cyber cafe management system - java - Last modified

CHAPTER NO. TITLE. PAGE NO. SYNOPSIS. 1. INTRODUCTION. 2. 2.
SOFTWARE ENVIRONMENT. 3. 2.1 SOFTWARE SELECTION. 3. 3. SYSTEM
ANALYSIS. 5 .... Before Java, programmers had to write their code for each
targeted operating system (OS). ..... Exercises all logical decisions on their true or
false sides.

Part of the document



1



Mini Project
On
Cyber Cafe Management System



[pic]


2010



Submitted in partial fulfilment of the requirement for the award of
Bachelor of Technology degree course in Information Technology

By,

Dhanoop Bhaskar
Bibinkumar T
Gopikrishnan A N
Ramesh T R



DEPARTMENT OF INFORMATION TECHNOLOGY
UNIVERSITY COLLEGE OF ENGINEERING
THODUPUZHA-685584

UNIVERSITY COLLEGE OF ENGINEERING
THODUPUZHA
IDUKKI DISTRICT, KERALA-685584
[pic]

Department of Information Technology



2 CERTIFICATE



This is to certify that the report of mini
project titled CYBER CAFE MANAGEMENT SYSTEM is the bona fide record of the
work executed by DHANOOP BHASKAR, BIBINKUMAR T, GOPIKRISHNAN A.N, RAMESH
T.R of sixth semester INFORMATION TECHNOLOGY, in partial fulfilment of the
requirement for the award of Bachelor of Technology degree course under
M.G University during the academic year 2007-2011


Staff in-charge Head of Department


Internal Examiner External Examiner


Thodupuzha


Date..........


ACKNOWLEDGEMENT


On the occasion of presenting this project report, we wish
to express our deep and profound feelings of gratitude to a number of
persons who have contributed to the completion of this project.
First of all we express our deep gratitude to Almighty, the
supreme guide, for bestowing his blessings upon us in our entire
endeavor.
We are grateful to our respected Principal Dr. Lathakumari
B for providing all facilities for the development of our project.
We also express our heartfelt gratitude to Mrs. Bindu Baby
Thomas our Head of the Department for rendering all possible help and
support during the development, implementation and presentation of the
project.
We are extremely grateful to Mr. Sijo Thomas lecturer-in-
charge of our project for his valuable guidance and encouragement
throughout our humble endeavor.

TABLE OF CONTENTS
|CHAPTER NO. |TITLE |PAGE NO. |
| |SYNOPSIS | |
|1. |INTRODUCTION |2 |
|2. |SOFTWARE ENVIRONMENT |3 |
| |2.1 SOFTWARE SELECTION |3 |
|3. |SYSTEM ANALYSIS |5 |
| |3.1 EXISTING SYSTEM |5 |
| |3.2 NEED FOR THE SYSTEM |6 |
| |3.3 PROPOSED SYSTEM |6 |
| |3.4 SCOPE OF THE PROJECT |7 |
| |3.5 PROBLEM DEFINITION |8 |
| |3.6 SYSTEM CONFIGURATION |8 |
| |3.7 FEASIBILITY STUDY |10 |
|4. |DESIGN AND DEVELOPMENT |11 |
| |4.1 LOGIN |11 |
| |4.2 ACCOUNT SETTINGS |11 |
| |4.3 CABIN SETTINGS |11 |
| |4.4 TARIFF SETTINGS |11 |
| |4.5 RECHARGE |11 |
| |4.6 BILLING |11 |
| |4.7 REPORTS |12 |
| |4.8 VIEW ACCOUNTS |12 |
|5. |SYSTEM TESTING |14 |
| |5.1 Unit Testing |14 |
| |5.2 Integration Testing |14 |
| |5.3 White Box Testing |15 |
| |5.4 Black Box Testing |15 |
| | | |
| | | |
| |5.5 Functional Test |15 |
| |5.6 Performance Test |16 |
| |5.7 Stress Test |17 |
| |5.8 Structure Test |17 |
| |5.9 Validation Test |18 |
| |5.10 Output Test |18 |
| |5.11 User Acceptance test |18 |
| |5.12 Change Over Plan |19 |
|6. |IMPLEMENTATION |20 |
| |6.1 SYSTEM SECURITY MEASURE |20 |
| |6.2 SYSTEM MAINTAINANCE |21 |
|7. |SCOPE OF THE PROJECT |23 |
|8. |USER TRAINING |24 |
| |8.1 INTRODUCTION |24 |
| |8.2 USERS MANUAL |24 |
|9. |CONCLUSION |25 |
| |9.1 Achievement Expected through the |25 |
| |project | |
|10. |REFERENCES |25 |
|11. |APPENDIX I |26 |
| |11.1 LIST OF TABLES |26 |
|12. |APPENDIX II |28 |
| |12.1 DFD |28 |
| |12.2 IMPLEMENTATION FIGURES |33 |
| |12.2.1 MODULE LIST |33 |
|13. |APPENDIX III |35 |
| |13.1 SCREEN SHOTS |35 |
|14. |APPENDIX IV |43 |
| |14.1 OVERVIEW |43 |


SYNOPSIS


Computers have become a way of life for today's high society. Many aspects
of modern life that we have come to accept as common place would not be
possible if there were no computers. Today computers are use extensively
in many areas of business, industry, science, education etc.
The major advantage of computer is its speed that makes it able
to give some useful information very quickly. This speed also opens new
approaches to problem solving and data processing. Another feature is its
accuracy. Though the computers do only what is instructed at every
instant, these instructions are taken into account and accurate
information's are produced. Computer can hold data and instruction in an
electronic representation in internal memory and this data can be
retrieved at any time
The project entitled "Cyber Café Management System" is a software
package, which can be used in cyber cafés for managing the clients'
computer efficiently. Now a day's cyber terrorism, which is mainly
undergone through internet cafés, need to be tackled properly. Thereby, it
is indeed necessary to store the valid information of the user who comes
for internet access. The system being used, the time at which the user
logs in and logs out should be recorded systematically.
In this modern era, a number of people access the internet
frequently by means of cyber cafes. For such frequent users, a prepaid
account shall be maintained and discounted rates may be charged from them.
While walkthrough users, who are less frequent, are charged a fixed rate.
By using the LAN connections in the cyber cafes we can automate this
process very easily. This system comprises of the following modules:


> The Server Module
> The Client Module




The server module, which is handled by the administrator can create
new accounts for prepaid users and also store the details of walkthrough
customers. While in the client module, which is handled by users
themselves, the user should give his/her user-id and password to start
browsing. After they are logged out, the time and amount will be
automatically generated at the server module and the bill is provided to
the user.
This system is developed in JAVA language with My SQL as backend.
The system is a menu driven one. User-friendly menus will help both the
administrator and the clients to work on it without any operational
difficulty.




INTRODUCTION


In this project an attempt is made to design a computer system for
the CYBER CAFÉ that makes the management of recording user details,
internet usage and billing much easier. The objective of this software is