Documente Academic
Documente Profesional
Documente Cultură
140283107027
140283107029
140283107030
L. D. College of Engineering
Department of Computer Engineering
CERTIFICATE
Date: 04/04/2016
This is to certify that the dissertation entitled Cyber Caf Management System
has been carried out by Rathod Bhoomika(140283107027) , Shaikh Amreen
(140283107029) , Solanki Unnati (140283107030) under my guidance in fulfillment of the
degree of Bachelor of Engineering in Computer Engineering (6th Semester) of L.D. College
of Engineering affiliated with Gujarat Technological University, Ahmadabad during the
academic year 2016.
Guide:
Prof. V.B.Vaghela
CE Department
Prof. D A Parikh
Head of the Department
Acknowledgement
Here we gladly present the project on Cyber Cafe Management System as part of
the 6th Semester B.E. in computer Engineering. At this time of submitting this
report we use this opportunity to mention those people who with us along the work.
I would like to thank my supervisor, Mr. V.B.Vaghela sir for his guidance and
comments on various aspects of this project and for thoughtful contribution in my
effort.
Other known and unknown persons who helped me in my work also deserve
Thanks for their co-operation. Last but not the least; I am very thankful to my
friends for providing me a valuable assistance during my work.
TABLE OF CONTENTS
1. Introduction....6
1.1
1.2
1.3
1.4
Purpose..6
Document Convention.6
Intended Audience and Reading Suggestion...6
Project Scope..7
2. Overall Description.......8
2.1 Product Perspective8
2.2 Product Features.8
2.3 User classes and Characteristics...9
2.4 Operating Environment..9
2.5 Design Constraints.9
2.6 User Documentation..10
2.7 Assumptions and Dependencies..10
3.
Functional Requirements.......11
4.
5.
6.
Preliminary Schedule21
7.
Operational Scenario.21
8.
Diagram......26
9.
Testing.................................................................................................27
10 Preliminary schedule...........................................................................32
11. Preliminary Budget.33
12. Cost Estimation..34
13. References ..35
Appendix A: Glossary37
1. Introduction
1.1 Purpose of Requirements document
This software requirements specification (SRS) specifies the requirements of the
cyber caf management system which will be used in college internet laboratories
or internet cafes. This document will be used for the clients to ensure all
specifications and requirements and conductive as mentioned by the software
engineer to design the system.
1.2 Document conventions
Main section titles
Font: Times new roman face: bold Size: 14
Sub section titles
Font: Times new roman face: bold Size: 12
Other text explanations
Font: Times new roman face: bold Size:12
1.3 Intended audience and reading suggestions
Clients: The user of the system will get a clear idea of a software and hardware
requirements to be engaged.
Lab technicians: They will be in a position to attain the various features that are
enabled in the software there by including new definitions for a security
Developers: project developers have a advantage of quickly understanding the
methodology enabled and personalizing the product.
Students: The project shows an infinite path in the field of security in the internet
labs. There is a always perspective of development.
The authors would suggest clients to go through the requirement section
thoroughly before installing the software. The lab technicians are expected to have
a certain knowledge in the terms used and hence can go for the security issues
2. Overall Descriptions
2.1 Product perspective
The client will be given internet access only by the knowledge of the
server. When a client is accessing internet the server will be tracking the user name
and account details of the user logged in.
There is option also for the user to view the account details of the user.
2.2 Product function
Client system
Windows 2000
prof/Linux
Pentium 4,1.2GHz
40GB
256MB
Server system
Linux
Pentium 4,2GHz
100GB
512MB
10
3. System Features
3.1 Authentication
3.1.1 Descriptions and priority
The system offers access to internet at client level and access to server
resources at server level only by validating the user with the unique username and
password.
3.1.2 Stimulus/response sequences
The stimulus/response for the different classes of users are:
1. Users: login
2. Administrator: Adding new accounts, giving account status,
getting & sending reports.
3.1.3 Functional requirements
All system should have the client for program running. The server
Should identify individual systems by their names.
R1 Registration
Description: This function registers the newly arrived customer. The user provides
all the personal details like contact, email, id, address etc. to the system. It stores
details in database & generates error message if error is already registered.
R 1.1: Select new registration option
Input: Select Personal Details option.
Output: User prompted to enter personal details.
11
R2 Login
Description: Username & password is provided to the system. If valid, this
function allows user to access the internet otherwise error message is displayed.
Forget password facility is also provided for the user.
R 2.1: Enter username and password
Input: Enter username and password option.
Output: User prompted to enter username and password.
Processing: The user logins successfully if username and password are valid
otherwise error message is displayed.
12
13
R5 Website Blocking
Description: Website blocking feature enables you to prevent Users from
surfing unwanted websites in your Cafe. These websites typically have adult or
objectionable content or are banned under government rules. Using this feature
you can block a complete website and avoid potential legal problems. It also
helps maintain a clean environment in your Cafe, in which all types of Users are
comfortable surfing.
14
R7 Membership package
Description: Membership Packages provide an easy solution to charge regular
Cafe Users, who like to pay in advance or buy bulk surfing time. These
packages can be created in advance and be sold to regular Users. It enables you
to reward your regular Users with a discounted price.
15
R8 Bandwidth Monitor
Description: It gives you the option to set download limits for each User
Session. You can set an alert to inform Cafe Users, whenever the download
limit is exceeded. You can Monitor Bandwidth consumed in your cafe. You
can block websites that download more data, ensuring fair share of bandwidth
consumption.
R9 Accounting System
Description: This function provides an easy way to manage your daily cash
transactions. It maintains an invoice for each cash transaction. This data is
reflected in extensive Financial Reports.
16
R10 Reports
Description: It provides a useful set of reports which will help a cafe to analyze
and optimize their cafe business. Reports provide information on Financial
Accounts, User Activity, Products & Services, Printers & Terminal usage.
17
18
19
20
6. PRELIMINARY SCHEDULE:
The system has to be implemented within 6 months.
7. OPERATIONAL SCENARIO:
This system consist of student database, staff database, servers, various complain
databases etc.
The major actors in this system are:General users: They will be position to permit access to the users in the internet
and acknowledge their account status.
Administrators: They are the core users able to add the new users to the system
and permit them to access the internet resources. They can also view in real time
what a user performing right now. They can also get the overall report of the user
sessions.
Employees: They login at the client level and this is to get access to the internet at
the client level. They can also view their account status in the client system.
Scenario:
Initial Situation:
A registered customer logins using User-ID and password and surfs.
Normal flow of events:
In Cyber Cafe Management System, initially the customer visits the caf. If he
is not registeres, then he must provide login credentials along with proof and
registered himself. He will then create a password on specified terminal using
ID provided by employee.
21
22
Registration
Provide details ID
proofs
Registration
Customer
Employee
Login
Web Blocking
Customer
Admin
Net usage
Employee
Printing and
Scanning
23
Payment
Net Usage
Website Accessed
Employee
Customer
Payment
Report
Payment history
Collection report
Admin
Employee
Terminal usage
Web Tracking
Printing report
24
login
customer
provideed details
& Id proofs
Admin
Assign terminal
and gives userid
surfing and
printing
website blocking
payment
Report
25
employee
8. Diagrams
8.1 Class Diagram:
26
27
9. Testing
Various testing strategies for conventional software are :1. Unit Testing :In this type of testing techniques are applied to detect the errors from each
software component individually .
2. Integration testing :It focuses on issues associated with the verification and program construction
as components begin interacting with one another.
3. Validation testing :It provides assurance that the software validation criteria (established during
requirement analysis) meets all functional , behavioral and performance
requirements .
4. System testing :In system testing all system elements forming the system is tested as a whole.
28
Test
case
Id
Test case
Name
Login
Test case
Description
Test steps
In this case
user will try
to login in the
system in
order to use
the use the
system
functionality.
Website
In this test
Blocking
case ,Admin
and tracking Can block or
track the
website.
In this step,
the user will
enter user
name and
password and
then click on
the login
button.
In this step ,
the user can
not block
websites.
Bandwidth
Monitor
Accounting
29
It gives you
the option to
set download
limits for
terminals.
Maintains an
invoice for
each cash
transaction.
Test
case
Test
Defect
status case
severity
(pass/ priority
fail)
Pass
1
Pass
User cannot
use internet
exceeding
usage limit.
pass
Valid
payment.
Pass
30
Accounting Module:
Input conditions :- (Invoice No,Customer_Id,Cust_Name,
Items, Quantity)
Test values :- 1.(001,C01,Unnati,Pen-drive,2)
2.(xyz,-1,-456,1,-1)
31
10 . Preliminary Schedule
32
Deadline
12-20 days
3week
2 months
3 week
-
33
Expenses(Rs.)
85,000
2,00,000
90,000
50,000
1,00,000
Once this data has been collected, a complexity rating is associated with each
count according to Table
Measurement parameter
Count
Weighting factor
10
8
5
20
15
40
32
30
200
150
UFP=452
34
F1
F2
F3
F4
F5
F6
F7
F8
F9
F10
F11
F12
F13
F14
Total
Component
Reliable back-up and
recovery
Data communication
Distributed functions
Performance
Heavily used
configuration
Online data entry
Operational ease
Online update
Complex interface
Complex processing
Reusability
Installation ease
Multiple sites
Facilitate change
35
Rate
5
3
3
3
2
5
4
3
1
3
1
3
3
1
40
36
13. REFERENCES:
Websites:
http://www.linuxlinks.com
http://www.tldp.org
http://www.reallylinux.com
Appendix A: Glossary
Terms
Definitions
User
Admin/administrator
HMS
Rector
Stakeholder
37