DYNAMIC PARALLEL ACCESS
Project Work By
Vinodkumar.p.M
Palanivel.V
Guide By
Mr.R.Sivasubramanian, M.S.,
INTRODUCTION
This project is an accelerated service agent to enable users
logged onto a network to access remote files and services.
This project is done in Java.
The concept of this project is to access the shared files in Linux
Environment in Windows Environment.
PROBLEM DEFINITION
The Server machine is installed with Linux and Clients are installed
with Windows operating system.
The files in server machine is put into an distributed directory and
then downloaded into client machines.
The project modules involved are
MemberAdder
Look up
User Admin
Resource Register
Resource Server
File Sender
Resource Prober
Existing System
Though solutions exist for Windows platforms that emulate the
concept of service agents, no reliable cross-platform software
exists similar to the one we have developed.
The available solutions include:
1. Commercial software
2. Free downloads
The few commercial solutions that exist lack the following
requirements:
1. Price factor
2. Too compelling and intricate registration and
maintenance procedures
3. 100 % customized for a single company’ requirements
so that modification to suit alternative requirements
becomes difficult.
4. Security
Drawbacks of Existing System
The Available Software is either prohibitively expensive or doesn’t
satisfactorily possess all the features required.
It is not advisable for corporates to rely on anonymous downloaded
software freely available over the internet, for the risks involved with
respect to the company’s valuable trade secrets and data are
enormous.
Proposed System
In short, the requirements for this undertaking are:
Software that is excellent with respect to performance.
Doesn’t necessitate dependence on expensive commercial
software.
Customized report and registration features.
High security
Reliability and support.
Offers a user-friendly interface.
Fast and easy probing of a network’ services without straining the
network’s resources.
SYSTEM CONFIGURATION
2.1.HARDWARE CONFIGURATION
Processor : Pentium IV
Motherboard : Intel Motherboard
Main Memory : 256 MB
Hard disk : 40 GB
Floppy disk : 1.44 MB
CD-ROM : 54x Max-speed
Monitor : Display type: 15.0’’ color
Keyboard : Multi-media Keyboard
2.1. SOFTWARE CONFIGURATION
Server configuration
Operating System : Linux
Language : Java
Client configuration
Operating System : Windows
Language : Java 2.0
Backend : MySQL
INPUT DESIGN
Capture only validated data.
Restricted user entry.
The main objectives considered during input design are:
Nature of input processing.
Flexibility and thoroughness of validation rules.
Handling of priorities within the input documents.
Screen design to ensure accuracy and efficiency of input relationship with
files.
Careful design of the input also involves attention to error handling,
controls, batching and validation procedures.
OUTPUT DESIGN
The project is provided with a separate GUI tool.
The output is also provide an interface for
registering the files in the network.
The administrator can download the shared files
from the server which is to be stored in the
database.
SYSTEM TESTING
1.This project have three testing
• Unit Testing
• Integration testing
• Validation testing
UNIT TESTING
verification effort on the smallest limit of software design.
important control paths are tested to uncover the errors
within the module.
carried out during the coding itself.
INTEGRATION TESTING
The objective is to take tested modules and build
the program structure that has been dictated by
design.
If a set of errors is encountered correction is
difficult because the isolation of causes is
complicated by vastness of the entire program.
Security checks done are,
1) Login with wrong user id
Display error ‘No such user exist’
2) Provide wrong password
Display error ‘Password incorrect’
3)Other than administrator trying to access user groups
Display error ‘Invalid command or Insufficient Access Level’
4)Provide wrong IP address of server
Display error ‘Server not responding’
5) Provide wrong port number
Display error ‘error sending message login, list’
VALIDATION TESTING
Validation succeeds then the software functions in a
manner that can be reasonably accepted by the user.
Software validation is achieved through a series of black
box tests that demonstrate conformity the requirements.
After validation test has been completed, one of the following two
possible conditions exists:
The function or performance characteristics confirm to specification
and are accepted.
A deviation from specification is uncovered and a deficiency list is
created. Deviation or errors discovered at this step in this project is
corrected prior to the completion of the project is the help of users
by negotiating to establish a method of resolving deficiencies
IMPLEMENTATION
The implementation involves the following
things:
• Careful planning
• Investigation of the system and constraints
• Design the methods to achieve the charge over
• Training the staff in the changed place
DATAFLOW DIAGRAM
Level 0: Name,pwd
User Request Server
User Admin
Response Group
Level 0(1)
Member IP Addr
Admin
Adder
ddr
Lo in
IP A
g
Lookup IP,Files
Server N/W Users
Fetch Files
b er Fname,Key
ro
Tr er s
P
f ile
e
rc
F
ns
ou
a
s
Re
Fname,Key Fname,Key DDS Service
User Register
Resources
SYSTEM DIAGRAM
Nm,pwd,key
User Admin Inva Login
lid
Resource Prober Vali Logout
d
Request
DDS Service Res View Keys
pon
se
Lookup
Downloaded Files
IP
Member Adder
Register
N , Key
F
Register
CONCLUSION
The software is developed with modular approach.
All modules in this project have been tested separately
and put together to form the main system.
The system is tested with real data and everything
worked successfully.
Finally, to conclude ,the software development was
completed and accepted by the management as well as
user staff.
THANK YOU