Professional Documents
Culture Documents
INTRODUCTION
Grid computing in general is a special type of parallel computing that relies on complete
computers (with onboard CPU, storage, power supply, network interface, etc.) connected to a
Grid computing involves computation in a distributed fashion, which may also involve the
aggregation of large-scale computing based systems. The size of a Grid may vary from being
public collaboration across many companies and networks. IBM defines grid computing as the
ability of using a set of open standards and protocols, to gain access to applications and data,
processing power, storage capacity and a vast array of other computing resources over the
Internet. Grid computing in the context of this project is a combination of computer resources
from a single administrative domain for a common goal. It works like an intranet.
technology. Internet works in way that best suits depending on how an intranet is designed. The
real beauty of an intranet is flexibility. There is no single formula or universal template, meaning that
each organization can define, design and use the intranet in the manner that best suit its
In effect, intranets put a fence around the world internet’s limitless territory, establishing
controlled-access sectors within which users can communicate freely and interact. Built and
1
managed by companies or organizations (called sponsors), these networks reside on the World
Wide Web, enabling cross-platform communications among authorized users in real time.
Intranets as such are not a new idea. In fact, some of the most used internet applications-such as
bulletin boards (BBSs) and commercial access services such as American on-line (AOL) are, in
effect, large-scale intranets, i.e. they link designated groups of users whose access to a given
internet site is determined by password or other user recognition mechanisms. For example, each
AOL subscriber has an individual account for which a password is established to control access.
The password system enables users to pick and choose internet features that interest them, to
transactions. On the other side of the equation, the system allows commercial service providers
The basic difference between general access subscriber services and an organization's own intranet
lies in the structure and intended usage. Although the concept is essentially the same, the
difference in one sense is that of mass versus class. Broad-based consumer oriented services tend to
offer all things to all people for all reasons, while organization specific intranets focus on a finite
e-mail and intranet applications share some common traits; for example, both offer a private forum
and both enable the exchange of messages. However, an intranet is fundamentally different by virtue
2
of its residence on the World Wide Web. As a result, intranets are both more sophisticated
In essence, conventional electronic mail uses a central routing to provide linear, sequential
communication between two users. Intranet, on the other hand, functions using internet
technology. This means that multiple users can collaborate on documents, and exchange graphics,
audio and video media. Depending on how an intranet is designed, users can "jump out" of an
intranet and onto the "regular"' Web for research or other purposes without noticing that they are
moving from the intranet to the internet. The real beauty of an intranet is flexibility. There is no single
formula or universal template, meaning that each organization can define, design and use the
intranet in the manner that best suit its individual culture and supports its business objectives.
The prevailing structure of information communication is a major problem with the current system in
Venture Undertaking posed a great problem in information access, retrieval, storage from the different
Department in the organization. It does not allow for more effective and efficient communication
which can be achieved through electronic method of communication rather than the prevailing manual
method of communication.
1.2 OBJECTIVES
The objectives of the project are to successfully design and implement a system which will
3
To enhance online chats between staffs on the intranet.
The research method intended for data gathering is the questionnaire method. To get information
about employee that account would be created for on the intranet. The questionnaire would contain
questions such as name of employee, staff id number, designation rank, department and so on.
The scope of this project shall be limited to intranet communication and shall also cover
areas like:
Intranet mail
Memo dissemination
Request
first thing you have to do is define a site. This helps Dreamweaver to organize the files
MYSQL: Pronounced “my ess cue el” (each letter separately) and not “my SEE
4
kwill.” MySQL is an open source RDBMS that relies on SQL for processing the
data in the database. MySQL provides APIs for the languages C, C++, Eiffel,
Java, Perl, PHP and Python. MySQL is most commonly used for Web
applications and for embedded applications and has become a popular alternative
to proprietary database systems because of its speed and reliability. MySQL can
defines how files on the World Wide Web are transferred. HTTP is the framework
for how browsers will display and use file formats. When you enter in a URL with
HTTP at the beginning, you are requesting a web page which can contain other
messages between servers. Most e-mail systems that send mail over the Internet
use SMTP to send messages from one server to another; the messages can then be
retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is
generally used to send messages from a mail client to a mail server. This is why
you need to specify both the POP or IMAP server and the SMTP server when you
5
1.6 SUMMARY OF CHAPTER ONE
objectives which talks about what the system is aimed at achieving, research
methodology which deals with method used to gather data, scope of study which
discusses the extent to which the topic would be discussed, and definition of related
terms.
6
CHAPTER TWO
LITERATURE REVIEW
Information and communications systems are playing an increasingly vital role in the
daily lives of people. Communication systems are the various processes, both formal and
informal, by which information is passed between the managers and employees within a
business, or between the business itself and outsiders. Communication whether written,
verbal, nonverbal, visual, or electronic has a significant impact on the way business is
conducted. The basic process of communication begins when a fact or idea is observed by
one person. That person (the sender) may decide to translate the observation into a
message, and then transmit the message through some communication medium to another
person (the receiver). The receiver then must interpret the message and provide feedback
to the sender indicating that the message has been understood and appropriate action
taken.
Great minds, authors, scholars and researchers have variously defined communication as
itemized below.
E.C.Eyre (1983) says that communication is not just the giving of information. It is the process
of giving understandable information and receiving and under standing the message.
(RAHEEM,2007)
7
Elendu O. Elendu sees communication as the process of conveying information from one person
The goal of any form of communication is to promote complete understanding of a message. But
breakdown in communication can occur at any step in the process. Bralemo(1995) says that
“business managers need to understand and eliminate the common obstacles that prevent
include: differing expectations and perceptions; selectivity (the tendency for individuals to pick
and choose what they retain when they receive a message from another person); and distractions
should be complete, concise, clear, concrete, correct, considerate, and courteous. More
specifically, this means that communication should: answer basic questions like who, what,
when, where; be relevant and not overly wordy; focus on the receiver and his or her interests;
use specific facts and figures and active verbs; use a conversational tone for readability; include
examples and visual aids when needed; be tactful and good natured; and be accurate and
nondiscriminatory.”
Unclear, inaccurate, or inconsiderate business communication can waste valuable time, alienate
employees or customers, and destroy goodwill toward management or the overall business.
"Your jobs, promotions, and professional reputation often depend on the success or failure of
your written and oral communication, especially if your career requires mainly mental rather
8
than manual labor, your progress will be strongly influenced by how effectively you
communicate your knowledge, proposals, and ideas to others who need or should receive them."
Communication can take various method, which can be classified into two broad categories;
can take the form of: written and oral. "If your message requires an immediate answer, an oral
channel may be the better choice, but if the message contains complicated details and figures or
if its subject requires filing for future reference, a written communication is necessary. Written
communication systems that might be used within a business organization include memos,
Outside of the business, examples of written communication might include letters, reports,
proposals, telegrams, faxes, postcards, contracts, advertisements, brochures, and news releases.
Internally, organizations might communicate orally through staff meetings, personal discussions,
Oral communication with those outside of the organization might take the form of face to face
and oral communication, individuals may also communicate through nonverbal means such as
facial expressions, gestures, posture, and tone of voice which can help in the successful
interpretation of a message.
of information communications has remained fairly constant in recent years, technology has
9
improved the way management and staff keeps in touch with each other by employing electronic
method of communication. Almost all organizations have some regular method of keeping in
touch with staff through bulletin boards, newsletters, or magazines. Larger, more technically
proficient and geographically spread out organizations may also use corporate-produced
television shows, interactive Internet sites, or copy-only messages transmitted by closed circuit
television. Some companies distribute electronic mail (E-mail) newsletters or messages, which
can be instantly transmitted and placed in every computer wired into the company's network.
Bulletin boards are one of the oldest forms of corporate communications. In the early days,
bulletin boards were frequently the only communication that management had with staff.
Everything from demands for longer hours to the announcement of new plant openings would be
announced on the boards. Today, bulletin boards are not always found in businesses. The
challenge all organizations face with bulletin boards is that they fade in the consciousness of
staff that get used to seeing them every day. Unless the information is changed regularly and
In the meantime, closed-circuit, satellite, and videotape-based television have become popular
with some larger corporations. Some corporations have spent millions of dollars in developing a
television presence that would be difficult to distinguish from the quality produced by regular
television networks. Television is immediate and can quickly grab the attention of staff. For
example, a CEO who had to make an emergency announcement to employees could do so within
minutes over a television system, while a newsletter or magazine takes weeks to produce.
According to a research conducted by Douglas (2006). The latest and fastest growing method of
10
with a computer terminal. E-mail can be customized to be sent to an individual or to a group of
people with a common interest, such as the members of a committee or staff. It can help
internally with scheduling, as well as with exposing organizations to staff comments and
complaints. E-mail can also be used to communicate with people external to the organization.
to its various advantages over manual method such as : the environmental benefits from a
potential reduction in the usage of paper for printing in an organization, the cost benefits from
reduced printing and postal delivery processes, increased speed of communications as employees
will be able to access communications from the Company or organization on the day of
An intranet is a private computer network that uses Internet Protocol technologies to securely
share any part of an organization's information or network operating system within that
organization. The term is used in contrast to internet, a network between organizations, and
instead refers to a network within an organization. Sometimes the term refers only to the
organization's internal website, but may be a more extensive part of the organization's
information technology infrastructure. It may host multiple private websites and constitute an
An intranet is built from the same concepts and technologies used for the Internet, such as client-
server computing and the Internet Protocol Suite (TCP/IP). An Intranet is a network based on the
intranet's Web site looks and act just like other Web sites, but has a firewall surrounding it to
fend off unauthorized users. Intranets are used to share information. Secure intranets are much
less expensive to build and manage than private, proprietary-standard networks. An intranet is a
In effect, intranets put a fence around the world internet’s limitless territory, establishing
controlled-access sectors within which users can communicate freely and interact. Built and
managed by companies or organizations (called sponsors), these networks reside on the World
Wide Web, enabling cross-platform communications among authorized users in real time.
Intranet is different from internet, Intranet means group of computers connected by LAN. You
can play games against each other and share files with each other. Most organizations use
Intranet. All computers are connected with each other using another computer called "Server",
which controls data transfer between any computers. Server has all rights and controls.
An intranet is a private computer network that uses Internet protocols, network connectivity, and
information or operations with its employees. Sometimes the term refers only to the most visible
service, the internal website. The same concepts and technologies of the Internet such as clients
and servers running on the Internet protocol suite are used to build an intranet. HTTP and other
Internet protocols are commonly used as well, especially FTP and e-mail. There is often an
12
attempt to use Internet technologies to provide new interfaces with Corporate legacy data and
information systems.
The following are benefits an organization derives from the use intranet.
• Workforce productivity: Intranets can help users to locate and view information
faster and use applications relevant to their roles and responsibilities. With the help of a
web browser interface, users can access data held in any database the organization wants
to make available, anytime and - subject to security provisions - from anywhere within
the company workstations, increasing employees' ability to perform their jobs faster,
more accurately, and with confidence that they have the right information. It also helps to
as-needed basis; Employees may link to relevant information at their convenience, rather
are useful to communicate strategic initiatives that have a global reach throughout the
organization. The type of information that can easily be conveyed is the purpose of the
initiative and what the initiative is aiming to achieve, who is driving the initiative, results
achieved to date, and who to speak to for more information. By providing this
information on the intranet, staffs have the opportunity to keep up-to-date with the
13
strategic focus of the organization. Some examples of communication would be chat,
email, and or blogs. A great real world example of where an intranet helped a company
Their central support system had to deal with a number of queries every day (McGovern,
Gerry). When Nestle decided to invest in an intranet, they quickly realized the savings.
McGovern says the savings from the reduction in query calls was substantially greater
easily accessed throughout the company using hypermedia and Web technologies.
standards, newsfeeds, and even training, can be accessed using common Internet
standards (Acrobat files, Flash files, CGI applications). Because each business unit can
update the online copy of a document, the most recent version is always available to
platform for developing and deploying applications to support business operations and
• Cost-effective: Users can view information and data via web-browser rather than
maintaining physical documents such as procedure manuals, internal phone list and
requisition forms. This can potentially save the business money on printing, duplicating
14
• Promote common corporate culture: Every user is viewing the same
Which, in turn, may allow Intranet developers to write applications that only have to
authentication prior to access), you know exactly who you are interfacing with. So, you
can personalize your Intranet based on role (job title, department) or individual .
with "live" changes, they are never out of date, which can limit a company's liability.
15
2.3 SOCIAL IMPACT OF INTRANET ON ORGANIZATION
All intranets have one thing in common: they are built for employees/staffs. Social tools on the
intranet can help with employee adoption, engaging your users, and encouraging a community
where the goal is a more efficient, collaborative and team orientated environment.
Social media and social networking are changing the face of the internet. Bringing the power of
conversation and collaboration into the intranet world can be hugely beneficial and impact the
way the organization operates. The impact of social intranet systems in organization can be
highlighted as follows:
Open publishing: The single most powerful concept for adoption and success: create
Quick polls: Create quick polls, put them on the home page, and view responses real-
Buy and sell: The Buy & Sell tool is like an intranet marketplace where users can post
Recipes: A purely social application where you can share your favorite recipes, quick
Ratings and comments: A powerful tool to gauge how effective your intranet content is.
Today there are many definitions of Grid computing: Here are some definitions of grid
16
In Ian Foster’s article titled “What is the Grid? A Three Point Checklist” lists these
primary attributes:
organizations."
IBM defines grid computing as “the ability, using a set of open standards and protocols,
to gain access to applications and data, processing power, storage capacity and a vast
array of other computing resources over the Internet. A grid is a type of parallel and
distributed system that enables the sharing, selection, and aggregation of resources
An earlier example of the notion of computing as utility was in 1965 by MIT's Fernando
Corbató. Corbató and the other designers of the Multics operating system envisioned a
http://www.multicians.org/fjcc3.html
Buyya/Venugopal define grid as "a type of parallel and distributed system that enables
17
CERN, one of the largest users of grid technology, talk of The Grid as “a service for
sharing computer power and data storage capacity over the Internet.”
Grids can be categorized with a three stage model of departmental grids, enterprise grids and
global grids. These correspond to a firm initially utilizing resources within a single group i.e. an
engineering department connecting desktop machines, clusters and equipment. This progresses to
enterprise grids where nontechnical staff's computing resources can be used for cycle-stealing
and storage. A global grid is a connection of enterprise and departmental grids that can be used
The initial definition, as posed in Ian Foster’s “The Anatomy of the Grid”, encompassed
organizations”. As indicated in a subsequent paper, “the key concept is the ability to negotiate
and then to use the resulting resource pool for some purpose”.
Since then, the term has broadened to refer generally to the use of shared (commodity) computer
architectures.
That having been said, there are at least three common uses of the term “Grid” in the present IT
lexicon:
18
Technical Computing Grids employ rack-mount computer systems in scale-out
problems of interest.
Data Grids provide for the distributed capture, management, and sharing of information
Grids offer a way to solve Grand Challenge problems such as protein folding, financial
modeling, earthquake simulation, and climate/weather modeling. Grids offer a way of using the
information technology resources optimally inside an organization. They also provide a means
for offering information technology as a utility for commercial and noncommercial clients, with
those clients paying only for what they use, as with electricity or water.
Grid computing is being applied by the National Science Foundation's National Technology
Grid, NASA's Information Power Grid, Pratt & Whitney, Bristol-Myers Squibb Co., and
American Express.
One of the most famous cycle-scavenging networks is SETI@home, which was using more than
3 million computers to achieve 23.37 sustained teraflops (979 lifetime teraflops) as of September
2001.
As of August 2009 Folding@home achieves more than 4 petaflops on over 350,000 machines.
19
The European Union has been a major proponent of grid computing. Many projects have been
funded through the framework programme of the European Commission. Many of the projects
are highlighted below, but two deserve special mention: BEinGRID and Enabling Grids for E-
sciencE
BEinGRID (Business Experiments in Grid) is a research project partly funded by the European
commission as an Integrated Project under the Sixth Framework Programme (FP6) sponsorship
program. Started in June 1 2006, the project will run 42 months, until November 2009. The
project is coordinated by Atos Origin. According to the project fact sheet, their mission is “to
establish effective routes to foster the adoption of Grid Computing across the EU and to
stimulate research into innovative business models using Grid technologies”. To extract best
practice and common themes from the experimental implementations, two groups of consultants
are analyzing a series of pilots, one technical, and one business. The results of these cross
analyzes are provided by the website Gridipedia. The project is significant not only for its long
duration, but also for its budget, which at 24.8 million Euros is the largest of any FP6 integrated
project. Of this, 15.7 million is provided by the European commission and the remainder by its
The Enabling Grids for E-science project, which is based in the European Union and includes
sites in Asia and the United States, is a follow-up project to the European DataGrid (EDG) and
is arguably the largest computing grid on the planet. This, along with the LHC Computing Grid[8]
(LCG), has been developed to support the experiments using the CERN Large Hadron Collider.
The LCG project is driven by CERN's need to handle huge amounts of data, where storage rates
of several gigabytes per second (10 petabytes per year) are required. A list of active site
20
participating within LCG can be found online as can real time monitoring of the EGEE
Another well-known project is distributed.net, which was started in 1997 and has run a number
The NASA Advanced Supercomputing facility (NAS) has run genetic algorithms using the
Condor cycle scavenger running on about 350 Sun and SGI workstations.
Until April 27, 2007, United Devices operated the United Devices Cancer Research Project
based on its Grid MP product, which cycle-scavenges on volunteer PCs connected to the
Internet. As of June 2005, the Grid MP ran on about 3.1 million machines.Another well-known
project is the World Community Grid. The World Community Grid's mission is to create the
largest public computing grid that benefits humanity. This work is built on the belief that
volunteerism can change our world for the better. IBM Corporation has donated the hardware,
software, technical services, and expertise to build the infrastructure for World Community Grid
Chapter two discusses the general overview of information communication system, the intranet,
benefits and social impacts of the intranet within an organization, grid computing and its
This chapter in general discusses what various people have said about the topic and conclusions
21
CHAPTER THREE
System analysis involves reviewing the existing system (present system) and developing a new
system (proposed system) which will address the weakness of the present system.
It also involves the analysis of roles of the proposed system and the identification of the
requirement that should be met, it clearly defines the proposed system and is the bedrock upon
Every organization has a defined system by which its operation is carried out; Venture
operations which has been in use for years; it is a system that evolves an information flow
pattern which is devoid of any computing aid for communication. The present system uses
each other through oral, letters, circulars, memos, staff meetings, etc which makes
communication slower, less effective, less efficient and may also reduce the quality of
information along the line. The existing system can also be annoying in a situation whereby an
employee seeking urgent approval for certain job process have to move from one superior to
another.
22
3. 1 THE PROPOSED SYSTEM
The objective of the proposed system is to design a package that will effectively take care of the
drawbacks of the existing system. This proposed system aims at removing the complexity
associated with existing systems by removing the stress of employees moving from one place to
another in order to communicate or pass information from one place to the other. This proposed
system would enable employee to chat with each other on their intranet, and also allow employee
of this organization to send memo, e-mails, reduce complexity of workflow etc. to be sent from
one system to the other within a small to medium sized network using a simple user-friendly and
easy to use interface and also keeps update of upcoming event in the organization.
This is the specification or construction of a technical, computerized solution for the business
requirement identified in a system analysis. It takes the form of a working prototype. It can also
be defined as those tasks that focus on the specification of a detailed computer software based
solution. It is also called physical design. This will be achieved using PHP and MYSQL as the
backend.
Detailed updates about the upcoming events in the organization and many more.
Workflow process
23
Despite the availability of several existing software packages that can be used to send text
messages from one system to the other, this new system is still very relevant and useful because
Once installed on the system on intranet/network, text messages can be sent from one
client system to the other without the need of any other software facility.
The new system is cost effective, there are no fees charges after the purchase of the
software, and the software is available for use for as long as possible without any other
surcharge.
The software requirement on the system is very minimal; all that is needed is Microsoft
24
25
3.3 DESIGN PHASES
Input refer to data the system receives from its environment that are necessary to affect its
operation. The system accepts the following categories of inputs database as determined by the
output required. This can be classified according to two basic characteristics thus:
The method and technology used to capture and enter the data
Data can be entered using keyboard, mouse and so on. What goes into the computer for
processing (input) determines what comes out of it (output). The new system will be designed to
User name
Password
At the Entry Storage of Any New User: This will capture the following data:
User name
Password
Confirm password
26
E-mail
The new system requires all essential data to be supplied by the user. The information is input
through the keyboard and they are discharge on the video display unit as it is being supplied and
later committed to the database. Data validation is ensured in the system to avoid invalid input
such as password that is less than six (6) characters, leaving a box empty e.t.c.
The end products of any system are its outputs and are used to describe what emerge from
computer system for the user to act upon. It is the final reports obtained after processing the data
The home page is the most often hit page, but it should be the least used page. When someone
comes to a mailing system on the intranets they are looking for something specific. The moment
they are in, they want access to some tool or link that carries them off to the area they want.For
this project work, the home page displays the mailing list on the site with the introduction. The
user must be registered member before he/she would be able to login using a specified username
Send mail
Update
Send memo
Chat
27
Workflow
The design of the process of the project involves a procedure which specifies each task to be
performed and the user to be responsible for carrying out the specific task. Important task
includes:
Data Entry Procedure: This is the means of inserting data and entering recorded data
Run Time Procedure: The personnel involved are the staff/lecturer. This means steps
28
3.3.4 STORAGE DESIGN
Network: Data model based on graphs with records as nodes and relationships between records
Hierarchical: Data is organized inform of trees. That is logically represented by an upside down
tree
Relational database: Here data model is based on tables. It allows the user to work with several
database files at the same time and share information across the files.
communications network
A flat-file: Database program, allows the user to create many databases but lets him/her work
with only one file at a time. Using a flat -file database program, one can create simple
This project was designed using relational database model which consist of tables. It allows for
collection of data items organized as a set of formally-described tables from which data can be
accessed or reassembled in many different ways without having to reorganize the database
29
tables. It also reduces the amount of redundant data in relations that can waste space and causes
integrity problems. It also provides fast access to data from the relations.
A. ADMIN USERTABLE
Username VARCHAR 40
Password VARCHAR 20
B. SENDMEMOTABLE
Recipient VARCHAR 40
Message LONGTEXT 0
Toid VARCHAR 40
Fromid VARCHAR 40
Message LONGTEXT 0
30
Data Sent DATE/TIME 0
D.SENDSMSTABLE
Recipient No INTEGER 15
Sender No INTEGER 15
Password VARCHAR 20
Buddy
FIELD NAME VARCHAR
DATA TYPE 100 SIZE
FIELD
Message
Message LONGTEXT
LONGTEXT 0 0
Data
Data Sent
Sent DATE/TIME
DATE/TIME 0 0
Type TEXT 50
ID BIGINT 20
F.
Is_Online INT 11
CHATTABLE
Last_Ping TEXT 40
Room TEXT 50
31
Sender TEXT 100
Chapter three discusses system analysis and design, proposed system, design of proposed system
database table the type of input acceptable in each segment for example text, variable, character
and so on conceptual model which deals with having a plan of what the proposed system should
CHAPTER FOUR
4.0 INTRODUCTION
32
At this stage, actions are carried out rather than analyzed or designed. The conceptual and
theoretical design of the system will be turned into a working system, hardware is acquired
program is tested, training sessions are conducted, and data acquired are been stored in the
database
This part of this project deals with the different aspects that need to be considered so as to ensure
adequate functioning of the new system and to have successful implementation of the system. It
is the final stage in determining workability of the new system. Having designed the new system,
it is very important to ascertain the proper operation of the system and ensure that it achieves the
aims of the project. This is done by carrying out the installation of the new system and testing it
to see its viability and also to document every feature of the project.
4.1 PRE-IMPLEMENTATION
For any new system to work correctly as expected there is need to specify the hardware, software
Intranets are built on a client/server principle, which means to utilize an intranet you must have
clients and servers in place for effective and efficient functioning of the system.
• 64 MB Ram
33
• 6GB Hard disk drive
• CD Rom Drive
• Macromedia Dreamweaver
• Wamp Server
• Web browser – Microsoft internet explorer, Mozilla Firefox, Opera, Safari etc.
This describes the various users knowledge required for this system. Since this system is
designed to be used in an academic environment, the user will undergo a minimum of two day
training depending on his or her computer skill. This is done to ensure that the different users can
easily manipulate the software without requiring the help of the software developer.
34
Before a new system is implemented, it may be necessary to conduct through testing of data to
At the implementation stage the conceptual design of the proposed system will be turned into a
working system. The system would be thoroughly tested and designed to be explicate and less
tedious so that any other users of the system can perform the specified operations for which the
• Insert the soft copy of Grid Computing Implementation in staff Communication System
Once the software have been properly installed then the following operation procedure is
required:
35
• Click on program from the start button
• Click on any of the send memo, send mail, chat, update button depending on what the
This is one of the stages of implementation which is aimed at ensuring that the system works
accurately and efficiently before actual operation starts. The major aim of system testing is
mainly to locate and correct any error remaining in the system program. In the course of testing
the program designed for this project some errors were detected and they have been corrected
After the system testing, validation and is satisfactory proven by a thorough test running, then a
changeover can be introduced, there are four well known conversion method which offer a range
of advantages and disadvantages. The system itself may well directly influence the final
decision. In many instances the faster conversion takes place the better in order to gain the
ultimate benefits that the new system offers. Change over means to integrate the new system and
36
Direct Change over
Phase-In method
Parallel Running
Pilot implementation
a. Direct Approach: This approach entails selecting a particular date when the old system is
terminated and the new system is brought into operation. It cost lesser than the parallel method
performing different functions. It may be possible to phase in the new system while gradually
the most secure method with both systems running in parallel over an introductory period. The
old system remains fully operational while the new system comes on line. If the new system fails
the existing system can as well be used or both can be running at the same time. The new system
dissemination of information and creates an avenue for staff to communicate with each other.
A post implementation was carried on the system after the system had been confirmed working
and effective. This is made possible by comparing the aim and objective of the proposed system
as regards the effectiveness. All discrepancy noted at this stage were corrected by way of re-
37
designing the software. The new system is thus able to meet its objectives please refer to chapter
one.
Documentation is necessary at this stage in order to make communication easier between the
designer of the new system and the users of the system. This process will make the development
of the new system easier and faster as the document will serve as a guide line for the developer
• Users guide
• Program flowcharts
• Input layout
• Output layout
The maintenance of a system is the most expensive stage in system life cycle. It has been
estimated that over life cycle of a typical system, the maintenance and enhancement costs
incurred may be two to four times larger than the initial development cost. System maintenance
involves protecting the system from both direct and indirect damage; hence periodic review
should be embarked upon. This stage is an important duty of a programmer and may involve all
the steps from problem definition through analysis design and program preparation. It entails
both hardware and software maintenance. It is the combining process of correcting, modifying
and improving the system. There are three types of system maintenance, thus:
38
• Corrective Maintenance: This type of maintenance rectifies design, coding or
implementation errors.
for instance, adapting software running on a main frame to work on a micro computer.
• Perfective Maintenance: This tends towards making the system perfect and enhances
Chapter four discusses system implementation, system installation procedure, system operation
maintenance which helps to ensure that the new system is working properly. Many systems fail
through inadequate conduct of the implementation phase than for any other reason.
CHAPTER FIVE
5.0 SUMMARY
39
Grid computing implementation in staff communication is a very informative and educative one.
It has the following functionalities sending mail, chat, request, sms, and updates.
This research work had been an informative one for me. Also, the intranet site implementation
has been one of interest. Personally, I have benefited a lot from this research work because it has
really helped my web development skills; I also learnt to use certain application such as
Microsoft Visio, paint, and Dreamweaver, Apache and Wamp servers and so on. It also
encouraged me to research more and found solutions to database connectivity on the web.
Through the execution of this project, there is a functional communication system created by me.
5.1 ACHIEVEMENTS
• Notifies members of staff about upcoming organizational events in the form of updates.
During the course of developing the new system, some problems were encountered and this
problem includes:
database.
Financial problem was also one of the major problems encountered because for every
Erratic power supply both in school and at home also hindered the project design in various
ways.
Also the time allotted for the completion of the project was not sufficient as it require time
5.3 RECOMMENDATIONS
Based on the study conducted and analysis made, it is recommended that, organizations should
embrace real-time computer based operations for efficient and effective communication systems
I hereby recommend the system which will help in maximizing the resources such as time,
material and also for retrieval of urgent information and reduce cost.
The system will also function in any other Organization as long as the specification given is
meant.
5.4 CONCLUSION
Grid computing implementation in staff communication system is very important and exciting as
it makes room for more effective, efficient and quality information among staff and student of
the college.
41
In conclusion, this research work can further be improved upon by upcoming students by
implementing communication systems for flexibility and consistency and should be hosted in the
departmental lab.
This chapter is an overview of the project as a whole it gives summary, achievements which
includes successful sending of mail, chatting, updates, request and so on, problems encountered
and recommendations.
REFERENCES
1. Brian Austin (2000), Web Page Design In Easy Step, Computer Step,
42
3. David Buser Et Al (1999), Beginning PHP 2.0, Wrox Press, Birmingham
uk.
Grid”,http://www.globus.org/alliance/publications/papers/anatomy.pdf
fp.mcs.anl.gov/~foster/Articles/WhatIsTheGrid.pdf
www.africa.upenn.edu/particles_Gem/Africa-modern_1815.html
Script Bible 5th Edition, Wiley publishing, lnc. W475 Cross point
pp85-87
SITE VISITED
43
Grid computing, www.google.com, September 2009
FLOW CHART
44
45
46
47
PROGRAM LISTING
ADMINPAGE
<?
require_once("fns.php");
conn();
if($Submit=="Add Admin")
if(!$username1 || !$password1)
else
$uploadDir = "uploads/";
$fileName = $_FILES['uploaded']['name'];
$tmpName = $_FILES['uploaded']['tmp_name'];
$fileSize = $_FILES['uploaded']['size'];
$fileType = $_FILES['uploaded']['type'];
$filePath = $uploadDir.$fileName;
if (!$result)
else
48
{
$num_result=mysql_affected_rows();
if($num_result > 0)
else
}}}
?>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Untitled Document</title>
<style type="text/css">
<!--
-->
</style>
49
<style type="text/css">
<!--
.style5 {
font-size: 11px;
color: #FFFFFF;
font-weight: bold;
.style6 {
font-size: 11px;
color: #FFFFFF;
-->
</style>
</head>
<body>
<tr class="textonly1">
50
<tr bgcolor="#99CC33" class="textonly1">
</tr>
</table></td>
</tr>
</table>
<tr bgcolor="#FFFFFF">
</tr>
<tr>
</tr>
51
<tr bgcolor="#CCCCCC">
<option value="SUPERVISOR">SUPERVISOR</option>
<tr bgcolor="#CCCCCC">
<tr bgcolor="#CCCCCC">
ADD STAFF.
<?
require_once("fns.php");
conn();
52
if($Submit=="Add Admin")
if(!$username1 || !$password1)
else
$uploadDir = "uploads/";
$fileName = $_FILES['uploaded']['name'];
$tmpName = $_FILES['uploaded']['tmp_name'];
$fileSize = $_FILES['uploaded']['size'];
$fileType = $_FILES['uploaded']['type'];
$filePath = $uploadDir.$fileName;
if (!$result)
else
53
$num_result=mysql_affected_rows();
if($num_result > 0)
else
}}}
?>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<title>Untitled Document</title>
<style type="text/css">
<!--
-->
</style>
<style type="text/css">
<!--
54
.style5 {
font-size: 11px;
color: #FFFFFF;
font-weight: bold;
.style6 {
font-size: 11px;
color: #FFFFFF;
-->
</style></head><body>
<tr class="textonly1">
<tr>
</tr>
<tr>
55
<td width="96" align="center" class="textonly3"><a href="adminpage.php?
page=admin" class="textonly1">Admin List </a></td>
</tr>
</table></td> </tr></table>
<tr bgcolor="#FFFFFF">
</tr> <tr>
</tr>
<tr bgcolor="#CCCCCC">
56
<option value="SUPERVISOR">SUPERVISOR</option>
</tr>
<tr bgcolor="#CCCCCC">
</tr>
<tr bgcolor="#CCCCCC">
</label></td</tr></table></form></td> </tr><tr>
</font></p></td></tr></table><br /></body></html>
ADMIN PAGE
?>
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<style type="text/css">
57
<!--
body {
background-image: url();
background-color: #000000;}--></style></head>
<?
require_once("fns.php");
conn();
if($Submit=="Confirm Delete")
{if(!$username1){
else{
$num_result=mysql_affected_rows();
} else{
DELETE ADMIN
<?
require_once("fns.php");
conn();
if($Submit=="Confirm Delete")
58
{
if(!$aid)
else
$num_result=mysql_affected_rows();
if($num_result < 1)
else
$aid="";
}}}
REQUEST
<?
require_once("fns.php");
conn();
if($Submit=="Submit"){
59
if(!$item || !$qty){
elseif(!is_numeric($qty)){
$error="Invalid Quantity!!!";}
$name=getname($username);
Send mail
<?
require_once("fns.php");
conn();
if($Submit=="Send"){
else{
$senderemail=getemail2($username);
$receiveremail=$email;
60
$result=mysql_query("insert into sentemail values
('$receiveremail','$subject','$msg','$senderemail','$dat',null,'$username')");
require_once("fns.php");
conn();
if($Submit=="Confirm Delete"){
if(!$aid){
else{
$num_result=mysql_affected_rows();
if($num_result < 1)
} else
$aid="";}}}
STAFF PAGE
<?php
session_start();
require_once("fns.php");
conn();
if (!isset($_SESSION['username']) || !isset($_SESSION['password'])) {
61
include("index.php");
exit; }
?>
UPDATE
<?
require_once("fns.php");
conn();
if($Submit=="Post Update")
{if(!$msg){
else
$error="Update Posted!!!"; }}
VIEW UPDATES
<?
require_once("fns.php");
conn();
$row=mysql_fetch_array($result);
$name=$row['name'];
$email=$row['email'];
$dat=$row['dat'];
$item=$row['item'];
62
$qty=$row['qty'];
$appby=$row['appby'];
$appsign=$row['appsign'];
$status=$row['status'];
if($status == 'no')
$status="Not Approved";
else
$status="Approved";
WORKFLOW
<?
if($page1=="deleteitem")
if($page1=='approve'){
$appby=$username;
$appsign=getsign($username);
?>
63
INPUT AND OUTPUT LISTING
HOMEPAGE
ADMIN SETUP
64
ADMIN SETUP
65
ADD STAFF
STAFF SETUP
66
APPROVED REQUEST LIST
67
SENT MAIL
REQUEST FORM
68
REQUISITION DETAILS
MEMO
69
CHAT
70
TABLE OF CONTENTS
Title page i
Certification ii
Dedication iii
Acknowledgement iv
Abstract v
CHAPTER ONE: INTRODUCTION
1.0 General Introduction…………………………………….......................................1
1.1 Statement of problem……………………………………………………………….3
1.2 Objectives…………………………………………………………………………3
1.3 Research methodology……………………………………………………………4
1.4 Scope of Study……………………………………………………………………4
1.5 Definition of Terms……………………………………………………………….4
1.6 Summary of chapter 1…………………………………………………………….6
71
5.0 Summary………………………………………………………………………40
5.1 Achievements………………………………………………………………….40
5.2 Problems Encountered…………………………………………………….…...41
5.3 Recommendations…………………………………………………………….41
5.4 Conclusion…………………………………………………………………….42
5.5 Summary of chapter 5……………………………………………………........42
REFERENCES
APPENDIXES
APPENDIX A (FLOW CHART)
APPENDIX B (PROGRAM LISTING)
APPENDIX C (INPUT AND OUTPUT LISTING)
72