Moby System Documentation

Embed Size (px)

Citation preview

  • 8/6/2019 Moby System Documentation

    1/83

    1

    1. INTRODUCTION

    1.1 Existing System

    To perform any manipulations, a person must be in front of the system.

    Suppose if person willing to shutdown a system his presence is necessary and if

    he wish to perform the same task from anywhere else. It takes more time. In this

    sense it is a time consuming process.

    With the Bluetooth we can access only to some limited range. If a particular

    person intended to send a file which is far away then this is not applicable, this

    means that beyond the Bluetooth limit we cant perform any operations.

    1.2 Proposed System

    It would be easier, if there is software with which we can access from

    anywhere through mobile which is connected to our system.

    Now-a-days most of the people carry mobiles. So, using this application all

    tasks may be completed form the place where we are i.e., mobility and flexibility

    is provided.

    As we perform any file operations, handling the system and mail related

    Operations using mobile. From any place in spite of being in front of the system,

    it saves the time.

  • 8/6/2019 Moby System Documentation

    2/83

    2

    2. FEASIBILITY STUDY

    Feasibility study is the high level capsule version of the entire requirement analysis

    process. The objective of feasibility study is to determine whether the proposed system

    can be developed with available resources. There are three steps to be followed for

    determining the feasibility study of proposed system.

    Technical Feasibility

    Operational Feasibility

    Economical Feasibility

    TechnicalFeasibility:

    It is concerned with hardware and software feasibility. In thisstudy, one has to test whether the proposed system can be developed using existing

    technology or not. If new technology is required, what is the likely hood that it can be

    developed.

    OperationalFeasibility:

    Operational feasibility determines whether the proposed system

    satisfied the user objectives and can be fitted in to current system operation. The

    proposed system Mobi-System can be justified.

    EconomicalFeasibility:

    This includes an evaluation of all incremental costs and

    benefits expected if proposed system is implemented. Costs-benefit analysis which is to

    be performed during economical feasibility delineates costs for project development and

    weighs them against benefits of system.

  • 8/6/2019 Moby System Documentation

    3/83

    3

    3. REQUIREMENTS

    Software Requirements:

    Apache Server

    PHP

    My Sql

    J2ME

    Blue Cove.jar

    .Net

    Edit Plus

    Windows XP

    Hardware Requirements:

    512 MB Ram

    P4

    40 GB Hard Disk

    Mid p 2.0 enabled mobile

  • 8/6/2019 Moby System Documentation

    4/83

    4

    4. SYSTEM REQUIREMENT SPECIFICATION

    In the present world, every time it is not possible to carry computer or laptop along with

    person and it is a major disadvantage that, person cannot access his/her own system from remotearea. Like he/she cannot upload his/her own system files through internet and cannot create or

    modify or delete files on his/her system.

    To overcome this problem, there should be a certain feature, so that person can operate

    his/her system through mobile where he/she can create or modify or upload or delete his/her own

    system files from remote area, without carrying the system. Person can get email alerts to his/her

    mobiles and person can access and get up-to-date data.

    According to our analysis, we have found the following modules.

    1.Audioplayer

    2.FileManagement

    3. ControlPanel

    4.E-mail

    5. Registration

  • 8/6/2019 Moby System Documentation

    5/83

    5

    1.AUDIO PLAYER:

    In this module, person can access the audio player from any remote area. It helps, when

    the person had forgotten to stop/close the audio player in the system then he/she can operatefrom the remote area, with the help of corresponding mobile phone.

    A. Functionality:

    Start Audio Player

    Stop Audio Player

    Pause audio Player

    Forward Audio Player

    Backward Audio Player

    Selecting a song from the list

    B. Queries:

    What songs are available?

    C. Alerts:

    No Next song available

    No previous song available

    3. FILEMANAGEMENT:

    In this module, the person can create or open or delete or rename files of the

    system from remote area, with the help of corresponding mobile phone.

    A. Functionality:

    Open a file

    Close a file Create a file

    Delete a file

    Rename a file

    Save a file

    Move a file

    Search a file

  • 8/6/2019 Moby System Documentation

    6/83

    6

    B. Provisioning:

    Folders list

    C. Alerts:

    Unable to open a file

    Unable to close a file

    Unable to delete a file

    Unable to rename a file

    File name already exists

    4. E-MAIL:

    In this module, the person can access mails and can attach files to mail, with the

    help of corresponding mobile phone.

    A. Functionality:

    Send a mail

    Attach a mail

    Compose a mail Delete a mail

    Open/read mail

    B. Alerts:

    You have got a new mail

    Mail has been sent successfully

    This file cant be attached

    5. CONTROL PANEL:

    In this module, the person can turn off the system and can log off or switch user

    and can also restart the system through corresponding mobile phone from any remote

    area.

  • 8/6/2019 Moby System Documentation

    7/83

    7

    A. Functionality:

    Turn off

    Restart Switch user

    Change the wallpaper

    B. Alerts:

    Windows is shutting down

    Saving your setting

    6. REGISTRATION:

    In this module, the person can register by giving his/her user id and password and

    his/her details from any remote area with the help of corresponding mobile phone.

    A. Functionality:

    Register

    Unregister

    Login Logout

    B. Alerts:

    Password length should be more than six characters

    Password mismatch

    Field cannot be blank

  • 8/6/2019 Moby System Documentation

    8/83

    8

    1. TECHNOLOGIES USED

    WhatisPHP?

    y PHP stands forPHP:Hypertext Preprocessor

    y PHP is a server-side scripting language, like ASPy PHP scripts are executed on the server

    y PHP supports many databases (MySQL, Informix, Oracle, Sybase, Solid, PostgreSQL,Generic ODBC, etc.)

    y PHP is an open source softwarey PHP is free to download and use

    WhatisaPHPFile?

    y

    PHP files can contain text, HTML tags and scriptsy PHP files are returned to the browser as plain HTMLy PHP files have a file extension of ".php", ".php3", or ".phtml"

    Why PHP?

    y PHP runs on different platforms (Windows, Linux, UNIX, etc.)y PHP is compatible with almost all servers used today (Apache, IIS, etc.)

    y PHP is easy to learn and runs efficiently on the server side

    Whereto Start?

    To get access to a web server with PHP support, you can:

    y Install Apache (or IIS) on your own server, install PHP, and MySQL

    y Or find a web hosting plan with PHP and MySQL support

    BasicPHP Syntax

    A PHP scripting block always starts with . A PHP scripting block can be

    placed anywhere in the document

  • 8/6/2019 Moby System Documentation

    9/83

    9

    A PHP file normally contains HTML tags, just like an HTML file, and some PHP scripting code.

    Each code line in PHP must end with a semicolon. The semicolon is a separator and isused to distinguish one set of instructions from another.

    There are two basic statements to output text with PHP:echo and print. In the exampleabove we have used the echo statement to output the text "Hello World".

    My SQL

    WhatisMySQL andwhy areweusingit?

    MySQL is a powerful Relational Database Management System (RDBMS) which we will use to

    learn the basic principles of database and data manipulation using Structured Query Language

    (SQL) statements. SQL is a database language that is used to retrieve, insert, delete and update

    stored data. This is achieved by constructing conditional statements that conform to a specific

    syntax (i.e. the strict order required of elements for a statement to work).

    Although it is assumed that most people reading this know what a database and SQL are (if not

    necessarily how to use them), there follows a little recap that it does no harm ;-)

    HowdoesMySQL work?

    MySQL is a database server program and as such is installed on one machine, but can 'serve' the

    database to a variety of locations. To explain look at the following diagram.

  • 8/6/2019 Moby System Documentation

    10/83

    10

    The MySQL Server is installed on a Server and can be accessed directly via various client

    interfaces, which send SQL statements to the server and then display the results to a user. Some

    of these are:

    A Local Client - a program on the same machine as the server. An example of this is the

    command line MySQL client software we will be using in the rest of the MySQL workshops

    (although there are other programs including graphical interfaces).

    A Scripting Language - can pass SQL queries to the server and display the result.

    A Remote Client - a programme on a different machine that can connect to the server and run

    SQL statements.

    You can also use two more indirect methods.

    Remote Login - You may be able to connect to the Server Machine to run one of its local

    clients.

  • 8/6/2019 Moby System Documentation

    11/83

    11

    Web Browser - you can use a web browser and scripts that someone has written (we're going to

    use this method for the rest of the workshop).

    J2ME

    J2ME (Java2MicroEdition) is an advanced technology in Java, developed with the help of

    Java Community ProcessProgram. J2ME is a reduced version of the Java API and JavaVirtual Machine that is designed to operate within the limited resources available in the

    embedded computers and microcomputers.

    J2ME is targeted to developers ofintelligentwirelessdevicesandsmallcomputingdevices

    who need to incorporate cross-platform functionality in their products. A key benefit of usingJ2MEiscompatibility withall Java-enableddevices. Motorola, Nokia, Panasonic all have

    Java-enabled devices. A J2ME application is a balance between local and server-side processing.

    J2ME (Java2MicroEdition) is an advanced technology in Java, developed with the help ofJava Community ProcessProgram. J2ME is a reduced version of the Java API and Java

    Virtual Machine that is designed to operate within the limited resources available in theembedded computers and microcomputers.

    J2ME is targeted to developers ofintelligentwirelessdevicesandsmallcomputingdevices

    who need to incorporate cross-platform functionality in their products. A key benefit of usingJ2MEiscompatibility withall Java-enableddevices. Motorola, Nokia, Panasonic all have

    Java-enabled devices.A J2ME application is a balance between local and server-side processing.

    Programs

    A MIDlet is a classthatextendstheMIDletclass and is the interfacebetweenapplication

    statementsandtherun-timeenvironment , which is controlled by the applicationmanager .

    A MIDlet class must contain threeabstractmethods that are called by the application managerto manage the life cycle of the MIDlet. These abstract methods are.

    y startApp(): called by the application manager when the MIDlet is started and contains

    statements that are executed each time the application begins execution. Public and haveno return value nor parameter list.

    y pauseApp(): called before the application manager temporarily stops the MIDlet. Theapplication managerrestartstheMIDletby recallingthestartApp() method. Public

    and have no return value nor parameter list.y destroyApp(): called prior to the termination of the MIDlet by the application manager.

    Public method without a return value. It has a boolean parameter that is set to true if thetermination of the MIDlet is unconditional, and false if the MIDlet can throw a

    MIDletStateChangeException.

  • 8/6/2019 Moby System Documentation

    12/83

    12

    The Basic Midlet Shell.

    public class BasicMIDletShell extends MIDlet

    {

    public void startApp(){ }public void pauseApp(){ }public void destroyApp( boolean unconditional){ }

    }

    MIDPAPI classes are used by the MIDlet to interact with the user and handle data management.

    Userinteractions are managed by userinterfaceMIDPAPI classes. These APIs prompt the

    user to respond with an appropriatecommand. The command causes the MIDlet to executeone ofthreeroutines:

    y Perform a computation.y

    Make a network request.y Display another screen.y

    Bluetooth Device:

    BluetoothApplications:

    Bluetooth is designed to operate in an environment of many users. Up to eight devices can

    communicate in a small network called a piconet. Ten of these piconets can coexist in the samecoverage range of the Bluetooth radio. To provide security, each link is encoded and protected

    against eavesdropping and interference.

    Bluetooth provides support for three general application areas using short-range wireless

    connectivity:

    y Dataandvoiceaccesspoints - Bluetooth facilitates real-time voice and datatransmissions by providing effortless wireless connection of portable and stationary

    communications devices;y Cablereplacement - Bluetooth eliminates the need for numerous, often proprietary cable

    attachments for connection of practically any kind of communications device.Connections are instant and are maintained even when devices are not within line of

    sight. The range of each radio is approximately 10 m, but can be extended to 100 m withan optional amplifier;

    y Adhocnetworking - A device equipped with a Bluetooth radio can establish instantconnection to another Bluetooth radio as soon as it comes into range.

  • 8/6/2019 Moby System Documentation

    13/83

    13

    Bluetooth Standards Documents

    The Bluetooth standards present a formidable, divided into two groups: core and profile. The

    core specifications describe the details of the various layers of the Bluetooth protocolarchitecture, from the radio interface to link control. Related topics are also covered, such as

    interoperability with related technologies, testing requirements, and a definition of variousBluetooth timers and their associated values.

    The profile specifications are concerned with the use of Bluetooth technology to support various

    applications. Each profile specification discusses the use of the technology defined in the corespecifications to implement a particular usage model. The purpose of a profile specification is to

    define a standard of interoperability, so that products from different vendors that claim to supporta given usage model will work together

    The Bluetooth developer must wade through the many documents with a particular application in

    mind. The reading list begins with coverage of some essential core specifications plus the

    general access profile. Following a basic set of documents, the reading list splits along two lines,depending on whether the reader's interest is in cable replacement or wireless audio.

    ProtocolArchitecture

    Bluetooth is defined as a layered protocol architecture consisting of core protocols, cablereplacement and telephony control protocols, and adopted protocols.

    The core protocols form a five-layer stack consisting of the following elements:

    y Radio - Specifies details of the air interface, including frequency, the use of frequency

    hopping, modulation scheme, and transmit power.y Baseband - Concerned with connection establishment within a piconet, addressing,

    packet format, timing, and power control.

    y Linkmanagerprotocol (LMP) - Responsible for link setup between Bluetooth devicesand ongoing link management. This includes security aspects such as authentication and

    encryption, plus the control and negotiation of baseband packet sizes.y Logicallinkcontrolandadaptationprotocol (L2CAP) - Adapts upper-layer protocols

    to the baseband layer. L2CAP provides both connectionless and connection-orientedservices.

    y Servicediscovery protocol (SDP) - Device information, services, and the characteristicsof the services can be queried to enable the establishment of a connection between two or

    more Bluetooth devices.

    ProtocolArchitecture

    Bluetooth is defined as a layered protocol architecture consisting of core protocols, cable

    replacement and telephony control protocols, and adopted protocols.

    The core protocols form a five-layer stack consisting of the following elements:

  • 8/6/2019 Moby System Documentation

    14/83

    14

    y Radio - Specifies details of the air interface, including frequency, the use of frequencyhopping, modulation scheme, and transmit power.

    y Baseband - Concerned with connection establishment within a piconet, addressing,packet format, timing, and power control.

    y Linkmanagerprotocol (LMP) - Responsible for link setup between Bluetooth devices

    and ongoing link management. This includes security aspects such as authentication andencryption, plus the control and negotiation of baseband packet sizes.y Logicallinkcontrolandadaptationprotocol (L2CAP) - Adapts upper-layer protocols

    to the baseband layer. L2CAP provides both connectionless and connection-orientedservices.

    y Servicediscovery protocol (SDP) - Device information, services, and the characteristicsof the services can be queried to enable the establishment of a connection between two or

    more Bluetooth devices.

    Bluetooth specifies a telephony control protocol. TCS BIN (telephony control specificationbinary) is a bit-oriented protocol that defines the call control signaling for the establishment of

    speech and data calls between Bluetooth devices. In addition, it defines mobility-managementprocedures for handling groups of Bluetooth TCS devices.

  • 8/6/2019 Moby System Documentation

    15/83

    15

    2. CLIENT-SERVERARCHITECTURE

    A network architecture in which each computer or process on the network is either aclientor server.

    Components:

    Clients

    Servers

    Communication Networks

    Clients:

    Applications that run on computers

    Rely on servers for

    Files

    Devices

    Processing power

    Example:E-mail client

    An application that enables you to send and receive e-mail

    Server:

    Computers or processes that manage network resources

    Disk drives (file servers)

    Printers (print servers)

    Network traffic (network servers)

    Example: Database Server

    A computer system that processes database queries

    Communication Network:

    y Networks Connect Clients and Servers

  • 8/6/2019 Moby System Documentation

    16/83

    16

    ClientServer Computing:

    Process takes place

    on the server and

    on the client

    Servers

    Store and protect data

    Process requests from clients

    Clients

    Make requests

    Format data on the desktop

    Client-server architecture can be considered as a network environment that exchanges

    information between a server machine and a client machine where server has some resources that

    can be shared by different clients.

    Client-ServerArchitecture

    Client-server architecture can be considered as a network environment that exchanges

    information between a server machine and a client machine where server has some resources that

    can be shared by different clients.

    In a Client/server architecture individual computers (known as clients) are connected to a

    central computer which is known as Server.

    Lets take an example of a file server to understand the core process of a client/server

    network, the file server acts as a storage space on the network for the files, spreadsheets,

    databases, etc.

  • 8/6/2019 Moby System Documentation

    17/83

    17

    Instead of storing these records on every individual computer, the file server allows the

    clients to store their files on one central computer and make them sharable. The client-server

    architecture is beneficial in reducing the multiple iterations of a single file and allowing the

    organization to have one centralized point for every computer to access the same file.

    The interaction between a lamp and an electrical socket can be considered as a interaction

    between client and server is just like. In the example the electrical socket is just like a server and

    the lamp works like a client.

  • 8/6/2019 Moby System Documentation

    18/83

    18

    3. E-RMODEL DIAGRAMS

    USER

    username

    PK userid

    password

    E-MAIL

    PK e-id

    e-password

    FK userid

  • 8/6/2019 Moby System Documentation

    19/83

    19

    4. DATA BASE TABLE STRUCTURES

    Login

    Name Data Type ConstraintUser name Varchar(50) Not Null

    User id Varchar(50) Primary KeyPassword Varchar(50) Not Null

    E-MailAccount

    Name Data Type ConstraintE-mail id Varchar(50) Primary KeyPassword Varchar(50) Not Null

  • 8/6/2019 Moby System Documentation

    20/83

    20

    Createtable:

    # ---------------------------------------------------------------------- #

    # Script generated with: DeZign for Databases v5.2.2 #

    # Target DBMS: MySQL 5 #

    #Project file: Project1.dez #

    #Project name: Mobi-System #

    # Author:Parveen Sultana,Sujatha,Srujana,Sravanthi #

    # Script type: Database creation script #

    # Created on: 2009-04-1511:33 #

    # Model version: Version 2009-04-15 #

    # ---------------------------------------------------------------------- #

    # ---------------------------------------------------------------------- #

    # Tables #

    # ---------------------------------------------------------------------- #

    # ---------------------------------------------------------------------- #

    # Add table "USER" #

    # ---------------------------------------------------------------------- #

    CREATE TABLE `USER` (

    `username` VARCHAR(40) NOT NULL,

    `userid` VARCHAR(40) NOT NULL,

    `password` VARCHAR(40) NOT NULL,

    CONSTRAINT `PK_USER` PRIMARY KEY (`userid`)

    );

  • 8/6/2019 Moby System Documentation

    21/83

    21

    # ---------------------------------------------------------------------- #

    # Add table "E-MAIL" #

    # ---------------------------------------------------------------------- #

    CREATE TABLE `E-MAIL` (

    `e-id` VARCHAR(40) NOT NULL,

    `e-password` VARCHAR(40) NOT NULL,

    `userid` VARCHAR(40),

    CONSTRAINT `PK_E-MAIL` PRIMARY KEY (`e-id`)

    );

    # ---------------------------------------------------------------------- #

    # Foreign key constraints #

    # ---------------------------------------------------------------------- #

    ALTER TABLE `E-MAIL` ADD CONSTRAINT `USER_E-MAIL`

    FOREIGN KEY (`userid`) REFERENCES `USER` (`userid`);

    Droptable:

    # ---------------------------------------------------------------------- #

    # Script generated with: DeZign for Databases v5.2.2 #

    # Target DBMS: MySQL 5 #

    #Project file: Project1.dez #

    #Project name: Mobi-System #

    # Author: Parveen Sultana,Sujatha,Srujana,Sravanthi #

    # Script type: Database drop script #

    # Created on: 2009-04-1511:33 #

  • 8/6/2019 Moby System Documentation

    22/83

    22

    # Model version: Version 2009-04-15 #

    # ---------------------------------------------------------------------- #

    # ---------------------------------------------------------------------- #

    # Drop foreign key constraints #

    # ---------------------------------------------------------------------- #

    ALTER TABLE `E-MAIL` DROP FOREIGN KEY `USER_E-MAIL`;

    # ---------------------------------------------------------------------- #

    # Drop table "USER" #

    # ---------------------------------------------------------------------- #

    # Drop constraints #

    ALTER TABLE `USER` DROPPRIMARY KEY;

    # Drop table #

    DROP TABLE `USER`;

    # ---------------------------------------------------------------------- #

    # Drop table "E-MAIL" #

    # ---------------------------------------------------------------------- #

    # Drop constraints #

    ALTER TABLE `E-MAIL` DROPPRIMARY KEY;

    # Drop table #

    DROP TABLE `E-MAIL`;

  • 8/6/2019 Moby System Documentation

    23/83

    23

    5. UML Diagrams

    Class Diagram:

  • 8/6/2019 Moby System Documentation

    24/83

    24

    Usecase Diagram:

  • 8/6/2019 Moby System Documentation

    25/83

    25

    6. SCREEN SHOTS

  • 8/6/2019 Moby System Documentation

    26/83

    26

  • 8/6/2019 Moby System Documentation

    27/83

    27

  • 8/6/2019 Moby System Documentation

    28/83

    28

  • 8/6/2019 Moby System Documentation

    29/83

    29

  • 8/6/2019 Moby System Documentation

    30/83

    30

  • 8/6/2019 Moby System Documentation

    31/83

    31

  • 8/6/2019 Moby System Documentation

    32/83

    32

  • 8/6/2019 Moby System Documentation

    33/83

    33

  • 8/6/2019 Moby System Documentation

    34/83

    34

  • 8/6/2019 Moby System Documentation

    35/83

    35

  • 8/6/2019 Moby System Documentation

    36/83

    36

  • 8/6/2019 Moby System Documentation

    37/83

    37

  • 8/6/2019 Moby System Documentation

    38/83

    38

  • 8/6/2019 Moby System Documentation

    39/83

    39

  • 8/6/2019 Moby System Documentation

    40/83

    40

  • 8/6/2019 Moby System Documentation

    41/83

    41

  • 8/6/2019 Moby System Documentation

    42/83

    42

  • 8/6/2019 Moby System Documentation

    43/83

    43

  • 8/6/2019 Moby System Documentation

    44/83

    44

  • 8/6/2019 Moby System Documentation

    45/83

    45

  • 8/6/2019 Moby System Documentation

    46/83

  • 8/6/2019 Moby System Documentation

    47/83

    47

  • 8/6/2019 Moby System Documentation

    48/83

    48

  • 8/6/2019 Moby System Documentation

    49/83

    49

  • 8/6/2019 Moby System Documentation

    50/83

    50

  • 8/6/2019 Moby System Documentation

    51/83

    51

  • 8/6/2019 Moby System Documentation

    52/83

    52

  • 8/6/2019 Moby System Documentation

    53/83

    53

  • 8/6/2019 Moby System Documentation

    54/83

    54

  • 8/6/2019 Moby System Documentation

    55/83

    55

  • 8/6/2019 Moby System Documentation

    56/83

    56

  • 8/6/2019 Moby System Documentation

    57/83

    57

  • 8/6/2019 Moby System Documentation

    58/83

    58

  • 8/6/2019 Moby System Documentation

    59/83

    59

  • 8/6/2019 Moby System Documentation

    60/83

    60

  • 8/6/2019 Moby System Documentation

    61/83

    61

  • 8/6/2019 Moby System Documentation

    62/83

    62

  • 8/6/2019 Moby System Documentation

    63/83

  • 8/6/2019 Moby System Documentation

    64/83

    64

  • 8/6/2019 Moby System Documentation

    65/83

    65

  • 8/6/2019 Moby System Documentation

    66/83

  • 8/6/2019 Moby System Documentation

    67/83

    67

  • 8/6/2019 Moby System Documentation

    68/83

    68

  • 8/6/2019 Moby System Documentation

    69/83

    69

  • 8/6/2019 Moby System Documentation

    70/83

    70

  • 8/6/2019 Moby System Documentation

    71/83

    71

  • 8/6/2019 Moby System Documentation

    72/83

    72

  • 8/6/2019 Moby System Documentation

    73/83

    73

  • 8/6/2019 Moby System Documentation

    74/83

    74

  • 8/6/2019 Moby System Documentation

    75/83

    75

  • 8/6/2019 Moby System Documentation

    76/83

  • 8/6/2019 Moby System Documentation

    77/83

    77

  • 8/6/2019 Moby System Documentation

    78/83

    78

  • 8/6/2019 Moby System Documentation

    79/83

    79

  • 8/6/2019 Moby System Documentation

    80/83

    80

    7. Testing

    Testing is the process of detecting errors. Testing performs a very critical role for quality

    assurance and for ensuring the reliability of software. The results of testing are used later on

    during maintenance also.

    Psychology ofTesting

    The aim of testing is often to demonstrate that a program works

    by showing that it has no errors. The basic purpose of testing phase is to detect the errors that

    may be present in the program. Hence one should not start testing with the intent of showing

    that a program works, but the intent should be to show that a program doesnt work. Testing

    is the process of executing a program with the intent of finding errors.

    Thetestingprocess:

    Component (orunit)testing:

    y Testing of individual program components

    y Usually the responsibility of the component

    y Developer (except sometimes for critical systems)

    y Tests are derived from the developers experience.

    Systemtesting:

    y Testing of groups of components integrated to create a system)

    y The responsibility of an independent testing team

    y Tests are based on a system specification.

    Testingprocessgoals:

    Validationtesting:

    y To demonstrate to the developer and the system customer that the software meetsits requirements;

    y A successful test shows that the system operates as intended.

  • 8/6/2019 Moby System Documentation

    81/83

    81

    Defecttesting:

    y To discover faults or defects in the software where its behavior isincorrect or not in behavior is incorrect or not in conformance

    with its specification;

    y

    A successful test is a test that makes the system performincorrectly and so exposes a defect in the system.

    y Test show the presence not the absence of defects

    Blackboxtesting:

    It is also called functional testing and behavioral testing, focuses on determining whether or not a

    program does what it is supposed to do based on its functional requirements. _ No knowledge ofinternal structure of code.

    White-box:

    White-box testing is testing that takes into account the internal mechanism of a system or

    component. White-box testing is also known as structural testing, clear box testing, and glassbox testing.

    Integration Testing:

    Integration testing is testing increments of the system; release testing involves testing a system to

    be released to a customer.

    Involves building a system from its components and testing it for problems that arise from

    component interactions.

    Top-downintegration:

    Develop the skeleton of the system and populate it with components.

    Bottom-upintegration:

    Integrate infrastructure components then add functional components.

    To simplify error localization, systems should be incrementally integrated.

  • 8/6/2019 Moby System Documentation

    82/83

    82

    8. Conclusion

    The entire project has been developed and deployed as per the requirements stated by

    the normal user, who is facing many problems in maintaining PCs. Problems like, Carrying

    PCs along with them and operating manually and etc.

    Using Mobile, User can easily operate almost all features with out moving. Such that it

    provides Mobility. It is found to be bug free as per the testing standards that are implements.This project provides facilities like, checking mails, accessing files, operating media player

    and also can restart, shut-down the system through mobile from anywhere.

  • 8/6/2019 Moby System Documentation

    83/83

    9. Bibliography

    References for the project development were taken from the following books and web sites.

    Java Technologies:

    Java Complete References

    J2ME:

    The Complete Reference

    Enterprise J2ME Developing mobile java application byMichael Juntao Yuan

    PHP:

    A Programmers Introduction to PHP4.0(Apress)

    My Sql:

    My SQL Reference Manual