Top Banner
1 Preface Table of Contents 1. SOFTWARE DEVELOPMENT LIFE CYCLE……………………….......2 2. PLATFORM KNOWLEDGE………………………………………………….6 2.1 INTRODUCTION-DOTNET 2.2 FRAMEWORK 2.3 C #(C SHARP) 2.4 WINDOW APPLICATION 2.5 WEB APPLICATION 2.6 MS SQL 3. DOMAIN KNOWLEDGE…………………………………………………… 11 3.1 INTRODUCTION-NETWORKING 3.2 ADVANTAGES 4. PROJECT USE IN DOMAIN………………………………………….......14 5. ABOUT PROJECT …………………………………………………………….14 5.1 ABSTRACT 5.2 SCOPE OF THE PROJECT 5.3 PROBLEMS IN EXISTING SYSTEM 5.4 PROPOSED SYSTEM 5.5 TECHNICAL TERMS 6. HARDWARE AND SOFTWARE REQUIREMENTS.………………..18
24

SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

Feb 06, 2023

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

1

Preface

Table of Contents

1.SOFTWARE DEVELOPMENT LIFE CYCLE……………………….......2

2.PLATFORM KNOWLEDGE………………………………………………….6

2.1 INTRODUCTION-DOTNET

2.2 FRAMEWORK

2.3 C #(C SHARP)

2.4 WINDOW APPLICATION

2.5 WEB APPLICATION

2.6 MS SQL

3.DOMAIN KNOWLEDGE…………………………………………………… 11

3.1 INTRODUCTION-NETWORKING

3.2 ADVANTAGES

4.PROJECT USE IN DOMAIN………………………………………….......14

5.ABOUT PROJECT …………………………………………………………….14

5.1 ABSTRACT

5.2 SCOPE OF THE PROJECT

5.3 PROBLEMS IN EXISTING SYSTEM

5.4 PROPOSED SYSTEM

5.5 TECHNICAL TERMS

6.HARDWARE AND SOFTWARE REQUIREMENTS.………………..18

Page 2: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

2

1.OUR SOFTWARE DEVELOPMENT

Phase 1: DEVISING During the planning phase, the objective of the

project is determined and the requirements to produce the

software are considered. An estimate of resources, such as

personnel and costs, is prepared, along with a concept for the

new software. All of the information is analyzed to see if there

is an alternative solution to creating a new software. If there

is no other viable alternative, the information is assembled into

a project plan and presented to management for approval. This

phase is very important as any small mistake in this phase can

result in major issues in the project regarding time, money,

efforts, etc.

Page 3: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

3

Key Activities:

Conduct preliminary investigation/feasibility study

Determine scope of problem/project

Identify constraints to systems development

Identify resources required

Set timelines, schedules, checkpoints, etc.

Set project deliverable goals

Key Outputs:

Decision to proceed

Project plan

Preliminary needs analysis report

Phase 2: SCRUTINY  During the analysis stage the project team determines

the end-user requirements. Often this is done with the assistance

of client focus groups, which provide an explanation of their

needs and what their expectations are for the finished product

and how it will perform. The project team documents all of the

user requirements and gets a sign-off from the client and

management to move forward with system design.

Key Activities:

Gather business requirements

Build trust and rapport with users

Document the existing system

Develop preliminary data and process models

Verify requirements and current system/procedures with users

Page 4: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

4

 Key Outputs:

Systems Requirements Documents

Detailed Project Scope and Deliverables Reports

Data and Process Models

Phase 3: FABRICATION The design phase is the “architectural” phase of

system design. In this phase the system and software design is

prepared from the requirement specifications which were studied

in the first phase. For the user interface, the project team

designs mock-up screen layouts that the developer uses to write

the code for the actual interface. It describes how the proposed

system is to be built.

Key Activities:

Determine technical systems configuration

Determine data structure

Determine make or buy decision

Prototype

Set systems conversion plan

 Key Outputs:

Systems architecture report

Systems conversion chart and plan

Pseudopodia

Data structure diagrams

Phase 4: ERECTION During the construction phase developers execute the

plans laid out in the design phase. The developers design the

Page 5: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

5

database, generate the code for the data flow process and design

the actual user interface screens. During the construction phase,

test data is prepared and processed as many times as necessary to

refine the code.

Key Activities:

Create the physical system

Test the system

Obtain hardware

Create documentation and training materials

Key Outputs:

Tested programs

Databases

Completed system

Training materials

Phase 5: IMPLEMENTATION In this stage, if the software is run on various

systems by users. If it runs smoothly on these systems without

any flaw, then it is considered ready to be launched. the

software is coded with precision. A team of programmers are

assigned by the company to work on the software. More often than

not, the work is sub-divided under a sub-phase called Task

allocation,here each developer is assigned a part of the work

depending on his or her skill sets. This helps complete the

coding efficiently.

Key Activities:

Conduct cutover

Page 6: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

6

Train users/clients

Manage change

Obtain user sign off

 Key Outputs:

Satisfied users/clients

Modification requests

Phase 6: ENDORSEMENT During the test phase all aspects of the system are

tested for functionality and performance. The system is tested

for integration with other products as well as any previous

versions with which it needs to communicate. Essentially, the key

elements of the testing phase are to verify that the system

contains all the end user requirements laid out in the analysis

phase, that all the functions are accurately processing data,

that the new system works with all other systems or prior

systems, and that the new system meets the quality standards of

the company and the clients.

Key Activities: Test Planning

Test Designing

Test Environment Setup

Test Execution

Test Closure

Key Outputs:

Deliverables Reports

Deployable Units

Page 7: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

7

Phase 7: EVAULATION\MAINTANENCE Maintenance is the process of modifying a software

system or component after delivery to correct faults, improve

performance or other attributes, or adapt to a changed

environment. It consists of the activities required to keep a

software system operational and responsive after it is accepted

and placed into production. Maintenance uses existing test data

with regression testing creating new data for the changes.

Maintenance overcome the below problems ,

Unstructured code

Insufficient knowledge about system and domain

Insufficient documentation

2.PLATFORM KNOWLEDGEDOTNET(FRONT-END)

2.1.INTRODUCTION: .NET is a platform that runs on the operating system Sits on

top on the OS (currently all the Windows; Linux/Unix subset

also available Mono Project).

Provides language interoperability across platforms.

Strong emphasis on Web connectivity, using XML web services

to connect and share data between smart client devices,

servers, and developers/users.

Platform/language independent.

Page 8: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

8

ADVANTAGES: Its supports 40 different Languages i.e. VB.Net,

C#etc.Supports Cross Language Integrity.

When you compile a dot net code it will create MIL (Which is

sort of machine level language), which make it platform

Independent.

It's fully Object orientated Language.Automatic Memory

management.

Automatic Garbage Collection. It is language independent

platform.

Through this technology you can develop web application as

well window application .

It provides cross language inheritance.It supports side by

side execution. 

2.2 FRAMEWORK

Page 9: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

9

The .NET Framework is the heart of

Microsoft .NET. The .NET Framework is a software development

platform of Microsoft .NET. Like any platform, it provides a

runtime, defines functionality in some libraries, and supports a

set of programming languages. The .NET Framework provides the

necessary compile-time and run-time foundation to build and

run .NET-based applications.

2.3 C SHARP(C#) C# (pronounced "C sharp") is a simple, modern,

object-oriented, and type-safe programming language. C# combines

the high productivity of Rapid Application Development (RAD)

languages and the raw power of C++.

Visual C# .NET is Microsoft's C# development

tool. It includes an interactive development environment, visual

designers for building Windows and Web applications, a compiler,

and a debugger. Visual C# .NET is part of a suite of products,

called Visual Studio .NET, that also includes Visual Basic .NET,

Visual C++ .NET, and the JScript scripting language.

ADVANTAGES: C# language is projected to be a simple, modern, general-

purpose, object-oriented programming language.

C# helps you to import a namespace and use the classes in a

component—no COM plumbing or registry lookups required

C# supports XML comments to add comments to code. The

comments are placed into XML format and can then be used as

needed to document your code.

Page 10: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

10

C# simplifies the syntax to be more constant and more

rational while also eliminating some of the more difficult

features of C++. 

C# provides operator overloading which is not available in

VB.NET.

C# allows you to access memory directly using unsafe code

blocks.

2.4 WINDOWS APPLICATION Windows application is an application that runs

on windows desktop. Windows applications will have graphical user

interface (GUI). Because of GUI, designing the application will

be easy and fast. System.Windows.Forms namespace used to build

Windows-based applications. 

ADO.NET is an object-oriented set of libraries

that allows you to interact with data sources. Commonly, the data

source is a database, but it could also be a text file, an Excel

spreadsheet, or an XML file. For the purposes of this tutorial,

we will look at ADO.NET as a way to interact with a data base.

As you are probably aware, there are many

different types of databases available. For example, there is

Microsoft SQL Server, Microsoft Access, Oracle, Borland

Interbase, and IBM DB2, just to name a few. To further refine the

scope of this tutorial, all of the examples will use SQL Server.

DATA PROVIDERS: We know that ADO.NET allows us to interact withdifferent types of data sources and different types of databases.

Page 11: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

11

Provider Name API Prefix Data Source DescriptionODBC Data Provider Odbc Data Sources with an ODBC

interface. Normally older data bases.

OleDb Data Provider OleDb Data Sources that expose an OleDb interface, i.e. Access or Excel.

Oracle Data Provider Oracle For Oracle Databases

SQL Data Provider Sql For interacting with Microsoft SQL Server.

ADVANTAGES: Scalability:

ADO.NET works on DataSet that can represent a whole

database or even a data table as a disconnected object and

thereby eliminates the problem of the constraints of number

of databases being connected. In this way scalability is

achieved.

Data Source Independence:

In ADO.NET DataSet is completely independent of

data source and no way DataSet is controlled by the data

source as it happens in case of RecordSet.

Interopability:

As ADO.NET transmits the data using the format of

XML which is not dependent on ADO.NET or windows platform.

Strongly Typed Fields:

It supports strongly typed fields by using CTS.

Performance:

Page 12: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

12

The performance in ADO.NET is higher in comparison

to ADO that uses COM marshalling.

2.5 WEB APPLICATION ASP.NET is a web application framework

developed by Microsoft that allows developers to build dynamic

web sites, web applications and XML web services. ASP.NET can be

used to create anything from small, personal websites through to

large, enterprise-class web applications.

This ASP.NET class will teach client-

side Web developers with C# experience the fundamentals of Web

application site implementation using Microsoft ASP.NET. The

class focuses on using the Microsoft Visual Studio .NET

environment and the Microsoft .NET platform to create an ASP.NET

Web application that delivers dynamic content to a Web site.

ADVANTAGES: Speed:

With ASP.NET, you can develop a website with

relative quickness. This is because of the many beneficial

features of the language.

Rich Controls:

ASP.NET comes with the a huge collection of rich

server and client side controls that you can use to develop

interactive grids, wizards, calendars, etc. What’s great

about these controls is that most of them can be used right

away.

Security:

Page 13: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

13

ASP.NET comes with built-in security that allows

support for authorization, authentication and other options

for implementation with Kerberos, NTLM as well other

standard.

2.5 SQL SERVER(BACK-END) Microsoft SQL Server is a relationaldatabase management system developed by Microsoft Inc.. As a

database, it is a software product whose primary function is to

store and retrieve data as requested by other software

applications, be it those on the same computer or those running

on another computer across a network (including the Internet).

ADVANTAGES:

Ease of installation, deployment, and use:  SQL Server includes a set of administrative and

development tools that improve your ability to install,

deploy, manage, and use SQL Server across several sites. 

Scalability:

The same database engine can be used across

platforms ranging from laptop computers running Microsoft

Windows 95 to large, multiprocessor servers running

Microsoft Windows NT, Enterprise Edition. 

System integration with other server software:

SQL Server integrates with e-mail, the Internet,

and Windows. 

Page 14: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

14

3. DOMAIN KNOWLEDGE- NETWORKING3.1 INTRODUCTION:

Network is a group of computers and associated device that

are connected by communication facilities.

When two or more computers are joined together so that they

are capable of exchanging information, they form a network.

Real time example-email, chatting.

Network is an interconnected collection of autonomous

computers.

How information travel through the internet

GOALS OF NETWORKING:

Fast communication.

Information can be exchanged at a very fast speed.

Reduced cost.

Page 15: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

15

Sharing resource reduces the cost.

Reliability.

A file can have its copies on two or more computer of

the network.

Resource sharing.

It can be shared software, hardware resource through a

network.

BENEFITS OF NETWORK:

Information sharing Authorized users can use other computers on the

network to access and share information and data.

Hardware sharing: One device connected to a network, such as a printer

or scanner, can be shared by many users.

Software sharing: All of the users can then access the program from a

single location.TYPE OF NETWORK:

Local Area Network (LAN).

Wide Area Network (WAN).

Metropolitan Area Network (MAN).

Local Area Network (LAN):

A Local Area Network spans a relatively small area.

Data travel between network devices via network cables.

Page 16: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

16

Ex: local Area Network

Wide Area Network (WAN):

A Wide Area Network exist over a large area.

Data travels through telephone or cable lines.

Ex: Wide Area Network

Metropolitan Area Network (MAN):

Spread over a city.

E.g. cable TV Networks.

THREE BASIC TOPOLOGY:

Bus topology.

Star topology.

Ring topology.

Bus topology:

All computers are linked by a single line of cable

Star topology:

Page 17: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

17

Multiple computers and peripheral devices are linked to a

central computer, called a host

Ring topology:

Each computer or workstation is connected to two other

computers, with the entire network forming a circle.

3.2 ADVANTAGES: Easy Communication and Speed.

Ability to Share Files, Data and Information.

Sharing Software:

- Users can share software within the network easily.

Security:

- Sensitive files and programs on a network can be

password protected.

Speed-Sharing and transferring files within networks is very

rapid.

FUTURE OF NETWORKING:

Since the networking through serial port is bit slow, same

idea can be implemented through the USB port which is quite fast

as compared to the serial port. Implementing networking by means

of the USB port involves the writing of a USB (universal serial

bus) driver.

CONCLUSION:

In conclusion, A network is any two or more

entities -- be they people, organizations, machines, or whatever

that:

Need to share a resource.

Page 18: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

18

Have a pathway for contacting one another

Have rules for using their common pathway to communicate

about the sharing of resources.

4. PROJECT USE IN DOMAIN File transfer is a generic term for the act of transmitting

files over a computer network like the Internet. There are

numerous ways and protocols to transfer files over a

network.

Computers which provide a file transfer service are often

called file servers. Depending on the client's perspective

the data transfer is called uploading (sending) or

downloading (Receiving).

File transfer for the enterprise now increasingly is done

with Managed file transfer.

A file transfer protocol is a convention that describes how

to transfer files between two computing endpoints.

They are meant solely to send the stream of bits stored as

a single unit in a file system, plus any relevant metadata

such as the filename, file size and timestamp.

5.ABOUT PROJECT

SCATTERED HOARD SUPERVISION IN INFORMATION CENTRICNETWORKS

5.1 ABSTRACT: Information Centric Networks

(ICN) is emerging as the main future networking environment,

Page 19: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

19

given that the vast majority of Internet activities are related

to information access and delivery. The main promise of current

research efforts in the area of Information-Centric Networking

(ICN) architectures is to optimize the dissemination of

information within transient communication relationships of

endpoints. Efficient caching of information is key to delivering

on this promise. In this paper, we look into achieving this

promise from the angle of managed replication of information.

Management decisions are made in order to efficiently place

replicas of information in dedicated storage devices attached to

nodes of the network. In contrast to traditional off-line

external management systems we adopt a distributed autonomic

management architecture where management intelligence is placed

inside the network. Particularly, we present an autonomic cache

management approach for ICNs, where distributed managers residing

in cache-enabled nodes decide on which information items to

cache. We propose four on-line intra-domain cache management

algorithms with different level of autonomicity and compare them

with respect to performance, complexity, execution time and

message exchange overhead. Additionally, we derive a lower bound

of the overall network traffic cost for a certain category of

network topologies. Our extensive simulations, using realistic

network topologies and synthetic workload generators, signify the

importance of network wide knowledge and cooperation.

5.2 SCOPE OF THE PROJECT:

Page 20: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

20

We propose an autonomic cache

management architecture for ICN that dynamically (re-)assigns

information items to caches. Distributed managers make

information item (re-)placement decisions, based on the observed

item request patterns, such as their popularity and locality, in

order to minimize the overall network traffic cost imposed by the

user requests.

5.3 PROBLEMS IN EXISTING SYSTEM: Can’t achieve maximum throughput in this System.

Require global information only.

Control message must be exchange.

Synchronization of transmissions is needed.

Very difficult to use.

Not applicable to the scalable system

Performance is very poor.

Delay is very high.

The existing system does not distribute copies of packet is

cost effective way.

Communication range between nodes where very small due to

heavy traffic.

5.4 PROPOSED SYSTEM:

Can achieve maximum throughput in our system.

Require local information only.

Page 21: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

21

No Control message exchange is required.

No Synchronization of transmissions is needed.

Very easy to use.

It controls traffic on the network communication.

As we are optimizing the routing, packet reaches the end

node without any delinquent effects such as loss of

transmitted data between network, monitor to flicker and

performance of processor in workstation.

To send a packet from source to correct destination without

any traffic, delay problem we have implemented this

procedure.

This system can Applicable to the scalable system

Performance is very better than existing system.

Achieve low delay.

5.5 TECHNICAL TERMSAutonomic cache management system:

Autonomic

self-management envisages systems that can manage themselves

given high-level objectives by administrators. Extending

autonomic management from individual devices to the collective

self-management of networks of such devices results in autonomic

networking.

Information Centric Networks:

Page 22: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

22

Information Centric

Networks (ICN) is emerging as the main future networking

environment, given that the vast majority of Internet activities

are related to information access and delivery.

Distributed Optimization:

The distributed

algorithms are based on an incremental optimization process. A

parameter estimate is circulated through the network, and along

the way each node makes a small adjustment to the estimate based

on its local data. Applying results from the theory of

incremental sub gradient optimization, we show that for a broad

class of estimation problems the distributed algorithms converge

to within an e-ball around the globally optimal value.

Performance Bounds:

Message-passing

systems are compared on the basis of cost and performance.

Finally, the cost, performance, and performance/cost functions

are examined as the number of network nodes becomes very large.

5.5 ALGORITHM DETAILS:Cooperative cache management algorithm:

Here it is called cooperative,

aims at minimizing the overall network traffic cost and hence

each cache manager needs a network-wide view of the request

patterns and the current cache configuration. In addition, since

Page 23: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

23

each replacement decision affects the whole network, some

cooperation in the decision making is required.

Holistic Cache Management Algorithm & Holistic-all Cache

Management Algorithm:

This algorithm called as

holistic also aims at minimizing the overall network traffic cost

and hence requires the same amount of information. On the other

hand, the holistic algorithm requires no coordination of the

actions of the cache manager and the required decisions are made

autonomously by each manager under the assumption of infinite

cost for not retrieving an item. A variation of this algorithm,

that we call holistic-all, is also proposed, where all the

possible beneficial replacements are performed.

Myopic Cache Management Algorithm:

This algorithm called

as Myopic, each manager needs global knowledge of the items

cached in the network, but only local knowledge of demand

patterns.Besides, the myopic algorithm assumes that each manager

acts autonomously and towards minimizing the traffic related to

its own demand.

6.HARDWARE AND SOFTWARE REQUIREMENTSHARDWARE REQUIREMENTS:

PIV 2.8 GHz Processor and Above

RAM 512MB and Above

Page 24: SCATTERED HOARD SUPERVISION IN INFORMATION CENTRIC NETWORKS

24

HDD 40 GB Hard Disk Space and Aboves

SOFTWARE REQUIREMENTS:

WINDOWS OS (Windows 2007)

Visual Studio .Net 2010 Enterprise Edition

Visual Studio .Net Framework (Minimal for Deployment)

version 4.0

Micro Soft SQL Server 2005 or Micro Soft SQL Server

2008