K.L. University: A Software Engineering Project On Cyber Cafe Management System
K.L. University: A Software Engineering Project On Cyber Cafe Management System
Project submitted to
By
S.V.Rohith-150031000 section-03
N. Anirudh-150030041 Batch-13
K.L. UNIVERSITY
Green fields, Vaddeswaram, Guntur Dist.522502
DECLARATION
Date: 150031000
150030041
___________________
Signature of the Faculty
INDEX
S.NO CONTENTS
1. Introduction
2. Modules
6. Sequence Diagram
7. Activity Diagram
8. Class Diagram
This project basically contains two types of users: the server user and the
client user.
The Server user is the administrator of the Server machine who has the
right to monitor each and every client or customer. He will have the
rights to remotely login or logout the client user. He solely controls the
Server machine.
The Client user is the customer for the cyber. He can login to the client
system and start browsing only if he is authenticated (by username and
password) otherwise the Admin user can log him in remotely.
There can be multiple clients interacting with the server, sending multiple
requests at the same time.
TOOLS USED
Star UML
It is a UML tool by MKLab. The software was licensed under a modified
version of GNU GPL until 2014, when a rewritten version 2.0.0 was
released for beta testing under a proprietary license. After being
abandoned for some time, the project had a revival to move from Delphi
to Java/Eclipse and then stopped again.
Computer
Any pc can be used irrespective of the operating system since it’s
compatible with Mac, Windows, and other Linux divisions
Module Description:
1. Admin Module:
1.1 Connection Module
This module is supposed to open a socket connection and keep the socket in
wait mode until it receives some request from the client side. Once there is
some request coming in from the client, it should receive the data and perform
appropriate functions.
1.2 User Creation and Management
This module should implement the user creation and management. The users
could be given a username and password and also they could be given a
prepaid account by which they can browse until they finish the amount in their
accounts.
This module comprises five sub modules:
Add records: This module deals with adding or storing the customer
details which includes his/her user name, password,timeplan etc,.
Get customer log information: This module deals with retrieving the
details about the current customer after his each or after he completes
his session.
Display all records: This module allows the admin to view or keep track
of all the customer details either on basis of type of user, or on basis of
weekly or monthly.
Time plan: The customer here is offered two choices to make for the
time plan that is prepaid and Post-paid. The browsing charge for
prepaid users will be deducted from his/her account while the post-paid
users will have to make the entire payment by cash in accordance to his
browsing time.
Active users: This module gives the information about the logged in
users and the comp that they are logged into.
1.3 Billing
this module should produce bills depending upon the user activity and hence
generate a report comprising all the requisites, regarding the customers
session. Here the post-paid customer makes full payment, comprising charges
for his browsing time as well as other services seeked such as items
purchased, refreshments, scanning, printing etc,. While the prepaid customer
will pay for the extra services seeked other than browsing time as the due
deduction for browsing will be done through his account.
2. Client Module:
2.1 Client Connection
This module will try to establish connection with the server. If the connection is
successful then he will be able to use the client system. The connection
request is made on the server that is available on the network, If the server is
not running or if he is not authenticated then he will not be able to use the
client system.
2.2 Client Requests
this module will allow the customer of the cyber café to make request’s for
some of the items that are predefined and will be displayed on his screen.
These requests will be shown up server screen and the admin provides the
customer with the requested services to his place.
Future scope of the project:
The aim of our project is to replace the paper works & works done
manually and to automate the existing trend in the cyber café. Be it user
creation, their management or bill generation, everything is
computerized. Since the admin job is done effortlessly and at the same
time the customer can enjoy his browsing time entirely, hence both the
user and the owner are at their ease.
We have limited the server and the client into a single system. For real-
time purposes we can extend the software by installing the server
components into a single system and have multiple clients by installing
the client components into many systems. Here multiple clients can
interact with the single server at the same time sending in multiple
requests simultaneously.
Nowadays Cyber Crime has increased immensely. So in order to avoid
the risk of getting indulged in any scandals regarding cyber crime we
can implement the FINGER PRINTING Mechanisms in the cyber for the
authentication of the clients or customers of the cyber.
The acceptance of CREDIT and DEBIT CARDS for the payments can
make the software more versatile. Allowing the point of sale concept at
the cyber café can be another attractive feature of the software.
Advantages
Print-monitoring:
monitors all the printer queues available on the server machine and
stores the document names and other details of all the documents
printed. This feature has certain limitations.
Customizable screens
The Customer Login and Logout screens can have a background
designed by you.
Allowed Applications
it allows the users to use some applications without starting their
session. These applications can be specified using the Allowed
Applications feature.
Banned Applications
you can use this option to restrict users from accessing specified
applications and web-sites.
PRIVACY
The biggest concern for most PC users is privacy. Wi-Fi hotspots in most
public areas are unsecured, which means that others could potentially access
information on your computer. If you forget to log out of a public computer
terminal, someone could access your email or other sensitive accounts. On a
physical level, the person next to you in an Internet cafe can easily look over
your shoulder. Internet cafes or public terminals are not ideal for sensitive or
work-related information.
PERFORMANCE
I nternet cafes geared toward gaming have high-performance computers. Most
PC games have much higher requirements than the average personal
computer. If you play the game at an Internet cafe, you will enjoy the game at
its full optimization without the burdensome cost of buying a special gaming
PC. The Internet speed at gaming cafes is also much faster than the average
home Internet speed, which reduces lag and timeouts from interrupted
Internet connections.
COST
The cost of Internet at cyber cafes is relatively low and varies between
countries. Most places charge hourly, though some offer a one-time purchase
fee. If you are travelling, purchasing an hour at an Internet cafe to write home
is significantly cheaper than paying for a monthly satellite fee. As Wi -Fi grows
in abundance, more businesses are offering free Internet access to attract
customers.
1. Server Connection: This feature opens a socket connection & enters wait
mode unless it receives any requests coming from the client side.
2. User Creation & Management: This feature implements creation of
different kinds of users & their management.
3. Add records: This feature deals with adding or storing the customer
details which includes his/her username, password, time plan etc,.
4. Get customer log information: This feature deals with retrieving the details
about the current customer after each session.
5. Display all records: This feature allows admin to keep track of the entire
customer & his/her details either on daily, monthly, yearly basis.
6. Time plan: This feature allows the client to make a choice from the time
plan offered i.e. either prepaid or post-paid.
7. Active users: This feature displays the entire logged in client & the
computers to which they are logged into.
8. Client connection: This feature establishes a connection between server
& the client.
9. Client request: This feature enables the client to make request for the
services provided by the cyber.
Hierarchical structure of modules:
v.p=valid password
r.u=request for user creation
r.b=request for billing
d.r=display records
g.t=get timeplan
a.u=active users
g.l=get customer log information
a.r=add records
r=retrieve bill details
c.b=calculate bill
g.b=generate bill
Client module:
UP is a methodology.
UML Structure:
Common mechanisms.
Architecture.
Things
Modelling elements.
Relationships
Diagrams
Common mechanisms:
Specifications.
Adornments.
Common divisions.
Extensibility mechanisms.
Architecture:
Find actors.
- Scenarios.
Actors identify who or what uses the system and so indicate where the
system boundary lies.
Identifying Actors:
Zero or more secondary actors interact with the use case in some
way.
Use cases are always written from the point of view of the actors.
More relationships :
We have studied basic use case analysis, but there are relationships
that we have still to explore:
Actor generalisation.
«Include»:
«extend» :
«extend» is a way of adding new behaviour into the base use case by
inserting behaviour from one or more extension use cases.
The base use case specifies one or more extension points in its
flow of events.
1. Admin module
2. Client module
3. Internet management
Sequence Diagram
Sequence diagrams
Communication diagrams
Timing diagrams
Interactions:
use cases.
Classes.
Interfaces.
Components.
Collaborations.
business processes.
Activities:
A decision node is a control node that has one input edge and two or
more alternate output edges.
The keyword else specifies the path that is taken if none of the
guard conditions are true.
It has two or more input edges and exactly one output edge .
Joins have two or more incoming edges and exactly one outgoing
edge
Object nodes:
If no classifier is specified, then the object node can hold any type
of instance.
Every object is an instance of one class - the class describes the "type"
of the object.
Classes allow us to model sets of objects that have the same set of
features - a class acts as a template for objects:
The class determines the structure (set of features) of all objects
of that class.
All objects of a class must have the same set of operations, must
have the same attributes, but may have different attribute values.
Classes and objects:
Objects are instances of classes.
UML defines instantiati on as, “The creation of new instances of model
elements”.
Most classes provide special operations called constructors to create
instances of that class. These operations have class-scope i.e. they
belong to the class itself rather than to objects of the class.
Finding classes:
Testing performs a very critical role for quality assurance and for
ensuring the reliability of software. Testing is done to check whether the
proposed system works as required by the client. During testing we also check
whether for the given input the expected output is obtained or not.
It also helps in the rectification of errors in the system. In this project we
perform system testing.
Modern world is computer world where the things have to be done promptly
that requires optimal resources and optimal methods. Due to this inevitable
requirement, computerisation of each and every sector in the main stream is
must, so that it can be held itself in the race.
Few eye catching features of our project are its simplicity, accuracy, and i ts
user friendly interface. Our software incorporates all the features and facilities
provided by the Visual Studio software. This project has been developed to
manage the entire working of the Cyber Café. Our software simplifies and
replaces all the manual effort and the paper works done by the owner of the
cyber to a completely electronically environment, be it bill generation or
customer creation and fulfilment of their needs and customer satisfaction.
Hence both the customer and the owner are at their ease. The customer is
serviced at his footsteps wherein he just types in the request and he is just a
click away.
We would like to convey our sincere gratitude and thanks to all, who stood as
our backbone, in designing, formatting and helping us in executin g this project
successfully.