Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 22

DYNAMIC PARALLEL ACCESS

Project Work By
Vinodkumar.p.M
Palanivel.V
Guide By
Mr.R.Sivasubramanian, M.S.,
INTRODUCTION

This project is an accelerated service agent to enable users


logged onto a network to access remote files and services.

This project is done in Java.

The concept of this project is to access the shared files in Linux


Environment in Windows Environment.
PROBLEM DEFINITION

The Server machine is installed with Linux and Clients are installed
with Windows operating system.

The files in server machine is put into an distributed directory and


then downloaded into client machines.

The project modules involved are


 MemberAdder
 Look up
 User Admin
 Resource Register
 Resource Server
 File Sender
 Resource Prober
Existing System
Though solutions exist for Windows platforms that emulate the
concept of service agents, no reliable cross-platform software
exists similar to the one we have developed.

The available solutions include:


1. Commercial software
2. Free downloads
The few commercial solutions that exist lack the following
requirements:
1. Price factor
2. Too compelling and intricate registration and
maintenance procedures
3. 100 % customized for a single company’ requirements
so that modification to suit alternative requirements
becomes difficult.
4. Security
Drawbacks of Existing System

The Available Software is either prohibitively expensive or doesn’t


satisfactorily possess all the features required.

It is not advisable for corporates to rely on anonymous downloaded


software freely available over the internet, for the risks involved with
respect to the company’s valuable trade secrets and data are
enormous.
Proposed System

In short, the requirements for this undertaking are:

Software that is excellent with respect to performance.

Doesn’t necessitate dependence on expensive commercial


software.

Customized report and registration features.

High security

Reliability and support.

Offers a user-friendly interface.

Fast and easy probing of a network’ services without straining the


network’s resources.
SYSTEM CONFIGURATION
2.1.HARDWARE CONFIGURATION

 Processor : Pentium IV

 Motherboard : Intel Motherboard

 Main Memory : 256 MB

 Hard disk : 40 GB

 Floppy disk : 1.44 MB

 CD-ROM : 54x Max-speed

 Monitor : Display type: 15.0’’ color

 Keyboard : Multi-media Keyboard


2.1. SOFTWARE CONFIGURATION

Server configuration

 Operating System : Linux

 Language : Java

Client configuration

 Operating System : Windows

 Language : Java 2.0



 Backend : MySQL
INPUT DESIGN
 Capture only validated data.

 Restricted user entry.


 The main objectives considered during input design are:

 Nature of input processing.

 Flexibility and thoroughness of validation rules.

 Handling of priorities within the input documents.

 Screen design to ensure accuracy and efficiency of input relationship with


files.

 Careful design of the input also involves attention to error handling,


controls, batching and validation procedures.
OUTPUT DESIGN

 The project is provided with a separate GUI tool.

 The output is also provide an interface for


registering the files in the network.

 The administrator can download the shared files


from the server which is to be stored in the
database.
SYSTEM TESTING

 1.This project have three testing

• Unit Testing

• Integration testing

• Validation testing
UNIT TESTING

 verification effort on the smallest limit of software design.

 important control paths are tested to uncover the errors


within the module.

 carried out during the coding itself.


INTEGRATION TESTING

 The objective is to take tested modules and build


the program structure that has been dictated by
design.

 If a set of errors is encountered correction is


difficult because the isolation of causes is
complicated by vastness of the entire program.
 Security checks done are,

 1) Login with wrong user id


 Display error ‘No such user exist’

 2) Provide wrong password


 Display error ‘Password incorrect’

 3)Other than administrator trying to access user groups


 Display error ‘Invalid command or Insufficient Access Level’

 4)Provide wrong IP address of server


 Display error ‘Server not responding’

 5) Provide wrong port number


 Display error ‘error sending message login, list’
VALIDATION TESTING

 Validation succeeds then the software functions in a


manner that can be reasonably accepted by the user.

 Software validation is achieved through a series of black


box tests that demonstrate conformity the requirements.
 After validation test has been completed, one of the following two
possible conditions exists:

 The function or performance characteristics confirm to specification


and are accepted.

 A deviation from specification is uncovered and a deficiency list is


created. Deviation or errors discovered at this step in this project is
corrected prior to the completion of the project is the help of users
by negotiating to establish a method of resolving deficiencies
IMPLEMENTATION

 The implementation involves the following


things:

• Careful planning

• Investigation of the system and constraints

• Design the methods to achieve the charge over

• Training the staff in the changed place


DATAFLOW DIAGRAM

Level 0: Name,pwd
User Request Server
User Admin
Response Group
Level 0(1)

Member IP Addr
Admin
Adder

ddr
Lo in

IP A
g

Lookup IP,Files
Server N/W Users

Fetch Files
b er Fname,Key
ro

Tr er s
P

f ile
e
rc

F
ns
ou
a
s
Re

Fname,Key Fname,Key DDS Service


User Register

Resources
SYSTEM DIAGRAM
Nm,pwd,key
User Admin Inva Login
lid

Resource Prober Vali Logout


d

Request
DDS Service Res View Keys
pon
se
Lookup
Downloaded Files
IP
Member Adder
Register
N , Key
F
Register
CONCLUSION

 The software is developed with modular approach.

 All modules in this project have been tested separately


and put together to form the main system.

 The system is tested with real data and everything


worked successfully.

 Finally, to conclude ,the software development was


completed and accepted by the management as well as
user staff.
THANK YOU

You might also like