Online College Magazine



Similar documents
1. Introduction 1.1 Methodology

How to make a good Software Requirement Specification(SRS)

Banasthali Vidyapith. Contact Management Software Requirements Specification. Team Rhyzome

IBM Rational Web Developer for WebSphere Software Version 6.0

Client/server is a network architecture that divides functions into client and server

Software Requirements Specification. Online University Admission System. for. Version 1.0 approved. Prepared by B. VIGNESH.

Glassfish, JAVA EE, Servlets, JSP, EJB

What Is the Java TM 2 Platform, Enterprise Edition?

JAVA Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS QUARTER 2 NETWORKING AND OPERATING SYSTEMS ESSENTIALS. Module 1 - Office Applications

XTendTraders.com Trading room simulator

A Monitored Student Testing Application Using Cloud Computing

NetBeans IDE Field Guide

What Is NetBeans? Free and open-source based > Open source since June, 2000 > Large community of users and developers

State of New Jersey Shared IT Architecture

Testing and Deploying IBM Rational HATS 8.5 Applications on Apache Geronimo Server 3.1

Windows 2000 / NT 4.0 / 95 / 98, MS-DOS, Suse Operating Systems

Modeling Web Applications Using Java And XML Related Technologies

era J2EE Platform and Tool Recommendations

3-Tier Architecture. 3-Tier Architecture. Prepared By. Channu Kambalyal. Page 1 of 19

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

SOFTWARE ARCHITECTURE FOR FIJI NATIONAL UNIVERSITY CAMPUS INFORMATION SYSTEMS

Design and Functional Specification

Take full advantage of IBM s IDEs for end- to- end mobile development

Integrated and reliable the heart of your iseries system. i5/os the next generation iseries operating system

Eclectic Computing. Time Tracking Tool Software Architecture Document. Version <1.3>

Software Architecture Document

Concepts of Database Management Seventh Edition. Chapter 9 Database Management Approaches

A framework for web-based product data management using J2EE

Sample copy. Introduction To WebLogic Server Property of Web 10.3 Age Solutions Inc.

Link Analysis Tool Design Description Final Version

Software Requirement Specification For Flea Market System

Building Web Applications, Servlets, JSP and JDBC

Productivity Comparison for Building Applications and Web Services

Web Hosting. Comprehensive, scalable solutions for hosting dynamic websites, secure web services, and enterprise applications.

This presentation will provide a brief introduction to Rational Application Developer V7.5.

SECURITY DOCUMENT. BetterTranslationTechnology

Case Studies of Running the Platform. NetBeans UML Servlet JSP GlassFish EJB

DESIGN OF MOBILE APPLICATION FOR SCHEDULING APPOINTMENT WITH BANK PERSONNEL FOR BANKING SERVICES

DIGITAL RIGHTS MANAGEMENT SYSTEM FOR MULTIMEDIA FILES

Novell Access Manager

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

IUCLID 5 Guidance and Support

IBM Application Hosting EDI Services Expedite software adds Secure Sockets Layer TCP/IP support

Time Tracking System with GWT

Software Design Specification

Content Management Systems: Drupal Vs Jahia

Software Requirements Specification VODKA. for. Version 1.1 Approved April 24, 2007

How to Build an E-Commerce Application using J2EE. Carol McDonald Code Camp Engineer

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

COMPANIES REGISTRY. Third Party Software Interface Specification. (Part 1 Overview)

Software Requirements Specification For Real Estate Web Site

Building Java Servlets with Oracle JDeveloper

High Level Design Distributed Network Traffic Controller

Chapter 1 - Web Server Management and Cluster Topology

Software Requirements Specification

CREDIT CARD PROCESSING

YubiKey Authentication Module Design Guideline

Building Web Services with Apache Axis2

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Customer Bank Account Management System Technical Specification Document

Techniques for Scaling Components of Web Application

Critical Infrastructure Protection in the National Capital Region

GRAD Analytics Advanced price and promotional analysis interface. Reactive UI providing dimensional visibility to marketing analysis.

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.

Fahad H.Alshammari, Rami Alnaqeib, M.A.Zaidan, Ali K.Hmood, B.B.Zaidan, A.A.Zaidan

An Overview of Oracle Forms Server Architecture. An Oracle Technical White Paper April 2000

VOL. 2, NO. 1, January 2012 ISSN ARPN Journal of Science and Technology ARPN Journals. All rights reserved

DESIGN AND IMPLEMENTATION OF A FILE SHARING APPLICATION FOR ANDROID

2012 LABVANTAGE Solutions, Inc. All Rights Reserved.

Configuring Nex-Gen Web Load Balancer

Basic TCP/IP networking knowledge of client/server concepts Basic Linux commands and desktop navigation (if don't know we will cover it )

Instant Chime for IBM Sametime For IBM Websphere and IBM DB2 Installation Guide

PROJECT MANAGEMENT SYSTEM

Instant Chime for IBM Sametime Installation Guide for Apache Tomcat and Microsoft SQL

Remote Authentication and Single Sign-on Support in Tk20

Internet Engineering: Web Application Architecture. Ali Kamandi Sharif University of Technology Fall 2007

Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1

Secure the Web: OpenSSO

24x7 Scheduler Multi-platform Edition 5.2

ABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper

WebSphere Suite Overview

EVALUATION OF SERVER-SIDE TECHNOLOGY FOR WEB DEPLOYMENT

The increasing popularity of mobile devices is rapidly changing how and where we

FACULTY STUDENT MENTORSHIP PROGRAM. A Thesis. Presented to the. Faculty of. San Diego State University. In Partial Fulfillment

: Test 217, WebSphere Commerce V6.0. Application Development

FileMaker Server 13. Getting Started Guide

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc

How To Develop An Application Developer For An Ubio Websphere Studio 5.1.1

This chapter will discuss the problem domain, motivation to the project, background materials, references and proposed solution.

Using Rich UI Frameworks for Monitoring and managing 4G Network elements

Introduction to Apache Roller. Matt Raible Apache Roller Committer June 2007

JAVA/J2EE DEVELOPER RESUME

Course Name: Course in JSP Course Code: P5

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, Integration Guide IBM

Transport Layer Security Protocols

Apache Server Implementation Guide

Workshop for WebLogic introduces new tools in support of Java EE 5.0 standards. The support for Java EE5 includes the following technologies:

SRS for AakashTechSupport Documentation

Symplified I: Windows User Identity. Matthew McNew and Lex Hubbard

Transcription:

Software Requirement Specification Chennai Campus Vandalur-Kelambakkam Road, Chennai 600048

Ciphers Online College Magazine IBM TGMC-2011 Version 1.0 Team Members : Mentor: Prof. B. Sathis Kumar 1. Aanchal Maheshwari (10BCE1002) (Assistant Professor(SG)- 2.Sanket Chaudhari (10BCE1087) School of Computer Science) 3. Saurabh Jha (10BCE1089) 4. Tejaswi Agarwal (10BCE1105) Ciphers 2011 1

1. Introduction 1.1 Purpose... 3 1.2 Scope... 3 1.3 Definitions, Acronyms and Abbreviations... 4 1.4 Tools Used... 5 1.5 References... 6 1.6 Technologies to be used... 6 1.7 Overview... 7 2. Overall Description 2.1 Product Perspective... 9 2.2 Software Interface... 9 2.3 Hardware Interface... 9 2.4 Communication Interface... 11 2.5 Constraints... 11 2.6 ER Diagram... 12 2.7 Use-Case Model Survey... 13 2.8 Architecture Design... 14 2.9 Database Design... 15 3. Specific Requirements 3.1 Use-Case Reports... 16 3.2 Class Diagrams... 20 3.3Activity Diagrams... 21 3.4 Sequence Diagrams... 27 4. Supporting Information... 30 Ciphers 2011 2

1. Introduction: Online college magazine is a platform for students to exhibit their talent through the online college magazine website by submitting their articles. We appreciate the power of social media in this digital era. Online College magazine is a boon to students as hard copies leads to wastage of paper and are cumbersome to carry. It s the age where people prefer writing blogs and staying in touch through the internet. It provides our youngsters to speak their mind out and thus instills in them a sense of independence and individuality. 1.1 Purpose: Every student has access to the internet. Hence, it becomes imperative to create an online college magazine for students to share their own articles, read various articles, thus promoting literary insight. All students do not have access to the printed magazine, and it is not eco-friendly as it leads to wastage of paper. An online college magazine can completely replace the printed version and all students can have complete access to it in this age of internet. It creates a user-friendly interactive place where students/faculty can share their ideas. Ratings on article create a healthy competition amongst students. It will be an open website, and everybody will have access to view articles. 1.2 Scope: Different users like students, faculty, administrators and moderators have corresponding privileges A centralized database of all profiles and articles is created and only the administrator has access to it. Separate moderators for each category to categorize the articles. Students/Faculty have their own profiles where they can submit articles, view all articles, comment on articles, report articles and them. Ciphers 2011 3

All submitted articles are received by the moderator first where he can review and edit them and then post is successfully created on the website. An email is immediately sent to the user with the reason once his article is rejected with the reason for rejection. The website has a dynamic search engine for articles and posts. Archives are maintained for all articles till date. Articles are classified into various categories based on tags and scope for easier navigation through the website. The homepage consist of the most read articles, most rated articles, the recent articles, editors pick, article of the month, college news and latest arrivals in the library. FAQ section is also included for users benefit. 1.3 Definitions, Acronyms, Abbreviations: Admin Administrator (super user), he is the controller of all the students, faculty, guests and maintaining all records of the students and faculty. Moderator Editor-a person who reviews all articles, takes suggestions about the website and mark articles as spam. Users End users, those who only registered in this site. Guests Guests who visit the website-users who are not registered. HTML Hypertext Markup Language is to create static websites. Ciphers 2011 4

J2EE Java 2 Enterprise Edition is a programming platform and it is the part of the java platform for developing and running distributed java applications. WAS Web sphere application server community edition is an application server that runs and supports the J2EE and web service applications. RSA Rational Software Architect is a designer toolkit which is designed for develop more complex projects by providing fully dynamic web service. DB2 Database 2 is the database management system that provides a flexible and efficient database platform to erect strong on demand business applications. XML - Extensive Markup Language used for data transfer and XML is stored naturally in DB2. EJB Enterprise java bean, it is architecture for the development and deployment of transactional, distributed object applications-based, server-side software components. HTTP Hypertext transfer protocol is a transaction oriented client/server protocol between web browser and a web server. HTTPS Secure hypertext transfer protocol is a hypertext transfer protocol over secure socket layer. TCP/IP Transmission control protocol/internet protocol is the communication protocol used to connect hosts on the internet. RAD : is a development tool that helps to design web pages and also helps to design the diagrams like ER, Database schema diagrams and to generate DDL. 1.4 Tools Used Application architecture JAVA, J2EE Ciphers 2011 5

Web server WASCE WebSphere Application Server Community Edition (from now on WASCE) is a free, certified Java EE 5 server for building and managing Java applications. It is IBM's supported distribution of Apache Geronimo that uses Tomcat for servlet container and Axis 2 for web services. Over 15 WASCE developers are committers in the Apache Geronimo project. Development tool RAD IBM Rational Application Developer for WebSphere Software (RAD) is an integrated development environment (IDE), made by IBM's Rational Software division, for visually designing, constructing, testing, and deploying Web services, portals, and Java (J2EE) applications. Database platform DB2 DB2 Database is the database management system that delivers a flexible and cost effective database platform to build robust on demand business applications and supports the J2EE and web services standards. Design tool Rational Software Modeler IBM Rational Software Modeler, (RSM) made by IBM's Rational Software division, is a Unified Modeling Language UML 2.0-based visual modelling and design tool. Rational Software Modeler is built on the Eclipse open-source software framework and includes capabilities focused on visual modelling and modeldriven development (MDD) with the UML for creating resilient, thought-out application and web services. 1.5 References 1. Object Oriented Modeling and Design with UML-Michael Blaha, James Rambaugh. 2. Software Engineering, Seventh Edition, Ian Sommerville. Ciphers 2011 6

3. IBM Red Books. 4. IBM TGMC Sample Synopsis. 5. IBM www.ibm.in/developerworks 6. Java - www.sun.com 7. Wikipedia - www.wikipedia.com 8. Database Management Systems - Navathe. 9. Complete Reference - J2EE - Keogh. 1.6 Technologies used HTML Hyper Text Markup Language Java Script Script Language XML Extensive Mark Up Language JAVA - Java is an object-oriented programming language developed by Sun Microsystems a company best known for its high end UNIX workstations. Java language was designed to be small, simple, and portable across platforms, operating systems, both at the source and at the binary level, which means that Java programs (applet and application) can run on any machine that has the Java virtual machine (JVM) installed. Ciphers 2011 7

J2EE - Java Platform, Enterprise Edition or Java EE is a widely used platform for server programming in the Java programming language. The Java platform (Enterprise Edition) differs from the Java Standard Edition Platform (Java SE) in that it adds libraries which provide functionality to deploy fault-tolerant, distributed, multi-tier Java software, based largely on modular components running on an application server. EJB Enterprise Java Bean AJAX Asynchronous Java script And XML 1.7 Overview: Existing System: It does exist in a few universities but with lots of drawbacks. Drawbacks: All students do not get access Spamming prevents universities from using this system. Not student-friendly. Proposed System: Registration for students, faculty, alumni Our Plan: Registration. Online articles and comments. Online ratings. Prevent spamming and fake registrations. Access to all students to the magazine. Completely student friendly. Ciphers 2011 8

2. Overall Description: 2.1 Product Perspective 2.2 Software Interface Client on Internet Web Browser, Operating System (any) Client on Intranet Web Browser, Operating System (any) Web Server WASCE, Operating System (any) Ciphers 2011 9

Data Base Server DB2, Operating System (any) Development End RAD (J2EE, Java, Java Bean, Servlets, HTML, XML, AJAX), DB2, OS (Windows), WebSphere(Web Server) 2.3 Hardware Interface Minimum requirements Ciphers 2011 10

2.4 Communication Interface Client (customer) on Internet will be using HTTP/HTTPS protocol. Client (system user) on Internet will be using HTTP/HTTPS protocol. 2.5 Constraints GUI is only in English. Login and password is used for the identification of users. Only registered students and faculty will be authorized to comment and rate the articles. Ciphers 2011 11

2.6 ER Diagram Ciphers 2011 12

2.7 Use case model-survey Ciphers 2011 13

2.8 Architecture Diagram Ciphers 2011 14

2.9 Database Design WDD - This table stores word of the day. TDD - This table stores thought of the day. LIBRARY - This table stores the new arrivals in the library and contains the information of the book such as title of the book, author and number of copies [NOC]. STUDENT - This table contains the information of the student. The ALUMNI field is set to 1 if he/she is an alumni else 0. FACULTY - This table contains the information about the faculty. ARTICLES - This table contains the information of the articles. MODERATOR - This table stores the information of the moderator and his/her Ciphers 2011 15

associated category. RATINGS - This table contains the information of the ratings given by the user. ARTICLE_CATEGORY - This table contains the information of the categories an article belongs to. CATEGORIES - This table contains the information of the defined categories in the college magazine. USER - This table contains the information of the user. 3. Specific Requirements 3.1 Use-case reports 3.1.1 Admin use-case report Description: Ciphers 2011 16

The admin can perform the functions which are displayed above. The admin takes care of the server upgrade and maintenance, website security to prevent spamming and hacks. The admin also takes care of the design and analysis of the website with the moderator. The role of selecting the moderators and updating them is done by the administrator. He creates a backup of the entire data of the website on a separate cloud for security purposes. 3.1.2 Alumni use case report Description: The alumni will enjoy limited functions on the website. The alumni can report articles, view profile of professors, rate articles, and edit his own profile. 3.1.3 Guest use case report Ciphers 2011 17

Description: The guest does not enjoy all benefits like a registered user. The guest functions will be limited to viewing articles and viewing the campus news. The guest cannot rate or comment on articles posted on the online magazine website. 3.1.4 Registered users use case report Description: A registered user enjoys maximum privileges on the online website. The registered user category belongs to current students and faculty. The registered user can have his own profile, rate and comment on articles Ciphers 2011 18

which are posted. Submitting articles and updating the profiles are also a part of the functions which the registered user can perform. 3.1.5 Moderator use case report Description: The moderator forms the centre of the entire scenario of the online magazine website. He has various functions to perform. The moderator posts the word of the day on the website, updates the campus news and events, posts thought of the day and update the library section. The moderator will also, confirm membership, and will have the privilege of disabling a profile and renewing the password if required. The moderator can block certain offensive articles of required. The final verdict of selecting the article or rejecting it lies with the moderator. Hence, the moderator forms the most important part of the use case model. Ciphers 2011 19

3.2 Class Diagram Ciphers 2011 20

3.3 Activity Diagrams 3.3.1 User login Activity Description: The user enters a username and password. If the username and password is verified then the user login is successful and user is redirected to the home-page. If the login is not successful then the user can either renter his password and username (the user can do this for only a maximum of 3 times) or he can click on forgot username/password. Then a security question is asked. If that is verified, then an email is sent on the user's mail id else the request is forwarded to the admin. Ciphers 2011 21

3.3.2 Managing Accounts Activity Description: A registered user (admin, moderator, alumni, faculty, student) can manage their accounts by doing the following a) Change password b) Delete account c) Edit details 3.3.3 Rate and comment activity Ciphers 2011 22

Description: If a user is a registered user then he can comment or rate an article but if it is guest then he cannot rate or comment an article. This shows that an alumni will not be able to comment or rate on an article. 3.3.4 Report Comment Activity Ciphers 2011 23

Description: If the user is a registered user then he can report a comment. Then a notice is forwarded to moderator to report the comment. The moderator can either remove the comment or ignore the request to report that comment. In case the user is a guest then he cannot report a comment. Ciphers 2011 24

3.3.5 Registration Activity Description: Initially student/faculty is made to fill mandatory fields filled in registration form. Once the user clicks submit, the details are verified. If the details are incomplete then the user is informed to fill the complete details and is redirected to the page where the details have to be filled. If the details that are filled are complete then it is checked whether it s a new user or already existing user. If its an already existing user then the user is asked to renter the details. If it is a new user then the user will create a username and a password. Then if it is a valid username and password then he/she is registered and is redirected to the home-page. If it is an Ciphers 2011 25

invalid username and password then the user is made to renter his/her username and password. 3.3.6 Submit Article Activity Description: If a user intends to post an article then he creates article and submits it in the appropriate category. The article is then received by the moderator of that particular category in which the article has been added. The moderator can a) reject the article if he founds some unacceptable stuff in it b) he can simply approve the article Ciphers 2011 26

c) he can put the article in a different category if he feels the article is not apt for the category it was submitted for. Then this is verified by the user who submitted the article. The user can either verify the category change or submit the article or he does not verify the category change and withdraws the article 3.4 Sequence Diagrams 3.4.1 Sign-up Sequence Ciphers 2011 27

3.4.2 Report Article Sequence Ciphers 2011 28

3.4.3 Article posting Sequence Ciphers 2011 29

4. Supporting Information We convey special thanks to our CSE department and VIT University. A special thanks to all IBM software s and websites which have helped a lot in making the project a successful one. Ciphers 2011 30