Thursday, 23 February 2017

DESIGN AND IMPLEMENTATION COMPUTER BASED RESOURCE ALLOCATION SYSTEM IN A DYNAMIC VARIABLE RESOURCE UTILIZATION ENVIRONMENT (CASE STUDY CYBERAFE



ABSTRACT

As computational recourse become for use over the internet, a requirement has emerged to configure reviewers to an optional allration to cope with an unpredictable flow of incoming jobs this project describes all architecture that allows the dynamic reconfiguration of severs to process incoming jobs by switching severs between concept . the system makes use o heuristic to make close to optional switching decisions.  Decisions.  A prototype system which holds on existing resource management software had been developed to demonstrate some of the concept which are describe.

TABLE OF CONTENTS

TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS

CHAPTER ONE
1.0   INTRODUCTION
1.1   STATEMENT OF THE PROBLEM
1.2   PURPOSE OF THE STUDY
1.3   AIMS AND STUDY
1.4   SCOPE OF THE STUDY
1.5   LIMITATIONS
1.6   ASSUMPTIONS
1.7   DEFINITION OF TERMS
CHAPTER TWO
2.0   LITERATURE REVIEW
2.1   INTERNET SERVICES
2.1.1                W.W.W.
2.1.2                E. COMMERCE
2.1.3                ELECTRONIC FUND TRANSFER
2.2           INTERNET ACCESS SATELLITE MODEM
2.3           DOMAN NAME SYSTEM (DNS)
2.4           TIMER SERVER
2.5           ROWERS
2.6           FIREWALLS
2.7           DYNAMIC HOST CONFIQURA PROTOCOL

CHAPTER THREE                  
3.0   DESCRIPTION AND ANALYSIS
3.1   FAT FINDING METHODS USED
3.2   ORGANIZATIONAL STRUCTURE
3.3   OBJECTIVE OF THE EXISTING SYSTEM
3.4   INPUT, PROCESS AND OUTPUT ANALYSIS
3.5   PROBLEM OF THE EXISTING SYSTEM
3.7   JUSTIFICATION OF HEURISTIC (SYSTEM)

CHAPTER FOUR
DESIGN OF THE NEW SYSTEM
4.1   OUTPUT SPECIFICATION AND DESIGN
4.2   INPUT SPECIFICATION AND DESIGN
4.3   FILE DESIGN
4.4   PROCEDURE CHART
4.5   SYSTEM FLOWCHART
4.6   SYSTEM REQUIREMENT

CHAPTER FIVE
IMPLEMENTATION
5.1      PROGRAM DESIGN
5.2      PROGRAM FLOWCHART
5.3      SOURCE PROGRAM
5.4      TEST RUN

CHAPTER SIX
DOCUMENTATION
6.1        SYSTEM DESCRIPTION
6.2        INSTALLATION


CHAPTER ONE

1.0   INTRODUCTION
There have been considerable activity recently aimed at developing a computing grid – which can be defined as a distributed system on an internet scale that supports collaboration, data sharing, resource sharing across disparate domains and platforms
1.     To enable the submission of jobs to remote sites in a transparent fashion, technologies such as generic dyterm of describing John and defining service level agreements, relating issues such as security, poyomance and quality of service.
2      A resource management system offers facilities that collectively allow users to run John on the pool of computational resources it manages. The pool may be made up of donated resources not being used by their owners at a given time, on resources allocated to the poll on a full-time basis. The lay out of more resource management system (RMS) the involves a central manager that monitors the state of all the machines  in its pool allocates submitted Jobs to resources using scheduling algonthins and holds gueves of Jobs. Other resource management depture  include job prioritizationlocal resource configuration and accounting. The scheduling facility elects the most suitable computational resource description obtained from the pool individual job requirements. A resource management system (RMS) may be used to run jobs submitted by users in a local domain or jobs submitted by user from remote sites working in a dynamic environment.
Here in this project allocation of service to pool in fixed, changes in demand may cause some quewes to become very long, while other servers remain underutilized. This is clearly inefficient it in desirable to develop a policy whereby  servers may be re-allocated from one type of service to another



STATEMENT OF PROBLEM
Cyber café in Nigeria would have been experiencing difficulties the operation and maintenance of resource utilities. The adverse effect on clients or customer and the staff management of the company would work hander to maintain each of these resources and also attend to each different client in other to meet their various needs to ensure that clients and customers are satisfied.
Therefore the introduction of a computer based resource allocation  system in a dynamic resources utilization environment has been of help to cope with the number of clients or customer that would work with this materials to ensure that each of the hardware resource we properly shaved

PURPOSE OF STUDY
The work is designed to enable the user to practically participate and use a resource allocate system to enable the management of the café to so we these problem it encounters during the allocation of its resources.
A computerized cyber café, can destitute its various resources to  all the clients of workgroup in the cyber cafe  efficient in its allocation by making sever that the hardware that needs the resources most user it.

AIMS AND OBJECTIVES
The main aim of this study is to design a computer based resource allocation system in a dynamic resource utilization environment
Another objectives of the study is to design a computer based system that will ensure that cyber café  get their resources well allocated. It needs an appropriate percentage suitable fro them without any delay,

Another objective of the study is to design a computer based system to enable cyber café work dynamically in reler to allocate its various resources to punler, work groups etc.

SCOPE OF STUDY
This project work of resource allocation system in a dynamic resource utilization environment is centered on the cyber cafes lie. Allocation of resource to different sections or hardware in the café
Limitation
This project work encountered many limitations. Such as:
1      Finance:- this was the major linderancce to my movement in the resource of gathering fact
Time this is another constraint to my undertaking a more comprehensive fact finding. Suie the period for this study was too short compered   to the actual work


LACK OF TEXTBOOKS
This is also another major constraint in the course of carrying out this work. One had to move from library to library in search of textbook

ASSUMPTION
In the course of this study, the following assumption were made
1.     That all the data collected in the process of this study  were correct and the program is the best of my ability able to perform the purpose for which it is installed.
2      that the staff to handle the system (computer system) we assumed to be computer iterate for efficient handle of data, through the program which will be user friendly.
3      computer as a fact machine will make cyber café accept it for the allocation of its resources in a dynamic environment.
4.     that the management of cyber café should b able to put all the necessary facilities for the installation of computer system at also train  staff

DEFINITION OF SOME TERMS
Unauthorized access is the use of an account owned by another user to access a system

TYPES OF INFORMATION  
Any information stored online in open to the threat of theft, a password file might be stolen to run a cracking program against the file at another computer
Encryption
Is the ability to protect the contents of internet manages one can use a message security which uses a recording method to decode the message.

HOW TO GET THE FULL PROJECT WORK

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

HOW TO RECEIVE PROJECT MATERIAL(S)
After paying the appropriate amount into our bank Account below, send the following information to
08140350866 or 08058580848

(1)    Your project topics
(2)     Email Address
(3)     Payment Name
(4)    Teller Number
We will send your material(s) immediately we receive bank alert

BANK ACCOUNTS
Account Name: AKINYEMI OLUWATOSIN
Account Number: 3022179389
Bank: FIRST BANK.

OR
Account Name: AKINYEMI OLUWATOSIN
Account Number: 2060566256
Bank: UBA.

OR
Account Name: AKINYEMI OLUWATOSIN
Account Number: 0042695344
Bank: Diamond

HOW TO IDENTIFY SCAM/FRAUD
As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

CAUTION/WARNING
Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

That you ordered this material shows you have agreed not to copy word-to-word.


FOR MORE INFORMATION, CALL:
08058580848, 08140350866

YOU CAN ALSO VISIT:
www.achieverprojectmaterial.com
www.acheiversprojectmaterials.com
www.achieversprojectmaterials.com
www.naijasplash.com
www.achieversprojectmaterials.blogspot.com
www.achieverprojectmaterial.blogspot.com
www.acheiversprojectmaterials.blogspot.com
www.archieverprojectmaterials.blogspot.com
www.acheiversprojectmaterials.blogspot.com.ng
www.archieverprojectmaterials.blogspot.com.ng
www.achieversprojectmaterials.blogspot.com.ng
www.achieverprojectmaterial.blogspot.com.ng
www.achieverprojectmaterial.wordpress.com
www.achieversprojectmaterials.wordpress.com
www.acheiversprojectmaterials.wordpress.com
www.archieverprojectmaterials.wordpress.com








No comments:

Post a Comment