Vous êtes sur la page 1sur 20

c 

Æ 



  
A Ftp search engine is an application that allows you to transfer files to and from FTP servers. In
other words FTP is a means to transfer a file, image, sound or video to and from FTP servers.
With a click of a button you can easily download or upload files from your computer hard disk to
your website or any other FTP server.

File Transfer Protocol makes transferring files easy, as it provides a user friendly interface where
the users can drag and drop files from one computer to another, from one¶s computer to another.

FTP is a powerful application that offers secure, reliable and an efficient way of transferring
files. In order to connect to another server the users have to fill in the ³User ID´ and password
before being granted access to the FTP host. This ensures that you are a legitimate user and
therefore can transfer files to and from one computer to another.

Some FTP hosts allow the user to log in anonymously. Once a connection has been established
with the other server, a complete list of files appears on the right hand side of the screen. On
the left hand side, the files on your computer can be seen. Now you can locate any file you
want to transfer by dragging from one side to another. Besides transferring from one computer
to the FTP host, the user can also delete and rename a file or a folder.

It is a handy application for webmasters. FTP is widely used for website publishing and
maintenance. FTP can be used for uploading and downloading of images,
documents, music and movies. You can share important data in a secure and reliable manner
with friends and colleagues. You can also make a back up of local or remote files.

It is quite usual that everybody wants to share their digital things be it an image to be seen by a
friend, a video to be appreciated or some data file of the home assignment you did. If we talk
about sharing across two machines, there are some set of rules which both of the machines
should follow to successfully communicate to each other. These set of rules are called
Protocols. By successfully communicate means the same data is to be received as it is sent
£ 

from the sender side. There should not be any loss or distortion in between.
There are various protocols for sharing, based upon the type of files, the type of connection
(high speed/low speed), the type of network (Wi-Fi/3G/GPRS etc) or the type of application
you are using. To share the material (off course, digital things like data/images/videos etc)
within a local area, there is a protocol named as File Transfer Protocol (FTP). Two or more
machines can easily communicate with this simple protocol. The sharing may be one to one,
many to many, open to all or password protected. In password protected method, the user has
to input the username and password as set by the server. Server is the main computer or the
terminal which is serving one or more number of clients.

c ‘Æ  

This application based project aimed at serving various FTP needs of students at IIITA. IIITA
has many FTP servers and a person needs to search manually through all the servers to look for a
particular file. This software aimed at providing an interface to the users where they can search
for the files they need and then download the required files without opening any extra
application.

c c 

The main goal of this project is to provide facility to search files on an ftp server so that
user can download files without spending much time in manual searching. Also this
Project provide Ftp client feature so that user can download files from ftp server. This
application is designed to help those uses who want to search files on ftp server faster
and in a short period of time.


c 
Time is very important in present day software industry and nobody wants to spend lots of time
in manual searching on the internet. Everyone wants a faster search engine that can reduce the
time needed in manual searching. This application will be very use full to search files on ftp
 

server and as there is no such application on the internet the users will love to use ftp search
engine also this application is very user friendly and having very simple interface.

c   


A classical systems and software engineering approach is recommended to assure the
development of a Ftp search engine that is fully responsive to a user performance objectives and
resource constraints. This approach includes the following major components:

y‘ Systems analysis, which includes information, needs assessment, requirements analysis,


and requirements specification.
y‘ Systems design, which includes synthesis of alternatives, cost-effectiveness analysis of
alternatives, and specification of criteria for selecting a preferred alternative and detailed
design.
y‘ Systems implementation, which includes forms development, specification of data
collection and entry procedures, development of editing and quality control procedures,
software coding and testing, development of training materials and training, integration
of the software components with other system components (e.g., personnel,
communications, data transfer and assembly, report preparation and distribution,
feedback), and system-level testing.

   !""#  


2.1 Product Perspective

We are surrounded by automated, digital and virtual systems as well as by networked data,
specialized networks.

Till now there is no inter linking of the department information system. As day by day less paper
work is required and regular connectivity with more interaction is needed. The demand of the
information sharing system is growing.
A 


 c c$# % &!#


The system interfaces we will be interacting with database information file. For giving solution
to queries system interact with the database

 c '# &!#

 c !(! &!#


  

‘‘‘‘‘‘‘‘‘‘‘" 


 c & (! &!#




  

‘‘‘‘‘‘‘‘‘‘‘" 


 c %% !  # &!#


The HTTP protocol will be used to facilitate communications between the client and server.

 c %$ # ! #
The minimum memory required is 128 MB of RAM and recommended is 512 MB of RAM.

 c !  #
There are only single modes of operation in the application:
1.‘ User mode

  Æ   #
This section outlines all the main feature of the product.
† 


  c'#)#"

 '#!! # #


y‘ Users should have the elementary computer & internet Knowledge.
y‘ The user should know the details of the work he wants to perform. 

 ##%  #!   #


##%  *

a. The system is having required configuration as well as Operating system.

b. Full working of the system is dependent on the database and availability of Internet

connection.

c. Also have the fulfillment of the required software¶s like Mozilla Firefox, internet

explorer, etc.

  #*



 


&+% #

 ‘+% # !"$##


The requirement analysis is included the study of all possible required objects and
entities related to our project. Like for our first module there are following attributes are
required:

 c,  !" &!#

 ‘Æ   #
Functional requirements define the fundamental actions that must take place in the software in
accepting and processing the inputs and in processing and generating the outputs.

Æ'   -'  

 *Æ'   -'  


 $ Only the administrator should be able to maintain the users¶ accounts such as creating
new users and deleting the existing users¶ accounts.

! !.!#Integrity should be maintained and all the constraints should be satisfied

 !." $ The system should work in various versions of windows.

"!." The system is reliable because the admin take external backup of all information in
uniform time interval.

 ‘&%! +% #

 & (!$# % . #


  c"!." $

This application is reliable, because we can take external backup of database so that if hard disk
will gone down due to any reason so there I no problem related to data lost.

   !"!." $

This application is available to the user 24ɯ7. It is also available to all the users who are using or
connected to the internet but authorized.

   $

‘ The system needs to logs in Password should encrypted and store in the database.
Ë 

‘ The Administrator has the right to block any user if he/she is performing any illegal
activities. 


  ! ! !." $

‘ The system is being developed using such a model easy to modify and make update.
‘ The task of Updating is performed by the administrator only.

   !." $

The coding of this web application is in java therefore, it should be transferable between
different OS and Java container.

 
 
 

 ! /! !/% ##

Changes in the existing system only are made when the necessity to change the existing features
or to add some new features arises or there is any need to replace the existing system by the new
one.


´ 

 0  


ƒ 

 
    

  ‘
‘ ‘   ‘
##%  *

a. The system is having required configuration as well as Operating system.

b. Full working of the system is dependent on the database and availability of Internet
connection.

c. Also have the fulfillment of the required software¶s like Mozilla Firefox, internet
explorer, etc.

  #*

This system is depending on the Networking & SQL server 2005.

  
 !" # ! #

!(!#& (!  % 

 *#  % 
y‘ PC With 256 MB RAM
y‘ Network Interface
y‘ Internet Explorer 6.0 or above
y‘ Availability or volatility of resources
y‘ Standards compliance
y‘ Interoperability requirements
y‘ Interface/protocol requirements

Client on internet will be using HTTP/HTTPS protocol.

y‘ Data repository and distribution requirements


y‘ Security requirements (or other such regulations)
y‘ Memory and other capacity limitations

There should be minimum 128 MB RAM is used in the system for running
JRE 1.5.0 smoothly
c  


y‘ &%! +% #

 Requirement for peak performance 

11+%  " #  #


Processor Intel Intel
Pentium IV Pentium IV
processor processor

Running at Running at
1 GHz 3 GHz
Hard Disk 20 GB 40 GB
RAM 128 MB 2 GB

y‘  (2%% !  #


y‘ &!  !  !"!  +% #3 #  /4





























cc  



  
!"#! 
" #





  ‘  "%  #



! &!"""
To get to a convenient solution we have utilized waterfall model (linear sequential model) of
software development.


c£  

‘ The drawback of the waterfall model is the difficulty of accommodating change after the
process is underway
‘ Inflexible partitioning of the project into distinct stages
‘ This makes it difficult to respond to changing customer requirements
‘ Therefore, this model is only appropriate when the requirements are well-understood.
Due to above drawbacks of the waterfall model the Incremental Model of Evolutionary
development is considered for developing the software.

 ‘ % !""

‘ The incremental model combines elements of the linear sequential model (applied
repetitively) with the iterative philosophy of prototyping.
‘ Rather than deliver the system as a single delivery, the development and delivery
is broken down into increments with each increment delivering part of the
required functionality.
‘ User requirements are prioritised and the highest priority requirements are
included in early increments
‘ Once the development of an increment is started, the requirements are frozen
though requirements for later increments can continue to evolve.



c  


   !" ! /#




A consideration regarding project is that JDK (Java Development Kit) must be compulsorily
installed. The reason for having such a design decision is that as java is across platform software
and is capable of running on any platform.

y‘ Java is simple and secure.


y‘ Java is Object-Oriented.
y‘ Java is Portable.
y‘ Java is Platform Independent.
y‘ Java is Architecture-Neutral.
y‘ Java is distributed.
y‘ Java is Dynamic.
y‘ Java is Multithreaded.
y‘ Java is Robust.
y‘ Provided with Garbage Collector.
y‘ Java is Extensible.
y‘ Java is compiled

'# &!#*
Our project is ftp search engine . So the users will be interacting with JSP (Java Server
Pages) whose programming is done in java.
‘‘‘‘‘g   ‘  ‘
The System has no specific Hardware interface requirements. Although all basic
hardware like monitor, keyboard, and mouse etc. must be present.

‘‘‘‘‘ô
 ‘  ‘
Our software will be using JDK (Java Development Kit) 1.5 for front end, and MySQL
(SQLyog) for back end and My Eclipse 6.0.1 (2) [IDE for Java].

‘‘‘‘‘P
  
‘   ‘
«««««««««



cA  


!# &# /$-


1. Scalability and Flexibility
2. High Performance
3. High Availability
4. Robust Transactional Support
5. Web and Data Warehouse Strengths
6. Strong Data Protection
7. Comprehensive Application Development
8. Management Ease
9. Open Source Freedom and 24 x 7 Support
10. Lowest Total Cost of Ownership


c†  


 c$# %  


‘


c  


##&"(!/!%









cË  


ƒ  !"$# %#/

ƒ c'#*!#!/!%#


c´  


ƒ    $!/!%


cƒ  


+ !/!%&'#



£  


"##!$

'#

."/!$


‘ Java 2: The Complete Reference by Patrick Naughton and Herbert Schildt


‘ Software Engineering (fifth edition) by Ian Somerville
‘ R S. Pressman ,´Software Engineering: A Practitioner's Approach´
‘ http://www.google.co.in


Vous aimerez peut-être aussi