lan controller

Embed Size (px)

Citation preview

  • 8/12/2019 lan controller

    1/31

    LAN Controller

    Chapter 1

    PROBLEM DEFINATION

    Project mainly aims to write a software system that is used as a remote control for PCs

    connected as a Local Area Network, this software is used to lock various resources such

    as Drives, Folders, Files, Applications and Data Files, and it also control the processes

    that are running on the remote computer !he software system also controls the

    login"logoff and shutdown"restart events !he software has the a#ility to lock the

    command prompt, regedit $registry editor% and &'( as well as )emova#le Drives such as

    CD)*+ and DD )*+")D-) .t also restricts the network"we# and printer access of

    the PC Program modules are written that will lock its various other resources such as

    printers or net connection etc

    Previously we used to go to each and every individual machine in the network and lock

    the resources on it !here is no way to do it from a single server which is connected in the

    same local area network !here was no way to impose these rules from a remote server

    -e also had windows utility called as a remote desktop connection that gives us the

    a#ility to remotely connect to a computer"PC in network, after getting connected to the

    computer the screen of the computer appears on the machine from where we are

    connecting After successful connection we can control the PC as if it/s our PC and we

    are controlling it with our key#oard and mouse (ut this windows utility is completely

    different from our system as we do not connect to the machine #ut still can control its

    resources to lock or unlock them !his way it save the processing powers of #oth the

    server and client computers, thus speeding up the process

    Department of Computer Engineering 0

  • 8/12/2019 lan controller

    2/31

    LAN Controller

    OBJECTIVES

    0 (rowse client system remotely

    1 &pload" Download files from client

    2 !o design and devolves a system as user friendly as possi#le

    3 !his is not only to reduce manual work #ut also time and storage )e4uirements

    5 &'( protection

    Department of Computer Engineering 1

  • 8/12/2019 lan controller

    3/31

  • 8/12/2019 lan controller

    4/31

    LAN Controller

    Chapter

    SOFTWARE REUIREMENT SPECIFICATION

    What " a S'%t3are Re40re(e&t" Spe,%,at'&5

    An ')' is #asically an organi:ation;s understanding $in writing% of a customer or

    potential client;s system re4uirements and dependencies at a particular point in time

    $usually% prior to any actual design or development work .t;s a two6way insurance policy

    that assures that #oth the client and the organi:ation understand the other;s re4uirements

    from that perspective at a given point in time

    Be&e%t" '% a /'') SRS6

  • 8/12/2019 lan controller

    5/31

    LAN Controller

    machine to the we# server And can #e utili:ed as file management and spying software

    which gives access to host machines file system >ou can upload or download files and

    folders from and to server as easy as in your local drive !he system will #e a#le to detect

    the &'( and protects the system from anonymous access !he project is purely #ased on

    the research along with study and analysis of various similar types of e9isting

    applications

    7172 U"er C!a""e" a&) Chara,ter"t,"

    Admin

    !he Admin can carry out following functions?

    Login

    'elect 'erver *n"*ff

    'elect *perations

    'erver

    !he 'erver can carry out following functions?

    @eep data#ase of clients connected to network

    Data#ase

    !he Data#ase has following functions?

    'tore .P address of client;s connected in network

    'tore flags for e9ternal drives

    717 Operat&/ Er'&(e&t

    !he proposed system can operate on all -indows family !he reasons for choosing

    the -indows environment are as follows?6

    It 3'r*" '& '!)er:!e"" p'3er%0! har)3are

    Department of Computer Engineering 5

  • 8/12/2019 lan controller

    6/31

    LAN Controller

    +ost of us are still suffering through this recession !hat means making every

    dollar count .f your P computer is still running well, there;s no urgency to

    upgrade >es, you;ll get lots of cool new #ells and whistles with -indows B, #ut

    if you;re getting your work done with P, don;t splurge on a new PC

    A!! 8'0r pr'/ra(" 3'r*7

  • 8/12/2019 lan controller

    7/31

    LAN Controller

    727; Re('te Re/"tr8

    !his module will access the remote regsutry of remotely accessed system and can fi9 the

    registry issues also

    727< L',* Re"'0r,e"

    !his module will lock the remote system resources from the unauthorised clients

    727= Start:+!! Pr',e""e"

    !his module will work as a task manager !his will e9ecute or kill processes which are

    running or which Admin wants to run on remote system

    7 E>ter&a! I&ter%a,e Re40re(e&t"

    771 U"er I&ter%a,e"

    !he product must #e usa#le from the te9t command line, particularly under operating

    systems where the command line is a standard common user interface 8owever, some

    guidelines do apply?

    ?UI6 !he Action or operation that is to #e e9ecuted on the client side can #e e9ecuted

    simply on clicking on the #utton provided in the window of the application Admin can

    get processes running on the client machine or process that is e9ecuting to terminate

    C'((a&)9!&e 'pt'&"6 .f command6line tools accept arguments, they will perform the

    action according to the standards laid out in the coding standards, and should support

    #oth short and long forms

    Department of Computer Engineering B

  • 8/12/2019 lan controller

    8/31

    LAN Controller

    77 S'%t3are I&ter%a,e"

    V"0a! St0)' 2@1@

    +icrosoft isual 'tudio is an integrated development environment $.D

    which allow the code editor and de#ugger to support $to varying degrees% nearly any

    programming language, provided a language6specific service e9ists

    JAVA

    After studying and finali:ing the scope, in the technical feasi#ility we have analy:ed

    possi#ility of using different 7AA technologies, and we have decided this architecture

    to maintain following features from programming point of view

    0% 7AA to facilitate **P programming style with platform independence

    1% 7'P for we# interface which will facilitate dynamic page generation

    2% (eans to use **P method in #etter way

    3% Apache !*+CA! which is freeware and relia#le to facilitate -

  • 8/12/2019 lan controller

    9/31

    LAN Controller

    normal 8!+L with 7ava code pieces em#edded in them 7'P compiler is used to compile

    7'Ps into 7ava 'ervlets

    A 7'P compiler may generate a servlet in 7ava code that is then compiled #y the 7ava

    compiler, or it may generate #yte code for the servlet directly

    U"e '% JSP6

    7'P technology is used to create dynamic we# pages, +L"8tml documents

    For accessing data#ase information on a -e# server

    -e are using 7'P, since our application is -e# (ased -e need a technology which

    provides .ntra".nternet supports G 7'P is perfect technology for this

    A-'0t We- Ser#er6

    A computer that is responsi#le for accepting 8!!P re4uests from clients, which are

    known as -e# #rowsers, and serving them 8!!P responses along with optional datacontents, which usually are -e# pages such as 8!+L documents and linked

    o#jects$images,etc%

    Department of Computer Engineering H

  • 8/12/2019 lan controller

    10/31

    LAN Controller

    Feat0re"6

    Configura#ility of availa#le features #y configuration files or even #y an

    e9ternal user interface

    Authentication, optional authori:ation re4uest $re4uest of user name and

    password% #efore allowing access to some or all kind of resources

    8andling of not only static content as well as dynamic content

    +odule support, in order to allow the e9tension of server capa#ilities #y

    adding or modifying software modules which are linked to the server software

    or that are dynamically loaded $on demand% #y the core server

    Content compression $ie #y :ip encoding% to reduce the si:e of the responses

    $to lower #andwidth usage, etc%

    irtual 8ost to serve many we# sites using one .P address

    Large file support to #e a#le to serve files whose si:e is greater than 1 I( on

    21 #it *'

    *ur Application is using Apache !omcat 5520 -e# 'erver for running our

    application on client/s side

    Apa,he T'(Cat

    Apache !omcat, a we# container that functions as a we# server supporting 'ervlets and

    7'Ps .t is developed at the Apache 'oftware Foundation $A'F%!omcat implements the

    servlet and the 7ava 'erver Pages $7'P% specifications from 'un +icrosystems, providing

    an environment for 7ava code to run in cooperation with a we# server .t adds tools for

    configuration and management #ut can also #e configured #y editing configuration files

    that are normally +L6formatted !omcat includes its own 8!!P server internally

    Department of Computer Engineering 0J

  • 8/12/2019 lan controller

    11/31

    LAN Controller

    7; N'&%0&,t'&a! Re40re(e&t"

    &sers have implicit e9pectations a#out how well the software will work !hese

    characteristics include how easy the software is to use, how 4uickly it e9ecutes, how

    relia#le it is, and how well it #ehaves when une9pected conditions arise !he

    nonfunctional re4uirements define these aspects a#out the system

    !he nonfunctional re4uirements should #e defined as precisely as possi#le *ften, this is

    done #y 4uantifying them -here possi#le, the nonfunctional re4uirements should

    provide specific measurements that the software must meet !he ma9imum num#er of

    seconds it must take to perform a task, the ma9imum si:e of a data#ase on disk, the

    num#er of hours per day a system must #e availa#le, and the num#er of concurrent users

    supported are e9amples of re4uirements that the software must implement #ut do not

    change its #ehavior

    7;71 Per%'r(a&,e Re40re(e&t"

    Performance re4uirement is statement that descri#es how well a function is to #e

    e9ecuted or achieved, or how well it is to #e accomplished !he performance re4uirement

    is generally couched in terms of degree, rate, 4uantity, 4uality, timeliness and so on

    Performance re4uirements can also descri#e the conditions under which the function is to#e performed

    .t is a simple fact that if performance is not a stated criterion of the system re4uirements

    then the system designers will generally not consider performance issues -hile loose or

    incorrectly defined performance specifications can lead to disputes #etween clients and

    suppliers .n many cases performance re4uirements are never ridged as system that does

    not fully meet its defined performance re4uirements may still #e released as other

    consideration such as time to market

    .n order to assess the performance of a system the following must #e clearly specified?

    )esponse !ime? )esponse times $in case of interactive work% or processing times

    $in case of #atch jo#s or scheduled activities% define how fast re4uests would #e

    Department of Computer Engineering 00

  • 8/12/2019 lan controller

    12/31

    LAN Controller

    processed !his response time has very great value in our project therefore we are

    going to focus mainly on this re4uirement

    -orkload? Again the #usiness case or e9isting process should #e the start of the

    workload definition 8owever, it is not enough to state that Kthe system should #e

    capa#le of supporting !housands of clients or Kthe system should #e a#le to

    scan05clients"sec !hese statements are often good metrics at a high level

    management level #ut do not define the work that the system must support !his

    is particularly important as the mi9 of transaction affects the performance For

    e9ample a D( system may easily handle 0J,JJJ transaction per hour #ut only

    2,JJJ update transactions per hour

    'cala#ility? .n one respect scala#ility is simply specified as the increase in the

    system/s workload that the system should #e a#le to process !he scala#ility

    re4uired is often driven #y the lifespan and the maturity of the system For

    e9ample, a new $and hence immature% system could suffer an une9pected growth

    in popularity and suffer from a significant increase in workload as it #ecomes

    popular with new users +ore mature systems which represent improvements on

    older systems are likely to have more accurately defined workloads and thus #e

    less likely to suffer in this respect

    Platform? A platform is defined as the underlying hardware and software

    $operating system and software utilities% which will house the system .t is not

    always the case that the designer will #e given a Kgreen field choice of what

    platform on which to house the system .n some cases the customer may dictate

    this choice or there may #e internal reasons $product strategy perhaps% that will

    constrain the designer/s freedom .t may also #e the case that the system will

    re4uire various generic products to #e used in which case the performance ofthese must also #e specified

    7;72 Sa%et8 Re40re(e&t"

    Department of Computer Engineering 01

  • 8/12/2019 lan controller

    13/31

    LAN Controller

    'tatically ensuring safety properties of -e# applications is #ecoming increasingly

    important as the -e# #ecomes the dominant platform for the construction of large, multi6

    user applications .n particular, -e# applications should #e provided with at least the

    same guarantees of static safety as in preceding development paradigms= the current

    failure to do so leads to -e# application users #eing forced to endure failure modes that

    would never #e accepted from conventional applications

    -e have categori:ed important safety properties of -e# applications as follows?

  • 8/12/2019 lan controller

    14/31

    LAN Controller

    Data Tra&"(""'& Se,0rt8

    -hen confidential or sensitive data is passed #etween the 'erver6Client and the -e#

    server, the 8!!P' $''L over 8!!P% protocol will #e used ''L provides server

    authentication, data encryption $over the wire%, and data transmission integrity

    Data-a"e Se,0rt8

    -e are providing minimum privileges to -e# applications to access data#ase

    o#jects $ie ta#les, views, stored procedures% For e9ample, if the -e# application

    needs read6only access to a specific data#ase ta#le, the data#ase permissions

    should #e set accordingly as opposed to giving the -e# application admin or

    owner rights to the entire data#ase

    .ndividual data#ase fields storing confidential or sensitive data $eg passwords,

    social security num#er% store using encryption techni4ues

    Pa""3'r) Re40re(e&t"

    -e are providing password authentication to Admin to login into our application -e

    have decided some criteria to create an account?

    Password for Admin must #e at least eight characters in length

    Contain characters from three of the following four categories?

    o &ppercase letters $A though M%

    o Lowercase letters $a through :%

    o Num#ers $J through H%

    o 'pecial characters $, O, , Q, R, G, S, 6, T, U, V, %

    Not #e the same as the logon or user name

    Department of Computer Engineering 03

  • 8/12/2019 lan controller

    15/31

    LAN Controller

    7;7; S'%t3are 0a!t8 Attr-0te"

    A#a!a-!t86A system;s availa#ility, or uptime, is the amount of time that it is

    operational and availa#le for use !his is specified #ecause some systems are

    designed with e9pected downtime for activities like data#ase upgrades and

    #ackups

    E%%,e&,86 'pecifies how well the software utili:es scarce resources? CP&

    cycles, disk space, memory, #andwidth, etc

    F!e>-!t86.f the organi:ation intends to increase or e9tend the functionality of

    the software after it is deployed, that should #e planned from the #eginning= it

    influences choices made during the design, development, testing, and deployment

    of the system

    P'rta-!t86Porta#ility specifies the ease with which the software can #e installed

    on all necessary platforms, and the platforms on which it is e9pected to run

    I&te/rt86 .ntegrity re4uirements define the security attri#utes of the system,

    restricting access to features or data to certain users and protecting the privacy of

    data entered into the software

    Per%'r(a&,e6!he performance constraints specify the timing characteristics of

    the software Certain tasks or features are more time6sensitive than others= the

    nonfunctional re4uirements should identify those software functions that have

    constraints on their performance

    Re!a-!t86 )elia#ility specifies the capa#ility of the software to maintain its

    performance over time &nrelia#le software fails fre4uently, and certain tasks are

    more sensitive to failure $for e9ample, #ecause they cannot #e restarted, or

    #ecause they must #e run at a certain time%

    Re0"a-!t86+any systems are developed with the a#ility to leverage common

    components across multiple products )eusa#ility indicates the e9tent to which

    software components should #e designed in such a way that they can #e used in

    applications other than the ones for which they were initially developed

    Department of Computer Engineering 05

  • 8/12/2019 lan controller

    16/31

    LAN Controller

    R'-0"t&e""6 A ro#ust system is a#le to handle error conditions gracefully,

    without failure !his includes a tolerance of invalid data, software defects, and

    une9pected operating conditions

    S,a!a-!t86'oftware that is scala#le has the a#ility to handle a wide variety of

    system configuration si:es !he nonfunctional re4uirements should specify the

    ways in which the system may #e e9pected to scale up $#y increasing hardware

    capacity, adding machines, etc%

    U"a-!t86

  • 8/12/2019 lan controller

    17/31

    LAN Controller

    7

    3 -e# server ? !omcat

    7=A&a!8"" M')e!"

    7=71 Data F!'3 Da/ra("

    A Data Flow Diagram $DFD% is a graphical representation of the flow of data through

    an information system, modeling its process aspects *ften they are a preliminary step

    used to create an overview of the system which can later #e ela#orated DFDs can also #e

    used for the visuali:ationof data processing$structured design%

    A DFD shows what kinds of data will #e input to and output from the system, where the

    data will come from and go to, and where the data will #e stored .t does not showinformation a#out the timing of processes, or information a#out whether processes will

    operate in se4uence or in parallel

    Department of Computer Engineering 0B

    http://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Data_visualizationhttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Data_processinghttp://en.wikipedia.org/wiki/Information_systemhttp://en.wikipedia.org/wiki/Data_visualizationhttp://en.wikipedia.org/wiki/Data_processing
  • 8/12/2019 lan controller

    18/31

    LAN Controller

    F/7DFD Le#e! @

    F/7DFD Le#e! 1

    F/7DFD Le#e! 2

    Department of Computer Engineering 0

  • 8/12/2019 lan controller

    19/31

    LAN Controller

    7=72 C!a"" Da/ra(

    F/7 C!a"" Da/ra(

    Department of Computer Engineering 0H

  • 8/12/2019 lan controller

    20/31

    LAN Controller

    7=7 State Tra&"t'& Da/ra(

    F/7 State Tra&"t'&Da/ra( '% LAN C'&tr'!!er

    Department of Computer Engineering 1J

  • 8/12/2019 lan controller

    21/31

    LAN Controller

    7 S8"te( I(p!e(e&tat'& P!a&

    Appr'a,h

    !he approach we have &sed -ater Fall +odel

    The Water Fa!! M')e!

    1 C'((0&,at'&6

    !he software development process starts with communication #etween customer

    and developer .n this phase we communicated with the user with following principles of

    communication phase

    -e prepared #efore the communication ie we decide agenda of the meeting for

    concentrating on the online voting system

    *ur leader led our team and drawn out all the re4uirement of from the user ie

    what they is actually needed, what is input, output format of system

    2 P!a&&&/6

    .t includes complete estimation and scheduling and risk analysis .n this phase we planned a#out when to release the software, cost estimation, risk

    in the project regarding voting application and mo#ile software toolkit

    application

    Finally in this phase we estimated the cost of the project including all e9penditure

    of software, releasing software according to user deadline with his participation

    M')e!&/6

    .t includes detail re4uirement analysis and project design Flowchart shows

    complete pictorial flow of program whereas algorithm is step #y step solution of pro#lem

    -e analy:e the re4uirement of the user according to that we draw the #lock

    diagrams of the system

    Department of Computer Engineering 10

  • 8/12/2019 lan controller

    22/31

    LAN Controller

    !hat is nothing #ut #ehavioral structure of the system using &+L 1J ie Class

    Diagram, &se case Diagram, .nteraction diagram and &se case report

    ; C'&"tr0,t'&6

    .t includes coding and testing steps?

    a C')&/6

    Design details are implemented using appropriate programming languages

    .n coding we chosen the platform ie java and its application tools and for

    wireless application ie mo#ile CAP!C8A, considering all the constraints of

    software limitations in implementation

    - Te"t&/6

    !esting is carried out #y analy:ing the system ie we first develop the prototype

    of the system and step #y step find out input and output errors such as interface

    errors, performance errors, data structure errors, initiali:ation errors etc !herefore

    here (lack (o9 testing strategy is useful

  • 8/12/2019 lan controller

    23/31

    LAN Controller

    F/7 The Water Fa!! M')e! '% LAN C'&tr'!!er

    Department of Computer Engineering 12

  • 8/12/2019 lan controller

    24/31

    LAN Controller

    Chapter ;

    SYSTEM DESI?N

    ;71 S8"te( Ar,hte,t0re

    Department of Computer Engineering 13

  • 8/12/2019 lan controller

    25/31

    LAN Controller

    F/7 ?e&era! Ar,hte,t0re '% LAN C'&tr'!!er

    *ur system can #e operated #y only one user vi: Admin !he Admin is re4uired to use his"hercredentials to login !hen the admin has options like start server, scan network and lockresources,access data#ase .f the patient selects scan network then he is provided a list of clients out

    of which he is re4uired to select them !hen as per the selected clients the appropriate operationsand solutions are provided #y the system

    .f the admin selects lock resources then he is provided a list of availa#le resources and he isre4uired to select any one out of them !hen he can have control on all resources connected and getthe precautions and solutions

    ;72 UML Da/ra("

    ;7271 U"e ,a"e )a/ra("

    A use case diagram in the &nified +odeling Language $&+L% is a type of #ehavioral

    diagram defined #y and created from a &se6case analysis .ts purpose is to present a

    graphical overview of the functionality provided #y a system in terms of actors, their

    goals $represented as use cases%, and any dependencies #etween those use cases

    !he main purpose of a use case diagram is to show what system functions are performed

    for which actor )oles of the actors in the system can #e depicted

    &se case diagrams are formally included in two modeling languages defined #y the

    *+I? the &nified +odeling Language $&+L% and the 'ystems +odeling Language

    $'ys+L%

    Department of Computer Engineering 15

  • 8/12/2019 lan controller

    26/31

    LAN Controller

    F/7 U"e9Ca"e )a/ra( '% LAN C'&tr'!!er

    ;7272 Se40e&,e Da/ra(

    A se4uence diagram in &nified +odeling Language $&+L% is a kind of interaction

    diagram that shows how processes operate with one another and in what order .t is a

    construct of a +essage 'e4uence Chart A se4uence diagram shows o#ject interactions

    arranged in time se4uence .t depicts the o#jects and classes involved in the scenario and

    the se4uence of messages e9changed #etween the o#jects needed to carry out the

    functionality of the scenario 'e4uence diagrams typically are associated with use case

    reali:ations in the Logical iew of the system under development

    'e4uence diagrams are sometimes called event diagrams, event scenarios, and timing

    diagrams

    Department of Computer Engineering 1E

  • 8/12/2019 lan controller

    27/31

    LAN Controller

    F/7 Se40e&,e )a/ra( '% LAN C'&tr'!!er

    ;727 A,t#t8 Da/ra(

    Activity diagrams are graphical representations of workflows of stepwise activities and

    actions with support for choice, iteration and concurrency .n the &nified +odeling

    Language, activity diagrams can #e used to descri#e the #usiness and operational step6#y6

    step workflows of components in a system An activity diagram shows the overall flow of

    control Activity diagrams are constructed from a limited num#er of shapes, connected

    with arrows !he most important shape types?

    rounded rectangles represent activities=

    diamonds represent decisions=

    #ars represent the start $split% or end $join% of concurrent activities=

    Department of Computer Engineering 1B

  • 8/12/2019 lan controller

    28/31

    LAN Controller

    a #lack circle represents the start $initial state% of the workflow=

    An encircled #lack circle represents the end $final state%

    Arrows run from the start towards the end and represent the order in which

    activities happen

    F/7 A,t#t8 )a/ra( '% LAN C'&tr'!!er

    Chapter