You are on page 1of 82

1.

INTRODUCTION

1.1 Existing System

To perform any manipulations, a person must be in front of the system.


Suppose if person willing to shutdown a system his presence is necessary and if
he wish to perform the same task from anywhere else. It takes more time. In this
sense it is a time consuming process.

With the Bluetooth we can access only to some limited range. If a particular
person intended to send a file which is far away then this is not applicable, this
means that beyond the Bluetooth limit we can’t perform any operations.

1.2 Proposed System

It would be easier, if there is software with which we can access from


anywhere through mobile which is connected to our system.

Now-a-days most of the people carry mobiles. So, using this application all
tasks may be completed form the place where we are i.e., mobility and flexibility
is provided.

As we perform any file operations, handling the system and mail related
Operations using mobile. From any place in spite of being in front of the system,
it saves the time.

1
2. FEASIBILITY STUDY

Feasibility study is the high level capsule version of the entire requirement analysis
process. The objective of feasibility study is to determine whether the proposed system
can be developed with available resources. There are three steps to be followed for
determining the feasibility study of proposed system.

 Technical Feasibility
 Operational Feasibility
 Economical Feasibility

Technical Feasibility:

It is concerned with hardware and software feasibility. In this


study, one has to test whether the proposed system can be developed using existing
technology or not. If new technology is required, what is the likely hood that it can be
developed.

Operational Feasibility:

Operational feasibility determines whether the proposed system


satisfied the user objectives and can be fitted in to current system operation. The
proposed system “Mobi-System” can be justified.

Economical Feasibility:

This includes an evaluation of all incremental costs and


benefits expected if proposed system is implemented. Costs-benefit analysis which is to
be performed during economical feasibility delineates costs for project development and
weighs them against benefits of system.

2
3. REQUIREMENTS
Software Requirements:

– Apache Server
– PHP
– My Sql
– J2ME
– Blue Cove.jar
– .Net
– Edit Plus
– Windows XP

Hardware Requirements:

– 512 MB Ram
– P4
– 40 GB Hard Disk
– Mid p 2.0 enabled mobile

3
4. SYSTEM REQUIREMENT SPECIFICATION

In the present world, every time it is not possible to carry computer or laptop along with
person and it is a major disadvantage that, person cannot access his/her own system from remote
area. Like he/she cannot upload his/her own system files through internet and cannot create or
modify or delete files on his/her system.

To overcome this problem, there should be a certain feature, so that person can operate
his/her system through mobile where he/she can create or modify or upload or delete his/her own
system files from remote area, without carrying the system. Person can get email alerts to his/her
mobiles and person can access and get up-to-date data.

According to our analysis, we have found the following modules.

1. Audio player

2. File Management

3. Control Panel

4. E-mail

5. Registration

4
1. AUDIO PLAYER:

In this module, person can access the audio player from any remote area. It helps, when
the person had forgotten to stop/close the audio player in the system then he/she can operate
from the remote area, with the help of corresponding mobile phone.

A. Functionality:

 Start Audio Player


 Stop Audio Player
 Pause audio Player
 Forward Audio Player
 Backward Audio Player
 Selecting a song from the list

B. Queries:

 What songs are available?

C. Alerts:

 No Next song available


 No previous song available

3. FILE MANAGEMENT:

In this module, the person can create or open or delete or rename files of the
system from remote area, with the help of corresponding mobile phone.

A. Functionality:

 Open a file
 Close a file
 Create a file
 Delete a file
 Rename a file
 Save a file
 Move a file
 Search a file

5
B. Provisioning:

 Folders list

C. Alerts:

 Unable to open a file


 Unable to close a file
 Unable to delete a file
 Unable to rename a file
 File name already exists

4. E-MAIL:

In this module, the person can access mails and can attach files to mail, with the
help of corresponding mobile phone.

A. Functionality:

 Send a mail
 Attach a mail
 Compose a mail
 Delete a mail
 Open/read mail

B. Alerts:

 You have got a new mail


 Mail has been sent successfully
 This file cant be attached

5. CONTROL PANEL:

In this module, the person can turn off the system and can log off or switch user
and can also restart the system through corresponding mobile phone from any remote
area.

6
A. Functionality:

 Turn off
 Restart
 Switch user
 Change the wallpaper

B. Alerts:

 Windows is shutting down


 Saving your setting

6. REGISTRATION:

In this module, the person can register by giving his/her user id and password and
his/her details from any remote area with the help of corresponding mobile phone.

A. Functionality:

 Register
 Unregister
 Login
 Logout

B. Alerts:

 Password length should be more than six characters


 Password mismatch
 Field cannot be blank

7
1. TECHNOLOGIES USED

What is PHP?

 PHP stands for PHP: Hypertext Preprocessor


 PHP is a server-side scripting language, like ASP
 PHP scripts are executed on the server
 PHP supports many databases (MySQL, Informix, Oracle, Sybase, Solid, PostgreSQL,
Generic ODBC, etc.)
 PHP is an open source software
 PHP is free to download and use

What is a PHP File?

 PHP files can contain text, HTML tags and scripts


 PHP files are returned to the browser as plain HTML 
 PHP files have a file extension of ".php", ".php3", or ".phtml"

Why PHP?

 PHP runs on different platforms (Windows, Linux, UNIX, etc.)


 PHP is compatible with almost all servers used today (Apache, IIS, etc.)
 PHP is easy to learn and runs efficiently on the server side

Where to Start?

To get access to a web server with PHP support, you can:

 Install Apache (or IIS) on your own server, install PHP, and MySQL
 Or find a web hosting plan with PHP and MySQL support

Basic PHP Syntax

A PHP scripting block always starts with <?php and ends with ?>. A PHP scripting block can be
placed anywhere in the document

<? Php
?>

8
A PHP file normally contains HTML tags, just like an HTML file, and some PHP scripting code.

<Html>
<body>

<? php
echo "Hello World";
?>

</body>
</html>

Each code line in PHP must end with a semicolon. The semicolon is a separator and is
used to distinguish one set of instructions from another.

There are two basic statements to output text with PHP: echo and print. In the example
above we have used the echo statement to output the text "Hello World".

My SQL

What is MySQL and why are we using it?

MySQL is a powerful Relational Database Management System (RDBMS) which we will use to
learn the basic principles of database and data manipulation using Structured Query Language
(SQL) statements. SQL is a database language that is used to retrieve, insert, delete and update
stored data. This is achieved by constructing conditional statements that conform to a specific
syntax (i.e. the strict order required of elements for a statement to work).

Although it is assumed that most people reading this know what a database and SQL are (if not
necessarily how to use them), there follows a little recap that it does no harm ;-)

How does MySQL work?

9
MySQL is a database server program and as such is installed on one machine, but can 'serve' the
database to a variety of locations. To explain look at the following diagram.

The MySQL Server is installed on a Server and can be accessed directly via various client
interfaces, which send SQL statements to the server and then display the results to a user. Some
of these are:

A Local Client - a program on the same machine as the server. An example of this is the
command line MySQL client software we will be using in the rest of the MySQL workshops
(although there are other programs including graphical interfaces).

A Scripting Language - can pass SQL queries to the server and display the result.

A Remote Client - a programme on a different machine that can connect to the server and run
SQL statements.

You can also use two more indirect methods.

10
Remote Login - You may be able to connect to the Server Machine to run one of its local
clients.

Web Browser - you can use a web browser and scripts that someone has written (we're going to
use this method for the rest of the workshop).

J2ME

J2ME (Java 2 Micro Edition) is an advanced technology in Java, developed with the help of
Java Community Process Program. J2ME is a reduced version of the Java API and Java
Virtual Machine that is designed to operate within the limited resources available in the
embedded computers and microcomputers.

J2ME is targeted to developers of intelligent wireless devices and small computing devices
who need to incorporate cross-platform functionality in their products. A key benefit of using
J2ME is compatibility with all Java-enabled devices. Motorola, Nokia, Panasonic all have
Java-enabled devices. A J2ME application is a balance between local and server-side processing.

J2ME (Java 2 Micro Edition) is an advanced technology in Java, developed with the help of
Java Community Process Program. J2ME is a reduced version of the Java API and Java
Virtual Machine that is designed to operate within the limited resources available in the
embedded computers and microcomputers.

J2ME is targeted to developers of intelligent wireless devices and small computing devices
who need to incorporate cross-platform functionality in their products. A key benefit of using
J2ME is compatibility with all Java-enabled devices. Motorola, Nokia, Panasonic all have
Java-enabled devices.A J2ME application is a balance between local and server-side processing.

Programs

A MIDlet is a class that extends the MIDlet class and is the interface between application
statements and the run-time environment , which is controlled by the application manager .
A MIDlet class must contain three abstract methods that are called by the application manager
to manage the life cycle of the MIDlet. These abstract methods are.

 startApp(): called by the application manager when the MIDlet is started and contains
statements that are executed each time the application begins execution. Public and have
no return value nor parameter list.
 pauseApp(): called before the application manager temporarily stops the MIDlet. The
application manager restarts the MIDlet by recalling the startApp() method. Public
and have no return value nor parameter list.

11
 destroyApp(): called prior to the termination of the MIDlet by the application manager.
Public method without a return value. It has a boolean parameter that is set to true if the
termination of the MIDlet is unconditional, and false if the MIDlet can throw a
MIDletStateChangeException.

The Basic Midlet Shell.

public class BasicMIDletShell extends MIDlet


{
public void startApp(){ }
public void pauseApp(){ }
public void destroyApp( boolean unconditional){ }
}

MIDP API classes are used by the MIDlet to interact with the user and handle data management.
User interactions are managed by user interface MIDP API classes. These APIs prompt the
user to respond with an appropriate command. The command causes the MIDlet to execute
one of three routines:

 Perform a computation.
 Make a network request.
 Display another screen.

Bluetooth Device:

Bluetooth Applications:

Bluetooth is designed to operate in an environment of many users. Up to eight devices can


communicate in a small network called a piconet. Ten of these piconets can coexist in the same
coverage range of the Bluetooth radio. To provide security, each link is encoded and protected
against eavesdropping and interference.

Bluetooth provides support for three general application areas using short-range wireless
connectivity:

 Data and voice access points - Bluetooth facilitates real-time voice and data
transmissions by providing effortless wireless connection of portable and stationary
communications devices;
 Cable replacement - Bluetooth eliminates the need for numerous, often proprietary cable
attachments for connection of practically any kind of communications device.
Connections are instant and are maintained even when devices are not within line of
sight. The range of each radio is approximately 10 m, but can be extended to 100 m with
an optional amplifier;

12
 Ad hoc networking - A device equipped with a Bluetooth radio can establish instant
connection to another Bluetooth radio as soon as it comes into range.

Bluetooth Standards Documents

The Bluetooth standards present a formidable, divided into two groups: core and profile. The
core specifications describe the details of the various layers of the Bluetooth protocol
architecture, from the radio interface to link control. Related topics are also covered, such as
interoperability with related technologies, testing requirements, and a definition of various
Bluetooth timers and their associated values.

The profile specifications are concerned with the use of Bluetooth technology to support various
applications. Each profile specification discusses the use of the technology defined in the core
specifications to implement a particular usage model. The purpose of a profile specification is to
define a standard of interoperability, so that products from different vendors that claim to support
a given usage model will work together

The Bluetooth developer must wade through the many documents with a particular application in
mind. The reading list begins with coverage of some essential core specifications plus the
general access profile. Following a basic set of documents, the reading list splits along two lines,
depending on whether the reader's interest is in cable replacement or wireless audio.

Protocol Architecture

Bluetooth is defined as a layered protocol architecture consisting of core protocols, cable


replacement and telephony control protocols, and adopted protocols.

The core protocols form a five-layer stack consisting of the following elements:

 Radio - Specifies details of the air interface, including frequency, the use of frequency
hopping, modulation scheme, and transmit power.
 Baseband - Concerned with connection establishment within a piconet, addressing,
packet format, timing, and power control.
 Link manager protocol (LMP) - Responsible for link setup between Bluetooth devices
and ongoing link management. This includes security aspects such as authentication and
encryption, plus the control and negotiation of baseband packet sizes.
 Logical link control and adaptation protocol (L2CAP) - Adapts upper-layer protocols
to the baseband layer. L2CAP provides both connectionless and connection-oriented
services.
 Service discovery protocol (SDP) - Device information, services, and the characteristics
of the services can be queried to enable the establishment of a connection between two or
more Bluetooth devices.

13
Protocol Architecture

Bluetooth is defined as a layered protocol architecture consisting of core protocols, cable


replacement and telephony control protocols, and adopted protocols.

The core protocols form a five-layer stack consisting of the following elements:

 Radio - Specifies details of the air interface, including frequency, the use of frequency
hopping, modulation scheme, and transmit power.
 Baseband - Concerned with connection establishment within a piconet, addressing,
packet format, timing, and power control.
 Link manager protocol (LMP) - Responsible for link setup between Bluetooth devices
and ongoing link management. This includes security aspects such as authentication and
encryption, plus the control and negotiation of baseband packet sizes.
 Logical link control and adaptation protocol (L2CAP) - Adapts upper-layer protocols
to the baseband layer. L2CAP provides both connectionless and connection-oriented
services.
 Service discovery protocol (SDP) - Device information, services, and the characteristics
of the services can be queried to enable the establishment of a connection between two or
more Bluetooth devices.

Bluetooth specifies a telephony control protocol. TCS BIN (telephony control specification
binary) is a bit-oriented protocol that defines the call control signaling for the establishment of
speech and data calls between Bluetooth devices. In addition, it defines mobility-management
procedures for handling groups of Bluetooth TCS devices.

14
2. CLIENT-SERVER ARCHITECTURE

A network architecture in which each computer or process on the network is either a client
or server.

Components:

• Clients

• Servers

• Communication Networks

Clients:

• Applications that run on computers

• Rely on servers for

– Files

– Devices

– Processing power

• Example: E-mail client

– An application that enables you to send and receive e-mail

Server:

• Computers or processes that manage network resources

– Disk drives (file servers)

– Printers (print servers)

– Network traffic (network servers)

• Example: Database Server

15
– A computer system that processes database queries

Communication Network:

 Networks Connect Clients and Servers

Client–Server Computing:

• Process takes place

– on the server and

– on the client

• Servers

– Store and protect data

– Process requests from clients

• Clients

– Make requests

– Format data on the desktop

Client-server architecture can be considered as a network environment that exchanges


information between a server machine and a client machine where server has some resources that
can be shared by different clients.

Client-Server Architecture

Client-server architecture can be considered as a network environment that exchanges


information between a server machine and a client machine where server has some resources that
can be shared by different clients.

In a Client/server architecture individual computers (known as clients) are connected to a


central computer which is known as Server.

16
Let’s take an example of a file server to understand the core process of a client/server
network, the file server acts as a storage space on the network for the files, spreadsheets,
databases, etc.

Instead of storing these records on every individual computer, the file server allows the
clients to store their files on one central computer and make them sharable. The client-server
architecture is beneficial in reducing the multiple iterations of a single file and allowing the
organization to have one centralized point for every computer to access the same file.

  

The interaction between a lamp and an electrical socket can be considered as a interaction
between client and server is just like. In the example the electrical socket is just like a server and
the lamp works like a client. 

17
3. E-R MODEL DIAGRAMS

USER E-MAIL
username PK e-id
PK userid e-password
password FK userid

18
4. DATA BASE TABLE STRUCTURES

Login

Name Data Type Constraint


User name Varchar(50) Not Null
User id Varchar(50) Primary Key
Password Varchar(50) Not Null

E-Mail Account

Name Data Type Constraint


E-mail id Varchar(50) Primary Key
Password Varchar(50) Not Null

19
Create table:

# ---------------------------------------------------------------------- #

# Script generated with: DeZign for Databases v5.2.2 #

# Target DBMS: MySQL 5 #

# Project file: Project1.dez #

# Project name: Mobi-System #

# Author: Parveen Sultana,Sujatha,Srujana,Sravanthi #

# Script type: Database creation script #

# Created on: 2009-04-15 11:33 #

# Model version: Version 2009-04-15 #

# ---------------------------------------------------------------------- #

# ---------------------------------------------------------------------- #

# Tables #

# ---------------------------------------------------------------------- #

# ---------------------------------------------------------------------- #

# Add table "USER" #

# ---------------------------------------------------------------------- #

CREATE TABLE `USER` (

`username` VARCHAR(40) NOT NULL,

`userid` VARCHAR(40) NOT NULL,


20
`password` VARCHAR(40) NOT NULL,

CONSTRAINT `PK_USER` PRIMARY KEY (`userid`)

);

# ---------------------------------------------------------------------- #

# Add table "E-MAIL" #

# ---------------------------------------------------------------------- #

CREATE TABLE `E-MAIL` (

`e-id` VARCHAR(40) NOT NULL,

`e-password` VARCHAR(40) NOT NULL,

`userid` VARCHAR(40),

CONSTRAINT `PK_E-MAIL` PRIMARY KEY (`e-id`)

);

# ---------------------------------------------------------------------- #

# Foreign key constraints #

# ---------------------------------------------------------------------- #

ALTER TABLE `E-MAIL` ADD CONSTRAINT `USER_E-MAIL`

FOREIGN KEY (`userid`) REFERENCES `USER` (`userid`);

Drop table:

# ---------------------------------------------------------------------- #

# Script generated with: DeZign for Databases v5.2.2 #

# Target DBMS: MySQL 5 #

# Project file: Project1.dez #

# Project name: Mobi-System #

21
# Author: Parveen Sultana,Sujatha,Srujana,Sravanthi #

# Script type: Database drop script #

# Created on: 2009-04-15 11:33 #

# Model version: Version 2009-04-15 #

# ---------------------------------------------------------------------- #

# ---------------------------------------------------------------------- #

# Drop foreign key constraints #

# ---------------------------------------------------------------------- #

ALTER TABLE `E-MAIL` DROP FOREIGN KEY `USER_E-MAIL`;

# ---------------------------------------------------------------------- #

# Drop table "USER" #

# ---------------------------------------------------------------------- #

# Drop constraints #

ALTER TABLE `USER` DROP PRIMARY KEY;

# Drop table #

DROP TABLE `USER`;

# ---------------------------------------------------------------------- #

# Drop table "E-MAIL" #

# ---------------------------------------------------------------------- #

# Drop constraints #

ALTER TABLE `E-MAIL` DROP PRIMARY KEY;

# Drop table #

DROP TABLE `E-MAIL`;

22
5. UML Diagrams

Class Diagram:

23
Use case Diagram:

24
6. SCREEN SHOTS

25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
7. Testing

Testing is the process of detecting errors. Testing performs a very critical role for quality
assurance and for ensuring the reliability of software. The results of testing are used later on
during maintenance also.

Psychology of Testing

The aim of testing is often to demonstrate that a program works


by showing that it has no errors. The basic purpose of testing phase is to detect the errors that
may be present in the program. Hence one should not start testing with the intent of showing
that a program works, but the intent should be to show that a program doesn’t work. Testing
is the process of executing a program with the intent of finding errors.

The testing process:

Component (or unit) testing:

 Testing of individual program components


 Usually the responsibility of the component
 Developer (except sometimes for critical systems)
 Tests are derived from the developer’s experience.

System testing:

 Testing of groups of components integrated to create a system)


 The responsibility of an independent testing team
 Tests are based on a system specification.

Testing process goals:

Validation testing:

 To demonstrate to the developer and the system customer that the software meets
its requirements;
 A successful test shows that the system operates as intended.

79
Defect testing:

 To discover faults or defects in the software where its behavior is


incorrect or not in behavior is incorrect or not in conformance
with its specification;
 A successful test is a test that makes the system perform
incorrectly and so exposes a defect in the system.
 Test show the presence not the absence of defects

Black box testing:

It is also called functional testing and behavioral testing, focuses on determining whether or not a
program does what it is supposed to do based on its functional requirements. _ No knowledge of
internal structure of code.

White-box:

White-box testing is testing that takes into account the internal mechanism of a system or
component. White-box testing is also known as structural testing, clear box testing, and glass
box testing.

Integration Testing:

Integration testing is testing increments of the system; release testing involves testing a system to
be released to a customer.

Involves building a system from its components and testing it for problems that arise from
component interactions.

Top-down integration:

Develop the skeleton of the system and populate it with components.

Bottom-up integration:

Integrate infrastructure components then add functional components.


To simplify error localization, systems should be incrementally integrated.

80
8. Conclusion

The entire project has been developed and deployed as per the requirements stated by
the normal user, who is facing many problems in maintaining PC’s. Problems like, Carrying
PC’s along with them and operating manually and etc.

Using Mobile, User can easily operate almost all features with out moving. Such that it
provides Mobility. It is found to be bug free as per the testing standards that are implements.
This project provides facilities like, checking mails, accessing files, operating media player
and also can restart, shut-down the system through mobile from anywhere.

81
9. Bibliography

References for the project development were taken from the following books and web sites.

Java Technologies:

Java Complete References

J2ME:
The Complete Reference

Enterprise J2ME Developing mobile java application by Michael Juntao Yuan

PHP:
A Programmer’s Introduction to PHP 4.0 (Apress)

My Sql:
My SQL Reference Manual

82

You might also like