Professional Documents
Culture Documents
“ADVANCED SECURED SYSTEM” deals with the Server based Information and
Maintenance of the Server. This system is used to reduce the workload of the server. It provides
mail services, chat services between the clients and it also response to the client requests. This
system is designed as a middleman between the client and the server. This system provides all
kinds of services to the clients like file transfer, mail, chat etc... This system is cost-effective and
provides a security like firewall to the server. Though there are any software available in the
market there is no popular server in terms of cost and providing services. Developed in java
platform will be an advantage to this software. This can be used in various platforms.
• File Transfer
• Resource Sharing
• Chat
• Web Page View
File Transfer:
File transfer is handled between client and the server. To share a file from
another client the requestor client sends the request to the server. The server then gets the
file from the client which provides the requested file. Then the server sends the file to the
requested client.
Mail:
Resource Sharing:
The user requests a web page from the server. If the page is available in the
server then the server provide a copy of the page and open the page in the client location.
2. System Analysis
Cost-effectiveness
Resource Sharing
Low Reliability
Performance problems
Scalability
Centralized access
Minimum cost
High security
DAP Concept
4. System Specification
5. System Design
Introduction:
Based on the user requirements and the detailed analysis of a new system, the new
system must be designed. This is the phase of system designing. It is a most crucial phase in the
development of a system.
Normally, the design proceeds in two stages:
In the preliminary or general design, the features of the new system are specified. The
costs of implementing these features and the benefits to be derived are estimated. If the project is
still considered to be feasible, we move to the detailed design stage.
In the detailed design stage, computer oriented work begins in earnest. At this stage, the
design of the system becomes more structure design is a blue print of a computer system solution
to a given problem having the same components and interrelationship among the same
components as the original problem. Input, output and processing specification are drawn up in
detail. In the design stage, the programming language and the platform in which the new system
will run are also decided.
There are several tools and techniques used for designing. These tools and techniques are:
Flowchart
Data flow diagram
Data dictionary
Structured English
Decision table
Decision tree
In the system design part is considered after the successful compilation of the
problem analysis. The requirements which and specified in software requirements specification
is verified i.e. whether the requirement specified in it satisfies the user needs.
Advanced Secured System developed act as a middleman between the client and the server.
It reduces the work of the server and gives access to server resources to multiple clients at same
time. It reduces the response time experienced by the clients. This server will be cost-effective
when compared to other servers in the market. Other servers in real time provide a single service.
The server, which we have designed, is to meet the real time requirements .To share our thoughts
with other clients in a network we can use chat services where we can exchange out views in the
form of typed-in messages. Chatting can be provided as private chat and as well as multi-chat.
This system in addition checks whether virus file have affected the system and acts as a firewall
to save the system from viruses. If it finds a virus it will report to the server what action to be
taken against the virus file. The server can delete the file from the system or it can block the
virus or it can repair the virus and quarantine the infected file. If the users are on-line they can
share the messages through chatting, if the users are on offline they can share their views through
sending mail to the users in the network who himself registered them as the clients of our system.
User Registration:
Establish connection between a client and server. Store login ids of all users of in
the server database. Get the user name & password. Check for the correctness of user name
and password. If it is correct enable the user to use the services else move the user to error
page.
To provide a strong authentication for this system, each user will be provided with a
unique username and password. First the users must register in this system before they access
this system. In registration time, the users will have to answer the questions provided by the
system. The questions will be based on the networking side. If the users answers the questions
and the system will verify the answers and depending upon the correct answers the system will
generate a key. There are three types of categories depending upon the key generated by the
system.
First category of services will provide:
1. File Transfer
2. E-mail
3. Resource Sharing
4. Web page view
5. Chat
Second Category of services will provide:
1. File Transfer
2. E-mail
3. Web page View
Third category of services will provide
1. File Transfer
2. E-mail
Each time user enters the system it will check for strong authentication whether the
username and password is valid. If the authentication is valid, the services will be provided to the
user else the user will be move to error page. If the username a password will be sometimes
wrong by misspelled so the user can be once again redirected to the main page.
File Transfer:
If a user wants to access a file in the server he must make a request to the server.
There are three steps followed in File transfer
1. File search
2. Virus File check
3. DAP Concept
First step in File search, it receives a request from the user. The request will be a file
name. First the server finds all root drives in the system. It then searches for all folders in
the system. Then it moves to search for all the subfolders in the system and it searches the
requested file name will reside in subfolder. If it exists then it will took the file and move
to next step i.e. virus check else it reports the requested file does not reside in the system.
Second step will receive the file name and check whether the file name matches with
the updated virus file in the database. If it exists then the server will report the requested
file is virus file else then it will move to next phase which is transferring the file.
Third step uses DAP concept, i.e. check the file length. If the requested file is a valid
one then the server starts to transfer the file from server to client location. After
transferring the file, the server check for the file length. It checks the length of the file,
before and after transmission .If it equals then the file transfer will be completed else the
file transfer is corrupted. Then again it will transfer the file, until the file transfer is
completed.
E-Mail:
Mail is one of the services provided by this system. The ability to compose, send
receive; delete electronic mail has been enormously popular. In this project, E-Mail can
be sent to the recipient without having to enter into the Web browser.
Electronic mail is one of the ways where we can send our messages to a
group of people. It is a mixture of text, drawings and facsimile. Normally mail
consists of two subsystems: the user agents, which allow people to read
and send email and the message transfer agents, which move the
messages fro the source to destination. The message inside the envelope
contains two parts: the header and the body. The header contains control
information for the user agents. The body is entirely for the human recipient.
To send an email a user must provide the message, the destination address
and possibly some other parameters (e.g., the priority or security level). The
message can be produced with an editor built into the user agent. The
destination address must be in the format that the user agent can deal with.
Many user agents expect DNS addresses of the form mailbox@location.
When a user is started up to read an email, it will look at the user’s
mailbox
for incoming email before displaying anything on the screen. Then it may
announce the messages in the mailbox or display a on-line summary of each
one and wait for a command. In a sophisticated system, the user can specify
which fields to be displayed by providing a user profile, a file describing the
display format. The first field is message no. The second field, Flags k
meaning that the message is not new but was read previously and kept in
the mailbox. The third filed tells how long the message is and the fourth field
tells who send the message. Finally, the subject field gives the brief
summary what the message is about.
Resource Sharing:
Resources may include, information retrieval, computer data processing, transmission
and storage, and any other functions performed, in whole or in part, by the use of a computer,
computer network, computer software, or computer program. In this project Resources related to
hardware and software are used.
Server provides all applications, files and messages. If a client wants
applications from the server, the server grants permission to the particular client according to
their authentication level, i.e., applications is shared to clients. The client can access the printer,
which are attached to the server when a request is provided. If the printer is connected in the
server, and one or more clients request for print options then the server will provide a queuing
system. Then the service will be provided to each user according to queue formed in the server.
If the printer is not connected it will sent an error message. The provider sends the applications
from the server to the requested client. Resources include devices such as CD, Floppy and
Printer. The clients access these devices, which are attached to the server when a request is
provided. If one or more users request the same device then the server will maintain a queue and
provide the services to the users according the queuing system maintained in the server.
Authentication is provided to client to access the devices from the server.
The example devices that can be accessed like Floppy Drive, Printer. Directories & files are
displayed on client machine and can be saved on the client machine according to the
Provided authentication.
The user requests a webpage in the server, if the page resides in the server then the copy
of the page will given to the client. In this service the page will be transferred and immediately
opened at the client window. This service will provide that the page will reside in the server and
it will be opened in the client side without any requirements. This service is entirely different
from transferring a file from the server. In that service the file will be transferred to the client
side and it will be saved on the client side and the user may open the file according to his wish.
But in webpage view the file will not be saved on the client side, it will be opened on the client
side and source file may reside in server.
Chat:
Chatting means exchanging the information between the users. Usually this kind of
“talking” is the exchange of typed-in messages requiring one site as the repository for the
messages and a group of users who take part on the network. In some cases, a private
Chat can be arranged between two parties who meet initially in a group. Chat can be ongoing or
scheduled for a particular time and duration. Chat is one way of exchanging our views. The chat
can be selected on a certain topic such as politics, religion, entertainment, education, business
etc... The chat can be done with a group of people and there are ways were we could exchange
confidential matters through private chat. In our system when we register ourselves as a user the
system will provide you a username and password. That username will be considered as your id
for chatting.
Data Flow:
Each arrow in a DFD Represents a path (or pipeline of conveyer belt) of data, called the
Data Flow.
Process:
A process represents an automated or manual activity that transforms incoming data
flows to outgoing data flows.
Data-Store:
A Data-Store holds the data (for reference), which the system cannot remember.
External events and system responses ate From/To “Sources” or “Destination” of the system.
Components of DFD:
The basic components of DFD are following
Source/Destination
Process
Data Source
1. Graphics
2. Top Down Approach
3. Separation of logical from the physical
4. Partitioning
Login
No
Is Valid?
Yes
File Transfer
Resource sharing Web Page View
1. User Validation
LOGIN
Registration
User validation
Username,
Password Username,
Password,
Login Key
Vali
No
d
DB
User
Yes
2. File Transfer
File Transfer
File No
Exists File Not Found
Yes
Yes
Virus Virus File
File
Virus Error Page
No
File
Transfer
If file length
Not equals
DAP
3. Mail
Inbox Compose
DB
Received Messages
4. Resource Sharing
Floppy Drive
Client
Requests
Client Had Drives
Server
Server
Responds CD-Drive
Printer
Webpage Request
Page No
Exists Webpage Not Found
Yes
Webpage View
6. Chat
Chat server
Client-1 Client-1