ABSTRACT
TABLE OF CONTENTS
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
TABLE OF CONTENTS
CHAPTER ONE
1.0 INTRODUCTION
1.1 STATEMENT OF THE PROBLEM
1.2 PURPOSE OF THE STUDY
1.3 AIMS AND STUDY
1.4 SCOPE OF THE STUDY
1.5 LIMITATIONS
1.6 ASSUMPTIONS
1.7 DEFINITION OF TERMS
CHAPTER TWO
2.0 LITERATURE REVIEW
2.1 INTERNET SERVICES
2.1.1 W.W.W.
2.1.2 E. COMMERCE
2.1.3 ELECTRONIC FUND TRANSFER
2.2 INTERNET ACCESS SATELLITE MODEM
2.3 DOMAN NAME SYSTEM (DNS)
2.4 TIMER SERVER
2.5 ROWERS
2.6 FIREWALLS
2.7 DYNAMIC HOST CONFIQURA PROTOCOL
CHAPTER THREE
3.0 DESCRIPTION AND ANALYSIS
3.1 FAT FINDING METHODS USED
3.2 ORGANIZATIONAL STRUCTURE
3.3 OBJECTIVE OF THE EXISTING SYSTEM
3.4 INPUT, PROCESS AND OUTPUT ANALYSIS
3.5 PROBLEM OF THE EXISTING SYSTEM
3.7 JUSTIFICATION OF HEURISTIC (SYSTEM)
CHAPTER FOUR
DESIGN OF THE NEW SYSTEM
4.1 OUTPUT SPECIFICATION AND DESIGN
4.2 INPUT SPECIFICATION AND DESIGN
4.3 FILE DESIGN
4.4 PROCEDURE CHART
4.5 SYSTEM FLOWCHART
4.6 SYSTEM REQUIREMENT
CHAPTER FIVE
IMPLEMENTATION
5.1 PROGRAM DESIGN
5.2 PROGRAM FLOWCHART
5.3 SOURCE PROGRAM
5.4 TEST RUN
CHAPTER SIX
DOCUMENTATION
6.1 SYSTEM DESCRIPTION
6.2 INSTALLATION
CHAPTER ONE
There have been considerable activity recently aimed at developing a computing grid – which can be defined as a distributed system on an internet scale that supports collaboration, data sharing, resource sharing across disparate domains and platforms
1. To enable the submission of jobs to remote sites in a transparent fashion, technologies such as generic dyterm of describing John and defining service level agreements, relating issues such as security, poyomance and quality of service.
2 A resource management system offers facilities that collectively allow users to run John on the pool of computational resources it manages. The pool may be made up of donated resources not being used by their owners at a given time, on resources allocated to the poll on a full-time basis. The lay out of more resource management system (RMS) the involves a central manager that monitors the state of all the machines in its pool allocates submitted Jobs to resources using scheduling algonthins and holds gueves of Jobs. Other resource management depture include job prioritizationlocal resource configuration and accounting. The scheduling facility elects the most suitable computational resource description obtained from the pool individual job requirements. A resource management system (RMS) may be used to run jobs submitted by users in a local domain or jobs submitted by user from remote sites working in a dynamic environment.
Here in this project allocation of service to pool in fixed, changes in demand may cause some quewes to become very long, while other servers remain underutilized. This is clearly inefficient it in desirable to develop a policy whereby servers may be re-allocated from one type of service to another
STATEMENT OF PROBLEM
Cyber café in Nigeria would have been experiencing difficulties the operation and maintenance of resource utilities. The adverse effect on clients or customer and the staff management of the company would work hander to maintain each of these resources and also attend to each different client in other to meet their various needs to ensure that clients and customers are satisfied.
Therefore the introduction of a computer based resource allocation system in a dynamic resources utilization environment has been of help to cope with the number of clients or customer that would work with this materials to ensure that each of the hardware resource we properly shaved
PURPOSE OF STUDY
The work is designed to enable the user to practically participate and use a resource allocate system to enable the management of the café to so we these problem it encounters during the allocation of its resources.
A computerized cyber café, can destitute its various resources to all the clients of workgroup in the cyber cafe efficient in its allocation by making sever that the hardware that needs the resources most user it.
AIMS AND OBJECTIVES
The main aim of this study is to design a computer based resource allocation system in a dynamic resource utilization environment
Another objectives of the study is to design a computer based system that will ensure that cyber café get their resources well allocated. It needs an appropriate percentage suitable fro them without any delay,
Another objective of the study is to design a computer based system to enable cyber café work dynamically in reler to allocate its various resources to punler, work groups etc.
SCOPE OF STUDY
This project work of resource allocation system in a dynamic resource utilization environment is centered on the cyber cafes lie. Allocation of resource to different sections or hardware in the café
Limitation
This project work encountered many limitations. Such as:
1 Finance:- this was the major linderancce to my movement in the resource of gathering fact
Time this is another constraint to my undertaking a more comprehensive fact finding. Suie the period for this study was too short compered to the actual work
LACK OF TEXTBOOKS
This is also another major constraint in the course of carrying out this work. One had to move from library to library in search of textbook
ASSUMPTION
In the course of this study, the following assumption were made
1. That all the data collected in the process of this study were correct and the program is the best of my ability able to perform the purpose for which it is installed.
2 that the staff to handle the system (computer system) we assumed to be computer iterate for efficient handle of data, through the program which will be user friendly.
3 computer as a fact machine will make cyber café accept it for the allocation of its resources in a dynamic environment.
4. that the management of cyber café should b able to put all the necessary facilities for the installation of computer system at also train staff
DEFINITION OF SOME TERMS
Unauthorized access is the use of an account owned by another user to access a system
TYPES OF INFORMATION
Any information stored online in open to the threat of theft, a password file might be stolen to run a cracking program against the file at another computer
Encryption
Is the ability to protect the contents of internet manages one can use a message security which uses a recording method to decode the message.
HOW
TO GET THE FULL PROJECT WORK
PLEASE,
print the following instructions and information if you will like to order/buy
our complete written material(s).
HOW
TO RECEIVE PROJECT MATERIAL(S)
After
paying the appropriate amount into our bank Account below, send the following
information to
08140350866
or 08058580848
(1)
Your project topics
(2)
Email Address
(3)
Payment Name
(4)
Teller Number
We
will send your material(s) immediately we receive bank alert
BANK
ACCOUNTS
Account
Name: AKINYEMI OLUWATOSIN
Account
Number: 3022179389
Bank:
FIRST BANK.
OR
Account
Name: AKINYEMI OLUWATOSIN
Account
Number: 2060566256
Bank:
UBA.
OR
Account
Name: AKINYEMI OLUWATOSIN
Account
Number: 0042695344
Bank:
Diamond
HOW
TO IDENTIFY SCAM/FRAUD
As
a result of fraud in Nigeria, people don’t believe there are good online
businesses in Nigeria.
But
on this site, we have provided “table of content and chapter one” of all our
project topics and materials in order to convince you that we have the complete
materials.
Secondly,
we have provided our Bank Account on this site. Our Bank Account contains all
information about the owner of this website. For your own security, all payment
should be made in the bank.
No
Fraudulent company uses Bank Account as a means of payment, because Bank
Account contains the overall information of the owner
CAUTION/WARNING
Please,
DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials
are to assist, direct you during your project. Study the materials
carefully and use the information in them to develop your own new copy. Copying
these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational
standard, and we will not be held responsible for it. If you must copy
word-to-word please do not order/buy.
That
you ordered this material shows you have agreed not to copy word-to-word.
FOR
MORE INFORMATION, CALL:
08058580848,
08140350866
YOU
CAN ALSO VISIT:
www.achieverprojectmaterial.com
www.acheiversprojectmaterials.com
www.achieversprojectmaterials.com
www.naijasplash.com
www.achieversprojectmaterials.blogspot.com
www.achieverprojectmaterial.blogspot.com
www.acheiversprojectmaterials.blogspot.com
www.archieverprojectmaterials.blogspot.com
www.acheiversprojectmaterials.blogspot.com.ng
www.archieverprojectmaterials.blogspot.com.ng
www.achieversprojectmaterials.blogspot.com.ng
www.achieverprojectmaterial.blogspot.com.ng
www.achieverprojectmaterial.wordpress.com
www.achieversprojectmaterials.wordpress.com
www.acheiversprojectmaterials.wordpress.com
www.archieverprojectmaterials.wordpress.com
No comments:
Post a Comment