You are on page 1of 53

Synopsis

Synopsis

Advanced Secured System deals with the Server based Information and

Maintenance of the Server. This system is used to reduce the workload of the server. It
provides mail services, chat services between the clients and it also response to the client
requests. This system is designed as a middleman between the client and the server. This
system provides all kinds of services to the clients like file transfer, mail, chat etc... This
system is cost-effective and provides a security like firewall to the server. Though there
are any software available in the market there is no popular server in terms of cost and
providing services. Developed in java platform will be an advantage to this software. This
can be used in various platforms.
The main objective of this software is to
Speed up the data transfer
Check for virus file
Provide mail, chat services
Strong authentication
Sharing resources
Flexibility

Acknowledgement

CONTENTS
1.

Introduction
1.1
1.2

2.

System Analysis
2.1
2.2

3.

Project Description
Data Flow Diagram
Database Design

System Testing And Implementation


6.1
6.2
6.3
6.4
6.5

7.

Hardware Specification
Software Specification
4.2.1 About the Software

System Design
5.1
5.2
5.3

6.

Technical Feasibility
Economical Feasibility
Operational Feasibility

System Specification
4.1
4.2

5.

Existing System
Proposed System

Feasibility Study
3.1
3.2
3.3

4.

Company Profile
About the Project

Testing Fundamentals
Unit Testing
Integration Testing
Acceptance Testing
Implementation

Maintenance
7.1
7.2
7.3

Corrective Maintenance
Adaptive Maintenance
Enhance Maintenance

8.

Screen Layout

9.

Conclusion

10. Future Scope of the Project


11.

Bibliography

1.1. Company Profile


Sky Soft Software Limited
SkySoft Software Limited is one of the leading Software Development
Companies in Chennai. This organization is collaborated with Lastech Software, it is
enterprises in designing and hosting of web pages of various companies, advertising the
product profiles of the same. It has also developed a package, Indoweb, an Indian
Language Software for Internet, using this company is able to design the web pages in
any Indian Language and host it through the service provider located in North America. It
has also recently launched the first website in the world to send mail in Tamil language;
the user need not download any Tamil Font in their system to run the package.
SkySoft Software (P) Ltd., has designed the website for TamilNadu and
Digital slides for Telugu website. This product was launched in the month of Aug.1996.
Setup in 1989, started the business of developing Regional Software in
DTP, Presentation Graphics and Image Processing Software. Recently the company has
launched Identification Card Software for printing of ID card for the Citizens of India.
The companys Annual turnover averages Rs.1.2 Million. It operates in four state capitals
with resellers all over India.
The company maintains a news Magazine called TamilNadu Online on web,
which incidentally is the first ever Indian website Magazine on the web. The company
has so far trained more than 400 Professionals in JAVA, in a short span of 16 months.
Recently the company has opened an Office in Madurai and another one in Coimbatore.

1.2 ABOUT THE PROJECT

The Project ADVANCED SECURED SYSTEM deals with the Server


maintenance for a company.
The project consists of following modules:
File Transfer
E-mail
Resource Sharing
Chat
Web Page View

File Transfer:
File transfer is handled between client and the server. To share a file from
another client the requestor client sends the request to the server. The server then gets the
file from the client which provides the requested file. Then the server sends the file to the
requested client.

Mail:
With the advent of the Internet and its commercial
availability, the

Universal e-mail have become a common

feature in todays High-tech World. The ability to compose, sends, and


receives

Electronic mail has been enormously popular. In this project

E-Mail can be sent to the recipient without having to enter into the
Web browser.

Resource Sharing:
Server provides all applications, files and messages. If a client wants
applications from the server, the server grant permission to the particular Client
according to their authentication level, i.e., applications are shared between server and
clients. The client access the printer which are attached to the server when a request is
provided. The applications from the server are sent to the requested client by the provider.
Resources include devices such as CD, Floppy and Printer. The client access these
devices which are attached to the server when a request is provided.

Chat:
Chatting is talking to other people who are using the Internet at the same
time you are. Usually, this "talking" is the exchange of typed-in messages requiring one
site as the repository for the messages and a group of users who take part from
anywhere on the Internet. In some cases, a private chat can be arranged between two
parties who meet initially in a group chat. Chats can be ongoing or scheduled for a
particular time and duration.

Web Page View:


The user requests a web page from the server. If the page is available in the
server then the server provide a copy of the page and open the page in the client location.

2. System Analysis
2.1. Existing System
The existing system is present in SKYSOFT SOFTWARE LIMITED. There
are some problems in sharing resources .The existing system must use a third
party tool to share the resources, provide a mail service within the clients, to
provide sharing of messages between a group of users through chat services.
In existing system when more than one users try to access the resources of the
Server, then the server processing speed decreases. When network traffic arises,
then the data transfer will go down very slow and there is a chance of data to be
lost. There is low level security in the existing system .The cost factor will be
high to provide the services like mailing, chatting. It reduces the response time
experienced by the clients.

Problems associated with the Existing System


Cost-effectiveness
Low level security
Network Traffic
Resource Sharing
Low Reliability
Performance problems
Scalability

2.2 Proposed System


The proposed system will provide a good security and improves the performance of
the server. It provides network security and gives access to the resources in
server. It improves the response time to clients. It provides robust
authentication. Table handling using Oracle would increase the ease in
handling data, quicker and timely retrieval of data is possible with flexibility
and portability. Keeping in view all these points and problems of the existing
system, the new system has been developed using Java Server Page and
Oracle.

Advantages of Proposed System


Increases the system Reliability
Centralized access
Minimum cost
High security
System design for better performance
DAP Concept

3. FEASIBILITY STUDY
It is both necessary and prudent to evaluate the feasibility of a project at
the earliest possible time. Months or years of effort, thousands and millions of dollars,
and untold professional embarrassment can be averted if an ill-conceived system is
recognized early in the definition phase.
Feasibility and risk analysis are related in many ways. If project risk is great,
the feasibility of producing quality software is reduced. During product engineering,
however, we concentrate our attention on four primary areas of interest.

3.1. Technical Feasibility


Technical feasibility is the need of hardware and software, which are needed to
implement the proposed system in the organization. Technical requirements are to be fulfilled to
make the proposed system work. This should be necessarily predetermined so as to make the
system more competent.

3.2. Economical Feasibility


The Economical feasibility must satisfy the needs of the technical feasibility and the
operational feasibility. It involves the economic feasibility of developing and implementing the
proposed system.

3.3. Operational Feasibility


The proposed system should use the internet level then the different types of end
users are involved in the system, so it solves the users needs and the organization needs. And it
supports the all users environment.

4. System Specification
4.1. Hardware Requirements

Processor

Intel Pentium Family

Clock Speed

667 MHz

RAM

128 MB

Hard Disk

4 GB or higher

Monitor

Display panel (640 x 480)

Mouse

Logitech Serial Mouse

Keyboard

Standard 104 enhanced keyboard

Cache Memory

11,011,968 Bytes

Virtual Memory

32 MB

Display Card

Super Video Graphics Adapter (SVGA)

4.2. Software Requirements

Operating System

: Windows 98/2000/XP/NT

Web Server

: Apache Tomcat 4.1.7

Web Browser

: Internet Explorer

Front-End Tool

: HTML

Client side Script

JavaScript

Server side Script

Java Server Pages

Back-End Tool

: Oracle 8.0

4.2.1. About the Software


HTML (Hyper Text Markup Language)
HTML came to existence in 1970. The development of HTML was initiated by Tim
Burners Lee was later taken over by Dan Cannolly, Dave Ragett. The ancestor of
HTML is SGML (Standard Generalized Markup Language). SGML was developed
by ISO (International Standard Organization) and was first used by the US DOD
(Department Of Defense).
SGML and HTML have a parent-child relationship. HTML can be referred to
as subset of SGML HTTP protocol used to transfer HTML pages.

JavaScript
Java script is a compact; object based scripting language for developing client
and server Internet applications.
Netscape Navigator 2.0 interprets JavaScript statements embedded directly
in an HTML page, and live wire enables you to create server-based applications similar to
common gateway interface (CGI) programs.
Using JavaScript in HTML
JavaScript can be embedded in an HTML document in two ways:

As statements and functions using the script tag


As events handlers using HTML tags

JavaScript supports functions, again without any special declarative


requirements, functions can be properties of objects, executing as loosely typed methods,
JavaScript statements can get and set exposed properties to query the state or alter the
performance of an applet or plug in.
JAVA SERVER PAGES (JSP)
The best way to understand Java Server Pages work is by contrasting
a Web server that supports Java Server Pages with Web server that doesnt. JSP is easy to
learn, robust, scalable, and cross-platform.
Prior to the introduction of Java server Pages, the main function of
Tomcat Server was to serve static HTML pages. When someone requested a web page
from a web site using Tomcat server, the server would fetch a static HTML file form disk
or memory and send it out to the persons browsers. The primary responsibility of Tomcat
Server was to act as an efficient interface between browser and a bunch of files sitting on
the Web servers hard drive.
Apache Tomcat Server was not different from other Web servers in
this respect .The main function of any Web server is to server HTML files. Its important
to understand how this process of serving an HTML file is carried out, so here are the
steps.
1. A user enters the Internet address of an HTML file into the address bat of Web
browsers and passes enter to request a Web page.
2. The browser sends a request for the Web page to a Web server such as Tomcat
server, Personal web server.
3. HTML file because the requested file has the extension.htm or html.

4. The Web server retrieves the proper HTML file from disk or memory and
sends the files back to the browser.
5. The persons web browser interprets the HTML file and the results are
displayed in the browser window.

What are Java Server Pages?


Java Server Pages (JSPs) are Web pages that contain server-side scripts in
addition to the usual mixture of text and HTML (Hypertext Markup Language) tags.
Server-side scripts are special commands you put in Web pages that are processed before
the pages are sent from your Personal Web Server to the Web browser of someone who's
visiting your Web site. . When you type a URL in the Address box or click a link on a
Web page, you're asking a Web server on a computer somewhere to send a file to the Web
browser (sometimes called a "client") on your computer. If that file is a normal HTML
file, it looks exactly the same when your Web browser receives it as it did before the Web
server sent it. After receiving the file, your Web browser displays its contents as a
combination of text, images, and sounds.
In the case of a Java Server Page, the process is similar, except there's
an extra processing step that takes place just before the Web server sends the file. Before
the Web server sends the Java Server Page to the Web browser, it runs all server-side
scripts contained in the page. Some of these scripts display the current date, time, and
other information. Others process information the user has just typed into a form, such as
a page in the Web site's guest book.
The Web server retrieves the proper HTML file from disk or memory and
sends the files back to the browser.

HOW DO JAVA SERVER PAGES WORK?


A JSP page is just like any other HTML file. Java statements must be
placed within <% and %> tag delimiters. Only ode placed within these delimiters will be
executed as Java code.
Browser Reqt

Server sends a

HTML back to

JSP
reqt to the JSP
Engine
engine
JSP page is
translated
to a servlet
And
JSP Engine sends
executed.
Servlet HTML

the server

output back to server.

a JSPs Page
Users
Computer
Server sends

S
E
R
V
E
R

What Do Java Server Pages Look Like?


The appearance of a Java Server Page depends on who or what is
viewing it. To the Web browser that receives it, and Java Server Page looks just like a
normal HTML page. If a visitor to your Web site views the source code of a Java Server
Page, that's what they see: a normal HTML page. However, the file located in the server
looks very different. In addition to text and HTML tags, you also see server-side scripts.
This is what the Java Server Page looks like to the Web server before it is processed and
sent in response to a request.
INTEGRATING SCRIPTS INTO JAVA SERVER PAGES
An Java Server Page is primarily a scripting environment; we can
integrate scripts created with both JScript and VBscript into our Java Server Pages. It can

be used other scripting languages with Java Server Pages as well. Any scripting language
that has a scripting engine can be used in an Java Server Page.
The easiest way to add a script to an Java server Page is by using the
script delimiters <% and %>. Any text enclosed within these delimiters will be processed
as a script.

What Do Server-Side Scripts Look Like?


Server-side scripts look a lot like HTML tags. However, instead of
starting and ending with lesser-than (<) and greater-than (>) brackets, they typically start
with <% and end with %>. The <% is called an opening tag, and the %> is called a
closing tag. In between these tags are the server-side scripts. You can insert server-side
scripts anywhere in your Web page--even inside HTML tags.
Using Variables, and Forms in Java Server Pages
Forms are a convenient way to communicate with visitors to your
Web site. Using forms, you can create a survey form and ask visitors to fill it out. When
they fill out the form, you can process the results automatically.
With forms, there are two steps: first you create the form, and then
you process it. To create a form for a Java Server Page, just create a standard HTML
form.
Java Server Pages provide a mechanism for processing forms that,
unlike CGI scripting, doesn't involve serious programming: the Request. Form.
Considering the form above, we may create the file bellow and get a response.
Creating a Variable
You'll probably want to do more with your forms than display their
contents in a Web page. For example, based on the contents of the form, you may want to
create a variable and insert that variable in different places of your response page. You

may need to create a variable. To do that, just make up a name and set it equal to the
contents of the field.
Implicit Objects
Request
Response
Page Context
Session
Application
Request:
It defines an object that provides access to HTTP-protocol-specific header
information sent by the client.
Response:
It defines an object that provides the JSP with the capability to manipulate HTTPprotocol-specific header information and return data to the client.
Page Context:
It provides access to the namespaces associated with a JSP page. It also provides
accessors to several other JSP implicit objects.
Session:
It is used to store objects in between client requests. It provides an almost state-full
HTTP interactivity.

Application:
It is most often used to access environment information. One of the more common
pieces of information accessed by the application object is objects that are stoed in the

Servlet Context. These objects are stored there so that they will be available the whole
time the servlet engine is running.
Features of JSP
Platform independence:
The use of JSP adds versatility to a Web application by
enabling its execution on any computer.
Enhanced performance:
The compilation process in JSP produces faster results or
output.
Separation of logic from display:
The use of JSP permits the HTML specific static content and a
mixture of HTML, Java, and JSP specific dynamic content to be placed
in separate files.
Ease of administration:
The use of JSP eliminates the need for high-level technical
expertise, thereby helping Web developers, designers, content creators,

and content

managers to work together and develop Java-based applications in less time and with less
effort.
Ease of use:
All JSP applications run on major Web servers and operating
systems, including Microsoft IIS, Netscape Enterprise Server, iPlanet
Web Server, and Apache Web Server. These applications are also
available on Windows NT, Windows 2000, and Solaris 7.

About Oracle 8.0:


Relational Database Components:
The database component of Oracle is a Structured Query Language (SQL)
based, scalable, relational database with integrated Extensible Markup Language (XML)
support for Internet applications. Each of the following terms describes a fundamental
part of the architecture of the Oracle database component.
Database
A database is similar to a data file in that it is a storage place for data. Like a
data file, a database does not present information directly to a user; the user runs an
application that accesses data from the database and presents it to the user in an
understandable format.
Database systems are more powerful than data files in that data is more highly
organized. In a well-designed database, there are no duplicate pieces of data are grouped
together in a single structure or record, and relationships can be defined between these
structures, and records.
When working with data files, an application must be coded to work with the
specific structure of each data file. In contrast, a database contains a catalog that
applications use to determine how data is organized. Generic database applications can
use the catalog to present users with data from different databases dynamically, without
being tied to a specific data format.
A database typically has two main parts: first, the files holding the physical
database and second, the database management system (DBMS) software that
applications use to access data. The DBMS is responsible for enforcing the database
structure, including:

Maintaining relationships between data in the database.


Ensuring that data is stored correctly, and that the rules defining data
relationships are not violated.
Recovering all data to a point of known consistency in case of system failures.

5. System Design
Introduction:
Based on the user requirements and the detailed analysis of a new system, the
new system must be designed. This is the phase of system designing. It is a most crucial
phase in the development of a system.
Normally, the design proceeds in two stages:
1. Preliminary or general design
2. Structure or detailed design
Preliminary or general design:
In the preliminary or general design, the features of the new system are specified.
The costs of implementing these features and the benefits to be derived are estimated. If
the project is still considered to be feasible, we move to the detailed design stage.
Structure or detailed design:

In the detailed design stage, computer oriented work begins in earnest. At this
stage, the design of the system becomes more structure design is a blue print of a
computer system solution to a given problem having the same components and
interrelationship among the same components as the original problem. Input, output and
processing specification are drawn up in detail. In the design stage, the programming
language and the platform in which the new system will run are also decided.

There are several tools and techniques used for designing. These tools and
techniques are:
Flowchart
Data flow diagram
Data dictionary
Structured English
Decision table
Decision tree
In the system design part is considered after the successful compilation of the
problem analysis. The requirements which and specified in software requirements
specification is verified i.e. whether the requirement specified in it satisfies the user
needs.

5.1. Project Description


Advanced Secured System developed act as a middleman between the client and the
server. It reduces the work of the server and gives access to server resources to multiple
clients at same time. It reduces the response time experienced by the clients. This server
will be cost-effective when compared to other servers in the market. Other servers in real

time provide a single service. The server, which we have designed, is to meet the real
time requirements .To share our thoughts with other clients in a network we can use chat
services where we can exchange out views in the form of typed-in messages. Chatting
can be provided as private chat and as well as multi-chat. This system in addition checks
whether virus file have affected the system and acts as a firewall to save the system from
viruses. If it finds a virus it will report to the server what action to be taken against the
virus file. The server can delete the file from the system or it can block the virus or it can
repair the virus and quarantine the infected file. If the users are on-line they can share the
messages through chatting, if the users are on offline they can share their views through
sending mail to the users in the network who himself registered them as the clients of our
system.
User Registration:
Authentication is the technique by which a process verifies that its
communication partner is who it is supposed to be and not an intruder. In order to provide
authentication in this project USER NAME AND PASSWORD has been
designed.
LOGIN
NEW USER
LOGIN:
Login button is used to display the Login Dialog Box. It has two text
fields and one buttons. User Name and password are entered in their respective fields.
Entered user name and password are send to the server and checked with its database.
If valid user, then the user is permitted to enter into the system and their names are
added to the list boxes of both the client and the server. If invalid user then the user
exits out of the system.
USER:
User button is used to display the New User Dialog Box. It contains the
fields such as User Name, password, First Name, Last Name-mail address, Age, Sex,
phone Security Question Answer. The new user can enter into the system by giving

the details in their respective fields. If the user name and password are non-existence
they are considered as a valid user and sent to the server database.
Establish connection between a client and server. Store login ids of all users of
in the server database. Get the user name & password. Check for the correctness of user
name and password. If it is correct enable the user to use the services else move the user
to error page.
To provide a strong authentication for this system, each user will be provided with
a unique username and password. First the users must register in this system before they
access this system. In registration time, the users will have to answer the questions
provided by the system. The questions will be based on the networking side. If the users
answers the questions and the system will verify the answers and depending upon the
correct answers the system will generate a key. There are three types of categories
depending upon the key generated by the system.
First category of services will provide:
1. File Transfer
2. E-mail
3. Resource Sharing
4. Web page view
5. Chat
Second Category of services will provide:
1. File Transfer
2. E-mail
3. Web page View
Third category of services will provide
1. File Transfer
2. E-mail
Each time user enters the system it will check for strong authentication whether
the username and password is valid. If the authentication is valid, the services will be
provided to the user else the user will be move to error page. If the username a password

will be sometimes wrong by misspelled so the user can be once again redirected to the
main page.
File Transfer:
If a user wants to access a file in the server he must make a request to the server.
There are three steps followed in File transfer
1. File search
2. Virus File check
3. DAP Concept
First step in File search, it receives a request from the user. The request will be
a file name. First the server finds all root drives in the system. It then searches for
all folders in the system. Then it moves to search for all the subfolders in the
system and it searches the requested file name will reside in subfolder. If it exists
then it will took the file and move to next step i.e. virus check else it reports the
requested file does not reside in the system.
Second step will receive the file name and check whether the file name
matches with the updated virus file in the database. If it exists then the server will
report the requested file is virus file else then it will move to next phase which is
transferring the file.
Third step uses DAP concept, i.e. check the file length. If the requested file is
a valid one then the server starts to transfer the file from server to client location.
After transferring the file, the server check for the file length. It checks the length
of the file, before and after transmission .If it equals then the file transfer will be
completed else the file transfer is corrupted. Then again it will transfer the file,
until the file transfer is completed.
E-Mail:
Mail is one of the services provided by this system. The ability to compose, send
receive; delete electronic mail has been enormously popular. In this project, E-Mail

can be sent to the recipient without having to enter into the Web
browser. Electronic mail is one of the ways where we can send our
messages to a group of people. It is a mixture of text, drawings and
facsimile. Normally mail consists of two subsystems: the user agents,
which allow people to read and send email and the message transfer
agents, which move the messages fro the source to destination. The
message inside the envelope contains two parts: the header and the
body. The header contains control information for the user agents. The
body is entirely for the human recipient. To send an email a user must
provide the message, the destination address and possibly some other
parameters (e.g., the priority or security level). The message can be
produced with an editor built into the user agent. The destination
address must be in the format that the user agent can deal with. Many
user agents expect DNS addresses of the form mailbox@location.
When a user is started up to read an email, it will look at the
users mailbox
for incoming email before displaying anything on the screen. Then it
may announce the messages in the mailbox or display a on-line
summary of each one and wait for a command. In a sophisticated
system, the user can specify which fields to be displayed by providing
a user profile, a file describing the display format. The first field is
message no. The second field, Flags k meaning that the message is not
new but was read previously and kept in the mailbox. The third filed
tells how long the message is and the fourth field tells who send the
message. Finally, the subject field gives the brief summary what the
message is about.
Resource Sharing:
Resources may include, information retrieval, computer data processing,
transmission and storage, and any other functions performed, in whole or in part, by the

use of a computer, computer network, computer software, or computer program. In this


project Resources related to hardware and software are used.
Server provides all applications, files and messages. If a client wants
applications from the server, the server grants permission to the particular client
according to their authentication level, i.e., applications is shared to clients. The client
can access the printer, which are attached to the server when a request is provided. If the
printer is connected in the server, and one or more clients request for print options then
the server will provide a queuing system. Then the service will be provided to each user
according to queue formed in the server. If the printer is not connected it will sent an
error message. The provider sends the applications from the server to the requested client.
Resources include devices such as CD, Floppy and Printer. The clients access these
devices, which are attached to the server when a request is provided. If one or more users
request the same device then the server will maintain a queue and provide the services to
the users according the queuing system maintained in the server.
Authentication is provided to client to access the devices from the server.
The example devices that can be accessed like Floppy Drive, Printer. Directories & files
are displayed on client machine and can be saved on the client machine according to the
Provided authentication.

Web page View:


The user requests a webpage in the server, if the page resides in the server then
the copy of the page will given to the client. In this service the page will be transferred
and immediately opened at the client window. This service will provide that the page will
reside in the server and it will be opened in the client side without any requirements. This
service is entirely different from transferring a file from the server. In that service the file
will be transferred to the client side and it will be saved on the client side and the user
may open the file according to his wish. But in webpage view the file will not be saved
on the client side, it will be opened on the client side and source file may reside in server.

Chat:
Chatting means exchanging the information between the users. Usually this kind
of talking is the exchange of typed-in messages requiring one site as the repository for
the messages and a group of users who take part on the network. In some cases, a private
Chat can be arranged between two parties who meet initially in a group. Chat can be
ongoing or scheduled for a particular time and duration. Chat is one way of exchanging
our views. The chat can be selected on a certain topic such as politics, religion,
entertainment, education, business etc... The chat can be done with a group of people and
there are ways were we could exchange confidential matters through private chat. In our
system when we register ourselves as a user the system will provide you a username and
password. That username will be considered as your id for chatting.

5.2. Data Flow Diagram


A DFD is a modeling tool that allows us to show a system as a network of
processes (mini systems) connected to each other by paths of data.
Data Flow:
Each arrow in a DFD Represents a path (or pipeline of conveyer belt) of data,
called the Data Flow.
Process:
A process represents an automated or manual activity that transforms incoming
data flows to outgoing data flows.
Data-Store:
A Data-Store holds the data (for reference), which the system cannot remember.
External events and system responses ate From/To Sources or Destination of the
system.

Components of DFD:
The basic components of DFD are following
Source/Destination

Process

Data Source

DFD are based on the strategy of structured techniques, Namely:


1. Graphics
2. Top Down Approach
3. Separation of logical from the physical
4. Partitioning
DFD is do not show

How things begin & end

Loops

Decisions

System Flow Diagram

Start

Enter Username &


Password

Login
No

Is
Valid?
Yes

File Transfer

Mail

Resource sharing

Web Page View

Chat

Data Flow Diagram

1. User Validation

LOGIN

Registration

User validation

Username,
Password

Username,
Password,
Key

Login
No

Valid
User

DB

Yes

File

Mail

Resource

Chat

Webpage

2. File Transfer

File Transfer

File
Exists

No

File Not Found

Yes
Yes
Virus

Virus
File
No
File
Transfer

Virus File

Error Page

If file length
Not equals

DAP

If file length equals

File Transfer Completed

3. Mail

Mail

Compose

Inbox

Mail
DB

Received Messages

4. Resource Sharing

Floppy Drive
Client

Client
Requests
Had Drives

Server

Server
Responds

CD-Drive
Printer

5. Web Page View

Webpage Request

Page
Exists
Yes

Webpage View

6. Chat

No

Webpage Not Found

Chat server

Client-1

Client-1

5.3. Database Design


Database Design is a crucial factor in the performance of a system both in
terms of system timings and in the case with which the system can be maintained or
modifies.
Table Name: Login
Field Name

Data Type

Description

User
Pwd
Key

Varchar
Varchar
Varchar

Client code
Password
Key

Field Name

Data Type

Description

Virus

Number

Virus Name

Data Type

Description

Table Name: Virus

Table Name: Mail


Field Name

Frm
To
Sub
Time
Msg

Varchar
Varchar
Varchar
Varchar
Varchar

Senders Name
Receivers Name
Subject
Time
Message

Input Design
The goal of designing input data is to make entry easy, free from errors and
validations should be maintained such that end users feel comfortable and user friendly
while entering data into the system. When the programmer approach input design the first
task is to design the source document that captures the data and select media as used to
enter into the computer.
User Entry
In this user entry enter the user id and password. It is used for perform the
securable data operation.

6. SYSTEM TESTING AND IMPLEMENTATION

6.1. TESTING FUNDAMENTALS


Software testing is an important element of S/W quality assurance
and represents the ultimate review of specification, design and coding. The increasing
visibility of S/W as a system element and the costs associated with a S/W failure are
motivating forces for well planned, through testing.
Though the test phase is often thought of as separate and distinct
from the development effort--first develop, and then test--testing is a concurrent process
that provides valuable information for the development team.

There are at least three options for integrating Project Builder into
the test phase:
Testers do not install Project Builder, use Project Builder functionality to
compile and source-control the modules to be tested and hand them off to
the testers, whose process remains unchanged.
The testers import the same project or projects that the developers use.
Create a project based on the development project but customized for the
testers (for example, it does not include support documents, specs, or
source), who import it.
A combination of the second and third options works best.
Associating the application with a project can be useful during the testing phase, as well.
We can create actions to automatically run test scripts or add script types and make them
dependent on the modules to test.

TESTING OBJECTIVES
There are several rules that can serve as testing objectives.
They are
1. Testing is a process of executing a program with the intent of finding an error.
2. A good test case is one that has a high probability of finding an undiscovered
error.
3. A successful test is one that uncovers an undiscovered error.
If testing is conducted successfully according to the objectives stated above, it

will uncover errors in the software. Also, testing demonstrates that software functions
appear to the working according to specification, that performance requirements appear
to have been met.

Testing Principles:
All tests should be traceable to customer requirements. The objective of
software testing is to uncover errors.
Tests should be planned long before testing begins. Test planning can design as
soon as the requirements model is complete. All tests should be planned and designed
before any code has been generated.
The parento principle applies to software testing. The parento principle implies
that 80 percent of all errors uncovered during testing will likely be traceable to 20 percent
of all program modules.
The testing should begin in the small and progress toward testing in the
large. To be more effective testing should be conducted by an independent third party.
By most effective, testing means that has the highest probability of finding errors.
A successful test case is one that uncovers an as-yet-undiscovered error.
Software testability is how a computer program can be tested. The following list of
categories shows that this software has been tested.
Software testing is often referred as verification and validation. Verification
refers to the set of activities that ensures that the software correctly implements the
specific function. Validation refers to a different set of activities that ensures that the
software that has been built is traceable to the customer requirements.

OBJECT ORIENTED TESTING


VALIDATION TESTING:
Validation testing is one, which checks the given data is a valid one, or
not. In our system, first stage username and password is checked. If it is a valid one, then
the services will provided to the user. Hence validation testing takes place at the earlier
part of our project. This is one of the most crucial one, which takes place at the all kind of
projects.

6.2.UNIT TESTING
Unit testing focuses the verification effort on the smallest unit of
S/W design i.e., the module. The unit testing is always white-box oriented and the step
can be conducted in parallel for modules.
During unit test, testers can use the same project or projects as the
developers, if functional units organize the project, or separate projects have been created
for functional units. The project or projects can also be exported, so unit test can take
place in a variety of environments and on a variety of platforms.
Unit testing comprises the set of test performed by an individual programmer prior
to integration of the unit into a larger system. There are different types of tests to be
performed on a programming unit. These may be classified as follows:
Functional Tests
Performance Tests
Stress Tests
Structure Tests

Functional Test cases involves exercising the code with normal input values
for which the expected results are known, as well as boundary values and special
values.
Performance Testing determines the amount of execution time spent in
Various parts of the unit, program

throughput, response time and device

utilization by the program unit.


Stress Tests are those tests designed to intentionally break the limit. A great
deal can be learnt about the strengths and limitations of a program by examining
the manner in which a program unit breaks.

Structure Tests are concerned with exercising the internal logic of a program and
traversing particular execution paths to exercise, deriving test date, determining the
criterion to be used, executing test cases.

UNIT TEST CONSIDERATIONS


The tests that occur as part of unit testing. The module interface is
tested to ensure that information properly flows into and out of the program unit under
test. The local data structures are examined to ensure that data stored temporarily
maintains its integrity during all steps in an algorithms execution.
Boundary Conditions are tested to ensure that the module operates
properly at boundaries established to limit or restrict processing. All independent paths
through the control structures are exercised to ensure that all statements in a module have
been executed at least once. Finally, all error-handling paths are tested.

UNIT TEST PROCEDURES

Unit testing is considered an equivalent to the coding step. After the


source level code has been developed, reviewed and verified for correct syntax, unit test
case design begins since a module is not a stand alone program, driver and/or stub
S/W must be developed for each unit test.
In most applications, a driver is nothing more than a main program
that accepts test case data, passes such data to the module to be tested, and prints the
relevant results. The stubs serve to replace modules that are subordinates called by the
modules to be tested. A stub or a dummy stub or a dummy subprogram uses the
subordinate modules interface, may do minimal data manipulation, prints verification of
entry, and returns. The drivers and scrubs represent overhead i.e., both are S/W that must
be written but that is not delivered with the final S/W product. If the drivers and the stub
are kept simple, then the overhead is low.
In Our project, Unit testing takes place at every module. First stage
the file name is requested from the user. Then the server searches the file in the
system. If the file exists in the system then it will moves for virus checking. If the file
is a valid one then it will be transferred to the client location. After transferring the
file, it will check the length of the file before and after transmission. If the length
equals then the file transfer is completed otherwise we have to retransmit the file.
The Unit Test is carried out in this project, and is found successful. The
data is flowing correctly to all part of the project.

6.3. INTEGRATION TESTING

It addresses the issues associated with the dual problems of verification and program
construction. Black box test case design techniques are the most prevalent during
integration, although a limited amount of white box testing may be used to ensure
converge of major control paths. Integration testing is a systematic technique for
constructing the program structure while at the same time conducting tests to uncover
errors associated with interfacing. The objective is to take unit-tested modules and build
a program structure that has been depicted by design.
Incremental Integration Strategies are

Top-Down Integration
Bottom-Up Integration
Test cases were designed so that all units tested modules were executed
from the main module and the reports were generated to check the results with the
expected results.
After has been integrated, a set of high order tests are conducted, validation
criteria must be tested.
In our project, integration testing checks if the validation part is
correct then user will allow to move to next step i.e. the home page where all kinds
of services resides. It means it will maintain a bridge to move to other modules and
integrate them.
Integration testing is a systematic technique for constructing the program
structure while at the same time conducting test to uncover errors associated with
interfacing. The objective is to take unit-tested modules and build a program structure
that has been dictated by design.

TOP-DOWN INTEGRATION
This method is an incremental approach to the construction of
program structure. Modules are integrated by moving downward through the control
hierarchy, beginning with the main program module.

Importing the test project and setting up the testing environment


The process of importing a test project and
setting up a testing environment is the same as the process for importing a project and
setting up the environment for development.

Adding test scripts and test data to the project


You may need to add some items, such as test
scripts, to the project. In addition, you may need to add connection strings to database
accounts containing test data.
Remember that you can automate the running
of test scripts just as you can automate actions associated with the modules in your
application.

Modifying actions and macros to facilitate testing


If actions specifying "run with debugging"
have not already been provided, you can either modify existing actions to include a
debug flag, or create new actions.

6.3. Acceptance Testing


This test was performed with the users of the system and made sure that
it performed as they expected. It was verified that all functionality required by the
user have been satisfied. So for, the system has been found defect free and is
working well.

6.4. IMPLEMENTATION
Once the system has been designed, the next step is to convert the
designed one in to actual code, so as to satisfy the user requirements as excepted. If the
system is approved to be error free it can be implemented.
When the initial design was done for the system, the department was
consulted for acceptance of the design so that further proceedings of the system
development can be carried on. After the development of the system a demonstration was
given to them about working of the system. The aim of the system illustration was to
identify any malfunctioning of the system.
Implementation includes proper training to end-users. The

implemented software should be maintained for prolonged running of the software.

Initially the system was run parallel with manual system. The
system has been tested with data and has proved to be error-free and user-friendly.
Training was given to end -user about the software and its features.

7. MAINTENANCE

The term software maintenance is used to describe the


software engineering activities that occur following delivery of a software product to
the customer. The maintenance phase of the software life cycle is the time period in
which a software product performs useful work.
Maintenance activities involve making enhancement to
software products, adapting products to new environments and correcting problems.
Software product enhancement may involve providing new functional capabilities,
improving user display and modes of interaction, and upgrading external documents.
Adaptation of software to a new environment may involve moving the software to a
different machine. Problem correction involves modification and revalidation of
software to correct errors.
The enhancement of this project can be accomplished
easily. That is, any new functional capabilities can be added to the project by simply

including the new module in the homepage and giving a hyperlink to that module.
Adaptation of this project to a new environment is also performed easily.

7.1. Corrective Maintenance

Even with the best quality assurance activities, it is likely that


they customer will uncover defects in the software. Corrective maintenance changes the
software to correct defects.

7.2. Adaptive Maintenance

An activity that modifies the software to properly interface with a


changing environment. The system has been modified so that various change include to
the new system.
In case of Fund Transfer, adoptive maintenance has been
performed, that is in earlier system (character based UNIX system) changes are fixed and
if any new changes are to be included, was a difficult task. Now provisions are given so
that the user can define various changes. Such as it designed to accommodate the new
change in further.

7.3. Enhancement Maintenance

As software is used, the customer/user will recognize additional


functions that will provide benefit. Perceptive maintenance extends the software beyond
its original functional requirements.

In the case of Advanced secured system can be added new


functions such that the user can able to retrieve the information in a user friendly and it
will be very helpful for future development.

8. Screen Layouts

9. Conclusion
This project incorporates all requirements of a Server. This system has
been developed as versatile and uses friendly as possible keeping in mind the
advanced features in this technology.

This is precisely where the ADVANCED SECURED SYSTEM fit


into place. This System supports and improves many of the core functionality of the
organization. Using such a system helps the organization in minimizing the time and
money consumed in fulfilling the day-to-day functionalitys and cutting down the
expenses incurred on the same. The real world requirements was satisfied by this system
which provides all services like e-mail, chat The File Transfer is very effective where
this system uses the concept of DAP. E-mail is one of the service which we can send mail
through the intranet. Resource sharing can be achieved through this system. In our day
today life, we have to move to third party to get mail, chat etc But this problem is
solved using our system. So our system will be cost effective and used in any platform.

Using JSP and Oracle 8.0, the system was developed. As a whole, the
system was wellplanned and designed.

10. Future Scope of the Project


The project will be more users friendly with the future enhancement of
having the mailing facility, which will intimate the users to send their messages to
internet itself. As well as verification mails, warning mails and news updates to be send
to the using the automatic mailing facility. The enhancement also consists of making
private chat more effectively and connecting to ftp server for file transfer in the internet.
Further, this project can be proposed to use EJB for further deployment purposes. This
facility will make the Server a complete one.

11. Bibliography

Book Name

: Mastering JSP

Author

: A. Russell Jones

Book Name

: JSP Developers Guide

Author

: Gregpuezek

Book Name

: Oracle 8.0

Author

: Cassel & Palmer