7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
1/51
Smart Data Backup Management System
Department of Computer Science, ASIET 1
1. INTRODUCTION
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
2/51
Smart Data Backup Management System
Department of Computer Science, ASIET 2
1.INTRODUCTIONWe know, most people in the Internet have a flat rate and they have hard disk
much bigger than they ever use them. If you don't work with video application,
its really hard to fil l modern Tera byte hard disks. we think, it may be a very
good idea to implement a Backup system based on Network. You split your
Hard disk in two Partitions. The working Partition and a two times bigger one
to have space for the backup of other people via Network.
All you need is a program, who backups your files to the free net. Because of
the content related key and encryption, Network stores equal content to the
same location. This creates a lot of space be avoiding the infinite duplication
of common content like windows or other data applications and operating
systems. This space can be used to store different versions of file who are user
specific and under evolution. Also need is some additional forward error
recover, called save set envelope, to keep the probability below a defined
value.
The private files are secure, because the content has key is better than every
content encryption password. Only if the file is known, it is possible by the
neighbor peers to recognize the presents of this file during backup. This
problem may be solved by th e onion routing at the lead in of Ne two rk
requests. The directories are also stored with the content related key and
encryption system, so identically directories within distributed software are
also stored on same locations. The main Dataset of the Backup system to
needed start a recovery will be stored local on the computer and additional
under a KSK who contains data to handle to an USK. This KSK must be a
derivate build from a long user password, to create the opportunity to recover
every time the whole hard disk with nothing more than a new computer and the
knowledge of the master password.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
3/51
Smart Data Backup Management System
Department of Computer Science, ASIET 3
2. SYSTEM ANALYSIS
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
4/51
Smart Data Backup Management System
Department of Computer Science, ASIET 4
2.SYSTEM ANALYSISSystem analysis is required to build and verify an effective
system. It is the process of gathering and interpreting data and facts,
diagnosing problems and using the information to recommend improvements to
the system. In the development of software, structural analysis, information is
collected from the existing documents.
System analysis helps to understand the problem and emphasizes what is
needed from the system. The various user requirements are identified and a
new system is proposed so as to meet those requirements. System analysis is
an approach to the study and solves the problem using computer based system;
it provides a framework for visualizing the organizational facts that operate on
the system.
2.1. SYSTEM DESCRIPTIONThis project is intended to take backups of sensitive are maintaine d
as stream objects across a local network. Backup are done automatically over
the networks to a backup server in the network. As with all computer system,
there is always the potential for hardware malfunctions such as hard disk
failures. Often, such maintenance is required due to the accidental and
sometimes even deliberate modification or deletion of files on a system by its
users. In some cases, such alterations can be undone easily, while in others,
the only remedy is to reinstall a system from scratch. In such cases, it is of
great benefit to administrators to have a backup of each available system that
has been installed. Backups are done automatically over the network to a
backup serv er at regular int erva ls and system admini st ration done period ically
so that data security is maintained. It is a software package that provides
centrally managed, reliable backup facilities for a variety of workstations. It is
an enterprise level backup product capable of protecting your most valuable
data. Backups allow you to restore the availability and integrity of information
resources following security breaches and accidents.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
5/51
Smart Data Backup Management System
Department of Computer Science, ASIET 5
2.2. SCOPE OF THE PROJECTThe smart data backup server has the facility to take secured backups
of the systems in the network. This application will enable the clients to
schedule their backup and take urgent backup of only the required files when
needed. The encryption property of the Smart- Data Backup server ensures
security of the data. Also the clients can have a detailed report o f the backups
As with all computer system, there is always the potential for hardware
malfunctions such as hard disk failures. Often, such maintenance is required
due to the accidental and sometimes even deliberate modification or deletion
of files on a system by its users. In some cases, such alterations can be undone
easily, while in others, the only remedy is to reinstall a system from scratch.
Small businesses rely on the availability of their data to keep running, so
data loss is arguably more catastrophic for them than for consumers. In fact, a
recent study of small businesses had suffered data loss: "The top causes of
small business' data loss included hardware/software failure (54 percent),
accidental deletion (14 percent), computer viruses (22 percent) and theft (10
percent ),"
In such cases, it is of great benefit to administrators to have a backup of
each available system that has been installed.
Why Backups?
Data can be corrupted by a variety ofproblems:
Failure of the hard disk drive
Failureof the hard disk controller
Motherboard failure
Power outage or spike
Virus attack
Accidental change or deletion of data
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
6/51
Smart Data Backup Management System
Department of Computer Science, ASIET 6
Malicious change or deletion of data
2.3. EXISTING SYSTEMIn existing system is implemented in intranet environment, where
computers are connected under same domain.
Client and Server must have an active connection at schedule time for
proper data backup.
LIMITATIONS OF THE EXISTING SYSTEM
One of the main limitation of existing backup in our computer systemis that it is only Implemented in local area network, where computers
are connected under same domain
Client and Server must have an active connection at schedule time forprop er da ta back up
Backup can be done only at particular moment/time. that is ,backing upof data cant be done by setting time(no scheduling)
In ordinary backup system, if once we backup our data we cant viewthe backup details like backup day, backup time, schedule type, backup
type. It doesnt provide old backup details
We cant verify the data that we backed up: that is, it doesnt allow theuser to view the details of current scheduled backup
Any client can access/modify backed up data without the permission ofthe client who done the backup. I t doesnt ensure data security
Unauthorized user can backup and restore any system without thepermission of admin
Since the data are not automatically zipped large amount of memory isrequired to store the backed up data
It is a time consuming process Existing backup system suffer data loss at higher rate because of
accidental deletion, computer viruses, theft etc
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
7/51
Smart Data Backup Management System
Department of Computer Science, ASIET 7
2.4. PROPOSED SYSTEMThe project is a software system where Back-ups are done
automatically over the network to a back-up server at regular intervals and
system administration done periodically so that data security is maintained. It
is a software package that provides centrally managed, reliable backup
facilities for a variety of workstations.
The programs permit you (or the system administrator) to manage backup,
recovery, and verification of computer data across a network of computers of
different kinds. In technical terms, it is a network Client/Server based backup
program. The Backup System is relat ively easy to use an d effi ci ent , while
offering many advanced storage management features that make it easy to find
and recover lost or damaged files. Due to its modular design, Backup System
is scalable from small single computer systems to systems consisting of
hundreds of computers located over a large network.
2.5. ADVANTAGES OF THE PROPOSED SYSTEMAdvantages:
1. Scheduling
2. Reports
3. Verification
4. Security
5. Authorized user login
6. File and data backup using automatic zip
7. Reduce data loss
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
8/51
Smart Data Backup Management System
Department of Computer Science, ASIET 8
The system protect against every kind of data loss. This are
User Mistakes, for example deleting something you still need Software malfunction Hardware malfunction Fire, Water, Storm Theft, Sabotage, Break-down, Robbery.
Alternative solutions:
A new Windows Computer comes for example with a hidden recoverypartition . This solves pa rt icu lar problem (2) in relation to system
software. If you use a second hard-disk, you can solve problem (3) by
using a raid.
If you are using software that create and maintains a set of snapshots,you may be able to solve (1) and (2), in combination with a second
hard-disk also (3)
. If you work with laptops, you have typical the problem, that there isonly one internal disk. You may decide to use an additional sever to
make automatic backups.
To protect against problem (4), you have two options: You may (A)decide to put data in a special, fire resistant box or you may (B) copy
the data to a location far away. (A) Costs a lot of money and did not
work automatically.
If your business did not have the opportunity of different locations, youmust rent space f ar away and upload every -kind, included all distributed
stuff. (5) is the hardest problem. You have the need to keep your backup locations confidential, which is
not so easy if you have huge traffic. Or you rent an ultra hard storage,
like backup storage in the Switzerland including an Army guarantee.
That's rarely expansive! But you can also solve (1) -(5) by a p2p backupsolution running on a basis like something like a network based
software application.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
9/51
Smart Data Backup Management System
Department of Computer Science, ASIET 9
2.6. FUNCTIONAL REQUIREMENTSHARDWARE SPECIFICATION
Network Storage Server
Processor Intel Pentium IV
Speed 2.4 GHz.
Memory 2 GB RAM
Hard Disk Drive 120 GB
Key Board 104 keys
Mouse Scroll Mouse
Monitor 15 SVGA Digital Color Monitor
DVD-RW 52 X
Network DeviceEthernet LAN, Using
Route/Switch
Client System
Processor Intel Pentium IV
Speed 2.4 GHz.
Memory 128 MB RAM
Hard Disk Drive 40 GB
Key Board 104 keys
Mouse Scroll Mouse
Monitor15 SVGA Digital Color
Monitor
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
10/51
Smart Data Backup Management System
Department of Computer Science, ASIET 10
SOFTWARE SPECIFICATION
Network Storage Server
Operating System Microsoft 2003 Server
Runtime Support Jre1.6 or later
Network suppo rt TCP Sock et & FTP Enabled
Database Server SQL 2005 Server
Client System
Operating System Microsoft 2003 Server
Runtime Support Jre1.6 or later
FEATURES OF JAVA
JAVA
Java has won acceptance as a major programming language in just a few
years. It is a high-level third generation programming language, like C,
FORTRAN, Smalltalk, Perl and many others. You can use Java to writecomputer applications that crunch numbers, process words, play games, store
data or do any of the thousands of other things computer can do.
Java Is Platform Independent
Java was designed to not only be cross-platform in source form like C,
but also in compi led bina ry form. Since thi s is frankl y imposs ibl e across
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
11/51
Smart Data Backup Management System
Department of Computer Science, ASIET 11
processor arch itecture Java is compi led to an intermediate form called byte -
code.
A java program never really executes natively on the host machine.
Rater a special native program called the java interpreter reads the byte code
and executes the corresponding native machine instructions. Thus to port Java
programs to a ne w pla tform al l tha t is ne ed ed is to port the inter pret er an d
some of the library routines. Even the compiler is written in Java. The byte
codes are precisely defined, and remain the same on all platforms.
The second important part of making Java cross-platform is the
elimination of undefined or architecture depend constructs. Integers are always
four bytes long, and floating point variables follow the IEEE 754 standard for
computer arithmetic exactly. However the virtual machine itself and some
part s of the class lib rary must be written in native co de. These are no t al wa ys
as easy or quick to port as pure Java programs.
Java JDK 1.6
The term Java actual refers to more than just a particular language like C or
Pascal. Java encompasses several parts, including:
A high level language the Java language is a high level one that ata glance looks very similar to C and C++ but offers many unique
features of its own.
Java byte code - a compiler, such as Sun's javac, transforms the Javalanguage source code to byte code that runs in the JVM.
Java Virtual Machine (JVM) a program, such as Sun's java, thatruns on a given platform and takes the byte code programs as input
and interprets them just as if it were a physical processor executing
machine code.
The Java Application Programming Interface (API):- The API is a largecollection of ready-made software components that provide many
useful capabilities, such as graphical user interface (GUI) widgets. It
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
12/51
Smart Data Backup Management System
Department of Computer Science, ASIET 12
is grouped into libraries of related classes and interfaces; these
libraries are known as packages. The following figure depicts how the
API and the Java Virtual Machine insulate the program from the
hardware.
As a platform-independent environment, the Java platform can be a bit
slower than native code. However, advances in compiler and virtual machine
technologies are bringing performance close to that of native code without
threatening portability.
Basic features that make java a powerful and popular
programming language:
Simple
There are various features that make the java as a simple language.
Programs are easy to write and debug because java does not use the pointers
explicitly. Java provides the bug free system due to the strong memory
management. It also has the automatic memory allocation and deallocation
system.
Platform Independent
The concept of Write-once-run-anywhere (known as the Platform
independent) is one of the important key features of java language that makes
java as the most power ful language. Not even a sin gle language is idle to thi s
feature but java is cl oser to this feature. The programs written on one platform
can run on any platform provided the platform must have the J VM.
Object Oriented
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
13/51
Smart Data Backup Management System
Department of Computer Science, ASIET 13
To be an Object Oriented language, any language must follow at least
the four characteristics.
Inheritance: It is the process of creating the new classes and using the
behavior of the exi sting cl asses by ex ten ding them just to reu se the exi sting
code and adding the additional features as needed.
Encapsulation: It is the mechanism of combining the information and
providing the abs tract ion.
Polymorphism: As the name suggest one name multiple form, Polymorphism
is the way of providing the different functionality by the functions having the
same name based on the signatures of the methods.
Dynamic binding: Sometimes we don't have the knowledge of objects about
their specific types while writing our code. It is the way of providing the
maximum functionality to a program about the specific type at runtime. The
linking of data and methods to where they are located is done at run-time. New
classes can be loaded while a program is running. Linking is done on the fly.
Even if libraries are recompiled, there is no need to recompile code that uses
classes in those libraries. This differs from C++, which uses static binding.
This can result in fragile classes for cases where linked code is changed and
memory pointers then point to the wrong addresses
As the languages like Objective C, C++ fulfills the above four
characteristics yet they are not fully object oriented languages because
they are structured as well as object oriented languages. But in case of java, it
is a fully Object Oriented language because object is at the outer most level of
data structure in java. No stand alone methods, constants, and variables are
there in java. Everything in java is object even the primitive data types can
also be converted into object b y using the wrapper class.
Robust
Java has the strong memory allocation and automatic garbage
collection mechanism. It provides t he powerful exception handling and type
checking mechanism as compare to other programming languages. Compilerchecks the program whether there any error and interpreter checks any run
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
14/51
Smart Data Backup Management System
Department of Computer Science, ASIET 14
time error and makes the system secure from crash. All of the above features
make the java l anguage robust.
Distributed
The widely used protocols like HTTP are developed in java. Internet
Programmers can call functions on these protocols and can get access the files
from any remote machine on the internet rather than writing codes on their
local system.
Portable
The feature Write-once-run-anywhere makes the java language
portable prov id ed tha t the system must hav e interp re ter for the JVM. This
feature makes the java as a portable language.
Dynamic
While executing the java program the user can get the required files
dynamically from a local drive or from a remote server thousands of miles
away from the user just by connecting with the Internet.
Automatic Memory Management
Automatic garbage collection - memory management handled b y JVM.
Secure
Java does not use memory pointers explicitly. All the programs in java
are run under an area known as the sand box. Security manager determines
the accessibility options of a class like reading and writing a file to the local
disk. Java uses the public key encryption system to allow the java
applications to transmit over the internet in the secure encrypted form. The
byte co de Verifie r ch ecks the cl as ses af ter load ing. Array index limi t
checking. Code pathologies reduced by
1. Byte code verifier - checks classes after loading
2. Class loader - confines objects to unique namespaces. Prevents loading a
hacked "java.lang.SecurityManager" class, for example.
3. Security manager - determines what resources a class can access such as
reading and writing to the local disk.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
15/51
Smart Data Backup Management System
Department of Computer Science, ASIET 15
Performance
Java uses native code usage, and lightweight process called threads.
In the beginning interpretation of byte code resulted the performance slow
bu t the advance version of JVM uses the ad ap tive and jus t in time
compilation technique that improves the performance.
Compiler/Interpreter Combo
Code is compiled to byte codes that are interpreted by Java virtual
machines (JVM). This provides portability to any machine for which a virtual
machine has been written. The two steps of compilation and interpretation
allow for extensive code checking and improved security.
Several dangerous features of C & C++ eliminated:
1. No memory pointers
2. No preprocessor
3. Array index limit checking
Multithreaded
As we all know several features of Java like Secure, Robust,
Portable, dynamic etc; you will be more delighted to know another feature of
Java which is Multithreaded.
Java is also a multithreaded programming language. Multithreading
means a single program having different threads executing independently at
the same time. Multiple threads execute instructions according to the
program code in a process or a program. Mul tithread ing wo rks the simi lar
way as multiple processes run on one computer.
Multithreading programming is a very interesting concept in Java. In
multithreaded programs not even a single thread disturbs the execution of
other thread. Threads are obtained from the pool of available ready to run
threads and they run on the system CPUs. This is how Multithreading works
in Java which you will soon come to know in details in later chapters.
Interpreted
We all know that Java is an interpreted language as well. With an
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
16/51
Smart Data Backup Management System
Department of Computer Science, ASIET 16
interpreted language such as Java, programs run directly from the source
code.
The interpreter program reads the source code and translates it on the
fly into computations. Thus, Java as an interpreted language depends on an
interpreter program.
The versatility of being platform independent makes Java to outshine
from other languages. The source code to be written and distributed is
pl at fo rm ind ep enden t.
Another advantage of Java as an interpreted language is its error
debugging quality. Due to this any error occurring in the program gets
traced. This is how it is different to work with Java.
Built-in Networking
Java was designed with networking in mind and comes with many
classes to develop sophisticated Internet communications.
Architecture Neutral
The term architectural neutral seems to be weird, but yes Java is an
architectural neutral language as well. The growing popularity of networks
makes developers think distributed. In the world of network it is essential
that the applications must be able to migrate easily to different systems, not
only to computer systems but to a wide variety of hardware architecture and
operating system architectures as well. The Java compiler does this by
generating byte code instructions, to be easily interpreted on any machine
and to be easily translated into native machine code on the fly. The compiler
generates an architecture-neutral object file format to enable a Java
application to execute anywhere on the network and then the compiled code
is executed on many processors, given the presence of the Java runtime
system. Hence Java was designed to support applications on network. This
feature of Java has thrived the programming language.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
17/51
Smart Data Backup Management System
Department of Computer Science, ASIET 17
ABOUT OPERATING SYSTEM - WINDOWS XP
Windows XP is a line of operating systems developed by Microsoft for
use on general-purpose computer systems, including home and business
desktops, notebook computers, and media centers. The name "XP" stands for
experience. It was codenamed "Whistler", after Whistler, B ritish Columbia,
as many Microsoft employees skied at the Whistler-Blackcomb ski resort
during its development. Windows XP is the successor to both Windows 2000
Professional and Windows Me, and is the first consumer-oriented operating
system produced by Microsoft to be built on the Windows NT kernel and
architecture. Windows XP was first released on October 25, 2001, and over
400 million copies were in use in January 2006, according to an estimate in
that month by an IDC analyst.[3] It is succeeded by Windows Vista, which was
released to volume license customers on November 8, 2006, and worldwide to
the general public on January 30, 2007.
The most common editions of the operating system are Windows XP
Home Edition, which is targeted at home users, and Windows XP Professional,
which has additional features such as support for Windows Server domains andtwo physical processors, and is targeted at power users and business clients.
Windows XP Media Center Edition has additional multimedia features
enhancing the ability to record and watch TV shows, view DVD movies, and
listen to music. Windows XP Tablet PC Edition is designed to run the ink-
aware Tablet PC platform. Two separate 64-bit versions of Windows XP were
also released, Windows XP 64-bit Edition for IA-64 (Itanium) processors and
Windows XP Professional x64 Edition for x86-64.
Windows XP is known for its improved stability and efficiency over the
9x versions of Microsoft Windows. It presents a significantly redesigned
graphical user interface, a change Microsoft promoted as more user-friendly
than previous versions of Windows. New software management capabilities
were introduced to avoid the "DLL hell" that plagued older consumer-oriented
9x versions of Windows. It is also the first version of Windows to use product
activation to combat software piracy, a restriction that did not sit well with
some users and privacy advocates. Windows XP has also been criticized by
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
18/51
Smart Data Backup Management System
Department of Computer Science, ASIET 18
some users for s ecurity vulnerabilities, tight integration of applications such as
Internet Explorer and Windows Media Player, and for aspects of its default
user interface.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
19/51
Smart Data Backup Management System
Department of Computer Science, ASIET 19
3. SYSTEM DESIGN
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
20/51
Smart Data Backup Management System
Department of Computer Science, ASIET 20
3.SYSTEM DESIGN3.1. DATA FLOW DIAGRAM
Database Design
The database may be defined as an organized collection of related
information. The organized information serves as a base from which further
recognizing can be retrieved desired information or processing the data. The
most important aspect of building an application system is the design of tables.
In out present project the database consists of just single table.. The table
structure shown below:
Levels of data flow diagram
Level - 0
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
21/51
Smart Data Backup Management System
Department of Computer Science, ASIET 21
Level - 1
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
22/51
Smart Data Backup Management System
Department of Computer Science, ASIET 22
Level - 2
Level - 3
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
23/51
Smart Data Backup Management System
Department of Computer Science, ASIET 23
Dataflow Diagram
Graphical description of a systems data and how the processes
transform the data is known as Data Flow Diagram (or DFD). This was first
developed by Larry Constantine. This is also known as bubble chart.
Unlike detail flowcharts, DFDs do not supply detailed descriptions of
modules but graphically describe a systems data and how the data interact
with the system.
To construct data flow diagrams, we use
Arrows Circles Open-ended boxes, and Squares
An arrow identifies data flow-data in motion. It is a pipeline through
which information flows. Like the rectangle in flowcharts, circles circle stand
for a process that coverts data/into in-formation. An open-ended box
represents a data store-data at rest, or a temporary repository of data. A square
defines a source (originator) or destination of system data.
The following seven rules govern construction of Data Flow diagrams (DFD):
Arrows should not cross each other. Squares, circles and files must bear names. Decomposed data flows must be balanced (all data flows on the
decomposed diagram must reflect flows in the original diagram).
No two dat a flows, squares , or circl e can have the same name. Draw all data flows around the outside of the diagram. Choose meaningful names for data flows, processes and data
stores. Use strong verbs followed by nouns.
Control information such as record contents, passwords andvalidation requirements are not pertinent to a data-flow diagram.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
24/51
Smart Data Backup Management System
Department of Computer Science, ASIET 24
3.2. SCREEN SHOTS
fig.1: Client Loign
fig.2: Server Configuration
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
25/51
Smart Data Backup Management System
Department of Computer Science, ASIET 25
fig.3: Registration Form
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
26/51
Smart Data Backup Management System
Department of Computer Science, ASIET 26
fig.4: Backup File Selection
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
27/51
Smart Data Backup Management System
Department of Computer Science, ASIET 27
fig.5: Backup Scheduling
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
28/51
Smart Data Backup Management System
Department of Computer Science, ASIET 28
fig.6: Restore
fig.7: Decompress
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
29/51
Smart Data Backup Management System
Department of Computer Science, ASIET 29
3.3. TABLE SPECIFICATIONSERVER CONFIGURATION
Column name Data Type Description
IP_Address Varchar(20) Uniquely identify the client
Port_Number Varchar(20) Port to connect
Remote_Folder Varchar(20) Server location for backup
USER ACCOUNT
Column Name Data Type Description
Name Varchar(20) Name of the user
Systemname Varchar(20) Name of the System
Systemnumber Int Number of the System
Portnumber Int Port to Connect
Username Varchar(20) User name to login
Password Varchar(20) Password to login
Typesofdata Varchar(120) Types of data to backup
REPORT
Column Name Data Type Description
Savepacname Varchar(100) Name of file to backup
Backuplevel Varchar(100) Incremental/Image copy
Backuptype Varchar(100) Backup to Server/Client
Scheduletype Varchar(100) Weekly/Daily
Backupday Varchar(100) Day of backup
Backuptime Varchar(100) Time of backup
Location Varchar(100) Backup location
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
30/51
Smart Data Backup Management System
Department of Computer Science, ASIET 30
3.4. MODULE DESCRIPTION
Modules
1. Network Backup Servera) Client Account Authenticationb) Storage device Managementc) Data Replication (External Drive/Device/ System)d) FTP Server
2. Client Backup Toola) Defining backup packs
Data security management (encryption)
b) Data Compressionc) Backup File Transfer (FTP)
Backup scheduling
d) Recover y managemente) Report (backup/Recovery)
1. Network Backup Servera) Client Account Authentication
This module is intended to manage and authenticate an account
for each client system. Client system information after registering
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
31/51
Smart Data Backup Management System
Department of Computer Science, ASIET 31
the account is send to the server for approval and Authentication.
This assigns specific privileges for each registered client system.
b) Storage Device managementsThis module allocates the storage space and location in the
backup serv er fo r stor ing the backup fil es tha t hav e be en
transferred. It also manages the temporary storage devices for
secondary backup.
c) Data ReplicationThis creates the duplicates of files needed f or ensuring the
security from data loss. This data can be maintained in the client
system near the original data or can be transferred to the server
and can be even maintained in secondary storage devices.
d) FTP ServerThis module follows File Transmission Protocol for the eas y
transfer of files from the server s ystem to the connected client
and vice versa. This overcomes complex procedures and the
transmission delay of using other protocols.
2. Client Backup Toole) Defining Backup Packs
Manages the backup files by giving a pack name. These
backup packs are des cribed by assigning several at tributes
which gives the information about time, schedule and storage
location of the files.
f) Data security management (encryption)For the secure transmission of data, data encryption
mechanisms are used for converting the data into an encrypted
format which can be decrypted only by the specific client.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
32/51
Smart Data Backup Management System
Department of Computer Science, ASIET 32
g) Data CompressionBefore transferring the files to the central s erver it is
compressed to reduce the storage space. Thus even bulk of
data can be easily transferred and saved in a minimum storage
space.
h) Backup File Transfer (FTP)This module is intended for the easy transfer of files from
client systems to the connected server and vice versa .FTP
(File Transmission Protocol) is used here which overcomes the
complex procedures of other transmission protocols.
i) Backup schedulingDefines a schedule for each backup packs by setting the week,
day, date and time for the backup. The information such as
which files are needed for backup, when the backup process
will start, and where to store the files are received
dynamically from the user and saved as xml file.
j)
Recover y managementData recovery module is used to recover the lost or damaged
data from the central server when needed. The data be restored
in the compressed format or we can decompress the data and
download.
k) Report (backup/Recovery)This module generates the reports about backup and recovery
.it also provide information about the regi stered client systems
and the types of data, date and time of backup created by
them.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
33/51
Smart Data Backup Management System
Department of Computer Science, ASIET 33
3.5. SYSTEM TEST PLANLogin
Serial
No.
Module
description
Test
CaseExpected Input
Expected
Output
Refer
GUIRemark
1. LoginUser
login
Attempt to
authenticate with
valid username
and password
Login to
home pageFig 1 Successful
2. LoginUser
login
Attempt to
authenticate with
invalid username
and password
Redirected to
same page
with error
message
Fig 1 Failed
3. LoginUser
Login
Attempt to
authenticate with
valid username
and password
Login to
home pageFig1 Successful
4. LoginUser
Login
Attempt to
authenticate with
invalid username
and password
Redirected to
same page
with error
message
Fig 1 Failed
5. LoginUser
Login
If no values are
entered in any
field/any field is
kept blank
Warning
message-Fill
all the fields
Fig 1 Failed
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
34/51
Smart Data Backup Management System
Department of Computer Science, ASIET 34
Register
Serial
No.
Module
descriptionTest Case Expected Input
Expected
Output
Refer
GUIRemark
1. Register
Registration
for a new
user
If no values areentered in any
field/any field is
kept blank
Errormessage-
Enter data in
all fields
Fig 3 Failed
2. Register
Registration
for a new
user
Incorrect re-
entering of
password in
confirm password
field
Error
message-
Password
doesnt
match
Fig 3 Failed
3. Register
Registration
for a new
user
If new user enters
existing username
during registration
Username
not availableFig 3 Failed
4. Register
Registration
for a new
user
When the user
enters all the
fields correctly
Message:
Registration
completed
Fig 3 Success
Configuration
Serial
No.
Module
descriptionTest Case Expected Input
Expected
Output
Refer
GUIRemark
1. ConfigureServer
configuration
Entering IP
address
incorrectly by
the user
Error
message-
connection
refused
Fig 2 Failed
2. ConfigureServer
configuration
Entering port
number
incorrectly
Error
message-
connection
refused
Fig 2 Failed
3. ConfigureServer
configuration
When user
enters correct
username &
password
Success
message-
server
configured
Fig 2 Success
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
35/51
Smart Data Backup Management System
Department of Computer Science, ASIET 35
Backup
Serial
No.
Module
descriptionTest Case
Expected
Input
Expected
Output
Refer
GUIRemark
1. BackupSelect files to
Backup
If null valueis selected
for ADD
button
Warningmessage-
no files
selected
Fig 4 Failed
2. BackupSelect files to
Backup
If no file is
selected for
backup
Warning
message-
no files
selected
for backup
Fig 4 Failed
3. BackupSelect files to
Backup
Duplication
of selected
folder
Message-
folder
already
exist
Fig 4 Failed
4. Backup
Remove files
from selected
list
If null value
is selected
for REMOVE
button
Error
message-
select at
least one
item
Fig 4 Failed
Restore
Serial
No.
Module
descriptionTest Case Expected Input
Expected
Output
Refer
GUIRemark
1. RestoreRestoring
backup
If no values are
entered in any
field/any field is
kept blank
No items
selectedFig 6 Failed
2. RestoreRestoring
backup
If user select the
location incorrectly
Invalid
locationFig 6 Failed
3. RestoreRestoring
backup
After completing
the restore
function
Message-
data
restoration
completed
Fig 6 Success
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
36/51
Smart Data Backup Management System
Department of Computer Science, ASIET 36
Decompress
Serial
No.
Module
descriptionTest Case
Expected
Input
Expected
Output
Refer
GUIRemark
1. Decompress
Decompress
Restored
Data
If no value isentered in any
field/any field
is kept blank
Warning-no
null value
accepted
Fig 7 Failed
2. Decompress
Decompress
Restored
Data
When user
select an
invalid location
Warning
message-
Invalid location
Fig 7 Failed
3. Decompress
Decompress
Restored
Data
After
completing the
decompression
process
Message
Data
decompression
completed
Fig 7 Success
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
37/51
Smart Data Backup Management System
Department of Computer Science, ASIET 37
4. TEST REPORT
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
38/51
Smart Data Backup Management System
Department of Computer Science, ASIET 38
4.TEST REPORTSYSTEM TESTING
Software testing is a critical element of software quality assurance and
represents the ultimate reviews of specification, design and coding. Testing
present an interes ting anomaly fo r the sof tware . Tes ting is vi tal to th e success
of the system. Errors can be injected at any stage during development. System
testing makes a logical assumption that if all the parts of the system are
correct, the goal will be successfully achieved. During testing, the program to
be te sted is ex ecuted wi th set of test dat a and the ou tpu t of the program for the
test data is evaluated to determine if the programs is performing as expected.
A series of testing are performed for the proposed system before the system is
ready for user acceptance testing. The testing steps are:
Unit Testing Integration Testing Validation testing Output Testing Acceptance Testing
Unit Testing
Unit testing focuses verification effort on the smallest unit of the
software design, the module this is known as module testing. Since the
proposed sys tem has modul es the test ing is indi vidu al ly pe rf ormed on each
module. Using the details design description as a guide, important control
paths are tested to uncover errors wi thin the bo undary of the module. Th is
testing was carried out during programming stage itself. In this testing step
each module is found to be working satisfactorily as regards to the expected
output from the module.
Integration Testing
Data can be test across an interface; one module can have adverse effecton another, sub function when combined may not produced the desired
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
39/51
Smart Data Backup Management System
Department of Computer Science, ASIET 39
function. Integration testing is a systematic technique for constructing the
program structure whi le at the sam e time conduct ing tes t to uncover er ror s
associated within the interface.
Validation Testing
Validation testing can be defined in many ways, but a si mple definition
is that validation succeeds when the software functions in manner that is
reasonably expected by the customer. Software validation is achieved through
a series of black box tests that demonstrate conformity with requirement. After
validation test has been conducted, one of two conditions exists.
The function or performance characteristics confirm tospecifications and are accepted
A validation from specification is uncovered and a deficiencycreated.
Deviation or errors discovered at this step in this project is corrected
pr ior to completion of the pro jec t wi th the help of the us er by negotiating to
establish a method for resolving deficiencies. Thus the proposed system under
consideration has been tested by using validation testing and found to be
working satisfactorily.
Output Testing
After performing the validation testing, the next step is output testing
of the proposed system, since no system could be useful if it does not produce
the required output in the specific format. The output generator or displayedby the sys tem under cons id erat ion is tested by asking the us ers about the
format required by them. Here the output is considered in two ways: One is on
screen and the other is printed format. The output format on the screen is
found to be correct as the format was designed in the system design phase
according to the user needs. As far as hardcopies are considered it goes in
terms with the user requirement. Hence output testing does not result any
correction in the system.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
40/51
Smart Data Backup Management System
Department of Computer Science, ASIET 40
Acceptance Testing
User acceptance of the system is key factor for the success of any system.
The system under consideration is tested for user acceptance by constantly
keeping in touch with prospective system and user at the time of developingand making changes whenever required
IMPLEMENTATION
Implementation is the stage of the project when the theoretical design is
turned into a working system. If the implementation stage is not properly
planned an d cont rol led, it can cause ch aos. Thus it can be considered to be th e
most crucial stage in achieving a successful new system and in giving the
users confidence that the new system will work and be e ffective .
Normall y thi s sta ge involves set ting up a coord inat ing committee , which
will act as a sounding board for ideas; complaints and problems. The first task
is implementation planning; i.e. deciding on the methods and timescale to be
adopted. Apart from planning, the two major tasks of preparing for
implementation are education and training of users and testing of the system.
Education of users should really have taken place much earlier in the project;
at the implementation stage the emphasis must be on training in new skills to
give staff confidence they can use the system. Once staff has been trained, the
system can be tested.
After the implementation phase is completed and the user staff is adjusted
to the changes created by the candidate system, evaluation and maintenance
begin. The im portanc e of maint enance is to cont inu e to br ing the new system
to standards.
The activities of the implementation phase can be summarized as: -
Implementation planning Education and training System training
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
41/51
Smart Data Backup Management System
Department of Computer Science, ASIET 41
.TESTING AND IMPLEMENTATION
System testing is the stage of implementation, which is aimed at ensuring
that the system works accurately and efficiently before live operation
commences. An elaborate testing of data is prepared and the system is tested
using this test data. While testing error noted and corrections are made. The
users are trained to operate the developed system. Both hardware and software
securities are made to run the developed system successfully in future. Testing
demonstrates that performance requirements appear to have been met.
TYPES OF TESTING DONE:
Two types of testing are white-box testing and black-box testing.
White-Box testing
White-box testing is a test case design method that uses the control
structure of the procedural design to derive test cases. White-box testing of
software is predicted on close examination of procedural detail.
Black-Box testing
The black-box testing focuses on the functional requirements of the
software. It helps to find out errors in incorrect or missing functions, interface
errors, errors in data structures, performance errors and initialization and
termination errors. The black-box testing is applied during the later stages for
the functional requirement evaluation.
Testing strategy
Unit testingUnit testing focuses verification effort on the smallest unit of the
software design of the module .The unit test is normally white-box oriented,
and the step can be conducted in parallel for multiple modules.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
42/51
Smart Data Backup Management System
Department of Computer Science, ASIET 42
Condition TestingThe condition testing exercises on the conditions contained in a
program module.
Loop TestingLoop testing is a testing technique that focuses exclusively on the
validity of the loop constructs. In the case of the current system the loops are
tested for validity purpose.
Integration TestingWhen the modules of the system are combined together to form the
whole system, there will be the problem of interfacing. Integration testing is a
systematic testing technique for constructing the program structure while
conducting tests to uncover errors associated with interfacing.
Graph Based TestingA graph of important objects ad their relationship is created and then
a series of test is devised that will cover the graph so that each object and
relationship is exercised and error is covered
Validation TestingThe definition for the validation testing is that the validation
succeeds when software functions in a manner that can be reasonably expected
by th e customer. The ex pe ctat ions are defined in the software requ irem ents
specifications.
Validation criteria: If any field is kept blank then a dialogue box
showing an error message will appears .
Output TestingAfter performing the validation testing, the next step is output testing of
the proposed system since no system could be useful if it does not produce the
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
43/51
Smart Data Backup Management System
Department of Computer Science, ASIET 43
required output in the specific format. The output generated or displayed by
the system under consideration is tested asking the users about the format
required by then.
Here, the output is considered into ways: one is on the screen and the
other is printed format. The output format on the screen is found to be correct
as the format designed according to the user needs. For the hard copy also, the
output comes out as specified by the user. Hence output testing doesnt result
in any connection in the system.
User Acceptance TestingUser acceptance testing of a system is the key factor for the success of
any system. The System under consideration is tested for user acceptance by
constantly keeping in touch with the prospective system users at time of
developing and making the Digital Watermarking S ystem.
The testing of the software began along with coding. Since the design was
fully object-oriented, first the interfaces were developed and tested. Then unit
testing was done for every module in the software for various inputs, such that
each line of code at least once executed. After all modules were coded the
integration test were carried out. Some minor errors were found in the output
at the earlier stage and each of them was corrected. In the implementation of
user interface part no major errors were found. After the software was
completely developed, the testing was done. The output of the were correct
and accurate during the time of demonstration after that no errors were
reported.
IMPLEMENTATION
System implementation is the final phase i.e., putting the utility into
action. Implementation is the state in the project where theoretical design
turned into working system. The most crucial stage is achieving a new
successful system and giving confidence in new system that it will work
efficiently and effectively. The system is implemented only after thorough
checking is done and if it is found working in according to the specifications.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
44/51
Smart Data Backup Management System
Department of Computer Science, ASIET 44
It involves careful planning, investigation of the current system and
constraints on implementation, design of methods to achieve. Two checking is
done and if it is found working according to the specification, major task of
preparing the implementat ion are ed ucat ing, tr aining the us ers .
The implementation process begins with preparing a plan for the
implementation of the system. According to this plan, the activities are to be
carried out, discussions made regarding the equipment and resources and the
additional equipment has to be acquired to implement the new system. The
most important in implementation stage is, gaining the users confidence that
the new system will work and be effective. The system can be implemented
only after through testing is done. This method also offers the greatest security
since the existing system can take over if the errors are found or inability to
handle certain type of transactions while using the new system.
User TrainingAfter the system is implemented successfully, training of the user is one
of the most important subtasks of the developer. Even well designed and
technically elegant systems can succeed or fail, because of the way they areoperated and used. For this purpose user manuals are prepared and handled
over to the user to operate the developed system.
Thus the users are trained to operate the developed system. Both the
hardware and software securities are made to run the developed systems
successfully in future. In order to put new application system into use,
preparation of user and system documentation , co nduct ing user training wi th
demo, test run for some period to ensure smooth switching over the system are
to be prepared
Test ReportWe made use of valid username/password or invalid username/password
to test the first login page. Only if the match is found the system moves into
the next page. A similar procedure is a carried out in the registration process
where if the username already exists the registration process fails.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
45/51
Smart Data Backup Management System
Department of Computer Science, ASIET 45
Once the user enters into his home page he can search for the products
and can view his history and the recent visited links these functions were
tested for their functionality and was found to be working according to the
specifications, provision for user to edit his password is also provided.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
46/51
Smart Data Backup Management System
Department of Computer Science, ASIET 46
5. CONCLUSION
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
47/51
Smart Data Backup Management System
Department of Computer Science, ASIET 47
5.CONCLUSION
Disasters both natural and human-caused can threaten your precious files
at any time: a fire, power surge, or leaking pipe could fry your system. Even
without suffering a calamity, there are plenty of other threats to locally stored
datahard drive failure, accidental erasures, or a lost or stolen laptop could
make you a victim of data loss. By data, here, we mean things like your
irreplaceable family photos, videos, and music as well as documents.
Small businesses rely on the availability of their data to keep running, so
data loss is arguably more catastrophic for them than for consumers. In fact, a
recent study of small businesses had suffered data loss: "The top causes of
small business' data loss included hardware/software failure (54 percent),
accidental deletion (54 percent), computer viruses (33 percent) and theft (10
percent ),"
Secure Network Backup System, securely store your files away from your
premises at on -site/o ff-s ite server locations , your data wi ll stay intact and
available even if your local disks are stolen or your premises suffer some
disaster. With more and more emphasis on "cloud computing," it only makes
sense that backup should take advantage of this hot trend in t echnology.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
48/51
Smart Data Backup Management System
Department of Computer Science, ASIET 48
6.FUTURE SCOPE
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
49/51
Smart Data Backup Management System
Department of Computer Science, ASIET 49
6.FUTURE SCOPEThis project is mainly indented to take Backup of data in LAN and
WAN. As future expansion it can be implemented in World Wide Web.
Another feature that can be implemented is incremental backup, which will
enable to save storage space by smart backup. New technologies like Cloud
Computing can be used to make the backup system more effective and
efficient.
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
50/51
Smart Data Backup Management System
Department of Computer Science, ASIET 50
7. REFERENCE
7/28/2019 BTech Mini Project Report [Backup management System] Java project to backup important files to network storag
51/51
Smart Data Backup Management System
7.REFERENCES
Java2 complete reference: Herbert Schildt(Tata McGrawHill)
Using java2 platform: Joseph Weber(PHI)
Java2,AWT,Swing,XML and JavaBeans Programming BlackBook: StevenHolzner, Wiley Dreamtech
Details about netbeans:http://roseindia.com
Details about backup systemshttp://zamadacloudbackup.in
http://archianetwork.com
http://roseindia.com/http://zamadacloudbackup.in/http://archianetwork.com/http://archianetwork.com/http://zamadacloudbackup.in/http://roseindia.com/