Academia.eduAcademia.edu

Client/server model of security with Bar-coded Identity Cards

2010, Computer Science and …

This paper is about the client/server model of security with Bar-coded Identity Cards. Client and server are not just two words put together but it includes a vast range of softwares by having a backbone of client/server database. By making a client/server database we have implemented our project with a new perspective. We have developed a compact and reliable software package for the management information system of any University or institute. This package also includes the security system for the detection of the students on the basis of encrypted Bar-codes. Detection of student is done using bar-code reader with the client/server database running at the back end.

Client/Server Model of Security with Bar-coded Identity Cards Syed Sohail Ahmed £ Usman Haider € Assistant Professor [email protected] [email protected] Aiman Nadeem ¥ [email protected] £, €, ¥ Computer Engineering Department University of Engineering & Technology Taxila, Pakistan Abstract—This paper is about the client/server model of security with Bar-coded Identity Cards. Client and server are not just two words put together but it includes a vast range of softwares by having a backbone of client/server database. By making a client/server database we have implemented our project with a new perspective. We have developed a compact and reliable software package for the management information system of any University or institute. This package also includes the security system for the detection of the students on the basis of encrypted Bar-codes. Detection of student is done using bar-code reader with the client/server database running at the back end. Keywords-Client/server database [1], Bar-code I. INTRODUCTION There is always a use for security in organizations and institutes in this time of dangerous world. Many techniques are emerging in this regard. In this paper bar-coded ID cards are used for the security purpose. When we implement this technique using a client/server version, it becomes easy version of security. For the explanation of this project, I have divided the paper in two parts; client/server database and bar-coded ID cards. II. CLIENT/SERVER DATABASE Databases are easy to make but there are many implicit decisions in it. That is why the field of database management technology has emerged. The primary goal in this regard should be to minimize access time and storage space. A. INFORMATION REQUIRED Basic information to develop a database should be in hand. Normalized relations and attributes definitions are required. When and where and how can we add, edit, update or delete information. Response time should be calculated or expected before hand. The most important part is security requirements in which back up, recovery and maintenance is considered. And when all these requirements are completed then decide which technologies should be used. B. KEY DECISIONS We have to decide the data types for each attribute. Specifying the data types minimize the storage space, improve data integrity, represents all possible values and support all data manipulations. Data integrity manages the default values of the fields and controls the null value exceptions. Group the related attributes in a single table. On the basis of fields we can group, select or sort data. Database management software does not allow you to exceed the limit space of the fields. If you have specified it of size maximum 10 characters, you cannot put data more than this size in that field. There should be some secondary storage for the records (one entry in a table is called a record). Indexing is very important in databases. We cannot create any table unless we have a primary key. If we do not create it, the tool which we are using for database, will create in automatically. Index includes two types of keys. Primary index which is a unique identifier and secondary key which is used for grouping purpose of keys. Indexing helps to manage large amount of data very efficiently. Then the final step in database management is handling queries. Queries depend on the requirements of the user or front end customers. C. CLIENT/SERVER MODEL Whenever we wish to have fast response and fewer loads we divide the responsibilities of the system into parts; clients (front end) and server (back end). Both client and server can be on a single computer but its better to have a separate server so that it does not bother the client [2]. Both the client and server are programmable and intelligent. Basically client and server are working to give input output logic. In processing phase I/O processing, business rules and data management is included. Storage logic includes data storage and retrieval and DBMS functions. Server can be further specified. One type is a file server that manages all file operations and is shared by all the clients. But this approach is not much beneficial. There are some limitations. We have to transfer whole file or table to the clients. Therefore clients must have full version of DBMS. Each client must take care of the database integrity.