Upload
amritha-alex
View
220
Download
0
Embed Size (px)
Citation preview
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 1/23
Introduction :
Multicast is an efficient method to deliver multimedia content from a sender to a
group of receivers and is gaining popular applications such as realtime stock quotes,
interactive games, video conference, live videobroadcast, or video on demand. A multicast
authentication provides three services mainly. They are Data integrity, Data origin
authentication and Nonrepudiation. All the three services can be supported by a technique
called signature. In an ideal case, the sender generates a signature for each packet with
its private key,which is called signing, and each receiver checks the validity of the
signature with the sender’s public key, which is called verifying. If the verification
succeeds, the receiverknows the packet is authentic.
Designing a multicast authentication protocol is not an easy as, there are following
issues in real world challenging the design. First, efficiency needs to beconsidered,
especially for receivers. Second is the packet loss that happens during the implementation
phase. Therefore, for applicationswhere the quality of service is critical to end users, a
multicast authentication protocol should provide a certain level of resilience to packet loss.
Specifically, the impact of packet loss on the authenticity ofthe already-received packets
should be as small as possible.
Here we are trying to implement a multicast authenticaton protocol that will not be
asy for the hackers to hack but also at the same time the proposed system will be resilient
to packet loss but in the case of efficiency and flexibility more advantageous than the
conventional system.
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 2/23
Literature Survey :
Different types of readers that the document is intended for are, application
developer, project managers, marketing staff, users of networking environment, testers,
and documentation writers. The next section, the Overall Description of this document
gives an overview of the functionality of the product. It describes the informal requirements
and is used to establish a context for the technical requirements specification in the next
chapter. The third section, Requirements Specification, of this document is written primarily
for the developers and describes in technical terms the details of the functionality of the
product. Both sections of the document describe the same software product in its entirety,
but are intended for different audiences and thus use different language.
Here in the proposed system multicast authentication protocol, namely MABS,
including two schemes. The basic scheme (MABS-B) eliminates the correlation among
packets and thus provides the perfect resilience to packet loss, and it is also efficient in
terms of latency,computation, and communication overhead due to an efficient
cryptographic primitive called batch signature, which supports the authentication of any
number of packets simultaneously. We also present an enhanced scheme MABS-E, which
combines the basic schemewith a packet filtering mechanism to alleviate the DoS impact
while preventing packet loss.
Conventional block-based multicast authentication schemes overlook the
heterogeneity of receivers by letting the sender choose the block size, divide a multicast
stream into blocks, associate each block with a signature, and spread the effect of the`
signature across all the packets in the block through hash graphs or coding algorithms.
The correlationamong packets makes them vulnerable to packet loss, which is inherent in
the Internet and wireless networks. Here we are trying to eliminates the correlation among
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 3/23
packets and thus provides the perfect resilience to packet loss and an enhanced scheme
which combines the basic scheme with a packet filtering mechanism to reduce the DoS
impact while preserving the perfect resilience to packet loss.
Purpose :
Conventional block-based multicast authentication schemes overlook the
heterogeneity of receivers by letting the sender choose the block size, divide a multicast
stream into blocks, associate each block with a signature, and spread the effect of the
signature across all the packets in the block through hash graphs or coding algorithms.
The correlation among packets makes them vulnerable to packet loss, which is inherent in
the Internet and wireless networks. Here we are trying to eliminates the correlation among
packets and thus provides the perfect resilience to packet loss and an enhanced scheme
which combines the basic scheme with a packet filtering mechanism to alleviate the DoS
impact while preserving the perfect resilience to packet loss.
Scope :
The proposed system is capable of implementing signature on packets and thereby
implementing security. The correlation of the packets in the case of signature is the
drawback in conventional case which is eliminated in the proposed system.
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 4/23
Product Perspective :
Multicast is an efficient method to deliver multimedia content from a sender to a
group of receivers and is gaining popular applications such as real-time stock quotes,
interactive games, video conference, live video broadcast, or video on demand.
Product Function :
Here in the proposed system multicast authentication protocol, namely MABS,
including two schemes. The basic scheme (MABS-B) eliminates the correlation among
packets and thus provides the perfect resilience to packet loss, and it is also efficient in
terms of latency, computation, and communication overhead due to an efficient
cryptographic primitive called batch signature, which supports the authentication of any
number of packets simultaneously. We also present an enhanced scheme MABS-E, which
combines the basic scheme with a packet filtering mechanism to alleviate the DoS impact
while preserving the perfect resilience to packet loss.
Hardware and Software Interface :
Software Interfaces :
• Front end : Java
• Back end : My SQL
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 5/23
• Operating system : LINUX
• IDE : Net Beans
Hardware Interfaces :
• Processor : Pentium IV OR Above
• Primary Memory : 256 MB RAM
• Hard Disk : 40 GB Hard Disk
• Display : EGA/VGA Color Monitor
• Frequency : 3 MHz
•
Key Board : Windows/Linux compatible
• Mouse : Windows/Linux compatible
User Interfaces :
The user interface is provided such that firstly the user has to login for using the
facilities provided by the application. A help menu will also be provided in the main window.
A login option is provided where the user has to enter password. The password is
validated and the user gets access to the application. Options for transferring, receiving
and reports are provided in the application. User is also provided with an option to change
password. After carrying out intended operations user is logged out using logout option.
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 6/23
User Documentation :
A help menu will be provided in the interface. This menu driven support facilitates
user to use the facilities provided by the software and describes the initial user how to
move through the application.
Assumptions and Dependencies :
•
Proper network connection is necessary between the computers for the proper working of the system.
• The proposed system must be installed correctly.
Feasibility Study :
Feasibility study is a procedure that identifies, describes and evaluates candidate
system and selects the best system for the job. An estimate is made of whether the
identified user needs may be satisfied using current software and hardware technologies.
The study will decide if the proposed system will be cost effective from a business point of
view and if it can be developed given existing budgetary constraints. The key
considerations involved in the feasibility analysis are economic, technical, behavioural and
operational.
Economic Feasibility :
The economic analysis is to determine the benefits and savings that are expected
from a candidate system and compare them with costs.
The system is economically feasible, as the organization possesses the hardware
and software resources required for the functioning of the system. Any additional
resources, if required, can also be easily acquired.
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 7/23
Technical Feasibility :
It centres on the existing computer system and to what extent it can support the
proposed addition.
Since the minimum requirements of the system like IIS o the server and a browser
on the client, are met by any average user.
Operational Feasibility :
The system operation is the longest phase in the development life cycle of asystem. So, operational feasibility should be given much importance.
The users of the system don’t need thorough training on the system. All they are
expected to know to operate the system is the basic net surfing knowledge. It has a user-
friendly interface.
Behavioural Feasibility :
In today’s world, where computer is an inevitable entity, the systems like auction
site, which requires no special efforts than surfing the net are enjoying wide acceptance.
Thus the organization is convinced that the system is feasible.
SYSTEM DESIGN :
Input Design :
Inaccurate input data are most common cause of errors in data processing. Errors
entered by data entry operators can be controlled by input design. Input design is the
process of converting user-oriented inputs to a computer-based format. Input data are
collected and organized into groups of similar data.
The goal of designing input data is to make data entry easy, logical and free from
errors as possible. In the design of input the following steps must be considered.
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 8/23
The allocated space for each field.
Field sequence, which must match that in the source document.
The format in which data fields are entered
We have to keep in mind the following things to design the system
What data to input
What medium to use
The dialogue to guide users in providing input
Methods for performing input validation and steps to follow
when errors occur.
Input design is a part of overall system design which requires very careful
attention. Often the collection of input data is the most expensive part of the system, in
terms of the equipment used; it is the point of most contact for the users with the computer
system; and it is prone to error. If data going into the system is incorrect, then the
processing and output will magnify these errors. Thus the designer has a number of clear
objectives in input design.
Output Design :
Outputs from computer systems are required primarily to communicate the result
of processing to users or sometimes to other systems, including machine – based
systems. They are also used to provide a permanent copy of these results for later
consultation. These are various types of output required by most systems, the main ones
are:
• External Outputs :
Whose destination is outside the organization and which require
special attention because they project the image of the organization.
• Internal Outputs :
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 9/23
Whose destination is within the organization and which require careful
design because they are the user’s among interface with the computer.
• Operational Outputs :
Whose use is purely within the computer department, e.g. program
listings, usage statistics etc.
•Interactive Outputs :
This involves the user in communicating directly with the computer.
• Output Definition :
The outputs should be defined in terms – type of output, content,format, location, sequence.
About the Java Technology :
Java technology is both a programming language and a platform.
The Java Programming Language
The Java programming language is a high-level language that can be
characterized by all of the following buzzwords:
Simple
Architecture
neutral
• Object Portable
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 10/23
oriented
Distributed High performance
Multithreaded Robust
• Dynamic • Secure
In the Java programming language, all source code is first written in plain text
files ending with the .java extension. Those source files are then compiled into
.class files by the javac compiler. A .class file does not contain code that is
native to your processor; it instead contains bytecodes — the machine
language of the Java Virtual Machine1 (Java VM). The java launcher tool then
runs your application with an instance of the Java Virtual Machine.
An overview of the software development process.
Because the Java VM is available on many different operating systems, the
same .class files are capable of running on Microsoft Windows, the Solaris TM
Operating System (Solaris OS), Linux, or Mac OS. This include various tasks
such as finding performance bottlenecks and recompiling (to native code)
frequently used sections of code.
Through the Java VM, the same application is capable of running on multiple
platforms.
The Java Platform
A platform is the hardware or software environment in which a program runs.
We've already mentioned some of the most popular platforms like Microsoft
Windows, Linux, Solaris OS, and Mac OS. Most platforms can be described as
a combination of the operating system and underlying hardware. The Java
platform differs from most other platforms in that it's a software-only platform
that runs on top of other hardware-based platforms.
The Java platform has two components:
• The Java Virtual Machine
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 11/23
• The Java Application Programming Interface (API)
You've already been introduced to the Java Virtual Machine; it's the base for the
Java platform and is ported onto various hardware-based platforms.
The API is a large collection of ready-made software components that provide
many useful capabilities. It is grouped into libraries of related classes and
interfaces; these libraries are known as packages. The next section, What Can
Java Technology Can Do highlights some of the functionality provided by the
API.
The API and Java Virtual Machine insulate the program from the underlying
hardware.
As a platform-independent environment, the Java platform can be a bit slower
than native code. However, advances in compiler and virtual machine
technologies are bringing performance close to that of native code without
threatening portability.
Java platform gives you the following features:
• Development Tools: The development tools provide everything you'll need for
compiling, running, monitoring, debugging, and documenting your applications. As a
new developer, the main tools you'll be using are the javac compiler, the java
launcher, and the javadoc documentation tool.
• Application Programming Interface (API): The API provides the core functionality
of the Java programming language. It offers a wide array of useful classes ready for
use in your own applications. It spans everything from basic objects, to networking
and security, to XML generation and database access, and more. The core API is
very large.
• Deployment Technologies: The JDK software provides standard mechanisms
such as the Java Web Start software and Java Plug-In software for deploying your
applications to end users.
•
User Interface Toolkits: The Swing and Java 2D toolkits make it possible to createsophisticated Graphical User Interfaces (GUIs).
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 12/23
• Integration Libraries: Integration libraries such as the Java IDL API, JDBCTM API,
Java Naming and Directory InterfaceTM ("J.N.D.I.") API, Java RMI, and Java
Remote Method Invocation over Internet Inter-ORB Protocol Technology (Java RMI-
IIOP Technology) enable database access and manipulation of remote objects.
Java technology will help you do the following:
• Get started quickly: Although the Java programming language is a powerful
object-oriented language, it's easy to learn, especially for programmers already
familiar with C or C++.
• Write less code: Comparisons of program metrics (class counts, method counts,
and so on) suggest that a program written in the Java programming language can
be four times smaller than the same program written in C++.
• Write better code: The Java programming language encourages good coding
practices, and automatic garbage collection helps you avoid memory leaks. Its
object orientation, its JavaBeansTM component architecture, and its wide-ranging,
easily extendible API let you reuse existing, tested code and introduce fewer bugs.
•
Develop programs more quickly: The Java programming language is simpler thanC++, and as such, your development time could be up to twice as fast when writing
in it. Your programs will also require fewer lines of code.
• Avoid platform dependencies: You can keep your program portable by avoiding
the use of libraries written in other languages.
• Write once, run anywhere: Because applications written in the Java programming
language are compiled into machine-independent bytecodes, they run consistently
on any Java platform.
• Distribute software more easily: With Java Web Start software, users will be able
to launch your applications with a single click of the mouse. An automatic version
check at startup ensures that users are always up to date with the latest version of
your software. If an update is available, the Java Web Start software will
automatically update their installation.
JSP AND JAVA 2 Enterprise Edition:
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 13/23
JSP is now an integral part for developing web-based applications using Java,
because of its ability to separate presentation from logic implementation by combining
standard markup text with scripting elements and object-oriented components. JSP
provides excellent front-end technology for applications that are deployed over the web.
A key element of the J2EE Application Model is the use of the web as a preferred
mechanism for data delivery between the applications and the end user, relying on the
web browser as a primary user interface for enterprise software. A proto typical web
application can be composed from:
Java Runtime Environment(s) running in the server (required).
JSP page(s) that handle requests and generate the dynamic content.
Servlet(s) that handle request and generate dynamic content.
Server-side Java Beans components that encapsulate behavior and state.
Static HTML, DHTML, XHTML, XML and similar pages.
Client-side Java Applets, Java Beans components and arbitrary Java class
files.
Java Runtime Environment(s) (downloadable via the plugin) running in theclient(s).
The Java Server Pages specification inherits from the servlet specification theconcepts of Applications, Contexts, Sessions, Requests and Responses.
JAVA SERVER PAGES (JSP):
JSP is a java based technology that simplifies the process of developing dynamic
web sites. With JSP, web designers and developers can quickly incorporate dynamic
elements into web pages using embedded java and simple mark-up tags. These tags
provide the HTML designer with a way to access data and business logic stored inside
java objects. Java Server Pages are text files with the extension .jsp, which take the place
of traditional HTML pages. JSP files contain traditional HTML along with embedded code
that allows the developer to access data from the java code running on the server.
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 14/23
JSP offers several benefits for dynamic content generation. As a Java-based
technology, it enjoys all of the advantages that the Java language provides with respect to
development and deployment. As an object-oriented language with strong typing,
encapsulation, exception handling, and automatic memory management, use of Java
leads to increased programmer productivity and more robust code. Because compiledJava bytecode is portable across all platforms that support a JVM, use of JSP does not
lock us into using a specific hardware platform, operating system, or server software. If a
switch in any of these components becomes necessary, all JSP pages and associated
Java classes can be migrated over as is. Because JSP is vendor-neutral, developers and
system architects can select best of breed solutions at all stages of JSP deployment .JSP
technology is the Java platform technology for building applications containing dynamic
web content such as HTML, DHTML, XHTML, and XML. The Java Server Pagestechnology enables the authoring of web pages that create dynamic content easily but with
maximum power and flexibility. The Java Server Pages technology offers a number of
advantages:
Write Once, Run Anywhere properties
The Java Server Pages technology is platform independent, both in its dynamic
Web pages, its Web servers, and its underlying server components. We can author JSP
pages on any platform, run them on any Web server or Web enabled application server,
and access them from any web browser. We can also build the server components on any
platform and run them on any server.
High quality tool support
The Write Once, Run Anywhere properties of JSP allows the user to choose best-
of-breed tools. Additionally, an explicit goal of the Java Server Pages design is to enable
the creation of high portable tools.
Reuse of components and tag libraries
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 15/23
The Java Server Pages technology emphasizes the use of reusable components
such as Java Bean components, Enterprise Java Beans components and tag libraries.
These components can be used in interactive tools for component development and page
composition. This saves considerable development time while giving the cross-platform
power and flexibility of the Java programming language and other scripting languages.
Separation of dynamic and static content
The Java Server Pages technology enables the separation of static content from
dynamic content that is inserted into the static template. This greatly simplifies the creation
of content. This separation is supported by beans specifically designed for the interaction
with server-side objects, and, specifically, by the tag extension mechanism.
Support for scripting and actions
The Java Server Pages technology supports scripting elements as well as actions.
Actions permit the encapsulation of useful functionality in a convenient form that can also
be manipulated by tools. Scripts provide mechanism to glue together this functionality in a
per-page manner.
Web access layer for N-tier enterprise application architecture.
The Java Server pages technology is an integral part of the Java 2Platform
Enterprise Edition (J2EE), which brings Java technology to enterprise computing. We can
now develop powerful middle-tier server applications, using a web site that uses Java
Server Pages technology as a front end to Enterprise Java Beans components in a J2EE
complaint.
JAVA SCRIPT:
JavaScript is use for validation purposes usually at the client-side, which do not
require the server. It is a programming language integrated with HTML. JavaScript
facilitates the developer with properties related to document windows, frames, forms,
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 16/23
loaded documents and links. This scripting language also traps user events so programs
can be developed for such events. This is an interpreter-based language and source code
files are directly executed at runtime. Javascript includes built-in objects related to the
current windows and documents as well as objects such as Math, String, Date functions
respectively. Since JavaScript is an object-based language, it supports instances, methodsand properties.
The browsers support JavaScript. In JavaScript, the document object refers to
‘whatever web page the reader is currently looking through’ – which is also the document
that contains the JavaScript code. The links are objects within the document object. Date,
button, checkbox, elements array from password are the other objects available.JavaScript
statements are used to build loops into the script so that commands can be executed
several times.
Event handlers are those parts of language that tell JavaScript to send or to carry
out some actions. The event handlers go into regular HTML tags.
Can display custom dialog boxes on the screen, i.e. alert (), confirm () and
prompt ().
Have two data types – Numbers and Strings.
JavaScript has custom functions and allows user to write code to have user-
defined functions.
J2ME
Java 2 Micro Edition (J2ME) is a version of the popular Java programming
language, designed to run on devices with limited resources. It runs on a hierarchy of
configurations, profiles and optional packages. It uses subsets of the Java Standard
Edition APIs.
• CLDC
Connected, Limited Device Configuration is a term for one of the defined
configurations of device implementing basic J2ME APIs. It is specified on grounds of
processing power, input and output capabilities and networking functions. CLDC is one of
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 17/23
the most basic configurations, with only a 16-bit CPU, 160 KB memory and a limited
network connection required. There are three general APIs that are available on CLDC:
◦ java.io - Input/Output operations
◦ java.lang - Java types, system and security functions
◦ java.util - Collections classes
• MIDP
The Mobile Information Device Profile (MIDP) is one of the many profiles that can
be built on the CLDC configuration. Profiles represent a set of APIs that are implemented
on a subset of devices within a particular configuration. There are several useful Java
classes contained within MIDP:
javax.microedition.io - Specific Input/Output operations
javax.microedition.lcdui - User interface functions. This class defines Lists,
Alerts Text-boxes etc. There are different levels of abstraction available from
high level forms and widgets, down to specific painting routines on the
canvas classes.
javax.microedition.rms - Record Management System.
javax.microedition.midlet - Forms the basic classes for programming a
J2ME application.
• MIDlets
A MIDlet is a basic J2ME program package. Each deployable J2ME program comes
in a .jar file, packaging both the classes and resources that the program needs. The
distribution should come with a Java Application Description file. The JAR file needs to go
under a pre-verification process after compilation. When Java 2 Standard Edition (J2SE)
programs are run the Java Virtual Machine verifies the program before it is run. There is a
reasonably substantial overhead in doing so, which would not be suitable for devices with
limited resources. Pre-verification performs some checks on the MIDlet before it is deployed,
thus reducing the processing burden on the device. MIDlets have annotations within their
code as marked by the pre-verifier, so that the device can be sure that the code has
undergone the process.
MIDlet
{abstract class} CommandListener
{interface}
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 18/23
Interface Class Functions used in our project are:
public void startApp(void) : The function is declared in the MIDlet class and is
the first function called in any J2ME application. It is defined in the Interface
class for initializing the forms and commands in the Bluetooth Network
application.
public void pauseApp(void): This function is called when the application
paused or temporarily stopped.
public void destroyApp(void): This function terminates the application. Both
these functions have been declared in MIDlet abstract class and have to be
redefined by the inheriting class.
public void commandAction(Command c, Displayable d): The
commandAction() is called whenever a command is selected by the user
through the interface. The function defines the actions to be performed
corresponding to each command.
HTML:
HTML stands for Hyper Text Markup Language, which is an application of Standard
Generalized Markup Language (SGML). It is a simple language used to define and
describe the layout of a web page.HTML supports Multimedia and document links.
Interface Class
+startApp():void
+pauseApp(): void
+destroyApp(boolean):void
+commandAction():void
Message Class
object ClientServer Class
object
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 19/23
HTML consists of special codes which when embedded in text, adds formatting.
The special characters which separate HTML from ordinary text are the left and right
brackets (< >). These brackets contain instructions known as TAGS which are not case
sensitive.HTML, similar to a computer programming language or a script language
requires you to express your thoughts in a specific structure; its purpose is to transmit thestructure of documents between the users.
HTML was developed to force you to think about document structure rather than
document appearance because of the Web’s focus on being a cross platform.
ADVANTAGES OF HTML :
HTML files are compatible with any web browser. That is HTML documents are
system-independent, and they can be displayed on any computer that supports HTML.
HTML is based on structure rather than on appearance. So an HTML author can
define a numbered list, and the users can specify whether they wish to view that list with
Roman or Arabic numerals. This provides users with more flexibility in how a document is
viewed.
HTML files are small. The tags used to describe an HTML file have little overhead.
Tags are instructions to the browser software that tell how to display text and are easy to
learn
My SQL :
MySQL database has become the world's most popular Open source database
because of its consistency, fast performance, high reliability and ease of use. It has also
become the database of choice for a new generation of applications built on the LAMP
stack (Linux, Apache, MySQL, PHP / Perl / Python). MySQL runs on more than 20
platforms including Linux, Windows, OS/X, HP-UX, AIX, Netware, giving you the kind of
flexibility that puts you in control. MySQL offers a comprehensive range of certified
software, support, training and consulting.
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 20/23
MySQL is a multithreaded, multi-user SQL Database Management System. My
SQL's implementation of a relational database is an abstraction on top of a computer’s file
system. The relational database abstraction allows collection of data items to be organized
as a set of formally described tables. Data can be accessed or reassembled from these
tables in many different ways, which do not require any reorganization of the databasetables themselves.
Relational database speak SQL (Structured Query Language). SQL is a standard
interactive programming language for getting information from and updating a relational
database. Although SQL itself is both an ANSI and an ISO standard, many database
products support SQL with proprietary extensions to the standard language. MySQL's
extensions to SQL are not proprietary, since MySQL's code is kept free (as in the user's
library to use hte code) by the GPL. SQL queries take the form of a command languagethat lets you select, insert, update, find out the location of data, and so forth.
My SQL Features :
Very fast and much reliable for any type of application.
Very lightweight application.
Command line tool is very powerful and can be used to run SQL queries
against database.
Supports indexing and binary objects.
Allows changing the structure of table while server is running.
It has a wide user base.
It is a very fast thread-based memory allocation system.
JAVA MAIL API :
The JavaMail API is an optional package (standard extension) for reading,
composing, and sending electronic messages. This package is used to create Mail User
Agent (MUA) type programs, similar to Microsoft Outlook. Its main purpose is not for
transporting, delivering, and forwarding messages like sendmail or other Mail Transfer
Agent (MTA) type programs. In other words, users interact with MUA-type programs to
read and write emails. MUAs rely on MTAs to handle the actual delivery.
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 21/23
The JavaMail API is designed to provide protocol-independent access for sending
and receiving messages by dividing the API into two parts. The first part of the API is how
to send and receive messages independent of the provider/ protocol. The second part
speaks the protocol-specific languages, like SMTP, POP, IMAP, and NNTP. With the
JavaMail API, in order to communicate with a server, you need a provider for a protocol.
SYSTEM IMPLEMENTATION AND TESTING
System Testing :
When a system is developed it is hoped that it performs properly. In practice
however some errors always occur. The main purpose of testing an information system is
to find the errors and correct them. A successful test is one which finds an error. The main
objectives of the system testing are
To ensure during operation the system will perform as per specification.
To make sure that the system meets user requirements during operation.
To verify that the controls incorporated in the system function as intended.
To see that when correct inputs are fed to the system and the outputs are
correct.
To make sure that during operation incorrect input processing and output will
be deleted.
Software testing is a critical element of software quality assurance and
represents the ultimate review of specification , design and coding . If the testing
conducted successfully, it will uncover errors in the software. As a secondary benefit,
testing demonstrates that the software functions appear to be working according to
specification and that performance requirements appear to have been made.
The scope of the system test should include both manual operations and
computer operations system testing is comprehensive evaluation of the programs
manual procedures ,computer operations and control.
System testing is the process of checking if the developed system is workingaccording to the original objectives and requirements. All the testing needs to be
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 22/23
conducted in accordance to the test conditions specified earlier.
Unit testing :
In this test focus on each modules meandering User Management, Web Services,
Mail, SMS, Feedback of the system individually, ensuring that it function properly as an
individual unit according to solve the requirement of a particular module. In unit testing
control path are tested to uncover errors in the boundary of the module.
Integration testing :
Here this Integration testing is done by assembling Web Services, Mail, SMS
together. This Systematic technique for constructing the program structure while at the
same time conducting test to uncover errors to associate with interfacing.
Acceptance testing :
The system is validated by negotiating the existing and proposed system. This test
evaluates the system in the real time environment with live data and finds it to be satisfied.
This is done by the user. The various possibilities of the data are entered and response
from the system is tested once the acceptance testing is signed off by the user.
System Implementation :
After the system has been tested, the implementation type or the change over
technique from the existing system to the new system is a step-by-step process. In the
system at first only a module of the system is implemented and checked for suitability
and efficiency. When the end user related to the particular module is satisfied with the
performance, the next step of implementation is preceded.
Implementation to some extent is also parallel. For instance, modules which are
not linked, with other modules are implemented parallel and the training is the step-by
-step process.
Backups are necessary since any time unexpected events may happen. And so
during the program execution, the records are stored in the workspace. This helps to
8/2/2019 Mabs Report
http://slidepdf.com/reader/full/mabs-report 23/23
recover the original status of the records from any accidental updation or intentional
deletion of records.
SYSTEM MAINTANANCE :
Maintenance of the software is one of major step in the computer animation.
Software which is developed by the engineer, should undergo maintenance process in
regular interval of time goes on new problems arise and it must be corrected accordingly.
Maintenance and enhancement are a long term process.
In this project, the maintenance is carried over by the staff concern. Since they are
the key persons to develop this project they know clearly about the project and coding
structure. So, they will change the coding whenever required. Regarding the projectmaintenance, the changes will occur then and there according to the conditions.
Various types of maintenance that can be made are:
Corrective maintenance
Adaptive maintenance
Prefecture maintenance
Reverse engineering
Re engineering
The staff in the concern are parted each and every level of the project. So they
don’t need any training of the software. During the development process they sit and
entered each and every entry to test the project. They themselves used this is an
opportunities to take training in the software so extra training is not needed for the user.