Design and Implement A Computerized System For File Sharing and Access Control
Design and Implement A Computerized System For File Sharing and Access Control
---------Project supervisor
--------------Head of department
--------------
External Examiner
DEDICATION
This project work is dedicated to Almighty God.
ACKNOWLEDGEMENT
It is worthy to appreciate those whose efforts and
support made it easier for me to carryout this project work
successfully.
My immensurable appreciation goes to Almighty God
for his guidance, protections, favours, success and good
health which contributed to the success of this research
work, I remain ever indebted for his infinite mercies and
abundant blessings.
I appreciation all my departmental lectures whose
effort made it possible for me to conclude this programme,
my immense gratitude goes to my project superior --------for his advice, assistance and encouragement throughout
my study, I also acknowledge the following; Dr. Mrs. -------whose motherly advice goes along way in closing both my
attitude, knowledge and skill gap, others are, Mr. ------, Mr.
------------, Mr. -------- and my honorable HOD Mr. --------
------,
-------,
----------,
and
many
others
and
not
conclude
this
acknowledgement
without
ABSTRACT
which
has
been
affecting
the
administrative
administrative
activities
and
dissemination
of
The use of file and file sharing in this context is based upon
modular approach of programming.
TABLE OF CONTENT
TITLE PAGE
CERTIFICATION
DEDICATION
ACKNOWLEDGEMENT
ABSRACT
CHAPTER ONE
1.1
INTRODUCTION
1.2
1.3
1.4
1.5
1.6
1.7
DEFNITION OF TERMS
CHAPTER TWO
2.0
LITERATURE REVIEW
9
2.1 INTRODUCTION
2.2 TYPES OF FILE
2.3 FILE ORGANIZATION
2.4 FILE ACCESS
2.5 FILE ACCESS CONTROL
2.6 ACCESS TIME
2.7 WRITING TO DISK AND READING FROM DISK
2.8 STORAGE DEVICES
2.9 FILE AND SYSTEM SECURITU
CHAPTER THREE
3.0
4.0
INTRODUCTION
3.2
3.3
ORGANIZATIONAL CHART
3.4
3.5
DATA COLLECTION
10
3.6
3.7
PROBLEM DEFINITION
3.8
SYSTEM DESIGN
3.9
SYSTEM SPECIFICATION
5.0
CODING
4.2
TEST RUNNING
4.3
4.4
4.5
TRAINNING OF OPERATOR/STAFF
4.6
SYSTEM MAINTENANCE
CHAPTER FIVE
5.0
6.0
SUMMARY
11
5.2
RECOMMENDATION
5.3
CONCLUSION
BIBLIOGRAPHY
APPENDICE
CHAPTER ONE
1.1 INTRODUCTION
Almost all information stored in a computer must be in
a file. Each document is stored in the computer individually
by name in what is called a FILE. A file is a collection of
letters, numbers and special characters.
It may be a
For
you access the file sequentially (you read one line at a time
starting at the beginning) and also when you can write by
creating a new file from scratch (or over writing an existing
one) or by appending to an existing one.
Different
programming
languages
have
different
The
13
it.
14
an
protect
the
confidentiality,
It will also
integrity
and
It
will
help
to
solve
the
problem
faced
by
administrative department
2.
3.
16
4.
17
necessary facts.
2.
18
4.
DATA:
SYSTEM.IO NAMESPACE:
19
DATABASE:
20
RECORD:
21
CHAPTER TWO
22
For
are
list,
tables
of
rate
of
payment,
It
24
A files organization is
25
without
regards
to
the
sequence
either
26
SERIAL ACCEESS
The only way to access a serially organized file is serially.
This simply means that each record is read from the disk
into main storage one after the other in the order they occur.
i.e. to start at the first record on the file, then go on to the
next and son on through to the end of the file.
With
SEQUENTIAL ACCESS
Sequential access is the access of records on sequential
organized file. Without using an index. Sequential access is
27
DIRECT ACCESS
This is where you can read only record or write new record
without having to wait for the database to read all the other
records. In a direct access file, one of the fields in the table
must be set up as a primary key i.e. direct access is a
method of locating an individual record in a file directly
without having to look through any other record first.
28
Passwords are used for access control than any other type of
solution because they are easy to implement and are
extremely versatile.
It is used in a
30
systems
allow
users
to
access
systems
and
31
ACCESS TIME
Access time on disk is the time interval between the moment
the command is given to transfer data from disk main
storage and the moment this transfer is completed. It is
made up of three components which are;
32
33
34
ii.
35
36
2. SECONDARY MEMORY
This is an auxiliary or backing store, it is not permanently
fixed into the computer. It is slower in operation than the
primary memory because the man memory is accessed
directly by the main memory before it can be accessed by
the processor. Details of the secondary storage device would
be given sequent topics subsequent topics since file sharing
and Access is anchored in these storage devices.
37
38
1. PUNCHED CARD
This is the earliest medium for data input into the computer.
French (1972) explains that Data in the punch card is
prepared by punching holes into a card with the punched
machine where a set of holes represent a character. The data
punched into the card is visible to enable on optical
verification by reading, alternatively, another operator would
repunched the data with the already punched card using
varieties. The card using varieties. The card is like a type
written but has sticked and hopes for fin cards before and
after and after punching respectively.
39
2. PAPER TAPE
A tape file channels, it was first used in 1970s to transmit
telegraphic messages over wires. The basic idea of this
method is to record data onto tape rather than cards. An
operator keys with data using a type interlinked keyboard for
keying the data. The data is stored and displayed on a VDU
(visual display, unit) for the operator to confirm what is
being recorded and is verified by another memory for
processing. If however, the tape comes from more than one
source, then they are individually verified, edited, validated
and parted into a single input tape for processing.
3. MAGNETIC MEDIA
Magnetic media are computer storage devices that uses
electromagnetism as electrical charges in the magnetized
surface let one (1). Examples of magnetic media, includes:
40
i.
MAGBETIC
TAPE:
As
the
book,
introduction
to
to
41
has
formatting
a unique
established
identification
track
and
number. Disk
sector
number
references.
iii. FLOPPY DISK: Although microcomputers will often have
a hard disk drive, they will also have one or has floppy
means of on-line storage for small business computer
systems. A floppy disk coaled in magnetic material and
held in a thin casing when it is inserted into the disk
drive on the slot in the computers cabinet. It is rotated
in a turn table. They are used in the smallest micro
computer systems as well as with microcomputers and
42
are
particularly
useful
in
providing
means
of
decentralized processing.
iv. WINCHESTER DISK: As defined by French, Winchester
disk are small hard disk that is developed for the use in
micro-computers. It has advantages of more storage
capacity, quicker access, thus reducing waiting time for
the user and greater mechanical reliability.
v.
cards,
smart
cards
etc
due
to
technological
4.
43
44
WORM
once
Read
MANY:
These
is
similar
in
MAGNETO-OPTICAL DISKs: These are optical rewritable disk work on similar principles. They are also
known as erasable sand wiched between two plastic
disks. The area to be allowed is heated by a laser and
then its magnetic change is reserved i.e. a state in
which it remains when cooled.
45
2.10
46
associated with the file and a final set for all other group
associated with the file and a final set for all other users of
the system. This method is commonly used in UNIX
operating system. A file owner controls the set for all other
users of the system. A file owner controls the states of these
permission bits. Thus, a file owner, may prevent others from
reading or writing a file by setting READ, WRITE bits for
group members and for all other system users to an
unallaned state. Conversely, the file owner might allow the
system users total access to a file setting the READ and
WRITE bits associated with all users.
A method for administering service access to files of a
computer key, and passwords.
i. AUTHENTICATION: This is any process by which you
verify that someone is who they chain they are. This
usually involves a username and a password but can
include any other method of demonstrating identity, such
47
48
49
CHAPTER THREE
SYSTEM ANALYSIS AND DESIGN
3.0 INTRODUCTION
The lexicon universal encyclopedia defined system as a set of
concept or special method or procedure that must work
together to perform a particular function. It is the method of
determining how best to use computers and other resources
to perform tasks which meet the information needs of an
organization. Alternatively system is an entity which consist
of independent work force put together to achieve a
particular objective.
The
exams
and
records
department
of
the
federal
50
technology,
applied
science,
commerce
and
51
ORGANIZATIONAL CHART
KEY
unit
DHMS Division of medicinal & TEDC
health
CD Central Administration
SSP Junior staff personnel
Technological
Entrepreneurship
Development center
52
UNIT
Management
53
b)
54
c)
d)
Informations
kept
in
paper
files
are
exposed
to
f)
b)
c)
55
d)
e)
DATA COLLECTION
This is the research methodology that help researchers to
gather sources of information that will help building the new
system. Some of the mode of data collection includes:
a. Interview
b. Observation
a.
56
it
is
almost
impossible
to
get
the
feet
of
58
Old
Transaction
master
file
file
UPDATE
New
master file
59
PROBLEM DEFINITION
The problem definition in file sharing and access control is
based upon file processing procedures. The structure of any
operating data system is based upon data elements (I.e.
60
SYSTEM DESIGN
Design involves synthesis which is the choosing and putting
together components and how they are operated to form a
system. The system design used on this work is modular
approach to programming which is the modern structured
design. The modern structured design is a process oriented
technique for breaking up a large program into a hierarchy
61
SYSTEM STRUCTURE
In computer science and information science, system
structure also means the connections of various subcomponents that interchange information through some
channel or processes in order to facilitate the flow of
information securely.
The system structure of the computerized file sharing and
access control system is based on five tables. These tables
defines the roles (access right), users and application files.
One or more rolles can be applied to each user and to each
application file. The m- role table defines all the roles for the
62
table
contains
information
about
all
the
63
SYSTEM SPECIFICATION
The Computerized File sharing and access control system is
based on intranet application/ software. It can be accessed
centrally through any network that is connected to the
server hosting the application. This helps to ensure that all
file access and control is manage at one point thereby
reducing data redundancy and also limit unauthorized file
access.
64
65
CHAPTER FOUR
INTRODUCTION
System
implementation
includes
hardware
acquisition,
CODING
The coding of the design is the highest level of details on any
software development. The coding is achieved using php
programming language and mysqI database.
66
TEST RUNNING
This defines the requirements which the software should
meet as it is progressively integrated into a complete
package. The testing process is concerned with proving that
the package produces correct and expected result for all
possible input data. Unit testing and verification was
performed by all modules and procedures to ensure that
information properly flows into and out of the module or
procedure under test. This is usually done by the system
analyst to ascertain that it corresponds with the laid darn
requirement and specification of the system. This is achieved
using data specimen provided either from the old system or
generated test data provided by the system analyst.
67
DIRECT METHOD:
68
69
70
CHAPTER FIVE
SUMMARY
The major reason why a computer is employed into various
activities is to solve problem, whether simple or complex.
The computer solves problem when it is programmed to do
so.
However, the employment of computer into the exams and
records department of federal polytechnic Nekede will
enhances and improves the administrative function and
qualities of work. Prior to this fact, this will help the
department to have a feasible system and maintain a very
effective and efficient file system and access control.
RECOMMENDATION
The following recommendations are necessary for effective
operation of exams and records:
71
a)
with
air
conditioner
to
enhance
effective
c)
d)
CONCLUSION
This project work took a lot of time to visualize and explore
the concept of record keeping. Not only do exams and
records department allow for the collection of vast amount of
72
BIBLIOGRAPHY
Abdulahi, J.I (2004), Introduction to Computer a
Management Tool Nigeria: Victory
Publishers.
73
74