Anyone having an account with the system can have access to
internet by logging into the client machine using a given username and
password. Account users can login only if they have sufficient balance in the
account. Otherwise they will have to recharge their account using the recharging
facility at the administrator side. To ensure enhanced security user account
creation, editing, etc are available only at the administrator side.
On successful login the user can load browser and can have access to internet.
The login time displayed on the login screen may help the users manage their
usage. On logout the internet usage charges and available balance in the account
(in case of account users) will be displayed.
2. SOFTWARE ENVIRONMENT
2.1 SOFTWARE SELECTION
The proposed software is designed on the JAVA platform with My SQL
backend.
JAVA is special because - first, it is platform-independent. That means that
you, as a Java programmer, will need to write your Java code only once. Before
Java, programmers had to write their code for each targeted operating system
(OS). If you wanted to write a poker game application and then distribute it to
customers, you would have to write the program for the Windows operating
system and again for the Mac operating system. Java eliminates the
problematic scenario above, once and for all. You write your poker application
in Java, compile the application, and distribute it. As long as your users have a
Java Virtual Machine (JVM) for their particular operating system, then your
application will run on a Mac, Windows, UNIX, or any other operating system
that has the correct JVM.
Another special feature of Java is that it is object-oriented. Object-oriented
programming allows the programmer to create templates (classes) that can be
reused over and over. Every time you write a program, you dont want to
reinvent the wheel, and creating well-designed classes will give you a great
foundation for writing other programs. Also, Java has a core set of classes that
are already provided for you. You can take advantage of these pre-built classes,
and you have the ability to create classes from scratch. You can even use many
of the pre-existing Java classes as a model to create customized classes of your
own.
One of the ideas behind Java's automatic memory management model is that
programmers be spared the burden of having to perform manual memory
management. In Java, the potential problem of memory leakage is avoided by
automatic garbage collection. The programmer determines when objects are
created, and the Java runtime is responsible for managing the object's lifecycle.
The program or other objects can reference an object by holding a reference to it
(which, from a low-level point of view, is its address on the heap). When no
references to an object remain, the unreachable object is eligible for release by
the Java garbage collector - it may be freed automatically by the garbage
collector at any time. Java does not support pointer arithmetic as is supported
in, for example, C++. This is because the garbage collector may relocate
referenced objects, invalidating such pointers. Another reason that Java forbids
this is that type safety and security can no longer be guaranteed if arbitrary
manipulation of pointers is allowed.
My SQL is an open source structured query language. It is platformindependent and hence is portable. The language is easy to understand and use.
The queries are very similar to Oracle 8i and can be easily used in java
programs. JDBC (java database connector) driver is used to implement Java to
My SQL connectivity.
3. SYSTEM ANALYSIS
The account can be of two types, Account user and Walkthrough user. An
account user must pay a minimum amount of Rs.50 for the creation of account.
While walkthrough users have to pay only after their usage. Account users can
use the internet for lower tariffs which can be adjusted from the menu tariff
settings.
The usage amount will be deducted from their accounts balance. In case
their credit amount is lower, the customer should recharge their account.
Recharge option are available at recharge menu.
An account contains information about the users name, address,
identification etc... They should have a unique user-id and password. Using this
user-id and password they can log in from the client computers. In case any
user forgets his password, it can be recovered and edited from the edit option in
menu named Account setting.
Different reports are included regarding users, their login time, logout
time, used machine etc In case if any malpractices have occurred from the
caf, it can be identified by checking the user report. Daily report provides
details regarding all the user details of a day. Reports of a specific user can be
viewed using their user-id. Similarly machine wise reports are also there, which
helps to find all the users who have used a specific computer.
Since information regarding the users is needed for further checking, an
account can be deleted only after 5 years from the last login date. That is the
information and details regarding usage of a user will be kept for at least 5
years.
3.4 SCOPE OF THE PROJECT
The system we propose has great scope in the current real time situation.
The cyber crime monitoring system can be enhanced to an extent by
implementing this system. Most of the firms and establishments are being
computerized in order to ease the tasks to be performed. The internet cafs
unfortunately are rarely computerized. We aim through this venture, a better
reliable solution. In the primary stage of feasibility study itself we received an
exquisite response and so we plan to go ahead with our project.
3.5 PROBLEM DEFINITION
The purpose of the project is to automate cyber cafes. The software must
include provisions to keep user details and login history. It should help the caf
owners to retrieve user details when needed and internet usage in the system. It
should be capable of allocating cabins automatically. It should help the caf
owner in calculating daily usage of the systems and income.
3.6 SYSTEM CONFIGURATION
HARDWARE CONFIGURATION:
Processor
Pentium IV
Memory
512 MB RAM
Keyboard
105 Keys
Monitor
CRT or LCD
Mouse
SOFTWARE SPECIFICATION:
Operating System
Windows XP/NT,
Front End
CORE JAVA
Back End
MY SQL
Documentation
MS Word
4.7 Reports:
The administrator controls this module. Here he/she can have a look on
usage reports of a particular user, whole usage, usage in a particular machine
and daily report.
4.8 View Account:
This module is controlled by the administrator. Here he/she can have a look on
account details.
Process:
data flows.
Data Store:
A data store represents a repository of data that is to be stored for use by one
or more processes may be as simple as buffer or queue or sophisticated as
relational database. They should have clear names.
A Source or Sink:
5. SYSTEM TESTING
System testing involves unit testing, integration testing, white-box
testing, black-box testing. Strategies for integration software components into a
functional product include the bottom-up strategy, the top-down strategy, and
sandwich strategy. Careful planning and scheduling are required to ensure that
modules that will be available for integration into evolving software product
when needed a serious of testing are performed for the proposed system before
the system is ready for user acceptance testing.
5.1 UNIT TESTNG
Instead of testing the system as a whole, Unit testing focuses on the
modules that make up the system. Each module is taken up individually and
tested for correctness in coding and logic.
The advantages of unit testing are:
Size of the module is quite small and that errors can easily are
located.
specification, starting from what the program should do and how it should
perform under various conditions. Then test cases are developed for each
condition or combinations of conditions and submitted for processing. By
examining the results, the analyst can determine whether the programs perform
according to its specified requirements. This testing strategy sounds exhaustive.
If every statement in the program is checked for its validity, there doesnt seem
to be much scope for errors.
5.5 FUNCTIONAL TEST
In this type of testing, the software is tested for the functional requirements. The
tests are written in order to check if the application behaves as expected.
Although functional testing is often done toward the end of the development
cycle, it canand should, be started much earlier. Individual components and
processes can be tested early on, even before it's possible to do functional
testing on the entire system. Functional testing covers how well the system
executes the
functions it is supposed to executeincluding user commands, data
manipulation, searches and business processes, user screens, and integrations.
Functional testing covers the obvious surface type of functions, as well as the
back-end operations (such as security and how upgrades affect the system).
entirely possible in actual practice. The reason is that production systems have a
random nature of the workload and while the test workloads do their best to
mimic what may happen in the production environment, it is impossible to
exactly replicate this workload variability - except in the simplest system.
5.7 STRESS TEST
The application is tested against heavy load such as complex numerical
values, large number of inputs, large number of queries etc. which checks for
the stress/load the applications can withstand. Stress testing deals with the
quality of the application in the environment.
structures and data structures used in the program. White-box testing is also
called structural testing and we will use the two terms interchangeably.
over the Web. The experiences of the early users are forwarded back to the
developers who make final changes before releasing the software commercially
5.12 CHANGE OVER PLAN
Testing commences with a test plan and terminates with acceptance
testing. A test plan is a general document for the entire project that defines the
scope, approach to be taken, and the schedule of testing as well as identifies the
test items for the entire testing process and the personnel responsible for the
different activities of testing.
6. IMPLEMENTATIONS
Implementation is the stage where the theoretical design is turned
into a working system. The system can be implemented only after thorough
testing is done and if it is found to work according to the specification. The
implementation phase comprises of several activities. The hardware and
software requisition is carried out. Implementation of a computer system is by
replacing a manual system. The problem encountered are converting files,
training users, creating accurate files, and verifying printouts for integrity.
Pre implementation and Post implementation are the two major types in
Implementation procedure, pre-implementation is the first stage after testing
phase is completed under this stage some types of error may occur at the time of
installation. The error are collected and analyzed individually. Each and every
step should be taken in rectification of errors, that software should be
implemented thoroughly that we call as Post implementation.
A post-implementation review measures the performance against
predefined requirements. A post-implementation review determines how well
the
system
continues
to
meet
performance
specifications.
A post-
one by giving proper guidance to the user. Risks due to physical hazards are
also handled in the software carefully.
The security check includes user authentications. Only the users
having the username and password can enter into system. The username and
password will get through the registration in the system. It also includes the
option for changes in the account information.
To use the system user should have authorization for that. To get into the
system one should enter the username and password provided to them. If
anyone types incorrect username or password, error message will be displayed.
6.2 SYSTEM MAINTENANCE
Software maintenance is used to describe the software engineering
activities that occur following delivery of the software life cycle is time period
in which software performs useful work. It may define by describing fare
activities that are undertaken after a program is released for use. During the use
of the large programs, error will occur and supported to the developer. The
program that includes the diagnosis and correction of one or more errors are
called corrective maintenance. The other activities that contribute to the
definition of maintenance occur when
There occurs a rapid change that is encountered in every aspects of
computing. An activity that modifies software to properly interface with the
changing environment is adaptive maintenance.
1. It occurs when a software package is successful. As software is used,
recommendation for new capabilities, modification to existing functions
and general enhancements is received from the user. These maintenance
activities are called effective maintenance.
8. USER TRAINING
8.1 INTRODUCTION
The success of a system depends on the efficient training received by the user:
It was suggested that the required staff should be selected and trained
before implementation phase.
The concepts of the software used should be taught.
The procedure for the installing of the software should also be taught.
8.2 USERS MANUAL
The user can login to the system with the supplied user name and password. Account
users having low balance cannot login successfully; they should refill their
account before logging in. On login attempt they will be directed to recharge. On
logging in successfully user will be directed to load the browser from within the
software itself. Login time will also be displayed on the user screen. While the
browser is loading, a message saying that the user cannot logout without closing
the browser will be displayed. After browsing, the user may close the browser
and logout from the system. The internet usage charge and account balance (in
case of account users) will be displayed on the screen when logout button is
clicked.
9. CONCLUSION
9.1 ACHIEVEMENTS EXPECTED THROUGH THE PROJECT
Comparing to existing manual system, it performs at a faster pace.
System gives better feed back.
Timely and accurate information are available.
The system provides greater processing speed consistency.
Chances of errors are much low.
Provides high security the system and hence unauthorized user can be
prevented
Time taken for overall process is reduced.
Forms are very user friendly.
Ease of operation.
10. REFERENCES
: Pankaj Jalote
:
Herbert Schildt
: Roger S. Pressman
11. APPENDIX I
11.1 LIST OF TABLES
TABLE: ACCOUNT
Attribute Name
Type
Length
Description
userid
varchar
20
Users id
name
varchar
20
password
varchar
20
Users password
address
varchar
20
Users address
identification
varchar
20
identificationnu
m
varchar
20
amount
float
dates
date
acctype
varchar
20
Type
Length
cabinno
varchar
20
Cabin number
cabinname
varchar
20
status
varchar
20
In use or not
Type of account
TABLE: CABIN
Attribute Name
Description
TABLE: TARIFF
Attribute Name
Type
Length
Description
type
varchar
20
Type of account
rateperhour
int
11
minimum
int
11
TABLE: LOGINHISTORY
Attribute Name
Type
Length
Description
billno
int
11
Bill number
userid
varchar
20
Users id
acctype
varchar
20
Type of account
intime
time
Login time
outtime
time
Logout time
tottime
float
Duration of browsing
amount
float
Bill amount
machineno
varchar
dates
date
20
12. APPENDIX II
12.1 DFD
LEVEL0
LEVEL 1
USER
ADMINISTRATOR
LEVEL2
USER
ADMINISTRATOR
2. Account Settings:
This module is under the control of administrator. In this module the
administrator can create account for the user, edit account and delete account.
The user needs to produce some sort of identity proofs to create an account.
3. Cabin Settings:
This module is controlled by the administrator. Here he/she can add cabins
to the system, edit cabin, and remove a cabin. The system name (host name)
should be entered without fail while adding a cabin to the system.
4. Tariff Settings:
The administrator controls this module. Here he/she can set tariff rates for both
Account Users and Walkthrough Users account.
5. Recharge:
This module is under the control of the administrator. Here recharge of
accounts is performed. User shall refill there account on paying respective
amount to the administrator.
6. Billing:
This module is controlled by the administrator. Here billing of internet
usage by various users is performed.
7. Reports:
The administrator controls this module. Here he/she can have a look on
usage reports of a particular user, whole usage, usage in a particular machine
and daily report.
8. View Account:
This module is controlled by the administrator. Here he/she can have a look on
account details.
USER SIDE
(i)
II
ADMINISTRATOR SIDE
(i)
LOGIN PAGE
(ii)
HOME PAGE
(iii)
(iv)
(v)
(vi)
(ix)
(x)
RECHARGE FORM
(xi)
BILLING FORM
14. APPENDIX IV
14.1 OVERVIEW
The project entitled Cyber Caf Management System is a software
package, which can be used in cyber cafs for managing the clients computer
efficiently. Now a days cyber terrorism, which is mainly undergone through
internet cafs, need to be tackled properly. Thereby, it is indeed necessary to
store the valid information of the user who comes for internet access. The system
being used, the time at which the user logs in and logs out should be recorded
systematically.
In this modern era, a number of people access the internet frequently by
means of cyber cafes. For such frequent users, a prepaid account shall be
maintained and discounted rates may be charged from them. While walkthrough
users, who are less frequent, are charged a fixed rate. By using the LAN
connections in the cyber cafes we can automate this process very easily. This
system comprises of the following modules:
The Server Module
The Client Module
The server module, which is handled by the administrator can create new
accounts for prepaid users and also store the details of walkthrough customers.
While in the client module, which is handled by users themselves, the user
should give his/her user-id and password to start browsing. After they are logged
out, the time and amount will be automatically generated at the server module
and the bill is provided to the user.
This system is developed in JAVA language with MySQL as backend. The
system is a menu driven one. User-friendly menus will help both the
administrator and the clients to work on it without any operational difficulty.