Documente Academic
Documente Profesional
Documente Cultură
SMARTX WEB
SREELAKSHMI.K.S
Smartx web
SREELAKSHMI.K.S
Smartx web
wrong then the user gets automatically logged out. Once the correct Access Code is entered the user can access the device he wants. Logout: The user can sign out of the login area any time using this function. The System architecture has to be designed keeping all these functions in mind. We can see that the system consists of mainly the following three parts: (i) Server: It is a part of Internet, which is a host or website. It consists of the user login and
locating the Home PC for the corresponding users. (ii) Home PC: Home PC is the PC, which can be controlled by the developed software. It is the PC,
which will be controlled using a remote user. It may a PC located at home or office, which will be part of Internet. (iii) Remote PC: It is the PC in the Internet from which user access the devices on the home PC. It
is a dynamic one.
AIM:
A project for system control, device control, file and information transfer, and scanning of remote system using a website.
Hardware Requirements:
Processor Speed Base Memory : : : Pentium III or above. 1.4 GHz. 128MB RAM.
SREELAKSHMI.K.S
Smartx web
: : :
Server System. Internet Connection. Home PC Devices like printer, mike, and webcam. Machine Details. Hardware for device controlling circuit IC DM74LS244 ,C LM7805 ,Relay, Transformer, Transistors, Capacitor, Diodes, Resistors, Circuit board.
Software Requirements:
Platform Development tool Web server Database Front end Programming language : : : : : : Windows Visual studio 2008 IIS(Internet information service) MS SQL Server ASP.NET C#
Smart Xweb
SREELAKSHMI.K.S
Smartx web
Level 1 View user Retrieve userdetails Retrieve Delete user userid option1 User Managemen t User is admin User Enter user details Downloading Managing homepc Software download Uploading Downloading System Managemen t Download client software HomePC User Registratio n option2 option3 Set Password User_reg Store user
Change passwor d
SREELAKSHMI.K.S
Smartx web
Level 2 Perform Authentication User Authenticatio n ID, password Failure Success Verify user User_reg
User
Option 1 store new password User_reg Change passwor d option 1 Brows e Select Directory Listing Director y option 2
Home
option3
R retrieve files
SREELAKSHMI.K.S
Smartx web
A option 6 option 5 option 4 Device Management Web cam Fetch stream video Proces s listing Turn off HomePC
Fetch files
View image Remotepc Retrieve desktop retrieve files Homepc retrieve image retrieve process
SREELAKSHMI.K.S
Smartx web
Class Diagram
String getURL(String) String get Command(String) String cmdExecution(String) String RMI Update(String)
SREELAKSHMI.K.S
Smartx web
Boolean isDeviceConnected( ) Boolean isFTP( ) String getDeviceName() File[] listRoot() Void storeCommand()
* * * FILE INPUT STREAM Fetch Directory COMMAND EXECUTION String directory String Read Device config( ) boolean isDeviceConnected (String) int checkDeviceStatus (String) Boolean commandExecutio n(String)
FILE OUTPUT STREAM FileOutputStream fos Void write (byte[]) Void close( );
SREELAKSHMI.K.S
Smartx web
Basic modules The software is mainly divided into two modules Administrator module User module
Administrator module Initiator is powerful user who can perform the following functions: User module Login into the server by entering the user name and password. Once he logged into the system, he can access files and external devices (webcam, printer) from HomePC. System Management After logging in, the user can perform many functions on his home PC through the remote PC. In system Management we can connect one system to another system and can control that system through this system. System Management includes various functions: Browsing File upload Command Execution Process Management Desktop viewing Device Management Turn Off HomePC Browsing In Browsing user can view any directories in his HomePC.The user has the option to delete, update, rename his files. view users Delete users
10
SREELAKSHMI.K.S
Smartx web
File Upload In file transfer the clients can transfer files to RemotePC. It also prints the message for successful completion. The user is authenticated for his login name and password, which was provided to him during the registration process. If the user fails to give his proper login id or password, an error message is displayed to him indicating that the login id does not exist. Command Execution Command execution means we can execute commands remotely. For example if we type command cmd then it will be executed in that remote system. Process Management We can control the process of that system. We can manage the processes running on that system. For example we can kill a process running on that system. It is also possible to spawn a new process in that system. We can also list all the processes running on the system. Desktop Viewing In this we can view the desktop of the remote system. It displays the screen of another computer (via Internet or network) on your own screen. Device Management Device controlling means we can control the devices connected to the system, for example we can use the mouse and keyboard. Also we can use other devices connected to that computer like webcam. User Interface Design Input Design Input design is the process of converting user originated inputs to a computer based format. Input data are collected and organized into a group of similar data. Inaccurate input data is the most common cause of data processing errors. Effective input design minimizes errors made by data entry operators. The goal of designing input data is to make entry as easy, logical and free from errors as possible. In addition to the original form considerations such as collecting only required data, grouping similar or related data, input design requires consideration of the needs of the data entry operator
11
SREELAKSHMI.K.S
Smartx web
The first thing to be noted in the input design is the type of data and the medium through which data can be entered into the system. All data are entered through the keyboard. The user is also allowed to use the mouse to select different options. Different errors that may occur while entering data, like non-numeric data in a numeric field, are controlled in the input design. Output Design:Computer output is the important and direct source of information to the user. Efficient, intelligible output design should improve the systems relationships with the user and helps in decision making. They also provide a permanent hard copy of these results for later consultation. Output design is the process that involves designing necessary inputs that are to be given to the users according to their requirements. The first step in output design is to determine what information is to be presented to the user. Here the output data is the various reports generated. The second step is to decide whether to display or print the output. In the system provisions is given to display, print or store the output on the disk. As a final step the data are arranged in an accessible format. The arrangement of information on display or printed document is termed as layout.
12
SREELAKSHMI.K.S
Smartx web
In this module we upload the file to a specified location in the server. We has an upload interface which gets the source location and sent to the destination. 3. Download Module In this module we specify the source location in the server and the specified location to save that file in the client side. 4.2 Data Design:4.2.1Schema Design:The database may be defined as an organized collection of related information. The organized information serves as a base from which further recognizing can be retrieved desired information or processing the data. The most important aspect of building an application system is the design of tables. In our present project the database consists of following table. The table structure shown below: The database consists of 1 table.
Table 1:user_reg Primary key:userid Fieldname Fname Lname Address Userid Pass Email Passwordhint Ans Type varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) varchar(50) Null Key
Primary key
4.2.2Data Integrity and Constraints:In this project the data security, data validation checking methods are applied using a password authentication. All the data, which is entered by the user and the administrator, will be validated. Users should enter their user name and password for the requesting access. Only the administrator can add, delete or modify the users. This single point control ensures better security.
13
SREELAKSHMI.K.S
Smartx web
Procedural Design Procedural design mainly concentrates on procedures in the project. The pseudo code =helps to identify each task of each procedure
Operational structure
Administrator module Initiator is powerful user who can perform the following functions: view users Delete users
Only administrator can add, delete or modify the users. User module Login into the server by entering the user name and password. Once he logged into the system, he can access files and external devices (webcam, printer) from HomePC. The user is authenticated for his login name and password, which was provided to him during the registration process. If the user fails to give his proper login id and password, an error message is displayed to him Indicating that the login id doesnot exist. User Authentication Module A user is allowed to enter the system if and only if the administrator allows him to do so. After the administrator allows him to enter the system he has to undergo his own validation where he has to enter his own Username and Password Which are sent as encrypted text to the server where his validation is done. If valid he may access the features of our application. Upload Module In this module we upload the file to a specified location in the server. We has an upload interface which gets the source location and sent to the destination. Download Module
14
SREELAKSHMI.K.S
Smartx web
In this module we specify the source location in the server and the specified location to save that file in the client side.
System Testing
Testing is the process of executing a program with the intent of finding errors. Testing is a destructive process. The money invested in the development of tests pays off if enough errors are found which would have been more costly if they would have been detected much later. Tests allow proofing the presence of faults but not the correctness of a program. Examining a program to see if it does not do what it is supposed to do is only half of the battle. The other half is seeing whether the program does what it is not supposed to do. Avoid throw away test cases unless the program is truly a throw-away program. Do not plan a testing effort under the tacit assumption that no errors will be found. The probability of the existence of more errors in a section of a program is proportional to the number of errors already found in that section. System testing is actually a series of different tests whose primary purpose is to fully exercise the computer based system. Although each test has a different purpose, all work to verify that all system elements have been properly integrated and perform allocated functions. The test case design methods applied are White box testing Black box testing Black box testing It is a testing with out knowledge of the internal workings of the item being tested. For example, when black box testing is applied to software engineering, the tester would only know the legal inputs and what the expected outputs should be, but not how the program actually arrives at those outputs. It is because of this that black box testing can be considered testing with respect to the specifications, no other knowledge of the program is necessary. White box testing It is a performed based on the knowledge of how the system is implemented. White box testing includes analyzing data flow, control flow, information flow, coding practices, and exception and error handling within the system, to test the intended and unintended software behaviour. White box testing can be performed to validate whether code implementation follows intended design, to validate implemented security functionality, and to uncover exploitable vulnerabilities.
15
SREELAKSHMI.K.S
Smartx web
White box testing requires access to the source code. Though white box testing can be performed any time in the life cycle after the code is developed, it is a good practice to perform white box testing during the unit testing phase. White box testing requires knowing what makes software secure or insecure.The first step in white box testing is to comprehend and analyze source code, so knowing what makes software secure is a fundamental requirement. Second, to create tests that exploit software, a tester must think like an attacker. Third, to perform testing effectively, testers need to know the different tools and techniques available for white box testing. The three requirements do not work in isolation, but together. Testing Methodologies The following are the testing methodologies: Unit testing Integration testing User acceptance testing Output testing Validation testing
Report generation
Remote PC Management through web, Smart X Web is developed for clients to get ready and easy means of access to devices. The site is mainly developed for a user to make use of online registration. A better Graphical User Interface for both Client Side and Server side is managed. Remote PC Management through web, Smart X Web is very useful in the modern world, where the number of users is growing by leaps and bound. The advantages of this system are: Software to be run in only one PC Works with dynamic IP address Remote device access. Easy and secure File Transfers. User Friendly Easy Signup
16
SREELAKSHMI.K.S
Smartx web
17
SREELAKSHMI.K.S
Smartx web
18
SREELAKSHMI.K.S