• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Smart Card System

Extracts from this document...

Introduction

Chapter 1: Client- Server Technology 1.1 Client-Server Concept and Architecture The term "client/server" implies that clients and servers are separate logical entities that work together, usually over a network, to accomplish a task. Client/server is more than a client and a server communicating across a network. Client/server uses asynchronous and synchronous messaging techniques with the assistance of middle-ware to communicate across a network. Client/Server uses this approach of a client (UI) and the server (database I/O) to provide its robust distributed capabilities. The company, Sigma has used this technique for over 15 years to allow its products to be ported to multiple platforms, databases, and transaction processors while retaining a product's marketability and enhanced functionality from decade to decade. Sigma's client/server product uses an asynchronous approach of sending a message to request an action and receives a message containing the information requested. This approach allows the product to send intensive CPU processing requests to the server to perform and return the results to the client when finished. Sigma's architecture is based on re-usability and portability. Sigma currently uses a standard I/O routine, which is mutually exclusive from the user interface. Sigma's current architecture supports character-based screens and a variety of databases where the user interface is independent of the database access. This architecture corresponds directly to the architecture used in a GUI Client/Server environment. Sigma's client/server product uses an asynchronous approach of sending a message to request an action and receives a message containing the information requested. A traditional client/server application is that of the File Server where clients request files from the File Server. This results in the entire file being sent to the client but necessitates many message exchanges across the network. Another traditional client/server application is that of the Database Server where clients pass SQL requests to the server. The Database Server executes each SQL statement and passes the results back to the client. ...read more.

Middle

In other words, system, which other than windows might need to undergoes testing with the system and it is quite difficult to provide the same level of quality assurance in this case. The ability of the system to evolve is also needed to take into consideration. However, the adding of the new function or so-called components will need through analysis and this may cause budget increased before any adding could be done. This is mainly because the integration needs great efforts. 6.5 Function-Point Metrics Calculate Measure Parameters Measurement parameter Count Simple Average Complex Number of user inputs 15 X 3 4 6 = 60 Number of user outputs 20 X 4 5 7 = 140 Number of user inquiries 5 X 3 4 6 = 30 Number of files 1 X 7 10 15 = 15 Number of external interfaces 27 X 5 7 10 = 135 Count Total 380 Calculate Functions 1. Does the system require reliable backup and recovery? No 2. Are data communications required? Yes 3. Are there distributed processing functions? No 4. Is performance critical? Yes 5. Will the system run in an existing heavily utilized operational environment? No 6. Does the system require on-line data entry? Yes 7. Does the on-line data entry require the input transaction to be built over multiple screens or operation? Yes 8. Are the master files updated on-line? Yes 9. Are the inputs, outputs, files or inquiries complex? Yes 10. Is the internal processing complex? Yes 11. Is the code designed to be reusable? No 12. Are the conversion and installation included in the design? No 13. Is the system designed for multiple installations in different organization? No 14. Is the system designed to facilitate change and ease of use by users? Yes ?FI = 8 Function Point = Count Total X [ 0.65 + 0.01 X ?FI ] = 380 X [0.65 + 0.01 X 8] = 380 X [0.65 + 0.08] = 380 X 0.73 = 277.4 Chapter 7: System Design And ...read more.

Conclusion

To test the system. 21 Mac 2001 To document the testing result. To document the valid data. To document the valid data. 22 Mac 2001 To document the testing result. To document the invalid data To document the invalid data. 23 Mac 2001 To produce the testing report. 1. To document the various testing methods that has been conducted by team. 2. To compile the valid data and the invalid data thay has been documented earlier. To produce the project objective report for testing. 24 Mac 2001 Compile the Final Documentation Report To compile all the documentation regarding to the project planning. To compile the project planning report. 25 Mac 2001 Compile the Final Documentation Report To compile all the literature review that has been studied earlier. To compile the literature review report. CSC 566 COMPUTER PROJECT MANAGEMENT WEEKLY REPORT WEEK NO: 13 GROUP NO/NAME: MAXTEC GROUP MEMBERS: Tan She Loo 790620-01-5609 Tan Chin Heng 800718-08-5097 Lau Siew Kong 810803-13-5273 Yap Jian Heung 801228-12-5505 Date ACTIVITY DETAILED REPORT (OF ACTIVITY) REMARKS/ACTION BY GROUP REMARKS/ ACTIONS BY THE LECTURER SIGNATURE OF THE LECTURER 26 Mac 2001 Compile the Final Documentation Report. To compile all the documentation regarding the system requirement specification and design specification. To compile the requirements specification and design specification report. 27 Mac 2001 Compile the Final Documentation Report To compile the entire document for the system. To produce the Final Documentation of the system 28 Mac 2001 To produce the user manual. To document the step-by-step instruction to use the system. To produce the step-by-step instruction to use the system. 29 Mac 2001 Presentation preparation To identify what features should be presented during the demo session. Identifying the features that need to be presented. 30 Mac 2001 Project Submission and presentation 1. To demo the final system to our supervisor. 2. To submit the Final Documentation Report for assessment. 1. To demo the final system to lecturer. 2. Submit the Final Documentation Report. Implementation Of Intelligent Computer Lab Access Control Using Smart Card By Secure And Reliable Cryptography Prepared by MAXTEC December 2000 Session Page: 20 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. System Analysis The aim of the Jewellery store system is to make the work ...

    These various activities are called phases of the SDLC. Following are the different phases of the SDLC: 1. Problem Definition 2. Feasibility Study 3. System Analysis 4. System Design 5. Software Development 6. Testing 7. Implementation 8. Maintenance SDLC is also known as Classic Life Cycle Model, Linear Sequential Model or Water Fall Model.

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    Disadvantage Despite being direct, access times are slow because of the limited speed of rotation possible and the relatively crude nature of the read heads. 3.Magnetic hard disk Data is stored in the same way as on a floppy disk.

  1. What are the principle advantages and disadvantages of the Airbus A380 in respect of ...

    come under this Code, unfortunately for airports and or Airbus it will be under a Code F. A380 falls into this category due to its wing span of 79.75m. To satisfy Code E criterion the wing span must be no more than 65m, the B747-400 remains Code E with a span of 64.44m.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    in which it may be passed and to whom it may be passed and whether or not it may be transferred from country to country, if yes, which countries. This is filled in on the registration form given by the Data Registrar and is then sent off, along with a fee for registration (around �70).

  1. Identify the constituent parts of a total computer system.

    A computer cannot work without an operating system. Remember, without an operating system you cannot use your computer. On a microcomputer an operating system will: * deal with the transfer of programs in and out of memory * allow the user to save files to a backing store * control

  2. Influential Factors in Choosing a Programming Language

    (Wikipedia 3, 2011) One way this is done is through the Common Language Infrastructure (CLI) specification, which is implemented using Mono and Microsoft's .NET. These allow any language that meets the CLI specification to be able to be run by their virtual machine.

  1. Justify a particular installation or upgrade. I have installed a Microsoft Visio because ...

    When this happens system restore will allow you to go back to a recovery point that you made before installing the new software. Your computer is also able to automatically create restore checkpoints. It will do it by itself and depending on how often you use your computer will depend on how many checkpoints your computer does.

  2. Signal Theory

    Asynchronous Opposite to synchronous it uses start and stop bits to mark the start and end of a transmission, this means that 8 bit ASCII characters would be transmitted using 10 bits because the use of start and stop bits.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work