0% found this document useful (0 votes)
10 views

Mini Project Report.pdf (1)

Uploaded by

mohdfiroz232326
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Mini Project Report.pdf (1)

Uploaded by

mohdfiroz232326
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Mini Project Report (KCS-354)

on
Cyber Cafe Management System
Submitted in partial fulfillment for award of
BACHELOR OF TECHNOLOGY
Degree
In
COMPUTER SCIENCE & ENGINEERING

2022-23
Under the Guidance of: Submitted By:
Mr. Pawan Pandey Mudit Verma (2100330100150)
(Assistant Professor) Mohd Firoz Quraishi (2100330100146)
Nikhil Kr. Mishra (2100330100157)

DEPARTMENT OF COMPUTER SCIENCE & ENGINEERING


RAJ KUMAR GOEL INSTITUTE OF TECHNOLOGY
DELHI-MEERUT ROAD, GHAZIABAD

Affiliated to Dr. A.P.J. Abdul Kalam Technical University, Lucknow


February 2023

1
SYNOPSIS
• Computers have become a way of life for today‟s high society. Many
aspects of modern life that we have come to accept as common place would
not be possible if there were no computers. Today computers are use
extensively in many areas of business, industry, science, education etc.
• The major advantage of computer is its speed that makes it able to give
some useful information very quickly. This speed also opens new
approaches to problem solving and data processing. Another feature is its
accuracy. Though the computers do only what is instructed at every instant,
these instructions are taken into account and accurate information’s are
produced.
• Computer can hold data and instruction in an electronic representation in
internal memory and this data can be retrieved at any time.
• The project entitled “Cyber Café Management System” is a software
package, which can be used in cyber cafés for managing the clients‟
computer efficiently. Now a day’s cyber terrorism, which is mainly
undergone through internet cafés, need to be tackled properly.
• Thereby, it is indeed necessary to store the valid information of the user who
comes for internet access.
• The system being used, the time at which the user logs in and logs out
should be recorded systematically.
• In this modern era, a number of people access the internet frequently by
means of cyber cafes. For such frequent users, a prepaid account shall be
maintained and discounted rates may be charged from them.
• While walkthrough users, who are less frequent, are charged a fixed rate. By
using the LAN connections in the cyber cafes, we can automate this process
very easily.
• This system comprises of the following modules:
 The Server Module
 The Client Module
1. The server module, which is handled by the administrator can create new
accounts for prepaid users and also store the details of walkthrough
customers.
• While in the client module, which is handled by users themselves, the user
should give his/her user-id and password to start browsing.
• After they are logged out, the time and amount will be automatically
generated at the server module and the bill is provided to the user.

2
TABLE OF CONTENTS

CHAPTER NO. TITLE PAGE NO.

SYNOPSIS iii
LIST OF TABLES ix
LIST OF FIGURES x

1. INTRODUCTION

1.1 INTRODUCTION 1
1.2 MODULE 5
1.3 ADVANTAGE AND DISADVANTAGE 7
1.4 STRUCTURE AND FUNCTIONING 8
1.5 SEQUENCE DIAGRAM 9
1.6 ACTIVITY DIAGRAM 10
1.7 CLASS DIAGRAM 11
1.8 TESTING 19

2. HARDWARE AND SOFTWARE REQUIREMENTS 21

2.1 HARDWARE REQUIREMENTS 25


2.2 SOFTWARE REQUIREMENTS 27
SOFTWARE REQUIREMENTS SPECIFICATION 16

3.1 SOFTWARE SPECIFICATION 23

4. DATA FLOW DIAGRAM

4.1 DIAGRAM 25

5. CONCLUSION 34

6. REFRENCES
3
4
5
List Of Symbols And Abbreviation

6
7
CHAPTER: 1

INTRODUCTION
Cyber Café Management is a complete package developed for management of
Cyber
systemsCaféinManagement
a cyber café.isThis a complete
project ispackage
intendeddeveloped
to be usedfor in management
a Cyber Café.ofAll
Cyber
systems Café
cyber cafes Management
in a cyber
havecafé. some is
Thisa complete
project
basic needs package
is intended
likeable to developed
to be used the
control for management
in a systems
Cyber Café. of
that All
are
systems
cyber
beingcafes in a have
rented cyber café.
some
to the This
basicproject
customers and isare
needs intended
likeable
charged totocontrol
be timely
on usedtheinbasis.
a Cyber
systems Café.
that are
A Cyber All
café
cyber
being cafes
rented
normally hashave thesome
tosome customers
numberbasicofand
needs
PC’sare likeable
charged
which the to control
on timelythe
customers systems
basis.
will for A that
Cyber
certain are
café
amount
being
normally rented
of time. has todays
Nowsome the number
customers
it may also and
of PC’s are to
which
require charged on timely
the customers
save some basis.
will
details forthe
of Acustomers
Cyber
certain caféfor
amount
normally
ofsecurity
time. Now has someitWhen
days
reasons. number
may also a of PC’s which
require
customer to theasome
save
enters customers caféwill
cyberdetails offor
he thecertain
has to be amount
customers
allottedfor a
ofPCtime.
securityandNow thedays
reasons. ittime
startWhen mayis aalso require
customer
noted. to save
At enters
any time some
a cyber details
café
the cyber he ofhas
thetocustomers
administrator shouldfor
be allotted abe
security
PCable reasons.
andtotheseestart When
the time
statusisof a customer
noted.
any PC, enters
At any
when time a cyber
thethe café he has
cyber administrator
customer to be
wants to do should allotted
some other bea
PC
able and
activitiesthelike
to see start
the time ais
taking
status noted.
ofprint
anyoutPC,At any
orwhen
scan time
a copy
the the cyber administrator
etc. Itwants
customer shouldtobe should
dorecorded.
some be
And
other
able to see
finally
activities all
likethe
the status
details
taking of
willany
a print outPC,
be whenato
available
or scan the customer
the
copy Cyber wants be to do
etc. It administrator.
should some
And he
recorded. other
And can
submit
activities
finally all on
thethe
like formawill
taking
details to be
generate
print out thetobill.
or scan
available a the There
copy etc.should
Cyber be be
Itadministrator.
should displays
And of
recorded.heall
And
canthe
transactions
finally
submit all
onthe taking
thedetails
form to place beinavailable
willgeneratethe café. to the
the bill. ThereCyber administrator.
should be displays Andof he
all can
the
submit on the
transactions formplace
taking to generate the bill. There should be displays of all the
in the café.
transactions taking place in the café.
Structure of the program:
Structure of the program:
Structure of the program:

This project basically contains two types of users: the server user and the client
user.
This project basically contains twoFigure types1.1 of users: the server user and the client
• The Server user is the administrator of the Server machine who has the
This
user.project basically contains two types of users: the server user and the client
user. right to monitor each and every client or customer. He will have the rights
• The Server user
to remotely loginis or
thelogout
administrator
the client ofuser.
the Server machine
He solely whothe
controls has the
Server
• The
right Server
to user
monitor
machine. is
each the
andadministrator
every client of
or the Server
customer. machine
He will who
have has
the the
rights
• right
toThe toClient
monitor
remotely login
usereach
or andcustomer
is logout
the every client
the client or
thecustomer.
for user. He solely
cyber. He Hecan
willlogin
havethe
controls tothe rights
Server
the client
to remotely
system
machine. andlogin
startorbrowsing
logout the client
only if heuser. He solely controls
is authenticated the Server
(by username and
• machine.
password)
The otherwise
Client user the Adminfor
is the customer user
thecan log He
cyber. himcan
in remotely.
login to the client
• The
There can
systemClient
anduser
be startisbrowsing
multiple the customer
clients iffor
hethe
interacting
only cyber.
with Heserver,
the
is authenticated can(by
login to the client
sending
username multiple
and
requests
systemat the
password) same
andotherwisetimethe Admin
start browsing only ifuser
he iscanauthenticated (by username and
log him in remotely.
There password) otherwise
can be multiple the Admin
clients user can
interacting withlog
thehim in remotely.
server, sending multiple
There
requestscanat be
the multiple
same time clients interacting with the server, sending multiple
requests at the same time
8
TOOLS USED
Star UML
It is a UML tool by MKLab. The software was licensed under a modified
version of GNU GPL until 2014, when a rewritten version 2.0.0 was
released for beta testing under a proprietary license. After being
abandoned for some time, the project had a revival to move from Delphi
to Java/Eclipse and then stopped again.
Computer
Any pc can be used irrespective of the operating system since it’s
compatible with Mac, Windows, and other Linux divisions

Module Description:

1. Admin Module:
1.1 Connection Module
This module is supposed to open a socket connection and keep the socket in wait mode
until it receives some request from the client side. Once there is some request coming in
from the client, it should receive the data and perform appropriate functions.
1.2 User Creation and Management
This module should implement the user creation and management. The users could be
given a username and password and also, they could be given a prepaid account by which
they can browse until they finish the amount in their accounts.
• This module comprises five sub modules:
• Add records: This module deals with adding or storing the customer details which
includes his/her user name, password, time plan etc.,.
• Get customer log information: This module deals with retrieving the details about
the current customer after his each or after he completes his session.
• Display all records: This module allows the admin to view or keep track of all the
customer details either on basis of type of user, or on basis of weekly or monthly.
• Time plan: The customer here is offered two choices to make for the time plan that
is prepaid and Post-paid. The browsing charge for prepaid users will be deducted
from his/her account while the post-paid users will have to make the entire
payment by cash in accordance to his browsing time.
• Active users: This module gives the information about the logged in users and the
comp that they are logged into.

1.3 Billing
this module should produce bills depending upon the user activity and hence generate a
report comprising all the requisites, regarding the customers session. Here the post-paid
customer makes full payment, comprising charges for his browsing time as well as other
services sleeked such as items purchased, refreshments, scanning, printing etc,. While the
prepaid customer will pay for the extra services seeked other than browsing time as the due
deduction for browsing will be done through his account.
2. Client Module:
2.1Client Connection
This module will try to establish connection with the server. If the connection is successful
then he will be able to use the client system. The connection request is made on the server
that is available on the network, If the server is not running or if he is not authenticated
then he will not be able to use the client system.
2.2Client Requests
this module will allow the customer of the cybercafé to make requests for some of the
items that are predefined and will be displayed on his screen. These requests will be
shown up server screen and the admin provide the customer with the requested
services to his place.
Future scope of the project:
The aim of our project is to replace the paper works & works done

manually and to automate the existing trend in the cyber café. Be it
user creation, their management or bill generation, everything is
computerized. Since the admin job is done effortlessly and at the same
time the customer can enjoy his browsing time entirely, hence both the
user and the owner are at their ease.
• We have limited the server and the client into a single system. For
Realtime purposes we can extend the software by installing the server
components into a single system and have multiple clients by installing
the client components into many systems. Here multiple clients can
interact with the single server at the same time sending in multiple
requests simultaneously.
• Nowadays Cyber Crime has increased immensely. So in order to avoid
the risk of getting indulged in any scandals regarding cybercrime we
can implement the FINGER PRINTING Mechanisms in the cyber for
the authentication of the clients or customers of the cyber.
The acceptance of CREDIT and DEBIT CARDS for the payments can make the
software more versatile. Allowing the point of sale concept at the cyber café can be
another attractive feature of the software

Structure and functioning

• Server Connection: This feature opens a socket connection & enters wait
mode unless it receives any requests coming from the client side.
• User Creation & Management: This feature implements creation of
different kinds of users & their management.
• Add records: This feature deals with adding or storing the customer details
which includes his/her username, password, time plan etc,.
• Get customer log information: This feature deals with retrieving the details about the
current customer after each session

• Display all records: This feature allows admin to keep track of the entire customer &
his/her details either on daily, monthly, yearly basis.
• Time plan: This feature allows the client to make a choice from the time plan offered
i.e. either prepaid or post-paid.
• Active users: This feature displays the entire logged in client & the computers to
which they are logged into.
• Client connection: This feature establishes a connection between server & the client.
• Client request: This feature enables the client to make request for the services provided by
the cyber
CHAPTER:2

HARDWARE AND SOFTWARE REQUIREMENT

SYSTEM CONFIGURATION HARDWARE CONFIGURATION:


Processor - Pentium IV
Memory - 512 MB RAM
Keyboard - 105 Keys
Monitor - CRT or LCD
Mouse - USB mouse or PS/2 mouse

SOFTWARE SPECIFICATION:
Operating System: Windows XP/NT,
Front End: CORE JAVA
Back End: MY SQL

9
10
CHAPTER: 3

DATA FLOW DIAGRAM

Figure 3.1
11
CHAPTER: 4

PROJECT MODULES/DATABASE

Login: In this module a user id and password is provided to the Administrator and user, to
provide access control. The Administrator has the rights to make modifications from time to
time. The user can make use of the software but does have the rights to make modifications in
the way it performs.

Account Settings: This module is under the control of administrator. In this module the
administrator can create account for the user, edit account and delete account. The user needs to
produce some sort of identity proofs to create an account.

Cabin Settings: This module is controlled by the administrator. Here he/she can add cabins to
the system, edit cabin, and remove a cabin. The system name (host name) should be entered
without fail while adding a cabin to the system.

Tariff Settings: The administrator controls this module. Here he/she can set tariff rates for
both Account Users‟ and Walkthrough Users‟ account.

Recharge: This module is under the control of the administrator. Here recharge of accounts is
performed. User shall refill there account on paying respective amount to the administrator.

Billing: This module is controlled by the administrator. Here billing of internet usage by
various users is performed.

Reports: The administrator controls this module. Here he/she can have a look on usage reports
of a particular user, whole usage, usage in a particular machine and daily report.

View Account: This module is controlled by the administrator. Here he/she can have a look
on account details. 12
DATA FLOW DIAGRAM:
A data flow diagram or a bubble chart is a graphical tool for future analysis. DFD modules a
system by using external entities from which data flows to a process, which transforms the data
and creates output data flows which go to other process or external entities or files. Data in files
may also flow to processes as inputs.

DFD can be hierarchically organized, which can help in partitioning and analyzing large
systems. As a first step one data flow diagram can depict an entire system which gives the
system overview.

There are various symbols used in a DFD namely:


“Arrow”:
A data flow is a route, which enables packets of data to travel from one point to another. Data
may flow from a source to a processor or from a data store or process. An “Arrow Line” depicts
a flow with the arrowhead pointing in the direction of the flow.

“Process”:
A Process represents transformations where incoming data flows are changed intooutgoing data
flows.

“Data Store”:
A data store represents a repository of data that is to be stored for use by one or more processes
may be as simple as buffer or queue or sophisticated as relational database. They should have
clear names.

“A Source or Sink”:
A source or sink is a person or part of an organization, which enter or receives information from
the system, but is considered to be outside the contest of data flowmodel.

13
▪ Structure and functioning
• Server Connection: This feature opens a socket connection & enters wait mode unless it
receives any requests coming from the client side.
• User Creation & Management: This feature implements creation of different kinds of
users & their management.
• Add records: This feature deals with adding or storing the customer details which
includes his/her username, password, time plan etc,.
• Get customer log information: This feature deals with retrieving the details about the
current customer after each session
• Display all records: This feature allows admin to keep track of the entire customer &
his/her details either on daily, monthly, yearly basis.
• Time plan: This feature allows the client to make a choice from the time plan offered i.e.
either prepaid or post-paid.
• Active users: This feature displays the entire logged in client & the computers to which
they are logged into.
• Client connection: This feature establishes a connection between server & the client.
• Client request: This feature enables the client to make request for the services provided
by the cyber

: Hierarchical structure of modules:

Figure 4.1

14
First level factoring:

Figure 4.2

Factoring of admin module:

Figure 4.2

• v.p=valid password
• r.u=request for user creation
• r.b=request for billing
• d.r=display records
• g.t=get timeplan
• a.u=active users
• g.l=get customer log information
• a.r=add records
• r=retrieve bill details
• c.b=calculate bill
• g.b=generate bill

15
Client module:

Figure 4.3

• r.pr=request for Prepaid


• r.po=request for Post-paid
• c=choose package
• r.c=register client
• r.li=request for login
• r.lo=request for logout
• b=browse
• r=request for services

Use Case Diagram

Introduction of UML diagrams:

• Unified Modelling Language (UML) is a general-purpose visual


• modelling language.
• Can support all existing lifecycles.
• Intended to be supported by CASE tools
• Unifies past modelling techniques and experience.
• Incorporates current best practice in software engineering.
• UML is not a methodology!
• UML is a visual language.
• UP is a methodology
• UML Structure:
• UML building blocks.
• Common mechanisms.
• Architecture.
16
UML building blocks:

➢ Things
• Modelling elements.
➢ Relationships
• Tie things together.
➢ Diagrams
• Views showing interesting collections of things.
• Are views of the model?

Relations:

Common mechanism:
➢ UML has four common mechanisms that apply consistently throughout
the language:
• Specifications.
• Adornments.
• Common divisions.
• Extensibility mechanisms.
Architecture:

17
Figure 4.4

Use case modelling:


➢ Use case modelling is a form of requirements engineering.
➢ Use case modelling proceeds as follows:
• Find the system boundary.
• Find actors.
• Find use cases.
- Use case specification.
- Scenarios.

What are actors?

➢ An actor is anything that interacts directly with the system.


• Actors identify who or what uses the system and so indicate where the
system boundary lines.
➢ Actors are external to the system
➢ An Actor specifies a role that some external entity adopts when
interacting with the system

Identifying Actors:
When identifying actors ask:
• Who or what uses the system?
• What roles do they play in the interaction?
• Who installs the system?
• Who starts and shuts down the system?
• Who maintains the system?
• What other systems use this system?
• Who gets and provides information to the system?
• Does anything happen at a fixed time?
18
What are use cases?

➢ A use c ase is something an actor needs the system to do. It is a “case


of use” of the system by a specific actor.
➢ Use cases are always started by an actor.
• The primary actor triggers the use case.
• Zero or more secondary actors interact with the use case in some
way.
➢ Use cases are always written from the point of view of the actors.

More relationships:

➢ We have studied basic use case analysis, but there are relationships
that we have still to explore:
• Actor generalization.
• Use case generalization.
• «Include» – between use cases.
• «extend» – between use cases.
«Include»:

➢ The client use case executes until the point of inclusion:


include (SupplierUseCase)
• Control passes to the supplier use case which executes.
• When the supplier is finished, control passes back to the client
use case which finishes execution.

«extend»:

➢ «extend» is a way of adding new behavior into the base use case by
inserting behavior from one or more extension use cases.
• The base use case specifies one or more extension points in its
flow of events.
➢ The extension use case may contain several insertion segments.

Implementation of cyber cafe management system in Use case


diagram.
1. Admin module
2. Client module
3. Internet management

19
Figure 4.5

20
Sequence Diagram

➢ Sequence diagrams

• Emphasize time-ordered sequence of message sends.


• Show interactions arranged in a time sequence.
• Are the richest and most expressive interaction diagram.
• Does not show object relationships explicitly - these can be
inferred from message sends.

➢ Communication diagrams

• Emphasize the structural relationships between lifelines.


• Use communication diagrams to make object relationships
explicit.
➢ Interaction overview diagrams

• Show how complex behavior is realized by a set of simpler


interactions.
➢ Timing diagrams

• Emphasize the real-time aspects of an interaction.

Interactions:

➢ Interactions are units of behavior of a context classifier


.
➢ In use case realization, the context classifier is a use case.
• The interaction shows how the behavior specified by the use
case is realized by instances of analysis classes.

➢ Interaction diagrams capture an interaction as:


• Lifelines – participants in the interaction.
• Messages – communications between lifelines.

➢ Lifelines have:
• Name - the name used to refer to the lifeline in the interaction.
21
• Selector - a Boolean condition that selects a specific instance.
• Type - the classifier that the lifeline represents an instance of.
Messages: A message represents a communication between two lifelines.

Figure 4.6

Implementation of the SEQUENCE diagram

Figure 4.7

22
Customer module:

Figure 4.8

23
Activity Diagram
• Activity diagrams are "OO flowcharts"!
• They allow us to model a process as a collection of nodes and edges
• between those nodes.
• Use activity diagrams to model the behavior of:
• use cases.
• Classes.
• Interfaces.
• Components.
• Collaborations.
• operations and methods.
• business processes.

Activities:
➢ Activities are networks of nodes connected by edges.
➢ There are three categories of node:
• Action nodes - represent discrete units of work that are atomic
within the activity.
• Control nodes - control the flow through the activity.
• Object nodes - represent the flow of objects around the activity.
➢ Edges represent flow through the activity.
➢ There are two categories of edge:
• Control flows - represent the flow of control through the activity.
• Object flows - represent the flow of objects through the activity.
Control nodes:

Decision and merge nodes:

➢ A decision node is a control node that has one input edge and two or
more alternate output edges.
• Each edge out of the decision is protected by a guard condition.
• guard conditions must be mutually exclusive.
• The edge can be taken if and only if the guard condition
evaluates to true.
• The keyword else specifies the path that is taken if none of the
guard conditions are true.
24
A merge node accepts one of several alternate flows.
• It has two or more input edges and exactly one output edge.
Fork and join nodes:

➢ Forks nodes model concurrent flows of work.


• Tokens on the single input edge are replicated at the multiple
output edges.
➢ Join nodes synchronize two or more concurrent flows
• Joins have two or more incoming edges and exactly one outgoing
edge
• A token is offered on the outgoing edge when there are tokens on
all the incoming edges i.e., when the concurrent flows of work
have all finished
Object nodes:

• Object nodes indicate that instances of a particular classifier may be


• available.
• f no classifier is specified, then the object node can hold any type
o of instance.
• Multiple tokens can reside in an object node at the same time. The upper
bound defines the maximum number of tokens (infinity
o is the default).
• Tokens are presented to the single output edge according to an
• ordering:
• FIFO – first in, first out (the default).
• LIFO – last in, first out.
• Modeller defined – a selection criterion is specified for the object
node.

Implementation of cyber cafe management system in Activity


diagram

• Login module
• Admin module
• Client module
• Settings module (session data, personal data etc.)

25
CHAPTER: 5

PROJECT SNAPSHOTS

26
CHAPTER: 6
LIMITATIONS

PRIVACY
The biggest concern for most PC users is privacy. Wi-Fi hotspots in most public
areas are unsecured, which means that others could potentially access
information on your computer. If you forget to log out of a public computer
terminal, someone could access your email or other sensitive accounts. On a
physical level, the person next to you in an Internet cafe can easily look over
your shoulder. Internet cafes or public terminals are not ideal for sensitive or
work-related information.

PERFORMANCE
Internet cafes geared toward gaming have high-performance computers. Most
PC games have much higher requirements than the average personal
computer. If you play the game at an Internet cafe, you will enjoy the game at
its full optimization without the burdensome cost of buying a special gaming PC.
The Internet speed at gaming cafes is also much faster than the average home
Internet speed, which reduces lag and timeouts from interrupted Internet
connections.

COST
The cost of Internet at cyber cafes is relatively low and varies between countries.
Most places charge hourly, though some offer a one-time purchase fee. If you
are travelling, purchasing an hour at an Internet cafe to write home is
significantly cheaper than paying for a monthly satellite fee. As Wi-Fi grows in
abundance, more businesses are offering free Internet access to attract
customers.

COMFORT AND CONVENIENCE


Most Internet cafes are not as comfortable as your own home. The cafe could
be crowded, smoky or have uncomfortable seats, making it difficult to patronize
the cafe for hours on end. Most Internet cafes in the West are not open 24 hours,
which limits your time for work or recreation. Downloads might be restricted to
preserve bandwidth.

27
PRIVACY
The biggest concern for most PC users is privacy. Wi-Fi hotspots in most public areas are
unsecured, which means that others could potentially access information on your
computer. If you forget to log out of a public computer terminal, someone could access
your email or other sensitive accounts. On a physical level, the person next to you in an
Internet cafe can easily look over your shoulder. Internet cafes or public terminals are not
ideal for sensitive or work-related information.

PERFORMANCE
Internet cafes geared toward gaming have high-performance computers. Most PC games
have much higher requirements than the average personal computer. If you play the game
at an Internet cafe, you will enjoy the game at its full optimization without the burdensome
cost of buying a special gaming PC. The Internet speed at gaming cafes is also much faster
than the average home Internet speed, which reduces lag and timeouts from interrupted
Internet connections.

COST

The cost of Internet at cyber cafes is relatively low and varies between countries. Most places
charge hourly, though some offer a one-time purchase fee. If you are travelling, purchasing an
hour at an Internet cafe to write home is significantly cheaper than paying for a monthly satellite
fee. As Wi-Fi grows in abundance, more businesses are offering free Internet access to attract
customers.

COMFORT AND CONVENIENCE


Most Internet cafes are not as comfortable as your own home. The cafe could be crowded,
smoky or have uncomfortable seats, making it difficult to patronize the cafe for hours on
end. Most Internet cafes in the West are not open 24 hours, which limits your time for
work or recreation. Downloads might be restricted to preserve bandwidth.

28
CHAPTER: 7
FUTURE SCOPE

The system we propose has great scope in the current real time situation.

The cybercrime monitoring system can be enhanced to an extent by implementing this system.

Most of the firms and establishments are being computerized in order to ease the tasks to be
performed.

The internet cafés unfortunately are rarely computerized.

We aim through this venture, a better reliable solution.


In the primary stage of feasibility study itself we received an exquisite response and so we plan

to go ahead with our project

29
CONCLUSION:

As a conclusion, our group has gained experience and knowledge in designing the
network and satisfied with the suggestion of new upgraded network design for the
Wijaya cyber café.

This project also helps us to increase our knowledge and understanding on how to
implement a new network design. Other than that, we also learnt ways to design a new
and better network.

This project also shows us the problems that can occur in a network and how to
overcome it. To be good in design a network or become an officer in network company
are highly knowledgeable on network and we are really wanted to work in networking
field in the future.

We hope this project could give a good start for us to begin pursuit a career in network
analysis and design knowledge.

StarUML has many powerful features


and is certainly more than a "simple" diagramming tool.
With its support of MDA (Model Driven Architecture),

it is more aimed at people using UML in an intensive way and with some code
generations objectives than for simply drawing diagrams to document requirements.

However, using StarUML just as a diagramming tool work fine, especially on Windows
as the tool is built with Delphi and might execute faster than the Java-based tools.
Modern world is computer world where the things have to be done promptly
that requires optimal resources and optimal methods.

Due to this inevitable requirement, computerization of each and every sector in the main
stream is must, so that it can be held itself in the race.

Few eye-catching features of our project are its simplicity, accuracy, and i its
user friendly interface.
Our software incorporates all the features and facilities
provided by the Visual Studio software.
This project has been developed to manage the entire working of the Cyber Café.

Our software simplifies and replaces all the manual effort and the paper works done by
the owner of the cyber to a completely electronically environment, be it bill generation or
customer creation and fulfilment of their needs and customer satisfaction.

Hence both the customer and the owner are at their ease. The customer is
serviced at his footsteps wherein he just types in the request and he is just a
click away. We would like to convey our sincere gratitude and thanks to all, who stood
as our backbone, in designing, formatting and helping us in executing this project

30
REFRENCES:

1. An Integrated approach to Software Engineering, Pankaj Jalote


2. The Complete Reference C, Herbert Schildt
3. Software Engineering A practitioner’s approach, Roger S. Pressman
4. Advanced Computer Architecture: Parallelism, Scalability, Programmability, Hwang, Kai
5. Business Applications of Computers, Oka, M. M. 10th ed Everest
6. Business Applications Of Computers, Oka, M. M. 7th rev ed Everest
7. Computer Applications In Management, Dahiya, U/ Nagpal, S. Taxman Allied Service
8.Computer Applications with C & C++: With Programs & Numerical
Problems, Abhyankar, A. K. C- Aditi
9. Computer Data-base Organization, Martin, James’s 2nd ed PHI
10.Computer Fundamentals: Architecture & Organization
Ram, B. 4th ed New Ag

31
32

You might also like