Advanced Secured System
-
Upload
thirukkumaran-elangovan -
Category
Documents
-
view
90 -
download
5
Transcript of Advanced Secured System
![Page 1: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/1.jpg)
Synopsis
“ADVANCED SECURED SYSTEM” deals with the Server based Information and
Maintenance of the Server. This system is used to reduce the workload of the server. It provides
mail services, chat services between the clients and it also response to the client requests. This
system is designed as a middleman between the client and the server. This system provides all
kinds of services to the clients like file transfer, mail, chat etc... This system is cost-effective and
provides a security like firewall to the server. Though there are any software available in the
market there is no popular server in terms of cost and providing services. Developed in java
platform will be an advantage to this software. This can be used in various platforms.
The main objective of this software is to
Speed up the data transfer
Check for virus file
Provide mail, chat services
Strong authentication
Sharing resources
Flexibility
1.2 ABOUT THE PROJECT
The Project ”ADVANCED SECURED SYSTEM” deals with the Server
maintenance for a company.
The project consists of following modules:
File Transfer
Resource Sharing
Chat
Web Page View
![Page 2: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/2.jpg)
File Transfer:
File transfer is handled between client and the server. To share a file from
another client the requestor client sends the request to the server. The server then gets the
file from the client which provides the requested file. Then the server sends the file to the
requested client.
Mail:
With the advent of the Internet and its commercial availability,
the Universal e-mail have become a common feature in today’s
High-tech World. The ability to compose, sends, and receives Electronic
mail has been enormously popular. In this project E-Mail can be sent to the
recipient without having to enter into the Web browser.
Resource Sharing:
Server provides all applications, files and messages. If a client wants
applications from the server, the server grant permission to the particular Client according to
their authentication level, i.e., applications are shared between server and clients. The client
access the printer which are attached to the server when a request is provided. The applications
from the server are sent to the requested client by the provider. Resources include devices such
as CD, Floppy and Printer. The client access these devices which are attached to the server when
a request is provided.
![Page 3: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/3.jpg)
Web Page View:
The user requests a web page from the server. If the page is available in the
server then the server provide a copy of the page and open the page in the client location.
2. System Analysis
2.1. Existing System
The existing system is present in Spectrum Software Solution. There
are some problems in sharing resources .The existing system must use a third
party tool to share the resources, provide a mail service within the clients, to
provide sharing of messages between a group of users through chat services.
In existing system when more than one users try to access the resources of the
Server, then the server processing speed decreases. When network traffic arises,
then the data transfer will go down very slow and there is a chance of data to be
lost. There is low level security in the existing system .The cost factor will be
high to provide the services like mailing, chatting. It reduces the response time
experienced by the clients.
Problems associated with the Existing System
Cost-effectiveness
Low level security
Network Traffic
Resource Sharing
![Page 4: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/4.jpg)
Low Reliability
Performance problems
Scalability
2.2 Proposed System
The proposed system will provide a good security and improves the performance of the
server. It provides network security and gives access to the resources in server. It improves the
response time to clients. It provides robust authentication. Table handling using Oracle would
increase the ease in handling data, quicker and timely retrieval of data is possible with flexibility
and portability. Keeping in view all these points and problems of the existing system, the new
system has been developed using Java Server Page and Oracle.
Advantages of Proposed System
Increases the system Reliability
Centralized access
Minimum cost
High security
System design for better performance
DAP Concept
4. System Specification
4.1. Hardware Requirements
Processor Intel Pentium Family
Clock Speed 667 MHz
RAM 128 MB
![Page 5: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/5.jpg)
Hard Disk 4 GB or higher
Monitor Display panel (640 x 480)
Mouse Logitech Serial Mouse
Keyboard Standard 104 enhanced keyboard
Cache Memory 11,011,968 Bytes
Virtual Memory 32 MB
Display Card Super Video Graphics Adapter (SVGA)
4.2. Software Requirements
Operating System : Windows 98/2000/XP/NT
Web Server : Apache Tomcat 4.1.7
Web Browser : Internet Explorer
Front-End Tool : HTML
Client side Script : JavaScript
Server side Script : Java Server Pages
Back-End Tool : Oracle 8.0
5. System Design
Introduction:
Based on the user requirements and the detailed analysis of a new system, the new
system must be designed. This is the phase of system designing. It is a most crucial phase in the
development of a system.
Normally, the design proceeds in two stages:
1. Preliminary or general design
2. Structure or detailed design
![Page 6: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/6.jpg)
Preliminary or general design:
In the preliminary or general design, the features of the new system are specified. The
costs of implementing these features and the benefits to be derived are estimated. If the project is
still considered to be feasible, we move to the detailed design stage.
Structure or detailed design:
In the detailed design stage, computer oriented work begins in earnest. At this stage, the
design of the system becomes more structure design is a blue print of a computer system solution
to a given problem having the same components and interrelationship among the same
components as the original problem. Input, output and processing specification are drawn up in
detail. In the design stage, the programming language and the platform in which the new system
will run are also decided.
There are several tools and techniques used for designing. These tools and techniques are:
Flowchart
Data flow diagram
Data dictionary
Structured English
Decision table
Decision tree
In the system design part is considered after the successful compilation of the
problem analysis. The requirements which and specified in software requirements specification
is verified i.e. whether the requirement specified in it satisfies the user needs.
![Page 7: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/7.jpg)
5.1. Project Description
Advanced Secured System developed act as a middleman between the client and the server.
It reduces the work of the server and gives access to server resources to multiple clients at same
time. It reduces the response time experienced by the clients. This server will be cost-effective
when compared to other servers in the market. Other servers in real time provide a single service.
The server, which we have designed, is to meet the real time requirements .To share our thoughts
with other clients in a network we can use chat services where we can exchange out views in the
form of typed-in messages. Chatting can be provided as private chat and as well as multi-chat.
This system in addition checks whether virus file have affected the system and acts as a firewall
to save the system from viruses. If it finds a virus it will report to the server what action to be
taken against the virus file. The server can delete the file from the system or it can block the
virus or it can repair the virus and quarantine the infected file. If the users are on-line they can
share the messages through chatting, if the users are on offline they can share their views through
sending mail to the users in the network who himself registered them as the clients of our system.
User Registration:
Authentication is the technique by which a process verifies that its communication
partner is who it is supposed to be and not an intruder. In order to provide
authentication in this project USER NAME AND PASSWORD has been
designed.
LOGIN
NEW USER
LOGIN:
Login button is used to display the Login Dialog Box. It has two text fields and
one buttons. User Name and password are entered in their respective fields. Entered user
name and password are send to the server and checked with its database. If valid user, then
the user is permitted to enter into the system and their names are added to the list boxes of
both the client and the server. If invalid user then the user exits out of the system.
USER:
![Page 8: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/8.jpg)
User button is used to display the New User Dialog Box. It contains the fields such
as User Name, password, First Name, Last Name-mail address, Age, Sex, phone Security
Question Answer. The new user can enter into the system by giving the details in their
respective fields. If the user name and password are non-existence they are considered as a
valid user and sent to the server database.
Establish connection between a client and server. Store login ids of all users of in
the server database. Get the user name & password. Check for the correctness of user name
and password. If it is correct enable the user to use the services else move the user to error
page.
To provide a strong authentication for this system, each user will be provided with a
unique username and password. First the users must register in this system before they access
this system. In registration time, the users will have to answer the questions provided by the
system. The questions will be based on the networking side. If the users answers the questions
and the system will verify the answers and depending upon the correct answers the system will
generate a key. There are three types of categories depending upon the key generated by the
system.
First category of services will provide:
1. File Transfer
2. E-mail
3. Resource Sharing
4. Web page view
5. Chat
Second Category of services will provide:
1. File Transfer
2. E-mail
3. Web page View
Third category of services will provide
1. File Transfer
2. E-mail
![Page 9: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/9.jpg)
Each time user enters the system it will check for strong authentication whether the
username and password is valid. If the authentication is valid, the services will be provided to the
user else the user will be move to error page. If the username a password will be sometimes
wrong by misspelled so the user can be once again redirected to the main page.
File Transfer:
If a user wants to access a file in the server he must make a request to the server.
There are three steps followed in File transfer
1. File search
2. Virus File check
3. DAP Concept
First step in File search, it receives a request from the user. The request will be a file
name. First the server finds all root drives in the system. It then searches for all folders in
the system. Then it moves to search for all the subfolders in the system and it searches the
requested file name will reside in subfolder. If it exists then it will took the file and move
to next step i.e. virus check else it reports the requested file does not reside in the system.
Second step will receive the file name and check whether the file name matches with
the updated virus file in the database. If it exists then the server will report the requested
file is virus file else then it will move to next phase which is transferring the file.
Third step uses DAP concept, i.e. check the file length. If the requested file is a valid
one then the server starts to transfer the file from server to client location. After
transferring the file, the server check for the file length. It checks the length of the file,
before and after transmission .If it equals then the file transfer will be completed else the
file transfer is corrupted. Then again it will transfer the file, until the file transfer is
completed.
E-Mail:
Mail is one of the services provided by this system. The ability to compose, send
receive; delete electronic mail has been enormously popular. In this project, E-Mail can
![Page 10: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/10.jpg)
be sent to the recipient without having to enter into the Web browser.
Electronic mail is one of the ways where we can send our messages to a
group of people. It is a mixture of text, drawings and facsimile. Normally mail
consists of two subsystems: the user agents, which allow people to read
and send email and the message transfer agents, which move the
messages fro the source to destination. The message inside the envelope
contains two parts: the header and the body. The header contains control
information for the user agents. The body is entirely for the human recipient.
To send an email a user must provide the message, the destination address
and possibly some other parameters (e.g., the priority or security level). The
message can be produced with an editor built into the user agent. The
destination address must be in the format that the user agent can deal with.
Many user agents expect DNS addresses of the form mailbox@location.
When a user is started up to read an email, it will look at the user’s
mailbox
for incoming email before displaying anything on the screen. Then it may
announce the messages in the mailbox or display a on-line summary of each
one and wait for a command. In a sophisticated system, the user can specify
which fields to be displayed by providing a user profile, a file describing the
display format. The first field is message no. The second field, Flags k
meaning that the message is not new but was read previously and kept in
the mailbox. The third filed tells how long the message is and the fourth field
tells who send the message. Finally, the subject field gives the brief
summary what the message is about.
Resource Sharing:
Resources may include, information retrieval, computer data processing, transmission
and storage, and any other functions performed, in whole or in part, by the use of a computer,
computer network, computer software, or computer program. In this project Resources related to
hardware and software are used.
![Page 11: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/11.jpg)
Server provides all applications, files and messages. If a client wants
applications from the server, the server grants permission to the particular client according to
their authentication level, i.e., applications is shared to clients. The client can access the printer,
which are attached to the server when a request is provided. If the printer is connected in the
server, and one or more clients request for print options then the server will provide a queuing
system. Then the service will be provided to each user according to queue formed in the server.
If the printer is not connected it will sent an error message. The provider sends the applications
from the server to the requested client. Resources include devices such as CD, Floppy and
Printer. The clients access these devices, which are attached to the server when a request is
provided. If one or more users request the same device then the server will maintain a queue and
provide the services to the users according the queuing system maintained in the server.
Authentication is provided to client to access the devices from the server.
The example devices that can be accessed like Floppy Drive, Printer. Directories & files are
displayed on client machine and can be saved on the client machine according to the
Provided authentication.
Web page View:
The user requests a webpage in the server, if the page resides in the server then the copy
of the page will given to the client. In this service the page will be transferred and immediately
opened at the client window. This service will provide that the page will reside in the server and
it will be opened in the client side without any requirements. This service is entirely different
from transferring a file from the server. In that service the file will be transferred to the client
side and it will be saved on the client side and the user may open the file according to his wish.
But in webpage view the file will not be saved on the client side, it will be opened on the client
side and source file may reside in server.
Chat:
![Page 12: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/12.jpg)
Chatting means exchanging the information between the users. Usually this kind of
“talking” is the exchange of typed-in messages requiring one site as the repository for the
messages and a group of users who take part on the network. In some cases, a private
Chat can be arranged between two parties who meet initially in a group. Chat can be ongoing or
scheduled for a particular time and duration. Chat is one way of exchanging our views. The chat
can be selected on a certain topic such as politics, religion, entertainment, education, business
etc... The chat can be done with a group of people and there are ways were we could exchange
confidential matters through private chat. In our system when we register ourselves as a user the
system will provide you a username and password. That username will be considered as your id
for chatting.
5.2. Data Flow Diagram
A DFD is a modeling tool that allows us to show a system as a network of processes (mini systems) connected to each other by paths of data.
Data Flow:
Each arrow in a DFD Represents a path (or pipeline of conveyer belt) of data, called the Data Flow.
Process:
A process represents an automated or manual activity that transforms incoming data flows to outgoing data flows.
Data-Store:
A Data-Store holds the data (for reference), which the system cannot remember.External events and system responses ate From/To “Sources” or “Destination” of the system.
Components of DFD:
The basic components of DFD are following
![Page 13: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/13.jpg)
Source/Destination
Process
Data Source
DFD are based on the strategy of structured techniques, Namely:
1. Graphics
2. Top Down Approach
3. Separation of logical from the physical
4. Partitioning
DFD is do not show
How things begin & end
Loops
Decisions
System Flow Diagram
Enter Username &Password
Start
![Page 14: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/14.jpg)
Login No Yes
Data Flow Diagram
1. User Validation
Username, Password Username,
Is Valid?
File TransferMail Resource
sharingWeb Page View Chat
LOGIN
RegistrationUser validation
DB
![Page 15: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/15.jpg)
Password, Login Key No Yes
2. File Transfer
No
Yes
Yes Virus
No
Valid User
File ChatResource Mail Webpage
File Transfer
File Transfer
File Exists
Virus File
Error Page
File Not Found
Virus File
![Page 16: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/16.jpg)
If file length Not equals
If file length equals
3. Mail
DAP
File Transfer Completed
Inbox Compose
DB
Received Messages
![Page 17: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/17.jpg)
4. Resource Sharing
Floppy Drive Client Requests Had Drives Server Responds CD-Drive Printer
5. Web Page View
No
Yes
6. Chat
Client Server
Webpage Request
Page Exists
Webpage View
Webpage Not Found
![Page 18: Advanced Secured System](https://reader036.fdocuments.us/reader036/viewer/2022081717/551d837b49795950198b4bb5/html5/thumbnails/18.jpg)
Chat server
Client-1 Client-1