Beruflich Dokumente
Kultur Dokumente
ABSTRACT
In a typical LAN managed by a system administrator there are some common problems faced
on day to day basis. These problems fall under two main categories.
One is to track the systems hardware and software configuration, allocation of system
resources to the user. Other is maintenance of complaint register, to track, identify and report
status on complaints received by users on system, LAN and other entities within the network.
The biggest challenge faced would be allocation of resource to a user. Consider a simple
college scenario where students need to be allotted systems for their practical work.
The general tendency would be to create a machine allocation chart which is nothing but a
schedule of student to a system. Since there allocations happen manually; its time
consuming.
Due to pressure and negligence there may be instances where these chart are not updated
which can lead to unhealthy arguments and baseless decision.
PROBLEM ANALYSIS
1. INTRODUCTION
Scope
The automated system provides facilities for student to access the slot allocation system services
to book the system and get a confirmation. Once the system is booked the machine allocation
chart will be updated and the system will be reserved for the user for a particular duration and
date. At any given point of time we can analyze the machine allocation chart to find out the
availability of the systems in the lab.
Overview
Overall description consists of background of the entire specific requirement. It also gives
explanation about actor and function which is used. It gives explanation about architecture
diagram and it also gives what we are assumed and dependencies. It also support specific
requirement and also it support functional requirement, supplementary requirement other than
actor which is used. It also gives index and appendices. It also gives explanation about any doubt
and queries.
2. ANALYSIS
2.1 EXISTING SYSTEM
Current system was analyzed to identify the potential drawbacks. The analysis was carried out in
an environment where systems were booked manually. The current system posed several
challenges with respect to entering the slots in the register, maintaining the allocation of slots.
When the number of students increased it became extremely difficult to maintain the registers as
they were more prone to manual data entry errors. To make the scene more worse, there are
situations where one slot is booked for more than one user which in turn can lead confusion.
The Booking of the Slots is per hour basis. So if the user has to book the slots for
continuous two hours then he/she has to book twice each time booking 1hour.
A Centralized view of the processes, resources and the services is being maintained
which may lead to single point failure.
The system works well only if the necessary LAN connection is set up.
Each problem need not have a single well defined solution. There may be infinite number of
solutions pertaining to a single problem. To overcome the first problem of Allocation of System
Resources and Booking of Slots, the two proposed solutions are:
Online Booking:
The automated system provides facilities for student to access the slot allocation system
services to book the system and get a confirmation. Once the system is booked the machine
allocation chart will be updated and the system will be reserved for the user for a particular
duration and date. At any given point of time we can analyze the machine allocation chart to find
out the availability of the systems in the lab. To overcome the second problem of Allocation of
System Resources and Booking of Slots, the two proposed solutions are:
Surveillance Module:
The surveillance module in the slot allocation system traces such irregularities and illegal
accessing from users. A restriction can be imposed immediately so that such activities do not
repeat in the near future. The module retrieves the ID, configuration of the client and kills the
process. If the illegal accessing still prevails then remote shut down of the system takes place
based on the IP address of the system.
SOFTWARE
REQUIREMENT
SPECIFICATION
SOFTWARE SPECIFICATIONS
DESIGN
3. DESIGN
A graphical tool used to describe and analyze the moment of data through a system
manual or automated including the process, stores of data, and delays in the system. Data Flow
Diagrams are the central tool and the basis from which other components are developed. The
transformation of data from input to output, through processes, may be described logically and
independently of the physical components associated with the system. The DFD is also know as
a data flow graph or a bubble chart.
DFDs are the model of the proposed system. They clearly should show the requirements on
which the new system should be built. Later during design activity this is taken as the basis for
drawing the system’s structure charts. The Basic Notation used to create a DFD’s are as follows:
2. Process: People, procedures, or devices that use or produce (Transform) Data. The physical
component is not identified.
4. Data Store: Here data are stored or referenced by a process in the System.
LEVEL 0
The Admin, Faculty, Student can perform the actions like they can login and they can check the
slots , holidays, complaints, time table, change password and the can logout at the end. All the
process is done each and every process is stored in the database.
ADMIN LEVEL 1:
In the level 1 the admin can login and he can perform the actions like, he can add a slot, insert
time table, view time table, delete time table, add holidays, delete holidays, view holidays, he
can also add the faculty, view faculty and delete the faculty who are already registered and also
view the students who has registered and also how many student has booked the slot.
STUDENT LEVEL 1:
The student should login with an id and a password and then the student book the slot for a
particular day and he can also view the slots and can check how many slots are booked the
student can also delete the slot with a provided booking id. The student can also change the
password and can view the holidays also. If the student has any problem with the system he can
also give a complaint and the student can also check the service message sent from the admin.
FACULTY LEVEL 1:
The faculty has to login with the id and password and then the faculty can view the time table,
view the holidays, change the password and the logout.
4. IMPLEMENTATION
1. Admin Module
Admin has higher privileges. He can do all the activities. He can add, modify, delete, view
all the activities. He can add event details.
2. Student Module
Student Allocate slot, view, delete, view holidays during the slot booking the slot details
also in the admin.
3. Faculty Module
c. Change password
SAMPLE CODE
5. SAMPLE CODE
ADMIN LOGIN
package com.dts.aoc.action;
import java.io.IOException;
import java.io.PrintWriter;
import java.util.HashMap;
import javax.servlet.RequestDispatcher;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import com.dts.dae.dao.SecurityDAO;
public class AdminLogin extends HttpServlet {
public void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.setContentType("text/html");
PrintWriter out = response.getWriter();
HttpSession session = request.getSession();
String fid = request.getParameter("txt1");
String pass = request.getParameter("txt2");
String path = "login.jsp";
HashMap hm = new SecurityDAO().checkAdminlogin(fid, pass);
if(!hm.isEmpty()){
String sname=(String)hm.get(1);
if (sname.equals("")) {
session.setAttribute("logmsg", "Please enter Correct UserID and Password");
}
Else
{
String role=(String)hm.get(2);
if(role.equalsIgnoreCase("A")){
path = "AHome.jsp";
}
if(role.equalsIgnoreCase("F")){
path = "FHome.jsp";
}
session.setAttribute("sid", fid);
session.setAttribute("sname", sname);
session.setAttribute("oldpass", pass);
}
}else{
session.setAttribute("logmsg", "Please enter Correct UserID and Password");
}
RequestDispatcher rd = request.getRequestDispatcher(path);
rd.forward(request,response);
out.flush();
out.close();
}
public void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.setContentType("text/html");
PrintWriter out = response.getWriter();
doGet(request, response);
out.flush();
out.close();
}}
STUDENT LOGIN
package com.dts.aoc.action;
import java.io.IOException;
import java.io.PrintWriter;
import javax.servlet.RequestDispatcher;
import javax.servlet.ServletException;
import javax.servlet.http.HttpServlet;
import javax.servlet.http.HttpServletRequest;
import javax.servlet.http.HttpServletResponse;
import javax.servlet.http.HttpSession;
import com.dts.dae.dao.SecurityDAO;
import com.dts.dae.dto.RegistrationBean;
public class SLogin extends HttpServlet {
public void doGet(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
HttpSession session = request.getSession();
response.setContentType("text/html");
PrintWriter out = response.getWriter();
String sid = request.getParameter("txt1");
String pass = request.getParameter("txt2");
String path = "slogin.jsp";
String sname = new SecurityDAO().loginCheck(sid, pass);
if (sname.equals("")) {
session.setAttribute("logmsg", "Please enter Correct Student ID and Password ");
}else{
path = "SHome.jsp";
session.setAttribute("sid", sid);
session.setAttribute("sname", sname);
session.setAttribute("op",pass);
}
RequestDispatcher rd = request.getRequestDispatcher(path);
rd.forward(request,response);
out.flush();
out.close();
}
public void doPost(HttpServletRequest request, HttpServletResponse response)
throws ServletException, IOException {
response.setContentType("text/html");
PrintWriter out = response.getWriter();
doGet(request, response);
out.flush();
out.close();
}}
JSP CODE
<%@ page language="java" import="java.util.*" pageEncoding="ISO-8859-1"%>
</a> </li> </ul> </li> <li class="top"> <a href="#" id="services" class="top_link"><span
class="down">Time Table </span> </a> <ul class="sub">
src="Scripts/Common/global.js">
src="Scripts/Common/common.js"> </script>
src="Scripts/Individual/DMSHome.js">
<tr> <td class="content"> <div class="barCenter" style="padding: 15px 15px 15px 15px;">
</td> </tr> <tr> <td> Date </td> <td> <input type="text" name="eventdate" value=""
readonly="readonly" />
<a href="javascript:show_calendar('document.event1.eventdate',
document.event1.eventdate.value);">
<img src="images/cal.gif" alt="a" width="18" height="18" border="0" /> </a> </td> </tr> <tr>
<td> Lab Number </td> <td> <select name="ln" id="ln">
-labnumber-
Lab1 </OPTION>
<OPTION value="Lab2">
Lab2 </OPTION>
<OPTION value="Lab3">
Lab3 </OPTION>
System Number
-SystemNo-
01 </OPTION>
<OPTION value="02">
02 </OPTION>
<OPTION value="03">
03 </OPTION>
<OPTION value="04">
04 </OPTION>
<OPTION value="05">
05 </OPTION>
<OPTION value="06">
06 </OPTION>
Lab Timing
-labtimeing-
9AM to 11AM
11AM to 1PM
2PM to 4PM
</td> </tr> </table> </form> </div> </div> </td> </tr> </table> </div> </div> </center> </div>
</td> <td class="shadowR"> <img src="Images/spacer.gif" alt="1" width="5" height="5" />
<img src="Images/spacer.gif" alt="1" width="5" height="5" /> </td> </tr> </table> </div>
SCREEN SHOTS
26. SCREENSHOTS:
HOME PAGE:
STUDENT
ADMIN:
FACULTY
TESTING
7.TESTING
OVERVIEW OF TESTING
PURPOSE
Testing Methodologies:
Black box Testing: is the testing process in which tester can perform testing on an
application without having any internal structural knowledge of application. Usually Test
Engineers are involved in the black box testing.
White box Testing: is the testing process in which tester can perform testing on an
application with having internal structural knowledge. Usually The Developers are
involved in white box testing.
Gray Box Testing: is the process in which the combination of black box and white box
tonics’ are used.
Smoke Testing: is the process of initial testing in which tester looks for the
availability of all the functionality of the application in order to perform detailed
testing on them. (Main check is for available forms)
Sanity Testing: is a type of testing that is conducted on an application initially to
check for the proper behavior of an application that is to check all the functionality are
available before the detailed testing is conducted by on them.
Regression Testing: is one of the best and important testing. Regression testing is the
process in which the functionality, which is already tested before, is once again tested
whenever some new change is added in order to check whether the existing
functionality remains same.
Re-Testing: is the process in which testing is performed on some functionality which
is already tested before to make sure that the defects are reproducible and to rule out
the environments issues if at all any defects are there.
Static Testing: is the testing, which is performed on an application when it is not been
executed. ex: GUI, Document Testing
Dynamic Testing: is the testing which is performed on an application when it is being
executed. ex: Functional testing.
Alpha Testing: it is a type of user acceptance testing, which is conducted on an
application when it is just before released to the customer.
Beta-Testing: it is a type of UAT that is conducted on an application when it is
released to the customer, when deployed in to the real time environment and being
accessed by the real time users.
Monkey Testing: is the process in which abnormal operations, beyond capacity
operations are done on the application to check the stability of it in spite of the users
abnormal behavior.
Compatibility testing: it is the testing process in which usually the products are
tested on the environments with different combinations of databases (application
servers, browsers…etc) In order to check how far the product is compatible with all
these environments platform combination.
Installation Testing: it is the process of testing in which the tester try to install or try
to deploy the module into the corresponding environment by following the guidelines
produced in the deployment document and check whether the installation is successful
or not.
Adhoc Testing: Adhoc Testing is the process of testing in which unlike the formal
testing where in test case document is used, with out that test case document testing
can be done of an application, to cover that testing of the future which are not covered
in that test case document. Also it is intended to perform GUI testing which may
involve the cosmotic issues.
1 Check for the date Time The date and The date and Success
Auto Display time of the time of the
system must be system must be
displayed displayed
8. CONCLUSION
The “Computer Resources Allocation” was successfully designed and is tested for
accuracy and quality.
During this project we have accomplished all the objectives and this project meets the needs of
the organization. The developed will be used in searching, retrieving and generating information
for the concerned requests.
GOALS
As the technology emerges, it is possible to upgrade the system and can be adaptable to
desired environment.
Because it is based on object-oriented design, any further changes can be easily
adaptable.
Based on the future security issues, security can be improved using emerging
technologies.
Attendance module can be added
sub admin module can be added
10. REFERENCES: