Mini Project Report.pdf (1)
Mini Project Report.pdf (1)
on
Cyber Cafe Management System
Submitted in partial fulfillment for award of
BACHELOR OF TECHNOLOGY
Degree
In
COMPUTER SCIENCE & ENGINEERING
2022-23
Under the Guidance of: Submitted By:
Mr. Pawan Pandey Mudit Verma (2100330100150)
(Assistant Professor) Mohd Firoz Quraishi (2100330100146)
Nikhil Kr. Mishra (2100330100157)
1
SYNOPSIS
• Computers have become a way of life for today‟s high society. Many
aspects of modern life that we have come to accept as common place would
not be possible if there were no computers. Today computers are use
extensively in many areas of business, industry, science, education etc.
• The major advantage of computer is its speed that makes it able to give
some useful information very quickly. This speed also opens new
approaches to problem solving and data processing. Another feature is its
accuracy. Though the computers do only what is instructed at every instant,
these instructions are taken into account and accurate information’s are
produced.
• Computer can hold data and instruction in an electronic representation in
internal memory and this data can be retrieved at any time.
• The project entitled “Cyber Café Management System” is a software
package, which can be used in cyber cafés for managing the clients‟
computer efficiently. Now a day’s cyber terrorism, which is mainly
undergone through internet cafés, need to be tackled properly.
• Thereby, it is indeed necessary to store the valid information of the user who
comes for internet access.
• The system being used, the time at which the user logs in and logs out
should be recorded systematically.
• In this modern era, a number of people access the internet frequently by
means of cyber cafes. For such frequent users, a prepaid account shall be
maintained and discounted rates may be charged from them.
• While walkthrough users, who are less frequent, are charged a fixed rate. By
using the LAN connections in the cyber cafes, we can automate this process
very easily.
• This system comprises of the following modules:
The Server Module
The Client Module
1. The server module, which is handled by the administrator can create new
accounts for prepaid users and also store the details of walkthrough
customers.
• While in the client module, which is handled by users themselves, the user
should give his/her user-id and password to start browsing.
• After they are logged out, the time and amount will be automatically
generated at the server module and the bill is provided to the user.
2
TABLE OF CONTENTS
SYNOPSIS iii
LIST OF TABLES ix
LIST OF FIGURES x
1. INTRODUCTION
1.1 INTRODUCTION 1
1.2 MODULE 5
1.3 ADVANTAGE AND DISADVANTAGE 7
1.4 STRUCTURE AND FUNCTIONING 8
1.5 SEQUENCE DIAGRAM 9
1.6 ACTIVITY DIAGRAM 10
1.7 CLASS DIAGRAM 11
1.8 TESTING 19
4.1 DIAGRAM 25
5. CONCLUSION 34
6. REFRENCES
3
4
5
List Of Symbols And Abbreviation
6
7
CHAPTER: 1
INTRODUCTION
Cyber Café Management is a complete package developed for management of
Cyber
systemsCaféinManagement
a cyber café.isThis a complete
project ispackage
intendeddeveloped
to be usedfor in management
a Cyber Café.ofAll
Cyber
systems Café
cyber cafes Management
in a cyber
havecafé. some is
Thisa complete
project
basic needs package
is intended
likeable to developed
to be used the
control for management
in a systems
Cyber Café. of
that All
are
systems
cyber
beingcafes in a have
rented cyber café.
some
to the This
basicproject
customers and isare
needs intended
likeable
charged totocontrol
be timely
on usedtheinbasis.
a Cyber
systems Café.
that are
A Cyber All
café
cyber
being cafes
rented
normally hashave thesome
tosome customers
numberbasicofand
needs
PC’sare likeable
charged
which the to control
on timelythe
customers systems
basis.
will for A that
Cyber
certain are
café
amount
being
normally rented
of time. has todays
Nowsome the number
customers
it may also and
of PC’s are to
which
require charged on timely
the customers
save some basis.
will
details forthe
of Acustomers
Cyber
certain caféfor
amount
normally
ofsecurity
time. Now has someitWhen
days
reasons. number
may also a of PC’s which
require
customer to theasome
save
enters customers caféwill
cyberdetails offor
he thecertain
has to be amount
customers
allottedfor a
ofPCtime.
securityandNow thedays
reasons. ittime
startWhen mayis aalso require
customer
noted. to save
At enters
any time some
a cyber details
café
the cyber he ofhas
thetocustomers
administrator shouldfor
be allotted abe
security
PCable reasons.
andtotheseestart When
the time
statusisof a customer
noted.
any PC, enters
At any
when time a cyber
thethe café he has
cyber administrator
customer to be
wants to do should allotted
some other bea
PC
able and
activitiesthelike
to see start
the time ais
taking
status noted.
ofprint
anyoutPC,At any
orwhen
scan time
a copy
the the cyber administrator
etc. Itwants
customer shouldtobe should
dorecorded.
some be
And
other
able to see
finally
activities all
likethe
the status
details
taking of
willany
a print outPC,
be whenato
available
or scan the customer
the
copy Cyber wants be to do
etc. It administrator.
should some
And he
recorded. other
And can
submit
activities
finally all on
thethe
like formawill
taking
details to be
generate
print out thetobill.
or scan
available a the There
copy etc.should
Cyber be be
Itadministrator.
should displays
And of
recorded.heall
And
canthe
transactions
finally
submit all
onthe taking
thedetails
form to place beinavailable
willgeneratethe café. to the
the bill. ThereCyber administrator.
should be displays Andof he
all can
the
submit on the
transactions formplace
taking to generate the bill. There should be displays of all the
in the café.
transactions taking place in the café.
Structure of the program:
Structure of the program:
Structure of the program:
This project basically contains two types of users: the server user and the client
user.
This project basically contains twoFigure types1.1 of users: the server user and the client
• The Server user is the administrator of the Server machine who has the
This
user.project basically contains two types of users: the server user and the client
user. right to monitor each and every client or customer. He will have the rights
• The Server user
to remotely loginis or
thelogout
administrator
the client ofuser.
the Server machine
He solely whothe
controls has the
Server
• The
right Server
to user
monitor
machine. is
each the
andadministrator
every client of
or the Server
customer. machine
He will who
have has
the the
rights
• right
toThe toClient
monitor
remotely login
usereach
or andcustomer
is logout
the every client
the client or
thecustomer.
for user. He solely
cyber. He Hecan
willlogin
havethe
controls tothe rights
Server
the client
to remotely
system
machine. andlogin
startorbrowsing
logout the client
only if heuser. He solely controls
is authenticated the Server
(by username and
• machine.
password)
The otherwise
Client user the Adminfor
is the customer user
thecan log He
cyber. himcan
in remotely.
login to the client
• The
There can
systemClient
anduser
be startisbrowsing
multiple the customer
clients iffor
hethe
interacting
only cyber.
with Heserver,
the
is authenticated can(by
login to the client
sending
username multiple
and
requests
systemat the
password) same
andotherwisetimethe Admin
start browsing only ifuser
he iscanauthenticated (by username and
log him in remotely.
There password) otherwise
can be multiple the Admin
clients user can
interacting withlog
thehim in remotely.
server, sending multiple
There
requestscanat be
the multiple
same time clients interacting with the server, sending multiple
requests at the same time
8
TOOLS USED
Star UML
It is a UML tool by MKLab. The software was licensed under a modified
version of GNU GPL until 2014, when a rewritten version 2.0.0 was
released for beta testing under a proprietary license. After being
abandoned for some time, the project had a revival to move from Delphi
to Java/Eclipse and then stopped again.
Computer
Any pc can be used irrespective of the operating system since it’s
compatible with Mac, Windows, and other Linux divisions
Module Description:
1. Admin Module:
1.1 Connection Module
This module is supposed to open a socket connection and keep the socket in wait mode
until it receives some request from the client side. Once there is some request coming in
from the client, it should receive the data and perform appropriate functions.
1.2 User Creation and Management
This module should implement the user creation and management. The users could be
given a username and password and also, they could be given a prepaid account by which
they can browse until they finish the amount in their accounts.
• This module comprises five sub modules:
• Add records: This module deals with adding or storing the customer details which
includes his/her user name, password, time plan etc.,.
• Get customer log information: This module deals with retrieving the details about
the current customer after his each or after he completes his session.
• Display all records: This module allows the admin to view or keep track of all the
customer details either on basis of type of user, or on basis of weekly or monthly.
• Time plan: The customer here is offered two choices to make for the time plan that
is prepaid and Post-paid. The browsing charge for prepaid users will be deducted
from his/her account while the post-paid users will have to make the entire
payment by cash in accordance to his browsing time.
• Active users: This module gives the information about the logged in users and the
comp that they are logged into.
1.3 Billing
this module should produce bills depending upon the user activity and hence generate a
report comprising all the requisites, regarding the customers session. Here the post-paid
customer makes full payment, comprising charges for his browsing time as well as other
services sleeked such as items purchased, refreshments, scanning, printing etc,. While the
prepaid customer will pay for the extra services seeked other than browsing time as the due
deduction for browsing will be done through his account.
2. Client Module:
2.1Client Connection
This module will try to establish connection with the server. If the connection is successful
then he will be able to use the client system. The connection request is made on the server
that is available on the network, If the server is not running or if he is not authenticated
then he will not be able to use the client system.
2.2Client Requests
this module will allow the customer of the cybercafé to make requests for some of the
items that are predefined and will be displayed on his screen. These requests will be
shown up server screen and the admin provide the customer with the requested
services to his place.
Future scope of the project:
The aim of our project is to replace the paper works & works done
•
manually and to automate the existing trend in the cyber café. Be it
user creation, their management or bill generation, everything is
computerized. Since the admin job is done effortlessly and at the same
time the customer can enjoy his browsing time entirely, hence both the
user and the owner are at their ease.
• We have limited the server and the client into a single system. For
Realtime purposes we can extend the software by installing the server
components into a single system and have multiple clients by installing
the client components into many systems. Here multiple clients can
interact with the single server at the same time sending in multiple
requests simultaneously.
• Nowadays Cyber Crime has increased immensely. So in order to avoid
the risk of getting indulged in any scandals regarding cybercrime we
can implement the FINGER PRINTING Mechanisms in the cyber for
the authentication of the clients or customers of the cyber.
The acceptance of CREDIT and DEBIT CARDS for the payments can make the
software more versatile. Allowing the point of sale concept at the cyber café can be
another attractive feature of the software
• Server Connection: This feature opens a socket connection & enters wait
mode unless it receives any requests coming from the client side.
• User Creation & Management: This feature implements creation of
different kinds of users & their management.
• Add records: This feature deals with adding or storing the customer details
which includes his/her username, password, time plan etc,.
• Get customer log information: This feature deals with retrieving the details about the
current customer after each session
• Display all records: This feature allows admin to keep track of the entire customer &
his/her details either on daily, monthly, yearly basis.
• Time plan: This feature allows the client to make a choice from the time plan offered
i.e. either prepaid or post-paid.
• Active users: This feature displays the entire logged in client & the computers to
which they are logged into.
• Client connection: This feature establishes a connection between server & the client.
• Client request: This feature enables the client to make request for the services provided by
the cyber
CHAPTER:2
SOFTWARE SPECIFICATION:
Operating System: Windows XP/NT,
Front End: CORE JAVA
Back End: MY SQL
9
10
CHAPTER: 3
Figure 3.1
11
CHAPTER: 4
PROJECT MODULES/DATABASE
Login: In this module a user id and password is provided to the Administrator and user, to
provide access control. The Administrator has the rights to make modifications from time to
time. The user can make use of the software but does have the rights to make modifications in
the way it performs.
Account Settings: This module is under the control of administrator. In this module the
administrator can create account for the user, edit account and delete account. The user needs to
produce some sort of identity proofs to create an account.
Cabin Settings: This module is controlled by the administrator. Here he/she can add cabins to
the system, edit cabin, and remove a cabin. The system name (host name) should be entered
without fail while adding a cabin to the system.
Tariff Settings: The administrator controls this module. Here he/she can set tariff rates for
both Account Users‟ and Walkthrough Users‟ account.
Recharge: This module is under the control of the administrator. Here recharge of accounts is
performed. User shall refill there account on paying respective amount to the administrator.
Billing: This module is controlled by the administrator. Here billing of internet usage by
various users is performed.
Reports: The administrator controls this module. Here he/she can have a look on usage reports
of a particular user, whole usage, usage in a particular machine and daily report.
View Account: This module is controlled by the administrator. Here he/she can have a look
on account details. 12
DATA FLOW DIAGRAM:
A data flow diagram or a bubble chart is a graphical tool for future analysis. DFD modules a
system by using external entities from which data flows to a process, which transforms the data
and creates output data flows which go to other process or external entities or files. Data in files
may also flow to processes as inputs.
DFD can be hierarchically organized, which can help in partitioning and analyzing large
systems. As a first step one data flow diagram can depict an entire system which gives the
system overview.
“Process”:
A Process represents transformations where incoming data flows are changed intooutgoing data
flows.
“Data Store”:
A data store represents a repository of data that is to be stored for use by one or more processes
may be as simple as buffer or queue or sophisticated as relational database. They should have
clear names.
“A Source or Sink”:
A source or sink is a person or part of an organization, which enter or receives information from
the system, but is considered to be outside the contest of data flowmodel.
13
▪ Structure and functioning
• Server Connection: This feature opens a socket connection & enters wait mode unless it
receives any requests coming from the client side.
• User Creation & Management: This feature implements creation of different kinds of
users & their management.
• Add records: This feature deals with adding or storing the customer details which
includes his/her username, password, time plan etc,.
• Get customer log information: This feature deals with retrieving the details about the
current customer after each session
• Display all records: This feature allows admin to keep track of the entire customer &
his/her details either on daily, monthly, yearly basis.
• Time plan: This feature allows the client to make a choice from the time plan offered i.e.
either prepaid or post-paid.
• Active users: This feature displays the entire logged in client & the computers to which
they are logged into.
• Client connection: This feature establishes a connection between server & the client.
• Client request: This feature enables the client to make request for the services provided
by the cyber
Figure 4.1
14
First level factoring:
Figure 4.2
Figure 4.2
• v.p=valid password
• r.u=request for user creation
• r.b=request for billing
• d.r=display records
• g.t=get timeplan
• a.u=active users
• g.l=get customer log information
• a.r=add records
• r=retrieve bill details
• c.b=calculate bill
• g.b=generate bill
15
Client module:
Figure 4.3
➢ Things
• Modelling elements.
➢ Relationships
• Tie things together.
➢ Diagrams
• Views showing interesting collections of things.
• Are views of the model?
Relations:
Common mechanism:
➢ UML has four common mechanisms that apply consistently throughout
the language:
• Specifications.
• Adornments.
• Common divisions.
• Extensibility mechanisms.
Architecture:
17
Figure 4.4
Identifying Actors:
When identifying actors ask:
• Who or what uses the system?
• What roles do they play in the interaction?
• Who installs the system?
• Who starts and shuts down the system?
• Who maintains the system?
• What other systems use this system?
• Who gets and provides information to the system?
• Does anything happen at a fixed time?
18
What are use cases?
More relationships:
➢ We have studied basic use case analysis, but there are relationships
that we have still to explore:
• Actor generalization.
• Use case generalization.
• «Include» – between use cases.
• «extend» – between use cases.
«Include»:
«extend»:
➢ «extend» is a way of adding new behavior into the base use case by
inserting behavior from one or more extension use cases.
• The base use case specifies one or more extension points in its
flow of events.
➢ The extension use case may contain several insertion segments.
19
Figure 4.5
20
Sequence Diagram
➢ Sequence diagrams
➢ Communication diagrams
Interactions:
➢ Lifelines have:
• Name - the name used to refer to the lifeline in the interaction.
21
• Selector - a Boolean condition that selects a specific instance.
• Type - the classifier that the lifeline represents an instance of.
Messages: A message represents a communication between two lifelines.
Figure 4.6
Figure 4.7
22
Customer module:
Figure 4.8
23
Activity Diagram
• Activity diagrams are "OO flowcharts"!
• They allow us to model a process as a collection of nodes and edges
• between those nodes.
• Use activity diagrams to model the behavior of:
• use cases.
• Classes.
• Interfaces.
• Components.
• Collaborations.
• operations and methods.
• business processes.
Activities:
➢ Activities are networks of nodes connected by edges.
➢ There are three categories of node:
• Action nodes - represent discrete units of work that are atomic
within the activity.
• Control nodes - control the flow through the activity.
• Object nodes - represent the flow of objects around the activity.
➢ Edges represent flow through the activity.
➢ There are two categories of edge:
• Control flows - represent the flow of control through the activity.
• Object flows - represent the flow of objects through the activity.
Control nodes:
➢ A decision node is a control node that has one input edge and two or
more alternate output edges.
• Each edge out of the decision is protected by a guard condition.
• guard conditions must be mutually exclusive.
• The edge can be taken if and only if the guard condition
evaluates to true.
• The keyword else specifies the path that is taken if none of the
guard conditions are true.
24
A merge node accepts one of several alternate flows.
• It has two or more input edges and exactly one output edge.
Fork and join nodes:
• Login module
• Admin module
• Client module
• Settings module (session data, personal data etc.)
25
CHAPTER: 5
PROJECT SNAPSHOTS
26
CHAPTER: 6
LIMITATIONS
PRIVACY
The biggest concern for most PC users is privacy. Wi-Fi hotspots in most public
areas are unsecured, which means that others could potentially access
information on your computer. If you forget to log out of a public computer
terminal, someone could access your email or other sensitive accounts. On a
physical level, the person next to you in an Internet cafe can easily look over
your shoulder. Internet cafes or public terminals are not ideal for sensitive or
work-related information.
PERFORMANCE
Internet cafes geared toward gaming have high-performance computers. Most
PC games have much higher requirements than the average personal
computer. If you play the game at an Internet cafe, you will enjoy the game at
its full optimization without the burdensome cost of buying a special gaming PC.
The Internet speed at gaming cafes is also much faster than the average home
Internet speed, which reduces lag and timeouts from interrupted Internet
connections.
COST
The cost of Internet at cyber cafes is relatively low and varies between countries.
Most places charge hourly, though some offer a one-time purchase fee. If you
are travelling, purchasing an hour at an Internet cafe to write home is
significantly cheaper than paying for a monthly satellite fee. As Wi-Fi grows in
abundance, more businesses are offering free Internet access to attract
customers.
27
PRIVACY
The biggest concern for most PC users is privacy. Wi-Fi hotspots in most public areas are
unsecured, which means that others could potentially access information on your
computer. If you forget to log out of a public computer terminal, someone could access
your email or other sensitive accounts. On a physical level, the person next to you in an
Internet cafe can easily look over your shoulder. Internet cafes or public terminals are not
ideal for sensitive or work-related information.
PERFORMANCE
Internet cafes geared toward gaming have high-performance computers. Most PC games
have much higher requirements than the average personal computer. If you play the game
at an Internet cafe, you will enjoy the game at its full optimization without the burdensome
cost of buying a special gaming PC. The Internet speed at gaming cafes is also much faster
than the average home Internet speed, which reduces lag and timeouts from interrupted
Internet connections.
COST
The cost of Internet at cyber cafes is relatively low and varies between countries. Most places
charge hourly, though some offer a one-time purchase fee. If you are travelling, purchasing an
hour at an Internet cafe to write home is significantly cheaper than paying for a monthly satellite
fee. As Wi-Fi grows in abundance, more businesses are offering free Internet access to attract
customers.
28
CHAPTER: 7
FUTURE SCOPE
The system we propose has great scope in the current real time situation.
The cybercrime monitoring system can be enhanced to an extent by implementing this system.
Most of the firms and establishments are being computerized in order to ease the tasks to be
performed.
29
CONCLUSION:
As a conclusion, our group has gained experience and knowledge in designing the
network and satisfied with the suggestion of new upgraded network design for the
Wijaya cyber café.
This project also helps us to increase our knowledge and understanding on how to
implement a new network design. Other than that, we also learnt ways to design a new
and better network.
This project also shows us the problems that can occur in a network and how to
overcome it. To be good in design a network or become an officer in network company
are highly knowledgeable on network and we are really wanted to work in networking
field in the future.
We hope this project could give a good start for us to begin pursuit a career in network
analysis and design knowledge.
it is more aimed at people using UML in an intensive way and with some code
generations objectives than for simply drawing diagrams to document requirements.
However, using StarUML just as a diagramming tool work fine, especially on Windows
as the tool is built with Delphi and might execute faster than the Java-based tools.
Modern world is computer world where the things have to be done promptly
that requires optimal resources and optimal methods.
Due to this inevitable requirement, computerization of each and every sector in the main
stream is must, so that it can be held itself in the race.
Few eye-catching features of our project are its simplicity, accuracy, and i its
user friendly interface.
Our software incorporates all the features and facilities
provided by the Visual Studio software.
This project has been developed to manage the entire working of the Cyber Café.
Our software simplifies and replaces all the manual effort and the paper works done by
the owner of the cyber to a completely electronically environment, be it bill generation or
customer creation and fulfilment of their needs and customer satisfaction.
Hence both the customer and the owner are at their ease. The customer is
serviced at his footsteps wherein he just types in the request and he is just a
click away. We would like to convey our sincere gratitude and thanks to all, who stood
as our backbone, in designing, formatting and helping us in executing this project
30
REFRENCES:
31
32