emman
TRANSCRIPT
-
8/19/2019 EMMAN
1/68
1
1. INTRODUCTION
India is a developing country, thus it has achieved the good literery level,
new technologies improved as well. Now a day’s internet plays a vital role in
the life. The aim of this project is to explore the implantation of authentication
and security, using aspect oriented design in real world example of a secure data
segregation.
This project aims to investigate implementaing security and
authentication as aspects with in the frame work of the secure data segregation.
This system will e developed in .Net and aspect as distriuted system. The
project aims to explore the fields of security and authentication eing
implemented as aspects. The aim of this project is to explore the implantation of
authentication and securtu, using aspect oriented design in the real world
example of the secure data secure data segregation.
The initial focus of the project will e into research into current methods
of authentication and security with the emphasis eing placed on their practical
applications and methods for their implementation using aspect.
The second phase of the project is the actual implantation of the
knowledge gained in the phase one to create secure segregation of data. Initially
the system will simply e a shell that allows for the data to e segregated in asecure fshion. This complete the system can e improved to cope with a
selection of many forms of segregation of data securely, this however is a
territory aim and although not vital to the main project takes the finished system
from eing simply eing demonstrated to full functional and so usale in real
world examples.
-
8/19/2019 EMMAN
2/68
!
1.1 PROJECT DESCRIPTION
MODULES
The modules designed for the system are
1. Privacy Preserving Data Mining:
2. Distribte! C"#$tati"n:
%. &re'ent Ite#sets:
(. Data Segregati"n:
D)T) SE*RE*)TION MODULES
1. Privacy Preserving Data Mining:
"ne, in which the data owner and the data miner are two different
entities, and another, in which the data is distriuted among several
parties who aim to jointly perform data mining on the unified corpus of
data that they hold. The idea is that. #omputation and communication
costs versus the numer of transactions the pertured data can e used to
infer general trends in the data, without revealing original record
information. In the second setting, the goal is to perform data mining
while protecting the data records of each of the data owners from the
other data owners. This is a prolem of secure multiparty computation.
2. Distribte! C"#$tati"n:
$e compared the performance of two secure implementations of the
we executed the unification step using %rotocol.
-
8/19/2019 EMMAN
3/68
&
Total computation time of the complete protocols. Total message si'e. $e
ran three experiment sets, where each set tested the dependence of the
aove measures on a different parameter(
%. &re'ent Ite# sets:
If the re)uired output includes all gloally fre)uent item sets, as
well as the si'es of their supports, then the values can e revealed for all.
In such a case, those values may e computed using a secure summation
protocol, the more interesting setting, however, is the one where the
support si'es are not part of the re)uired output. $e proceed to discuss it.
(. Secre !ata:
*ata #enter shall ensure that its employees and contractors remain
aware of industry standard security practices, and their responsiilities for
protecting the +ensitive Information.
The main idea ehind this implementation is to make data
migration accessile user interface and file management in a $% front
end environment to provide one utton of default settings and also for
their future reference.
-
8/19/2019 EMMAN
4/68
-
2. S+STEM STUD+
2.1 &E)SI,ILIT+ STUD+
The feasiility of the project is analy'ed in this phase and usiness
proposal is put forth with a very general plan for the project and some cost
estimates. *uring system analysis the feasiility study of the proposed system is
to e carried out. This is to ensure that the proposed system is not a urden to
the company. or feasiility analysis, some understanding of the major
re)uirements for the system is essential.
Three key considerations involved in the feasiility analysis are
♦ #"N"/I#0 0+I2IIT3
♦ T#4NI#0 0+I2IIT3
♦ +"#I0 0+I2IIT3
ECONOMIC)L &E)SI,ILIT+
This study is carried out to check the economic impact that the system
will have on the organi'ation. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures
must e justified. Thus the developed system as well within the udget and this
was achieved ecause most of the technologies used are freely availale. "nly
the customi'ed products had to e purchased.
TEC-NIC)L &E)SI,ILIT+
-
8/19/2019 EMMAN
5/68
5
This study is carried out to check the technical feasiility, that is, the
technical re)uirements of the system. 0ny system developed must not have a
high demand on the availale technical resources. This will lead to high
demands on the availale technical resources. This will lead to high demands
eing placed on the client. The developed system must have a modest
re)uirement, as only minimal or null changes are re)uired for implementing this
system.
SOCI)L &E)SI,ILIT+
The aspect of study is to check the level of acceptance of the system y
the user. This includes the process of training the user to use the system
efficiently. The user must not feel threatened y the system, instead must accept
it as a necessity. The level of acceptance y the users solely depends on the
methods that are employed to educate the user aout the system and to make
him familiar with it. 4is level of confidence must e raised so that he is also
ale to make some constructive criticism, which is welcomed, as he is the final
user of the system.
2.2 Eisting Syste#
The existing system is ased on the ast *istriuted /ining 6*/7
algorithm of #heung et al. It is an unsecured distriuted version of the 0priori
algorithm. It is ased on asically data with the existence of many largetransaction dataases, the huge amounts of data, the high scalaility of
distriuted systems, and the easy partitioning and distriution of a centrali'ed
dataase.The fre)uent item sets cannot e segregated properly.
2.% PROPOSED S+STEM
-
8/19/2019 EMMAN
6/68
8
In this paper, we present the design and implementation of an automated
resource management system that achieves a good alance etween the two
goals(
• "verload avoidance( the capacity of a %/ should e sufficient to satisfy
the resource needs of all 9/s running on it. "therwise, the %/ is
overloaded and can lead to degraded performance of its 9/s.
• :reen computing( the numer of %/s used should e minimi'ed as long
as they can still satisfy the needs of all 9/s. Idle %/s can e turned off
to save energy.
)D/)NT)*ES O& PROPOSED S+STEM
• $e develop a resource allocation system that can avoid overload in the
system effectively while minimi'ing the numer of servers used.
• $e introduce the concept of ;scenes< to measure the uneven utili'ation of
a server. 2y minimi'ing scenes, we can improve the overall utili'ation of
servers in the face of multi=dimensional resource constraints
-
8/19/2019 EMMAN
7/68
>
%. S+STEM SPECI&IC)TION
S+STEM RE0UIREMENTS:
-)RD)RE RE0UIREMENTS
? +ystem ( %entium I9 !.- :4'.
? 4ard *isk ( -@ :2.
? loppy *rive ( 1.-- /.
? /onitor ( 15 9:0 #olour.
? /ouse ( ogitech.
Aam ( 51! /.
SO&T)RE RE0UIREMENTS
-
8/19/2019 EMMAN
8/68
B
? "perating system ( = $indows C%, $indows > Dltimate 6&!=it7.
#oding anguage ( 0sp.Net 6#E7
ront nd ( 9isual +tudio !@@B F !@1@
dataase ( +)l +erver !@@B
(. L)N*U)*E SPECI&IC)TION
4.1 FEATURES OF. NET
/icrosoft .NT is a set of /icrosoft software technologies for
rapidly uilding and integrating C/ $e services, /icrosoft $indows=ased
applications, and $e solutions. The .NT ramework is a language=neutral
platform for writing programs that can easily and securely interoperate. There’s
no language arrier with .NT( there are numerous languages availale to the
developer including /anaged #GG, #E, 9isual 2asic and Hava +cript. The .NT
framework provides the foundation for components to interact seamlessly,
whether locally or remotely on different platforms. It standardi'es common data
types and communications protocols so that components created in different
languages can easily interoperate.
-
8/19/2019 EMMAN
9/68
;.NT< is also the collective name given to various software
components uilt upon the .NT platform. These will e oth products 69isual
+tudio.NT and $indows.NT +erver, for instance7 and services 6like %assport,
.NT /y +ervices, and so on7.
T-E .NET &R)MEOR3
The .NT ramework has two main parts(
1. The #ommon anguage Auntime 6#A7.
!. 0 hierarchical set of class liraries.
The #A is descried as the ;execution engine< of .NT. It provides the
environment within which programs run. The most important features are
♦ #onversion from a low=level assemler=style language, called
Intermediate anguage 6I7, into code native to the platform eing
executed on.
♦ /emory management, notaly including garage collection.
♦ #hecking and enforcing security restrictions on the running code.
♦ oading and executing programs, with version control and other
such features.
♦ The following features of the .NT framework are also worth
description(
M)N)*ED CODE
The code that targets .NT, and which contains certain extra
Information = ;metadata< = to descrie itself. $hilst oth managed and
unmanaged code can run in the runtime, only managed code contains the
-
8/19/2019 EMMAN
10/68
1@
information that allows the #A to guarantee, for instance, safe execution and
interoperaility.
M)N)*ED D)T)
$ith /anaged #ode comes /anaged *ata. #A provides
memory allocation and *eal location facilities, and garage collection. +ome
.NT languages use /anaged *ata y default, such as #E, 9isual 2asic.NT
and H+cript.NT, whereas others, namely #GG, do not. Targeting #A can,
depending on the language you’re using, impose certain constraints on the
features availale. 0s with managed and unmanaged code, one can have oth
managed and unmanaged data in .NT applications = data that doesn’t get
garage collected ut instead is looked after y unmanaged code.
COMMON T+PE S+STEM
The #A uses something called the #ommon Type +ystem 6#T+7 to
strictly enforce type=safety. This ensures that all classes are compatile with
each other, y descriing types in a common way. #T+ define how types work
within the runtime, which enales types in one language to interoperate with
types in another language, including cross=language exception handling. 0s well
as ensuring that types are only used in appropriate ways, the runtime also
ensures that code doesn’t attempt to access memory that hasn’t een allocated to
it.
COMMON L)N*U)*E SPECI&IC)TION The #A provides uilt=in support for language interoperaility. To
ensure that you can develop managed code that can e fully used y developers
using any programming language, a set of language features and rules for using
them called the #ommon anguage +pecification 6#+7 has een defined.
#omponents that follow these rules and expose only #+ features are
considered #+=compliant.
-
8/19/2019 EMMAN
11/68
11
T-E CL)SS LI,R)R+
.NT provides a single=rooted hierarchy of classes, containing over
>@@@ types. The root of the namespace is called +ystemJ this contains asic
types like 2yte, *oule, 2oolean, and +tring, as well as "ject. 0ll ojects
derive from +ystem. "ject. 0s well as ojects, there are value types. 9alue
types can e allocated on the stack, which can provide useful flexiility. There
are also efficient means of converting value types to oject types if and when
necessary.
The set of classes is pretty comprehensive, providing collections,
file, screen, and network IF", threading, and so on, as well as C/ and
dataase connectivity.
The class lirary is sudivided into a numer of sets 6or
namespaces7, each providing distinct areas of functionality, with dependencies
etween the namespaces kept to a minimum.
L)N*U)*ES SUPPORTED ,+ .NET
The multi=language capaility of the .NT ramework and 9isual
+tudio .NT enales developers to use their existing programming skills to
uild all types of applications and C/ $e services. The .NT framework supports new versions of /icrosoft’s old favorites 9isual 2asic and #GG 6as
92.NT and /anaged #GG7, ut there are also a numer of new additions to
the family.
9isual 2asic .NT has een updated to include many new and
improved language features that make it a powerful oject=oriented
programming language. These features include inheritance, interfaces, and
-
8/19/2019 EMMAN
12/68
1!
overloading, among others. 9isual 2asic also now supports structured exception
handling, custom attriutes and also supports multi=threading.
9isual 2asic .NT is also #+ compliant, which means that any
#+=compliant language can use the classes, ojects, and components you
create in 9isual 2asic .NT.
/anaged xtensions for #GG and attriuted programming are just
some of the enhancements made to the #GG language. /anaged xtensions
simplify the task of migrating existing #GG applications to the new .NT
ramework.
#E is /icrosoft’s new language. It’s a #=style language that is
essentially ;#GG for Aapid 0pplication *evelopment
-
8/19/2019 EMMAN
13/68
1&
ig1 . Net ramework
0+%.NT
C/ $2
+A9I#+
$indows
orms
2ase #lass iraries
#ommon anguage Auntime
"perating +ystem
#E.NT is also compliant with #+ 6#ommon anguage +pecification7
and supports structured exception handling. #+ is set of rules and
constructs that are supported y the #A 6#ommon anguage Auntime7.
#A is the runtime environment provided y the .NT rameworkJ it
manages the execution of the code and also makes the development process
easier y providing services.
#E.NT is a #+=compliant language. 0ny ojects, classes, or
components that created in #E.NT can e used in any other #+=compliant
language. In addition, we can use ojects, classes, and components created in
other #+=compliant languages in #E.NT .The use of #+ ensures
complete interoperaility among applications, regardless of the languages
used to create the application.
CONSTRUCTORS )ND DESTRUCTORS
#onstructors are used to initiali'e ojects, whereas destructors are used to
destroy them. In other words, destructors are used to release the resources
allocated to the oject. In #E.NT the su finali'e procedure is availale.
The su finali'e procedure is used to complete the tasks that must e
performed when an oject is destroyed. The su finali'e procedure is called
-
8/19/2019 EMMAN
14/68
1-
automatically when an oject is destroyed. In addition, the su finali'e
procedure can e called only from the class it elongs to or from derived
classes.
*)R,)*E COLLECTION
:arage #ollection is another new feature in #E.NT. The .NT
ramework monitors allocated resources, such as ojects and variales. In
addition, the .NT ramework automatically releases memory for reuse y
destroying ojects that are no longer in use.
In #E.NT, the garage collector checks for the ojects that are notcurrently in use y applications. $hen the garage collector comes across an
oject that is marked for garage collection, it releases the memory occupied
y the oject.
O/ERLO)DIN*
"verloading is another feature in #E. "verloading enales us to define
multiple procedures with the same name, where each procedure has a
different set of arguments. 2esides using overloading for procedures, we can
use it for constructors and properties in a class.
MULTIT-RE)DIN*
#E.NT also supports multithreading. 0n application that supportsmultithreading can handle multiple tasks simultaneously, we can use
multithreading to decrease the time taken y an application to respond to
user interaction.
STRUCTURED E4CEPTION -)NDLIN*
#E.NT supports structured handling, which enales us to detect
and remove errors at runtime. In #E.NT, we need to use TryL#atchL
-
8/19/2019 EMMAN
15/68
15
inally statements to create exception handlers. Dsing TryL#atchLinally
statements, we can create roust and effective exception handlers to improve
the performance of our application.
T-E .NET &R)MEOR3
The .NT ramework is a new computing platform that simplifies
application development in the highly distriuted environment of the
Internet.
O,JECTI/ES O&. NET &R)MEOR3
1. To provide a consistent oject=oriented programming environment
whether oject codes is stored and executed locally on Internet=distriuted,
or executed remotely.
!. To provide a code=execution environment to minimi'es software
deployment and guarantees safe execution of code.
&. liminates the performance prolems.
There are different types of application, such as $indows=ased applications
and $e=ased applications.
(.% &E)TURES O& S0L5SER/ER
The "0% +ervices feature availale in +M +erver version >.@ is
now called +M +erver !@@@ 0nalysis +ervices. The term "0% +ervices has
een replaced with the term 0nalysis +ervices. 0nalysis +ervices also includes a
new data mining component. The Aepository component availale in +M
+erver version >.@ is now called /icrosoft +M +erver !@@@ /eta *ata
+ervices. Aeferences to the component now use the term /eta *ata +ervices.
-
8/19/2019 EMMAN
16/68
18
The term repository is used only in reference to the repository engine within
/eta *ata +ervices
+M=+A9A dataase consist of six type of ojects,
They are,
1. T02
!. MDA3
&. "A/
-. A%"AT
5. /0#A"
T),LE
0 dataase is a collection of data aout a specific topic.
/IES O& T),LE
$e can work with a tale in two types,
1. *esign 9iew
!. *atasheet 9iew
DESI*N /IE
To uild or modify the structure of a tale we work in the
tale design view. $e can specify what kind of data will e hold.
D)T)S-EET /IE
To add, edit or analyses the data itself we work in tales datasheet
view mode.
-
8/19/2019 EMMAN
17/68
1>
0UER+
0 )uery is a )uestion that has to e asked the data. 0ccess gathers data
that answers the )uestion from one or more tale. The data that make up the
answer is either dynaset 6if you edit it7 or a snapshot 6it cannot e edited7.ach
time we run )uery, we get latest information in the dynaset. 0ccess either
displays the dynaset or snapshot for us to view or perform an action on it, such
as deleting or updating.
)J)4 0+%.NT 0jax marks /icrosofts foray into the ever=growing 0jax
framework market. +imply put, this new environment for uilding $e
applications puts 0jax at the front and center of the .NT ramework.
6. S+STEM DESI*N
INPUT DESI*N
The input design is the link etween the information system and the user. It
comprises the developing specification and procedures for data preparation and
those steps are necessary to put transaction data in to a usale form for
processing can e achieved y inspecting the computer to read data from a
-
8/19/2019 EMMAN
18/68
1B
written or printed document or it can occur y having people keying the data
directly into the system. The design of input focuses on controlling the amount
of input re)uired, controlling the errors, avoiding delay, avoiding extra steps and
keeping the process simple. The input is designed in such a way so that it
provides security and ease of use with retaining the privacy. Input *esign
considered the following things(
$hat data should e given as inputO
4ow the data should e arranged or codedO
The dialog to guide the operating personnel in providing input.
/ethods for preparing input validations and steps to follow when error
occur.
O,JECTI/ES
1. Input *esign is the process of converting a user=oriented description of
the input into a computer=ased system. This design is important to avoid errors
in the data input process and show the correct direction to the management for
getting correct information from the computeri'ed system.
!. It is achieved y creating user=friendly screens for the data entry to
handle large volume of data. The goal of designing input is to make data entry
easier and to e free from errors. The data entry screen is designed in such a
way that all the data manipulates can e performed. It also provides record
viewing facilities.
&. $hen the data is entered it will check for its validity. *ata can e
entered with the help of screens. 0ppropriate messages are provided as when
needed so that the user will not e in mai'e of instant. Thus the ojective of
input design is to create an input layout that is easy to follow
-
8/19/2019 EMMAN
19/68
1
OUTPUT DESI*N
0 )uality output is one, which meets the re)uirements of the end user and
presents the information clearly. In any system results of processing are
communicated to the users and to other system through outputs. In output
design it is determined how the information is to e displaced for immediate
need and also the hard copy output. It is the most important and direct source
information to the user. fficient and intelligent output design improves the
system’s relationship to help user decision=making.
1. *esigning computer output should proceed in an organi'ed, wellthought out mannerJ the right output must e developed while ensuring that
each output element is designed so that people will find the system can use
easily and effectively. $hen analysis design computer output, they should
Identify the specific output that is needed to meet the re)uirements.
!. +elect methods for presenting information.
&. #reate document, report, or other formats that contain information
produced y the system.
The output form of an information system should accomplish one or more of the
following ojectives.
#onvey information aout past activities, current status or projections of
the
uture.
+ignal important events, opportunities, prolems, or warnings.
Trigger an action.
#onfirm an action.
6.% D)T),)SE DESI*N:
-
8/19/2019 EMMAN
20/68
!@
The dataase design is a must for any application developed especially
more for the data store projects. +ince the chatting method involves storing the
message in the tale and produced to the sender and receiver, proper handling of
the tale is a must.
In the project, login tale is designed to e uni)ue in accepting the
username and the length of the username and password should e greater than
'ero.
In this dataase design the admin details and the user details are stored in
the dataase. The different users view the data in different format according to
the privileges given.
The complete listing of the tales and their fields are provided in the
annexure under the title PTale +tructure’.
D)T),)SE DESI*N
Tab7e Na#e:)!#in
-
8/19/2019 EMMAN
21/68
!1
Tab7e Na#e: )$$7icati"n
Tab7e Na#e:C"n8igrati"n
Tab7e Na#e:C"nnecti"n
Tab7e Na#e:De$7"y
6.6 D)T)&LO DI)*R)M
Data &7"9 Diagra# 8"r )!#in M"!7e:
-
8/19/2019 EMMAN
22/68
!!
Data 87"9 !iagra# 8"r 7ectrer M"!7e:
-
8/19/2019 EMMAN
23/68
!&
Data &7"9 !iagra# 8"r Princi$a7 M"!7e:
-
8/19/2019 EMMAN
24/68
!-
6. D)T) T),LE STRUCTURE:
LIST O& T),LES DESI*N
-
8/19/2019 EMMAN
25/68
!5
M;a!#in;registrati"n:
C"7#n Na#e Data Ty$es )77"9 N77s
Name N9archar6max7 3es
:ender N9archar6max7 3es
0dminQI* N9archar6max7 3es
%assword N9archar6max7 3es
/oile No N9archar6max7 3es
mailQI* N9archar6max7 3es
0ddress N9archar6max7 3es
*ate N9archar6max7 3es
M;a!#in;tab7e:
C"7#n Na#e Data Ty$e )77"9 N77s
0dminQname N9archar6max7 3es
%assword N9archar6max7 yes
M;ran
-
8/19/2019 EMMAN
26/68
!8
C"7#n Na#e Data Ty$e )77"9 N77s
Name N9archar6max7
Aeg no N9archar6max7
*o N9archar6max7
*ept Nchar61@7
/arks Nchar61@7
Images N9archar6max7
M;#ar N9archar6max7 3es
+uQB N9archar6max7 3es
Total N9archar6max7 3es
%ercentage N9archar6max7 3es
M;sta88;registrati"n:
C"7#n Na#e Data Ty$e )77"9 n77
Name N9archar6max7 3es
:ender N9archar6max7 3es
*o N9archar6max7 3es
-
8/19/2019 EMMAN
27/68
!>
Dser id N9archar6max7 3es
%assword N9archar6max7 3es
/oile numer N9archar6max7 3es
mailQid N9archar6max7 3es
0ddress N9archar6max7 3es
*ate N9archar6max7 3es
Aole N9archar6max7 3es
mpQid N9archar6max7 3es
*ept N9archar6max7 3es
-
8/19/2019 EMMAN
28/68
!B
. S+STEM TESTIN*
The purpose of testing is to discover errors. Testing is the process of
trying to discover every conceivale fault or weakness in a work product. It
provides a way to check the functionality of components, su=assemlies,
assemlies andFor a finished product It is the process of exercising software
with the intent of ensuring that the +oftware system meets its re)uirements and
user expectations and does not fail in an unacceptale manner. There are various
types of test. ach test type addresses a specific testing re)uirement.
.1 UNIT TESTIN*
Dnit testing involves the design of test cases that validate that the internal
program logic is functioning properly, and that program inputs produce valid
outputs. 0ll decision ranches and internal code flow should e validated. It is
the testing of individual software units of the application .it is done after the
completion of an individual unit efore integration. This is a structural testing,
that relies on knowledge of its construction and is invasive. Dnit tests perform
asic tests at component level and test a specific usiness process, application,
andFor system configuration. Dnit tests ensure that each uni)ue path of a
usiness process performs accurately to the documented specifications and
contains clearly defined inputs and expected results.
.2 INTE*R)TION TESTIN*
Integration tests are designed to test integrated software components to
determine if they actually run as one program. Testing is event driven and is
more concerned with the asic outcome of screens or fields. Integration tests
demonstrate that although the components were individually satisfaction, as
shown y successfully unit testing, the comination of components is correct
-
8/19/2019 EMMAN
29/68
!
and consistent. Integration testing is specifically aimed at exposing the
prolems that arise from the comination of components
.% &UNCTION)L TEST
unctional tests provide systematic demonstrations that functions tested
are availale as specified y the usiness and technical re)uirements, system
documentation, and user manuals.
unctional testing is centered on the following items(
9alid Input ( identified classes of valid input must e accepted.
Invalid Input ( identified classes of invalid input must e rejected.
unctions ( identified functions must e exercised.
"utput ( identified classes of application outputs must e
exercised.
+ystemsF%rocedures ( interfacing systems or procedures must e invoked.
"rgani'ation and preparation of functional tests is focused on
re)uirements, key functions, or special test cases. In addition, systematic
coverage pertaining to identify 2usiness process flowsJ data fields, predefined
processes, and successive processes must e considered for testing. 2efore
functional testing is complete, additional tests are identified and the effective
value of current tests is determined.
.( -ITE ,O4 TESTIN*
$hite 2ox Testing is a testing in which in which the software tester has
knowledge of the inner workings, structure and language of the software, or at
least its purpose. It is purpose. It is used to test areas that cannot e reached
from a lack ox level.
-
8/19/2019 EMMAN
30/68
&@
.6 ,L)C3 ,O4 TESTIN*
2lack 2ox Testing is testing the software without any knowledge of the
inner workings, structure or language of the module eing tested. 2lack ox
tests, as most other kinds of tests, must e written from a definitive source
document, such as specification or re)uirements document, such as
specification or re)uirements document. It is a testing in which the software
under test is treated, as a lack ox .you cannot ;see< into it. The test provides
inputs and responds to outputs without considering how the software works.
. )CCEPT)NCE TESTIN*
Dser 0cceptance Testing is a critical phase of any project and re)uires
significant participation y the end user. It also ensures that the system meets
the functional re)uirements.
-
8/19/2019 EMMAN
31/68
&1
> .S+STEM IMPLEMENT)TION
Implementation is the stage of the project when the theoretical design is
turned out into a working system. Thus it can e considered to e the most
critical stage in achieving a successful new system and in giving the user,
confidence that the new system will work and e effective.
The implementation stage involves careful planning, investigation of the
existing system and it’s constraints on implementation, designing of methods to
achieve changeover and evaluation of changeover methods.
>.1 &UTURE EN-)NCEMENT
The %roject ;Secre Data Segregati"n? in current developed using
0+%.NT, it can e future enhance to 0H0C, T4 +3+T/ !.@ for The system
site development. #urrently it is implemented for single ranch and it can e
future enhanced for other ranch too in future.
To our est knowledge the method what The system presented is new ut
still The system The system using the classical tools of software engineering.
The only modifications The system do are using the super=characteristics for
uilding the software )uality model. 2y using this model The system can ring
good )uality software. /odel and the proposed solutions and opportunities of
improving software )uality models.
0 )uality is an ojective value dependent on sets of software attriutes
and customer’s re)uirements. 2y applying the tools the )uality of the software
can e ale to identify the software type. 0nd ale to find the reusaility of a
software and understandaility.
-
8/19/2019 EMMAN
32/68
&!
@. CONCLUSION
We have presented the design, implementation, and
evaluation of a resource management system for cloud
computing services. Our system multiplexes virtual to physical
resources adaptively based on the changing demand. We use
the skewness metric to combine VMs with dierent resource
characteristics appropriately so that the capacities of servers
are well utilied. Our algorithm achieves both overloadavoidance and green computing for systems with multi!
resource constraints.
-
8/19/2019 EMMAN
33/68
&&
A. ,I,LIO*R)P-+
:ood Teachers are worth more than thousand ooks, we have them in "ur
*epartment
R1S /. 0rmrust et al., ;0ove the clouds( 0 erkeley view of cloud
computing,< Dniversity of #alifornia, 2erkeley, Tech. Aep., e !@@.
R!S . +iegele, ;et it rise( 0 special report on corporate IT,< in The Economist ,
"ct. !@@B.
R&S %. 2arham, 2. *ragovic, K. raser, +. 4and, T. 4arris, 0. 4o,A. Neugeauer,
I. %ratt, and 0. $arfield, ;Cen and the art of virtuali'ation,< in Proc. of the
ACM Symposium on Operating Systems Principles (SOSP’03, "ct. !@@&.
R-S ;0ma'on elastic compute cloud 60ma'on
#!7,http(FFaws.ama'on.comFec!F.<
R5S #. #lark, K. raser, +. 4and, H. :. 4ansen, . Hul, #. impach,I. %ratt, and
0. $arfield, ;ive migration of virtual machines,< in Proc. of the Symposium
on !et"or#e$ Systems %esign an$ &mplementation (!S%&’0', /ay !@@5.
R8S /. Nelson, 2.=4. im, and :. 4utchins, ;ast transparent migration for
virtual machines,< in Proc. of the SE!&) Annual Technical Conference, !@@5.
R>S /. /cNett, *. :upta, 0. 9ahdat, and :. /. 9oelker, ;Dsher( 0n extensile
framework for managing clusters of virtual machines,< in Proc. of the *arge
&nstallation System A$ministration Conference (*&SA’0+, Nov. !@@>.
-
8/19/2019 EMMAN
34/68
&-
RBS T. $ood, %. +henoy, 0. 9enkataramani, and /. 3ousif, ;2lack=ox and gray=
ox strategies for virtual machine migration,< in Proc. Of the Symposium on
!et"or#e$ Systems %esign an$ &mplementation (!S%&’0+, 0pr. !@@>.
RS #. 0. $aldspurger, ;/emory resource management in 9/ware +C
server,< in Proc. of the symposium on Operating systems $esign an$
implementation (OS%&’0,, 0ug. !@@!.
R1@S :. #hen, 4. $eno, H. iu, +. Nath, . Aigas, . Ciao, and . hao,
;nergy=aware server provisioning and load dispatching for connection=
intensive internet services,< in Proc. of the SE!&) Symposium on !et"or#e$
Systems %esign an$ &mplementation
(!S%&’0-, 0pr. !@@B.
RE&ERENCES:
Sites Re8erre!:
http(FFjava.sun.com
http(FFwww.roseindia.comF
http(FFwww.java!s.comF
http://java.sun.com/http://www.roseindia.com/http://www.java2s.com/http://www.roseindia.com/http://www.java2s.com/http://java.sun.com/
-
8/19/2019 EMMAN
35/68
&5
S)MPLE SCREEN S-OTS:
-"#e Page:
In this page, the user can their login link to e redirected.
-
8/19/2019 EMMAN
36/68
&8
L"gin Page:
user have to give thier creditals here.
-
8/19/2019 EMMAN
37/68
&>
)!#in -"#e Page:
after logging in, the user can register to staff, admin ased up on their role and
designation.
-
8/19/2019 EMMAN
38/68
&B
)!#in Registrati"n:
admin registration module contains asic user details with password U I* .
-
8/19/2019 EMMAN
39/68
&
Sta88 Registrati"n:
+taff registration module contains asic user details with password U I* which includes
designation.
-
8/19/2019 EMMAN
40/68
-@
Sta88 Pr"8i7e:
-
8/19/2019 EMMAN
41/68
-1
Sta88 L"gin:
+taff login contains username and password with the designation, ased on the designation
the link will redirect with limited control to their specfic department.
-
8/19/2019 EMMAN
42/68
-!
De$art#ent 9ise E#$7"yee L"gin:
4ere the user have to choose the department.
-
8/19/2019 EMMAN
43/68
-&
MC) De$art#ent -"#e Page:
this specific department , the staff = lecturer, 4"*, professor ased on their role
the access is restricted.
-
8/19/2019 EMMAN
44/68
--
St!ent Detai7s in se#ester ise:
semester wise marks and results can e viewed in this module.
-
8/19/2019 EMMAN
45/68
-5
St!ent Mar
-
8/19/2019 EMMAN
46/68
-8
Ran< -"7!er U$7"a!:
Aank holder can e enterd here.
-
8/19/2019 EMMAN
47/68
->
/ie9 Ran< ="7!er:
4ere the user can iew the students makrs.
-
8/19/2019 EMMAN
48/68
-B
Princi$7e -"#e Page:
%rinciple home.
-
8/19/2019 EMMAN
49/68
-
Princi$7e vie9 t=e sta88 !etai7s:
-
8/19/2019 EMMAN
50/68
5@
C"77ege $er8"r#ance in year base!:
performance can e viewed y this format.
-
8/19/2019 EMMAN
51/68
51
De$art#ent 9ise $er8"r#ance:
-
8/19/2019 EMMAN
52/68
5!
Princi$a7 /ie9 Ran< -"7!ers:
-
8/19/2019 EMMAN
53/68
5&
S)MPLE CODIN*:
VWX %age anguageYZ#EZ 0utovent$ireupYZtrueZ #odeileYZcloudconfigu.aspx.csZ
InheritsYZcloudconfiguZ W[
VWX Aegister +rcYZwQadminhome.ascxZ TagNameYZwQadminhomeZ Tag%refixYZuc1Z W[
V\*"#T3% html %D2I# Z=FF$FF*T* C4T/ 1.@ TransitionalFFNZ
Zhttp(FFwww.w&.orgFTAFxhtml1F*T*Fxhtml1=transitional.dtdZ[
Vhtml xmlnsYZhttp(FFwww.w&.orgF1FxhtmlZ [
Vhead runatYZserverZ[
Vtitle[Dntitled %ageVFtitle[
VFhead[
Vody[
Vform idYZform1Z runatYZserverZ[
Vdiv[
Vuc1(wQadminhome I*YZ$Qadminhome1Z runatYZserverZ F[
Vasp(%anel I*YZ%anel1Z runatYZserverZ +tyleYZ'=index( 1@@J left( !>BpxJ position(
asoluteJ
top( 1-BpxZ 4eightYZ-!>pxZ $idthYZ>58pxZ[
UnspJUnspJUnspJVr F[
Vr F[
Vr F[
UnspJ UnspJUnspJ Vasp(ink2utton I*YZink2utton1Z runatYZserverZ %ost2ackDrlYZaddserver.aspxZ
+tyleYZ'=index( 1@@J left( 5@pxJ position( asoluteJ top( !8pxZ
"n#lickYZink2utton1Q#lickZ ont=2oldYZTrueZ ont=+i'eYZ/ediumZ
ore#olorYZ+teel2lueZ[0dd +erverVFasp(ink2utton[
Vr F[
Vr F[
Vr F[
Vr F[
-
8/19/2019 EMMAN
54/68
5-
Vr F[
UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ
UnspJ UnspJ
UnspJUnspJ
Vasp(:rid9iew I*YZ:rid9iew1Z runatYZserverZ +tyleYZ'=index( 1@1J left( -BpxJ
position( asoluteJ
top( 185pxZ $idthYZ&!-pxZ 0uto:enerate#olumnsYZalseZ #ell%addingYZ&Z
"nAow*eletingYZ:rid9iew1QAow*eletingZ 2ack#olorYZ$hiteZ
2order#olorYZE######Z 2order+tyleYZNoneZ 2order$idthYZ1pxZ[
Vooter+tyle 2ack#olorYZ$hiteZ ore#olorYZE@@@@88Z F[
VAow+tyle ore#olorYZE@@@@88Z F[
V#olumns[
Vasp(2oundield *ataieldYZcQnoZ 4eaderTextYZ#QNoZ F[
Vasp(2oundield *ataieldYZcQnameZ 4eaderTextYZ#QNameZ F[
Vasp(2oundield *ataieldYZcQurlZ 4eaderTextYZ#QDAZ F[
Vasp(2oundield *ataieldYZcQtotQconnectionZ 4eaderTextYZTotal #onnectionZ
F[
Vasp(2oundield *ataieldYZcQavlQconnectionZ 4eaderTextYZ0vailale
#onnectionZ F[
Vasp(2oundield *ataieldYZcQstatusZ 4eaderTextYZ+tatusZ F[
Vasp(#ommandield 4eaderTextYZ*eleteZ +how*elete2uttonYZTrueZ F[
Vasp(4yperinkield *ataNavigateDrlieldsYZcQnoZ
*ataNavigateDrlormat+tringYZclouddit.aspxOcQnoY]@^Z
*ataTextieldYZcQnoZ *ataTextormat+tringYZeditZ 4eaderTextYZditZ
TextYZeditZ F[
VF#olumns[
V%ager+tyle 2ack#olorYZ$hiteZ ore#olorYZE@@@@88Z 4ori'ontal0lignYZeftZ F[
V+electedAow+tyle 2ack#olorYZE88Z ont=2oldYZTrueZ
ore#olorYZ$hiteZ F[
V4eader+tyle 2ack#olorYZE@@88Z ont=2oldYZTrueZ ore#olorYZ$hiteZ F[
VFasp(:rid9iew[
Vasp(ael I*YZael1Z runatYZserverZ ont=2oldYZTrueZ ont=+i'eYZargeZ
ore#olorYZ+teel2lueZ
-
8/19/2019 EMMAN
55/68
55
+tyleYZ'=index( 1@&J left( 1>pxJ position( asoluteJ top( 11-pxZ TextYZ#"D*
#"NI:DA0TI"N *T0I+Z
$idthYZ&18pxZ[VFasp(ael[
VFasp(%anel[
VFdiv[
VFform[
VFody[
VFhtml[
"#$ %age &anguage'()*( +utoventWireup'(true( )ode-ile'(clouddit.aspx.cs(
nherits'(clouddit( #/
"#$ 0egister 1rc'(w2adminhome.ascx( 3ag4ame'(w2adminhome( 3ag%re5x'(uc6( #/
"78O)39% html %:;&) (!
-
8/19/2019 EMMAN
56/68
58
"aspA&abel 8'(&abelK( runat'(server( 1tyle'(!indexA 6@CE leftA =6KpxE positionA
absoluteE
topA C=Lpx( 3ext'(&abel( Visible'(-alse( -ont!;old'(3rue( -ont!1ie'(1mall(
-ore)olor'(1teel;lue(/"
-
8/19/2019 EMMAN
57/68
5>
using 1ystem.Web.:.?tml)ontrolsE
using 1ystem.8ata.1l)lientE
using 1ystem.OE
using 1ystem.3ext.0egularxpressionsE
using 1ystem.NlobaliationEusing 1ystem.Windows.-ormsE
public partial class 1tudent2Marks2:pload A 1ystem.Web.:.%age
1l)onnection con ' new 1l)onnectionP$(8ata 1ource'&)O3!%)Enitial
)atalog'1ecure2dataEntegrated 1ecurity'3rue(QE
protected void %age2&oadPobJect sender, vent+rgs eQ
dd6PQE ddCPQE
dd=PQE
R
public void dd6PQ
for Pint i ' 6E i "'=6E iSSQ
8rop8own&ist6.tems.+ddPi.3o1tringPQQE
R
R
public void ddCPQ
8ate3ime-ormatnfo info ' 8ate3ime-ormatnfo.NetnstancePnullQE
for Pint i ' 6E i " 6=E iSSQ
8rop8own&istC.tems.+ddPnew &isttemPinfo.NetMonth4amePiQ, i.3o1tringPQQQE
R
R
public void dd=PQ
int currentyear ' 8ate3ime.4ow.9earE
for Pint i ' 6BF@E i " currentyearE iSSQ
-
8/19/2019 EMMAN
58/68
5B
8rop8own&ist=.tems.+ddPi.3o1tringPQQE
R
R
R protected void &ink;utton62)lickPobJect sender, vent+rgs eQ
0esponse.0edirectP(M)+28ept.aspx(QE
R
protected void ;utton62)lickPobJect sender, vent+rgs eQ
string s ' %ath.Net-ile4ameP-ile:pload6.%osted-ile.-ile4ameQE
&abelL.3ext ' s.3o1tringPQE
&abelL.Visible ' trueE
-ile:pload6.1ave+sP1erver.Map%athP(I
-
8/19/2019 EMMAN
59/68
5
"html xmlns'(httpA
-
8/19/2019 EMMAN
60/68
8@
;order1tyle'(4one( ;orderWidth'(6px( )ell%adding'(=( 1tyle'(!indexA 6@@E leftA
@pxE positionA absoluteE topA =CpxE heightA =@LpxE(
Width'(B@Gpx(/
"0ow1tyle -ore)olor'(*@@@@FF(
-
8/19/2019 EMMAN
61/68
81
positionA absoluteE topA 6=FpxE heightA =DFpxE background!colorA white(/
HnbspE HnbspE HnbspE HnbspE HnbspEHnbspE
"aspAmage;utton 8'(mage;utton6( runat'(server( ?eight'(=DFpx(
mage:rl'(I
-
8/19/2019 EMMAN
62/68
8!
leftA FGpxE positionA absoluteE topA 6BCpx( 3ext'(8epartment(/"
-
8/19/2019 EMMAN
63/68
8&
"aspA 3ext;ox 8'(3ext;ox6( runat'(server( 1tyle'(!indexA 66BE leftA 6DFpxE
positionA absoluteE
topA L@px(/"
-
8/19/2019 EMMAN
64/68
8-
"aspANridView 8'(NridView6( runat'(server( ;ack)olor'(White(
;order)olor'(*))))))(
;order1tyle'(4one( ;orderWidth'(6px( )ell%adding'(=( 1tyle'(!indexA 6@@E leftA
@pxE positionA absoluteE topA B@pxE heightA CCBpxE(
Width'(B@Gpx(/ "0ow1tyle -ore)olor'(*@@@@FF(
-
8/19/2019 EMMAN
65/68
85
8'(8rop8own&istC( runat'(server(
style'(!indexA 6E leftA GCKpxE topA 6FpxE positionA absoluteE widthA 6@@px(/
"
-
8/19/2019 EMMAN
66/68
88
pEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspE
HnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHn
bspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbs
pEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspE
"aspA&abel 8'(&abelC( runat'(server( style'(!indexA 6E leftA =C6pxE topA 6LpxE positionA absoluteE rightA K@Bpx(
3ext'(1elect ;atch(/"
-
8/19/2019 EMMAN
67/68
8>
border!leftA black 6px doubleE widthA 6DFpxE padding!topA 6pxE border!bottomA
black 6px doubleE
positionA absoluteE topA 6=FpxE heightA =DFpxE background!colorA white(/
HnbspE HnbspE HnbspEHnbspE
"aspAmage;utton 8'(mage;utton6( runat'(server( mage:rl'(I
-
8/19/2019 EMMAN
68/68
"aspA&isttem/1emester 6"