Cyber Cafe Management

August 28, 2017 | Author: Unnati Solanki | Category: User (Computing), Password, Databases, Websites, Internet
Share Embed Donate


Short Description

SRS report for Cyber Cafe Management system...

Description

Cyber Café Management System 2016

Software Requirement Specification For Cyber Café Management System Prepared by 1. Rathod Bhoomika K. 2. Shaikh Amreen A. 3. Solanki Unnati R.

1

140283107027 140283107029 140283107030

Cyber Café Management System 2016

L. D. College of Engineering Department of Computer Engineering

CERTIFICATE Date: 04/04/2016 This is to certify that the dissertation entitled “ Cyber Café Management System” has been carried out by “Rathod Bhoomika(140283107027) , Shaikh Amreen (140283107029) , Solanki Unnati (140283107030)” under my guidance in fulfillment of the degree of Bachelor of Engineering in Computer Engineering (6th Semester) of L.D. College of Engineering affiliated with Gujarat Technological University, Ahmadabad during the academic year 2016.

Guide: Prof. V.B.Vaghela CE Department

2

Prof. D A Parikh Head of the Department

Cyber Café Management System 2016

Acknowledgement

Here we gladly present the project on “Cyber Cafe Management System” as part of the 6th Semester B.E. in computer Engineering. At this time of submitting this report we use this opportunity to mention those people who with us along the work. I would like to thank my supervisor, Mr. V.B.Vaghela sir for his guidance and comments on various aspects of this project and for thoughtful contribution in my effort. Other known and unknown persons who helped me in my work also deserve Thanks for their co-operation. Last but not the least; I am very thankful to my friends for providing me a valuable assistance during my work.

3

Cyber Café Management System 2016

TABLE OF CONTENTS

1. Introduction………………………………………………………….……...6 1.1 1.2 1.3 1.4

Purpose……………………………………………………………..6 Document Convention…………………………………………….6 Intended Audience and Reading Suggestion………………….…..6 Project Scope…………………………………….……….…………7

2. Overall Description……….……….……….……….……………………...8 2.1 Product Perspective…………………………………………………8 2.2 Product Features…………………………………………………….8 2.3 User classes and Characteristics…………………………………...9 2.4 Operating Environment……………………………………………..9 2.5 Design Constraints………………………………………………….9 2.6 User Documentation…….………………………………………….10 2.7 Assumptions and Dependencies………………………………..…10 3.

Functional Requirements……….……….…….……….………………...11

4.

External Interface Requirements……….…………………………….....18 4.1 GUI……………………………………………………….…………18 4.2 Hardware Interface……………………………………….…………18 4.3 Software Interface……………………………….……….…………18

5.

Non Functional Requirements……….…….……….…………………….19 5.1 Performance Requirements…………………………………………19 5.2 Safety Requirements………………………………………………..19 5.3 Security………………………………………………………………19

4

Cyber Café Management System 2016 5.4

Software Quality Attributes………………………………………20

6.

Preliminary Schedule……………………………………………………21

7.

Operational Scenario…………………………………………………….21

8.

Diagram………………………………………………………………......26

9.

Testing.................................................................................................27

10 Preliminary schedule...........................................................................32 11. Preliminary Budget……………………………………………………….33 12. Cost Estimation…………………………………………………………..34 13. References ………………………………………………………………..35

Appendix A: Glossary…………………………………………………………37

5

Cyber Café Management System 2016

1. Introduction 1.1 Purpose of Requirements document This software requirements specification (SRS) specifies the requirements of the cyber café management system which will be used in college internet laboratories or internet cafes. This document will be used for the clients to ensure all specifications and requirements and conductive as mentioned by the software engineer to design the system. 1.2 Document conventions Main section titles Font: Times new roman face: bold Size: 14 Sub section titles Font: Times new roman face: bold Size: 12 Other text explanations Font: Times new roman face: bold Size:12 1.3 Intended audience and reading suggestions Clients: The user of the system will get a clear idea of a software and hardware requirements to be engaged. Lab technicians: They will be in a position to attain the various features that are enabled in the software there by including new definitions for a security Developers: project developers have a advantage of quickly understanding the methodology enabled and personalizing the product. Students: The project shows an infinite path in the field of security in the internet labs. There is a always perspective of development. The authors would suggest clients to go through the requirement section thoroughly before installing the software. The lab technicians are expected to have a certain knowledge in the terms used and hence can go for the security issues

6

Cyber Café Management System 2016 directly. Students and developers can utilize the documentation as a resource in developing the project to a new product. 1.4 Scope of development project The modern colleges have a internet facilities that are not secure and based on costly software for maintaining users. Security system is not that efficient also. Many firewalls and tracking software are used for security purposes that reduce the total efficiency of the internet system.CYBER CAFE MANAGEMENT SYSTEM software will deliver an open source operating system with inbuilt features for accessing secure internet. The software also has a accounting and monitering module to trace and keep track of various internet activities. The targeted users are internet labs in colleges and internet cafes. 1.5 Definitions, Acronyms and Abbreviations 1. 2. 3. 4. 5. 6. 7. 8. 9.

7

SRS: Software Requirement Specification CYBER CAFE MANAGEMENT SYSTEM Client /user: Internet user at the internet access point Server: A system that runs in linux always monitoring the actions. RAM : Random access memory. SQL: Structured query language HTTP: Hyper text transfer protocol UserID: Unique username issued to each user to login Password: Unique word given to each user as a secret code

Cyber Café Management System 2016

2. Overall Descriptions 2.1 Product perspective

The client will be given internet access only by the knowledge of the server. When a client is accessing internet the server will be tracking the user name and account details of the user logged in. There is option also for the user to view the account details of the user. 2.2 Product function

The CYBER CAFE MANAGEMENT SYSTEM client should running on the client system so as to track the account details of the user.the server will only respond to those systems where the client is running.

8

Cyber Café Management System 2016 2.3 User classes and characteristics General users: they will be position to permit access to the users in the internet and acknowledge their account status. Administrators: they are the core users able to add the new users to the system and permit them to access the internet resources. they can also view in real time what a user performing right now. they can also get the overall report of the user sessions. Employees: They login at the client level and this is to get access to the internet at the client level. They can also view their account status in the client sysyem. 2.4 Operating system Particulars Operating system Processor Hard disk RAM

Client system Windows 2000 prof/Linux Pentium 4,1.2GHz 40GB 256MB

Server system Linux Pentium 4,2GHz 100GB 512MB

2.5 Design and implementation constraints Each user must keep their password as confidential. More over the user must have individual ID for creating a login in the CYBER CAFE MANAGEMENT SYSTEM. Only Administrator can control user addition and deletion in the CYBER CAFE MANAGEMENT SYSTEM system. Also this group could only create reports. 2.6 User documentation The product is under development stage and requires a complete implemented prototype to explain the user documentation.once the prototype is designed and implemented online manuals can be provided.

9

Cyber Café Management System 2016 2.7 Assumptions and dependencies Initially only two locations are connected to the CYBER CAFE MANAGEMENT SYSTEM Each location is always connected whether an operator is logged On at the remote location or not Each user must have a user ID and password There is only one administrator Server must always run under Linux system Internet connection is must. Proper browsers must be installed. Text readers should be installed to view the help files. 2.8 Overview of data requirements Inputs: user must give his ID and password to access the internet. Request from the user to view his account details Outputs: user account details from the server Details of various logins 2.9 General constraints, assumptions, dependencies, guidelines ---NOT APPLICABLE--2.10 User view of the product The user screens that the user would finally be seeing could only be displayed at end of the whole projects. Once the project is implemented the samples of the used and the dramatic sceneries can be depicted.

10

Cyber Café Management System 2016

3. System Features 3.1 Authentication 3.1.1 Descriptions and priority The system offers access to internet at client level and access to server resources at server level only by validating the user with the unique username and password. 3.1.2 Stimulus/response sequences The stimulus/response for the different classes of users are: 1. Users: login 2. Administrator: Adding new accounts, giving account status, getting & sending reports. 3.1.3 Functional requirements All system should have the client for program running. The server Should identify individual systems by their names. R1 Registration Description: This function registers the newly arrived customer. The user provides all the personal details like contact, email, id, address etc. to the system. It stores details in database & generates error message if error is already registered. R 1.1: Select new registration option Input: Select “Personal Details” option. Output: User prompted to enter personal details.

R 1.2: Select Id proof option Input: Select “ID Proof” option. Output: User prompted to upload ID proof.

11

Cyber Café Management System 2016 Processing: User Id for the customer is generated.

R 1.3: Set password option (on terminal). Input: Set password option. Output: User prompted to enter password & successfully registered.

R2 Login Description: Username & password is provided to the system. If valid, this function allows user to access the internet otherwise error message is displayed. Forget password facility is also provided for the user. R 2.1: Enter username and password Input: Enter username and password option. Output: User prompted to enter username and password. Processing: The user logins successfully if username and password are valid otherwise error message is displayed.

R 2.1: Select forget password option Input: Select forget password option Output: User prompted to answer security questions. Processing: If security answers are correct than user is allowed reset password otherwise error message is displayed.

12

Cyber Café Management System 2016 R3 Employee Management & Access Control Description: It provides unique logins to every Employee working in a cafe. It avoids unauthorized access of the application by providing Unique Employee logins. Admin can add/delete employee records as well as grant various authorities. R 3.1: Add employee details Input: Select add employee option Output: User prompted enter employee details.

R 3.2: Modify employee details Input: Select edit/delete employee option Output: User prompted modify employee details.

R 3.3: Grant/Revoke authorities Input: Select Grant/Revoke authorities option Output: User prompted to provide authorities. R 3.3.1: Type of report Input: Select “Type of report generation” option Output: Different types of report selected to authorize employee. R 3.3.2:Customer record modification. Input: Select “Customer record modify/delete” option Output: Option selected. Processing: On selecting the option, the employee can modify/delete customer’s record otherwise he cannot.

13

Cyber Café Management System 2016 R4 Product Sales Management Description: Products and Services sold in your cafe can be defined in the system. Every purchase is accounted in the system against an invoice. Cafe Employee cannot change the Sale Price for their profits.

R 4.1: Add Product details Input: Select “add product details” option Output: User prompted enter product details.

R 4.2: Stock add/modify Input: Select “edit/delete product details” option Output: Modify the quantity, name or other details of the product. Processing: The changes are updated in the database.

R5 Website Blocking Description: Website blocking feature enables you to prevent Users from surfing unwanted websites in your Cafe. These websites typically have adult or objectionable content or are banned under government rules. Using this feature you can block a complete website and avoid potential legal problems. It also helps maintain a clean environment in your Cafe, in which all types of Users are comfortable surfing.

R 5.1: Website blocking Input: Select which website to block. Output: Website blocked.

14

Cyber Café Management System 2016 R6 Website Tracking Description: It keeps a track of websites browsed by the Cafe Users if the Website Tracking feature is enabled. It is used to keep a check on the websites accessed by Cafe Users. The tracked websites are categorized by Date, Terminal, and User and stored as plain text file on the server. You can check these sites and block unwanted sites using the Website blocking feature.

R 6.1: Website tracking Input: Select which website to track. Output: Website tacking enabled.

R 6.2: Browse to save folder Input: Select “Browse to save folder” option. Output: Path specified.

R 6.3: Browse to save folder Input: Select “Browse to save folder” option. Output: Path specified.

R7 Membership package Description: Membership Packages provide an easy solution to charge regular Cafe Users, who like to pay in advance or buy bulk surfing time. These packages can be created in advance and be sold to regular Users. It enables you to reward your regular Users with a discounted price.

15

Cyber Café Management System 2016 R 7.1: Membership package Input: Select membership package & customer. Output: User prompted to select the customer and specified package.

R8 Bandwidth Monitor Description: It gives you the option to set download limits for each User Session. You can set an alert to inform Cafe Users, whenever the download limit is exceeded. You can Monitor Bandwidth consumed in your cafe. You can block websites that download more data, ensuring fair share of bandwidth consumption.

R 8.1: Enable Bandwidth monitor Input: Select “Enable Bandwidth monitor” option. Output: Bandwidth enabled. Processing: It monitors the amount of data being downloaded by each Cafe User. It displays the total data downloaded on the Café-Server.

R 8.2: Total Download Limit Input: Set “Total download limit” option. Output: Mb set.

R9 Accounting System Description: This function provides an easy way to manage your daily cash transactions. It maintains an invoice for each cash transaction. This data is reflected in extensive Financial Reports.

16

Cyber Café Management System 2016 R 9.1: Payment details Input: Select “Payment details” option Output: Payment done & generates payment receipt. Processing: Calculates the payment charges as if total net usage, downloads, no. pages printed, pages scanned etc. and generates receipt accordingly.

R 9.2: Amount Credit/Debit Input: User prompted to enter amount for credit/debit. Output: Amount Credited/Debited. Processing: The credited/debited amount is displayed to the user during next session.

R10 Reports Description: It provides a useful set of reports which will help a cafe to analyze and optimize their cafe business. Reports provide information on Financial Accounts, User Activity, Products & Services, Printers & Terminal usage.

R 10.1: Select type of report Input: Select “Type of report option”. Output: Generates the selected report.

17

Cyber Café Management System 2016

4. External interface requirements 4.1 User interface  Login Screen: This is for the administrator to get into the software. It requires a user name and password.  Account Details: this shows the account status of various users with their login times.  New registrations: this utility is to create new users or clients in the CYBER CAFE MANAGEMENT SYSTEM.  Reports: this is used to generate reports of the login and account details of users.  User login (client side): the user has to give a username and password by which he or she can access internet.  User Account: this enables the user to view the account status Of their account. 4.2 Hardware interfaces The server is directly connected to the client systems.also the client has to access to the database for accessing the account details and storing the login time. The client access to the database in the server is only read only. 4.3 Software interfaces CYBER CAFE MANAGEMENT SYSTEM is a multi-user, multi-tasking environment. It environment. It enables the user to interact with the server and attain access to the internet and also leaves a record in the inbuilt database. It uses java servlets as the front end programming tool and SQL as the backend application tool. 4.4 Communication interfaces The CYBER CAFE MANAGEMENT SYSTEM uses java Servlets and hence require HTTP for transmission of data. More over this allows easy interaction between the various clients and the server.

18

Cyber Café Management System 2016

5. Other non-Functional Requirements 5.1 Performance Requirements The important aspects of CYBER CAFE MANAGEMENT SYSTEM software is time constrain. CYBER CAFE MANAGEMENT SYSTEM software system is real time and hence should be performed in minimum requirements. The accountability is a vital feature and this could only be assured if the system is working in full capability. So uninterrupted power supply is needed. 5.2 Safety Requirements The data handled in the cyber cafe system is very vital. The server should always be confirmed to run properly and data are saved to the database at consecutive intervals. Power is a significant feature and the power supply should be always taken care of. An uninterrupted power supply is always recommended. 5.3 Security Requirements The security system features from having a login for all the users To access the software. The login details will be used in the system also. So the chances of the software getting intruded are very less. 5.4 Software Requirements The source code of the product is going to be open as this is going to be open source software. It will be free for further modifications and improvements. 5.5 Business Rules Illegal duplication of the reports should be strictly dealt with.the administrator should have full details of the user while a user is getting registered to the system. 5.6 Special Requirements 5.6.1 Backup and Recovery

19

Cyber Café Management System 2016  Keeps backups of all data files in a separate directory/drive.  Frequently auto-save information, in the case of a lost network connection, the browser or the system crashing, etc. 5.6.2 Data migration The concept of Data migration is important to ensure that the data that is being entered and stored today could be accessed After even several years. 5.6.3 Data retention Maintaining a log file for each user logging ina nad also maintaining the account details of the users who have finished the account could be obtained from cyber café reports. 5.6.4 User training Clients must be trained to operate the cyber café software in creating new accounts and performing report operations. 5.6.5 Installation A Conductive environment for the efficient running of the cyber café recommended. The server should be handled with great care and all unauthorized access should be restricted.

20

Cyber Café Management System 2016

6. PRELIMINARY SCHEDULE: The system has to be implemented within 6 months.

7. OPERATIONAL SCENARIO: This system consist of student database, staff database, servers, various complain databases etc. The major actors in this system are:General users: They will be position to permit access to the users in the internet and acknowledge their account status. Administrators: They are the core users able to add the new users to the system and permit them to access the internet resources. They can also view in real time what a user performing right now. They can also get the overall report of the user sessions. Employees: They login at the client level and this is to get access to the internet at the client level. They can also view their account status in the client system.

Scenario:  Initial Situation: A registered customer logins using User-ID and password and surfs.  Normal flow of events: In Cyber Cafe Management System, initially the customer visits the café. If he is not registeres, then he must provide login credentials along with proof and registered himself. He will then create a password on specified terminal using ID provided by employee.

21

Cyber Café Management System 2016 On other hand if user is registered, then he will login into his account and access the net or takes an printout of necessary document.  What can go wrong: If the registered user forgets the password & on pressing “Forget Password” option he is provided with security questions, but still if user is enable to answer these questions. If the newly arrived customer forgets to bring th Id proof, he will not be allowed to access the net. Printing issue while print command senr by user due to some technical problem The customer faces difficulty in accessing the internet & the available employess will help him.  Other activities: Café owner sales different computer accessories useful for customer.  System state on completion: The customer [ays the bill for surfing, priting or purchasing any product.

22

Cyber Café Management System 2016 Use-Case diagram

Registration

Provide details ID proofs

Registration

Customer

Employee Login

Assign Terminal & gives userid

Surfing and printing

User play games surfs web

Web Blocking Customer

Admin Net usage

Employee Printing and Scanning

23

Cyber Café Management System 2016

Payment

Net Usage

Website Accessed

Employee

Customer Payment

Calcullate bill and gives time slot warn

Report

Payment history

Collection report

Admin

Employee Terminal usage

Web Tracking

Printing report

24

Cyber Café Management System 2016

Cyber café management system Registration

login customer

provideed details & Id proofs

Admin

Assign terminal and gives userid

surfing and printing

website blocking

payment

Report

25

employee

Cyber Café Management System 2016

8. Diagrams 8.1 Class Diagram:

26

Cyber Café Management System 2016 8.2 Sequence Diagram:

27

Cyber Café Management System 2016

9. Testing

9.1 About Testing: Testing is a process that requires more efforts than any other software engineering activity. Testing is a set of activities that can be planned in advance and conducted systematically. This may lead to have many undetected errors in the system being developed. Hence performing testing by adopting systematic strategies in very much essential in during development of software.

Various testing strategies for conventional software are :1. Unit Testing :In this type of testing techniques are applied to detect the errors from each software component individually . 2. Integration testing :It focuses on issues associated with the verification and program construction as components begin interacting with one another. 3. Validation testing :It provides assurance that the software validation criteria (established during requirement analysis) meets all functional , behavioral and performance requirements . 4. System testing :In system testing all system elements forming the system is tested as a whole.

28

Cyber Café Management System 2016 9.2 White Box Testing In this testing the internals of software are tested to make sure that they operate according to specifications and designs. The test case for Online Academic System is as following:-

Test case Id

Test case Name

1

Login

Test case Description

Test steps

In this case user will try to login in the system in order to use the use the system functionality. Website In this test Blocking case ,Admin and tracking Can block or track the website.

In this step, the user will enter user name and password and then click on the login button. In this step , the user can not block websites.

3

Bandwidth Monitor

4

Accounting

2

29

It gives you the option to set download limits for terminals. Maintains an invoice for each cash transaction.

Test case Test Defect status case severity (pass/ priority fail) Pass 1

Pass

2

User cannot use internet exceeding usage limit.

pass

3

Valid payment.

Pass

4

Cyber Café Management System 2016

9.3 Black Box Testing It’s also called as “behavioral testing”. It focuses on functional requirement of the system. As per the name suggests in black box testing it is tested whether the input is accepted properly and output is correctly produced. Equivalence Partitioning: In this technique, if an input condition requires a specific a range, one valid and two invalid equivalence classes are defined.  If an input condition requires a specific value, one valid and two invalid equivalence classes are defined.  If an input condition specifies member of a set, one valid and two invalid equivalence classes are defined.  If an input condition is a Boolean, one valid and two invalid equivalence classes are defined. Equivalence Partitioning for Cyber Cafe Management System is :Log in Module: Input conditions:- Valid username, valid password Test values:- 1.(Bhoomika, bhumu123) 2.(nnn,nn)

Website Blocking/Tracking Module: Input conditions :- (Website name, No of days ) Test values :- 1.(www.facebook.com,15) 2.(xyz.com,-3)

30

Cyber Café Management System 2016

Accounting Module: Input conditions :- (Invoice No,Customer_Id,Cust_Name, Items, Quantity) Test values :- 1.(001,C01,Unnati,Pen-drive,2) 2.(xyz,-1,-456,1,-1)

Bandwidth Monitor Module: Input conditions :- (limit) Test values :- 1.(1GB) 2.(-1000MB) Boundary Value Analysis (BVA) : Boundary value analysis is done to check boundary conditions.  Using boundary value analysis , instead of focusing on input conditions only, the test cases from the output domains are also derived.  It is a complement to the equivalence partitioning.

31

Cyber Café Management System 2016

10 . Preliminary Schedule

The Application should be completed within a specific time period depending on each module. The deadline of the particular modules is given as per the below given table :Modules Requirement gathering Designing & planning Developing Testing Maintenance

32

Deadline 12-20 days 3week 2 months 3 week -

Cyber Café Management System 2016

11. Preliminary Budget

The total funding of the software is around 5-6 lakhs. Task Employee’s salary Hardware Software Licensing Maintenance

33

Expenses(Rs.) 85,000 2,00,000 90,000 50,000 1,00,000

Cyber Café Management System 2016

12. Cost Estimation

Function Point calculation Function points (FP) measure size in terms of the amount of functionality in a system. Function points are computed by first calculating an unadjusted function point count (UFC). Counts are made for the following categories     

Number of user inputs Number of user outputs Number of user inquiries Number of files Number of external interfaces

Once this data has been collected, a complexity rating is associated with each count according to Table

TABLE 1: Function point complexity weights.

Measurement parameter

Number of user inputs Number of user outputs Number of user inquiries Number of files Number of external interfaces

Count

Weighting factor

10 8 5 20 15

Simple Averag Compl e ex 3 6 4 5 7 4 3 4 6 7 15 10 5 7 10

40 32 30 200 150 UFP=452

34

Cyber Café Management System 2016 Table 2. Components of the technical complexity factor.

F1 F2 F3 F4 F5 F6 F7 F8 F9 F10 F11 F12 F13 F14 Total

Component Reliable back-up and recovery Data communication Distributed functions Performance Heavily used configuration Online data entry Operational ease Online update Complex interface Complex processing Reusability Installation ease Multiple sites Facilitate change

Function Point = UFP * [ 0.65 + 0.01 * ∑ ( Fi ) ] = 452* [ 0.65 + 0.01 * 40 ] = 452* [ 0.65 + 0.40 ] = 452 * 1.05 FP=474.6 A review of historical data indicates – 1. Average Productivity is 10 FP/Person Month. 2. Average labour cost id 20000 ₹

35

Rate 5 3 3 3 2 5 4 3 1 3 1 3 3 1 40

Cyber Café Management System 2016 Calculation: 1. Cost per function point

= (20000 / 10) = ₹ 2000

2. Total Estimated project cost = (474 * 909) = ₹ 430866 3. Total Estimated Effort

36

= ( 474 / 10) = 47.4 Person/Month

Cyber Café Management System 2016

13. REFERENCES: Websites:  http://www.linuxlinks.com  http://www.tldp.org  http://www.reallylinux.com

Appendix A: Glossary Terms

Definitions

User

Someone who interacts with the System.

Admin/administrator

System administrator who is given specific permission for managing and controlling the system. Cyber Cafe Management System

HMS Rector

People appointed by the Hostel Manager for monitoring and checking of the work done by the user.

Stakeholder

Any person who has interaction with the system who is not a developer.

37

View more...

Comments

Copyright ©2017 KUPDF Inc.
SUPPORT KUPDF