Cybernetics Protector
Cybernetics Protector
Project Report
On
Cybernetics Protector
(Submitted in partial fulfillment of the requirement for the Award of Degree )
Bachelor of Engineering
(Computer Sc. & Engg.)
CERTIFICATE
Certified that this project report
“Cybernetics Protector is the bonafide work of
by Admin who carried out the project work under my supervision,
towards partial fulfillment of the requirements of the Degree of
Bachelor of Engineering in Computer Science & Engineering .
ACKNOWLEDGEMENT
At the end of all the hard work, one senses a feeling of satisfaction and
relief. We would never have experienced this feeling without the help
and support from many people, and it is our duty to express our sincere
gratitude towards them.
Declaration
We hereby declare that the work presented in the project report titled “Cybernetics
Protector” submitted to the Deptt. Of Computer Sc. & Engg or the partial
fulfillment of the requirement for the award of Degree of “Bachelor of Engineering
in Computer Sc. & Engg.” is our authentic record of work carried out during the
final semester under the supervision of, Lecturer, Deptt. Of Computer Sc. & Engg.,
The matter embodied in this project report has not been submitted elsewhere by
anybody for the award of any degree or diploma.
ABSTRACT
This is intended to be a customized solution for the firms that don’t want to go for
packaged products and for the firms limited by the cost factor.
On an average, the small size firms handle the internal activities using standard tools
available in the market. Also a lot of internal activities are manually maintained which
further involve a lot of paperwork. A need for a central system comes up when many
times the problems such as communication gap between two functions or non
availability of the required information in the hour of need surface very frequently.
The frequent repetition of such problems hampers the smooth functioning of the
activities.
Additionally, things get more complicated when the firm grows its operations or
processes or increases in size. Hence the availability of customizable tool would help
the firms in handling the activities and in the smooth running of the business
functions.
Cybernetics Protector
Contents
_____________________________________________________________________
Certificate
Acknowledgement
Declaration
Abstract
1. INTRODUCTION
1.2 Objective
1.3 Features
2. SYSTEM ANALYSIS
3.3 J2EE
4.3 ER-Diagram
7.2 Limitations
7.3 Conclusion
7. REFERENCES
CHAPTER1:
INTRODUCTION
INTRODUCTION
Cybernetics Protector basically an interaction among
system and view the uploaded cases and reports .There are 24*7
other very easly. Citizen can also apply for job to agent.Citizen
1.3 FEATURES
Module Description
Agent
Minister
Assign Case
View Job
Chief
Citizen
CHAPTER 2:
SYSTEM ANALYSIS
SYSTEM ANALYSIS
Things are expected to get even more critical since the company’s growing
numbers of clients and related requirements have been projected to demand a
massive number of employees in the coming future from the past and the
today’s date. Such events and projections have forced a strong need for
modification in the current way of handling activities. It is better to implement
the latest of it rather than to go through the pain of updating the system over
and over again. Also the solution would be developed by in-house
developers. Their time have to be managed with their other client dependent
schedules.
With the help of banking application it will lead to decrease in cost of opening
and maintaining offices which will be more than the cost of developing and
maintaining the Application.
CHAPTER 3:
SOFTWARE
REQUIREMENT
SPECIFICATION
RAM : 256 MB
HARD DISK : 40 GB
MONITOR : SVGA Monitor (800 * 600RESOLUTIONS)
CLOCK SPEED : 266 MHz
FLOPPYDRIVE : 1.44 MB
Scalability
The ability to run on a single pc chip with a single user up to a multi-
user, microprocessor and network installation.
The Windows GUI
The familiar graphical user interfaces it presents to the world.
J2EE ARCHITECTURE
JAVA CODE
Intermediate compilation
JAVA BYTE
CODE
Runtime VM interpretation
Application clients
Clients are generally stand alone applications written in java. They run within a
virtual machine and can use the J2EE services to access components located within
another tier.
Web Components
They are server side components generally used to provide the presentation
layer to be returned to a client. 2 types of web components exist : Java Server
Pages (JSPs) and Java
Servlets.
There are two ways to achieving dynamic content generation. They are,
Java servlets fall into the first category, while Java server pages belong to typically
comprise of
Unlike a plain HTML page, which contains static content that always remain
the same, a jsp page can change its content based on any number of variable items,
including the identify of the user, the users browser type, information provided by the
user, and selections made by the user.
A jsp page contains standard markup language element such as HTML tags,
just like a regular web page. A jsp element that allow the server to insert dynamic
content in the page. jsp elements can be used for a wide variety of purposes, such as
retrieving user preferences.jsp pages share the “Write Once, Run anywhere”
characteristics of Java technology. Jsp technology is a key component in the java2
platform, enterprise Edition, Sun’s highly scalable architecture for enterprise
applications.
Jsp can use the full capability of JAVA components such as JDBC, RMI,
CORBA, JMS and JNDI.Java Server Pages are built on top of Java servlets and are
designed to increase the efficiency in which programmers and even non-programmers
can create web content. The main advantages of using JSP are
JSP pages can be used in the combination with servlets that handle the
business logic, the modal supported by Java servlet template engines.
Java Server Page Process:
It is true that both servlets and JSP pages have many features in common and
can be used for serving up dynamic web content.naturally,this may cause some
confusion as to when to opt for one of the technologies over the other. Java Server
Pages provide a much cleaner separation of presentation from logic, and are simpler
to write. Together, JSP technology and servlets provide an attractive alternative to
other types of dynamic web scripting/programming that offers platform independence,
enhanced performance, separation of logic from display, ease of administration,
extensibility into the enterprise and most importantly, ease of use.
Server Components
Server components can be in form of EJBs (Enterprise Java beans). EJB’s
executes within a container that manages the runtime behavior of EJBs.
Java uses the beans specification to allow the creation of software components
that can be used by other developers and designers to build specialist applications.
Java’s cross platform nature means that the same Java bean should be reusable across
any machine. This really frees us from dependence on any particular platform
SERVER SPECIFICATION
Every application needs an application server that provides a runtime
environment for them. We also needed an application server for the successful
working of our application. One reason for using J2EE as a web development tool is
that various application servers support it. Hence, we have a choice to select servers
such as BEA Weblogic,ATG dynamic and IBM Web Sphere. Among all these, our
choice was BEA WebLogic.WebLogic is an industry-leading product that gives
maximum choice and flexibility in building robust inspection tool applications that
extend from web to the enterprise. It is high performance Java application server,
which incorporates the most comprehensive implementation of the Java 2 Enterprise
Edition (J2EE) standards.
WebLogic server provides the foundation for the rapid development of web
applications and the performance and reliability required for mission-critical
inspection tool sites. the reasons for choosing WebLogic in our application are,
All BEA WebLogic services are also accessible via CORBA IIOP and
TCP/sockets. Management BEA WebLogic provides centralized management for a
potentially large distributed configuration of clients and servers through a ingle
cohesive view of the overall system. Zero Administration Client (ZAC)
3.5 My Sql
A query language for RDBMS based on. Non –procedure approach to retrieve
SQL was proposed by IBM and got its standardization by ANSI and adopted by
BY [<FIELD>]
[HAVING<CONDITION>]
VALUES(VALUES1, VALUES2,VALUES3);
DDL:- Primary used to create tables/indexes etc.
);
Identified by <password>
In a summarized way it could be concluded that SQL becomes the query engine that
resides over the database engine having been designed on the client-server Approach
Project Category
RDBMS [Relational Database Management System]
A Relational Data Model was invented by Dr. E. F. Codd and is based on the simple
parts:
Introduction To MySql
Define a database
a tool to build structure and performs tasks, in mysql data is stored and displayed
table comprises of rows and columns. Table can also show relationship between
entities. The formal name of table is relation, hence the name Relational Database
Management System.
consists of a set of English words like Select, Create etc. The standard set of SQL
Data definition language (DLL) commands which are for creating and altering
Open Source
Fault tolerance
Ease of administration
SQL compatibility
About SQL
consists of a set of English words like Select, Create etc. The standard set of SQL
Data definition language (DLL) commands which are for creating and altering
Platform used: -
RDBMS: - MySql
Windows XP Professional
Purposes programming and other are Supporting Language for Internal Programming.
MySql
Since, we are following an Object oriented Design technique, the next step
towards the development is to identify the classes and their relationships. A class is a
description of an object type. Instances of classes are known as Objects. UML also
provides tools for designing the system. Class diagrams enable us to establish
relationship among various classes of the system. Before proceeding on to develop
class diagrams, the next step is to identify the potential classes in the system.some of
the basic tips in identifying the classes are:
By following these simple rules during the initial process of analyzing, several
classes get formulated. These classes are referred to as candidate classes and they
represent the possible classes in a given system. It is not essential to incorporate all
the identified candidate classes; some of them may also be dropped and are called
Unfit candidate classes.
A class icon is a rectangle with three sections in it. Horizontal lines across the
rectangle divide the sections. The first section is where the class name is mentioned.
In the second section the attributes or data members of the class and in the third
section the methods or functions of the class are mentioned. A class diagram thus
takes the form
With the help of DFD, we designed the class diagram of our system, which
looks like the following. The cardinality among the relationship is also mentioned.
The Data flow diagram can be explained as the separate levels indicating the
individual complexity in the each level of the system and gives a detailed explanation
in the further levels that are following them.
LEVEL 0
Initially in the first level of the Data flow the level 0 explains the basic outline
of the system. The end-user sends the packets to the system to determine the source
and destination address. The diagram marked as the 0 represents the complete Packet
watching system which simply represents the basic operation that is being performed
by it in the initial level.
LEVEL 1
The level 1 of the Data flow diagram given explains in detail about the Packet
watching system which was marked as 0 in the previous level. In this level the end-
user who passes the request for the system enters into the first process, the capturing
process and then to the processing module. After processing the packets it was send
for storing.
LEVEL 2
The level 2 provides the clear explanation about the whole system. In this
level first we have to select the packet and perform test over that selected packets.
Then identify the end address of the packet and send that packet for processing. After
processing the packet it was send to the identity content. Then send the processed
packet for storing and display the source and destination addresses.
O-LEVEL DFD
Login Chief
Minister
Agent Citizen
1-Lelvel
Agent
Update Profile
Online
Chatting
Citizen
View Report
List Reply Faq
Create New Chief
Assign Case
Chief
Update Profile
ENTITY RELATIONSHIP DIAGRAM
New OnlineCha
Citizen t
Faq
passwor
d
userid
View
Case
Agent
Invalid message No
havin Profile
Yes 1:M
g
My
Profile
Chief Cybernetics Protector
1:1
Citizen
Agent
Minister
Online
Chat
View Assign
Report Case
My
Create Faq
Profile
Chief
Apply Job
Table Structrue…
Screen Shoot
Home
About Us
Contact Us
Dyanemic Map
Minister Login Page
Citizen List
View Job
Assign Case
Chief Login Page
New Agent
Agent Login
Online Chatting
View Case Details
Online Job
Faq
CHAPTER 5:
SYSTEM TESTING
AND
IMPLEMENTATION
SYSTEM TESTING AND IMPLEMENTATION
The testing and implementation they are important and final phases. All the
process that has been done is just a trail or by assumption. All the required hardware
& software is prepared for the testing so that some errors or some modifications may
be required for further proceeding.
Testing is vital to the success of the system. System testing makes a logical
assumption that if all parts of the system are correct. The goal will be successfully
achieved. There are four steps with in, they are,
Unit Testing
Integration Testing
Validation testing
Output Testing
In this testing, the smaller part of the project is tested first that is modules and
the sub functions present in the project. It seems to be working satisfactorily with out
the errors and that shows the unit testing is successful.
The integration testing is a part that the software makes all functions behaviors
and process required. The errors which are uncovered are integrated testing, are
corrected during this phase. The collection of the functions are tested and found with
errors are rectified .So that the result can be easily obtained in a successful manner.
The validation part is very much essential for each every application projects so that
each data can be validated in a good manner. In some cases the records are created
according to the key of the corresponding table to which it has been referenced for data
constraint for good secured database. While testing the system by using test data errors are
again uncovered and corrected by using above testing steps and corrections are also noted
for future use. If there is any error then it is allowed for testing from the beginning.
The output is major required part of the development of the project. The output is
tested for required format, if it does not acquire such format then the testing is done or any
screen modification is alone for the further operations. The output testing is mainly for the
two things they are,
On screen format
Print format
In the implementation phase, the project reached its fruition. After the
development phase of the SDLC is complete, the system is implemented. The
software, which was designed in design and programmed in development phase of the
SDLC, was installed on all the PCs that require it. The persona’s using the program
was trained during this phase of the SDLC. Moreover, both the hardware and software
are tested. Although we found and fixed many problems, almost invariably, the user’s
helped us to uncover problems that we were unable to simulate.
These were the main activities performed by us in the course of the project,
which lead to its proper completion.
It requires less man power to keep the record and to update it time to time
quickly.
Insertion and deletion of a particular field or any name in the any position
except the last one is very typical in traditional office management but very
easy in this case.
Useful for collecting the record worldwide through the net and hence useful
for multinational companies
7.2 LIMITATION
7.3 CONCLUSION
There was a lot of fun in making this project. This project was very useful to
us as it provided us the inside view of the planning and implementation of the data
base. In this project we had to think about the various options which we can provide
to user. The implementation was not easy as we had to look into the minute details in
order to achieve my goals. We have tried to make this project user friendly and also
interactive by providing many features.
We are satisfied by achieving the goals for which we had planned. A lot of
experimental work can be done with this project. Looking forward for any advice
which can help us to improve the project.
CHAPTER 8:
REFERENCES
REFERENCES
www.en.wikipedia.org
www.google.com
www.howstuffworks.com
www.roseindia.net
www.w3cschools.com
Various books referred to for Java, HTML, XML & DHTML clarification and
documentation are as follows: