Professional Documents
Culture Documents
Cyber Cafe Management System Report
Cyber Cafe Management System Report
A PROJECT REPORT
ON
“Cyber Cafe Management System”
CERTIFICATE
Acknowledgement
It has been remarkable experience of satisfaction and pleasure for all work out to my
project designing under the supervision of such eminent teachers of our department. This
acknowledgement is a humble attempt to earnestly thank all those who are directly or indirectly
involved in the preparation of the project design.
I wish to take this opportunity to express my deep sense of gratitude to all those people
who directly helped me in completing my project successfully. I express heartiest gratitude to my
project guide “Mr.______”. She has been a supportive person right from the beginning of the
project. Her prudent idea to work, keen interest in developing the system &instant efforts were
great source of inspiration for me. It was because of their valuable suggestions, which has helped
me to complete the report in due time. I am highly indebted for this support. They provided me
experienced helping hand in the developing the system. Their scholarly guidance, encouragement
and inspiration added a lot to success of project.
Completing this project report would not have been possible without the cordial help
extended to me by members of our department, especially “Prof.____” (Head of the
Department). “Department of Computer Science and Information Technology”.
I thank all faculty members and teaching staff of computer science and information
technology department, for their experience, guidance and co-operation during the project.
Finally, I would like to thank my parents, my teachers and my friends, for their support
&encouragement throughout in all possible ways.
ABSTRACT
The project entitled "Cyber Café Management System" is a software package, which can
be used in cyber cafés for managing the clients' computer efficiently. Now a day's cyber
terrorism, which is mainly undergone through internet cafés, need to be tackled properly.
Thereby, it is indeed necessary to store the valid information of the user who comes for internet
access. The system beingused, the time at which the user logs in and logs out should be recorded
systematically.
In this modern era, a number of people access the internet frequently by means of cyber
cafes. For such frequent users, a prepaid account shall be maintained and discounted rates may be
charged from them. While walkthrough users, who are less frequent, are charged a fixed rate. By
using the LAN connections in the cyber cafes, we can automate this process very easily. This
system comprises of the following modules:
The Server Module
The Client Module
The server module, which is handled by the administrator can create new accounts for
prepaid users and also store the details of walkthrough customers. While in the client module,
which is handled by users themselves, the user should give his/her user-id and password to start
browsing. After they are logged out, the time and amount will be automatically generated at the
server module and the bill is provided to the user.
INDEX
1 Introduction 7
1.1 Overall Introduction.
1.2 Existing System
1.3 Proposed System
1.4 Need of Project
1.5 Aim of Project
3 Feasibility Study 17
3.1 What Is Feasibility?
3.2 Technical Feasibility
3.3 Economical Feasibility
3.4 Operational Feasibility
4 Technical Details 19
4.1 PHP (HypertextPre-Processor).
4.2 MYSQL (Database Server).
4.3 HTML and CSS.
5 Preliminary Design 23
5.1 Introduction
5.2 Preliminary Design
5.3 System Architecture
5.4 Activity Diagram
5.5 Data Flow Diagram
5.6 Use Case Diagram
5.7 Deployment Diagram
6 Detail Design 31
6.1 Introduction
6.2 Design Phase
6.3 Module Design
6.4 Table Design
7 Testing 35
7.1 Preliminary Testing
7.2 Detail Testing
7.3 Steps of Testing
8 Screen Layouts 40
9 Concluding Remarks 48
10 References 51
Chapter 1 Introduction
The "Cyber Cafe Management System" has been developed to override the
problemsprevailing in the practicing manual system. This software is supported to eliminate and,
in some cases, reduce the hardships faced by this existing system. Moreover, thissystem is
designed for the particular need of the company to carry out operations in asmooth and effective
manner.
The application is reduced as much as possible to avoid errors while entering the data.It
also provides error message while entering invalid data. No formal knowledge isneeded for the
user to use this system. Thus, by this all it proves it is user-friendly.Cyber Cafe Management
System, as described above, can lead to error free, secure,reliable and fast management system. It
can assist the user to concentrate on theirother activities rather to concentrate on the record
keeping. Thus, it will help organizationin better utilization of resources.
Every organization, whether big or small, has challenges to overcome and managingthe
information of Time, Computer, Customer Details, Payment, Keypad. Every CyberCafe
Management System has different Computer needs, therefore we designexclusive employee
management systems that are adapted to your managerialrequirements. This is designed to assist
in strategic planning, and will help you ensurethat your organization is equipped with the right
level of information and details for yourfuture goals. Also, for those busy executive who are
always on the go, our systemscome with remote access features, which will allow you to manage
your workforceanytime, at all times. These systems will ultimately allow you to better
manageresources.
online.
This system Vehicle Parking
Management System is
designed to book a parking
space for a vehicles and
also admin can manage
the parked vehicle by
adding
incoming vehicle and
removing outgoing vehicle.
Although 昀椀nancial
transactions
is done by cah in hand
method but we team habb
13
15
Presently, most of the functions in the Cyber cafés are done manually.Even though there
are LAN. connections and an administrator system, anautomated system is not introduced. The
owner records the details of theclients, login and logout time, cabin and has to calculate the
16
amount. All thesedetails are written in book. Also, there is no special system to allocate
cabinsefficiently. The owner also has tocalculate the total income of a day. Thepresent system has
following limitations:
Limitations in report generations
Manual recording consumes excess time
Chances of error
Difficulty in allocating cabins
The retrieval of information regarding a client is time consuming
Lack of billing system and manual calculation of daily income
Repeated recording of frequent user details
Focusing on the drawbacks and inadequacies of the existing system, thenew system is
designed which could well replace the existing system.
1.3 ProposedSystem
The Cyber Café Management System which we design is in the same line of the existing
system. No procedural changes are made to the existing system except the login process done by
the customers. The new system we develop has 1 module. It is to be installed in the server
computer. In server module the staff should login with their username and password. The first
entering window contains a flex grid which will display all the cabins. If any customer logs in any
client computer, thedetails of the user including name and address will be displayed in this grid.
After accomplishing the maintenance, it can be added back to the cabin settings. When a new
customer comes for browsing, an account is created forhim.Users have to pay only after their
usage..
Different reports are included regarding users, their login time, logout time, used machine
etc. In case if any malpractices have occurred from thecafé, it can be identified by checking the
user report. Daily report provides details regarding all the user details of a day. Reports can
beviewed.
17
The old manual system was suffering from a series of drawbacks. Since whole of the
system was to be maintained with hands the process of keeping, maintaining and retrieving the
information was very tedious and lengthy. The records were never used tobe in a systematic order.
there used to be lots of difficulties in associating any particulartransaction with a particular
context. If any information was to be found it was requiredto go through the different registers,
documents there would never exist anything like report generation. There would always be
unnecessary consumption of time while entering records and retrieving records. One more
problem was that it was very difficult to find errors while entering the records. Once the records
were entered it was very difficult to update these records.
The reason behind it is that there is lot of information to be maintained and have to be kept
in mind while running the business. For this reason, we have provided features Present system is
partially automated (computerized), actually existing system is quite laborious as one has to enter
same information at three different places.
In the present scenario the café owner keeps a paper book to keep track ofuser details.
Manual processing of data is always time consuming and maycommit more errors. There is much
difficulty in allocating cabins to the users.Further reference to the user details is time consuming.
Accuracy of such datamakes the system unreliable and inefficient. Obviously, there is need of
anefficient system. The proposed system rectifies the demerits and defects of theexisting system to
a greater extend.
The main objective of the Project on Cyber Cafe Management System is tomanage the
details ofComputer, Time, Customer, Customer Details, Keypad. Itmanages all the information
about Computer, Payment, Keypad, Computer. The projectis totally built at administrative end and
thus only the administrator is guaranteed theaccess. The purpose of the project is to build an
application program to reduce themanual work for managing the Computer, Time, Payment,
Customer. It tracks all thedetails about the Customer, Customer Details, Keypad.
18
19
Chapter 2
Software Requirement Analysis
20
Note that in software requirements we are dealing with the requirements of the proposed
system, that is, the capabilities that the system, which is yet to be developed, should have.
The main goal of the requirements process is to produce the software requirements
specification (SRS) which accurately captures the client’s requirements and which forms the
basis of software development and validation.
Problemanalysis,
Specification,
Validation
The goal of analysis is to understand the different aspects of the problem, its context, and
how it fits within the client’s organization.
It specifies the goals and objectives of the project, describing its context with system as a
whole. System requirement analysis bridges the gap between system level requirements
engineering and software design. Requirement engineering activities result in the specification of
software’s operational characteristics, indicate software’s interface with other system elements,
and establish constraints that software must meet. Requirement analysis allows the software
engineer to refine the software allocation and build models of data, functional and behavioral
domains that will be treated bysoftware.
21
Requirement
Design
Implemention
Verification
Maintenance
22
While in this phase, the scope of the system was defined first and then what needs to be
done was finalized. Lot of brainstorming was during this phase and the requirements were
very clearly noted down.
B) SYSTEM DESIGN
Maximum time was spent in the design phase. The two most critical works those we
finished during this phase were
• Database Design
• Interface Design
The training which we had gained for database design and interface design earlier for a
Timesheet Management system made it a lot easier for us.
C) CODING
The easiest job which we felt after spending a lot of time on analysis and system design
was coding. All the methods and proper approaches of coding were taught to us or I must say
we were made to learn. We had a very clear mind about what and how to do? And thus it took
less time as compared to design. Still few chinks in the design were found while coding, so
we had to go back to alter database designoccasionally.
D) TESTING
While undergoing training we were taught something about testing. We used to enter any
possible values and check for system response. We also used to check the searches on the
page and generally we had to go back to stored procedures to rectify the problems. Our code
was never given to testers, we tested our pages ourselves.
E) MAINTENANCE
Since, we never delivered the system to client, question of maintenance never aroused.
23
Server
Browser : Internet Explorer 8.0 and above, Mozilla Firefox, Google Chrome, etc.
24
25
26
3.2 TechnicalFeasibility
Technological feasibility is carried out to determine whether the company has the
capability, in terms of software, hardware, personnel and expertise, to handle the completion of
the project when writing a feasibility report
The proposed system can be implemented with some existence technology. The company
is already having the hardware and software required for proposed system. The company already
has a Local Area Network (LAN). The proposed application will be installed on the server and
the interfaces, resources and related data of the proposed system will be shared to all workstation.
The workstations will be connected to the server to all workstation. The workstation will be
connection to the server over the network so that all users are able to share the application's
resources and work individually.Thus, it can be found that the proposed system is technically
feasible
28
MYSQL is Databaseserver.
MYSQL is ideal for both small and largeapplication.
MYSQL support standardSQL.
MYSQL complies on a number ofplatforms.
MYSQL is free to download anduse.
The ‘MYSQL’ database server is very fast, reliable and easy to use. If that is what you are
looking for, you should give it a try. ‘MYSQL’ server also has a practical set feature developed
in close cooperation with users. You can find a performance comparison of ‘MYSQL’ server
with other database managers on our benchmark page. ’MYSQL’ was originally developed to
handle large database much faster than existing solution and has been successfully use in highly
demanding production environments for several years.
30
Cascading Style Sheets (CSS) is a style sheet language used for describing the
presentation of a document written in a mark-up language like HTML. CSS is a cornerstone
technology of the World Wide Web, alongside HTML and JavaScript.
CSS is designed to enable the separation of presentation and content, including layout,
colours, and fonts. This separation can improve content accessibility, provide more flexibility
and control in the specification of presentation characteristics, enable multiple web pages to
share formatting by specifying the relevant CSS in a separate CSS file, and reduce complexity
and repetition in the structuralcontent.
31
32
33
5.1 Introduction
The system design phase focuses on the detailed implementation of the system. Emphasis
is on translation specification in to specification. This phase is transition from user-oriented
document to a document to the programmer of the database personal.
DataStructure
SoftwareArchitecture
ProceduralDetails
5.2 PreliminaryDesign
The preliminary design is concern with the transformation of requirements into data and
software architecture. In Preliminary Design
The system design does not through to phase of development “Logical and Physical
Design” logical flow of system is shown by data flow diagram. In this physical specifies input,
output screen layouts procedure specification how the data entered, how files are accessed and
how reports are produced.
5.3 SystemArchitecture
CYBER CAFE
Fig 5.1 System Architecture
Admin Users
Manageme
nt System
34
35
A DFD, in simple words, is a hierarchical graphical model of a system that shows the
different processing activities or functions that the system performs and the data
interchange among these functions. In the DFD terminology, it is useful to consider each
function as a process that consumes some input data and produces some output data.
The DFD (also known as the bubble chart) is a simple graphical formalism that can be
used to represent a system in terms of the input data to the system, various processing
carried out on these data, and the output data generated by the system) The main reason why
the DFD technique is so popular is probably because of the fact that DFD is a very simple
formalism- it is simple to understand and use. A DFD model uses a very limited number of
primitive symbols to represent the functions performed by a system and the data flow
among these functions. Starting with a set of high-level functions that a system performs, a
DFD model hierarchically represents various sub functions. In fact, any hierarchical model
is simple to understand. Human mind is such that it can easily understand any hierarchical
model of a system-because in a hierarchical model, starting with a very simple and abstract
model of a system; different details of the system can be slowly introduced through
different hierarchies.
CONTEXT DIAGRAM:
A special data flow diagram(DFD) known as context diagram that represents an
entire system as a single process and highlights the interfaces between the system and the
outside entities.
NEED OF DFD
DFD aims to capture the transformation that takes place within a system to the input
data so that eventually output is produced. It makes easier for user to understand the flow
of data.
36
After entering to the home page of the website, admin can choose the ADMIN
LOGIN option where they are asked to enter username &password, and if he/she is a
valid user then admin login page will be displayed.
After the home page login there will be an option of CREATE AN ACCOUNT where
after entering user detail, if all the fields are filled then a request will be sent to the librarian
who will approve him as a registered member of the website.
37
38
A flow of events documents is created for each use cases written from an actor point of view.
Details what the system must provide to the actor when the use cases are executed.
39
40
41
5.8 DeploymentDiagram:
MySQL
Server
42
43
6.1 Introduction
Usually there are many choices but from the different alternatives available. The one,
which offer greatest efficiency, simply functionality and availability, is selected based on the
relative important of these criteria.
6.2 DesignPhase
The design involves the production of technical and visual prototypes. This stage has some
non-technical aspects such as gathering of web content. For the server-side programming and
other technical aspects of the design emphasis will be laid on such design concepts and
principles as effective modularity (high cohesion and low coupling), information hiding and
stepwise elaboration. The goal is to make the system easier to adapt, enhance, test and use
44
The Database consists of Tables for storing the data produced and to be generated by the
Software in a systematic way, Indexes (Information about the records in the tables to make fast
access for the storing purpose) etc.
Following information storage (Tables) are used to store respective information
(Attributes) about the Data Objects in the system.
Admin Table :
45
Computers Table:
Users Table
46
Chapter 7 Testing
47
48
7.1 PreliminaryTesting
The testing process is come after the completion of designing. In the testing
process firstly, we do the preliminary testing on software.
For example,
After the design of staff module, the testing task will be performed in which check for
the validation and verifying the code has been work properly or not. In staff module firstly
we check when we fill the form and click on the save button the save button will be work or
not. If it will be work then in the database it stores the proper value or not. For testing we
want to create the database and check the value that we fill on the form will be same or not.
49
50
During testing, the program to be tested is executed with set of testate input integrity,
input representation and the output of program for the rest data is evaluated to determine if the
program is performing as expected. A series of testing are performed for the proposed system
before system is ready for user acceptance testing.
Steps of Testing
1. Unit Testing
2. IntegrationTesting
3. ValidationTesting
4. Output Testing
5. User AcceptanceTesting
Unit Testing
Unit testing focuses verification efforts on the smallest unit of the software design,
the module that is known as module testing. Since the proposed system has modules the
testing individually performed on each module. Using the details design description as a
guide, important control paths are tested to uncover errors within the boundary of the
module. This testing was carried out during programming stageitself.
Integration Testing
Data can be tested across an interface, one module can have adverse effect on
another, sub-function when combined may not produce the desired function. Integration
51
testing is a systematic technique for constructing the program structure while at the same
time conducting test to uncover errors associated within the interface. The objective is to
take unit tested modules and built a program structure that has been dictated by design. All
modules are combined in this testing step. The entire program is tested as whole. Correction
is difficult as this stage because the isolation of cause is complicated be the vast expense of
the entire program. Thus, in the integration testing step all the errors uncovered are
corrected for the next testingstep.
Validation Testing
In Validation testing, for example the student or mess module is consider, for mobile
number it only allows to accept 10 digits number of student or mess owner and mobile
number should start with 9,8,7(Indian format) only. For that we apply the validation on
form so it should not accept more than 10 digits and less than 10 digits. For the date, the
standard format is “yyyy- mm-dd”. It does not accept the blank form when user click on
save button for that in each field the data are required compulsory. On the view page the
data can be read only we cannot change the values for that the read only validation are
necessary. On every form, there are lots of validation applied like if customers balance is
less than 1, he cannot book mess and warning message appear.
Output Testing
After performing the validation testing, the next step is output testing of the
proposed system, since no system could be useful if it does not produce the required output
in the specific format or design. The output generator or displayed by the system under
consideration is tested by asking the users about type required by them.
52
53
system under consideration is tested for the user acceptance by constantly keeping in the
touch with prospective system and user at the time of developing and making changes
whenever required.
Input ScreenDesign
Output ScreenDesign
54
55
56
Admin Dashboard:
57
58
Edit Computer:
59
60
61
Search Customer:
62
Reports:
Update Profile:
63
Change Password:
Forget Password:
64
65
66
Conclusion:
ACHIEVEMENTS EXPECTED THROUGH THE PROJECT
Comparing to existing manual system, it performs at a faster pace.
System gives better feedback.
Timely and accurate information are available.
The system provides greater processing speed consistency.
Chances of errors are much low.
Provides high security the system and hence unauthorized user can beprevented
Time taken for overall process is reduced.
Forms are very user friendly.
Ease of operation.
The current system is an application program that provides a better way ofmanagement of internet
cafes. Users those who have an account with the systemare entertained. Creation of account is
however very easy, thereby enhances thereliability of the system. The new system provides the
following features -
Eliminate the limitations of existing system
Efficient storing of user details
Automatic allocation of available cabins
Automate billing process by calculating time and amount
The system can treat frequent customers by giving special tariff rates.
To prevent cybercrime through cyber café
The system can provide the daily report including customer details,login time, logout time,
amount, cabin and the total collection of aday
To find the details of users worked in a specific computer, a report isincluded showing all
the users who worked in that system up to thisdate.
If an existing computer is not in working condition, there is option tofree this cabin from
automatic allocation and can be added afterrepairing.
The system will store the details of every up to 5 years since the lastlogin date
68
Chapter 10 References
69
References
StevenHolzer
Robin Nixon
LukeWelling
VikramVaswani
Software Engineering –
• RogerPressman
Pankaj Jalote
70
Web References: -
h琀琀ps://www.google.com/
h琀琀ps://www.php.net/
h琀琀ps://www.w3schools.com/php/
h琀琀ps://stackover昀氀ow.com
h琀琀ps://www.tutorialspoint.com/php/
71