Professional Documents
Culture Documents
INTRODUCTION
With the Bluetooth we can access only to some limited range. If a particular
person intended to send a file which is far away then this is not applicable, this
means that beyond the Bluetooth limit we can’t perform any operations.
Now-a-days most of the people carry mobiles. So, using this application all
tasks may be completed form the place where we are i.e., mobility and flexibility
is provided.
As we perform any file operations, handling the system and mail related
Operations using mobile. From any place in spite of being in front of the system,
it saves the time.
1
2. FEASIBILITY STUDY
Feasibility study is the high level capsule version of the entire requirement analysis
process. The objective of feasibility study is to determine whether the proposed system
can be developed with available resources. There are three steps to be followed for
determining the feasibility study of proposed system.
Technical Feasibility
Operational Feasibility
Economical Feasibility
Technical Feasibility:
Operational Feasibility:
Economical Feasibility:
2
3. REQUIREMENTS
Software Requirements:
– Apache Server
– PHP
– My Sql
– J2ME
– Blue Cove.jar
– .Net
– Edit Plus
– Windows XP
Hardware Requirements:
– 512 MB Ram
– P4
– 40 GB Hard Disk
– Mid p 2.0 enabled mobile
3
4. SYSTEM REQUIREMENT SPECIFICATION
In the present world, every time it is not possible to carry computer or laptop along with
person and it is a major disadvantage that, person cannot access his/her own system from remote
area. Like he/she cannot upload his/her own system files through internet and cannot create or
modify or delete files on his/her system.
To overcome this problem, there should be a certain feature, so that person can operate
his/her system through mobile where he/she can create or modify or upload or delete his/her own
system files from remote area, without carrying the system. Person can get email alerts to his/her
mobiles and person can access and get up-to-date data.
1. Audio player
2. File Management
3. Control Panel
4. E-mail
5. Registration
4
1. AUDIO PLAYER:
In this module, person can access the audio player from any remote area. It helps, when
the person had forgotten to stop/close the audio player in the system then he/she can operate
from the remote area, with the help of corresponding mobile phone.
A. Functionality:
B. Queries:
C. Alerts:
3. FILE MANAGEMENT:
In this module, the person can create or open or delete or rename files of the
system from remote area, with the help of corresponding mobile phone.
A. Functionality:
Open a file
Close a file
Create a file
Delete a file
Rename a file
Save a file
Move a file
Search a file
5
B. Provisioning:
Folders list
C. Alerts:
4. E-MAIL:
In this module, the person can access mails and can attach files to mail, with the
help of corresponding mobile phone.
A. Functionality:
Send a mail
Attach a mail
Compose a mail
Delete a mail
Open/read mail
B. Alerts:
5. CONTROL PANEL:
In this module, the person can turn off the system and can log off or switch user
and can also restart the system through corresponding mobile phone from any remote
area.
6
A. Functionality:
Turn off
Restart
Switch user
Change the wallpaper
B. Alerts:
6. REGISTRATION:
In this module, the person can register by giving his/her user id and password and
his/her details from any remote area with the help of corresponding mobile phone.
A. Functionality:
Register
Unregister
Login
Logout
B. Alerts:
7
1. TECHNOLOGIES USED
What is PHP?
Why PHP?
Where to Start?
Install Apache (or IIS) on your own server, install PHP, and MySQL
Or find a web hosting plan with PHP and MySQL support
A PHP scripting block always starts with <?php and ends with ?>. A PHP scripting block can be
placed anywhere in the document
<? Php
?>
8
A PHP file normally contains HTML tags, just like an HTML file, and some PHP scripting code.
<Html>
<body>
<? php
echo "Hello World";
?>
</body>
</html>
Each code line in PHP must end with a semicolon. The semicolon is a separator and is
used to distinguish one set of instructions from another.
There are two basic statements to output text with PHP: echo and print. In the example
above we have used the echo statement to output the text "Hello World".
My SQL
MySQL is a powerful Relational Database Management System (RDBMS) which we will use to
learn the basic principles of database and data manipulation using Structured Query Language
(SQL) statements. SQL is a database language that is used to retrieve, insert, delete and update
stored data. This is achieved by constructing conditional statements that conform to a specific
syntax (i.e. the strict order required of elements for a statement to work).
Although it is assumed that most people reading this know what a database and SQL are (if not
necessarily how to use them), there follows a little recap that it does no harm ;-)
9
MySQL is a database server program and as such is installed on one machine, but can 'serve' the
database to a variety of locations. To explain look at the following diagram.
The MySQL Server is installed on a Server and can be accessed directly via various client
interfaces, which send SQL statements to the server and then display the results to a user. Some
of these are:
A Local Client - a program on the same machine as the server. An example of this is the
command line MySQL client software we will be using in the rest of the MySQL workshops
(although there are other programs including graphical interfaces).
A Scripting Language - can pass SQL queries to the server and display the result.
A Remote Client - a programme on a different machine that can connect to the server and run
SQL statements.
10
Remote Login - You may be able to connect to the Server Machine to run one of its local
clients.
Web Browser - you can use a web browser and scripts that someone has written (we're going to
use this method for the rest of the workshop).
J2ME
J2ME (Java 2 Micro Edition) is an advanced technology in Java, developed with the help of
Java Community Process Program. J2ME is a reduced version of the Java API and Java
Virtual Machine that is designed to operate within the limited resources available in the
embedded computers and microcomputers.
J2ME is targeted to developers of intelligent wireless devices and small computing devices
who need to incorporate cross-platform functionality in their products. A key benefit of using
J2ME is compatibility with all Java-enabled devices. Motorola, Nokia, Panasonic all have
Java-enabled devices. A J2ME application is a balance between local and server-side processing.
J2ME (Java 2 Micro Edition) is an advanced technology in Java, developed with the help of
Java Community Process Program. J2ME is a reduced version of the Java API and Java
Virtual Machine that is designed to operate within the limited resources available in the
embedded computers and microcomputers.
J2ME is targeted to developers of intelligent wireless devices and small computing devices
who need to incorporate cross-platform functionality in their products. A key benefit of using
J2ME is compatibility with all Java-enabled devices. Motorola, Nokia, Panasonic all have
Java-enabled devices.A J2ME application is a balance between local and server-side processing.
Programs
A MIDlet is a class that extends the MIDlet class and is the interface between application
statements and the run-time environment , which is controlled by the application manager .
A MIDlet class must contain three abstract methods that are called by the application manager
to manage the life cycle of the MIDlet. These abstract methods are.
startApp(): called by the application manager when the MIDlet is started and contains
statements that are executed each time the application begins execution. Public and have
no return value nor parameter list.
pauseApp(): called before the application manager temporarily stops the MIDlet. The
application manager restarts the MIDlet by recalling the startApp() method. Public
and have no return value nor parameter list.
11
destroyApp(): called prior to the termination of the MIDlet by the application manager.
Public method without a return value. It has a boolean parameter that is set to true if the
termination of the MIDlet is unconditional, and false if the MIDlet can throw a
MIDletStateChangeException.
MIDP API classes are used by the MIDlet to interact with the user and handle data management.
User interactions are managed by user interface MIDP API classes. These APIs prompt the
user to respond with an appropriate command. The command causes the MIDlet to execute
one of three routines:
Perform a computation.
Make a network request.
Display another screen.
Bluetooth Device:
Bluetooth Applications:
Bluetooth provides support for three general application areas using short-range wireless
connectivity:
Data and voice access points - Bluetooth facilitates real-time voice and data
transmissions by providing effortless wireless connection of portable and stationary
communications devices;
Cable replacement - Bluetooth eliminates the need for numerous, often proprietary cable
attachments for connection of practically any kind of communications device.
Connections are instant and are maintained even when devices are not within line of
sight. The range of each radio is approximately 10 m, but can be extended to 100 m with
an optional amplifier;
12
Ad hoc networking - A device equipped with a Bluetooth radio can establish instant
connection to another Bluetooth radio as soon as it comes into range.
The Bluetooth standards present a formidable, divided into two groups: core and profile. The
core specifications describe the details of the various layers of the Bluetooth protocol
architecture, from the radio interface to link control. Related topics are also covered, such as
interoperability with related technologies, testing requirements, and a definition of various
Bluetooth timers and their associated values.
The profile specifications are concerned with the use of Bluetooth technology to support various
applications. Each profile specification discusses the use of the technology defined in the core
specifications to implement a particular usage model. The purpose of a profile specification is to
define a standard of interoperability, so that products from different vendors that claim to support
a given usage model will work together
The Bluetooth developer must wade through the many documents with a particular application in
mind. The reading list begins with coverage of some essential core specifications plus the
general access profile. Following a basic set of documents, the reading list splits along two lines,
depending on whether the reader's interest is in cable replacement or wireless audio.
Protocol Architecture
The core protocols form a five-layer stack consisting of the following elements:
Radio - Specifies details of the air interface, including frequency, the use of frequency
hopping, modulation scheme, and transmit power.
Baseband - Concerned with connection establishment within a piconet, addressing,
packet format, timing, and power control.
Link manager protocol (LMP) - Responsible for link setup between Bluetooth devices
and ongoing link management. This includes security aspects such as authentication and
encryption, plus the control and negotiation of baseband packet sizes.
Logical link control and adaptation protocol (L2CAP) - Adapts upper-layer protocols
to the baseband layer. L2CAP provides both connectionless and connection-oriented
services.
Service discovery protocol (SDP) - Device information, services, and the characteristics
of the services can be queried to enable the establishment of a connection between two or
more Bluetooth devices.
13
Protocol Architecture
The core protocols form a five-layer stack consisting of the following elements:
Radio - Specifies details of the air interface, including frequency, the use of frequency
hopping, modulation scheme, and transmit power.
Baseband - Concerned with connection establishment within a piconet, addressing,
packet format, timing, and power control.
Link manager protocol (LMP) - Responsible for link setup between Bluetooth devices
and ongoing link management. This includes security aspects such as authentication and
encryption, plus the control and negotiation of baseband packet sizes.
Logical link control and adaptation protocol (L2CAP) - Adapts upper-layer protocols
to the baseband layer. L2CAP provides both connectionless and connection-oriented
services.
Service discovery protocol (SDP) - Device information, services, and the characteristics
of the services can be queried to enable the establishment of a connection between two or
more Bluetooth devices.
Bluetooth specifies a telephony control protocol. TCS BIN (telephony control specification
binary) is a bit-oriented protocol that defines the call control signaling for the establishment of
speech and data calls between Bluetooth devices. In addition, it defines mobility-management
procedures for handling groups of Bluetooth TCS devices.
14
2. CLIENT-SERVER ARCHITECTURE
A network architecture in which each computer or process on the network is either a client
or server.
Components:
• Clients
• Servers
• Communication Networks
Clients:
– Files
– Devices
– Processing power
Server:
15
– A computer system that processes database queries
Communication Network:
Client–Server Computing:
– on the client
• Servers
• Clients
– Make requests
Client-Server Architecture
16
Let’s take an example of a file server to understand the core process of a client/server
network, the file server acts as a storage space on the network for the files, spreadsheets,
databases, etc.
Instead of storing these records on every individual computer, the file server allows the
clients to store their files on one central computer and make them sharable. The client-server
architecture is beneficial in reducing the multiple iterations of a single file and allowing the
organization to have one centralized point for every computer to access the same file.
The interaction between a lamp and an electrical socket can be considered as a interaction
between client and server is just like. In the example the electrical socket is just like a server and
the lamp works like a client.
17
3. E-R MODEL DIAGRAMS
USER E-MAIL
username PK e-id
PK userid e-password
password FK userid
18
4. DATA BASE TABLE STRUCTURES
Login
E-Mail Account
19
Create table:
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
# Tables #
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
);
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
`userid` VARCHAR(40),
);
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
Drop table:
# ---------------------------------------------------------------------- #
21
# Author: Parveen Sultana,Sujatha,Srujana,Sravanthi #
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
# Drop constraints #
# Drop table #
# ---------------------------------------------------------------------- #
# ---------------------------------------------------------------------- #
# Drop constraints #
# Drop table #
22
5. UML Diagrams
Class Diagram:
23
Use case Diagram:
24
6. SCREEN SHOTS
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
7. Testing
Testing is the process of detecting errors. Testing performs a very critical role for quality
assurance and for ensuring the reliability of software. The results of testing are used later on
during maintenance also.
Psychology of Testing
System testing:
Validation testing:
To demonstrate to the developer and the system customer that the software meets
its requirements;
A successful test shows that the system operates as intended.
79
Defect testing:
It is also called functional testing and behavioral testing, focuses on determining whether or not a
program does what it is supposed to do based on its functional requirements. _ No knowledge of
internal structure of code.
White-box:
White-box testing is testing that takes into account the internal mechanism of a system or
component. White-box testing is also known as structural testing, clear box testing, and glass
box testing.
Integration Testing:
Integration testing is testing increments of the system; release testing involves testing a system to
be released to a customer.
Involves building a system from its components and testing it for problems that arise from
component interactions.
Top-down integration:
Bottom-up integration:
80
8. Conclusion
The entire project has been developed and deployed as per the requirements stated by
the normal user, who is facing many problems in maintaining PC’s. Problems like, Carrying
PC’s along with them and operating manually and etc.
Using Mobile, User can easily operate almost all features with out moving. Such that it
provides Mobility. It is found to be bug free as per the testing standards that are implements.
This project provides facilities like, checking mails, accessing files, operating media player
and also can restart, shut-down the system through mobile from anywhere.
81
9. Bibliography
References for the project development were taken from the following books and web sites.
Java Technologies:
J2ME:
The Complete Reference
PHP:
A Programmer’s Introduction to PHP 4.0 (Apress)
My Sql:
My SQL Reference Manual
82