Académique Documents
Professionnel Documents
Culture Documents
INTRODUCTION
1
Cloud Computing Architecture
When talking about a cloud computing [9] system, it's helpful to
divide it into two sections: the front end and the back end. They connect
to each other through a network, usually the Internet. The front end is the
side the computer user, or client, sees. The back end is the "cloud" section
of the system. The front end includes the client's computer (or computer
network) and the application required to access the cloud computing
system. Not all cloud computing systems have the same user interface.
Services like Web-based e-mail programs leverage existing Web browsers
like Internet Explorer or Firefox. Other systems have unique applications
that provide network access to clients. A cloud computing system must
make a copy of all its clients' information and store it on other devices.
The copies enable the central server to access backup machines to
retrieve data that otherwise would be unreachable. Making copies of data
as a backup is called redundancy. There are three types of clouds are
available public cloud, private cloud, hybrid cloud [7].
Public Cloud:
Private Cloud
2
Cloud Hybrid
The cloud infrastructure is a composition of two clouds (private, or
public) that remain unique entities but are bound together by standardized
or proprietary technology that enables data and application portability
(e.g., cloud bursting for load-balancing between clouds).
3
Corporate banking is also available. Companies also transfer and
maintain their accounts.
4
Hardware Requirement:
Software Requirement:
Hardware Requirement:
Processor : Pentium IV
Hard Memory : 40GB
RAM : 1GB
Monitor : Samsung 15 color
Keyboard : 118 keys
Mouse : Logitech
Software Requirement:
5
1.4.1 Asp.Net:
6
of specialized tools including image-editing programs, database programs
and HTML editors.
ASP.NET also enables you to separate HTML design from the data
retrieval mechanism. Therefore changing the HTML deign does not
affect the program that retrieve data from the databases. Similarly,
server-side scripting ensures that changing data sources does not
require a change in HTML documents.
1.4.1.1 Features
7
services, such as automatic reference counting and garbage
collection.
8
elements of an ASP.NET application also include Web service to provide
a mechanism for programs to communicate over the Internet.
1.4.3 Sql-Server:
9
format.SQL Server 2005 provides an end-to-end development
environment that includes many new technologies that empower
developers and significantly increase their productivity.
The following are the features of SQL Server 2005
Build, deploy, and manage enterprise applications that are
more secure scalable and reliable.
Maximize IT productivity by reducing the complexity of
building, deploying, and managing database applications.
Share data across multiple platforms, applications and
devices to make it easier to connect internal and external
systems.
Simplify the integration of back-end systems and data
transfer across firewalls.
Web developers can access data using XML without
relational database programming, while database
administrators can easily manipulate data in XML format
using Transact-SQL (T-SQL) and stored procedure.
1.4.4. Ado.Net:
10
1.4.4.1. Features of Ado.Net:
11
CHAPTER 2
12
2.2 Feasibility Study:
13
2.3 System Design:
2.3.1 Database Design:
A database is a collection of interrelated data stored with minimum
redundancy to serve many users quickly and efficiently. The general
objective of database design is to make the data access easy, inexpensive
and flexible to the user.
Database design is used to define and then specify the structure of
information that is visible to the users of the system. The database must
be normalized one.
Data Normalization:
The entities along with their attributes can be stored in many
different ways into a set of tables [1]. The methods of arranging these
attributes are called normal forms. The theory behind the arrangement of
14
Helps in reduction in the complexity of maintaining data integrity
Ccode Number (20) Created country code of the branch Not null
Address Text (20) Created address of the country Not null
Area Text (20) Brach area of the created country Not null
City Text (15) City name of the branch in the country Not null
State Text (15) State name of the branch in the country Not null
CManager Text (15) Chief manager of the branch Not null
Manager Text (15) Manage of the branch in the country Not null
Cperson Text (15) Contact Person of the branch Not null
BranchAu Text (15) Branch created authentication person Not null
15
Table 2.3 Country Hacker
16
Table 2.5 Customer Account Details
Field Name Data Type Description Constriant
Caid AutoNumber Customer account number Primay Key
CustomerID Text (10) Customer id number Not null
BranchCode Text (5) Branch code of the customer Not null
CardNum Number (16) Credit card number Not null
CRVNum Number (4) CRV number of the credit card Not null
Accno Number (12) Account number of the customer Not null
AccountType Text (10) Account type of the customer Not null
Debitbalance Number (10) balance in the debit account Not null
CreditBalance Number (10) balance of the credit account Not null
ExistAccount Number (15) Referred customer account number Not null
ExistBankName Text (15) Referred customer Bank name Not null
ExistOtherBank Text (15) Other banking details for customer Not null
ExistAcctype Text (10) Account type of the customer Not null
ReferalName Text (15) Name of the existing customer Not null
Dateofcreation Date/Time Date/Time of the account creation Not null
Username Text (15) Username of the existing customer Not null
Psw Text Password of the existing customer Not null
17
Field Name Data Type Description Constriant
Cpid AutoNumber Customer personal id auto number PrimaryKey
Accno Number (15) Account number for the customer Foreign Key
CardNum Number (15) credit card number of the customer Not null
Customerid Number (15) Transaction id number Not null
CrvNum Number (15) Transaction CRV number Not null
Fname Text(20) First name of the customer Not null
Lname Text (20) last name of the customer Not null
Address Text (20) Full address of the customer Not null
Country Text (20) Country details of the customer Not null
Pcod Number (15) Pin code of the area of customer Not null
CLOUD
SERVER ADMIN
(CLOUD TABLE
18
DATABASE)
Fig. 2.1 Login Process
CLOUD
UPDATE SERVER
COUNTRY (CLOUD
DATABASE)
TABLE DETAILS
CLOUD
UPDATE USER SERVER
PERSONAL AND (CLOUD
ACCOUNT TABLE DATABASE
19
)
DETAILS
Fig. 2.3 User Creation
CLOUD
UPDATE THE SERVER
AMOUNT TO (CLOUD
TRANSACTION DATABAS
AND CUSTOMER E)
TABLE
CLOUD
UPDATE THE SERVER VALIDATION NAME AND ACCOUNT
AMOUNT TO (CLOUD 20 SUCCESSFUL NUMBER
TRANSACTION DATABA OF WHOM WE TRANSFER
AND SE)
CUSTOMER
TABLE
Fig. 2.5 Money Transfer
LOGIN
VIEW HACKER LIST
STORE
CLOUD COUNTRY
UPDATE THE SERVER DETAILS
CUSTOMER (CLOUD
CHANGE ADMIN PASSWORD
TABLE DATABASE)
HACKER
VIEW COUNTRY AND BRANCH LIST LIST
UPDATE
CREATE USER
PASSWORD
CLOUD SERVER
(CLOUD
UPDATION ON DATABASE) ACCOUNT AND
PERSONAL
CUSTOMER DETAILS
21
ACCOUT
DETAILS
HOMEPAGE
LOGIN PERSONAL BANKING
MONEY TRANSFER
SUCCESSFULLY
CLOUD
SERVERS 22 UPDATE
(CLOUD TRANSACTION DETAILS
TO DATA BASES
DATABASES)
Fig. 2.8 Overall DFD Diagram: User
Cloud Formation
Create customer
Money integrity
Money transfer
Personal Banking through cloud
Corporate Banking through cloud
23
2.4.1 Cloud Formation:
In Cloud Formation Module it will take us to create country zone.
While creating the country we need to specify the unique country code
and code number for each and every state. According to this project we
put some limits such as country can have only 10 branches. If we try to
insert more than 10 branches it will provide a message about the limits. If
the same country code was used create a new country it will provide a
message as country code already exists error message. When proper data
was entered for the branch, bank will be creates in that particular country
successfully and an acknowledgement will be received.
24
2.4.4 Money Transfer:
In the money transfer form we need to specify the both customers
information such as account number, name of the account holder, branch
code, account mode credit or debit, and the sender has to specify the
amount of transfer. When user click transfer in the background process
the customer account balance will be checked with the transfer amount. If
the customer balance is lower than the amount specified for transfer
means an error message is specified for the user and the transaction will
be incomplete. When the user has the sufficient balance the transaction
will take place successfully the transfer amount will be reduced from the
sender amount and that amount will be added to the receiver amount.
After those process completed successfully a message will be displayed
to the user about the transaction.
25
change their password according to their wish to maintain their security.
If the account holder provides the wrong user ID or Password it will
provide an error
2.5 Testing:
In Cloud Systems [8] we are using two familiar testing tools HPs
LOAD RUNNER, IBMS RATIONAL PERFORMANCE TESTER.
26
2.5.1 Testing Methodologies:
SOASTA Cloud Test is the first product [8] to be incorporated into this
methodology and extend traditional approaches to address the new
opportunities and challenges presented by cloud testing.
These include:
27
2.5.3. Security Testing:
SOASTA CLOUDTEST [8] is the test tool for testing the cloud
systems entirely. This tool will work effectively under cloud
environments.
28
2.5.5 Test Cases:
29
While implementing cloud system main issue is security. While
using public clouds there is no security for our data. But we are using
private cloud. It is purely for a single organization purpose.
CHAPTER 3
30
CONCLUSION
3.1 Conclusion:
Cloud computing (cloud) is an evolving term that describes the
development of many existing technologies and approaches to computing
into something different. Cloud separates application and information
resources from the underlying infrastructure, and the mechanisms used to
deliver them.
Cloud computing brings significant promise in terms of scalability,
reliability, competitive advantage, cost reductions, simplified
maintenance and management of applications across the enterprise, along
with high availability and automation. Rated as one of the key area of
innovative implementation for enterprises, by experts and analysts, it is
expected to bring ample change in the way computing is approached in
todays world.
31
The system can be further enhanced by adding new features and
facilities. Abstract the hosting platform as set of virtual resources (i.e.
compute, storage, and network). Manage those resources based on
scalability and availability needs. So we can implement the Cloud
Infrastructure Services (IaaS) further. Ensure the token provisioning
identity federation and claims transformation for Security data
transformation.
Software as a service (SaaS) computing can implement the
supporting service based data integrity for huge data transformation with
secured way. More security features will be added in the system for
effective transmission.
The system will be further enhanced to provide loan facilities to the
customers.
32
APPENDIX
Screen Layouts
33
34
35
36
37
38
39
40
41
42
43
44
45
46
REFERENCES
47