Anda di halaman 1dari 34

INTERNET CONTROLLER

1. 1 Introduction
1.2 HISTORY
1.3 Technology introduction
Java

Tomcat 5.0
SQL Server 2000
Query Analyzer
SQL Profiler

Service Manager

Data Transformation Services (DTS)

2.1 Project overview


2.2 Project Organization
Software Process Model
Waterfall Model

Major Milestones to be achieved


Versions to be established


Tools and Techniques

2.3 Project Management Plan


Tasks Distribution
Project Members
2.4 Class Diagram

Employee
name : char monitors
emp_id : int
designation : char
salary : float Internet Facility
tel_no : double int Security Dept
uses browser no
browser version user id : char
useinternet() user password : char
designation : char

monitor()
Parent report()
user id : char
controls
password : char
uses
monitor() uses
uses
Controller
version_no : float

filter_sites()
Internet Usage record
block_sites()
usage time : float set_timelimits()
user_id : char generates report monitor_sites()
amt of data transfer : float set_datatransferlimits()
no of browsed sites : int

generate report() refers to

monitors minor
Objectionable Web Site record
name : char
Minor url : char
name : char
age : int
amt of net use : float
amt of data transfer : float

useinternet()
Events and States
Events
• Log in:
• Log off:
• Objectionable web site found:
• Objectionable data found:
• Filtering complete:

States
• Monitoring:
• Blocking:
• Filtering:
• Displaying filtered data:
• Generating report:
• Displaying report:
State Chart Diagram

State Diagram for Internet Controller

log in to internet facility

Monitoring

obj data found

obj web site found


log off
Blocking Filtering

filtering complete
auto log off

generating
report displaying
filtered data

displaying
report

Non Functional Requirements


1. Efficiency
2. Usability
3. Reliability
4. Portability
2.5 Risk Analysis
Project risk

2. Technical Risk

Validation Criteria

1. Test Case: Authenticity of User


Test Case Input Expected O/P Actual O/P
2. Test Case: Monitoring Users Internet Usage
Test Case Input Expected O/P Actual O/P
2. Test Case: Detection of objectionable contents
Test Case Input Expected O/P Actual O/P

4. Test Case: Filtering of objectionable contents


Test Case Input Expected O/P Actual O/P
5. Test Case: Assigning Time Limit to every user
Test Case Input Expected O/P Actual O/P

6. Test Case: Data transfer limit

Test Case Input Expected O/P Actual O/P


7. Test Case: Blocking of objectionable websites
Test Case Input Expected O/P Actual O/P

8. Test Case: Generation of reports

Test Case Input Expected O/P Actual O/P

3 SYSTEM DEVELOPMENT
3.1 Technology


General features required





Data Model and Description

Classes, attributes, operations


3.2 Functional Model and description

1) Functions used and their description

• Monitor
• Filter:
• Setting of time limits:
• Setting of data transfer limit
• Blocking:
• Generate report:
3.3 Data flow diagram

Level 0

Level 1
LEVEL 2 DFD FOR LOGGING IN

LEVEL 2 DFD FOR MONITORING


LEVEL 2 DFD FOR GENERATING REPORTS

Behavioral model and description:

1 Sequence and Collaboration diagram


Collaboration Diagram

3: logs out

a : User 1: uses

b : Internet
Facility

e : Security
Dept

2: monitors net

6: submits report 4: asks for report


c : Controller d : Internet usage
report
5: generates report

Sequence Diagram

a : User b : Internet c : Controller d : Internet e : Security Dept


Facility usage report
uses

monitors net

logs out

asks for report

generates report

submits report
COLLABORATION DIAGRAM FOR INTERNET CONTROLLER

3: logs into sensitive sites

a : User 1: uses

b : Internet
Facility
6: blocks sites

2: monitors net

c : Controller 4: checks the record

d : Objectional Web
5: record found site record

Sequence Diagram for Internet Controller

a : User b : Internet c : Controller d : Objectional


Facility Web site record
uses

monitors net

logs into sensitive sites

checks the record

record found

blocks sites

3.4 SOFTWARE DESIGN DOCUMENT


3.4.1 Design Overview
Requirement Traceability Matrix

Description of Architecture Design


Application domain
Infrastructure Domain
User management:-
Database management:-
Interface Domain
1. GUI
2. Internet Interface
ARCHITECTURE DIAGRAM

Internet Controller
Software

User Report
External Securi ty Database
Managment generation
Commun Managment

GUI Internet Monitor Obj Web Keyword IC user


Block Filter
interface function site record record record
function function

Internet usage Detector


Managment

Keyword Obj ecti onal Web Obj Home page


identification site i denti fi cati on identification

Component Diagram

Component Diagram

3.4.2 Descriptions of Architectural Diagram


Components, attributes and operations
• Monitor Component
Elaborated Monitor Component

<<block fun>>

detect website()

<<filter fun>>
Monitor
Data transfer limit : int
detect keyword() Time limit : float
Start time : float
Stop time : float
data amt transferred : float
<<report fun>> No of obj sites visited : int

detect website()
generate report() detect keyword()
set datatransferlimit()
set time limit()
calculate usageduration()
<<Obj Website record>> generate report()
get website record()
get keyword record()
get website record()

<< keyword record>>

get keyword record()

• Block Component
Elaborated Block Component

<<monitor>>

Block Data
updatedatabase()
name of blocked sites : char
no of blocked sites : int
date of blocking : float

blocksite()
genreport()
<<report>>
updatedatabase()

genreport()

• Filter Component

Elaborated Filter Component

<<Monitor>>

filtermail()
Filter Data
filterwebsite()
keywords recognized : int
amt of data filtered : int
filter level : char
filtered time : float

filtermail()
<<report>> filter website()
displayfiltered data()
genreport()
genreport()

• Report Generation Component


Report Generation Component

<<monitor>>

assemble() Report Genration


no of pages : int
amt of data transferred : float
amt of data blocked : float
amt of data filterd : float
report type : char
<<filter>>
session duration : float
name of sites monitored : char
session date : int
assemble()
assemble()
displayreport()
savereport()

<<block >>

assemble()

• GUI component
GUI Component

<<monitor>>

assemble()

GUI
Obj website record : char
<<filter>> Keyword record : char
history : char
updates : char
assemble() version : char
Options : char
set time limit : char
set data transfer limit : char
usage time : float
<<blocking>> blocking level : int

displayobj website record()


assemble() amount of data tranferred()
display_history()
search_history()
display_report()
display_blockedsites()
display_options()
<<report>> updateSoftware()
assemble()
display usagetime()
generate report() setblockinglevel()

• Internet Interface Component

Internet Interface Component

INTERNET INTERFACE
browser name : char
<<GuI>> browser version : float
downloads : float

interfacewith GUI()
interfacewith GUI()
interface with controller s/w()
update browser()
<<report>>

generate report()

• Internet Controller user record component


IC User Record Component

<<report>> IC USER RECORD


name : char
age : int
generate report() gender : char
address : char
email : char
username : char
password : char

<<GUI>> update _database()


generate report()
getdetails()
getdetails() display details()
display details()

• Objectional Website record component

Objectional Web site record

<<report>>

retrieve()
OBJECTIONAL WEBSITE RECORD
website name : char
website domain : float
website DNS : float
updates of website record : char
<<monitor>>
display()
delete()
retrive()
display() update database()

• keyword record component


Keyword Record Component

<<Monitor>>

display()

KEYWORD RECORD
keyword name : char
<<report>> no. of keywords : int
updates of keywords : char
retrieve()
display()
delete()
retrive()
update database()

4. EXPRIMENTAL ANALYSIS
4.1 CODING
4.1.1 CLINT SIDE CODING
LOGIN
4.1.2 SERVER SIDE CODING

4.1.3 CODING OF ADMINISTRATION MODULE

DESCRIPTION OF USER INTERFACE

Server Side Interface


HTTP Proxy:-
Login Server Port :-
Start:-
Stop:-

2.User Side Interface


UserName:-
Password:-
Login:-
Clear :- .
Preferences
Server IP:-
Port :-

ADIMINISTRATION SIDE USER INTERFACE

AUTHENTICATION USER NAME AND PASSWARD


User name:-
Password:-
Submit:
Reset:
HOME PAGE
DeleteUsers:-
CreateUser:-
Reports:-
LogOut:-
CREATE NEW USER
USER_ID
USER_PASSWORD
START_TIME:-
END_TIME:-
SATUS:-
UPLOAD_LIMIT:-
DOWNLOAD_LIMIT:-
UPLOADED:-
DOWNLOADED:-
TYPE:-
INSERT_RECORD:-

DELETE USER
REPORTS
Enter Date:-
USER_ID:-
IP_ADDRESS:-
ACTIVITY_TYPE:-
URL:-
Rest-URL:-
UPLOAD_DATA:-
DOWNLOAD_DATA:-
DATE_AND_TIME:-
MISE:-

Log Out
Click on logout button to logout success Fully.
4.2 DATABASE DESINIG
Database SQL Server 2000 Definition

There is two table in this database


1)log_master
2)user_master

4.2.1 LOG_MASTER
4.2.2 USER MASTER

5. CONCLUSION

5.1 Future




5.2 ADVANTAGE




5.3 DISADVANTAGE



5.4 APPLICATION
5.5 CONCLUSTION



Anda mungkin juga menyukai