.

Friday, March 29, 2019

The Computer Resource Management System

The calculating machine vision guidance organisationA Computer imagery Management strategy is used to get up to date study of only(prenominal) the data processor imaginations in an agreement. It is basic solelyy a cont leftoverment and instructive arrangement. This strategy helps the organization to overcome the complexness in tracing disclose either the data processor resources of the organization by devoteing customised reports, in that respect by helps in impressive and timely utilization of computer hardw be and softw be organisation resources.Computer preference Management trunk uses the try umberBeans Version 1.1 its the comp anent model for the first step applications. attempt JavaBeans combines host-side components with distri merelyed object technologies such as Java RMI to greatly alter the task of application exploitation. The EJB automatically takes into account m either of the requirements of logical argument organisations security, res ource pooling, persistence, concurrency and consummational integrity.One of deep browns most important features is platform independence. Since it was released, Java has been marketed as release once, run anyw here. Enterprise JavaBeans is non only platform in mutually beneficial -its in addition implementation in subordinate. Its like JDBC API runs on a Windows machine or on a Unix machine, it can access any vendors relational database that has a JDBC driver. Ideally, an Enterprise JavaBeans component, an enterprise bean, can run in any application server that implements the Enterprise JavaBeans (EJB) specification. That is we can sustain and deploy EJB lineage trunk in one server, such as BEAs Web logic and later bear on it to a different EJB server, such as IBMs Web Sphere or Gemstone/J. Implementation independence means that business components argon non dependent on the brand of server.Computer Resource Management carcass uses Oracle 8i as the back-end RDBMS. Oracle 8i is actually a fully cyberspace supported database strategy. Oracle 8i perfectly handles the ACID Transactions. A transaction is the deed of a unit-of-work that accesses one or more than shared resources, usually databases. A unit-of-work is a set of activities that relate to each other and must be completed together. The ACID properties are nonhing but (Atomic Consistent detached Durable) propertiesA transaction to be atomic, it must execute completely or non at all. physical structure refers to the integrity of the underlying data store, trunk is ensured by seeing that a transaction is atomic, isolated and durable. Isolated refers to allowing a transaction to execute without hoo-ha from other processes or transactions, i.e., the data that a transaction accesses cannot be bear on by any other ingredient of the system until the transaction or unit-of work is completed. Durability means that all the data shifts made during the family of a transaction must be written to some attribute of physical storage before the transaction is successfully completed. This ensures that the changes are not lost if the system crashes. A cleave from use the ACID properties Oracle 8i has higher(prenominal) security take aim and web compatibility features.2. Problems of afford clayAs of now the resource management in well-heeled PRO SYSTEMS LTD is done manual of armsly. If an employee intends to know the entropy regarding the resources pertaining to computers or components and their yield and undefiled data in the organization, as of now it is being done manually which consumes a great manpower and the process is time consuming. The problem of maintaining the good deal database can be solved by atomizing the resources in the organization, which can be of great help to all the administrators, employee and the management members.Some of the frequent occurring problems in the present manual system are as follows determination the latest status or position of a component in the organization is a time-consuming process.The bus has to wait for the manual reports from the development plane section to know the modern status of the resources.In the present system there is no security for the details of the resources as any drug substance abuser who is not authenticated to view the records may see them.To view the details of a computer and to know what are the components that are assigned to it, can be done only by a manual checking of that computer for the hardware and software system components is a tedious process.The users of the organization require heterogeneous(a) reports to be generated in an easy format, which is not so easy when done manually.The Manager may get problems in finding out a user details in hundreds of records.2.1 Need For ComputerizationMaintaining the information regarding all employees, components and computers at single or multiple locations erupt rise to many problems likeDifficulty in retrieval of data in desired manner.Checking the remarkableness wherever it is take.Availability of information in this manner is subjected to damage.Providing security is in any case unvoiced.One way to overcome all these difficulties is to store all the information in the computer. The computerization helps the users a lot. The user can get information in desired manner. Data retrieval is similarly easy and fast. This as well restricts the users to enter invalid data and reduces the burden on the user.2.2 Benefits of ComputerisationA computer establish information system is usually needed for the following purposes. great Processing SpeedUsing computers inherent ability to calculate, sort recover data with greater speed than that of the human doing and can get results in less time. Visual Basic guaranties for the faster query processing consequently we are satisfied with Visual Basic itself supporting in this direction. get out Accuracy and Improved ConsistencyThe computer carries out comp uting locomote including arithmetic accurately and consistently from which really human is escaped which yields more fatigue and boreom.Cost ReductionUsing computerization we can do the unavoidable operations with lower cost than any other methods. because by computerization we can reduce the cost drastically.3. Modules of CRMSOf course there are many other systems which can maintain all the resources of the troupe, but there are some defects and difficulties in those systems regarding security and HR dependent issues. The Computer Resource Management ashes mainly consists of 6 modules and a brief explanation of those is apt(p) below. (Overview of Metadata Annotations and EJB 3.0 Bean Files, 2009)1 ComponentsEach and all(prenominal) component that is either related to software or hardware impart be assigned with a unique number and entered in to a folder or ledge. Whatever goes out exit be deducted from the shelf and must be entered either to bin, re steering wheel bin or t o a computer. For e actually(prenominal) component appropriate entry should be made.2 ComputersComputers willing be assembled using the shelf parts. Every computer should be given a unique number. The details of the computer will be entered including its hardware and software profiles with their parts. The computers may be servers, standalones and clients etc.3 BinThe dishonored components, which are not repairable or replaceable, will be sent to this bin.4 Recycle BinThe repairable and replaceable parts will be kept here. A time report is given like when a part is submitted for repairs or replacement and expected back time and able to give warnings of delays etc.5 StatusThe status gives the statistics of the shelf, bin, recycle bin, computers. The status gives the present position of the component where it is situated in the organization. Basing on the status the components are used in different transactions.6. Search / ViewThe users can pursuit or view the information of diff erent resources based on their unique number given to them.The proposed system will be designed by using Java beans as front end and Oracle 8i as RDBMS of the system that is oracle as back end of the system. Hyper text mark-up manner of speaking is used to hyper text the information which can be moved from one platform to other, and JDBC concepts will be used.4. Analysis of the ProjectSystem cookery is one of the important items to be considered before actually beginning the watch. think is performed on the issues like defining Life Cycle Model and an organisational structure reckon, configuration management, quality and validation activities.In the process of the System Planning various phase-dependent tools, techniques and notations are indomitable. Preliminary cost estimates for the system development and preliminary development schedules are established. Preliminary estimates of the computing resources required to drop dead and maintain the system are developed, glossary of terms are assembled.4.1 information GatheringInformation relevant to the Computer Resource Management System of Laila Infotech is collected from the Laila Infotech Limited and the finance department of the participation. The information regarding company activities is self-possessed from the companys website www.lailainfotech.com.4.2 feasibleness StudyAn initial investigation culminates in a marriage offer that determines whether an alternative system is executable than the present prognosis system. To do feasible study we have to do Economic, Technical, Behavioural feasible studies.4.2.1 Economic FeasibilityIt is the most frequently used method for evaluating the effectiveness of a system. It is also called as cost/benefit analysis.In this forcing out Computer Resource Management System, for the development of the candidate system the costs that have to sink is the computer resources like the required software and hardware that supports the software in an effective and efficient manner and the money to be paid to the developers. As the company itself is a development centre all the resources are in the company itself and no extra cost are spent for Computer Resource Management System. thereof our candidate system production is economically feasible.4.2.2 Technical FeasibilityTechnical feasibility centres on the existing computer system (software/hardware) configuration and good software facilities in such a way that any new candidate system can be implemented without a large alteration of the lab nut with slight modification of the existing system. Hence our candidate system production is technically feasible.4.2.3 Behavioural FeasibilityPeople are inherently resistant to change. Our candidate system is developed in such a way that it is very user friendly, easy to learn how to work with and there is also not much resistant to this package from the staff side also. As the company is basically a development centre it will be very easy for the emp loyees of the company to learn about the developed candidate system. Hence our candidate system production is behaviourally feasible.5. ConclusionThis project aimed at evolution a Computer Resource Management System (CRMS) is a nitty-gritty management and informative system, where up-to date information of all the computer resources in the company can be provided. It helps the companies to overcome the difficulties in tracking the resources of the company by presenting customized reports, which helps the company to effectively and timely utilise hardware and software resources. informantsDavid Austin., (2000), Using Oracle8, Eastern Economic Edition, 2000 Edition.Overview of Metadata Annotations and EJB 3.0 Bean Files, Retrieved march 15, 2009 from http//e-docs.bea.com/wls/docs100/ejb30/program.htmltypical_stepsPatrick Naughton., and Herbert Schildt., (1999),The Complete Reference Java 2, TATA McGRAW-HILL., 1999 Edition.Pressman, R., S., Software Engineering A Practitioners Approac h, seventh edition, Retrieved 06 march, 2009 from http//www.rspa.com/spi/Roman, Ed.,(1999), Mastering Enterprise Java Beans and the Java 2 Platform, Enterprise Edition, WILEY., 1999 Edition.Tom Valesky., (2000), Enterprise JavaBeans, Pearson tuition Asia, 2000 Edition.Project proposal1. IntroductionA Computer Resource Management System (CRMS) is used to get up to date information of all the computer resources in an organization. It is basically a management and informative system. This system helps the organization to overcome the complexity in tracing out all the computer resources of the organization by presenting customised reports, there by helps in effective and timely utilization of hardware and software resources.A transaction to be atomic, it must execute completely or not at all. Consistency refers to the integrity of the underlying data store, consistency is ensured by seeing that a transaction is atomic, isolated and durable. Isolated refers to allowing a transaction to execute without interference from other processes or transactions, i.e., the data that a transaction accesses cannot be affected by any other part of the system until the transaction or unit-of work is completed. Durability means that all the data changes made during the course of a transaction must be written to some type of physical storage before the transaction is successfully completed. This ensures that the changes are not lost if the system crashes. Apart from handling the ACID properties Oracle 8i has higher security level and web compatibility features.2. Background of the projectThe purpose of proposed system is to provide a computer based system which can manage total resources of an organization. In previous systems the resource management was done manually, which wastes so much of time and the man power. The most important thing is the wishing of security in previous resource management system. The atomized management system is efficient enough to maintain the resource s. The development of the proposed system is needed for so many reasons such as security aspects, ease of use for the employees of organization. The disadvantages of the write up based or existing system can be ascertain by implementing the proposed system.The disadvantages of paper based system are mentioned belowFinding the information about a component in the system is difficult and time taking course of action.In the existing system any user, who is not authenticated can also view the information and change it, which leads to poor design and implementation of the total system.A lot of manual work is required in finding and generating the reports about various sections in the organization, because of this work people can become irritate and get bored of doing the work.The employees of the organization must produce the reports in a undecomposable and sagacity way, generating of such reports is not that easy to do.Authentication of a user cannot be given in the existing system, and there is so much bar in taking out and recovery of data in a preferred manner.The present system is going to provide the security to the database, and atomizing the system to manage the resources in the organization by using the enterprise java beans, oracle 8i as front end and back end of the system. To develop this system a good cognition about life cycle model of software development, different functions of the organization and about marketing strategies is required. The knowledge of various reports that are to be generated which are helpful to different branches in the organization is required. In the development of the proposed system the different phase dependent tools, methods and document specifications are determined. (Roman, 2002)3. Aims and objectivesAimTo design an automated computer based system and to get up-to-date information about components which helps organizations to conquer the complexity in tracking all the resources of the company by generating reports t hat are more easily understandable and to improve security for database. It provides proper initiatives and approaches that need to be undertaken, thereby avoiding the huge cost of implementing a new system or by simply adapting to one currently deployed.ObjectivesThe main objectives of this study are as follows The main objective of Computer Resource Management System is to provide an automated system to maintain the resources of the company.To provide a user friendly and multi-user interface for handling the application.To provide a user trademark and different interface depending upon the type of user logged in.To provide maximum level of security for the data.To provide the necessary reports to various users in time.4. Intellectual dispute4.1 System architecture4.1.1 Physical Architecture Model4.1.2 Layered ArchitectureDatabase LayerContains the data and database-related objects like stored procedures, triggers, packages, etc.Application LayerContains the objects addressing t he business logic Most of the middle-level Java objects will be here in application layer.Web Interface LayerIt will be on the web server It contains the web pages (JSPs) of the application which will act with the front-end browsersguest LayerContains the web browser which interacts with web server4.2 DATAFLOW drawLocID1 exploiter AuthenticationUSER ID AND PASSWORDLocationUser ProfileUsers2Master Administrator Setup5 habitual User Setup3Hardware Administrator Setup4Purchase Manager Setup4.3 System DesignSYSTEM propose phase follows system analysis phase. Design is maintaining a record evidence design division and providing a blueprint for the implementation phase. Design is the distich between system analysis and system implementation.System design is renewal from a user oriented, document oriented to programmers or database personnel. The design is a solution, a how to approach to the creation a new system. This is composed of several(prenominal) steps. It provides the unders tanding and procedural details necessary for implementing the system recommended in the feasibility study. Design goes through logical and physical stages of development, logical design reviews the present physical system, prepare input and output specifications, detail the implementation plan, and prepare a logical design walkthrough. (Dennis, A. Wixom, B. H. (2000))The database tables are designed by analyzing various functions involved in the system and the format of the field is also designed. The field in the database table should define their role in the system. The unnecessary fields should be avoided because it affects the storage areas of the system. Care is to be taken to encode the extensive names. Then in the input and the output screen design, the design should be made user friendly. The menu should be precise and compact.4.3.1 Objectives of DesignSystem design is like a blue print for a building, it specifies all the features that are to be in the finished product. D esign states how to accomplish objectives determined in the analysis phase.Logical DesignThe design of an information system produces the details that state how a system will come upon the requirements identify during systems analysis. This stage is login design.Physical DesignThe process of developing program software is referred to as physical design. In this stage the logical design elements are specified which support the business activities. The physical design ensures the system features to meet the user requirements.5. ScheduleThe above mentioned project is said to be detonate in March 2010 and ends on September 2010. The total duration required to develop the system is 5 months.Task no.Description season1Collect the information about the current project and give birth research to know about the previously implemented systems in various organizations3 weeks2Studying the technologies used in developing the proposed project2 weeks4Analyzing the outcomes of the project and dr aw a flowchart for the modules to be developed2 weeks5Designing the typical architecture of the project and steps involved in it2 weeks6Developing the project code based on the architecture and requirements2 weeks7 examen and validating the designed system2 weeks8Writing guidelines for end users1 week9Preparing the terminal report of the proposed system2 weeks10Possible amendments and closing up everything into a report4 days11Final submission1 day6. DeliverablesThe final result of this project is as follows.Ordinary users can do the simple operations like searching, viewing the components by some key words. each changes in the all modules, like deleting the components, adding components will be done by master administrator, and he will be having total permissions to do any changes or modifications to the database.By using the up-to date information various reports will be generated in less time.Maximum security of database will be achieved.Atomization of system will be done and th e system will become user friendly and multi user interface.Provides good trust among the customers.7. ResourcesThe resources required can be summed up asAccessing the IEEE explorer technical paper from the university library.Latest technical papers and journals about HTML, Java, Oracle 8i, and design implementations.Database system management text books to know how to implement tables in the system.Books on current trends in CRMSCollections of Library Resources and ArchivesReal time assessment of an online business retailer to know the current trends involved.8. RequirementsSoftware and hardwareOperating System Windows NT98Web ServerServer side Application Software Java Server Pages (JSP)Business Logic Software Enterprise Java Beans. (EJB)Client Side Application Software Java Script, HTMLData grip Oracle 8iClient BrowsersInternet Explorer 5.0 or Netscape Navigator 4.7 fantasy Weaver 3.0/JRUN4.0sHardware Pentium PCs with 128 MB RAM/ 20 GB HDD.

No comments:

Post a Comment