Anda di halaman 1dari 18


“ADVANCED SECURED SYSTEM” deals with the Server based Information and
Maintenance of the Server. This system is used to reduce the workload of the server. It provides
mail services, chat services between the clients and it also response to the client requests. This
system is designed as a middleman between the client and the server. This system provides all
kinds of services to the clients like file transfer, mail, chat etc... This system is cost-effective and
provides a security like firewall to the server. Though there are any software available in the
market there is no popular server in terms of cost and providing services. Developed in java
platform will be an advantage to this software. This can be used in various platforms.

The main objective of this software is to

• Speed up the data transfer
• Check for virus file
• Provide mail, chat services
• Strong authentication
• Sharing resources
• Flexibility

The Project ”ADVANCED SECURED SYSTEM” deals with the Server

maintenance for a company.

The project consists of following modules:

• File Transfer

• E-mail

• Resource Sharing

• Chat
• Web Page View

File Transfer:

File transfer is handled between client and the server. To share a file from
another client the requestor client sends the request to the server. The server then gets the
file from the client which provides the requested file. Then the server sends the file to the
requested client.


With the advent of the Internet and its commercial availability,

the Universal e-mail have become a common feature in today’s
High-tech World. The ability to compose, sends, and receives Electronic
mail has been enormously popular. In this project E-Mail can be sent to the
recipient without having to enter into the Web browser.

Resource Sharing:

Server provides all applications, files and messages. If a client wants

applications from the server, the server grant permission to the particular Client according to
their authentication level, i.e., applications are shared between server and clients. The client
access the printer which are attached to the server when a request is provided. The applications
from the server are sent to the requested client by the provider. Resources include devices such
as CD, Floppy and Printer. The client access these devices which are attached to the server when
a request is provided.

Web Page View:

The user requests a web page from the server. If the page is available in the

server then the server provide a copy of the page and open the page in the client location.

2. System Analysis

2.1. Existing System

The existing system is present in Spectrum Software Solution. There

are some problems in sharing resources .The existing system must use a third
party tool to share the resources, provide a mail service within the clients, to
provide sharing of messages between a group of users through chat services.
In existing system when more than one users try to access the resources of the
Server, then the server processing speed decreases. When network traffic arises,
then the data transfer will go down very slow and there is a chance of data to be
lost. There is low level security in the existing system .The cost factor will be
high to provide the services like mailing, chatting. It reduces the response time
experienced by the clients.

Problems associated with the Existing System


 Low level security

 Network Traffic

 Resource Sharing

 Low Reliability

 Performance problems

 Scalability

2.2 Proposed System

The proposed system will provide a good security and improves the performance of the
server. It provides network security and gives access to the resources in server. It
improves the response time to clients. It provides robust authentication. Table
handling using Oracle would increase the ease in handling data, quicker and timely
retrieval of data is possible with flexibility and portability. Keeping in view all these
points and problems of the existing system, the new system has been developed using
Java Server Page and Oracle.

Advantages of Proposed System

Increases the system Reliability

Centralized access

Minimum cost

 High security

 System design for better performance

 DAP Concept
4. System Specification

4.1. Hardware Requirements

 Processor Intel Pentium Family
 Clock Speed 667 MHz
 RAM 128 MB
 Hard Disk 4 GB or higher
 Monitor Display panel (640 x 480)
 Mouse Logitech Serial Mouse
 Keyboard Standard 104 enhanced keyboard
 Cache Memory 11,011,968 Bytes
 Virtual Memory 32 MB
 Display Card Super Video Graphics Adapter (SVGA)

4.2. Software Requirements

 Operating System : Windows 98/2000/XP/NT

 Web Server : Apache Tomcat 4.1.7
 Web Browser : Internet Explorer
 Front-End Tool : HTML
 Client side Script : JavaScript
 Server side Script : Java Server Pages
 Back-End Tool : Oracle 8.0

5. System Design


Based on the user requirements and the detailed analysis of a new system, the new
system must be designed. This is the phase of system designing. It is a most crucial phase in the
development of a system.
Normally, the design proceeds in two stages:

1. Preliminary or general design

2. Structure or detailed design

Preliminary or general design:

In the preliminary or general design, the features of the new system are specified. The
costs of implementing these features and the benefits to be derived are estimated. If the project is
still considered to be feasible, we move to the detailed design stage.

Structure or detailed design:

In the detailed design stage, computer oriented work begins in earnest. At this stage, the
design of the system becomes more structure design is a blue print of a computer system solution
to a given problem having the same components and interrelationship among the same
components as the original problem. Input, output and processing specification are drawn up in
detail. In the design stage, the programming language and the platform in which the new system
will run are also decided.

There are several tools and techniques used for designing. These tools and techniques are:

 Flowchart
 Data flow diagram
 Data dictionary
 Structured English
 Decision table
 Decision tree
In the system design part is considered after the successful compilation of the
problem analysis. The requirements which and specified in software requirements specification
is verified i.e. whether the requirement specified in it satisfies the user needs.

5.1. Project Description

Advanced Secured System developed act as a middleman between the client and the server.
It reduces the work of the server and gives access to server resources to multiple clients at same
time. It reduces the response time experienced by the clients. This server will be cost-effective
when compared to other servers in the market. Other servers in real time provide a single service.
The server, which we have designed, is to meet the real time requirements .To share our thoughts
with other clients in a network we can use chat services where we can exchange out views in the
form of typed-in messages. Chatting can be provided as private chat and as well as multi-chat.
This system in addition checks whether virus file have affected the system and acts as a firewall
to save the system from viruses. If it finds a virus it will report to the server what action to be
taken against the virus file. The server can delete the file from the system or it can block the
virus or it can repair the virus and quarantine the infected file. If the users are on-line they can
share the messages through chatting, if the users are on offline they can share their views through
sending mail to the users in the network who himself registered them as the clients of our system.

User Registration:

Authentication is the technique by which a process verifies that its communication

partner is who it is supposed to be and not an intruder. In order to provide
authentication in this project USER NAME AND PASSWORD has been
Login button is used to display the Login Dialog Box. It has two text fields and
one buttons. User Name and password are entered in their respective fields. Entered user
name and password are send to the server and checked with its database. If valid user, then
the user is permitted to enter into the system and their names are added to the list boxes of
both the client and the server. If invalid user then the user exits out of the system.
User button is used to display the New User Dialog Box. It contains the fields such
as User Name, password, First Name, Last Name-mail address, Age, Sex, phone Security
Question Answer. The new user can enter into the system by giving the details in their
respective fields. If the user name and password are non-existence they are considered as a
valid user and sent to the server database.

Establish connection between a client and server. Store login ids of all users of in
the server database. Get the user name & password. Check for the correctness of user name
and password. If it is correct enable the user to use the services else move the user to error

To provide a strong authentication for this system, each user will be provided with a
unique username and password. First the users must register in this system before they access
this system. In registration time, the users will have to answer the questions provided by the
system. The questions will be based on the networking side. If the users answers the questions
and the system will verify the answers and depending upon the correct answers the system will
generate a key. There are three types of categories depending upon the key generated by the
First category of services will provide:
1. File Transfer
2. E-mail
3. Resource Sharing
4. Web page view
5. Chat
Second Category of services will provide:
1. File Transfer
2. E-mail
3. Web page View
Third category of services will provide
1. File Transfer
2. E-mail
Each time user enters the system it will check for strong authentication whether the
username and password is valid. If the authentication is valid, the services will be provided to the
user else the user will be move to error page. If the username a password will be sometimes
wrong by misspelled so the user can be once again redirected to the main page.

File Transfer:

If a user wants to access a file in the server he must make a request to the server.
There are three steps followed in File transfer
1. File search
2. Virus File check
3. DAP Concept
First step in File search, it receives a request from the user. The request will be a file
name. First the server finds all root drives in the system. It then searches for all folders in
the system. Then it moves to search for all the subfolders in the system and it searches the
requested file name will reside in subfolder. If it exists then it will took the file and move
to next step i.e. virus check else it reports the requested file does not reside in the system.
Second step will receive the file name and check whether the file name matches with
the updated virus file in the database. If it exists then the server will report the requested
file is virus file else then it will move to next phase which is transferring the file.
Third step uses DAP concept, i.e. check the file length. If the requested file is a valid
one then the server starts to transfer the file from server to client location. After
transferring the file, the server check for the file length. It checks the length of the file,
before and after transmission .If it equals then the file transfer will be completed else the
file transfer is corrupted. Then again it will transfer the file, until the file transfer is

Mail is one of the services provided by this system. The ability to compose, send
receive; delete electronic mail has been enormously popular. In this project, E-Mail can
be sent to the recipient without having to enter into the Web browser.
Electronic mail is one of the ways where we can send our messages to a
group of people. It is a mixture of text, drawings and facsimile. Normally mail
consists of two subsystems: the user agents, which allow people to read
and send email and the message transfer agents, which move the
messages fro the source to destination. The message inside the envelope
contains two parts: the header and the body. The header contains control
information for the user agents. The body is entirely for the human recipient.
To send an email a user must provide the message, the destination address
and possibly some other parameters (e.g., the priority or security level). The
message can be produced with an editor built into the user agent. The
destination address must be in the format that the user agent can deal with.
Many user agents expect DNS addresses of the form mailbox@location.
When a user is started up to read an email, it will look at the user’s
for incoming email before displaying anything on the screen. Then it may
announce the messages in the mailbox or display a on-line summary of each
one and wait for a command. In a sophisticated system, the user can specify
which fields to be displayed by providing a user profile, a file describing the
display format. The first field is message no. The second field, Flags k
meaning that the message is not new but was read previously and kept in
the mailbox. The third filed tells how long the message is and the fourth field
tells who send the message. Finally, the subject field gives the brief
summary what the message is about.

Resource Sharing:
Resources may include, information retrieval, computer data processing, transmission
and storage, and any other functions performed, in whole or in part, by the use of a computer,
computer network, computer software, or computer program. In this project Resources related to
hardware and software are used.
Server provides all applications, files and messages. If a client wants
applications from the server, the server grants permission to the particular client according to
their authentication level, i.e., applications is shared to clients. The client can access the printer,
which are attached to the server when a request is provided. If the printer is connected in the
server, and one or more clients request for print options then the server will provide a queuing
system. Then the service will be provided to each user according to queue formed in the server.
If the printer is not connected it will sent an error message. The provider sends the applications
from the server to the requested client. Resources include devices such as CD, Floppy and
Printer. The clients access these devices, which are attached to the server when a request is
provided. If one or more users request the same device then the server will maintain a queue and
provide the services to the users according the queuing system maintained in the server.
Authentication is provided to client to access the devices from the server.
The example devices that can be accessed like Floppy Drive, Printer. Directories & files are
displayed on client machine and can be saved on the client machine according to the
Provided authentication.

Web page View:

The user requests a webpage in the server, if the page resides in the server then the copy
of the page will given to the client. In this service the page will be transferred and immediately
opened at the client window. This service will provide that the page will reside in the server and
it will be opened in the client side without any requirements. This service is entirely different
from transferring a file from the server. In that service the file will be transferred to the client
side and it will be saved on the client side and the user may open the file according to his wish.
But in webpage view the file will not be saved on the client side, it will be opened on the client
side and source file may reside in server.


Chatting means exchanging the information between the users. Usually this kind of
“talking” is the exchange of typed-in messages requiring one site as the repository for the
messages and a group of users who take part on the network. In some cases, a private
Chat can be arranged between two parties who meet initially in a group. Chat can be ongoing or
scheduled for a particular time and duration. Chat is one way of exchanging our views. The chat
can be selected on a certain topic such as politics, religion, entertainment, education, business
etc... The chat can be done with a group of people and there are ways were we could exchange
confidential matters through private chat. In our system when we register ourselves as a user the
system will provide you a username and password. That username will be considered as your id
for chatting.

5.2. Data Flow Diagram

A DFD is a modeling tool that allows us to show a system as a network of processes

(mini systems) connected to each other by paths of data.

Data Flow:
Each arrow in a DFD Represents a path (or pipeline of conveyer belt) of data, called the
Data Flow.

A process represents an automated or manual activity that transforms incoming data
flows to outgoing data flows.

A Data-Store holds the data (for reference), which the system cannot remember.
External events and system responses ate From/To “Sources” or “Destination” of the system.

Components of DFD:
The basic components of DFD are following



Data Source

DFD are based on the strategy of structured techniques, Namely:

1. Graphics
2. Top Down Approach
3. Separation of logical from the physical
4. Partitioning

DFD is do not show

• How things begin & end
• Loops
• Decisions

System Flow Diagram


Enter Username &



Is Valid?


File Transfer
Resource sharing Web Page View

Data Flow Diagram

1. User Validation

User validation
Password Username,
Login Key


File Mail Resource Chat Webpage

2. File Transfer

File Transfer

File No
Exists File Not Found


Virus Virus File
Virus Error Page




If file length
Not equals

If file length equals

File Transfer Completed

3. Mail


Inbox Compose


Received Messages

4. Resource Sharing

Floppy Drive
Client Had Drives
Responds CD-Drive


5. Web Page View

Webpage Request

Page No
Exists Webpage Not Found

Webpage View

6. Chat

Chat server

Client-1 Client-1