Social Networking Sites

Download as pdf or txt
Download as pdf or txt
You are on page 1of 17

TASK11:Social Media Platforms

1. Introduction
In recent years, the Internet and especially the Web has enabled a communication revolution: the ability to
send and retrieve information everywhere has changed the way we work and live. Internet based access
to information and internet Communication means have become ubiquitous.
Social networking is the grouping of individuals into specific groups, like small rural communities
or a neighborhood subdivision, if you will. Although social networking is possible in person, especially in
the workplace, universities, and high schools, it is most popular online. The term SOCIAL NETWORKING
(SN) was first coined by Professor J. A. Barnes in the 1950s, who defined the size of a social network as
a group of about 100 to 150people.When it comes to online social networking, websites are commonly
used. These websites are known as social sites. Social networking websites function like an online
community of internet users. Depending on the website in question, many of these online community
members share common interests in hobbies, religion, or politics. As mentioned, social networking often
involves grouping specific individuals or organizations together. While there are a number of social
networking websites that focus on particular interests, there are others that do not. The websites without
a main focus are often referred to as "traditional" social networking websites and usually have open
memberships. This means that anyone can become a member, no matter what their hobbies, beliefs, or
views are. According to a report on Nielsen Wire, about two thirds of the world's population participates in
some sort of social network. This accounts for close to 10 percent of all time spent on the Internet. The
article also states that social networking has become more popular than email as a means of
communicating.

1.1 Purpose
Social networking is a strategy to connect and discuss all sorts of ideas through individuals and
communities that may express a primary interest or the comparable pursuits throughout the planet .A
large amount of these sites offer features that will permit anyone to discover individuals or topics by
members, which means that everyone are able to peruse and come in contact with new individuals or
maybe be a part of new groups by sending a request message. By using this valuable feature anyone
should certainly be in a position to connect with other people within their networks that are like-minded.
Every time you add anew individual or group, you will be able to have access to the latest people in their
circle as well. Social networking can easily go as far as making your page on different social networking
websites; at the same time, this may turned out to be a challenging as well as somewhat cumbersome
undertaking as you attempt to keep every individual web site up-to-date with content and articles as well
as engaging across quite a lot of different tools.
Social networking portals are a recent trend. A social networking site (SNS) connects and presents
people based on information gathered about them, as stored in their user profiles. These user profiles
determine the way in which users are able to present themselves to others. The most important
distinguishing factor between the various sites is the range of profile information that they store and can
perform operations on. The increasing popularity of online Social Networks (OSNs) is witnessed by the
huge number of users acquired in a short amount of time: some social networking services now have
gathered hundred of millions of users, e.g. Face book, My Space, Twitter, etc. The growing accessibility of
the Internet, through several media, gives to most of the users a 24/7 online presence and encourages
them to build a solid online interconnection of relationships. As OSNs become the tools of choice for
connecting people, sociologists expect that their structure will increasingly mirror real-life society and
relationships.
1.2 Scope
 Social Networking is forever.

Page 1 of 1
 Social networking has tremendous prospects in future.

 The bright future prospect of social networking is also proven with the fact that the technology is
integrated in the mobile phones as well. The concept is one, wherever on the earth; reach the
common platform of the people for everybody’s benefit.

 The tremendous popularity of using the social networking could never have been realized before.
In fact, social networking has become an important tool of marketing in true sense of customer
orientation.

 The scope of social networking is widening, and today it offers a strong support to the
companies in providing the much desired touch of concern. Future of social networking brings
exciting promises as expected from the experience of limited users from a few companies in the
top bracket.

1.3 Definitions, Acronyms and Abbreviation


 Social networking is a phenomena defined by linking people to each
other in some way.
 Social networking is the practice of expanding the number of one's
business and/or social contacts by making connections through
individuals.
 Social networking is defined as the bringing individuals together into to
specific groups, often like a small community or a neighborhood.
 According to Danah Boyd, leading authority on social networking at
U.C.Berkeley, the true definition of a "social network site" is that it
contains profiles, semi-persistent public commentary on the profile, and
a traversable publicly articulated social network displayed in relation to
the profile

 Admin– Administrator is the controller of all the users, manager and maintaining all profiles in
this site.

 User– registered person in this site and posts their views.

 User ID:A user identification number to enter the system.

 Password:A word that enables one to gain admission into the system

 HTML (Hyper Text Markup Language): It is used to create static web pages.

 JSP (Java Server Pages): It is used to create dynamic web content.

 J2EE (Java 2 Enterprise Edition): It is a programming platform, belonging to the Java platform,
which is used for developing and running distributed java applications.

Page 2 of 2
 WASCE (Web Sphere Application Server Community Edition): It is an application server that runs
and supports the J2EE and the web service applications.

 WSAD (Web Sphere Studio Application Developer): It is a designer toolkit which is designed to
develop more complex projects by providing a complete dynamic web service.

 DB2 (IBM Database 2): It is a database management system that provides a flexible and efficient
database platform to raise a strong "on demand" business applications.

 HTTP (Hyper Text Transfer Protocol): It is a transaction oriented client/ server protocol between
a web browser and a web server.

 XML (Extensible Markup Language): It is a markup language that was designed to transport and
store data.

 Ajax (Asynchronous Java Script and XML): It is a technique used in JavaScript to create dynamic
web pages.

 Web 2.0: It is commonly associated with web applications which facilitate interactive information
sharing, interoperability, user-centered design and collaboration on the World Wide Web.
 TIVOLI (ADMIN):IBM Tivoli Storage Manager (TSM or ITSM) is a centralized

1.4 References
Kruchten, Philippe. 1999. The Rational Unified Process. Menlo Park, CA: Addison Wesley
Craig Larman, Applying UML and Pattern, Second Edition, CA: Addison Wesley.
Leffingwell, D. and Don Widrig. 2000. Managing Software Requirements. Menlo Park, CA:
Addison Wesley.
Spence, I. and L. Probasco. 1998. Traceability Strategies for Managing Requirements with Use
Cases. Cupertino, CA: Rational Software Corporation.
Rational Unified Process®, Version 2002.05.00. Copyright © 1987 – 2001. Rational Software
Corporation
Backstrom, L., Huttenlocher, D., Kleinberg, J., & Lan, X. (2006). Groupformation in large social
networks: Membership, growth, and evolution.
http://www.facebook.com/policy.php?ref=pf

1.5 Technologies used


 XML :-Extensive Mark Up Language
 J2EE: -Application architecture
 AJAX :-Asynchronous Java script And XML
 Web Services, SOA :-Service Oriented Architecture
 UML :-unified modeling language
 DB2:-IBM Database.
 TSM(admin) (Tivoli Storage Manager ):-Back up purpose.
 IBM Rational Software Architect - IBM Rational Software Architect, (RSA) made by IBM's Rational
Software division, is a comprehensive modeling and development environment that uses the
Unified Modeling Language (UML) for designing architecture for C++ and Java 2 Enterprise
Edition (J2EE)applications and web services. Rational Software Architect is built on the Eclipse
open-source software framework and includes capabilities focused on architectural code

Page 3 of 3
analysis, C++, and model-driven development (MDD) with the UML for creating resilient
applications and web services.
 IBM Web sphere Community Edition - WebSphere Application Server Community Edition (from
now on WASCE) is a free, certified Java EE 5 application server for building and managing Java
applications. It is IBM's supported distribution of Apache Geronimo that uses Tomcat for servlet
container and Axis 2 for web services. Other difference from Apache Geronimo is that WASCE
comes with DB2 and Informix database drivers, better XML parser libraries (XML4J and XLXP)
and contains the latest patches from unreleased upstream versions.
1.6 OVERVIEW
 Social networking is the grouping of individuals into specific groups, like small rural
communities or a neighborhood subdivision, if you will.

 Social networking often involves grouping specific individuals or organizations or


likeminded people together.

 Social networking is a strategy to connect and discuss all sorts of ideas through
individuals and communities that may express a primary interest or the comparable
pursuits throughout the planet.

 Companies like IBM, Microsoft and Google performs to strengthen their networking
platforms via social networks like Twitter and Face book.

 By using this valuable feature anyone should certainly be in a position to connect with
other people within their networks that are like-mi

2. Overall Description

The user must have a valid User ID and password to login to the system. Users, who don’t have their
account in this site, can create a new account for signup. Definitely one should not be allowed to have
more than one profile. After the valid user logs in his/her account, the user can edit his/her profile and
can post his/her views basing on the activities he/she desires. The site is having the features like auto
analyze topics, group discussions, auto recommend threads based on searches etc. Ratings should be
given according to their posts.
THE USERSOFTHISWEBSITE INCLUDES:
A. Citizen of India.
B. Bearcats of India, Employees of Govt. bodies
C. Volunteers from NGOs.
If anyone violates the social disciplines, we will tag his/her user ID in our website. For example if a police
cop demanded for bribe, he may not be dismissed in system, but this website could show his corruption
level as utterly bad. In this website you can Voice out Constitutional violations, injustice, inhumanity,
corruption, cruelty to animals happening in their vicinity, traffic rules, public hygiene etc. This site is
helpful to the nation by creating awareness for social responsibilities

2.1Product Perspective
EXISTING SYSTEM:
In order to show our voice we need to conduct debates, group discussions, meetings and so on. Present
sites focused on some social responsibilities like mainly on business, entertainment and education. They
can’t provide social responsibilities like traffic rules, public hygiene and corruption.

Page 4 of 4
PROPOSED SYSTEM:
In our proposed system we used new technologies to implement more features.
We used front end tool as RAD (Rational Application Development) and for backupDB2 is used. The
prospect of social networking is also proven with the fact that the technology is integrated. Social
networking is widening, and today it offers a strong support to the companies in providing the much
desired touch of concern.
In our system we provide a common platform where people of India can Voice out violations, injustice,
inhumanity, corruption happening in their vicinity, traffic rules, public hygiene, aversion to bribery etc. We
call for an online debate or discussion on certain topics. We have the ability to tag social discipline
violators using their UID.
Through this site the citizen of India can improve the social awareness. This site needs more proofs and
details of user to post their views.
And this site is going to help a nation.

2.2 Software Interface

 Front End Client: RAD/WASCE

 Web Server: WAS /WPS

 Data Base Server: DB2

 Back End: DB2 Express – ‘C’ or DB2,TSM(ADMIN)

2.3 Hardware Interface


Client

Software Processor Ram Free Disk space

Web browser(any) Intel core 2 duo 512 MB 750 GB


processor at 2.5 Giga
Hz speed

Server
DB2 Express C version Intel core 2 duo 512 MB 300 GB
9.7 processor at 2.5 Giga
Hz speed
WebSphere Application Intel core 2 duo 512 MB 300 GB
server(community processor at 2.5 Giga
edition) Hz speed

2.4 Communication Interface


 Client on internet will be using HTTP/HTTPS protocol
 Firewall Security is required for securing the server
 TCP/IP is the basic need for client
2.5 Product Functions

Page 5 of 5
Functional Requirements
i. Should provide a common platform where people of India can
a. Voice out violations, injustice, inhumanity, corruption happening in their vicinity
b. Endorse someone else’s concern and augment with more proofs, details etc.
c. Call for an online debate or discussion on certain topics of broad applicability

ii. Should be highly dynamic, with minimal static content as framework and maximum content
created by site participants
iii. Should be highly extensible to the extent technically possible. Users should be able to add
content, add small pieces of new functionality and change their portion of the site (not just colors
& look & feel).
iv. Being dependent highly on dynamic content collaborated by users, the site should have the
features to auto analyze topics, group discussions, auto recommend threads based on searches
etc.
v. Should have the ability to tag social discipline violators using their UID
vi. The site can provide various measures for fellow citizens to rate, control and monitor the social
responsibility of a given individual. For example, if you find your classmate did a good job at the
college function arrangements, you can increase his service-orientation score by +1. If you find
your neighbor smoking in public in front of children, you can decrement his responsibility score by

Page 6 of 6
1. When everyone assess & reward a person for his social actions this way, one can see a true
scale of where he stands vis-à-vis where he thinks he really is. A traffic police giving ticket is no
more just monetary. He can (as a user of this website) affect you driving sense score. If a police
cop demanded for bribe, he may not be dismissed in system, but this website could show his
corruption level as utterly bad.
vii. Authenticity for adding users are utmost important for such a website. Definitely one should not
be allowed to have more than one profile.
There should be a placeholder for dealing with disputing situations for the site as it is quite possible for
recipients of negative reward to resist. The dispute resolution mechanism should not be like traditional
court, it should again be based on social forum like multiple opinions, group actions etc.

2.6 User Characteristics


A. Professional look and feel
B. Use of AJAX at least with all registration forms
C. Browser testing and support for IE, NN, Mozilla, and Firefox.
D. Use of Graphical tool like JASPER to show strategic data to admin

2.7 Constraints

 Lack of Anonymity: As the user is putting out his personal information, someone can find ways to
do in.

 Even though certain measures taken to stop the cyber stalking, online scamsand identity theft,
still may never known.

 It is a time wasting process for those who are busy and not

 Site should be popular to attract many users.

 These sites will never provide information to the end user directly, at least not any more.

 As there are no advertisements on these sites, there is no revenue from these sites and it will be
a burden for the administrator.

2.8 Architecture Design

Page 7 of 7
2.9 Use case model Description

Use cases. A use case describes a sequence of actions that provide something of measurable value to
an actor and is drawn as a horizontal ellipse.

Actors. An actor is a person, organization, or external system that plays a role in one or more interactions
with your system. Actors are drawn as stick figures.

Associations. Associations between actors and use cases are indicated in use case diagrams by solid
lines. An association exists whenever an actor is involved with an interaction described by a use
case. Associations are modeled as lines connecting use cases and actors to one another, with an
optional arrowhead on one end of the line.

Page 8 of 8
Use case model survey
Users: user is the primary actor of the system or the main person who shares their views on the
discussions topics in the form of post and comments.
The users of this website include:
A. Citizens of India
B. Employee of govt. buddies or any bearcats of India
2.10 Class Diagram

Page 9 of 9
2.11 Database Design

Page 10 of 10
2.13.1 ER Diagram

Fnam Lna
Lnam
Fnam
UI
do
Name
N Gende
Addre
Passwo
age Passwo
DO
UI ADMIN USER NGO

Phno

INDIVIDUAL

addre
Man GOVT. EMPLOYEE

Descripti

ID DISCUSSION Do

IMAGE VIDEO
Title
TEXTUAL
POST
On IMAGE
Lik

Unlik
I
Descriptio
n
Ty
Poste COMMENT

Descriptio Subje
Create TOPIC n

TEXTUAL VIDEO

Subject
Page 11 of 11
2.12 Assumption and Dependencies

 The details of user such as username, password, and their posts details should be manually
entered by the administrator before using this system.

 Every user should be comfortable of working with computer and net browsing.

 User must have basic knowledge of English too.

3. Specific Requirements

3.1 Use case reports:


Use Case diagram for user

USE CASE DESCCRIPTION

Page 12 of 12
login The user must have login before starting any activity.

access account User can access his account after login.

Warning message User get warning message after wrong password/invalid account id.
He is prompted to signup if have no account or trying again.
logout Users safely logout after finishing their activity

Update profile User can update his profile content i.e. can make modification as their
wish.
Request for update User makes request to admin for approving their updating profile.

Enter new values User can enter their new values t make updation in the profile

submit User can submit their update information to admin.

Profile updated The updated information is approved by admin and stored in profile

Search topics After login the user can search their topic of interest on which he/she
wants to do some activity/actions
actions This is actions or activity which user can perform

Post views User can post their views on different topics


User can edit their post according to their desire or motive
Edit post
Participates in online User can participates in the online debates
debates

Gain rating according to their User can get rating according to their actions performed by the other
actions user or admin

Page 13 of 13
USE CASE DESCCRIPTION
login admin must have login before starting any activity.

Manages user data Admin can manage data of users i.e. admin is responsible for overall
maintenance of user data
Create account Admin only can create account of users after the full verification and
validation of user information provided by user at the time of signup.

Tag account Admin can tag any user to any post any event.

Provide and manage details Admin is responsible for providing information to user an their demand
and managing overall data of users

Users details Admin can provide users details

Site details Admin can provide site details.

logout Admin can logout after performing their activity

3.2 Sequence Diagrams

Page 14 of 14
Page 15 of 15
3.3 ActivityDiagram

3.4 Supplementary Requirements

Page 16 of 16
1) Performance requirements
A user with valid id can share his views on the activities he desires.
2) Safety requirements
By incorporating robust and proven DB2 in to the system the reliable performance and integrity of data is
insured. There must be a power backup for the server system. Since the product is of 24X7 availability,
there should be a power backup for the server which provides the information.
3).Security requirements
Sensitive data is protected from unwanted access by user’s appropriate technology and implementing
strict user access criteria.Facilty of unique user number and password s that unauthorized user cannot
login the system. Operational rights for each user or terminal can be defined .Thus a user can have
access to specific terminals and specific options only.

This site uses the SSL (Secure Socket Layer) protocol for securing the data. Secure Socket Layer (SSL)
protects data in three key ways:

 Authentication: ensures that you are communicating with the correct server. This prevents
another computer from impersonating the site.

 Encryption: Scrambles transferred data.

 Data integrity: verifies that the information post by the user wasn’t altered during the posting. The
system detects if data was added or deleted after user post the message. If any tampering has
occurred, the connection is dropped.

Page 17 of 17

You might also like