Professional Documents
Culture Documents
Cyber Cafe Management
Cyber Cafe Management
For
1. Introduction....................................................................................................6
1.1 Purpose…..........................................................................................6
1.2 Document Convention.....................................................................6
1.3 Intended Audience and Reading Suggestion...................................6
1.4 Project Scope......................................................................................7
2. Overall Description.......................................................................................8
2.1 Product Perspective….........................................................................8
2.2 Product Features.................................................................................8
2.3 User classes and Characteristics.......................................................9
2.4 Operating Environment......................................................................9
2.5 Design Constraints..............................................................................9
2.6 User Documentation..........................................................................10
2.7 Assumptions and Dependencies......................................................10
3. Functional Requirements...........................................................................11
4. External Interface Requirements..............................................................18
4.1 GUI….................................................................................................18
4.2 Hardware Interface….........................................................................18
4.3 Software Interface…..........................................................................18
5. Non Functional Requirements....................................................................19
5.1 Performance Requirements.................................................................19
5.2 Safety Requirements..........................................................................19
5.3 Security................................................................................................19
Appendix A: Glossary........................................................................................37
Abstract of Cyber Cafe Management System
The client uses MS $%cel! and maintains their records!
however it is not possible them to share the datafrom
multiple system in multi user environment! there is lot of
duplicate work! and chance of mistake.&hen the records
are changed they need to update each and every e%cel
file. There is no option to findand print previous saved
records. There is no security' any body can access any
report and sensitivedata! also no reports to summary
report. This Cyber Cafe Management System is used
to overcome theentire problem which they are
facing currently! and making complete atomi(ation of
manual system tocomputeri(ed system
Introduction
Clients: The user of the system will get a clear idea of a software and hardware
requirements to be engaged.
Lab technicians: They will be in a position to attain the various features that are
enabled in the software there by including new definitions for a security
Students: The project shows an infinite path in the field of security in the internet
labs. There is a always perspective of development.
The modern colleges have a internet facilities that are not secure and based
on costly software for maintaining users. Security system is not that efficient also.
Many firewalls and tracking software are used for security purposes that reduce the
total efficiency of the internet system.CYBER CAFE MANAGEMENT SYSTEM
software will deliver an open source operating system with inbuilt features for
accessing secure internet. The software also has a accounting and monitering
module to trace and keep track of various internet activities. The targeted users are
internet labs in colleges and internet cafes.
2. Overall Descriptions
2.1 Product perspective
The client will be given internet access only by the knowledge of the
server. When a client is accessing internet the server will be tracking the user name
and account details of the user logged in.
There is option also for the user to view the account details of the user.
General users: they will be position to permit access to the users in the internet
and acknowledge their account status.
Administrators: they are the core users able to add the new users to the system
and permit them to access the internet resources. they can also view in real time
what a user performing right now. they can also get the overall report of the user
sessions.
Employees: They login at the client level and this is to get access to the internet at
the client level. They can also view their account status in the client sysyem.
Each user must keep their password as confidential. More over the user must
have individual ID for creating a login in the CYBER CAFE MANAGEMENT
SYSTEM.
Only Administrator can control user addition and deletion in the CYBER
CAFE MANAGEMENT SYSTEM system. Also this group could only create
reports.
Inputs: user must give his ID and password to access the internet.
---NOT APPLICABLE---
The user screens that the user would finally be seeing could only be
displayed at end of the whole projects. Once the project is implemented the
samples of the used and the dramatic sceneries can be depicted.
Cyber Café Management System2016
3. System Features
3.1 Authentication
The system offers access to internet at client level and access to server
resources at server level only by validating the user with the unique username and
password.
1. Users: login
2. Administrator: Adding new accounts, giving account status,
getting & sending reports.
All system should have the client for program running. The server
R1 Registration
Description: This function registers the newly arrived customer. The user provides
all the personal details like contact, email, id, address etc. to the system. It stores
details in database & generates error message if error is already registered.
R2 Login
Processing: The user logins successfully if username and password are valid
otherwise error message is displayed.
details.
Description: Products and Services sold in your cafe can be defined in the
system. Every purchase is accounted in the system against an invoice. Cafe
Employee cannot change the Sale Price for their profits.
R5 Website Blocking
R6 Website Tracking
R7 Membership package
R8 Bandwidth Monitor
Description: It gives you the option to set download limits for each User
Session. You can set an alert to inform Cafe Users, whenever the download
limit is exceeded. You can Monitor Bandwidth consumed in your cafe. You
can block websites that download more data, ensuring fair share of bandwidth
consumption.
Output: Mb set.
R9 Accounting System
Description: This function provides an easy way to manage your daily cash
transactions. It maintains an invoice for each cash transaction. This data is
reflected in extensive Financial Reports.
Cyber Café Management System2016
R10 Reports
Description: It provides a useful set of reports which will help a cafe to analyze
and optimize their cafe business. Reports provide information on Financial
Accounts, User Activity, Products & Services, Printers & Terminal usage.
Login Screen: This is for the administrator to get into the software. It
requires a user name and password.
Account Details: this shows the account status of various users with their
login times.
New registrations: this utility is to create new users or clients in the CYBER
CAFE MANAGEMENT SYSTEM.
Reports: this is used to generate reports of the login and account details of
users.
User login (client side): the user has to give a username and password by
which he or she can access internet.
User Account: this enables the user to view the account
status Of their account.
The server is directly connected to the client systems.also the client has to
access to the database for accessing the account details and storing the login time.
The client access to the database in the server is only read only.
It enables the user to interact with the server and attain access to the internet and
also leaves a record in the inbuilt database. It uses java servlets as the front end
programming tool and SQL as the backend application tool.
The accountability is a vital feature and this could only be assured if the
system is working in full capability. So uninterrupted power supply is needed.
The data handled in the cyber cafe system is very vital. The server should
always be confirmed to run properly and data are saved to the database at
consecutive intervals.
Power is a significant feature and the power supply should be always taken
care of. An uninterrupted power supply is always recommended.
The security system features from having a login for all the users
To access the software. The login details will be used in the system also.
The concept of Data migration is important to ensure that the data that
is being entered and stored today could be accessed
Maintaining a log file for each user logging ina nad also maintaining
the account details of the users who have finished the account could be
obtained from cyber café reports.
5.6.5 Installation
6. PRELIMINARY SCHEDULE:
The system has to be implemented within 6 months.
7. OPERATIONAL SCENARIO:
This system consist of student database, staff database, servers, various complain
databases etc.
General users: They will be position to permit access to the users in the internet
and acknowledge their account status.
Administrators: They are the core users able to add the new users to the system
and permit them to access the internet resources. They can also view in real time
what a user performing right now. They can also get the overall report of the user
sessions.
Employees: They login at the client level and this is to get access to the internet at
the client level. They can also view their account status in the client system.
Scenario:
Initial Situation:
In Cyber Cafe Management System, initially the customer visits the café. If he
is not registeres, then he must provide login credentials along with proof and
registered himself. He will then create a password on specified terminal using
ID provided by employee.
Cyber Café Management System2016
On other hand if user is registered, then he will login into his account and
access the net or takes an printout of necessary document.
If the registered user forgets the password & on pressing “Forget Password”
option he is provided with security questions, but still if user is enable to
answer these questions.
Printing issue while print command senr by user due to some technical problem
The customer faces difficulty in accessing the internet & the available
employess will help him.
Other activities:
The customer [ays the bill for surfing, priting or purchasing any product.
Cyber Café Management System2016
Use-Case diagram
Registration
Provide details ID
proofs
Registration
Employee Customer
Login
Web Blocking
Customer
Admin
Net usage
Employee
Payment
Net Usage
Website Accessed
Employee Customer
Payment
Report
Payment history
Collection report
Admin Employee
Terminal usage
Web Tracking
Printing report
Cyber Café Management System2016
Registration
login
customer
website blocking
payment
Report
Cyber Café Management System2016
8. Diagrams
8.1 Class Diagram:
Cyber Café Management System2016
9. Testing
Testing is a process that requires more efforts than any other software
engineering activity. Testing is a set of activities that can be planned in advance
and conducted systematically.
This may lead to have many undetected errors in the system being developed.
Hence performing testing by adopting systematic strategies in very much essential
in during development of software.
1. Unit Testing :-
In this type of testing techniques are applied to detect the errors from each
software component individually .
2. Integration testing :-
It focuses on issues associated with the verification and program construction
as components begin interacting with one another.
3. Validation testing :-
It provides assurance that the software validation criteria (established during
requirement analysis) meets all functional , behavioral and performance
requirements .
4. System testing :-
In system testing all system elements forming the system is tested as a whole.
Cyber Café Management System2016
In this testing the internals of software are tested to make sure that they operate
according to specifications and designs.
Test
Test Test case Test case case Test Defect
case Name Description Test steps status case severity
Id (pass/ priority
fail)
1 Login In this case In this step, Pass 1
user will try the user will
to login in the enter user
system in name and
order to use password and
the use the then click on
system the login
functionality. button.
2 Website In this test In this step , Pass 2
Blocking case ,Admin the user can
and tracking Can block or not block
track the websites.
website.
Equivalence Partitioning:-
If an input condition specifies member of a set, one valid and two invalid
equivalence classes are defined.
If an input condition is a Boolean, one valid and two invalid equivalence
classes are defined.
Log in Module:
2.(nnn,nn)
30
Cyber Café Management System2016
Accounting Module:
31
Cyber Café Management System2016
10 . Preliminary Schedule
The deadline of the particular modules is given as per the below given table :-
Modules Deadline
Requirement gathering 12-20 days
Designing & planning 3week
Developing 2 months
Testing 3 week
Maintenance -
32
Cyber Café Management System2016
Task Expenses(Rs.)
Employee’s salary 85,000
Hardware 2,00,000
Software 90,000
Licensing 50,000
Maintenance 1,00,000
33
Cyber Café Management System2016
34
Cyber Café Management System2016
Component Rate
F1 Reliable back-up and 5
recovery
F2 Data communication 3
F3 Distributed functions 3
F4 Performance 3
F5 Heavily used 2
configuration
F6 Online data entry 5
F7 Operational ease 4
F8 Online update 3
F9 Complex interface 1
F10 Complex processing 3
F11 Reusability 1
F12 Installation ease 3
F13 Multiple sites 3
F14 Facilitate change 1
Total 40
= 452 * 1.05
FP=474.6
35
Cyber Café Management System2016
Calculation:
36
Cyber Café Management System2016
13. REFERENCES:
Websites:
http://www.linuxlinks.com
http://www.tldp.org
http://www.reallylinux.com
Appendix A: Glossary
Terms Definitions
User Someone who interacts with the System.
Stakeholder Any person who has interaction with the system who
is not a developer.
37