Professional Documents
Culture Documents
• Operational Feasibility
• Technical Feasibility
• Economic Feasibility
Operational Feasibility:
Proposed system is beneficial since it turned into
information system analyzing the traffic that will meet the
organizations operating requirements.
IN security, the file is transferred to the destination and the
acknowledgement is given to the server. Bulk of data transfer
is sent without traffic.
Technical Feasibility:
Technical feasibility centers on the existing computer system
(hardware , software, etc..) and to what extent it can support the
proposed addition. For example, if the current computer is
operating at 80% capacity. This involves, additional hardware
(RAM and PROCESSOR) will increase the speed of the process.
Economic Feasibility:
Economic feasibility is the most frequently used
method for evaluating the effectiveness of a candidate system.
More commonly known as cost / benefit analysis, the procedure is
to determine the benefits and saving that are expected from a
candidate and compare them with the costs. If the benefits
outweigh cost. Then the decision is made to design and implement
the system. Otherwise drop the system.
. SYSTEM SPECIFICATION
Processor : Pentium-III
Speed : 1.1GHz
RAM : 512MB
Hard Disk : 40GB
General : KeyBoard, Monitor ,
Mouse
LANGUAGE
DESCRIPTION
4. LANGUAGE DESCRIPTION
Active Server Pages.NET
ASP.NET is a programming framework built on
the common language runtime that can be used
on a server to build powerful Web applications.
ASP.NET offers several important advantages
over previous Web development models:
Language Support
Report Experts
ADO.NET Overview
Connections
Commands
DataReaders
DataSets
The DataSet object is similar to the ADO Recordset
object, but more powerful, and with one other
important distinction: the DataSet is always
disconnected. The DataSet object represents a
cache of data, with database-like structures such as
tables, columns, relationships, and constraints.
However, though a DataSet can and does behave
much like a database, it is important to remember
that DataSet objects do not interact directly with
databases, or other source data. This allows the
developer to work with a programming model that is
always consistent, regardless of where the source
data resides. Data coming from a database, an XML
file, from code, or user input can all be placed into
DataSet objects. Then, as changes are made to the
DataSet they can be tracked and verified before
updating the source data. The GetChanges method
of the DataSet object actually creates a second
DatSet that contains only the changes to the data.
This DataSet is then used by a DataAdapter (or
other objects) to update the original data source.
Database
Relational Database
Client/Server
In a client/server system, the server is a relatively
large computer in a central location that manages a
resource used by many people. When individuals
need to use the resource, they connect over the
network from their computers, or clients, to the
server.
Examples of servers are: In a client/server database
architecture, the database files and DBMS software
reside on a server. A communications component is
provided so applications can run on separate clients
and communicate to the database server over a
network. The SQL Server communication component
also allows communication between an application
running on the server and SQL Server.
Scalability
The same database engine can be used across
platforms ranging from laptop computers running
Microsoft Windows® 95/98 to large, multiprocessor
servers running Microsoft Windows NT®, Enterprise
Edition.
Data warehousing
SQL Server includes tools for extracting and
analyzing summary data for online analytical
processing (OLAP). SQL Server also includes tools for
visually designing databases and analyzing data
using English-based questions.
Databases
A database in Microsoft SQL Server consists of a
collection of tables that contain data, and other
objects, such as views, indexes, stored procedures,
and triggers, defined to support activities performed
with the data. The data stored in a database is
usually related to a particular subject or process,
such as inventory information for a manufacturing
warehouse.
Distributed Processing:
Security/encapsulation.
Distributed databases.
• Physical Layer
• Network Layer
• Transport Layer
• Session Layer
• Presentation Layer
• Application Layer
Physical Layer:
The physical layer coordinates the functions required
to transmit a bit stream over a physical medium. It deals with the
mechanical and electrical specifications of the interface and
transmission medium. It also defines the procedures and functions
that physical devices and interfaces have to perform for
transmission to occur.
Transport Layer:
Presentation Layer:
Application Layer:
The Application layer enables the user, whether human
or software, to access the network. A network virtual terminal is a
software version of a physical terminal and allows a user to log on
to a remote host.
NETWORK MANAGEMENT
Client/Server Architecture
.
.
MODULES :
.
DATA FLOW DIAGRAM :
CLIENT
CLIENT FILE SEND
SOCKET
ROUTER SOCKET
INGRESS PORT
LINE CARD
ROUTE CALC CLASS MASTER LINE CARD
CLASS
ROUTER CLASS
CONTROL CENTRE
CLASS PACKET FORWARD
CLASS
EGRESS PORT
TO CLIENT/TO ROUTER/ADVERTISING
CLIENT MODULE /SOURCE:
Prepare Packet
File send
File Receive
Store
INGRESS PORT
Receive Incoming from
Router/Client
LINE CARD
EGRESS PORT
router
Receive Packet
Egress
router
client
COLLABORATION DIAGRAM:
Update menu used to update the Customer transaction by using
Markov Algorithm…
TESTING
AND
IMPLEMENTATION
6 .TESTING AND IMPLEMENTATION
6.1 TESTING:
TYPE OF TESTING:
The various types of testing are
White Box Testing
Black Box Testing
Alpha Testing
Beta Testing
Win Runner And Load Runner
Load Runner
ALPHA TESTING:
CONCLUSION
8.CONCLUSION:
Conclusion
The RTM is one of the most important components of
a
router. It plays a decisive role for routing
performance and connectivity
of the network. In this article, we presented a novel
distributed architecture model for the RTM for next-
generation
IP routers. The model we propose can exploit
additional com-
■ Figure 6. Performance comparison between the
REFERENCES
[1] “Global Consumer Attitude Towards On-Line
Shopping,”http://www2.acnielsen.com/reports/docum
ents/2005_cc_online
shopping.pdf, Mar. 2007.
[2] D.J. Hand, G. Blunt, M.G. Kelly, and N.M. Adams,
“Data Miningfor Fun and Profit,” Statistical Science,
vol. 15, no. 2, pp. 111-131,2000.
[3] “Statistics for General and On-Line Card Fraud,”
http://www.epaynews.com/statistics/fraud.html, Mar.
2007.
[4] S. Ghosh and D.L. Reilly, “Credit Card Fraud
Detection with aNeural-Network,” Proc. 27th Hawaii
Int’l Conf. System Sciences:Information Systems:
Decision Support and Knowledge-Based Systems,vol.
3, pp. 621-630, 1994.
[5] M. Syeda, Y.Q. Zhang, and Y. Pan, “Parallel
Granular Networksfor Fast Credit Card Fraud
Detection,” Proc. IEEE Int’l Conf. Fuzzy
Systems, pp. 572-577, 2002.
[6] S.J. Stolfo, D.W. Fan, W. Lee, A.L. Prodromidis,
and P.K. Chan,“Credit Card Fraud Detection Using
Meta-Learning: Issues and
Initial Results,” Proc. AAAI Workshop AI Methods in
Fraud and RiskManagement, pp. 83-90, 1997.
[7] S.J. Stolfo, D.W. Fan, W. Lee, A. Prodromidis, and
P.K. Chan,
“Cost-Based Modeling for Fraud and Intrusion
Detection: Results
from the JAM Project,” Proc. DARPA Information
Survivability Conf.
and Exposition, vol. 2, pp. 130-144, 2000.