Project Report on Lan-Chat Application in Java-MySQL



Comments



Description

A Project Report OnLAN-CHAT APPLICATION Developed At Department Of Information Technology Faculty of Technology, Dharmsinh Desai University College Road, Nadiad-387001 Developed By DHARMEN H SHAH, DD University JIMIT K SHAH, DD University Guided By Asst. Prof. S.J.Joshi Dept. of Information Technology Faculty of Technology Dharmsinh Desai University Department of Information Technology Faculty of Technology, Dharmsinh Desai University College Road, Nadiad-387001 CANDIDATE’S DECLARATION We declare that final semester report entitled “LAN -CHAT APPLICATION ” is our own work conducted under the supervision of the Asst. Prof. S.J.Joshi, Dept. of Information Technology, Faculty of Technology, Dharmsinh Desai University. We further declare that to the best of our knowledge the report for B.E. final semester does not contain part of the work which has been submitted for the award of B.E. Degree either in this or any other university without proper citation. Candidate’s Signature : Candidate’s Name: Dharmen H. Shah Branch: Information Technology Student ID: 106093 Candidate’s Signature : Candidate’s Name: Jimit K. Shah Branch: Information Technology Student ID: 106097 Submitted To: Asst. Prof. S.J.Joshi (Project Guide) Department of Information Technology, Faculty of Technology, Dharmsinh Desai University, Nadiad State: Gujarat DDU(Faculty of Tech., Dept. of IT) i DHARMSINH DESAI UNIVERSITY NADIAD-387001, GUJARAT CERTIFICATE This is to certify that the project carried out in the subject of Software Design Project entitled “LAN-CHAT APPLICATION ” and provided in this report is a bonafied report of the work carried out by Mr. Dharmen H. Shah (ID No: 106093) & Mr. Jimit K. Shah (ID No: 106097) of Department of Information Technology, semester VII, under the guidance and supervision for the award of the Degree of Bachelor of Technology at Dharmsinh Desai University, Nadiad (Gujarat). They were involved in Project training during academic year 2013-2014. Asst. Prof S.J.Joshi (Project Guide) Department of Information Technology, Faculty of Technology, Dharmsinh Desai University, Nadiad Date: Prof. R.S.Chhajed (Head of Department) Department of Information Technology, Faculty of Technology, Dharmsinh Desai University, Nadiad Date: DDU(Faculty of Tech., Dept. of IT) ii Acknowledgement It is indeed a great pleasure to express our thanks and gratitude to all those who helped us during this project. This project would have been materialized without the help from many who asked us good questions and rescued from various red tape crisis. Theoretical knowledge is of no importance if one doesn’t know the way of its implementation. We are thankful to our institute that provided us an opportunity to apply our theoretical knowledge through the project. We feel obliged in submitting this project as part of our curriculum. We would like to take the opportunity to express our humble gratitude to our guide Mrs.S.J.Joshi, Assistant Professor, Faculty of IT Department, DDU, under whom we undertook our project. Her constant guidance and willingness to share her vast knowledge made us enhance our knowledge and helped us to complete the assigned tasks to perfection. Without her effort and full support & an astonishing testing ability this project may not have succeeded. Although, there may be still many who are unacknowledged in this humble vote of thanks, there are none who remain unappreciated. With Sincere Regards, Dharmen H. Shah Jimit K. Shah DDU(Faculty of Tech., Dept. of IT) iii Contents 1.0 Introduction 1.1 Project Details. 1.2 Purpose 1.3 Scope 1.4 Objective 1.5 Technology and Literature Review 1.5.1 Why JAVA? 1.5.2 NetBeans IDE Features 1.5.3 Network Application 2.0 Project Management 2.1 Feasibility Study 2.1.1 Technical feasibility 2.1.2 Time schedule feasibility 2.1.3 Operational feasibility 2.1.4 Implementation feasibility 2.2 Project Planning 2.2.1 Project Development Approach and Justification 2.2.2 Project Plan 2.2.3 Milestones and Deliverables 2.3 Project Scheduling Project Scheduling chart 3.0 System Requirements Study 3.1 Study of Current System 3.2 Problems and Weaknesses of Current System 3.3 User Characteristics 3.4 Hardware and Software Requirements 3.5 Constraints 3.5.1 Hardware Limitations 3.5.2 Interfaces to Other Applications 3.5.3 Higher Order Language Requirements 3.5.4 Reliability Requirements 3.5.5 Safety and Security Considerations 3.5.6 Criticality of Applications 3.6 Assumptions and Dependencies 4.0 System Analysis 4.1 Requirements of New System (SRS) 4.1.1 User Requirements 4.1.2 System Requirements 4.2 Features Of New System 4.3 DFD 4.4 Use-case Diagram 4.5 Activity Diagram DDU(Faculty of Tech., Dept. of IT) 1 1 1 1 2 2 2 3 6 6 6 6 6 6 7 7 8 8 9 9 10 10 10 10 10 11 11 11 11 11 11 11 12 13 13 13 13 17 18 21 22 iv 1 Conclusions 10.1 Implementation Environment 6.2 Class Diagram 5.3 Sequence Diagrams 5.Summary of Project Work 10.6.3 Coding Standards 7 Testing 7.2.3 Testing Methods 8 User Manual 9 Limitation and Future Enhancement 10 Conclusion and Discussion 10.2 Program/Modules Specification 6.1 Testing Plan 7.5.2.2 Testing Strategy 7.. Dept.3 Bibliography 23 23 23 24 29 30 32 32 35 35 35 36 37 37 38 39 42 50 51 51 51 51 51 52 52 DDU(Faculty of Tech.3.2 Problem Encountered and Possible solutions 10.0 System Design 5.1 System Architecture Design 5. of IT) v .6 Database Design/Data Structure Design 5.2 Discussion 10.1 Self Analysis of Project Viability 10.4 Component Diagram 5.2.1 Table and Relationship 6 Implementation Planning 6.5 State Chart 5. 6 Check Files 8.2 Sequence of User Login 5.6 files DDU(Faculty of Tech.3 Milestones and deliverable Table 5.1.4 Sequence of Chat History 5.2.3.3.1.10 Forgot Password with mail sent 8.2.List of Figures: Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig Fig 2.9 Forgot Password 8.2.3.6 Sequence of Send Message 5.1.1.4 User Chatting Window with error 8.1Class Diagram 5.1.1.8 Sequence of Disconnect All 5.1.1.4 State Chart 5.8 Add Lab 8.2.1. Dept.2 DFD level 1 4.11 Registration 7 9 18 19 20 21 22 23 24 25 25 26 26 27 27 28 29 30 34 37 41 42 43 43 44 45 45 46 47 47 48 8 32 33 33 33 34 34 vi List of Tables: Table 2.1 Sequence of Admin Login 5.2.1.1..3 stu_detail Table 5.1.3.1.2.2 faculty Table 5.1 Welcome 8.1 Test plan 8.3 Sequence of Disconnect User 5.1 student Table 5.5 message Table 5.2 Login 8.3 DFD level 2 4.1.3 Component Diagram 5.3 User Chatting Window 8. of IT) .1 Gantt chart 4.1.7 Sequence of Edit Profile 5.1.1 ER Diagram 7.5 Sequence of Send Document 5.4 sem_faculty Table 5.2.2.2.5 Activity Diagram 5.5 Edit Profile 8.1 Prototyping model for the project development 2.4 Use case diagram 4.1.1 DFD level 0 4.7 Check Messages 8.1.2.2. Lan-Chat Application is a desktop based project which is provided to improve & enhance the use of the LAN. public one (message is broadcasted to all connected users) and private one (between any 2 users only) and during the last one security measures were taken. of IT) vii . which runs on the user’s Pc and server application.. mostly available in almost of the college. It is made up of 2 applications the client application. To start chatting client should get connected to server where they can practice two kinds of chatting. The idea of creating a lan-chat application was initiated and it has two dimensions. The technology has been available for years but the acceptance it was quit recent. is a method of using technology to bring people and ideas “together” despite of the geographical barriers. Such that it crosses time zones.Abstract Nowadays no one has time. one to have an experience in network programming and the other is to let people conduct meetings with others in different locations. Teleconferencing or Chatting. which runs on any Pc on the network. and reduce the paper flood. can reach many people. Our project is an example of a client-server application. Dept. DDU(Faculty of Tech. But to manage them and to manage student-faculty conversation. Now every universities like DDU has so many resources available for everyone. This project is developed mainly to reduce that efforts by making it automatically as much as possible. of IT) 1 . it takes so much efforts if done manually. 1.Introduction 1 INTRODUCTION 1.2 Purpose In Today’s world the important thing which is required is time. 1. Dept.. has to be deployed on the local server of the lan network.3 Scope: This Desktop based application would be used by any well established lan network and server which is created by us. 1. DDU(Faculty of Tech. Main aim of this application is to provide an easy way to do conversation and announce any event to all or specific user.4 Objective: Using this application user can do:    Can do Chatting Can send file User can’t register or get username by themselves admin has to provide username and password manually in order to provide authorization to user.Chat Application” is a Desktop Application that enables different type of users like Students and Faculties to do interaction with all other user and enables them to documents with this application. Which reduces the efforts.1 Project Details The project entitled “Lan . Java EE 7 including its related HTML5 enhancements. and Java succeeds at this by being platform.Introduction 1. many rich features and an extensive range of tools.5.2 NetBeans IDE Features 1. ease of use.. it has become a language of choice for providing worldwide Internet solutions.5.independent at both the source and binary levels. of IT) 2 .independent.  Java is platform. This allows you to create modular programs and reusable code. It is the first free IDE providing support for JDK 8 previews. cross-platform capabilities and security features. compile. templates and samples. The ability to run the same program on many different systems is crucial to World Wide Web software. 1. and learn than other programming languages. debug. Dept.  Java is object-oriented.2.1 Best Support for Latest Java Technologies NetBeans IDE provides first-class comprehensive support for the newest Java technologies and latest Java specification enhancements before other IDEs.5.1 Why JAVA? Java™ has significant advantages over other languages and environments that make it suitable for just about any programming task. Java was designed to be easy to use and is therefore easy to write. With its constantly improving Java Editor. NetBeans IDE sets the standard for developing with cutting edge technologies out of the box. Because of Java's robustness.5 Technology and Literature Review 1. and JavaFX 2. The advantages of Java are as follows:  Java is easy to learn. JDK 7. One of the most significant advantages of Java is its ability to move easily from one computer system to another. DDU(Faculty of Tech. 1.3. fiber optic cable. and millions of lines of code. Over the last decades LANs have become an important component of the computer workplace. digital phone lines. 1. There are many different types of communication links and new ones continue to be developed. for identifying and fixing common problems in Java code. run into methods.5. Coaxial cables. coding tips. For this to occur the machines must be connected by a transmission media. and refactoring tools.4 Write Bug Free Code The cost of buggy code increases the longer it remains unfixed. with thousands of folders and files. 1. is a daunting task. phone lines. DDU(Faculty of Tech.2. take snapshots and monitor execution as it occurs. Mercurial.2 Fast & Smart Code Editing An IDE is much more than a text editor. Dept. It also provides code templates.2. In addition. and Git integration out of the box. usually a single building. the NetBeans Debugger lets you place breakpoints in your source code.Introduction 1.. A local area network on LAN is a network of computers in close physical proximity. letting you drill down into your data quickly and easily. but can be a group of adjacent buildings. A network includes a group of computers connected by a physical link allowing data to be exchanged between them. add field watches. NetBeans provides static analysis tools.5. especially integration with the widely used FindBugs tool. The NetBeans Editor indents lines. from multiple project windows to helpful tools for setting up your applications and managing them efficiently. and infrared waves are all used as transmission media for exchange data between computers. Network Application Network application exchange data between physically separated machines. satellite beam. matches words and brackets. step through your code. while giving you versioning tools via Subversion. of IT) 3 . and highlights source code syntactically and semantically.2.5. NetBeans IDE provides different views of your data.3 Easy & Efficient Project Management Keeping a clear overview of large applications.5. Protocol Stacks Very Early in the history of computer network development the concept of separating the problem into multiple levels was adapted. In both. TCP TCP (the “Transmission Control Protocol “) has the responsibility for breaking up the message into datagrams. By using the connection. With a multilevel architecture each layer can handle a different aspect of networking and provide that functionality to the above layer.1. When a message is passed to the TCP protocol.2. there is no maximum message length. if it is too large to be sent in one peace.. the packet may travel different paths and may arrive in a different order than sent. reassembling them at the other end. The TCP message also contains a packet number and total number of packets.3. both computers can stream data between each other. Dept. which is TCP/IP protocol. The TCP packet contains the addressing information. It may seem that TCP is doing all the work. TCP reassemble the packets in the proper order and requests the retransmission of any missing or corrupted packets. the message is broken up into chunks or packets and sent one at a time to the destination address. TCP/IP is a specific implementation of a multi level network architecture. and putting things back in the right order. And in small network it is true. DDU(Faculty of Tech. 1.5. of IT) 4 .3.5.Introduction 1. we are always repeating the same sentence. TCP enables you to create and maintain a connection to a remote computer. Because of the nature of the TCP/IP protocol. resending anything that gets lost. the first and second chapter. It is now the time to dissect this sentence. With TCP. For software applications to take advantage of increasingly sophisticated and feature-rich communications technology. Therefore. Application uses a port number to communicate and the sending and receiving computers use this same port to exchange data. this means that we are writing the IP address of the remote computer we want to connect to indirectly. Etc. This address is made up of 32 bits divided into 4 four bytes. whenever in our project we run the client application and enter the host name. windows-based set of desktops communicating with back end servers of various types.5. Ftp Port 20.5. 1. DDU(Faculty of Tech. thus the IP addressing method was born. of IT) 5 . the Domain Name Service (DNS) was designed. It has the job of transforming the unique computer names (host name) into an IP address. Our application uses a constant named IP-echoport = 7. In general.3.3.). To make the job of communication easier.4.4. 21. TCP/IP is a set of protocols developed to allow cooperating computers to share resources across the network.. Sockets The world is defining itself as a largely Intel-processor.3.Introduction 1. some port numbers have been standardized. A port is a special location in the computer’s memory that exists when two computers are communicating via TCP/IP. But since the number of connected computers is too large and since it is difficult to remember all their IP addresses. ex. Service Port Till now. a system becomes necessary to give remote computers the capability to recognize other remote computers. we have seen that TCP/IP forms the backbone for communication between computers.3. Dept. (www Port 80. simply an IP address uniquely identifies any computer connected to a network.5. but do you know how these computers speak to each other? The answer is Ports. 1. Therefore. they require an Application Programming Interface (API) which provides a simple and uniform access to this technology. IP As the number of computers networked become larger. Hardware and software technology advances are pushing PC’s into the role of every where communications devices. . As this system is technically economically and operationally feasible.1.Project Management 2.2 Time Schedule Feasibility:  The project has simple working and the basic requirement can be satisfied within the allotted time period so the time development feasibility for this is satisfied 2.1. it is easy to install in all the systems wherever needed. 2. this system is operationally feasible. Hence.1 Feasibility Study: 2. These kinds of systems are becoming more common day by day for evaluation of the software engineers.1 Technical Feasibility:  Since the project is designed with Java in front end and My SQL in back end so.4 Implementation Feasibility  The project checks whether the overall functioning is reliable and feasible and the development of the project is easy going DDU(Faculty of Tech. Huge amount of data can be handled efficiently using My SQL Server as back end. this system is feasible.0 PROJECT MANAGEMENT 2. Hence this project has good technical feasibility.1.3 Operational Feasibility:  The number of users to such application is very vast and every student/faculty can use this type of application.1. easy and user-friendly to understand by almost everyone. 2. It is more efficient. of IT) 6 . Dept. DDU(Faculty of Tech. Initially if the project is found to be feasible as observed from the initial requirements. Dept.2. 2. The development commences after the approval phase. design is prepared.2. of IT) 7 .1.1 Prototyping Model for the Project Development Here we are not hosting our own application.1 Project Development Approach and Justification: Fig. Next we build a prototype from the design. The development phase is lead by testing and maintenance phase. We have made this application for our client. Prototype is reviewed and if there are any changes to be done in that case prototype is updated with a new design till we are satisfied..2 Project Planning 2.Project Management 2.  Functional Specifications  Non Functional Specifications  Use Case diagram  Class diagram  Sequence diagram  Activity diagram  State diagram  Collaboration diagram The output obtained for the required functionality after implementing and doing various types of testing  PURPOSE It gives exact understanding of the user’s requirements. Analysis on gathered requirements. Coding.2. 2. Testing. Check whether the definition is feasible or not in given deadline. Implementation and Testing It gives the required module Table 2. of IT) 8 . 5.2. 4. 3.3 Milestone s and Deliverab le s DDU(Faculty of Tech. Dept. Designing.. Requirement gathering.3 Milestones and Deliverables   Milestones are identified in order to complete the entire project in the time duration. PHASE System Requirement and Analysis DELIVERABLES Requirement Gathering and analysis. 2. Gather the definition.2.Project Management 2. 7. System Design It gives the logical structure that describes the system. Milestones are identified for every module of Lan-Chat Application.2 Project Plan: 1. 6. of IT) 9 .Project Management 2.3..3 PROJECT SCHEDULING Project Scheduling Chart: Fig 2. Dept.1 Gantt chart DDU(Faculty of Tech. 3. edit profile and download files only one time. 3.1 Hardware Requirement  OS: Windows XP/2000/vista/7/8  Hardware: 1Pc with 512MB RAM and Sufficient memory support 3. of IT) 10 . see old messages.4.4.1 Study of Current System 3. 1) Admin :  Assign Id & Password to User. Dept..2 Problems and Weakness of Current System  The current system is not that efficient. 2) User:  User should be registered.x or higher  Database: MySQL DDU(Faculty of Tech.2 Software Requirement  JRE 6.  User can send messages. The user has to have internet connection whenever he wants to access the application within college. If you can see current system in market. Also. then they would get their passwords for chatting. 3.4 Hardware and Software Requirements: 3.System Requirements Study 3.  GUI is not improved. in current systems there is no restriction over chatting (live messaging). First they have to register themselves to admin.0 SYSTEM REQUIREMENTS STUDY    Manually work done in most of software development companies. User can’t get access to resources directly.x. there is not secure way to register a user.3User Characteristics The all functionality is performed by the admin only. 5. Admin account is secure by password mechanism which are encrypted and stored to database.System Requirements Study 3. 3.6 Criticality of Applications  The application deals with the user’s personal tasks so the ta sk and respective details should be highly confidential and in proper flow.5 Safety and Security Considerations  The system provides a tight security to admin’s account. 3. 3.1 Hardware Limitations  There is no hardware limitations to the system.5. DDU(Faculty of Tech.2 Interface to Other Application  No interface with other application 3.5.5..3 Higher Order Language Requirement  Language to be used was the JAVA. of IT) 11 .4 Reliability Requirements  The application does demand much reliability and it is fully assured that the particular information about the user should be secured and flow is maintained and accessed according to the rights.5. 3.5. Dept.5 CONSTRAINTS 3. If they are not authorized then they will not be able to register their account with this application. Database transactions are secure and reliable.6 ASSUMPTIONS AND DEPENDENCIES Assumptions are described below:     User has sufficient privileges to access lan. Server is running correctly. Dependencies are described as below: This system is dependent upon that the student or faculty must be authorized by the admin. Database transactions are giving expected results.   DDU(Faculty of Tech.. So if server works correctly then only this application can run in proper way. of IT) 12 . Dept. This application depends on the server. Must require latest update regarding all stuff from admin as per work done. Server is running in the same network as in users are logged in.System Requirements Study 3. 1 Requirements of New System (SRS) 4.       DDU(Faculty of Tech.1.0 SYSTEM ANALYSIS 4. reliability. The user responsibilities are as follows:  Should know how to use the software.2 System Requirement Specification (S. It is Java-based desktop lan-application that can be accessed throughout the university. security and safety. but if that is for university then it will show to all branch. All the faculties can chat with all students and all other faculties. if any announcement related to any batch\branch is shown for that batch\branch only. but important thing is user must be aware that system works properly with full availability. All students can ask their doubt and give solutions to their respective lab faculties. of IT) 13 . File attachment can be sent via this application.R.. Dept. Students cannot chat with other students. There will be group for each batch\branch.)  The project’s aim is to provide communication between faculty and students.1.Should adhere to guidelines and prescribed standards 4.1 User Requirements User requirements include not many things.System Analysis 4.S. Server store specified data in database and allow Student/professor to log in.User must have to enter Name. Branch. Input: . R3: Creating a group by Batch & Semester wise. E-mail. Semester and create it. Input: Select student from database by given batch and semester. Post condition: . Process: Select the students from main database by given batch and semester and add to Database of group. contact number etc. Description: . if one of them is wrong then invalid & prompt again for ID & Password again. R3. Dept. if not then he/she has to register first. R3.Check Student/professor ID & Password to the database.Successfully Creation of Account.Name.Give Student/Professor ID & Password.2: Naming the group. Output: Display message that group is created.Student/professor must register. else valid user.No professor/student should be registered first. Password. DDU(Faculty of Tech. Process : .. R2: Registration:Precondition: .System Analysis Functional Requirement: R1: Login:Precondition: . Input: Select group name Output: Pop up window to that group is created. R3. Process : .1: Select or create group. E-mail and register it. of IT) 14 . Branch.Student/professor logged in & can change his/her password & able to share what he/she wants. Output: . strong Password. Input: Enter group Name. Student/Professor ID. ID. Output: .User successfully login simple-user/Admin. Output: Students are added.3: Add member to the group. Process: Make group and make database for the group. Precondition: Group can be created by Admin. Input: . R6: Conversation. R5: Account suspend by an Admin.2: Select a document.1: Select faculty/student.2: Send a message.2: Select password change. Process: Upload to server. Input: Write a message Output: Display message is sent.1: Select account setting. R7. R7: Change password. Input: Select file or document to be uploaded. Output: Display general account setting list. new password and confirming password Output: Your password is successfully changed/ Try again password doesn’t match. Process: Inactivate the data from database. Process: Matching an old password from database and match confirming password with new password. R7. R7. Output: Prompt message: Your document is successfully uploaded /posted. Input: The document which we want to post. R6. Output: Show chatting messages. of IT) 15 . Precondition: Student must pass out. Input: Old password. Output: Prompt user to enter new.. Input: Select password change link. Input: Student Id. R4. R4. Input: Select account setting.System Analysis R4: Post or Upload document. confirm and old password. DDU(Faculty of Tech. Output: Account is suspended. Process: Send a message to receiver through network and store in database.3: Change password. Dept.1: Select option for upload. R6. Input: Select faculty/student. Output: Prompt user to select a document. . Input: Select profile picture change link. R8. Input: Enter Name or ID to see profile. of IT) 16 . Dept. Output: Your profile picture is changed. Process: send initial password using mail. R9: Profile visibility. R8. Output: Profile must be shown according to its privacy.System Analysis R8: Profile picture changes. Input: New profile picture and click on upload. Process: Replacing old Profile picture by new one.1: Select new profile picture. Overall Non-Functional requirements: ID 1 2 3 4 5 6 7 8 9 10 Description Shall be able to provide a user friendly GUI Shall make use of existing software & hardware Shall run server side operations on windows server 2008 OS and IIS7 Shall run client side operations on Windows XP/7/8/Linux Shall facilitate to access records concurrently Should run as a multi user system for client side interfaces Should provide a flexible and reliable backup system Should provide a flexible recovery mechanism Should take resources as minimum as possible Should provide proper security DDU(Faculty of Tech. R10:E-mail verification. Output: Suggest user to select another picture which he/she want to change Profile picture.2: Select profile picture change. 2 FEATURES OF NEW SYSTEM  Easy to use  Reliable and accurate  Provides functionalities of sending documents and messages to faculties or students. as it sends passwords to authorized email-ids only. 4..1 DFD level 0 DDU(Faculty of Tech. view old messages.3 DFD Level 0 Fig 4.3. edit profile and basic functionalities.System Analysis 4. view received files and provide ability to download it.  User friendly GUI.  Secure. of IT) 17 . Dept. 2 DFD level 1 DDU(Faculty of Tech.3..System Analysis Level 1 Fig 4. of IT) 18 . Dept. Dept..3.System Analysis Level 2 Fig 4.3 DFD level 2 DDU(Faculty of Tech. of IT) 19 . 4 USE CASE DIAGRAM Fig 4. Dept.4 Use Case Diagram DDU(Faculty of Tech.System Analysis 4. of IT) 20 .. 5 Activity Diagram DDU(Faculty of Tech. Dept.System Analysis 4.5 ACTIVITY DIAGRAM Fig 4. of IT) 21 .. .1 Class Diagram DDU(Faculty of Tech.0 SYSTEM DESIGN 5.1. of IT) 22 .1. Dept.System Design 5.1 Class Diagram Fig 5.1 System Architecture Design 5. of IT) 23 .1.2.1 Sequence of Admin Login DDU(Faculty of Tech.1.System Design 5..2 Sequence Diagrams 1. Dept. Admin Login Fig 5. 3 Sequence of Disconnect User DDU(Faculty of Tech. Disconnect User Fig 5.System Design 2. of IT) 24 ..2 Sequence of User Login 3.2.1.2.1. Dept. User Login Fig 5. 5 Sequence of Send Document DDU(Faculty of Tech.4 Sequence of Chat History 5. See chat history Fig 5.2.. Dept. of IT) 25 . Send document Fig 5.1.2.1.System Design 4. Send message Fig 5..7 Sequence of Edit Profile DDU(Faculty of Tech. Edit Profile Fig 5. of IT) 26 . Dept.System Design 6.1.2.6 Sequence of Send Message 7.1.2. Dept.. Disconnect all Fig 5.2.1. of IT) 27 .8 Sequence of Disconnect All DDU(Faculty of Tech.System Design 8. 3 Component Diagram Admin GUI Main Application DB management Client GUI Fig 5.System Design 5. Component Diagram DDU(Faculty of Tech. Dept.1.1.1. of IT) 28 .3.. 4 State Chart Diagrams DDU(Faculty of Tech. of IT) 29 .. Dept.System Design 5.1. of IT) 30 ..1. Dept.4 State chart DDU(Faculty of Tech.System Design Fig 5. Table 5..2.2 DDU(Faculty of Tech. of IT) 31 .1.1 Database Table and Relationship Table Name: student Purpose: This table is used to store the details of students.System Design 5.1 Table Name: faculty Purpose: This table is used to store the details of faculties.1.2 DATABASE DESIGN 5. Dept. Table 5. System Design Table Name: stu_detail Purpose: The authorized email-id of students are stored in this table.1..4 DDU(Faculty of Tech. Dept. Table 5.1. of IT) 32 .3 Table Name: sem_faculty Purpose: This table is used to store the details of time tables of faculties’ labs. Table 5. 1.. Table 5.1.6 DDU(Faculty of Tech. Dept. Table 5.System Design Table Name: message Purpose: This table is used to store all the messages sent via this application.5 Table Name: files Purpose: This table is used to store all the documents sent via this application. of IT) 33 . System Design Fig 5. Dept.1 ER Diagram DDU(Faculty of Tech..2. of IT) 34 . 0 IMPLEMENTATION PLANNING 6. the drive and motivation of the guide heading the particular would really boost the implementation and ensure that the activities are completed on time and execution would be faster.. Ensure smooth functioning of the installed application.  Forgot password functionality is added.  It collects information of user (Student or Faculty) and submits it to the server database. Better GUI. With our experience of implementation at various sites of similar systems.  It generates password for users and send them to their respective emailids. Also. of IT) 35 . 2. DDU(Faculty of Tech. Registration for users  This module provides functionality for registration. Dept. This system is divided into: 1. Users can get their new password to their registered email-id.2 MODULES SPECIFICATION This project has been divided into many modules for making its implementation faster.1 IMPLEMENTATION ENVIRONMENT The implementation objectives are as follows:     The customized version with duly incorporated acceptance testing comments is installed. 6.Implementation Planning 6. Login for Users  This module having functionality of all Users (Students and Faculties) to login and start chatting. we found that the skill level on computers and processes varies on a wide range at various levels. so that users can easily use this application.  DDU(Faculty of Tech.: different functions while encountering an error condition or exception returns a proper error/exception message. of IT) 36 . should be standard. send some important messages to their whole batch or to a particular student.  All the modules above this run on this module.Implementation Planning 3.g..  Communication between above modules and server is done using TCP sockets in Java.  Through this module faculties can discuss their important topics. Error return conventions and exception handling mechanisms: the way error conditions are reported by different functions in a program and the way common exception conditions are handled. Server  It is the core part our application.  Through this module students can ask their doubts and send important documents to their respective lab faculties. Dept. se files and signing out. see old messages.3 Coding Standards  Naming conventions for global and local variables: A possible naming convention can be that global variables names always start with a capital letter and local variables names are made of small letters. 6. Chatting  This module provides the main purpose of our application. For e.  This module also provides functionality of profile editing. 4. . Testing is advantageous in several ways. 7. When defects are fixed continue from activity.1 Test Plan TESTINGG DDU(Faculty of Tech. Create Test Specifications. of IT) 37 . the record of defects found reveals the most common kinds of defects. Fix defects. Thirdly. the defects found help in the process of making the software reliable. over time. if any. UNIT TESTING M ODULE TESTING SUB-SYSTEM TESTING SYSTEM TESTING ACCEPTANCE TESTING Fig. proper design and reviewing 7. Dept. which can be used for developing appropriate preventive measures such as training. Firstly. Secondly. Conduct tests according to the Test Specifications.0 TESTING Testing is the process carried out on software to detect the differences between its behavior and the desired behavior as stipulated by the requirements specifications. even if the defects found are not corrected. and log the defects. Review Test Plans and Test Specifications.1 TESTING PLAN The testing sub-process includes the following activities in a phase dependent manner: a) b) c) d) e) f) Create Test Plans.Testing 7. testing gives an idea as to how reliable the software is. user can login User must be registred first. Login screen Fail Pass User must enter correct secure answer. Initial password for login is sent to registered email-id Now.Testing NO. 7 Attempt to login Enter user-ID User should be User should be Pass and password logged in Chatting logged in Click on Login screen Chatting screen Registered successfully 8 Edit Profile 9 See history Click on Edit Profile Click on See history Edit Profile Window Messages should be displayed 10 Check files Click on Check Received files Files should be displayed 11 Attempt to edit Fetched data Enter valid data profile removed and no data inserted and click on submit 12 Attempt to forget Enter user-ID New password password and secure should be answer. User can see old received messages User can download files only once User should enter valid data 1 Run the application Click on "Click Login screen here to continue" 2 Start the server Click on Start Server should be started 3 Run the application Click on "Click Login screen here to continue" 4 Attempt to login Enter user-ID User should be and password logged in Chatting Click on Login screen Server not ready Fail Server started Login screen Pass Pass Username or password is incorrect or Select Proper option Fail 5 Attempt to register Click on Register Please select Fail proper options and enter valid details 6 Attempt to register Enter valid.e.. successfully. ACTION INPUT EXPECTED OUTPUT OUTPUT RESULT COMMENT Server must be satrted Waiting for connections Now.registered maildetails Click id. user can send message. Registered on register successfully. Password sent to Password sent to Pass authenticated registered mail. Authenticated details should be entered. student or faculty.files. Dept. files and receive message. New user can login or register DDU(Faculty of Tech. Registered id. generated 13 Attempt to sign out Click on sign User should be out signed out successfully Edit Profile Window Message window displayed List of files is displayed Pass Pass Pass Enter valid data Pass Please enter correct answer. of IT) 38 . User can edit profile. He should select proper option i. Acceptance Testing is testing by the users to ascertain whether the system developed is a correct implementation of the Software Requirements Specification. Test cases are presented such that possible paths of control flow through the software item are traced.3 TESTING METHODS 7. without knowledge of its internal structure or behavior. In white-box testing knowledge of internal structure and logic is exploited. Testing is carried out in such a hierarchical manner to ensure that each component is correct and the assembly/combination of components is correct. Instrumentation techniques can be used to determine the structural system coverage in white box testing. 7. are presented as test cases. a) Unit Testing. interface with each other as desired. fit together and whether the interfaces between the programs are correct. b) Integration Testing Unit Testing tests a unit of code (module or program) after coding of that unit is completed. We have performed both Unit Testing and System Testing to detect and fix errors.1 Black-box and White-box Testing In black-box testing a software item is viewed as a black box. DDU(Faculty of Tech. Integration Testing tests whether the various programs that make up a system..2 TESTING STRATEGY The development process repeats this testing sub-process a number of times for the following phases. Merely testing a whole system at the end would most likely throw up errors in components that would be very costly to trace and fix. based on the specifications (and possible sequences of input conditions). For this purpose tools or compilers that can insert test probes into the programs can be used. Possible input conditions. Dept.Testing 7. The disadvantages are that exhaustive path testing is infeasible and the logic might not conform to specification. Hence more defects than black-box testing are likely to be found. System Testing ensures that the system meets its stated design specifications.3. of IT) 39 . of IT) 40 .2 Code Coverage The way to make sure that you have got all the control flow covered is to cover all the paths in the program during the testing (via white-box testing). The coverage via Path Testing includes the coverage via Statement Testing. A simpler version is Statement Testing which determines if each statement in the program has been executed at least once.Testing 7. Path testing includes branch testing as it considers all possible combination of individual branch conditions. This implies that both branches are exercised for an ‘if’ statement. Additionally it includes coverage of switch statement cases. the loop is taken once or multiple times as well as ignored for a while statement. all branches are exercised for a case statement. and all components of complicated logical expressions are exercised. exception handlers and interrupts handlers. DDU(Faculty of Tech. Branch Testing reports whether entire Boolean expression tested in control structures evaluated to both true and false. Dept.3.. This is called Path Testing. DDU(Faculty of Tech. By clicking on “Click Here”. of IT) 41 .User Manual 8. Dept.. user will navigate to login. this screen will be displayed.1 Welcome   When user will run the application.0 USER MANUAL Figure 8. 2 Login   User can do login or register through this window. of IT) 42 . Dept..User Manual Figure 8. User has to enter his ID and Password. DDU(Faculty of Tech. 4 User Chatting Window with error DDU(Faculty of Tech.. Dept. of IT) 43 .3 User Chatting Window  User can send messages and documents. Fig 8. see old messages and files. edit profile and sign out.User Manual Figure 8. Dept.User Manual Fig 8. DDU(Faculty of Tech.. of IT) 44 .5 Edit Profile  User can edit profile. User Manual Fig 8. DDU(Faculty of Tech.. of IT) 45 .7 Check Messages  User can see their history and download files only once. Dept.6 Check Files Fig 8. User Manual Fig 8. Dept. DDU(Faculty of Tech..8 Add Lab  Faculties can add lab to their schedule. of IT) 46 . User Manual Fig 8. of IT) 47 .10 Forgot password with mail sent  If user forgets his password.. Dept.9 Forgot password Fig 8. DDU(Faculty of Tech. new password will be sent to his mail-ID. DDU(Faculty of Tech. Dept. of IT) 48 .11 Registration  User will be registered and password will be sent to his mail-id..User Manual Fig 8. 1 Future Enhancement     Some more inbuilt functionality can be added to make project more robust User authorization can be done by using other ways GUI can be improved Functions with database can be made more easy and efficient DDU(Faculty of Tech.Limitations 9. it should has authorization provided by admin. At various places some alterations with the prototypes and functionalities would be done in order to work out the cost constraints and to cope with the scheduling constraints.0 LIMITATIONS The part of the system can be implemented using the current technology although some modifications had to be done at various places. 9..   User cannot register itself to do it. Dept. Application may take time to run on server because SQL data source has been used. of IT) 49 . Dept.2. 10. We experienced that developing this software helped enhance our technical skills of programming.2. doesn’t matter software project or any other project. DDU(Faculty of Tech. could not be the result of sole effort. 10.    The problem to maintain priorities The problem to maintaining and accessing the database The problem for using sockets in Java. So then it is a challenge to further develop it in to a well flagged software as it was challenge to develop upto this very stage.1 Self Analysis of Project Viabilities According to us.2 DISCUSSION 10.Bibliography 10. of IT) 50 .2 Problem Encountered There were many problems encountered during the design and the development phase of the project. The project is well capable to handle the given job for some particular task but not all of them. zeal to listen and help the users.1 CONCLUSION Every project work.0 CONCLUSION AND DISCUSSION 10. this projected is completed with the primary functionalities as specified earlier but then again there is lot more than this which can be done. We think that the success of any project doesn’t depend only on better software development skills but also.. microsoft.com www.com www.msdn. system analysis and design approach.com www.com www. 10.. Summary of Project Work We have completed our project work using software engineering.Bibliography 10.oracle. of IT) 51 .2.com DDU(Faculty of Tech.docs.jqueries. Dept.3.w3school.3 BIBLIOGRAPHY www.codeproject. We have done work with preplanned scheduling related with time constraints and result oriented progress in project development.
Copyright © 2024 DOKUMEN.SITE Inc.