Professional Documents
Culture Documents
INTRODUCTION
1
Cloud Computing Architecture
When talking about a cloud computing [9] system, it's helpful to
divide it into two sections: the front end and the back end. They connect
to each other through a network, usually the Internet. The front end is the
side the computer user, or client, sees. The back end is the "cloud" section
of the system. The front end includes the client's computer (or computer
network) and the application required to access the cloud computing
system. Not all cloud computing systems have the same user interface.
Services like Web-based e-mail programs leverage existing Web
browsers like Internet Explorer or Firefox. Other systems have unique
applications that provide network access to clients. A cloud computing
system must make a copy of all its clients' information and store it on
other devices. The copies enable the central server to access backup
machines to retrieve data that otherwise would be unreachable. Making
copies of data as a backup is called redundancy. There are three types of
clouds are available public cloud, private cloud, hybrid cloud [7].
Public Cloud:
Private Cloud
2
Cloud Hybrid
The cloud infrastructure is a composition of two clouds (private, or
public) that remain unique entities but are bound together by standardized
or proprietary technology that enables data and application portability
(e.g., cloud bursting for load-balancing between clouds).
3
Corporate banking is also available. Companies also transfer and
maintain their accounts.
4
1.3 System Configuration:
Hardware Requirement:
Software Requirement:
Hardware Requirement:
Processor : Pentium IV
Hard Memory : 40GB
RAM : 1GB
Monitor : Samsung 15 color
Keyboard : 118 keys
Mouse : Logitech
Software Requirement:
5
1.4 Programming Environment:
1.4.1 Asp.Net:
6
ASP.NET applications [10] can be coded using a plain text edited
such as notepad, although this not the most efficient method to use.
Developing all the other resources that might be required for a particular
ASP.NET application, especially for the user interface, may involve
range of specialized tools including image-editing programs, database
programs and HTML editors.
• ASP.NET also enables you to separate HTML design from the data
retrieval mechanism. Therefore changing the HTML deign does
not affect the program that retrieve data from the databases.
Similarly, server-side scripting ensures that changing data sources
does not require a change in HTML documents.
1.4.1.1 Features
7
• Simplicity - ASP.NET enables you to build user interfaces that
separate application logic from presentation content. In addition,
CLR simplifies application development by using managed code
services, such as automatic reference counting and garbage
collection.
8
you to include user interfaces, such as Textbox, listbox controls and
application logic of Web applications, and configuration files enable you
to store the configuration settings of an ASP.NET application. The
elements of an ASP.NET application also include Web service to provide
a mechanism for programs to communicate over the Internet.
1.4.3 Sql-Server:
9
developer, database administrator, information worker, or decision
maker, SQL Server 2005 provides innovative solutions that help you gain
more value from your data whether stored in a relational database or
XML data format.SQL Server 2005 provides an end-to-end development
environment that includes many new technologies that empower
developers and significantly increase their productivity.
The following are the features of SQL Server 2005
• Build, deploy, and manage enterprise applications
that are more secure scalable and reliable.
• Maximize IT productivity by reducing the
complexity of building, deploying, and managing
database applications.
• Share data across multiple platforms, applications
and devices to make it easier to connect internal and
external systems.
• Simplify the integration of back-end systems and
data transfer across firewalls.
• Web developers can access data using XML
without relational database programming, while database
administrators can easily manipulate data in XML format
using Transact-SQL (T-SQL) and stored procedure.
1.4.4. Ado.Net:
10
1.4.4.1. Features of Ado.Net:
11
CHAPTER 2
12
2.2 Feasibility Study:
13
2.3 System Design:
2.3.1 Database Design:
A database is a collection of interrelated data stored with minimum
redundancy to serve many users quickly and efficiently. The general
objective of database design is to make the data access easy, inexpensive
and flexible to the user.
Database design is used to define and then specify the structure of
information that is visible to the users of the system. The database must
be normalized one.
Data Normalization:
The entities along with their attributes can be stored in many
different ways into a set of tables [1]. The methods of arranging these
attributes are called normal forms. The theory behind the arrangement of
Ccode Number (20) Created country code of the branch Not null
Address Text (20) Created address of the country Not null
Area Text (20) Brach area of the created country Not null
City Text (15) City name of the branch in the country Not null
State Text (15) State name of the branch in the country Not null
CManager Text (15) Chief manager of the branch Not null
Manager Text (15) Manage of the branch in the country Not null
Cperson Text (15) Contact Person of the branch Not null
15
Table 2.3 Country Hacker
16
Table 2.5 Customer Account Details
Field Name Data Type Description Constriant
Caid AutoNumber Customer account number Primay Key
CustomerID Text (10) Customer id number Not null
BranchCode Text (5) Branch code of the customer Not null
CardNum Number (16) Credit card number Not null
CRVNum Number (4) CRV number of the credit card Not null
Accno Number (12) Account number of the customer Not null
AccountType Text (10) Account type of the customer Not null
Debitbalance Number (10) balance in the debit account Not null
CreditBalance Number (10) balance of the credit account Not null
ExistAccount Number (15) Referred customer account number Not null
ExistBankName Text (15) Referred customer Bank name Not null
ExistOtherBank Text (15) Other banking details for customer Not null
ExistAcctype Text (10) Account type of the customer Not null
ReferalName Text (15) Name of the existing customer Not null
Dateofcreation Date/Time Date/Time of the account creation Not null
Username Text (15) Username of the existing customer Not null
Psw Text Password of the existing customer Not null
17
Table 2.6 Customer Personal Information
CLOUD
18
SERVER ADMIN
(CLOUD TABLE
DATABASE)
Fig. 2.1 Login Process
CLOUD
UPDATE SERVER
COUNTRY (CLOUD
TABLE DETAILS DATABASE)
CLOUD
UPDATE USER SERVER
(CLOUD
PERSONAL AND 19
DATABASE
ACCOUNT TABLE )
DETAILS
Fig. 2.3 User Creation
CLOUD
UPDATE THE SERVER
AMOUNT TO (CLOUD
TRANSACTION DATABAS
AND CUSTOMER E)
TABLE
LOGIN
VIEW HACKER LIST
STORE
CLOUD COUNTRY
UPDATE THE SERVER DETAILS
CUSTOMER (CLOUD
CHANGE ADMIN PASSWORD
TABLE DATABASE)
HACKER
VIEW COUNTRY AND BRANCH LIST LIST
UPDATE
PASSWORD
CREATE USER
CLOUD SERVER
(CLOUD
UPDATION ON DATABASE)
ACCOUNT AND
CUSTOMER 21 PERSONAL
ACCOUT DETAILS
DETAILS
HOMEPAGE
LOGINPERSONALBANKING
MONEY TRANSFER
SUCCESSFULLY
CLOUD
SERVERS 22 UPDATE
(CLOUD TRANSACTION DETAILS
DATABASES) TO DATA BASES
Fig. 2.8 Overall DFD Diagram: User
• Cloud Formation
• Create customer
• Money integrity
23
• Money transfer
24
passed successfully and we click the deposit amount button the amount
will be deposited to that account number, a message will appear for the
conformation of the deposited amount. Particular account holder bank
details will be displayed in the form.
25
In the Corporate bank the current account holder has the rights to
check there account information, list of transaction done in their account,
Account balance, Account holders personal information’s. The account
holder can view that information only with the unique user id and
password provided by the bank. The account holder has the rights to
change their password according to their wish to maintain their security.
If the account holder provides the wrong user ID or Password it will
provide an error
2.5 Testing:
In Cloud System’s [8] we are using two familiar testing tools HP’s
LOAD RUNNER, IBM’S RATIONAL PERFORMANCE TESTER.
26
2.5.1 Testing Methodologies:
These include:
27
2.5.3. Security Testing:
SOASTA CLOUDTEST [8] is the test tool for testing the cloud
systems entirely. This tool will work effectively under cloud
environments.
28
2.5.5 Test Cases:
29
While implementing cloud system main issue is security. While
using public clouds there is no security for our data. But we are using
private cloud. It is purely for a single organization purpose.
CHAPTER 3
30
CONCLUSION
3.1 Conclusion:
Cloud computing (‘cloud’) is an evolving term that describes the
development of many existing technologies and approaches to computing
into something different. Cloud separates application and information
resources from the underlying infrastructure, and the mechanisms used to
deliver them.
Cloud computing brings significant promise in terms of scalability,
reliability, competitive advantage, cost reductions, simplified
maintenance and management of applications across the enterprise, along
with high availability and automation. Rated as one of the key area of
innovative implementation for enterprises, by experts and analysts, it is
expected to bring ample change in the way computing is approached in
today’s world.
31
The system can be further enhanced by adding new features and
facilities. Abstract the hosting platform as set of virtual resources (i.e.
compute, storage, and network). Manage those resources based on
scalability and availability needs. So we can implement the Cloud
Infrastructure Services (IaaS) further. Ensure the token provisioning
identity federation and claims transformation for Security data
transformation.
Software as a service (SaaS) computing can implement the
supporting service based data integrity for huge data transformation with
secured way. More security features will be added in the system for
effective transmission.
The system will be further enhanced to provide loan facilities to the
customers.
32
APPENDIX
Screen Layouts
33
34
35
36
37
38
39
40
41
42
43
44
45
46
REFERENCES
Compliance”, O’REILLY.
6. Toby velte, Antony Velte, Robert Elsenpeter (2009), “Cloud
computing: A practical Approach” , TATA McGraw HILL.
7. http://www.docstoc.com/docs/6533575/What-Is-Cloud.
8. http://www.docstoc.com/docs/5852681/Testing-the-cloud .
9. http://www.docstoc.com/docs/34803287/Cloud-Computing.
10. www.infosys.com/finacle/finacle-connect/Tech_Watch.doc.
11. www.w3schools.com/aspnet/default.asp.
47