23
Introduction : Multicast is an efficient method to deliver multimedia content from a sender to a group of receivers and is gaining popular applications such as realtime stock quotes, interactive games, video conference, live videobroadcast, or video on demand. A multicast aut hentic ati on provid es thr ee ser vices mai nly . The y are Dat a int egr ity , Dat a ori gin authentication and Nonrepudiation. All the three services can be supported by a technique calle d signa ture. In an ideal case, the send er generates a signa ture for each packe t with its pri vat e key ,wh ich is cal led sig nin g, and each rec eiv er che cks the val idit y of the si gnat ur e wi th the se nder’s public key , which is called verif yi ng. If the verification succeeds, the receiverknows the packet is authentic. Designing a multicast authentication protocol is not an easy as, there are following iss ues in rea l wor ld cha llengi ng the desig n. Fir st , ef ficien cy nee ds to becon sid ere d, especially for receivers. Second is the packet loss that happens during the implementation phase. Therefore, for applicationswhere the quality of service is critical to end users, a multicast authentication protocol should provide a certain level of resilience to packet loss. Specifically, the impact of packet loss on the authenticity ofthe already-received packets should be as small as possible. Here we are trying to implement a multicast authenticaton protocol that will not be asy for the hackers to hack but also at the same time the proposed system will be resilient to packe t loss but in the case of effic iency an d flexibil ity more adva ntageo us than the conventional system.

Mabs Report

Embed Size (px)

Citation preview

Page 1: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 1/23

Introduction :

Multicast is an efficient method to deliver multimedia content from a sender to a

group of receivers and is gaining popular applications such as realtime stock quotes,

interactive games, video conference, live videobroadcast, or video on demand. A multicast

authentication provides three services mainly. They are Data integrity, Data origin

authentication and Nonrepudiation. All the three services can be supported by a technique

called signature. In an ideal case, the sender generates a signature for each packet with

its private key,which is called signing, and each receiver checks the validity of the

signature with the sender’s public key, which is called verifying. If the verification

succeeds, the receiverknows the packet is authentic.

Designing a multicast authentication protocol is not an easy as, there are following

issues in real world challenging the design. First, efficiency needs to beconsidered,

especially for receivers. Second is the packet loss that happens during the implementation

phase. Therefore, for applicationswhere the quality of service is critical to end users, a

multicast authentication protocol should provide a certain level of resilience to packet loss.

Specifically, the impact of packet loss on the authenticity ofthe already-received packets

should be as small as possible.

Here we are trying to implement a multicast authenticaton protocol that will not be

asy for the hackers to hack but also at the same time the proposed system will be resilient

to packet loss but in the case of efficiency and flexibility more advantageous than the

conventional system.

Page 2: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 2/23

Literature Survey :

Different types of readers that the document is intended for are, application

developer, project managers, marketing staff, users of networking environment, testers,

and documentation writers. The next section, the Overall Description of this document

gives an overview of the functionality of the product. It describes the informal requirements

and is used to establish a context for the technical requirements specification in the next

chapter. The third section, Requirements Specification, of this document is written primarily

for the developers and describes in technical terms the details of the functionality of the

product. Both sections of the document describe the same software product in its entirety,

but are intended for different audiences and thus use different language.

Here in the proposed system multicast authentication protocol, namely MABS,

including two schemes. The basic scheme (MABS-B) eliminates the correlation among

packets and thus provides the perfect resilience to packet loss, and it is also efficient in

terms of latency,computation, and communication overhead due to an efficient

cryptographic primitive called batch signature, which supports the authentication of any

number of packets simultaneously. We also present an enhanced scheme MABS-E, which

combines the basic schemewith a packet filtering mechanism to alleviate the DoS impact

while preventing packet loss.

Conventional block-based multicast authentication schemes overlook the

heterogeneity of receivers by letting the sender choose the block size, divide a multicast

stream into blocks, associate each block with a signature, and spread the effect of the`

signature across all the packets in the block through hash graphs or coding algorithms.

The correlationamong packets makes them vulnerable to packet loss, which is inherent in

the Internet and wireless networks. Here we are trying to eliminates the correlation among

Page 3: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 3/23

packets and thus provides the perfect resilience to packet loss and an enhanced scheme

which combines the basic scheme with a packet filtering mechanism to reduce the DoS

impact while preserving the perfect resilience to packet loss.

Purpose :

Conventional block-based multicast authentication schemes overlook the

heterogeneity of receivers by letting the sender choose the block size, divide a multicast

stream into blocks, associate each block with a signature, and spread the effect of the

signature across all the packets in the block through hash graphs or coding algorithms.

The correlation among packets makes them vulnerable to packet loss, which is inherent in

the Internet and wireless networks. Here we are trying to eliminates the correlation among

packets and thus provides the perfect resilience to packet loss and an enhanced scheme

which combines the basic scheme with a packet filtering mechanism to alleviate the DoS

impact while preserving the perfect resilience to packet loss.

Scope :

The proposed system is capable of implementing signature on packets and thereby

implementing security. The correlation of the packets in the case of signature is the

drawback in conventional case which is eliminated in the proposed system.

Page 4: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 4/23

Product Perspective :

Multicast is an efficient method to deliver multimedia content from a sender to a

group of receivers and is gaining popular applications such as real-time stock quotes,

interactive games, video conference, live video broadcast, or video on demand.

Product Function :

Here in the proposed system multicast authentication protocol, namely MABS,

including two schemes. The basic scheme (MABS-B) eliminates the correlation among

packets and thus provides the perfect resilience to packet loss, and it is also efficient in

terms of latency, computation, and communication overhead due to an efficient

cryptographic primitive called batch signature, which supports the authentication of any

number of packets simultaneously. We also present an enhanced scheme MABS-E, which

combines the basic scheme with a packet filtering mechanism to alleviate the DoS impact

while preserving the perfect resilience to packet loss. 

Hardware and Software Interface :

Software Interfaces :

• Front end : Java

• Back end : My SQL

Page 5: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 5/23

• Operating system : LINUX

• IDE : Net Beans

Hardware Interfaces :

• Processor : Pentium IV OR Above

• Primary Memory : 256 MB RAM

• Hard Disk : 40 GB Hard Disk

• Display : EGA/VGA Color Monitor 

• Frequency : 3 MHz

Key Board : Windows/Linux compatible

• Mouse : Windows/Linux compatible

User Interfaces :

The user interface is provided such that firstly the user has to login for using the

facilities provided by the application. A help menu will also be provided in the main window.

 A login option is provided where the user has to enter password. The password is

validated and the user gets access to the application. Options for transferring, receiving

and reports are provided in the application. User is also provided with an option to change

password. After carrying out intended operations user is logged out using logout option.

Page 6: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 6/23

User Documentation :

 A help menu will be provided in the interface. This menu driven support facilitates

user to use the facilities provided by the software and describes the initial user how to

move through the application.

Assumptions and Dependencies :

Proper network connection is necessary between the computers for the proper working of the system.

• The proposed system must be installed correctly.

Feasibility Study : 

Feasibility study is a procedure that identifies, describes and evaluates candidate

system and selects the best system for the job. An estimate is made of whether the

identified user needs may be satisfied using current software and hardware technologies.

The study will decide if the proposed system will be cost effective from a business point of 

view and if it can be developed given existing budgetary constraints. The key

considerations involved in the feasibility analysis are economic, technical, behavioural and

operational.

Economic Feasibility :

The economic analysis is to determine the benefits and savings that are expected

from a candidate system and compare them with costs.

The system is economically feasible, as the organization possesses the hardware

and software resources required for the functioning of the system. Any additional

resources, if required, can also be easily acquired.

Page 7: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 7/23

Technical Feasibility :

It centres on the existing computer system and to what extent it can support the

proposed addition.

Since the minimum requirements of the system like IIS o the server and a browser 

on the client, are met by any average user.

 

Operational Feasibility :

The system operation is the longest phase in the development life cycle of asystem. So, operational feasibility should be given much importance.

The users of the system don’t need thorough training on the system. All they are

expected to know to operate the system is the basic net surfing knowledge. It has a user-

friendly interface.

Behavioural Feasibility :

In today’s world, where computer is an inevitable entity, the systems like auction

site, which requires no special efforts than surfing the net are enjoying wide acceptance.

Thus the organization is convinced that the system is feasible.

SYSTEM DESIGN :

Input Design :

Inaccurate input data are most common cause of errors in data processing. Errors

entered by data entry operators can be controlled by input design. Input design is the

process of converting user-oriented inputs to a computer-based format. Input data are

collected and organized into groups of similar data.

The goal of designing input data is to make data entry easy, logical and free from

errors as possible. In the design of input the following steps must be considered.

Page 8: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 8/23

The allocated space for each field.

Field sequence, which must match that in the source document.

The format in which data fields are entered

We have to keep in mind the following things to design the system

What data to input

What medium to use

The dialogue to guide users in providing input

Methods for performing input validation and steps to follow

when errors occur.

Input design is a part of overall system design which requires very careful

attention. Often the collection of input data is the most expensive part of the system, in

terms of the equipment used; it is the point of most contact for the users with the computer 

system; and it is prone to error. If data going into the system is incorrect, then the

processing and output will magnify these errors. Thus the designer has a number of clear 

objectives in input design.

Output Design :

Outputs from computer systems are required primarily to communicate the result

of processing to users or sometimes to other systems, including machine – based

systems. They are also used to provide a permanent copy of these results for later 

consultation. These are various types of output required by most systems, the main ones

are:

• External Outputs :

Whose destination is outside the organization and which require

special attention because they project the image of the organization.

• Internal Outputs :

Page 9: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 9/23

Whose destination is within the organization and which require careful

design because they are the user’s among interface with the computer.

• Operational Outputs :

Whose use is purely within the computer department, e.g. program

listings, usage statistics etc.

•Interactive Outputs :

This involves the user in communicating directly with the computer.

•   Output Definition :

The outputs should be defined in terms – type of output, content,format, location, sequence.

About the Java Technology :

Java technology is both a programming language and a platform.

The Java Programming Language

The Java programming language is a high-level language that can be

characterized by all of the following buzzwords:

Simple

 Architecture

neutral

• Object Portable

Page 10: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 10/23

oriented

Distributed High performance

Multithreaded Robust

• Dynamic • Secure

 

In the Java programming language, all source code is first written in plain text

files ending with the .java extension. Those source files are then compiled into

.class files by the javac compiler. A .class file does not contain code that is

native to your processor; it instead contains bytecodes — the machine

language of the Java Virtual Machine1 (Java VM). The java launcher tool then

runs your application with an instance of the Java Virtual Machine.

 An overview of the software development process.

Because the Java VM is available on many different operating systems, the

same .class files are capable of running on Microsoft Windows, the Solaris TM

Operating System (Solaris OS), Linux, or Mac OS. This include various tasks

such as finding performance bottlenecks and recompiling (to native code)

frequently used sections of code.

Through the Java VM, the same application is capable of running on multiple

platforms.

The Java Platform

 A platform is the hardware or software environment in which a program runs.

We've already mentioned some of the most popular platforms like Microsoft

Windows, Linux, Solaris OS, and Mac OS. Most platforms can be described as

a combination of the operating system and underlying hardware. The Java

platform differs from most other platforms in that it's a software-only platform

that runs on top of other hardware-based platforms.

The Java platform has two components:

• The Java Virtual Machine 

Page 11: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 11/23

• The Java Application Programming Interface (API)

You've already been introduced to the Java Virtual Machine; it's the base for the

Java platform and is ported onto various hardware-based platforms.

The API is a large collection of ready-made software components that provide

many useful capabilities. It is grouped into libraries of related classes and

interfaces; these libraries are known as packages. The next section, What Can

Java Technology Can Do highlights some of the functionality provided by the

 API.

The API and Java Virtual Machine insulate the program from the underlying

hardware.

 As a platform-independent environment, the Java platform can be a bit slower 

than native code. However, advances in compiler and virtual machine

technologies are bringing performance close to that of native code without

threatening portability.

Java platform gives you the following features:

• Development Tools: The development tools provide everything you'll need for 

compiling, running, monitoring, debugging, and documenting your applications. As a

new developer, the main tools you'll be using are the javac compiler, the java

launcher, and the javadoc documentation tool.

• Application Programming Interface (API): The API provides the core functionality

of the Java programming language. It offers a wide array of useful classes ready for 

use in your own applications. It spans everything from basic objects, to networking

and security, to XML generation and database access, and more. The core API is

very large.

• Deployment Technologies: The JDK software provides standard mechanisms

such as the Java Web Start software and Java Plug-In software for deploying your 

applications to end users.

User Interface Toolkits: The Swing and Java 2D toolkits make it possible to createsophisticated Graphical User Interfaces (GUIs).

Page 12: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 12/23

• Integration Libraries: Integration libraries such as the Java IDL API, JDBCTM API,

Java Naming and Directory InterfaceTM ("J.N.D.I.") API, Java RMI, and Java

Remote Method Invocation over Internet Inter-ORB Protocol Technology (Java RMI-

IIOP Technology) enable database access and manipulation of remote objects.

Java technology will help you do the following:

• Get started quickly: Although the Java programming language is a powerful

object-oriented language, it's easy to learn, especially for programmers already

familiar with C or C++.

• Write less code: Comparisons of program metrics (class counts, method counts,

and so on) suggest that a program written in the Java programming language can

be four times smaller than the same program written in C++.

• Write better code: The Java programming language encourages good coding

practices, and automatic garbage collection helps you avoid memory leaks. Its

object orientation, its JavaBeansTM component architecture, and its wide-ranging,

easily extendible API let you reuse existing, tested code and introduce fewer bugs.

Develop programs more quickly: The Java programming language is simpler thanC++, and as such, your development time could be up to twice as fast when writing

in it. Your programs will also require fewer lines of code.

• Avoid platform dependencies: You can keep your program portable by avoiding

the use of libraries written in other languages.

• Write once, run anywhere: Because applications written in the Java programming

language are compiled into machine-independent bytecodes, they run consistently

on any Java platform.

• Distribute software more easily: With Java Web Start software, users will be able

to launch your applications with a single click of the mouse. An automatic version

check at startup ensures that users are always up to date with the latest version of 

your software. If an update is available, the Java Web Start software will

automatically update their installation.

JSP AND JAVA 2 Enterprise Edition:

Page 13: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 13/23

JSP is now an integral part for developing web-based applications using Java,

because of its ability to separate presentation from logic implementation by combining

standard markup text with scripting elements and object-oriented components. JSP

provides excellent front-end technology for applications that are deployed over the web.

 A key element of the J2EE Application Model is the use of the web as a preferred

mechanism for data delivery between the applications and the end user, relying on the

web browser as a primary user interface for enterprise software. A proto typical web

application can be composed from:

Java Runtime Environment(s) running in the server (required).

JSP page(s) that handle requests and generate the dynamic content.

Servlet(s) that handle request and generate dynamic content.

Server-side Java Beans components that encapsulate behavior and state.

Static HTML, DHTML, XHTML, XML and similar pages.

Client-side Java Applets, Java Beans components and arbitrary Java class

files.

Java Runtime Environment(s) (downloadable via the plugin) running in theclient(s).

  The Java Server Pages specification inherits from the servlet specification theconcepts of Applications, Contexts, Sessions, Requests and Responses.

JAVA SERVER PAGES (JSP):

JSP is a java based technology that simplifies the process of developing dynamic

web sites. With JSP, web designers and developers can quickly incorporate dynamic

elements into web pages using embedded java and simple mark-up tags. These tags

provide the HTML designer with a way to access data and business logic stored inside

 java objects. Java Server Pages are text files with the extension .jsp, which take the place

of traditional HTML pages. JSP files contain traditional HTML along with embedded code

that allows the developer to access data from the java code running on the server.

Page 14: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 14/23

JSP offers several benefits for dynamic content generation. As a Java-based

technology, it enjoys all of the advantages that the Java language provides with respect to

development and deployment. As an object-oriented language with strong typing,

encapsulation, exception handling, and automatic memory management, use of Java

leads to increased programmer productivity and more robust code. Because compiledJava bytecode is portable across all platforms that support a JVM, use of JSP does not

lock us into using a specific hardware platform, operating system, or server software. If a

switch in any of these components becomes necessary, all JSP pages and associated

Java classes can be migrated over as is. Because JSP is vendor-neutral, developers and

system architects can select best of breed solutions at all stages of JSP deployment .JSP

technology is the Java platform technology for building applications containing dynamic

web content such as HTML, DHTML, XHTML, and XML. The Java Server Pagestechnology enables the authoring of web pages that create dynamic content easily but with

maximum power and flexibility. The Java Server Pages technology offers a number of 

advantages:

Write Once, Run Anywhere properties

The Java Server Pages technology is platform independent, both in its dynamic

Web pages, its Web servers, and its underlying server components. We can author JSP

pages on any platform, run them on any Web server or Web enabled application server,

and access them from any web browser. We can also build the server components on any

platform and run them on any server.

High quality tool support

The Write Once, Run Anywhere properties of JSP allows the user to choose best-

of-breed tools. Additionally, an explicit goal of the Java Server Pages design is to enable

the creation of high portable tools.

Reuse of components and tag libraries

Page 15: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 15/23

The Java Server Pages technology emphasizes the use of reusable components

such as Java Bean components, Enterprise Java Beans components and tag libraries.

These components can be used in interactive tools for component development and page

composition. This saves considerable development time while giving the cross-platform

power and flexibility of the Java programming language and other scripting languages.

Separation of dynamic and static content

The Java Server Pages technology enables the separation of static content from

dynamic content that is inserted into the static template. This greatly simplifies the creation

of content. This separation is supported by beans specifically designed for the interaction

with server-side objects, and, specifically, by the tag extension mechanism.

Support for scripting and actions

  The Java Server Pages technology supports scripting elements as well as actions.

 Actions permit the encapsulation of useful functionality in a convenient form that can also

be manipulated by tools. Scripts provide mechanism to glue together this functionality in a

per-page manner.

Web access layer for N-tier enterprise application architecture.

The Java Server pages technology is an integral part of the Java 2Platform

Enterprise Edition (J2EE), which brings Java technology to enterprise computing. We can

now develop powerful middle-tier server applications, using a web site that uses Java

Server Pages technology as a front end to Enterprise Java Beans components in a J2EE

complaint.

JAVA SCRIPT:

JavaScript is use for validation purposes usually at the client-side, which do not

require the server. It is a programming language integrated with HTML. JavaScript

facilitates the developer with properties related to document windows, frames, forms,

Page 16: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 16/23

loaded documents and links. This scripting language also traps user events so programs

can be developed for such events. This is an interpreter-based language and source code

files are directly executed at runtime. Javascript includes built-in objects related to the

current windows and documents as well as objects such as Math, String, Date functions

respectively. Since JavaScript is an object-based language, it supports instances, methodsand properties.

The browsers support JavaScript. In JavaScript, the document object refers to

‘whatever web page the reader is currently looking through’ – which is also the document

that contains the JavaScript code. The links are objects within the document object. Date,

button, checkbox, elements array from password are the other objects available.JavaScript

statements are used to build loops into the script so that commands can be executed

several times.

Event handlers are those parts of language that tell JavaScript to send or to carry

out some actions. The event handlers go into regular HTML tags.

Can display custom dialog boxes on the screen, i.e. alert (), confirm () and

prompt ().

Have two data types – Numbers and Strings.

JavaScript has custom functions and allows user to write code to have user-

defined functions.

J2ME

Java 2 Micro Edition (J2ME) is a version of the popular Java programming

language, designed to run on devices with limited resources. It runs on a hierarchy of 

configurations, profiles and optional packages. It uses subsets of the Java Standard

Edition APIs.

• CLDC

Connected, Limited Device Configuration is a term for one of the defined

configurations of device implementing basic J2ME APIs. It is specified on grounds of 

processing power, input and output capabilities and networking functions. CLDC is one of 

Page 17: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 17/23

the most basic configurations, with only a 16-bit CPU, 160 KB memory and a limited

network connection required. There are three general APIs that are available on CLDC:

◦  java.io - Input/Output operations

◦ java.lang - Java types, system and security functions

◦ java.util - Collections classes

• MIDP

The Mobile Information Device Profile (MIDP) is one of the many profiles that can

be built on the CLDC configuration. Profiles represent a set of APIs that are implemented

on a subset of devices within a particular configuration. There are several useful Java

classes contained within MIDP:

 javax.microedition.io - Specific Input/Output operations

 javax.microedition.lcdui - User interface functions. This class defines Lists,

 Alerts Text-boxes etc. There are different levels of abstraction available from

high level forms and widgets, down to specific painting routines on the

canvas classes.

 javax.microedition.rms - Record Management System.

  javax.microedition.midlet - Forms the basic classes for programming a

J2ME application.

• MIDlets

 A MIDlet is a basic J2ME program package. Each deployable J2ME program comes

in a .jar file, packaging both the classes and resources that the program needs. The

distribution should come with a Java Application Description file. The JAR file needs to go

under a pre-verification process after compilation. When Java 2 Standard Edition (J2SE)

programs are run the Java Virtual Machine verifies the program before it is run. There is a

reasonably substantial overhead in doing so, which would not be suitable for devices with

limited resources. Pre-verification performs some checks on the MIDlet before it is deployed,

thus reducing the processing burden on the device. MIDlets have annotations within their 

code as marked by the pre-verifier, so that the device can be sure that the code has

undergone the process.

MIDlet

{abstract class} CommandListener

{interface}

Page 18: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 18/23

 

Interface Class Functions used in our project are:

public void startApp(void) : The function is declared in the MIDlet class and is

the first function called in any J2ME application. It is defined in the Interface

class for initializing the forms and commands in the Bluetooth Network

application.

public void pauseApp(void): This function is called when the application

paused or temporarily stopped.

public void destroyApp(void): This function terminates the application. Both

these functions have been declared in MIDlet abstract class and have to be

redefined by the inheriting class.

public void commandAction(Command c, Displayable d): The

commandAction() is called whenever a command is selected by the user 

through the interface. The function defines the actions to be performed

corresponding to each command.

HTML:

HTML stands for Hyper Text Markup Language, which is an application of Standard

Generalized Markup Language (SGML). It is a simple language used to define and

describe the layout of a web page.HTML supports Multimedia and document links.

Interface Class

+startApp():void

+pauseApp(): void

+destroyApp(boolean):void

+commandAction():void

Message Class

object ClientServer Class

object 

Page 19: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 19/23

HTML consists of special codes which when embedded in text, adds formatting.

The special characters which separate HTML from ordinary text are the left and right

brackets (< >). These brackets contain instructions known as TAGS which are not case

sensitive.HTML, similar to a computer programming language or a script language

requires you to express your thoughts in a specific structure; its purpose is to transmit thestructure of documents between the users.

HTML was developed to force you to think about document structure rather than

document appearance because of the Web’s focus on being a cross platform.

ADVANTAGES OF HTML :

HTML files are compatible with any web browser. That is HTML documents are

system-independent, and they can be displayed on any computer that supports HTML.

HTML is based on structure rather than on appearance. So an HTML author can

define a numbered list, and the users can specify whether they wish to view that list with

Roman or Arabic numerals. This provides users with more flexibility in how a document is

viewed.

HTML files are small. The tags used to describe an HTML file have little overhead.

Tags are instructions to the browser software that tell how to display text and are easy to

learn

My SQL :

MySQL database has become the world's most popular Open source database

because of its consistency, fast performance, high reliability and ease of use. It has also

become the database of choice for a new generation of applications built on the LAMP

stack (Linux, Apache, MySQL, PHP / Perl / Python). MySQL runs on more than 20

platforms including Linux, Windows, OS/X, HP-UX, AIX, Netware, giving you the kind of 

flexibility that puts you in control. MySQL offers a comprehensive range of certified

software, support, training and consulting.

Page 20: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 20/23

MySQL is a multithreaded, multi-user SQL Database Management System. My

SQL's implementation of a relational database is an abstraction on top of a computer’s file

system. The relational database abstraction allows collection of data items to be organized

as a set of formally described tables. Data can be accessed or reassembled from these

tables in many different ways, which do not require any reorganization of the databasetables themselves.

Relational database speak SQL (Structured Query Language). SQL is a standard

interactive programming language for getting information from and updating a relational

database. Although SQL itself is both an ANSI and an ISO standard, many database

products support SQL with proprietary extensions to the standard language. MySQL's

extensions to SQL are not proprietary, since MySQL's code is kept free (as in the user's

library to use hte code) by the GPL. SQL queries take the form of a command languagethat lets you select, insert, update, find out the location of data, and so forth.

My SQL Features :

Very fast and much reliable for any type of application.

Very lightweight application.

Command line tool is very powerful and can be used to run SQL queries

against database.

Supports indexing and binary objects.

 Allows changing the structure of table while server is running.

It has a wide user base.

It is a very fast thread-based memory allocation system.

JAVA MAIL API :

The JavaMail API is an optional package (standard extension) for reading,

composing, and sending electronic messages. This package is used to create Mail User 

  Agent (MUA) type programs, similar to Microsoft Outlook. Its main purpose is not for 

transporting, delivering, and forwarding messages like sendmail or other Mail Transfer 

 Agent (MTA) type programs. In other words, users interact with MUA-type programs to

read and write emails. MUAs rely on MTAs to handle the actual delivery.

Page 21: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 21/23

The JavaMail API is designed to provide protocol-independent access for sending

and receiving messages by dividing the API into two parts. The first part of the API is how

to send and receive messages independent of the provider/ protocol. The second part

speaks the protocol-specific languages, like SMTP, POP, IMAP, and NNTP. With the

JavaMail API, in order to communicate with a server, you need a provider  for a protocol.

SYSTEM IMPLEMENTATION AND TESTING

System Testing :

When a system is developed it is hoped that it performs properly. In practice

however some errors always occur. The main purpose of testing an information system is

to find the errors and correct them. A successful test is one which finds an error. The main

objectives of the system testing are

To ensure during operation the system will perform as per specification.

To make sure that the system meets user requirements during operation.

To verify that the controls incorporated in the system function as intended.

To see that when correct inputs are fed to the system and the outputs are

correct.

To make sure that during operation incorrect input processing and output will

be deleted.

Software testing is a critical element of software quality assurance and

represents the ultimate review of specification , design and coding . If the testing

conducted successfully, it will uncover errors in the software. As a secondary benefit,

testing demonstrates that the software functions appear to be working according to

specification and that performance requirements appear to have been made.

The scope of the system test should include both manual operations and

computer operations system testing is comprehensive evaluation of the programs

manual procedures ,computer operations and control.

System testing is the process of checking if the developed system is workingaccording to the original objectives and requirements. All the testing needs to be

Page 22: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 22/23

conducted in accordance to the test conditions specified earlier.

Unit testing :

In this test focus on each modules meandering User Management, Web Services,

Mail, SMS, Feedback of the system individually, ensuring that it function properly as an

individual unit according to solve the requirement of a particular module. In unit testing

control path are tested to uncover errors in the boundary of the module.

Integration testing :

Here this Integration testing is done by assembling Web Services, Mail, SMS

together. This Systematic technique for constructing the program structure while at the

same time conducting test to uncover errors to associate with interfacing.

Acceptance testing :

The system is validated by negotiating the existing and proposed system. This test

evaluates the system in the real time environment with live data and finds it to be satisfied.

This is done by the user. The various possibilities of the data are entered and response

from the system is tested once the acceptance testing is signed off by the user.

System Implementation :

 After the system has been tested, the implementation type or the change over 

technique from the existing system to the new system is a step-by-step process. In the

system at first only a module of the system is implemented and checked for suitability

and efficiency. When the end user related to the particular module is satisfied with the

performance, the next step of implementation is preceded.

Implementation to some extent is also parallel. For instance, modules which are

not linked, with other modules are implemented parallel and the training is the step-by

-step process.

Backups are necessary since any time unexpected events may happen. And so

during the program execution, the records are stored in the workspace. This helps to

Page 23: Mabs Report

8/2/2019 Mabs Report

http://slidepdf.com/reader/full/mabs-report 23/23

recover the original status of the records from any accidental updation or intentional

deletion of records.

SYSTEM MAINTANANCE :

Maintenance of the software is one of major step in the computer animation.

Software which is developed by the engineer, should undergo maintenance process in

regular interval of time goes on new problems arise and it must be corrected accordingly.

Maintenance and enhancement are a long term process.

In this project, the maintenance is carried over by the staff concern. Since they are

the key persons to develop this project they know clearly about the project and coding

structure. So, they will change the coding whenever required. Regarding the projectmaintenance, the changes will occur then and there according to the conditions.

Various types of maintenance that can be made are:

Corrective maintenance

 Adaptive maintenance

Prefecture maintenance

Reverse engineering

Re engineering

The staff in the concern are parted each and every level of the project. So they

don’t need any training of the software. During the development process they sit and

entered each and every entry to test the project. They themselves used this is an

opportunities to take training in the software so extra training is not needed for the user.