25-08-2012, 02:40 PM
USER SECURITIZED CENTRALIZED CYBER CAFE MANAGEMENT
USER SECURITIZED.doc (Size: 1.11 MB / Downloads: 55)
ABSTRACT
The high demand of internet usage mush-roomed the provision of cyber cafe across different geographic location. However different cyber cafe adapts multiple tracking of usage facilitation policies, for which users’ become uncomfortable in the usage of internet accessing services. In addition the cyber cafe at different location did not allow the customers of one cyber café using the services of another cyber cafe.
To overcome the inconvenience caused due to heavy usage of users and accessing at different location, our project presented a centralized cyber cafe model with high authorized accessibility of the internet usage in cyber cafe. The centralized server is the zone in which any authorized cyber cafe maintains data of their customers for accessing the internet at different service levels. The users can use the internet access facility at any location with the same authentication user identity issued by their membership cyber cafe. However the authenticity of the customer is verified with the centralized server by the respective cyber cafe in which the user try to utilize the internet access facilitation.
INTRODUCTION
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries an extensive range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support email.
Most traditional communications media including telephone, music, film, and television are reshaped or redefined by the Internet, giving birth to new services such as Voice over Internet Protocol (VoIP) and Internet Protocol Television (IPTV). Newspaper, book and other print publishing are adapting to Web site technology, or are reshaped into blogging and web feeds. The Internet has enabled or accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business and financial services on the Internet affect supply chains across entire industries.
The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.
Cross-language Interoperability
.NET provides support for language interoperability. However, it doesn’t mean every program written in a language can be used by another language. To enable a program to be used with other languages, it must be created by following a set of rules called Cross Language Specifications (CLS). Cross-language inheritance is the ability to create a class in C# from a class created in VB.NET. When an exception is raised by a program written in C#, the exception can be handled by VB.NET. This kind of exception handling is called cross-language exception handling.
.NET has brought a set of new features which are to be understood by every programmer developing applications for Windows. There is no way any Windows programmer can ignore .NET, unless he is desperate to be outdated. Microsoft will provide .NET as part of its operating systems in future releases. It is the platform for programmers. It is not new OS from Microsoft or a new language. It is the environment for which you develop applications. It is rich in terms of features. Believe me, programming using VB.NET is fun and it is more productive than VB 6.0.
Distributed cyber cafe and user information
The user of the cyber cafe operates at different distributed location. Local cyber cafe server maintains and records the information regarding the user and the customer. User information is information transferred across the functional interface between a source user and a telecommunications system for delivery to a destination user. In telecommunications systems, user information includes user overhead information. Validation of data is also performed in “USER SECURITIZED CENTRALIZED CYBER CAFE MANAGEMENT”.
Data validation is the process of ensuring that a program operates on clean, correct and useful data. It uses routines, often called "validation rules” or "check routines", that check for correctness, meaningfulness, and security of data that are input to the system. The rules may be implemented through the automated facilities of a data dictionary, or by the inclusion of explicit application program validation logic. Data validation can also be declared through declarative data integrity rules, or procedure-based business rules. Data that does not conform to these rules will negatively affect business process execution.
Centralized Server Authority
During the second phase centralized server is initialized. The Centralized Server also referred to as Central provides local area networking services to departments and offices. It consists of a set of high-speed computers that stores office applications and data files shared by many different people in a department or work group. The Central Server offers a reliable, cost-efficient alternative to installing a local file server at the preferred location. The moderate monthly cost per user provides you with all the features, resources, and services expected from a LAN.
The process of integration of cyber café at different location is performed to central server. The job of centralized server is to issue service level agreement. Centralized authority is provided. It is again integrated to the new cyber café and certification is provided. Validation is performed for the existing cyber café for a specific period which may be either annually of for a particular lifetime.
CONCLUSION
The project work entitled “USER SECURITIZED CENTRALIZED CYBER CAFE MANAGEMENT” is a highly securitized model for both the user and admin. Internet cafés are generally agreed to be tools and not ends in themselves5. The end is usually stated as the support of services in areas such as education, health care, local democracy and small business support. The existing approach had the problem such that cyber café situated at varied location did not had the provision to access the services of internet from one location to another. Our wok have provided a way in such a way that a person can access the internet at various service levels. We have achieved this work by way of issuing membership cyber café so that not only can the access be made but it is also a means of providing high authorization capabilities.