emman

Upload: jeron

Post on 08-Jul-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/19/2019 EMMAN

    1/68

    1

    1. INTRODUCTION

    India is a developing country, thus it has achieved the good literery level,

    new technologies improved as well. Now a day’s internet plays a vital role in

    the life. The aim of this project is to explore the implantation of authentication

    and security, using aspect oriented design in real world example of a secure data

    segregation.

    This project aims to investigate implementaing security and

    authentication as aspects with in the frame work of the secure data segregation.

    This system will e developed in .Net and aspect as distriuted system. The

     project aims to explore the fields of security and authentication eing

    implemented as aspects. The aim of this project is to explore the implantation of 

    authentication and securtu, using aspect oriented design in the real world

    example of the secure data secure data segregation.

    The initial focus of the project will e into research into current methods

    of authentication and security with the emphasis eing placed on their practical

    applications and methods for their implementation using aspect.

    The second phase of the project is the actual implantation of the

    knowledge gained in the phase one to create secure segregation of data. Initially

    the system will simply e a shell that allows for the data to e segregated in asecure fshion. This complete the system can e improved to cope with a

    selection of many forms of segregation of data securely, this however is a

    territory aim and although not vital to the main project takes the finished system

    from eing simply eing demonstrated to full functional and so usale in real

    world examples.

  • 8/19/2019 EMMAN

    2/68

    !

    1.1 PROJECT DESCRIPTION

    MODULES

    The modules designed for the system are

    1. Privacy Preserving Data Mining:

    2. Distribte! C"#$tati"n:

    %. &re'ent Ite#sets:

    (. Data Segregati"n:

    D)T) SE*RE*)TION MODULES

      1. Privacy Preserving Data Mining:

    "ne, in which the data owner and the data miner are two different

    entities, and another, in which the data is distriuted among several

     parties who aim to jointly perform data mining on the unified corpus of 

    data that they hold. The idea is that. #omputation and communication

    costs versus the numer of transactions the pertured data can e used to

    infer general trends in the data, without revealing original record

    information. In the second setting, the goal is to perform data mining

    while protecting the data records of each of the data owners from the

    other data owners. This is a prolem of secure multiparty computation.

    2. Distribte! C"#$tati"n:

      $e compared the performance of two secure implementations of the

    we executed the unification step using %rotocol.

  • 8/19/2019 EMMAN

    3/68

    &

    Total computation time of the complete protocols. Total message si'e. $e

    ran three experiment sets, where each set tested the dependence of the

    aove measures on a different parameter(

    %. &re'ent Ite# sets:

     If the re)uired output includes all gloally fre)uent item sets, as

    well as the si'es of their supports, then the values can e revealed for all.

    In such a case, those values may e computed using a secure summation

     protocol, the more interesting setting, however, is the one where the

    support si'es are not part of the re)uired output. $e proceed to discuss it.

      (. Secre !ata:

    *ata #enter shall ensure that its employees and contractors remain

    aware of industry standard security practices, and their responsiilities for 

     protecting the +ensitive Information.

    The main idea ehind this implementation is to make data

    migration accessile user interface and file management in a $% front

    end environment to provide one utton of default settings and also for 

    their future reference.

  • 8/19/2019 EMMAN

    4/68

    -

    2. S+STEM STUD+

    2.1 &E)SI,ILIT+ STUD+

    The feasiility of the project is analy'ed in this phase and usiness

     proposal is put forth with a very general plan for the project and some cost

    estimates. *uring system analysis the feasiility study of the proposed system is

    to e carried out. This is to ensure that the proposed system is not a urden to

    the company. or feasiility analysis, some understanding of the major 

    re)uirements for the system is essential.

    Three key considerations involved in the feasiility analysis are

    ♦ #"N"/I#0 0+I2IIT3

    ♦ T#4NI#0 0+I2IIT3

    ♦ +"#I0 0+I2IIT3

    ECONOMIC)L &E)SI,ILIT+

    This study is carried out to check the economic impact that the system

    will have on the organi'ation. The amount of fund that the company can pour into the research and development of the system is limited. The expenditures

    must e justified. Thus the developed system as well within the udget and this

    was achieved ecause most of the technologies used are freely availale. "nly

    the customi'ed products had to e purchased.

    TEC-NIC)L &E)SI,ILIT+

  • 8/19/2019 EMMAN

    5/68

    5

    This study is carried out to check the technical feasiility, that is, the

    technical re)uirements of the system. 0ny system developed must not have a

    high demand on the availale technical resources. This will lead to high

    demands on the availale technical resources. This will lead to high demands

     eing placed on the client. The developed system must have a modest

    re)uirement, as only minimal or null changes are re)uired for implementing this

    system.

    SOCI)L &E)SI,ILIT+

    The aspect of study is to check the level of acceptance of the system y

    the user. This includes the process of training the user to use the system

    efficiently. The user must not feel threatened y the system, instead must accept

    it as a necessity. The level of acceptance y the users solely depends on the

    methods that are employed to educate the user aout the system and to make

    him familiar with it. 4is level of confidence must e raised so that he is also

    ale to make some constructive criticism, which is welcomed, as he is the final

    user of the system.

    2.2 Eisting Syste#

    The existing system is ased on the ast *istriuted /ining 6*/7

    algorithm of #heung et al. It is an unsecured distriuted version of the 0priori

    algorithm. It is ased on asically data with the existence of many largetransaction dataases, the huge amounts of data, the high scalaility of 

    distriuted systems, and the easy partitioning and distriution of a centrali'ed

    dataase.The fre)uent item sets cannot e segregated properly.

    2.% PROPOSED S+STEM

  • 8/19/2019 EMMAN

    6/68

    8

    In this paper, we present the design and implementation of an automated

    resource management system that achieves a good alance etween the two

    goals(

    • "verload avoidance( the capacity of a %/ should e sufficient to satisfy

    the resource needs of all 9/s running on it. "therwise, the %/ is

    overloaded and can lead to degraded performance of its 9/s.

    •  :reen computing( the numer of %/s used should e minimi'ed as long

    as they can still satisfy the needs of all 9/s. Idle %/s can e turned off 

    to save energy.

    )D/)NT)*ES O& PROPOSED S+STEM

    • $e develop a resource allocation system that can avoid overload in the

    system effectively while minimi'ing the numer of servers used.

    • $e introduce the concept of ;scenes< to measure the uneven utili'ation of 

    a server. 2y minimi'ing scenes, we can improve the overall utili'ation of 

    servers in the face of multi=dimensional resource constraints

  • 8/19/2019 EMMAN

    7/68

    >

    %. S+STEM SPECI&IC)TION

    S+STEM RE0UIREMENTS:

    -)RD)RE RE0UIREMENTS

    ? +ystem ( %entium I9 !.- :4'.

    ? 4ard *isk ( -@ :2.

    ? loppy *rive ( 1.-- /.

    ? /onitor ( 15 9:0 #olour.

    ? /ouse ( ogitech.

    Aam ( 51! /.

    SO&T)RE RE0UIREMENTS

  • 8/19/2019 EMMAN

    8/68

    B

    ? "perating system ( = $indows C%, $indows > Dltimate 6&!=it7.

    #oding anguage ( 0sp.Net 6#E7

    ront nd ( 9isual +tudio !@@B F !@1@

    dataase ( +)l +erver !@@B

    (. L)N*U)*E SPECI&IC)TION

    4.1 FEATURES OF. NET

    /icrosoft .NT is a set of /icrosoft software technologies for 

    rapidly uilding and integrating C/ $e services, /icrosoft $indows=ased

    applications, and $e solutions. The .NT ramework is a language=neutral

     platform for writing programs that can easily and securely interoperate. There’s

    no language arrier with .NT( there are numerous languages availale to the

    developer including /anaged #GG, #E, 9isual 2asic and Hava +cript. The .NT

    framework provides the foundation for components to interact seamlessly,

    whether locally or remotely on different platforms. It standardi'es common data

    types and communications protocols so that components created in different

    languages can easily interoperate.

  • 8/19/2019 EMMAN

    9/68

      ;.NT< is also the collective name given to various software

    components uilt upon the .NT platform. These will e oth products 69isual

    +tudio.NT and $indows.NT +erver, for instance7 and services 6like %assport,

    .NT /y +ervices, and so on7.

    T-E .NET &R)MEOR3 

    The .NT ramework has two main parts(

    1. The #ommon anguage Auntime 6#A7.

    !. 0 hierarchical set of class liraries.

    The #A is descried as the ;execution engine< of .NT. It provides the

    environment within which programs run. The most important features are

    ♦ #onversion from a low=level assemler=style language, called

    Intermediate anguage 6I7, into code native to the platform eing

    executed on.

    ♦ /emory management, notaly including garage collection.

    ♦ #hecking and enforcing security restrictions on the running code.

    ♦ oading and executing programs, with version control and other 

    such features.

    ♦ The following features of the .NT framework are also worth

    description(

    M)N)*ED CODE 

    The code that targets .NT, and which contains certain extra

    Information = ;metadata< = to descrie itself. $hilst oth managed and

    unmanaged code can run in the runtime, only managed code contains the

  • 8/19/2019 EMMAN

    10/68

    1@

    information that allows the #A to guarantee, for instance, safe execution and

    interoperaility.

    M)N)*ED D)T) 

    $ith /anaged #ode comes /anaged *ata. #A provides

    memory allocation and *eal location facilities, and garage collection. +ome

    .NT languages use /anaged *ata y default, such as #E, 9isual 2asic.NT

    and H+cript.NT, whereas others, namely #GG, do not. Targeting #A can,

    depending on the language you’re using, impose certain constraints on the

    features availale. 0s with managed and unmanaged code, one can have oth

    managed and unmanaged data in .NT applications = data that doesn’t get

    garage collected ut instead is looked after y unmanaged code.

    COMMON T+PE S+STEM 

    The #A uses something called the #ommon Type +ystem 6#T+7 to

    strictly enforce type=safety. This ensures that all classes are compatile with

    each other, y descriing types in a common way. #T+ define how types work 

    within the runtime, which enales types in one language to interoperate with

    types in another language, including cross=language exception handling. 0s well

    as ensuring that types are only used in appropriate ways, the runtime also

    ensures that code doesn’t attempt to access memory that hasn’t een allocated to

    it.

    COMMON L)N*U)*E SPECI&IC)TION The #A provides uilt=in support for language interoperaility. To

    ensure that you can develop managed code that can e fully used y developers

    using any programming language, a set of language features and rules for using

    them called the #ommon anguage +pecification 6#+7 has een defined.

    #omponents that follow these rules and expose only #+ features are

    considered #+=compliant.

  • 8/19/2019 EMMAN

    11/68

    11

    T-E CL)SS LI,R)R+

    .NT provides a single=rooted hierarchy of classes, containing over 

    >@@@ types. The root of the namespace is called +ystemJ this contains asic

    types like 2yte, *oule, 2oolean, and +tring, as well as "ject. 0ll ojects

    derive from +ystem. "ject. 0s well as ojects, there are value types. 9alue

    types can e allocated on the stack, which can provide useful flexiility. There

    are also efficient means of converting value types to oject types if and when

    necessary.

    The set of classes is pretty comprehensive, providing collections,

    file, screen, and network IF", threading, and so on, as well as C/ and

    dataase connectivity.

    The class lirary is sudivided into a numer of sets 6or 

    namespaces7, each providing distinct areas of functionality, with dependencies

     etween the namespaces kept to a minimum.

    L)N*U)*ES SUPPORTED ,+ .NET

    The multi=language capaility of the .NT ramework and 9isual

    +tudio .NT enales developers to use their existing programming skills to

     uild all types of applications and C/ $e services. The .NT framework supports new versions of /icrosoft’s old favorites 9isual 2asic and #GG 6as

    92.NT and /anaged #GG7, ut there are also a numer of new additions to

    the family.

    9isual 2asic .NT has een updated to include many new and

    improved language features that make it a powerful oject=oriented

     programming language. These features include inheritance, interfaces, and

  • 8/19/2019 EMMAN

    12/68

    1!

    overloading, among others. 9isual 2asic also now supports structured exception

    handling, custom attriutes and also supports multi=threading.

    9isual 2asic .NT is also #+ compliant, which means that any

    #+=compliant language can use the classes, ojects, and components you

    create in 9isual 2asic .NT.

    /anaged xtensions for #GG and attriuted programming are just

    some of the enhancements made to the #GG language. /anaged xtensions

    simplify the task of migrating existing #GG applications to the new .NT

    ramework.

    #E is /icrosoft’s new language. It’s a #=style language that is

    essentially ;#GG for Aapid 0pplication *evelopment

  • 8/19/2019 EMMAN

    13/68

    1&

    ig1 . Net ramework 

      0+%.NT

     C/ $2

    +A9I#+

      $indows

    orms

      2ase #lass iraries

      #ommon anguage Auntime

      "perating +ystem

    #E.NT is also compliant with #+ 6#ommon anguage +pecification7

    and supports structured exception handling. #+ is set of rules and

    constructs that are supported y the #A 6#ommon anguage Auntime7.

    #A is the runtime environment provided y the .NT rameworkJ it

    manages the execution of the code and also makes the development process

    easier y providing services.

    #E.NT is a #+=compliant language. 0ny ojects, classes, or

    components that created in #E.NT can e used in any other #+=compliant

    language. In addition, we can use ojects, classes, and components created in

    other #+=compliant languages in #E.NT .The use of #+ ensures

    complete interoperaility among applications, regardless of the languages

    used to create the application.

    CONSTRUCTORS )ND DESTRUCTORS

      #onstructors are used to initiali'e ojects, whereas destructors are used to

    destroy them. In other words, destructors are used to release the resources

    allocated to the oject. In #E.NT the su finali'e procedure is availale.

    The su finali'e procedure is used to complete the tasks that must e

     performed when an oject is destroyed. The su finali'e procedure is called

  • 8/19/2019 EMMAN

    14/68

    1-

    automatically when an oject is destroyed. In addition, the su finali'e

     procedure can e called only from the class it elongs to or from derived

    classes.

    *)R,)*E COLLECTION

      :arage #ollection is another new feature in #E.NT. The .NT

    ramework monitors allocated resources, such as ojects and variales. In

    addition, the .NT ramework automatically releases memory for reuse y

    destroying ojects that are no longer in use.

    In #E.NT, the garage collector checks for the ojects that are notcurrently in use y applications. $hen the garage collector comes across an

    oject that is marked for garage collection, it releases the memory occupied

     y the oject.

    O/ERLO)DIN*

    "verloading is another feature in #E. "verloading enales us to define

    multiple procedures with the same name, where each procedure has a

    different set of arguments. 2esides using overloading for procedures, we can

    use it for constructors and properties in a class.

    MULTIT-RE)DIN*

    #E.NT also supports multithreading. 0n application that supportsmultithreading can handle multiple tasks simultaneously, we can use

    multithreading to decrease the time taken y an application to respond to

    user interaction.

    STRUCTURED E4CEPTION -)NDLIN*

      #E.NT supports structured handling, which enales us to detect

    and remove errors at runtime. In #E.NT, we need to use TryL#atchL

  • 8/19/2019 EMMAN

    15/68

    15

    inally statements to create exception handlers. Dsing TryL#atchLinally

    statements, we can create roust and effective exception handlers to improve

    the performance of our application.

    T-E .NET &R)MEOR3 

      The .NT ramework is a new computing platform that simplifies

    application development in the highly distriuted environment of the

    Internet.

    O,JECTI/ES O&. NET &R)MEOR3 

    1. To provide a consistent oject=oriented programming environment

    whether oject codes is stored and executed locally on Internet=distriuted,

    or executed remotely.

    !. To provide a code=execution environment to minimi'es software

    deployment and guarantees safe execution of code.

    &. liminates the performance prolems.

    There are different types of application, such as $indows=ased applications

    and $e=ased applications.

    (.% &E)TURES O& S0L5SER/ER 

    The "0% +ervices feature availale in +M +erver version >.@ is

    now called +M +erver !@@@ 0nalysis +ervices. The term "0% +ervices has

     een replaced with the term 0nalysis +ervices. 0nalysis +ervices also includes a

    new data mining component. The Aepository component availale in +M

    +erver version >.@ is now called /icrosoft +M +erver !@@@ /eta *ata

    +ervices. Aeferences to the component now use the term /eta *ata +ervices.

  • 8/19/2019 EMMAN

    16/68

    18

    The term repository is used only in reference to the repository engine within

    /eta *ata +ervices

    +M=+A9A dataase consist of six type of ojects,

    They are,

    1. T02

    !. MDA3

    &. "A/

    -. A%"AT

    5. /0#A"

    T),LE

      0 dataase is a collection of data aout a specific topic.

    /IES O& T),LE

     $e can work with a tale in two types,

    1. *esign 9iew

    !. *atasheet 9iew

    DESI*N /IE

      To uild or modify the structure of a tale we work in the

    tale design view. $e can specify what kind of data will e hold.

    D)T)S-EET /IE

     

    To add, edit or analyses the data itself we work in tales datasheet

    view mode.

  • 8/19/2019 EMMAN

    17/68

    1>

    0UER+

     

    0 )uery is a )uestion that has to e asked the data. 0ccess gathers data

    that answers the )uestion from one or more tale. The data that make up the

    answer is either dynaset 6if you edit it7 or a snapshot 6it cannot e edited7.ach

    time we run )uery, we get latest information in the dynaset. 0ccess either 

    displays the dynaset or snapshot for us to view or perform an action on it, such

    as deleting or updating.

    )J)4  0+%.NT 0jax marks /icrosofts foray into the ever=growing 0jax

    framework market. +imply put, this new environment for uilding $e

    applications puts 0jax at the front and center of the .NT ramework.

    6. S+STEM DESI*N

    INPUT DESI*N

    The input design is the link etween the information system and the user. It

    comprises the developing specification and procedures for data preparation and

    those steps are necessary to put transaction data in to a usale form for 

     processing can e achieved y inspecting the computer to read data from a

  • 8/19/2019 EMMAN

    18/68

    1B

    written or printed document or it can occur y having people keying the data

    directly into the system. The design of input focuses on controlling the amount

    of input re)uired, controlling the errors, avoiding delay, avoiding extra steps and

    keeping the process simple. The input is designed in such a way so that it

     provides security and ease of use with retaining the privacy. Input *esign

    considered the following things(

    $hat data should e given as inputO

     4ow the data should e arranged or codedO

     The dialog to guide the operating personnel in providing input.

    /ethods for preparing input validations and steps to follow when error 

    occur.

    O,JECTI/ES

    1. Input *esign is the process of converting a user=oriented description of 

    the input into a computer=ased system. This design is important to avoid errors

    in the data input process and show the correct direction to the management for 

    getting correct information from the computeri'ed system.

    !. It is achieved y creating user=friendly screens for the data entry to

    handle large volume of data. The goal of designing input is to make data entry

    easier and to e free from errors. The data entry screen is designed in such a

    way that all the data manipulates can e performed. It also provides record

    viewing facilities.

    &. $hen the data is entered it will check for its validity. *ata can e

    entered with the help of screens. 0ppropriate messages are provided as when

    needed so that the user will not e in mai'e of instant. Thus the ojective of 

    input design is to create an input layout that is easy to follow

  • 8/19/2019 EMMAN

    19/68

    1

    OUTPUT DESI*N

    0 )uality output is one, which meets the re)uirements of the end user and

     presents the information clearly. In any system results of processing are

    communicated to the users and to other system through outputs. In output

    design it is determined how the information is to e displaced for immediate

    need and also the hard copy output. It is the most important and direct source

    information to the user. fficient and intelligent output design improves the

    system’s relationship to help user decision=making.

    1. *esigning computer output should proceed in an organi'ed, wellthought out mannerJ the right output must e developed while ensuring that

    each output element is designed so that people will find the system can use

    easily and effectively. $hen analysis design computer output, they should

    Identify the specific output that is needed to meet the re)uirements.

    !. +elect methods for presenting information.

    &. #reate document, report, or other formats that contain information

     produced y the system.

    The output form of an information system should accomplish one or more of the

    following ojectives.

    #onvey information aout past activities, current status or projections of 

    the

    uture.

    +ignal important events, opportunities, prolems, or warnings.

    Trigger an action.

    #onfirm an action.

    6.% D)T),)SE DESI*N:

     

  • 8/19/2019 EMMAN

    20/68

    !@

    The dataase design is a must for any application developed especially

    more for the data store projects. +ince the chatting method involves storing the

    message in the tale and produced to the sender and receiver, proper handling of 

    the tale is a must.

    In the project, login tale is designed to e uni)ue in accepting the

    username and the length of the username and password should e greater than

    'ero.

    In this dataase design the admin details and the user details are stored in

    the dataase. The different users view the data in different format according to

    the privileges given.

    The complete listing of the tales and their fields are provided in the

    annexure under the title PTale +tructure’.

    D)T),)SE DESI*N

     Tab7e Na#e:)!#in

  • 8/19/2019 EMMAN

    21/68

    !1

    Tab7e Na#e: )$$7icati"n

    Tab7e Na#e:C"n8igrati"n

    Tab7e Na#e:C"nnecti"n

    Tab7e Na#e:De$7"y

    6.6 D)T)&LO DI)*R)M

    Data &7"9 Diagra# 8"r )!#in M"!7e:

  • 8/19/2019 EMMAN

    22/68

    !!

    Data 87"9 !iagra# 8"r 7ectrer M"!7e:

  • 8/19/2019 EMMAN

    23/68

    !&

    Data &7"9 !iagra# 8"r Princi$a7 M"!7e:

  • 8/19/2019 EMMAN

    24/68

    !-

    6. D)T) T),LE STRUCTURE:

     LIST O& T),LES DESI*N

  • 8/19/2019 EMMAN

    25/68

    !5

    M;a!#in;registrati"n:

    C"7#n Na#e Data Ty$es )77"9 N77s

     Name N9archar6max7 3es

    :ender N9archar6max7 3es

    0dminQI* N9archar6max7 3es

    %assword N9archar6max7 3es

    /oile No N9archar6max7 3es

    mailQI* N9archar6max7 3es

    0ddress N9archar6max7 3es

    *ate N9archar6max7 3es

    M;a!#in;tab7e:

    C"7#n Na#e Data Ty$e )77"9 N77s

    0dminQname N9archar6max7 3es

    %assword N9archar6max7 yes

    M;ran

  • 8/19/2019 EMMAN

    26/68

    !8

    C"7#n Na#e Data Ty$e )77"9 N77s

     Name N9archar6max7

    Aeg no N9archar6max7

    *o N9archar6max7

    *ept Nchar61@7

    /arks Nchar61@7

    Images N9archar6max7

    M;#ar N9archar6max7 3es

    +uQB N9archar6max7 3es

    Total N9archar6max7 3es

    %ercentage N9archar6max7 3es

    M;sta88;registrati"n:

    C"7#n Na#e Data Ty$e )77"9 n77

     Name N9archar6max7 3es

    :ender N9archar6max7 3es

    *o N9archar6max7 3es

  • 8/19/2019 EMMAN

    27/68

    !>

    Dser id N9archar6max7 3es

    %assword N9archar6max7 3es

    /oile numer N9archar6max7 3es

    mailQid N9archar6max7 3es

    0ddress N9archar6max7 3es

    *ate N9archar6max7 3es

    Aole N9archar6max7 3es

    mpQid N9archar6max7 3es

    *ept N9archar6max7 3es

  • 8/19/2019 EMMAN

    28/68

    !B

    . S+STEM TESTIN*

    The purpose of testing is to discover errors. Testing is the process of 

    trying to discover every conceivale fault or weakness in a work product. It

     provides a way to check the functionality of components, su=assemlies,

    assemlies andFor a finished product It is the process of exercising software

    with the intent of ensuring that the +oftware system meets its re)uirements and

    user expectations and does not fail in an unacceptale manner. There are various

    types of test. ach test type addresses a specific testing re)uirement.

    .1 UNIT TESTIN*

    Dnit testing involves the design of test cases that validate that the internal

     program logic is functioning properly, and that program inputs produce valid

    outputs. 0ll decision ranches and internal code flow should e validated. It is

    the testing of individual software units of the application .it is done after the

    completion of an individual unit efore integration. This is a structural testing,

    that relies on knowledge of its construction and is invasive. Dnit tests perform

     asic tests at component level and test a specific usiness process, application,

    andFor system configuration. Dnit tests ensure that each uni)ue path of a

     usiness process performs accurately to the documented specifications and

    contains clearly defined inputs and expected results.

    .2 INTE*R)TION TESTIN*

    Integration tests are designed to test integrated software components to

    determine if they actually run as one program. Testing is event driven and is

    more concerned with the asic outcome of screens or fields. Integration tests

    demonstrate that although the components were individually satisfaction, as

    shown y successfully unit testing, the comination of components is correct

  • 8/19/2019 EMMAN

    29/68

    !

    and consistent. Integration testing is specifically aimed at exposing the

     prolems that arise from the comination of components

    .% &UNCTION)L TEST

      unctional tests provide systematic demonstrations that functions tested

    are availale as specified y the usiness and technical re)uirements, system

    documentation, and user manuals.

    unctional testing is centered on the following items(

    9alid Input ( identified classes of valid input must e accepted.

    Invalid Input ( identified classes of invalid input must e rejected.

    unctions ( identified functions must e exercised.

    "utput ( identified classes of application outputs must e

    exercised.

    +ystemsF%rocedures ( interfacing systems or procedures must e invoked.

    "rgani'ation and preparation of functional tests is focused on

    re)uirements, key functions, or special test cases. In addition, systematic

    coverage pertaining to identify 2usiness process flowsJ data fields, predefined

     processes, and successive processes must e considered for testing. 2efore

    functional testing is complete, additional tests are identified and the effective

    value of current tests is determined.

    .( -ITE ,O4 TESTIN*

      $hite 2ox Testing is a testing in which in which the software tester has

    knowledge of the inner workings, structure and language of the software, or at

    least its purpose. It is purpose. It is used to test areas that cannot e reached

    from a lack ox level.

  • 8/19/2019 EMMAN

    30/68

    &@

    .6 ,L)C3 ,O4 TESTIN*

      2lack 2ox Testing is testing the software without any knowledge of the

    inner workings, structure or language of the module eing tested. 2lack ox

    tests, as most other kinds of tests, must e written from a definitive source

    document, such as specification or re)uirements document, such as

    specification or re)uirements document. It is a testing in which the software

    under test is treated, as a lack ox .you cannot ;see< into it. The test provides

    inputs and responds to outputs without considering how the software works.

    . )CCEPT)NCE TESTIN*

    Dser 0cceptance Testing is a critical phase of any project and re)uires

    significant participation y the end user. It also ensures that the system meets

    the functional re)uirements.

  • 8/19/2019 EMMAN

    31/68

    &1

    > .S+STEM IMPLEMENT)TION

    Implementation is the stage of the project when the theoretical design is

    turned out into a working system. Thus it can e considered to e the most

    critical stage in achieving a successful new system and in giving the user,

    confidence that the new system will work and e effective.

    The implementation stage involves careful planning, investigation of the

    existing system and it’s constraints on implementation, designing of methods to

    achieve changeover and evaluation of changeover methods.

    >.1 &UTURE EN-)NCEMENT

    The %roject ;Secre Data Segregati"n?  in current developed using

    0+%.NT, it can e future enhance to 0H0C, T4 +3+T/ !.@ for The system

    site development. #urrently it is implemented for single ranch and it can e

    future enhanced for other ranch too in future.

    To our est knowledge the method what The system presented is new ut

    still The system The system using the classical tools of software engineering.

    The only modifications The system do are using the super=characteristics for 

     uilding the software )uality model. 2y using this model The system can ring

    good )uality software. /odel and the proposed solutions and opportunities of 

    improving software )uality models.

    0 )uality is an ojective value dependent on sets of software attriutes

    and customer’s re)uirements. 2y applying the tools the )uality of the software

    can e ale to identify the software type. 0nd ale to find the reusaility of a

    software and understandaility.

  • 8/19/2019 EMMAN

    32/68

    &!

    @. CONCLUSION

    We have presented the design, implementation, and

    evaluation of a resource management system for cloud

    computing services. Our system multiplexes virtual to physical

    resources adaptively based on the changing demand. We use

    the skewness metric to combine VMs with dierent resource

    characteristics appropriately so that the capacities of servers

    are well utilied. Our algorithm achieves both overloadavoidance and green computing for systems with multi!

    resource constraints.

  • 8/19/2019 EMMAN

    33/68

    &&

      A. ,I,LIO*R)P-+

    :ood Teachers are worth more than thousand ooks, we have them in "ur

    *epartment

    R1S /. 0rmrust et al., ;0ove the clouds( 0 erkeley view of cloud

    computing,< Dniversity of #alifornia, 2erkeley, Tech. Aep., e !@@.

    R!S . +iegele, ;et it rise( 0 special report on corporate IT,< in The Economist ,

    "ct. !@@B.

    R&S %. 2arham, 2. *ragovic, K. raser, +. 4and, T. 4arris, 0. 4o,A. Neugeauer,

    I. %ratt, and 0. $arfield, ;Cen and the art of virtuali'ation,< in  Proc. of the

     ACM Symposium on Operating Systems Principles (SOSP’03, "ct. !@@&.

    R-S ;0ma'on elastic compute cloud 60ma'on

    #!7,http(FFaws.ama'on.comFec!F.<

    R5S #. #lark, K. raser, +. 4and, H. :. 4ansen, . Hul, #. impach,I. %ratt, and

    0. $arfield, ;ive migration of virtual machines,< in  Proc. of the Symposium

    on !et"or#e$ Systems %esign an$ &mplementation (!S%&’0', /ay !@@5.

    R8S /. Nelson, 2.=4. im, and :. 4utchins, ;ast transparent migration for 

    virtual machines,< in Proc. of the SE!&) Annual Technical Conference, !@@5.

    R>S /. /cNett, *. :upta, 0. 9ahdat, and :. /. 9oelker, ;Dsher( 0n extensile

    framework for managing clusters of virtual machines,< in  Proc. of the *arge

     &nstallation System A$ministration Conference (*&SA’0+, Nov. !@@>.

  • 8/19/2019 EMMAN

    34/68

    &-

    RBS T. $ood, %. +henoy, 0. 9enkataramani, and /. 3ousif, ;2lack=ox and gray=

     ox strategies for virtual machine migration,< in  Proc. Of   the Symposium on

     !et"or#e$ Systems %esign an$ &mplementation (!S%&’0+, 0pr. !@@>.

    RS #. 0. $aldspurger, ;/emory resource management in 9/ware +C

    server,< in  Proc. of the symposium on Operating systems $esign an$ 

    implementation (OS%&’0,, 0ug. !@@!.

    R1@S :. #hen, 4. $eno, H. iu, +. Nath, . Aigas, . Ciao, and . hao,

    ;nergy=aware server provisioning and load dispatching for connection=

    intensive internet services,< in Proc. of the SE!&) Symposium on !et"or#e$ 

    Systems %esign an$ &mplementation

    (!S%&’0-, 0pr. !@@B.

    RE&ERENCES:

    Sites Re8erre!:

    http(FFjava.sun.com

    http(FFwww.roseindia.comF

    http(FFwww.java!s.comF

    http://java.sun.com/http://www.roseindia.com/http://www.java2s.com/http://www.roseindia.com/http://www.java2s.com/http://java.sun.com/

  • 8/19/2019 EMMAN

    35/68

    &5

    S)MPLE SCREEN S-OTS:

    -"#e Page:

    In this page, the user can their login link to e redirected.

  • 8/19/2019 EMMAN

    36/68

    &8

    L"gin Page:

    user have to give thier creditals here.

  • 8/19/2019 EMMAN

    37/68

    &>

    )!#in -"#e Page:

    after logging in, the user can register to staff, admin ased up on their role and

    designation.

  • 8/19/2019 EMMAN

    38/68

    &B

    )!#in Registrati"n:

    admin registration module contains asic user details with password U I* .

  • 8/19/2019 EMMAN

    39/68

    &

    Sta88 Registrati"n:

    +taff registration module contains asic user details with password U I* which includes

    designation.

  • 8/19/2019 EMMAN

    40/68

    -@

    Sta88 Pr"8i7e:

  • 8/19/2019 EMMAN

    41/68

    -1

    Sta88 L"gin:

    +taff login contains username and password with the designation, ased on the designation

    the link will redirect with limited control to their specfic department.

  • 8/19/2019 EMMAN

    42/68

    -!

    De$art#ent 9ise E#$7"yee L"gin:

    4ere the user have to choose the department.

  • 8/19/2019 EMMAN

    43/68

    -&

    MC) De$art#ent -"#e Page:

    this specific department , the staff = lecturer, 4"*, professor ased on their role

    the access is restricted.

  • 8/19/2019 EMMAN

    44/68

    --

    St!ent Detai7s in se#ester ise:

    semester wise marks and results can e viewed in this module.

  • 8/19/2019 EMMAN

    45/68

    -5

    St!ent Mar

  • 8/19/2019 EMMAN

    46/68

    -8

    Ran< -"7!er U$7"a!:

    Aank holder can e enterd here.

  • 8/19/2019 EMMAN

    47/68

    ->

    /ie9 Ran< ="7!er:

    4ere the user can iew the students makrs.

  • 8/19/2019 EMMAN

    48/68

    -B

    Princi$7e -"#e Page:

    %rinciple home.

  • 8/19/2019 EMMAN

    49/68

    -

    Princi$7e vie9 t=e sta88 !etai7s:

  • 8/19/2019 EMMAN

    50/68

    5@

    C"77ege $er8"r#ance in year base!:

     performance can e viewed y this format.

  • 8/19/2019 EMMAN

    51/68

    51

    De$art#ent 9ise $er8"r#ance:

  • 8/19/2019 EMMAN

    52/68

    5!

    Princi$a7 /ie9 Ran< -"7!ers:

  • 8/19/2019 EMMAN

    53/68

    5&

    S)MPLE CODIN*:

    VWX %age anguageYZ#EZ 0utovent$ireupYZtrueZ #odeileYZcloudconfigu.aspx.csZ

    InheritsYZcloudconfiguZ W[

    VWX Aegister +rcYZwQadminhome.ascxZ TagNameYZwQadminhomeZ Tag%refixYZuc1Z W[

    V\*"#T3% html %D2I# Z=FF$FF*T* C4T/ 1.@ TransitionalFFNZ

    Zhttp(FFwww.w&.orgFTAFxhtml1F*T*Fxhtml1=transitional.dtdZ[

    Vhtml xmlnsYZhttp(FFwww.w&.orgF1FxhtmlZ [

    Vhead runatYZserverZ[

      Vtitle[Dntitled %ageVFtitle[

    VFhead[

    Vody[

      Vform idYZform1Z runatYZserverZ[

      Vdiv[

      Vuc1(wQadminhome I*YZ$Qadminhome1Z runatYZserverZ F[

      Vasp(%anel I*YZ%anel1Z runatYZserverZ +tyleYZ'=index( 1@@J left( !>BpxJ position(

    asoluteJ

      top( 1-BpxZ 4eightYZ-!>pxZ $idthYZ>58pxZ[

      UnspJUnspJUnspJVr F[

      Vr F[

      Vr F[

      UnspJ UnspJUnspJ  Vasp(ink2utton I*YZink2utton1Z runatYZserverZ %ost2ackDrlYZaddserver.aspxZ

      +tyleYZ'=index( 1@@J left( 5@pxJ position( asoluteJ top( !8pxZ

    "n#lickYZink2utton1Q#lickZ ont=2oldYZTrueZ ont=+i'eYZ/ediumZ

    ore#olorYZ+teel2lueZ[0dd +erverVFasp(ink2utton[

      Vr F[

      Vr F[

      Vr F[

      Vr F[

  • 8/19/2019 EMMAN

    54/68

    5-

      Vr F[

      UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ UnspJ

    UnspJ UnspJ

      UnspJUnspJ

      Vasp(:rid9iew I*YZ:rid9iew1Z runatYZserverZ +tyleYZ'=index( 1@1J left( -BpxJ

     position( asoluteJ

      top( 185pxZ $idthYZ&!-pxZ 0uto:enerate#olumnsYZalseZ #ell%addingYZ&Z

    "nAow*eletingYZ:rid9iew1QAow*eletingZ 2ack#olorYZ$hiteZ

    2order#olorYZE######Z 2order+tyleYZNoneZ 2order$idthYZ1pxZ[

      Vooter+tyle 2ack#olorYZ$hiteZ ore#olorYZE@@@@88Z F[

      VAow+tyle ore#olorYZE@@@@88Z F[

      V#olumns[

      Vasp(2oundield *ataieldYZcQnoZ 4eaderTextYZ#QNoZ F[

      Vasp(2oundield *ataieldYZcQnameZ 4eaderTextYZ#QNameZ F[

      Vasp(2oundield *ataieldYZcQurlZ 4eaderTextYZ#QDAZ F[

      Vasp(2oundield *ataieldYZcQtotQconnectionZ 4eaderTextYZTotal #onnectionZ

    F[

      Vasp(2oundield *ataieldYZcQavlQconnectionZ 4eaderTextYZ0vailale

    #onnectionZ F[

      Vasp(2oundield *ataieldYZcQstatusZ 4eaderTextYZ+tatusZ F[

      Vasp(#ommandield 4eaderTextYZ*eleteZ +how*elete2uttonYZTrueZ F[

      Vasp(4yperinkield *ataNavigateDrlieldsYZcQnoZ

    *ataNavigateDrlormat+tringYZclouddit.aspxOcQnoY]@^Z

      *ataTextieldYZcQnoZ *ataTextormat+tringYZeditZ 4eaderTextYZditZ

    TextYZeditZ F[

      VF#olumns[

      V%ager+tyle 2ack#olorYZ$hiteZ ore#olorYZE@@@@88Z 4ori'ontal0lignYZeftZ F[

      V+electedAow+tyle 2ack#olorYZE88Z ont=2oldYZTrueZ

    ore#olorYZ$hiteZ F[

      V4eader+tyle 2ack#olorYZE@@88Z ont=2oldYZTrueZ ore#olorYZ$hiteZ F[

      VFasp(:rid9iew[

      Vasp(ael I*YZael1Z runatYZserverZ ont=2oldYZTrueZ ont=+i'eYZargeZ

    ore#olorYZ+teel2lueZ

  • 8/19/2019 EMMAN

    55/68

    55

      +tyleYZ'=index( 1@&J left( 1>pxJ position( asoluteJ top( 11-pxZ TextYZ#"D*

    #"NI:DA0TI"N *T0I+Z

      $idthYZ&18pxZ[VFasp(ael[

      VFasp(%anel[

      VFdiv[

      VFform[

    VFody[

    VFhtml[

    "#$ %age &anguage'()*( +utoventWireup'(true( )ode-ile'(clouddit.aspx.cs( 

    nherits'(clouddit( #/

    "#$ 0egister 1rc'(w2adminhome.ascx(  3ag4ame'(w2adminhome(  3ag%re5x'(uc6( #/

    "78O)39% html %:;&) (!

  • 8/19/2019 EMMAN

    56/68

    58

      "aspA&abel 8'(&abelK( runat'(server( 1tyle'(!indexA 6@CE leftA =6KpxE positionA

    absoluteE

      topA C=Lpx(  3ext'(&abel( Visible'(-alse( -ont!;old'(3rue( -ont!1ie'(1mall( 

    -ore)olor'(1teel;lue(/"

  • 8/19/2019 EMMAN

    57/68

    5>

    using 1ystem.Web.:.?tml)ontrolsE

    using 1ystem.8ata.1l)lientE

    using 1ystem.OE

    using 1ystem.3ext.0egularxpressionsE

    using 1ystem.NlobaliationEusing 1ystem.Windows.-ormsE

    public partial class 1tudent2Marks2:pload A 1ystem.Web.:.%age

      1l)onnection con ' new 1l)onnectionP$(8ata 1ource'&)O3!%)Enitial

    )atalog'1ecure2dataEntegrated 1ecurity'3rue(QE

      protected void %age2&oadPobJect sender, vent+rgs eQ

     

      dd6PQE  ddCPQE

      dd=PQE

      R

      public void dd6PQ

     

     

    for Pint i ' 6E i "'=6E iSSQ

     

      8rop8own&ist6.tems.+ddPi.3o1tringPQQE

      R

      R

      public void ddCPQ

     

     

    8ate3ime-ormatnfo info ' 8ate3ime-ormatnfo.NetnstancePnullQE

      for Pint i ' 6E i " 6=E iSSQ

     

      8rop8own&istC.tems.+ddPnew &isttemPinfo.NetMonth4amePiQ, i.3o1tringPQQQE

      R

      R

      public void dd=PQ

     

      int currentyear ' 8ate3ime.4ow.9earE

     

      for Pint i ' 6BF@E i " currentyearE iSSQ

  • 8/19/2019 EMMAN

    58/68

    5B

     

      8rop8own&ist=.tems.+ddPi.3o1tringPQQE

      R

      R

      R  protected void &ink;utton62)lickPobJect sender, vent+rgs eQ

     

      0esponse.0edirectP(M)+28ept.aspx(QE

      R

      protected void ;utton62)lickPobJect sender, vent+rgs eQ

     

      string s ' %ath.Net-ile4ameP-ile:pload6.%osted-ile.-ile4ameQE

      &abelL.3ext ' s.3o1tringPQE

      &abelL.Visible ' trueE

      -ile:pload6.1ave+sP1erver.Map%athP(I

  • 8/19/2019 EMMAN

    59/68

    5

    "html xmlns'(httpA

  • 8/19/2019 EMMAN

    60/68

    8@

      ;order1tyle'(4one( ;orderWidth'(6px( )ell%adding'(=( 1tyle'(!indexA 6@@E leftA

    @pxE positionA absoluteE topA =CpxE heightA =@LpxE(

      Width'(B@Gpx(/

      "0ow1tyle -ore)olor'(*@@@@FF( 

  • 8/19/2019 EMMAN

    61/68

    81

      positionA absoluteE topA 6=FpxE heightA =DFpxE background!colorA white(/

      HnbspE HnbspE HnbspE HnbspE HnbspEHnbspE

      "aspAmage;utton 8'(mage;utton6( runat'(server( ?eight'(=DFpx( 

    mage:rl'(I

  • 8/19/2019 EMMAN

    62/68

    8!

      leftA FGpxE positionA absoluteE topA 6BCpx(  3ext'(8epartment(/"

  • 8/19/2019 EMMAN

    63/68

    8&

      "aspA 3ext;ox 8'(3ext;ox6( runat'(server( 1tyle'(!indexA 66BE leftA 6DFpxE

    positionA absoluteE

      topA L@px(/"

  • 8/19/2019 EMMAN

    64/68

    8-

      "aspANridView 8'(NridView6( runat'(server( ;ack)olor'(White( 

    ;order)olor'(*))))))(

      ;order1tyle'(4one( ;orderWidth'(6px( )ell%adding'(=( 1tyle'(!indexA 6@@E leftA

    @pxE positionA absoluteE topA B@pxE heightA CCBpxE(

      Width'(B@Gpx(/  "0ow1tyle -ore)olor'(*@@@@FF( 

  • 8/19/2019 EMMAN

    65/68

    85

      8'(8rop8own&istC( runat'(server( 

    style'(!indexA 6E leftA GCKpxE topA 6FpxE positionA absoluteE widthA 6@@px(/

      "

  • 8/19/2019 EMMAN

    66/68

    88

    pEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspE

    HnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHn

    bspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbs

    pEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspEHnbspE

      "aspA&abel 8'(&abelC( runat'(server( style'(!indexA 6E leftA =C6pxE topA 6LpxE positionA absoluteE rightA K@Bpx( 

     3ext'(1elect ;atch(/"

  • 8/19/2019 EMMAN

    67/68

    8>

      border!leftA black 6px doubleE widthA 6DFpxE padding!topA 6pxE border!bottomA

    black 6px doubleE

      positionA absoluteE topA 6=FpxE heightA =DFpxE background!colorA white(/

      HnbspE HnbspE HnbspEHnbspE

      "aspAmage;utton 8'(mage;utton6( runat'(server( mage:rl'(I

  • 8/19/2019 EMMAN

    68/68

      "aspA&isttem/1emester 6"