Call us Now for Inquiries on 08168759420 and 08068231953

DESIGN AND IMPLEMENTATION COMPUTER BASED RESOURCE ALLOCATION SYSTEM IN A DYNAMIC VARIABLE RESOURCE UTILIZATION ENVIRONMENT (CASE STUDY CYBERAFE

ABSTRACT

 

As computational recourse become for use over the internet, a requirement has emerged to configure reviewers to an optional allration to cope with an unpredictable flow of incoming jobs this project describes all architecture that allows the dynamic reconfiguration of severs to process incoming jobs by switching severs between concept . the system makes use o heuristic to make close to optional switching decisions.  Decisions.  A prototype system which holds on existing resource management software had been developed to demonstrate some of the concept which are describe.

 

TABLE OF CONTENTS

 

TITLE PAGE

CERTIFICATION

DEDICATION

ACKNOWLEDGEMENT

ABSTRACT

TABLE OF CONTENTS

 

CHAPTER ONE

1.0   INTRODUCTION

1.1   STATEMENT OF THE PROBLEM

1.2   PURPOSE OF THE STUDY

1.3   AIMS AND STUDY

1.4   SCOPE OF THE STUDY

1.5   LIMITATIONS

1.6   ASSUMPTIONS

1.7   DEFINITION OF TERMS

CHAPTER TWO

2.0   LITERATURE REVIEW

2.1   INTERNET SERVICES

2.1.1                W.W.W.

2.1.2                E. COMMERCE

2.1.3                ELECTRONIC FUND TRANSFER

2.2           INTERNET ACCESS SATELLITE MODEM

2.3           DOMAN NAME SYSTEM (DNS)

2.4           TIMER SERVER

2.5           ROWERS

2.6           FIREWALLS

2.7           DYNAMIC HOST CONFIQURA PROTOCOL

 

CHAPTER THREE                  

3.0   DESCRIPTION AND ANALYSIS

3.1   FAT FINDING METHODS USED

3.2   ORGANIZATIONAL STRUCTURE

3.3   OBJECTIVE OF THE EXISTING SYSTEM

3.4   INPUT, PROCESS AND OUTPUT ANALYSIS

3.5   PROBLEM OF THE EXISTING SYSTEM

3.7   JUSTIFICATION OF HEURISTIC (SYSTEM)

 

CHAPTER FOUR

DESIGN OF THE NEW SYSTEM

4.1   OUTPUT SPECIFICATION AND DESIGN

4.2   INPUT SPECIFICATION AND DESIGN

4.3   FILE DESIGN

4.4   PROCEDURE CHART

4.5   SYSTEM FLOWCHART

4.6   SYSTEM REQUIREMENT

 

CHAPTER FIVE

IMPLEMENTATION

5.1      PROGRAM DESIGN

5.2      PROGRAM FLOWCHART

5.3      SOURCE PROGRAM

5.4      TEST RUN

 

CHAPTER SIX

DOCUMENTATION

6.1        SYSTEM DESCRIPTION

6.2        INSTALLATION

 

 

CHAPTER ONE

 

1.0   INTRODUCTION

There have been considerable activity recently aimed at developing a computing grid – which can be defined as a distributed system on an internet scale that supports collaboration, data sharing, resource sharing across disparate domains and platforms

1.     To enable the submission of jobs to remote sites in a transparent fashion, technologies such as generic dyterm of describing John and defining service level agreements, relating issues such as security, poyomance and quality of service.

2      A resource management system offers facilities that collectively allow users to run John on the pool of computational resources it manages. The pool may be made up of donated resources not being used by their owners at a given time, on resources allocated to the poll on a full-time basis. The lay out of more resource management system (RMS) the involves a central manager that monitors the state of all the machines  in its pool allocates submitted Jobs to resources using scheduling algonthins and holds gueves of Jobs. Other resource management depture  include job prioritizationlocal resource configuration and accounting. The scheduling facility elects the most suitable computational resource description obtained from the pool individual job requirements. A resource management system (RMS) may be used to run jobs submitted by users in a local domain or jobs submitted by user from remote sites working in a dynamic environment.

Here in this project allocation of service to pool in fixed, changes in demand may cause some quewes to become very long, while other servers remain underutilized. This is clearly inefficient it in desirable to develop a policy whereby  servers may be re-allocated from one type of service to another

 

 

 

STATEMENT OF PROBLEM

Cyber café in Nigeria would have been experiencing difficulties the operation and maintenance of resource utilities. The adverse effect on clients or customer and the staff management of the company would work hander to maintain each of these resources and also attend to each different client in other to meet their various needs to ensure that clients and customers are satisfied.

Therefore the introduction of a computer based resource allocation  system in a dynamic resources utilization environment has been of help to cope with the number of clients or customer that would work with this materials to ensure that each of the hardware resource we properly shaved

 

PURPOSE OF STUDY

The work is designed to enable the user to practically participate and use a resource allocate system to enable the management of the café to so we these problem it encounters during the allocation of its resources.

A computerized cyber café, can destitute its various resources to  all the clients of workgroup in the cyber cafe  efficient in its allocation by making sever that the hardware that needs the resources most user it.

 

AIMS AND OBJECTIVES

The main aim of this study is to design a computer based resource allocation system in a dynamic resource utilization environment

Another objectives of the study is to design a computer based system that will ensure that cyber café  get their resources well allocated. It needs an appropriate percentage suitable fro them without any delay,

 

Another objective of the study is to design a computer based system to enable cyber café work dynamically in reler to allocate its various resources to punler, work groups etc.

 

SCOPE OF STUDY

This project work of resource allocation system in a dynamic resource utilization environment is centered on the cyber cafes lie. Allocation of resource to different sections or hardware in the café

Limitation

This project work encountered many limitations. Such as:

1      Finance:- this was the major linderancce to my movement in the resource of gathering fact

Time this is another constraint to my undertaking a more comprehensive fact finding. Suie the period for this study was too short compered   to the actual work

 

 

LACK OF TEXTBOOKS

This is also another major constraint in the course of carrying out this work. One had to move from library to library in search of textbook

 

ASSUMPTION

In the course of this study, the following assumption were made

1.     That all the data collected in the process of this study  were correct and the program is the best of my ability able to perform the purpose for which it is installed.

2      that the staff to handle the system (computer system) we assumed to be computer iterate for efficient handle of data, through the program which will be user friendly.

3      computer as a fact machine will make cyber café accept it for the allocation of its resources in a dynamic environment.

4.     that the management of cyber café should b able to put all the necessary facilities for the installation of computer system at also train  staff

 

DEFINITION OF SOME TERMS

Unauthorized access is the use of an account owned by another user to access a system

 

TYPES OF INFORMATION  

Any information stored online in open to the threat of theft, a password file might be stolen to run a cracking program against the file at another computer

Encryption

Is the ability to protect the contents of internet manages one can use a message security which uses a recording method to decode the message.

 

 

 

HOW TO GET THE FULL PROJECT WORK

 

PLEASE, print the following instructions and information if you will like to order/buy our complete written material(s).

 

HOW TO RECEIVE PROJECT MATERIAL(S)

After paying the appropriate amount (#5000) into our bank Account below, send the following information to

08139462710 or 08137701720

 

(1)    Your project topics

(2)     Email Address

(3)     Payment Name

(4)    Teller Number

We will send your material(s) immediately we receive bank alert

 

BANK ACCOUNTS

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 0046579864

Bank: GTBank.

 

OR

Account Name: AMUTAH DANIEL CHUKWUDI

Account Number: 2023350498

Bank: UBA.

 

HOW TO IDENTIFY SCAM/FRAUD

As a result of fraud in Nigeria, people don’t believe there are good online businesses in Nigeria.

 

But on this site, we have provided “table of content and chapter one” of all our project topics and materials in order to convince you that we have the complete materials.

 

Secondly, we have provided our Bank Account on this site. Our Bank Account contains all information about the owner of this website. For your own security, all payment should be made in the bank.

 

No Fraudulent company uses Bank Account as a means of payment, because Bank Account contains the overall information of the owner

 

CAUTION/WARNING

Please, DO NOT COPY any of our materials on this website WORD-TO-WORD. These materials are to assist, direct you during your project.  Study the materials carefully and use the information in them to develop your own new copy. Copying these materials word-to-word is CHEATING/ ILLEGAL because it affects Educational standard, and we will not be held responsible for it. If you must copy word-to-word please do not order/buy.

 

That you ordered this material shows you have agreed not to copy word-to-word.

 

 

FOR MORE INFORMATION, CALL:

08139462710 or 08137701720

 

YOU CAN ALSO CALL:

08068231953, 08168759420

 

 

Visit any of our project websites below:

www.easyprojectmaterials.com

www.easyprojectmaterials.com.ng

www.easyprojectmaterial.net

www.easyprojectmaterial.net.ng

www.easyprojectsolutions.com

www.worldofnolimit.com

www.worldofnolimit.com

www.nairaproject.com.ng

www.nairaprojects.com.ng

www.nairaproject.net

www.nairaprojects.net

www.uniproject.com.ng

www.uniprojects.com.ng

 

 

 

 

 

 

Tags:

7 years ago 0 Comments Short URL

Author: daniel

Enjoyed this Post? Share it!

Share on Facebook Tweet This!

Comments are closed.