You are on page 1of 72

CHAPTER ONE

INTRODUCTION

1.0 GENERAL INTRODUCTION

Grid computing in general is a special type of parallel computing that relies on complete

computers (with onboard CPU, storage, power supply, network interface, etc.) connected to a

network (private, public or the Internet) by a conventional network interface.

Grid computing involves computation in a distributed fashion, which may also involve the

aggregation of large-scale computing based systems. The size of a Grid may vary from being

small or confined to a network of computer workstations within a corporation to being large,

public collaboration across many companies and networks. IBM defines grid computing as the

ability of using a set of open standards and protocols, to gain access to applications and data,

processing power, storage capacity and a vast array of other computing resources over the

Internet. Grid computing in the context of this project is a combination of computer resources

from a single administrative domain for a common goal. It works like an intranet.

An intranet is a self-contained, internal network linking multiples users by means of internet

technology. Internet works in way that best suits depending on how an intranet is designed. The

real beauty of an intranet is flexibility. There is no single formula or universal template, meaning that

each organization can define, design and use the intranet in the manner that best suit its

individual culture and supports its business objectives.

In effect, intranets put a fence around the world internet’s limitless territory, establishing

controlled-access sectors within which users can communicate freely and interact. Built and

1
managed by companies or organizations (called sponsors), these networks reside on the World

Wide Web, enabling cross-platform communications among authorized users in real time.

Intranets as such are not a new idea. In fact, some of the most used internet applications-such as

bulletin boards (BBSs) and commercial access services such as American on-line (AOL) are, in

effect, large-scale intranets, i.e. they link designated groups of users whose access to a given

internet site is determined by password or other user recognition mechanisms. For example, each

AOL subscriber has an individual account for which a password is established to control access.

The password system enables users to pick and choose internet features that interest them, to

contract for services on an individual basis, and to engage in a number of Web-based

transactions. On the other side of the equation, the system allows commercial service providers

to track subscribers' usage and maintain account and billing Information.

The basic difference between general access subscriber services and an organization's own intranet

lies in the structure and intended usage. Although the concept is essentially the same, the

difference in one sense is that of mass versus class. Broad-based consumer oriented services tend to

offer all things to all people for all reasons, while organization specific intranets focus on a finite

group of people requiring a defined range of capabilities to achieve specific goals.

A common mistake in considering intranets is to think of them as electronic mail. Conceptually,

e-mail and intranet applications share some common traits; for example, both offer a private forum

and both enable the exchange of messages. However, an intranet is fundamentally different by virtue

2
of its residence on the World Wide Web. As a result, intranets are both more sophisticated

and more versatile than the relatively static electronic mail.

In essence, conventional electronic mail uses a central routing to provide linear, sequential

communication between two users. Intranet, on the other hand, functions using internet

technology. This means that multiple users can collaborate on documents, and exchange graphics,

audio and video media. Depending on how an intranet is designed, users can "jump out" of an

intranet and onto the "regular"' Web for research or other purposes without noticing that they are

moving from the intranet to the internet. The real beauty of an intranet is flexibility. There is no single

formula or universal template, meaning that each organization can define, design and use the

intranet in the manner that best suit its individual culture and supports its business objectives.

1.1 STATEMENT OF PROBLEM

The prevailing structure of information communication is a major problem with the current system in

Venture Undertaking posed a great problem in information access, retrieval, storage from the different

Department in the organization. It does not allow for more effective and efficient communication

which can be achieved through electronic method of communication rather than the prevailing manual

method of communication.

1.2 OBJECTIVES

The objectives of the project are to successfully design and implement a system which will

provide the following benefits:

 To provide a system that sends memo in real time.

 To implement a system that sends and receives intranet E-mail.

3
 To enhance online chats between staffs on the intranet.

 To implement a system that informs members of staff about upcoming organizational

events in the form of updates.

 To enhances easy workflow by eliminating delays in approval.

 To establish a system that is cost effective

1.3 RESEARCH METHODOLOGY

The research method intended for data gathering is the questionnaire method. To get information

about employee that account would be created for on the intranet. The questionnaire would contain

questions such as name of employee, staff id number, designation rank, department and so on.

1.4 SCOPE OF STUDY

The scope of this project shall be limited to intranet communication and shall also cover

areas like:

 Intranet mail

 Intranet online chatting

 Memo dissemination

 Upcoming events update

 Request

1.5 DEFINITION OF TERMS

 MICROMEDIA DREAMWEAVER: Dreamweaver is a tool to create websites. So the

first thing you have to do is define a site. This helps Dreamweaver to organize the files

used in this site.

 MYSQL: Pronounced “my ess cue el” (each letter separately) and not “my SEE

4
kwill.” MySQL is an open source RDBMS that relies on SQL for processing the

data in the database. MySQL provides APIs for the languages C, C++, Eiffel,

Java, Perl, PHP and Python. MySQL is most commonly used for Web

applications and for embedded applications and has become a popular alternative

to proprietary database systems because of its speed and reliability. MySQL can

run on UNIX, Windows and Mac OS.

 PHP (Pre Hypertext Processor): This is server-side applications to develop

dynamic web content. A widely used open source programming language.

 HTTP (Hypertext Transfer Protocol): HTTP is an application protocol which

defines how files on the World Wide Web are transferred. HTTP is the framework

for how browsers will display and use file formats. When you enter in a URL with

HTTP at the beginning, you are requesting a web page which can contain other

elements (such as pictures) and links to other resources.

 SMTP (Simple Mail Transfer Protocol): A protocol for sending e-mail

messages between servers. Most e-mail systems that send mail over the Internet

use SMTP to send messages from one server to another; the messages can then be

retrieved with an e-mail client using either POP or IMAP. In addition, SMTP is

generally used to send messages from a mail client to a mail server. This is why

you need to specify both the POP or IMAP server and the SMTP server when you

configure your e-mail application.

5
1.6 SUMMARY OF CHAPTER ONE

Chapter one discusses general introduction on grid computing, statement of problem,

objectives which talks about what the system is aimed at achieving, research

methodology which deals with method used to gather data, scope of study which

discusses the extent to which the topic would be discussed, and definition of related

terms.

6
CHAPTER TWO

LITERATURE REVIEW

2.0 OVERVIEW OF INFORMATION COMMUNICATION SYSTEM

Information and communications systems are playing an increasingly vital role in the

daily lives of people. Communication systems are the various processes, both formal and

informal, by which information is passed between the managers and employees within a

business, or between the business itself and outsiders. Communication whether written,

verbal, nonverbal, visual, or electronic has a significant impact on the way business is

conducted. The basic process of communication begins when a fact or idea is observed by

one person. That person (the sender) may decide to translate the observation into a

message, and then transmit the message through some communication medium to another

person (the receiver). The receiver then must interpret the message and provide feedback

to the sender indicating that the message has been understood and appropriate action

taken.

Great minds, authors, scholars and researchers have variously defined communication as

itemized below.

E.C.Eyre (1983) says that communication is not just the giving of information. It is the process

of giving understandable information and receiving and under standing the message.

(RAHEEM,2007)

7
Elendu O. Elendu sees communication as the process of conveying information from one person

to another of group of persons, department or organization to another through post, telephone,

messenger’s services or by other means.(RAHEEM ,2007)

The goal of any form of communication is to promote complete understanding of a message. But

breakdown in communication can occur at any step in the process. Bralemo(1995) says that

“business managers need to understand and eliminate the common obstacles that prevent

effective communication”. Some of the causes of communication problems in business settings

include: differing expectations and perceptions; selectivity (the tendency for individuals to pick

and choose what they retain when they receive a message from another person); and distractions

(such as ringing telephones, scheduled meetings, and unfinished reports).

According to Herta A. Murphy and Herbert W. Hildebrandt (1982), “Good communication

should be complete, concise, clear, concrete, correct, considerate, and courteous. More

specifically, this means that communication should: answer basic questions like who, what,

when, where; be relevant and not overly wordy; focus on the receiver and his or her interests;

use specific facts and figures and active verbs; use a conversational tone for readability; include

examples and visual aids when needed; be tactful and good natured; and be accurate and

nondiscriminatory.”

Unclear, inaccurate, or inconsiderate business communication can waste valuable time, alienate

employees or customers, and destroy goodwill toward management or the overall business.

"Your jobs, promotions, and professional reputation often depend on the success or failure of

your written and oral communication, especially if your career requires mainly mental rather

8
than manual labor, your progress will be strongly influenced by how effectively you

communicate your knowledge, proposals, and ideas to others who need or should receive them."

Communication can take various method, which can be classified into two broad categories;

Manual and Electronic method of communication.

 MANUAL METHOD OF COMMUNICATION: Manual method of communication

can take the form of: written and oral. "If your message requires an immediate answer, an oral

channel may be the better choice, but if the message contains complicated details and figures or

if its subject requires filing for future reference, a written communication is necessary. Written

communication systems that might be used within a business organization include memos,

reports, bulletins, job descriptions, posters, employee manuals.

Outside of the business, examples of written communication might include letters, reports,

proposals, telegrams, faxes, postcards, contracts, advertisements, brochures, and news releases.

Internally, organizations might communicate orally through staff meetings, personal discussions,

presentations, telephone calls, or the informal employee grapevine.

Oral communication with those outside of the organization might take the form of face to face

meetings, telephone calls, speeches, teleconferences, or videoconferences. In addition to written

and oral communication, individuals may also communicate through nonverbal means such as

facial expressions, gestures, posture, and tone of voice which can help in the successful

interpretation of a message.

 ELECTRONIC METHOD OF COMMUNICATION: Although the form and content

of information communications has remained fairly constant in recent years, technology has

9
improved the way management and staff keeps in touch with each other by employing electronic

method of communication. Almost all organizations have some regular method of keeping in

touch with staff through bulletin boards, newsletters, or magazines. Larger, more technically

proficient and geographically spread out organizations may also use corporate-produced

television shows, interactive Internet sites, or copy-only messages transmitted by closed circuit

television. Some companies distribute electronic mail (E-mail) newsletters or messages, which

can be instantly transmitted and placed in every computer wired into the company's network.

Bulletin boards are one of the oldest forms of corporate communications. In the early days,

bulletin boards were frequently the only communication that management had with staff.

Everything from demands for longer hours to the announcement of new plant openings would be

announced on the boards. Today, bulletin boards are not always found in businesses. The

challenge all organizations face with bulletin boards is that they fade in the consciousness of

staff that get used to seeing them every day. Unless the information is changed regularly and

presented in an attractive way, employees can ignore it.

In the meantime, closed-circuit, satellite, and videotape-based television have become popular

with some larger corporations. Some corporations have spent millions of dollars in developing a

television presence that would be difficult to distinguish from the quality produced by regular

television networks. Television is immediate and can quickly grab the attention of staff. For

example, a CEO who had to make an emergency announcement to employees could do so within

minutes over a television system, while a newsletter or magazine takes weeks to produce.

According to a research conducted by Douglas (2006). The latest and fastest growing method of

corporate communications is electronic mail. E-mail is instantaneous and is available to anyone

10
with a computer terminal. E-mail can be customized to be sent to an individual or to a group of

people with a common interest, such as the members of a committee or staff. It can help

internally with scheduling, as well as with exposing organizations to staff comments and

complaints. E-mail can also be used to communicate with people external to the organization.

Because of advancement in technology, electronic method of communication is mostly used due

to its various advantages over manual method such as : the environmental benefits from a

potential reduction in the usage of paper for printing in an organization, the cost benefits from

reduced printing and postal delivery processes, increased speed of communications as employees

will be able to access communications from the Company or organization on the day of

publication, rather than having to wait for postal delivery etc..

2.1 CONCEPT OF INTRANET

An intranet is a private computer network that uses Internet Protocol technologies to securely

share any part of an organization's information or network operating system within that

organization. The term is used in contrast to internet, a network between organizations, and

instead refers to a network within an organization. Sometimes the term refers only to the

organization's internal website, but may be a more extensive part of the organization's

information technology infrastructure. It may host multiple private websites and constitute an

important component and focal point of internal communication and collaboration.

An intranet is built from the same concepts and technologies used for the Internet, such as client-

server computing and the Internet Protocol Suite (TCP/IP). An Intranet is a network based on the

internet TCP/IP open standard. An intranet belongs to an organization, and is designed to be


11
accessible only by the organization's members, employees, or others with authorization. An

intranet's Web site looks and act just like other Web sites, but has a firewall surrounding it to

fend off unauthorized users. Intranets are used to share information. Secure intranets are much

less expensive to build and manage than private, proprietary-standard networks. An intranet is a

self-contained, internal network linking multiples users by means of internet technology.

In effect, intranets put a fence around the world internet’s limitless territory, establishing

controlled-access sectors within which users can communicate freely and interact. Built and

managed by companies or organizations (called sponsors), these networks reside on the World

Wide Web, enabling cross-platform communications among authorized users in real time.

2.1.1 HOW THE INTRANET WORKS

Intranet is different from internet, Intranet means group of computers connected by LAN. You

can play games against each other and share files with each other. Most organizations use

Intranet. All computers are connected with each other using another computer called "Server",

which controls data transfer between any computers. Server has all rights and controls.

An intranet is a private computer network that uses Internet protocols, network connectivity, and

possibly the public telecommunication system to securely share part of an organization's

information or operations with its employees. Sometimes the term refers only to the most visible

service, the internal website. The same concepts and technologies of the Internet such as clients

and servers running on the Internet protocol suite are used to build an intranet. HTTP and other

Internet protocols are commonly used as well, especially FTP and e-mail. There is often an

12
attempt to use Internet technologies to provide new interfaces with Corporate legacy data and

information systems.

2.2 BENEFITS OF INTRANET

The following are benefits an organization derives from the use intranet.

• Workforce productivity: Intranets can help users to locate and view information

faster and use applications relevant to their roles and responsibilities. With the help of a

web browser interface, users can access data held in any database the organization wants

to make available, anytime and - subject to security provisions - from anywhere within

the company workstations, increasing employees' ability to perform their jobs faster,

more accurately, and with confidence that they have the right information. It also helps to

improve the services provided to the users.

• Time: Intranets allow organizations to distribute information to employees on an

as-needed basis; Employees may link to relevant information at their convenience, rather

than being distracted indiscriminately by electronic mail.

• Communication: Intranets can serve as powerful tools for communication within

an organization, vertically and horizontally. From a communications standpoint, intranets

are useful to communicate strategic initiatives that have a global reach throughout the

organization. The type of information that can easily be conveyed is the purpose of the

initiative and what the initiative is aiming to achieve, who is driving the initiative, results

achieved to date, and who to speak to for more information. By providing this

information on the intranet, staffs have the opportunity to keep up-to-date with the

13
strategic focus of the organization. Some examples of communication would be chat,

email, and or blogs. A great real world example of where an intranet helped a company

communicate is when Nestle had a number of food processing plants in Scandinavia.

Their central support system had to deal with a number of queries every day (McGovern,

Gerry). When Nestle decided to invest in an intranet, they quickly realized the savings.

McGovern says the savings from the reduction in query calls was substantially greater

than the investment in the intranet.

• Web publishing allows cumbersome corporate knowledge to be maintained and

easily accessed throughout the company using hypermedia and Web technologies.

Examples include: employee manuals, benefits documents, company policies, business

standards, newsfeeds, and even training, can be accessed using common Internet

standards (Acrobat files, Flash files, CGI applications). Because each business unit can

update the online copy of a document, the most recent version is always available to

employees using the intranet.

• Business operations and management: Intranets are also being used as a

platform for developing and deploying applications to support business operations and

decisions across the internetworked enterprise.

• Cost-effective: Users can view information and data via web-browser rather than

maintaining physical documents such as procedure manuals, internal phone list and

requisition forms. This can potentially save the business money on printing, duplicating

documents, and the environment as well as document maintenance overhead.

14
• Promote common corporate culture: Every user is viewing the same

information within the Intranet.

• Enhance Collaboration: With information easily accessible by all authorized

users, teamwork is enabled.

• Cross-platform Capability: Standards-compliant web browsers are available for

Windows, Mac, and UNIX.

• Built for One Audience: Many companies dictate computer specifications.

Which, in turn, may allow Intranet developers to write applications that only have to

work on one browser (no cross-browser compatibility issues).

• Knowledge of your Audience: Being able to specifically address your "viewer"

is a great advantage. Since Intranets are user specific (requiring database/network

authentication prior to access), you know exactly who you are interfacing with. So, you

can personalize your Intranet based on role (job title, department) or individual .

• Immediate Updates: When dealing with the public in any capacity,

laws/specifications/parameters can change. With an Intranet and providing your audience

with "live" changes, they are never out of date, which can limit a company's liability.

• Supports a distributed computing architecture: The intranet can also be linked

to a company’s management information system, for example a time keeping system.

15
2.3 SOCIAL IMPACT OF INTRANET ON ORGANIZATION

All intranets have one thing in common: they are built for employees/staffs. Social tools on the

intranet can help with employee adoption, engaging your users, and encouraging a community

where the goal is a more efficient, collaborative and team orientated environment.

Social media and social networking are changing the face of the internet. Bringing the power of

conversation and collaboration into the intranet world can be hugely beneficial and impact the

way the organization operates. The impact of social intranet systems in organization can be

highlighted as follows:

 Open publishing: The single most powerful concept for adoption and success: create

areas where employees can publish & contribute

 Quick polls: Create quick polls, put them on the home page, and view responses real-

time with visual charts.

 Buy and sell: The Buy & Sell tool is like an intranet marketplace where users can post

items for sale or resources like babysitters.

 Recipes: A purely social application where you can share your favorite recipes, quick

print & email to co-worker, rate, comment.

 Ratings and comments: A powerful tool to gauge how effective your intranet content is.

Employees can rate content and voice their opinions.

2.4 GRID COMPUTING AND ITS APPLICATION

Today there are many definitions of Grid computing: Here are some definitions of grid

computing as defined by various people.

16
 In Ian Foster’s article titled “What is the Grid? A Three Point Checklist” lists these

primary attributes:

o Computing resources are not administered centrally.

o Open standards are used.

o Nontrivial quality of service is achieved.

 Plaszczak/Wellner defines grid technology as "the technology that enables resource

virtualization, on-demand provisioning, and service (resource) sharing between

organizations."

 IBM defines grid computing as “the ability, using a set of open standards and protocols,

to gain access to applications and data, processing power, storage capacity and a vast

array of other computing resources over the Internet. A grid is a type of parallel and

distributed system that enables the sharing, selection, and aggregation of resources

distributed across ‘multiple’ administrative domains based on their (resources)

availability, capacity, performance, cost and users' quality-of-service requirements”.

 An earlier example of the notion of computing as utility was in 1965 by MIT's Fernando

Corbató. Corbató and the other designers of the Multics operating system envisioned a

computer facility operating “like a power company or water company”.

http://www.multicians.org/fjcc3.html

 Buyya/Venugopal define grid as "a type of parallel and distributed system that enables

the sharing, selection, and aggregation of geographically distributed autonomous

resources dynamically at runtime depending on their availability, capability,

performance, cost, and users' quality-of-service requirements".

17
 CERN, one of the largest users of grid technology, talk of The Grid as “a service for

sharing computer power and data storage capacity over the Internet.”

Grids can be categorized with a three stage model of departmental grids, enterprise grids and

global grids. These correspond to a firm initially utilizing resources within a single group i.e. an

engineering department connecting desktop machines, clusters and equipment. This progresses to

enterprise grids where nontechnical staff's computing resources can be used for cycle-stealing

and storage. A global grid is a connection of enterprise and departmental grids that can be used

in a commercial or collaborative manner.

The initial definition, as posed in Ian Foster’s “The Anatomy of the Grid”, encompassed

“coordinated resource sharing and problem solving in dynamic, multi-institutional virtual

organizations”. As indicated in a subsequent paper, “the key concept is the ability to negotiate

resource-sharing arrangements among a set of participating parties (providers and consumers)

and then to use the resulting resource pool for some purpose”.

Since then, the term has broadened to refer generally to the use of shared (commodity) computer

components, processing and storage in a distributed networked architecture. In essence, an

architectural alternative to the development of monolithic centralized computation and storage

architectures.

That having been said, there are at least three common uses of the term “Grid” in the present IT

lexicon:

18
 Technical Computing Grids employ rack-mount computer systems in scale-out

configurations to bring the aggregate processing power of many CPUs to bare on

problems of interest.

 Utility Computing Grids provide an agile, on-demand model for application

provisioning and migration based on sharing of common infrastructure resources

implemented through commodity computer components (CPUs, networking, storage).

 Data Grids provide for the distributed capture, management, and sharing of information

(and sometimes instrumentation) typically across multiple authority domains.

2.5 CURRENT RESEARCH AND APPLICATIONS

Grids offer a way to solve Grand Challenge problems such as protein folding, financial

modeling, earthquake simulation, and climate/weather modeling. Grids offer a way of using the

information technology resources optimally inside an organization. They also provide a means

for offering information technology as a utility for commercial and noncommercial clients, with

those clients paying only for what they use, as with electricity or water.

Grid computing is being applied by the National Science Foundation's National Technology

Grid, NASA's Information Power Grid, Pratt & Whitney, Bristol-Myers Squibb Co., and

American Express.

One of the most famous cycle-scavenging networks is SETI@home, which was using more than

3 million computers to achieve 23.37 sustained teraflops (979 lifetime teraflops) as of September

2001.

As of August 2009 Folding@home achieves more than 4 petaflops on over 350,000 machines.

19
The European Union has been a major proponent of grid computing. Many projects have been

funded through the framework programme of the European Commission. Many of the projects

are highlighted below, but two deserve special mention: BEinGRID and Enabling Grids for E-

sciencE

BEinGRID (Business Experiments in Grid) is a research project partly funded by the European

commission as an Integrated Project under the Sixth Framework Programme (FP6) sponsorship

program. Started in June 1 2006, the project will run 42 months, until November 2009. The

project is coordinated by Atos Origin. According to the project fact sheet, their mission is “to

establish effective routes to foster the adoption of Grid Computing across the EU and to

stimulate research into innovative business models using Grid technologies”. To extract best

practice and common themes from the experimental implementations, two groups of consultants

are analyzing a series of pilots, one technical, and one business. The results of these cross

analyzes are provided by the website Gridipedia. The project is significant not only for its long

duration, but also for its budget, which at 24.8 million Euros is the largest of any FP6 integrated

project. Of this, 15.7 million is provided by the European commission and the remainder by its

98 contributing partner companies.

The Enabling Grids for E-science project, which is based in the European Union and includes

sites in Asia and the United States, is a follow-up project to the European DataGrid (EDG) and

is arguably the largest computing grid on the planet. This, along with the LHC Computing Grid[8]

(LCG), has been developed to support the experiments using the CERN Large Hadron Collider.

The LCG project is driven by CERN's need to handle huge amounts of data, where storage rates

of several gigabytes per second (10 petabytes per year) are required. A list of active site

20
participating within LCG can be found online as can real time monitoring of the EGEE

infrastructure.[10] The relevant software and documentation is also publicly accessible.[11]

Another well-known project is distributed.net, which was started in 1997 and has run a number

of successful projects in its history.

The NASA Advanced Supercomputing facility (NAS) has run genetic algorithms using the

Condor cycle scavenger running on about 350 Sun and SGI workstations.

Until April 27, 2007, United Devices operated the United Devices Cancer Research Project

based on its Grid MP product, which cycle-scavenges on volunteer PCs connected to the

Internet. As of June 2005, the Grid MP ran on about 3.1 million machines.Another well-known

project is the World Community Grid. The World Community Grid's mission is to create the

largest public computing grid that benefits humanity. This work is built on the belief that

technological innovation combined with visionary scientific research and large-scale

volunteerism can change our world for the better. IBM Corporation has donated the hardware,

software, technical services, and expertise to build the infrastructure for World Community Grid

2.6 SUMMARY OF CHAPTER TWO

Chapter two discusses the general overview of information communication system, the intranet,

benefits and social impacts of the intranet within an organization, grid computing and its

application and current research.

This chapter in general discusses what various people have said about the topic and conclusions

reached, Areas where the project is useful, and so on

21
CHAPTER THREE

SYSTEM ANALYSIS AND DESIGN

System analysis involves reviewing the existing system (present system) and developing a new

system (proposed system) which will address the weakness of the present system.

It also involves the analysis of roles of the proposed system and the identification of the

requirement that should be met, it clearly defines the proposed system and is the bedrock upon

which the system design is built.

3.0 ANALYSIS OF THE EXISTING SYSTEM

Every organization has a defined system by which its operation is carried out; Venture

Undertaking is not an exception. Venture Undertaking has a well-structured pattern of manual

operations which has been in use for years; it is a system that evolves an information flow

pattern which is devoid of any computing aid for communication. The present system uses

manual method of communication whereby an employee of the organization communicate with

each other through oral, letters, circulars, memos, staff meetings, etc which makes

communication slower, less effective, less efficient and may also reduce the quality of

information along the line. The existing system can also be annoying in a situation whereby an

employee seeking urgent approval for certain job process have to move from one superior to

another.

22
3. 1 THE PROPOSED SYSTEM

The objective of the proposed system is to design a package that will effectively take care of the

drawbacks of the existing system. This proposed system aims at removing the complexity

associated with existing systems by removing the stress of employees moving from one place to

another in order to communicate or pass information from one place to the other. This proposed

system would enable employee to chat with each other on their intranet, and also allow employee

of this organization to send memo, e-mails, reduce complexity of workflow etc. to be sent from

one system to the other within a small to medium sized network using a simple user-friendly and

easy to use interface and also keeps update of upcoming event in the organization.

3.2 DESIGN OF THE PROPOSED SYSTEM

This is the specification or construction of a technical, computerized solution for the business

requirement identified in a system analysis. It takes the form of a working prototype. It can also

be defined as those tasks that focus on the specification of a detailed computer software based

solution. It is also called physical design. This will be achieved using PHP and MYSQL as the

backend.

This project will focus on the following:

 Client Login page.

 Admin login page.

 Detailed updates about the upcoming events in the organization and many more.

 Workflow process

23
Despite the availability of several existing software packages that can be used to send text

messages from one system to the other, this new system is still very relevant and useful because

of the benefit associated with it, which include:

 Once installed on the system on intranet/network, text messages can be sent from one

client system to the other without the need of any other software facility.

 The new system is cost effective, there are no fees charges after the purchase of the

software, and the software is available for use for as long as possible without any other

surcharge.

 The software requirement on the system is very minimal; all that is needed is Microsoft

Explorer on the server and Microsoft TCP/IP on all the systems.

24
25
3.3 DESIGN PHASES

3.3.1 INPUT DESIGN

Input refer to data the system receives from its environment that are necessary to affect its

operation. The system accepts the following categories of inputs database as determined by the

output required. This can be classified according to two basic characteristics thus:

 How the data is initially captured, entered and processed

 The method and technology used to capture and enter the data

Data can be entered using keyboard, mouse and so on. What goes into the computer for

processing (input) determines what comes out of it (output). The new system will be designed to

capture the following data which will be supplied by the user:

 At the login: This will capture the following data:

 User name

 Password

 At the Entry Storage of Any New User: This will capture the following data:

 User name

 Password

 Confirm password

26
 E-mail

The new system requires all essential data to be supplied by the user. The information is input

through the keyboard and they are discharge on the video display unit as it is being supplied and

later committed to the database. Data validation is ensured in the system to avoid invalid input

such as password that is less than six (6) characters, leaving a box empty e.t.c.

3.3.2 OUTPUT DESIGN

The end products of any system are its outputs and are used to describe what emerge from

computer system for the user to act upon. It is the final reports obtained after processing the data

input; this might be in form of print out or screen view.

 The Home Page

The home page is the most often hit page, but it should be the least used page. When someone

comes to a mailing system on the intranets they are looking for something specific. The moment

they are in, they want access to some tool or link that carries them off to the area they want.For

this project work, the home page displays the mailing list on the site with the introduction. The

user must be registered member before he/she would be able to login using a specified username

and password. The link on the home page is as follows:

 Send mail

 Update

 Send memo

 Chat

27
 Workflow

3.3.3 PROCESS DESIGN

The design of the process of the project involves a procedure which specifies each task to be

performed and the user to be responsible for carrying out the specific task. Important task

includes:

 Data Entry Procedure: This is the means of inserting data and entering recorded data

items into the system.

 Run Time Procedure: The personnel involved are the staff/lecturer. This means steps

and action taken to achieve a required or desired result. Ref

28
3.3.4 STORAGE DESIGN

Data can be organized or stored using different method, thus:

Network: Data model based on graphs with records as nodes and relationships between records

as edges. Each record can have multiple parents.

Hierarchical: Data is organized inform of trees. That is logically represented by an upside down

tree

Relational database: Here data model is based on tables. It allows the user to work with several

database files at the same time and share information across the files. 

Distributed: This is composed of several independent DBMSs running at the nodes of a

communications network

A flat-file: Database program, allows the user to create many databases but lets him/her work

with only one file at a time. Using a flat -file database program, one can create simple

applications such as mailing list databases or personnel files.

Object-Oriented: Data model based on the object-oriented programming paradigm.

This project was designed using relational database model which consist of tables. It allows for

collection of data items organized as a set of formally-described tables from which data can be

accessed or reassembled in many different ways without having to reorganize the database

29
tables. It also reduces the amount of redundant data in relations that can waste space and causes

integrity problems. It also provides fast access to data from the relations.

A. ADMIN USERTABLE

FIELD NAME DATA TYPE FIELD SIZE

Username VARCHAR 40

Password VARCHAR 20

B. SENDMEMOTABLE

FIELD NAME DATA TYPE FIELD SIZE

Recipient VARCHAR 40

Your Ref INTEGER 20

Our Ref INTEGER 20

Message LONGTEXT 0

Toid VARCHAR 40

Fromid VARCHAR 40

Data Sent DATE/TIME 0

C.SEND MAIL TABLE

FIELD NAME DATA TYPE FIELD SIZE

Recipient E-mail VARCHAR 40

Message LONGTEXT 0
30
Data Sent DATE/TIME 0
D.SENDSMSTABLE

FIELD NAME DATA TYPE FIELD SIZE

Recipient No INTEGER 15

Sender No INTEGER 15

Message LONGTEXT 160

Data Sent DATE/TIME 0

FIELD NAME DATA TYPE FIELD SIZE


E. UPDATETABLE
User name VARCHAR 40

Password VARCHAR 20

Buddy
FIELD NAME VARCHAR
DATA TYPE 100 SIZE
FIELD

Message
Message LONGTEXT
LONGTEXT 0 0

Data
Data Sent
Sent DATE/TIME
DATE/TIME 0 0

Type TEXT 50

ID BIGINT 20
F.
Is_Online INT 11
CHATTABLE
Last_Ping TEXT 40

Buddy Icon VARCHAR 4

Profile TEXT 100

Group VARCHAR 100

Room TEXT 50
31
Sender TEXT 100

Recepient TEXT 100


3.4 SUMMARY OF CHAPTER THREE

Chapter three discusses system analysis and design, proposed system, design of proposed system

database table the type of input acceptable in each segment for example text, variable, character

and so on conceptual model which deals with having a plan of what the proposed system should

look like and so on.

CHAPTER FOUR

SYSTEM IMPLEMENTATION AND DOCUMENTATION

4.0 INTRODUCTION

32
At this stage, actions are carried out rather than analyzed or designed. The conceptual and

theoretical design of the system will be turned into a working system, hardware is acquired

program is tested, training sessions are conducted, and data acquired are been stored in the

database

This part of this project deals with the different aspects that need to be considered so as to ensure

adequate functioning of the new system and to have successful implementation of the system. It

is the final stage in determining workability of the new system. Having designed the new system,

it is very important to ascertain the proper operation of the system and ensure that it achieves the

aims of the project. This is done by carrying out the installation of the new system and testing it

to see its viability and also to document every feature of the project.

4.1 PRE-IMPLEMENTATION

For any new system to work correctly as expected there is need to specify the hardware, software

and user requirement and these are stated below:

4.1.1 HARDWARE REQUIREMENT

Intranets are built on a client/server principle, which means to utilize an intranet you must have

clients and servers in place for effective and efficient functioning of the system.

The following hardware specifications are recommended:

• 64 MB Ram

• Intel Pentium IV processor

• 101 enhanced keyboard

33
• 6GB Hard disk drive

• A super video graphic adaptor (SVGA) monitor

• An uninterrupted power supply (UPS)

• Standard mouse and mouse pad

• CD Rom Drive

• A modem and network card (Ethernet adaptor)

• HUB, cables and clips

4.1.2 SOFTWARE REQUIREMENT

• Microsoft window XP or windows Vista O/S

• Macromedia Dreamweaver

• Wamp Server

• Web browser – Microsoft internet explorer, Mozilla Firefox, Opera, Safari etc.

4.1.3 USER REQUIREMENT

This describes the various users knowledge required for this system. Since this system is

designed to be used in an academic environment, the user will undergo a minimum of two day

training depending on his or her computer skill. This is done to ensure that the different users can

easily manipulate the software without requiring the help of the software developer.

4.2 SYSTEM IMPLEMENTATION

34
Before a new system is implemented, it may be necessary to conduct through testing of data to

ensure that the system works properly.

At the implementation stage the conceptual design of the proposed system will be turned into a

working system. The system would be thoroughly tested and designed to be explicate and less

tedious so that any other users of the system can perform the specified operations for which the

application was designed.

4.3 SYSTEM INSTALLATION PROCEDURE

• Insert the soft copy of Grid Computing Implementation in staff Communication System

• Click on program from the start menu

• Double click on my computer

• Double click on the soft copy icon

• Right click on the soft copy folder and click copy

• Double click on C:/drive

• Double click on Wamp folder, double click on htdocs-folder

• Right click on an empty space and click on paste.

4.4 SYSTEM OPERATION PROCEDURE

Once the software have been properly installed then the following operation procedure is

required:

35
• Click on program from the start button

• Click on any web browser e.g. Mozilla Firefox, Opera etc.

• In the URL type http://localhost/Grid/index.PHP/ and press enter

The homepage will be displayed

• Register as a new user or existing user then click ok

• Click on any of the send memo, send mail, chat, update button depending on what the

user want to do.

4.5 SYSTEM TESTING

This is one of the stages of implementation which is aimed at ensuring that the system works

accurately and efficiently before actual operation starts. The major aim of system testing is

mainly to locate and correct any error remaining in the system program. In the course of testing

the program designed for this project some errors were detected and they have been corrected

and the program is working perfectly well.

4.6 CONVERSION METHODS

After the system testing, validation and is satisfactory proven by a thorough test running, then a

changeover can be introduced, there are four well known conversion method which offer a range

of advantages and disadvantages. The system itself may well directly influence the final

decision. In many instances the faster conversion takes place the better in order to gain the

ultimate benefits that the new system offers. Change over means to integrate the new system and

the change over method may be any of the method below;

36
 Direct Change over

 Phase-In method

 Parallel Running

 Pilot implementation

a. Direct Approach: This approach entails selecting a particular date when the old system is

terminated and the new system is brought into operation. It cost lesser than the parallel method

but is prone to error.

b. Phase Approach: When a system is composed of different self contained modules

performing different functions. It may be possible to phase in the new system while gradually

phasing out the old system, thus phase approach.

c. Parallel Approach: A parallel method is used in this application because it is considered

the most secure method with both systems running in parallel over an introductory period. The

old system remains fully operational while the new system comes on line. If the new system fails

the existing system can as well be used or both can be running at the same time. The new system

is more reliable in terms of information dissemination among staff; it enhances a faster

dissemination of information and creates an avenue for staff to communicate with each other.

Thus the manual system does not have such facilities.

4.7 SYSTEM EVALUATION

A post implementation was carried on the system after the system had been confirmed working

and effective. This is made possible by comparing the aim and objective of the proposed system

as regards the effectiveness. All discrepancy noted at this stage were corrected by way of re-

37
designing the software. The new system is thus able to meet its objectives please refer to chapter

one.

4.8 SYSTEM DOCUMENTATION.

Documentation is necessary at this stage in order to make communication easier between the

designer of the new system and the users of the system. This process will make the development

of the new system easier and faster as the document will serve as a guide line for the developer

to follow. The system is specified to enable easy access to information communication. It

consists of the following:

• Users guide

• Program flowcharts

• Input layout

• Output layout

4.9 SYSTEM MAINTENANCE

The maintenance of a system is the most expensive stage in system life cycle. It has been

estimated that over life cycle of a typical system, the maintenance and enhancement costs

incurred may be two to four times larger than the initial development cost. System maintenance

involves protecting the system from both direct and indirect damage; hence periodic review

should be embarked upon. This stage is an important duty of a programmer and may involve all

the steps from problem definition through analysis design and program preparation. It entails

both hardware and software maintenance. It is the combining process of correcting, modifying

and improving the system. There are three types of system maintenance, thus:

38
• Corrective Maintenance: This type of maintenance rectifies design, coding or

implementation errors.

• Adaptive Maintenance: These adjust the system to changing environment conditions,

for instance, adapting software running on a main frame to work on a micro computer.

• Perfective Maintenance: This tends towards making the system perfect and enhances

performance or maintainability. Example, improving speed or appearance of a system

4.10 SUMMARY OF CHAPTER FOUR

Chapter four discusses system implementation, system installation procedure, system operation

procedure, system testing, conversion methods, system evaluation, documentation and

maintenance which helps to ensure that the new system is working properly. Many systems fail

through inadequate conduct of the implementation phase than for any other reason.

CHAPTER FIVE

SUMMARY, RECOMMENDATION AND CONCLUSION

5.0 SUMMARY

39
Grid computing implementation in staff communication is a very informative and educative one.

It has the following functionalities sending mail, chat, request, sms, and updates.

This research work had been an informative one for me. Also, the intranet site implementation

has been one of interest. Personally, I have benefited a lot from this research work because it has

really helped my web development skills; I also learnt to use certain application such as

Microsoft Visio, paint, and Dreamweaver, Apache and Wamp servers and so on. It also

encouraged me to research more and found solutions to database connectivity on the web.

Through the execution of this project, there is a functional communication system created by me.

5.1 ACHIEVEMENTS

The research work has assisted in the achievement of the following:

• Send memo in real time.

• Send intranet E-mail.

• Support online chats between staffs on the intranet.

• Notifies members of staff about upcoming organizational events in the form of updates.

• Enhances easy workflow by eliminating delays in approval.

• A system that is cost effective

5.2 PROBLEMS ENCOUNTERED

During the course of developing the new system, some problems were encountered and this

problem includes:

 Difficulty encountered while gathering all necessary information.


40
 Difficulty encountered while learning the programming language (PHP) and my SQL

database.

 Financial problem was also one of the major problems encountered because for every

material needed require money e.g. browsing so as to source for information.

 Erratic power supply both in school and at home also hindered the project design in various

ways.

 Also the time allotted for the completion of the project was not sufficient as it require time

to learn the programming too, used for the project.

5.3 RECOMMENDATIONS

Based on the study conducted and analysis made, it is recommended that, organizations should

embrace real-time computer based operations for efficient and effective communication systems

from one department to another using the communication system on intranet.

I hereby recommend the system which will help in maximizing the resources such as time,

material and also for retrieval of urgent information and reduce cost.

The system will also function in any other Organization as long as the specification given is

meant.

5.4 CONCLUSION

Grid computing implementation in staff communication system is very important and exciting as

it makes room for more effective, efficient and quality information among staff and student of

the college.
41
In conclusion, this research work can further be improved upon by upcoming students by

implementing communication systems for flexibility and consistency and should be hosted in the

departmental lab.

5.5 SUMMARY OF CHAPTER FIVE

This chapter is an overview of the project as a whole it gives summary, achievements which

includes successful sending of mail, chatting, updates, request and so on, problems encountered

and recommendations.

REFERENCES

1. Brian Austin (2000), Web Page Design In Easy Step, Computer Step,

Soytham, England (Second Edition).

2. Bralemo L.S (1995) “importance of Information and communication”, pp 1235-1240.

42
3. David Buser Et Al (1999), Beginning PHP 2.0, Wrox Press, Birmingham

uk.

4. Herta A. Murphy and Herbert W. Hildebrandt “Effective Business

Communications”, Courier Dover Publications, 1982, ISBN 0-486-24243-

9, Google Print: p.27

5. Ian Foster, Carl Kesselman, Steven Tuecke, ”The Anatomy of the

Grid”,http://www.globus.org/alliance/publications/papers/anatomy.pdf

6. Ian Foster, “What is the Grid Three Point Checklist.”, http://www-

fp.mcs.anl.gov/~foster/Articles/WhatIsTheGrid.pdf

7. Osei k. Darkwa : State of Information Communications  Technology

Infrastructure in Africa, August 2007.

www.africa.upenn.edu/particles_Gem/Africa-modern_1815.html

8. Robert Reinhardt & Joey Lott (2004) Flash MX 2004 Action

Script Bible 5th Edition, Wiley publishing, lnc. W475 Cross point

Boulevard, Indianapolis, Indiana, USA.

9. Whysock, Robert, (2003)” Effective Project Management”, Vol6, no.2,

pp85-87

SITE VISITED

Php Manual, www.brainjar.com/php, September 2009

Database connection, www.devx.com/datdbase/connection, Oct 2009

43
Grid computing, www.google.com, September 2009

Sending sms, www.smslive247.com, November 2009

Php tutorial, www.programmersheaven.com, August 2009

FLOW CHART

44
45
46
47
PROGRAM LISTING
ADMINPAGE

<?

require_once("fns.php");

conn();

if($Submit=="Add Admin")

if(!$username1 || !$password1)

$error="You have not enter the required details!!!";

else

$uploadDir = "uploads/";

$fileName = $_FILES['uploaded']['name'];

$tmpName = $_FILES['uploaded']['tmp_name'];

$fileSize = $_FILES['uploaded']['size'];

$fileType = $_FILES['uploaded']['type'];

$filePath = $uploadDir.$fileName;

$result = move_uploaded_file($tmpName, $filePath);

if (!$result)

$error="Error uploading file";

else

48
{

$result=mysql_query("select * from admin where u='$username1'");

$num_result=mysql_affected_rows();

if($num_result > 0)

$error="Sorry, Admin Already Exist!!!";

else

$result=mysql_query("insert into admin values


('$username1','$password1','$filePath','$rank')");

$error="Admin Account Created!!!";

}}}

?>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />

<title>Untitled Document</title>

<style type="text/css">

<!--

.style2 {color: #FFFFFF}

-->

</style>

<link href="style.css" rel="stylesheet" type="text/css" />

49
<style type="text/css">

<!--

.style5 {

font-size: 11px;

color: #FFFFFF;

font-weight: bold;

.style6 {

font-size: 11px;

color: #FFFFFF;

.style13 {font-size: 13px}

-->

</style>

</head>

<body>

<table width="630" height="166" border="0" cellpadding="0" cellspacing="0"


class="noborderpadding">

<tr class="textonly1">

<td width="560" height="146" valign="top">

<table width="630" height="44" border="0" cellpadding="0" cellspacing="0"> <tr>

<td height="19" align="center"><span class="textonly3 style13">Admin Setup


</span></td></tr><tr>

<td><table width="658" height="22" border="0" cellpadding="0" cellspacing="0"


bgcolor="#FFFFFF" class="border">

50
<tr bgcolor="#99CC33" class="textonly1">

<td width="163" align="center" class="textonly3"><a href="adminpage.php?


page=addadmin" class="textonly1">Add Admin </a></td>

<td width="96" align="center" class="textonly3"><a href="adminpage.php?


page=admin" class="textonly1">Admin List </a></td>

<td width="230" align="center" class="textonly3">&nbsp;</td>

<td width="13" align="center" class="textonly3 style2">&nbsp;</td>

<td width="154" align="center" bgcolor="#99CC33" class="textonly3">&nbsp;</td>

</tr>

</table></td>

</tr>

</table>

<form action="" method="post" enctype="multipart/form-data" name="form2" id="form2">

<table width="331" height="149" border="0" cellpadding="0" cellspacing="0"


class="textonly3">

<tr bgcolor="#FFFFFF">

<td width="74" height="27" valign="middle">Username:</td>

<td width="258" valign="middle"><input name="username1" type="text"


class="bannertext" id="username1" /></td>

</tr>

<tr>

<td height="23" valign="middle">Password:</td>

<td valign="middle"><input name="password1" type="password" class="bannertext"


id="password1" /></td>

</tr>

51
<tr bgcolor="#CCCCCC">

<td height="20" valign="middle" bgcolor="#FFFFFF">Rank:</td>

<td valign="middle" bgcolor="#FFFFFF"><select name="rank" class="border"


id="rank">

<option value="SELECT RANK">SELECT RANK</option>

<option value="STORE MANAGER">STORE MANAGER</option>

<option value="PRODUCTION MANAGER">PRODUCTION MANAGER</option>

<option value="SALES MANAGER">SALES MANAGER</option>

<option value="SUPERVISOR">SUPERVISOR</option>

<option value="FACTORY MANAGER">FACTORY


MANAGER</option></select></td> </tr>

<tr bgcolor="#CCCCCC">

<td height="20" valign="middle" bgcolor="#FFFFFF">Signature:</td>

<td valign="middle" bgcolor="#FFFFFF"><input name="uploaded" type="file"


class="bannertext" id="uploaded" /></td></tr>

<tr bgcolor="#CCCCCC">

<td height="20" valign="middle" bgcolor="#FFFFFF">&nbsp;</td>

<td valign="middle" bgcolor="#FFFFFF"><label>

<input name="Submit" type="submit" class="bannertext" value="Add Admin" />

</label></td </tr></table> </form></td></tr><tr>

<td height="18" align="left" valign="top"><p><font color="#FF0000" face="Verdana, Arial,


Helvetica, sans-serif" size="-1"><?=$error? </font></p></td></tr></table><br
/></body></html>

ADD STAFF.

<?

require_once("fns.php");

conn();

52
if($Submit=="Add Admin")

if(!$username1 || !$password1)

$error="You have not enter the required details!!!";

else

$uploadDir = "uploads/";

$fileName = $_FILES['uploaded']['name'];

$tmpName = $_FILES['uploaded']['tmp_name'];

$fileSize = $_FILES['uploaded']['size'];

$fileType = $_FILES['uploaded']['type'];

$filePath = $uploadDir.$fileName;

$result = move_uploaded_file($tmpName, $filePath);

if (!$result)

$error="Error uploading file";

else

$result=mysql_query("select * from admin where


u='$username1'");

53
$num_result=mysql_affected_rows();

if($num_result > 0)

$error="Sorry, Admin Already Exist!!!";

else

$result=mysql_query("insert into admin values


('$username1','$password1','$filePath','$rank')");

$error="Admin Account Created!!!";

}}}

?>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />

<title>Untitled Document</title>

<style type="text/css">

<!--

.style2 {color: #FFFFFF}

-->

</style>

<link href="style.css" rel="stylesheet" type="text/css" />

<style type="text/css">

<!--

54
.style5 {

font-size: 11px;

color: #FFFFFF;

font-weight: bold;

.style6 {

font-size: 11px;

color: #FFFFFF;

.style13 {font-size: 13px}

-->

</style></head><body>

<table width="630" height="166" border="0" cellpadding="0" cellspacing="0"


class="noborderpadding">

<tr class="textonly1">

<td width="560" height="146" valign="top">

<table width="630" height="44" border="0" cellpadding="0" cellspacing="0">

<tr>

<td height="19" align="center"><span class="textonly3 style13">Admin Setup


</span></td>

</tr>

<tr>

<td><table width="658" height="22" border="0" cellpadding="0" cellspacing="0"


bgcolor="#FFFFFF" class="border">

<tr bgcolor="#99CC33" class="textonly1">

<td width="163" align="center" class="textonly3"><a href="adminpage.php?


page=addadmin" class="textonly1">Add Admin </a></td>

55
<td width="96" align="center" class="textonly3"><a href="adminpage.php?
page=admin" class="textonly1">Admin List </a></td>

<td width="230" align="center" class="textonly3">&nbsp;</td>

<td width="13" align="center" class="textonly3 style2">&nbsp;</td>

<td width="154" align="center" bgcolor="#99CC33" class="textonly3">&nbsp;</td>

</tr>

</table></td> </tr></table>

<form action="" method="post" enctype="multipart/form-data" name="form2" id="form2">

<table width="331" height="149" border="0" cellpadding="0" cellspacing="0"


class="textonly3">

<tr bgcolor="#FFFFFF">

<td width="74" height="27" valign="middle">Username:</td>

<td width="258" valign="middle"><input name="username1" type="text"


class="bannertext" id="username1" /></td>

</tr> <tr>

<td height="23" valign="middle">Password:</td>

<td valign="middle"><input name="password1" type="password" class="bannertext"


id="password1" /></td>

</tr>

<tr bgcolor="#CCCCCC">

<td height="20" valign="middle" bgcolor="#FFFFFF">Rank:</td>

<td valign="middle" bgcolor="#FFFFFF"><select name="rank" class="border"


id="rank">

<option value="SELECT RANK">SELECT RANK</option>

<option value="STORE MANAGER">STORE MANAGER</option>

<option value="PRODUCTION MANAGER">PRODUCTION MANAGER</option>

<option value="SALES MANAGER">SALES MANAGER</option>

56
<option value="SUPERVISOR">SUPERVISOR</option>

<option value="FACTORY MANAGER">FACTORY


MANAGER</option></select></td>

</tr>

<tr bgcolor="#CCCCCC">

<td height="20" valign="middle" bgcolor="#FFFFFF">Signature:</td>

<td valign="middle" bgcolor="#FFFFFF"><input name="uploaded" type="file"


class="bannertext" id="uploaded" /></td>

</tr>

<tr bgcolor="#CCCCCC">

<td height="20" valign="middle" bgcolor="#FFFFFF">&nbsp;</td>

<td valign="middle" bgcolor="#FFFFFF"><label>

<input name="Submit" type="submit" class="bannertext" value="Add Admin" />

</label></td</tr></table></form></td> </tr><tr>

<td height="18" align="left" valign="top"><p><font color="#FF0000" face="Verdana, Arial,


Helvetica, sans-serif" size="-1"><?=$error?>

</font></p></td></tr></table><br /></body></html>

ADMIN PAGE

?>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"


"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">

<html xmlns="http://www.w3.org/1999/xhtml">

<head>

<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1" />

<title>Grid Computing Implementation In Staff Communication...</title>

<link href="style.css" rel="stylesheet" type="text/css" />

<style type="text/css">

57
<!--

.style2 {color: #FFFFFF}

body {

background-image: url();

background-color: #000000;}--></style></head>

<?

require_once("fns.php");

conn();

if($Submit=="Confirm Delete")

{if(!$username1){

$error1="You have not enter the required details!!!";}

else{

$result=mysql_query("select * from admin where u='$username1'");

$num_result=mysql_affected_rows();

if($num_result < 1){

$error1="Sorry, Admin Not Found!!!";

} else{

$result=mysql_query("delete from admin where u='$username1'");

$error1="Admin Has Been Deleted!!!"; }}}

DELETE ADMIN

<?

require_once("fns.php");

conn();

if($Submit=="Confirm Delete")

58
{

if(!$aid)

$error="You have not enter the required details!!!";

else

$result=mysql_query("select * from member where aid='$aid'");

$num_result=mysql_affected_rows();

if($num_result < 1)

$error="Sorry, Member Not Found!!!";

else

$result=mysql_query("delete from member where aid='$aid'");

$error="Member Has Been Deleted!!!";

$aid="";

}}}

REQUEST

<?

require_once("fns.php");

conn();

if($Submit=="Submit"){

59
if(!$item || !$qty){

$error="You have not enter the required details!!!";}

elseif(!is_numeric($qty)){

$error="Invalid Quantity!!!";}

else{$date = date("d:m:Y h:i:s A");

$name=getname($username);

$result = mysql_query("insert into request


values('$username','$name','$date','no','$qty','$item','','')");

$error="Request Has Been Made!!!"; }}

Send mail

<?

require_once("fns.php");

conn();

if($Submit=="Send"){

if(!$email || !$msg || !$subject){

$error="You have not enter the required details!!!";}

else{

$dat=date("D d M Y g:i A");

$senderemail=getemail2($username);

$receiveremail=$email;

//mail($receiveremail, $subject, $msg, $senderemail);

//send message to database

$result=mysql_query("insert into email values


('$receiveremail','$subject','$msg','$senderemail','$dat',null)");

60
$result=mysql_query("insert into sentemail values
('$receiveremail','$subject','$msg','$senderemail','$dat',null,'$username')");

$error="Message Sent!!!"; }}<?

require_once("fns.php");

conn();

if($Submit=="Confirm Delete"){

if(!$aid){

$error="You have not enter the required details!!!";}

else{

$result=mysql_query("select * from member where aid='$aid'");

$num_result=mysql_affected_rows();

if($num_result < 1)

$error="Sorry, Member Not Found!!!";

} else

$result=mysql_query("delete from member where aid='$aid'");

$error="Member Has Been Deleted!!!";

$aid="";}}}

STAFF PAGE

<?php

session_start();

require_once("fns.php");

conn();

if (!isset($_SESSION['username']) || !isset($_SESSION['password'])) {

61
include("index.php");

exit; }

?>

UPDATE

<?

require_once("fns.php");

conn();

if($Submit=="Post Update")

{if(!$msg){

$error="You have not enter the required details!!!";

else

{ $dat=date("D d M Y g:i A");

$result=mysql_query("update news set dat='$dat', msg='$msg' where id='1'");

$error="Update Posted!!!"; }}

VIEW UPDATES

<?

require_once("fns.php");

conn();

$result=mysql_query("select * from request where item='$item'");

$row=mysql_fetch_array($result);

$name=$row['name'];

$email=$row['email'];

$dat=$row['dat'];

$item=$row['item'];

62
$qty=$row['qty'];

$appby=$row['appby'];

$appsign=$row['appsign'];

$status=$row['status'];

if($status == 'no')

$status="Not Approved";

else

$status="Approved";

WORKFLOW

<?

if($page1=="deleteitem")

$result=mysql_query("delete from request where item='$item'");}

if($page1=='approve'){

$appby=$username;

$appsign=getsign($username);

$result = mysql_query("update request set status='yes',appby='$appby',appsign='$appsign'


where item='$item'");

?>

63
INPUT AND OUTPUT LISTING

HOMEPAGE

ADMIN SETUP

64
ADMIN SETUP

65
ADD STAFF

STAFF SETUP

66
APPROVED REQUEST LIST

MAIL

67
SENT MAIL

REQUEST FORM

68
REQUISITION DETAILS

MEMO

69
CHAT

70
TABLE OF CONTENTS
Title page i
Certification ii
Dedication iii
Acknowledgement iv
Abstract v
CHAPTER ONE: INTRODUCTION
1.0 General Introduction…………………………………….......................................1
1.1 Statement of problem……………………………………………………………….3
1.2 Objectives…………………………………………………………………………3
1.3 Research methodology……………………………………………………………4
1.4 Scope of Study……………………………………………………………………4
1.5 Definition of Terms……………………………………………………………….4
1.6 Summary of chapter 1…………………………………………………………….6

CHAPTER TWO: LITERATURE REVIEW


2.0 Overview of Information Communication System………………………………7
2.1 Concept of intranet………………………………………………………………11
2.2 Benefits of Intranet……………………………………………………………...12
2.3 Social impact of intranet in Organization……………………………………….16
2.4 Grid Computing and its Application …………………………………………...16
2.5 Current Research and Applications…………………………………………….19
2.6 Summary of chapter 2……………………………………………………………21

CHAPTER THREE: SYSTEM ANALYSIS AND DESIGN


3.0 Analysis of the Existing System………………………………………………..22
3.1 The proposed System……………………………………………………………23
3.2 Design of the Proposed System…………………………………………………23
3.3 Design phases…………………………………………………………………....26
3.4 Summary of chapter 3…………………………………………………………..32
CHAPTER FOUR: SYSTEM IMPLEMENTATION AND DOCUMENTATION
4.0 Introduction…………………………………………………………………….33
4.1 Pre-Implementation……………………………………………………………..33

4.2 System Implementation…………………………………………………………35


4.3 System Installation Procedure…………………………………………………..35
4.4 System Operation Procedure……………………………………………………36
4.5 System Testing………………………………………………………………….36
4.6 Conversion Methods…………………………………………………………....36
4.7 System Evaluation………………………………………………………………38
4.8 System Documentation………………………………………………………....38
4.9 System Maintenance…………………………………………………………....38
4.10 Summary of chapter 4…………………………………………………………..39

CHAPTER FIVE: SUMMARY, RECOMMENDATION AND CONCLUSION

71
5.0 Summary………………………………………………………………………40
5.1 Achievements………………………………………………………………….40
5.2 Problems Encountered…………………………………………………….…...41
5.3 Recommendations…………………………………………………………….41
5.4 Conclusion…………………………………………………………………….42
5.5 Summary of chapter 5……………………………………………………........42

REFERENCES
APPENDIXES
APPENDIX A (FLOW CHART)
APPENDIX B (PROGRAM LISTING)
APPENDIX C (INPUT AND OUTPUT LISTING)

72

You might also like