You are on page 1of 38

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

SENTINEL PROGRAM
LDSBC Capstone Project Final Report
Information Technology Network Engineer Emphasis Program

Capstone Advisor: Spencer DeGraw


By Luis Morales

0|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

1|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Table of Contents
Abstract....................................................................................................................................... 3
Executive Summary..................................................................................................................... 4
Introduction.................................................................................................................................. 7
Problem Description.................................................................................................................... 8
Target Audience........................................................................................................................... 9
Environmental Scan.....................................................................................................................9
Project Description..................................................................................................................... 10
Project Goal............................................................................................................................... 10
Project Problems & Solutions.....................................................................................................11
Methodology.............................................................................................................................. 12
Implementation Plan.............................................................................................................. 12
Resources.............................................................................................................................. 14
Expertise................................................................................................................................ 15
Risk Analysis.......................................................................................................................... 17
Project Changes........................................................................................................................ 17
Deliverables............................................................................................................................... 18
Timeline..................................................................................................................................... 19
Work performed......................................................................................................................... 20
Research................................................................................................................................ 20
Planning................................................................................................................................. 21
Creating the Software............................................................................................................ 21
Create a Network for Demonstration......................................................................................26
Creating a Database.............................................................................................................. 28
Revising elements.................................................................................................................. 32
Testing.................................................................................................................................... 33
Personal Thoughts..................................................................................................................... 35

2|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Abstract

This project seeks a viable alternative to reduce or eliminate the theft of vehicles in the country.
While many other projects created with the intention of stopping crime have failed, this project
stands out above them because instead of using field staff to meet the work, this program
makes it digitally and only needs physical assistance when having to catch a criminal. Sentinel
Program was created by Luis Morales to facilitate the search for stolen cars, through a program
which monitors the different junkyards around the country. Besides offering help to different
organizations dedicated to the search for stolen cars, this program significantly reduces the
costs involved in this task. The project took four months to complete all the essential parts of the
programming and the creation of a computer network for implementation and testing. Cisco
Equipment was used to create a computer network that will connect two different junkyards to a
server and database. Java was used for the creation of the program that will be used to make
the sale and purchase of auto parts.

3|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Executive Summary
Auto sales have increased every year, which also mean a rise in auto thefts. , According to the
Federal Bureau of Investigation's (FBI) Uniform Crime Reports a car is stolen every 40 seconds
in the United States. In Chile, my country of origin and also a country extremely small compared
to the United States, auto theft is considerable. 100 cars are stolen every day, with the intention
to dismantle them and sell the parts for easy money, usually to buy drugs and alcohol. Many
times the stolen car can be found through the police effort and the great coordination of search,
but often the cars disappear forever, which leads to the big question. What makes a car
completely disappear?
An easy way to get rid of a car without being seen, is completely dismantling it. By doing this,
thieves can sell the parts for fast easy money without raising any suspicion. Junkyards normally
buy auto parts and then resell them, without having the slightest idea that they are buying stolen
parts while encouraging car theft.
After researching may places, websites, blogs and social communities, I came to the conclusion
that Chile is already saturated with so many robberies which makes it extremely difficult finding
a stolen vehicle. The government still does not have a concrete solution to prevent theft of
vehicles and they use the police to patch the problem. Some projects have come to light, but
have not succeeded is because they only patrol the area and wait for something to happen. By
doing this, resources are lost in an area while another is being attacked. This project would end
with this problem because every second would be monitoring every junkyard in the country and
immediately acting to detect theft.
Fixing this problem from the root, it can prevent auto theft considerably. The sentinel program
take care to prevent stolen auto parts of being sold to junkyards. It will have a database

4|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

connected directly to the police to report if a stolen auto part is trying to be sold, it will identify
the thief with a picture and also maintain an updated inventory of each junkyard in the country.
Perhaps, the most important thing about this program is that would provide continued support to
the police in the search for thieves and reassurance to the public, as vehicle theft no longer will
have a great benefit for thieves.
Although this program is very promising, we must also take into account some details that if not
managed carefully could ruin the main objective. For this reason a list to be taken into
consideration before implementing this program was created:
1. The program has a high cost of implementation: The database has to be powerful
enough to simultaneously handle transactions of hundreds or thousands of junkyards at
the same time. For this reason we recommend using several databases that run
simultaneously. In addition, the program requires that each have a connection junkyard
permanent internet and one or more computers connected to the Sentinel Program.
2. Experienced personnel is critical: For this program to be financially successful, it is
important for it to have a Database Manager who is experienced in databases, security,
connectivity and work under pressure. Their work is critical in this project, since they
must be aware of any errors that are not allowing any sales and purchases, also has to
make sure that the retrieved information is sent to the appropriate authorities.
3. This project has to manage for more than one crew: This project must be monitored
by the database manager as well as by police personnel. Each time the thief is
identified, the information will be sent to the police or FBI, so they should always be alert
to act as quickly as possible.

5|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

4. Operational and Administrative office cannot have any relationship with any
Junkyard: For this program to be successful, people who work in monitoring the various
junkyards around the country, cannot have any relationship with the staff working in the
junkyards. By doing this, we could avoid corruption and manipulation of data for personal
satisfaction.
For this program to work correctly, the installation of a server to handle request between the
users and the database is needed. We need to create a user friendly program, so that each
junkyard has access to the database and can sell or buy auto parts. Finally, the installation and
configuration of MySQL server is needed, so each junkyard can have its own inventory attached
to the Sentinel Program app. To create a successful network, commercial equipment are
needed. In this case Cisco equipment will be used to create connectivity between different
junkyards and database.

6|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Introduction
The capstone team begins an investigation for the creation of a program that can help work with
the police or FBI in catching car thieves. The principal goal of this program is to create a
connection between a database and all the junkyard of the country, while on the other hand,
each of these junkyards will be monitored by a software manager to alert police if suspicious
activity is detected. Another goals of this program are to create a sustainable business while
accomplishing its mission to train and employ motivated IT people as well as provide
transferrable job skills.

The Teams work focused on three main efforts:

A study to analyze what would be the best possible options to add to the program to alert
the user and the police if the program detects a stolen part.

A study to determine what would be the best language software to write the software
and which equipment will be required for the different connections that the program
requires.

A study which will determine how the equipment will be connected to offer the best and
fastest possible connection.

Finding these three efforts helps the project to find a better path. It also helps to facilitate the
implementation of the project as it raises key points which are to be followed for the project to
be successful. In addition, for this project, other ideas might be considered to be implemented
in the future that would help the system of sales and purchases to be quicker and more
accurate, thus avoiding duplicate and lost materials.

7|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Implement the use of barcode readers. In this way the user can enter and reduce the
inventory items more quickly, and be able to have a cleaner inventory.

Create a free application that shows all the locations of all the authorized junkyards that
sell or buy auto parts around the country. For this program you can use a list or a map
showing the closest to the location of a junkyard around the user.

Problem Description
Currently there is a limited amount of resources to the detection and capture of criminals
engaged in car theft. Crime increases more and more, and with the passing of time, the current
form of attack crime is not enough. The resources have been several times the same amount as
last time and this creates a serious problem. How to steal cars evolved in a surprising way,
since cars are becoming more modern and come equipped with new ways to prevent theft. The
main problem is that institutions dedicated to counter the theft, have not evolved and still use
the same system over and over, sometimes adjusting the process a bit to patch the huge hole
that the system has.
Police resources are often limited and must be used responsibly and effectively. It sometimes
happens that by using a lot of resources in stealing cars, the police cannot respond to
emergencies in real time, such as assaults, accidents, etc. It is for this reason that this
monitoring system promises to save resources for true emergencies, while it is always alert of a
possible theft. Upon detecting a person trying to sell stolen car parts, the system acts and
requests physical resources in the area.

8|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Target Audience
The target audiences are potential institutions responsible for combating crime in one way or
another, for example the police, FBI, private security companies, etc. Besides these institutions,
this program is dedicated to others who want to add ideas to the project and create a powerful
program that crime has no place in our society. A great aspect of this program is that not only
benefits the authorities, also greatly benefit all the junkyard of the country. If the program is
implemented, it would be quickly eliminating illegal junkyards and people should start buying
auto parts from these government-authorized places. Earnings would increase, since the black
market would be reduced to almost cero.

Environmental Scan
The program is designed to be used in Junkyards across the country. These junkyards must be
registered to be part of the program, otherwise will be classified as illegal. The database servers
are found and established elsewhere, separate from any junkyard and under surveillance 24/7.
The program is intended to be implemented on each computer in that junkyard fence to be used
to buy, sell or ask about a product. Only the seller can make use of this program and will be
assigned a username and password to help monitor its activity also in case he/she want to
commit fraud.

9|Page

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Project Description
The project will be called Sentinel Program, a program which will be in charge of monitoring all
the junkyards of the country to reduce or eliminate the sale of stolen cars parts and also reduce
crime. The project will be built in the LDS Business College building within a period not
exceeding four months (One full semester). The project when completed, will include a software
in charge of monitoring, sell, buy and collect information from different Junkyards of the country.
A database will also be created for each Junkyard including their inventory. A server will be
created to move information from users to the database and vice versa. Thieves will be
identified through web camera connected to the program, which will take a photo and send it
directly to a server, then the Database Manager will decide whether to send the information to
local authorities or not. In addition, the seller will have the opportunity to contact the authorities
through a single click.

Project Goal
The primary goal is to create a program that can provide security to citizens and can live in
peace thinking that their cars are safe and stealing them is not a good idea.
Another goal is to significantly reduce crime, in this case the theft of vehicles. The project must
also be sustainable and provide security for the different vendors who will be buying stolen car
parts from strangers. Support for the police force and other institutions is a very important part in
this project, as this would help that resources are spent correctly and also that thieves can be
identified faster for prosecution.

10 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Project Problems & Solutions


By creating Sentinel Program several problems must be solved before application. Here is a list
of problems which were detailed:

We should have a conversation with the police and other government agencies to obtain
the necessary approvals before proceeding with this program.

The VIN number of stolen cars is included in a database handled by the police and
government. We need authorization to access this database and make the program take
decisions based on those VINs.

We need to reach an agreement between the program and all the junkyards of the
country to vote for the program and to implement it in each place.

Many of these places do not have the Internet, which should reach an agreement if they
can have some kind of benefit from the state to implement the program, or if it should be
paid by the Junkyard.

The servers and the database must be located at a key point of the country, where it can
have constant vigilance and difficult access.

11 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Methodology
For the program to be successful, it was necessary to create a guideline in which all parts of the
project should be explained in detail. This part explain what were the requirements of the
project, as well how it was developed.

Implementation Plan
The first step was to create a plan of action to start the Capstone Project. Therefore, the project
was organized and completed based on the following steps:

Planning create a project plan, concept design, and time management

Conducting appropriate research

Sketching, drawing the menus of the software and planning the configuration of the
software

Revising elements

Adding features to software

Creating a Database

Testing

Evaluation

The steps did not necessarily occur in that exact order as revision and testing could be repeated
multiple times throughout the process.
Sentinel Program was created solely by Luis Morales. All efforts, research, creations, settings,
and tests were also executed by Luis Morales.
Table 1 explains how to how and in what order the plan for the preparation of the project should
be implemented.

12 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program
Table 1

13 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Resources
Below, table 2 shows the breakdown of the resources that the project needed to be completed.
All materials were provided by LDS Business College. The only materials separately brought
were three webcams by Luis Morales.

SOFTWARE
1. Microsoft Windows
2012 Enterprise

HARDWARE

OTHER

1. 6 Desktop Computers
2. 5 Routers

2. Microsoft Windows 7

3. 3 IP Cameras

3. Microsoft Office 2013

4. 1 Barcode Reader (If


Available)
5. 3 Switches
6. Cables and
Connectors
7. UPS (If Available)
Table 2: Resources

14 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Bellow, table 3 shows the breakdown of the final resources that were used for this entire project.

SOFTWARE

1. Microsoft Windows
2012 Enterprise

HARDWARE

1. 3 Desktop Computers

OTHER
1. Mounting rack for

2. 1 Laptop

equipment

2. Microsoft Windows 7

3. 2 Cisco Routers

2. Internet Connection

3. Java

4. 3 Webcam

3. Remote connection to

4. APACHE

5. 1 Multilayer Cisco

5. MySQL
6. PHP
7. Visual Studio

phpMyAdmin

Switch
6. Cables and
Connectors

8. Microsoft Office 2013


Table 3: Resources

Expertise
Bellow, table 4 shows the courses and skills that have to be learned throughout the different
semester studied at LDS Business College to complete this project successfully. This project is
designed to bring students to the limits of their maximum capacities and use all the knowledge
acquired to create an innovative project. There are many things about this project that were not
covered in classes, for that reason, the team had to seek additional information in different
places to cover all the gaps that we could find while doing the project.

COURSE NAME
1. CS 112 Programming Fundamentals
2. IT 125 Windows Client
3. IT 130 Intro to Windows Server

SKILLS LEARNED
How to program and create apps in JavaScript
How to query Servers
How to Create a Windows Server and create

15 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Admin
4. IT 150 Intro to Networking
5. IT 214 System Analysis & Design

different Roles for it.


Understand the basics of networking
How to create and manage a project,

6. IT 212 Information Security

deliverables and keep track of everything


How to protect information in different ways

Fundamentals
7. IT 216 Information Storage and

and how to identify viruses, malware, etc


Learned how to manage information, the

Management

different ways I could do it and the different

8. IT 250 & IT252 Intermediate &

options in the market


Learned how to build and configured a network

Advanced Cisco Networking


9. IT 143 Structured Query Language

with Cisco equipment


Learned how to query databases in SQL

(SQL)
10. MySQL Server (Autodidact)

language and create Databases


Learned how to build a MySQL Server and

11. WAMP Server (Autodidact)

Databases
Learned how to mount my own web server by

12. Java (Autodidact)

using PHP, apache and MySQL in Windows


Learned how to create a small application for
this project
Table 4: Expertise

Risk Analysis
There are a number of complications and obstacles that may hinder development.
Such instances include not meeting client standards, a severe illness of the group leader and
unexpected accidents, like hard-drive failures, lost flash drives, and changes in the budget or
accessibility of essential software. The project may also be too large, work intensive, and
complex for the team to complete by December 15, 2015. Therefore, the team took extra
precaution to back up files in multiple places, in order to prevent loss of data, and kept on the
schedule set forth in the timeline section of the report.

16 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Project Changes
Throughout the process of creating Sentinel Program, there were a number of changes that
were made. If the Table 1 and Table 2 are compared it can be noticed that the necessary
material was greatly reduced. This is because as I was setting up the equipment, I found easier
ways and much professional ways to create better connections between different server,
database and users.
The creation of software also suffered several modifications before being completely finished.
First I thought about using a web server to send and receive transactions between the user and
the database. Then it was decided to use a program written in Java as creating a web server, I
would have troubles with some of the features that make it unique to this project.
Internet browser was not planned for this project, because the Internet is only so that the
program could communicate with the server and database. I choose to allow internet access for
sellers to show pictures of auto parts in case some customer did not know what he was looking
for. Besides the Internet can provide valuable information to study for workers while they are not
serving a customer. It was planned to use a bar code reader, but was discarded for lack of time,
since the use of it required more programming time for the application and also more time to
add to each product an SKU number in the database.
Despite the many modifications suffered during the course of the creation of the program, the
end result was always the one that was planned from the beginning.

Deliverables
The program requires an Internet connection to permanent and reliable, otherwise different
junkyards will have connectivity problems, not allowing sellers to buy or sell auto parts, meaning
a loss for the business and a loss of credibility for our program.

17 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

We will need to find the most viable way of purchasing computers for the Junkyard. This may be
by means of a subsidy from the government, the junkyard by spending becomes the Sentinel
Program or deliver it as part of the plan.
We will need to find the most viable way to acquire computers for the Junkyard. This can be
with a subsidy from the government, the junkyard pay for its own computer or the Sentinel
Program give it as part of the plan.
The program cannot be downloaded from the Internet, because to implement this project the
people in charge of installing the program need to make certain modifications to the computers
and also restrict some access to prevent the program from operating properly.
An instruction manual surrender to learn how to use the program and give more knowledge to
Junkyards of the country which is the reason and the goal of this program

Timeline
Below in table 5 is a Gantt chart that illustrates important milestones that needed to be met in
order to finish the project on time. Some aspects of the project overlapped indicating that they
were completed simultaneously, whereas other elements had to be completed in a particular
order.

18 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Table 5

Work performed
In this area all the procedures used for the creation of this project will be explained. Unlike an
executive summary, in this report all the details, specifications, changes and difficulties
observed and implemented in this project will be explained.

Research

19 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Before starting this project it was mandatory to conduct an investigation to see what was
required to solve auto theft. Auto theft is increasing, but there are no new ideas to combat
crime. I started to add and monitor social groups, where anyone can post stolen vehicles. I also
talk to people who led groups of search and recovery of vehicles. They told me that their efforts
have been very successful, but they realize that the way they do this is too worn and need new
ideas to recover vehicles more effectively. Always I learned that to correct a problem, they were
to be fixed from the root and not be patched to provide a temporary solution.
I realized that every time a car was stolen, it was dismantled and sold to different junkyards for
resale, thus it is almost impossible to recover the vehicles.
I had the idea of creating a program that could monitor all the junkyards of the country, so every
time a seller have to buy an auto part, he could first run a background of the piece to check if it
is stolen or not. The program will have a database of every junkyard and the program would
take photos to everyone who was trying to sell some stolen car. The database manager would
be responsible for sending this information to the police to identify the suspect easily.

Planning
To begin this project I had to create a project plan in which all the steps that must be followed for
proper execution were going to be detailed. Also, all the milestones would be listed and when
was going to be the final presentation.
I had to do some research to decide how the program would be designed. At first I chose to use
a Web server, thus users would connect to a website to make purchases and sales, but I
realized that by doing this, I would limit the functions I wanted to add to the program. I thought of
using Java for the creation of the program, since it is the only programming language in which I
have more experience, also I took a class at the LDS Business College.

20 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

To create the computer network, my idea was always imitate a home network, but because of
the limitation of equipment I got the idea of using a switch that would divide one network into
several networks. I also wanted to use 3 different users, but then thought of using 2 users on a
network and another user on a different network.
For this project it would be necessary to create a database for each junkyard because the
inventory would be located separately from the junkyard. Making this change would avoid the
seller from hiding and modifying information from the inventory. The database would also be
responsible for storing the pictures taken every time someone wanted to sell parts of stolen
cars.
Finally I should make a full testing of all the functions that the program has. The program uses
many different functions connected between if, for this reason the project is more vulnerable to
errors.

Creating the Software


Before creating the program, there were many ideas for its creation. In the first instance, I only
thought about using a web server, where it would create a web page and sellers should log in to
buy and sell auto parts. The same website would be connected to the database of the program
and the database of the police.
After much research and testing different web servers, I came to the conclusion that it would be
better to use a program installed on the computer vendor to perform these transactions, this is
because some key functions of the program will not work correctly through a web page. The
programming language that was used in this program is Java, because it is the language most
familiar to me. Picture 1 show how many times the Application was modified before it was
completed.

21 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Picture 1

Before creating the program, I had to create several drafts to get a clearer idea of how I wanted
to see the program. When that was done, I started programming.
The second step was to create a program where only the interface work, so if any error
appeared, it would be easier to detect. The interface (GUI) has been modified several times until
it met the requirements and will also looks user friendly for easy use for the vendors.

Finally, when the entire interface of the program worked correctly, it gave way to add different
features that would use the program:

The first function is to check if the VIN number has no problems or if is applicable to a
vehicle that was stolen. By introducing VIN number on the program, it consulted in the
database of the police if it can proceed with normal or purchase should be blocked. If the
VIN number listed in the database figure as stolen, the program will block the purchase
and the person who brought the auto part for sale must leave.

The second function is to use a webcam to the identification of the suspect who
attempted to sell some stolen car part. When entering a VIN number contained in the
database of the police figure as stolen, the program will block purchase and
automatically will take a photo to identify the thief. After taking the picture, this is
automatically sent to the Sentinel Programs database thus be avoided that the seller
remove the photo from his computer in case he want to commit fraud.

22 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

The third function is to add a button that automatically send a message to the police
when entering a VIN number of a stolen car. By blocking the purchase, the send a
message to police is displayed. The idea of this button is to alert the police in a silent
way and not endanger the lives of the seller.

The fourth function is to link the database to the program. Purchases and sales will
perform by using the same program as this will control the inventory of each Junkyard. In
addition, if we have a separated inventory, staff of the Sentinel Program can audit every
junkyard to see if there are anomalies.

The sale of auto parts does not need to be verified with a VIN number as this is the inventory
that already exists in the Junkyard and this was already added to the Sentinel Programs
database.
Table 6 shows the dataflow chart explaining how the program should work and what should be
the action to take for each deliverable.

23 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Table 6
Below in picture 2 and 3, the fully functional program can be appreciated. The program only
works if the database is active.

24 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Picture 2

Picture 3

25 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Create a Network for Demonstration


To demonstrate the project I needed to create a computer network, where users interact with the
server and the database.
To create the connection a Cisco router and a Cisco Multilevel Switch was used. The idea of the
project was to create different networks to simulate the independency of each junkyard, so I
could say that each user would connect to a different location in the country.
A Multi-Level Switch it was used for this project, as it is the only way in which I could divide a
switch in multiple networks. The main idea was that each computer had its router to separate
networks, but I realized that doing this I was going to use too many resources and I was not
going to apply my full potential in using Cisco Equipment.
I configured a process called 'Inter-VLAN' in which I could separate a network into several subnetworks. Each sub-network means a different location in the country.
In total 3 different Inter-VLANs were created:

The first network would be connected to the server with the database.

The second network 2 users would be connected in the same junkyard.

A third network would be connected to a single user in another junkyard.

After creating the Inter-Vlan, I had to create an IP for each network and from that, a static IP
was assigned to each user.
In picture 4 you can see the wiring between computers and 2 switches. This does not represent
the final model.

26 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Picture 4

27 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

To create the network, use the help of a program responsible for creating virtually. I did before
cable and configure the entire project of the connection in this program to see if all would be
well. After completing the network in the program, proceeded to do the physical work.
Picture 5 entire virtual configuration is physically before being implemented.

Picture 5

Creating a Database
To create the database I thought about using Microsoft SQL, but eventually I decided to use
MySQL as it is freely available and also has bigger support and technical assistance.

28 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

I installed MySQL in the computer I intended to use as a database, but before asked me to
install other programs such as pre-requisites. After installing MySQL, I had to create the
appropriate databases:

Two databases were created, one for each junkyard. This is because each will have its
own junkyard inventory located on a server in common. Each database contains 5
brands of cars and 5 models for each brand. In each model 7 pieces of cars were
created in order to operate the program normally as buying or selling.

Secondly, another database was created in which it would be for registered users of
each junkyard. This database can only be modified by the Database Manager, thus only
the DB Manager has the authority to add or remove users from the system. This safety
system prevents anyone to modify data in the program.

Finally I created a database called 'Report', in which information from people who tried to
sell a stolen product will be saved. This particular function is thought to prevent
corruption within the program. The idea is to keep this type of information outside the
scope of the seller, because you never know if this may be helping the person who is
trying to sell some stolen car part. When the program locks a purchase, this
automatically takes a photo and sends it in real time to the database where it will be
saved. This photo will have attached a picture of the place that was taken, the date and
time. The DB Manager has the function to send this picture with its respective
information to the nearest authorities to have a reference of the suspect.

Bellow, in Picture 6 and 7 can be seen the program used for this project. In this case MySQL 5.7
Server, Client, Workbench and all other functions were installed in the computer, as well as
being server was used to create the database.

29 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Picture 6

Picture 7

30 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

In picture 8, there is list of car brands and models, and shows in the table the quantity in stock
and the price. The inventory is small because this database is only experimental. In the case of
commercially used, the fully complete database can be imported.

Picture 8
Picture 9 shows users who are registered in the database. Only these users can log in to the
program.

31 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Picture 9
Picture 10 shows different photographs taken at different junkyards, each with its own stamping.
All these photos are stored together in the same database for later review.

Picture 10

Revising elements
After much work creating the different functions and connections of the program, it was time to
check that everything was in order. In one place I settled the computers that were going to be
used as the users (sellers) and installed in another place the computers that were going to be
working as the Server and Database. Also the switch was switched differently so people or the
IT person could physically see a separation of the different networks. This was accomplished by
disconnecting and connecting the cables separately. New ports were allocated and tested to
see if they still had connectivity.

32 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

The program underwent minor changes that made their use more user friendly. One of those
changes was to add a go back button, because if an error was committed, the user had to start
the process of buying or selling from cero. The other change was in the inventory, as the
program was not properly delivering the sum of the TAX plus the total purchase. After these
arrangements the program was ready to be implemented on computers.
The database was a minor modification because in 'junkyard_2' the value of the pieces was not
added, which caused the program to confused and freeze

Testing
All equipment assembly was held in a room at LDS Business College. The main idea of this
phase is to test the entire project to detect any anomaly. The program would be running at
100% of its capacities, as if embers already installed in junkyards and database in its respective
secret location.

I began by using the preinstalled users on the program to buy and sell products. Product
sales were faster since they do not go through the process of verification of the VIN
number. The VIN number will be checked to see if the part does not belong to a stolen
car. If the VIN number had no problems with the police the seller could purchase the
item normally. If the VIN number corresponds to a stolen car it will take a photo and send
it to the database automatically. Everything worked well, except for one detail. When I
selected a part of car to buy or sell, after making the transaction, the database did not
change the numbers in the inventories, leaving the same number of parts. This problem
was detected and quickly corrected. Then I tested again and run properly.

New users were added from the database to be used by new vendors, so they could
have access to the program. Everything worked properly.

33 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

While I have the program open, I remove the cable connected to the database to see if
the programs were still operating with inventory, but that did not happened. This is what I
really wanted it to happen, because if any seller made a purchase or sale in a junkyard
with offline, the program would generate a bigger problem between the inventory
database and the physical inventory of the junkyard.

The router and switch worked properly all the time. No modification was necessary in the
testing phase.

After extensive testing, I came to a point where the program had no problems and it worked
successfully all the time. The program was ready to be exposed to people interested in seeing
how they could protect their vehicles against theft.

34 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

Personal Thoughts

Although this project was just a graduation project, it is also a project that can serve future
generations to achieve reduce or eliminate theft of vehicles nationwide. The project looks at
several key points when identifying suspects and can become quite necessary. I think this
project has great potential if it reaches the right hands
A point not mentioned before because it was not purely of the project is that many times I found
myself away from the database, but I had free time to work on it. For this reason I installed
WAMP Server and had remote access to my database through phpMyAdmin from anywhere
which was installed on a Web server called Apache.
The project was in my mind one year before starting to build it. Everything began when I saw in
social networks that people posted every day that their cars had been stolen. I decided to start
this project the day that my sister-in-laws brand new pickup got stolen and was never able to
recover it.
I never thought that the project would be easy, but neither thought it would be difficult. Despite
being taking another 15 credits in other advanced classes, I decided to create what I thought
was best for my friends and brothers.
The creation of the program was quite difficult as we only had basic knowledge in Java, but with
the advice of friends and teachers could move forward and create a program that meets the
requirements of the project.
Despite having some knowledge in databases, creating a database in MySQL it was quite
difficult, as I had to install the server, client and create the database. Interestingly, configuring

35 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

the server accidentally delete the entire database that had created, which led me to start from
scratch.
The connection of router and switch was also very complicated, because the configuration that
was applied was very advanced and required many abilities and patience. Thanks to the
classes Intermediate and Advanced Networking Cisco I succeeded
My idea is to present this project to the government and different organizations in charge of
protecting public safety, so this is not a new way to attack crime, but that suits the methods that
they already have and improve resources to counteract the car thefts in different cities of the
country.

This project was exhibited at the Capstone Project Showcase on 12/15/2015 at LDS Business
College, obtaining the First Place among all the votes for best project.

36 | P a g e

Luis Morales

LDSBC Capstone Final Report

Sentinel Program

37 | P a g e

You might also like