rdbp - remote dabase backup protocol
TRANSCRIPT
Project Guide:- Prof. Bhavani Sankar Panda
MAJHIGHARIANI INSTITUTE OF TECHNOLOGY AND SCIENCESriram Vihar, Bhujabala,
Rayagada, Odisha-765017www.mitscollege.ac.in
Presented By:-
KUMAR BHASKAR (0901224231) MAYANK (0901224170)
KOTAK MEET KUMAR (0901224101) PRIYANKA VERMA (0901224233)
( RDBP )
Introduction
Related Terms
Complete Description
System Requirement
Screen Shots
Area of implementation
Future Enhancements
Bibliography
It is a software made for the easy record maintenance and for the database backup
of different clients, inserting the records in the local database.
In this software there are three important terms Clients (User) , Operator Server
and Cloud Server.
It is based on the concept that there are a number of system connected in the
network, each having it’s own database. And there is another system acting as the
master system which authenticates other connected systems. Master system give
them permission to insert records and also takes backup of all the records inserted by
individual systems in their own database. It also do backup of all the systems to the
cloud database according to time & need.
•It is the client having a local database, wheredata entry originally occurs after successfullogin.
User :
•It is the server authenticating the loginrequests from all the users & performs allother operations (such as – backup, scheduling,etc.).
Operator Server :
•It is the server present in the cloud, which onlytakes backup of each user’s database.
Cloud Server :
Software Requirements:
Operating System : Linux OS
Technology : GLADE with C coding & MYSQL
Hardware Requirements:
Processor : 1.6 GHz or faster processor
Hard Disk : 12 GB of available hard-disk space
RAM : 512 MB RAM
IT Industries or companies.
Schools & Colleges.
Shopping Complex
( Big Bazaar, Pantaloon ).
Cloud and Workstations.
Can be added with features like – Report Viewer.
Apart from tables & records in database, files from one system to other could also be transferred or backup.
Encryption & decryption mechanisms can be implemented for backup and file transfer.
Can be used over internet to connect to any system.
www.litindia.in
www.google.com
www.w3schools.com
www.wikipedia.org
• By Susant K Rout, PHI PublicationC Learning & Building Business &
System Applications
• By Ivan Barrows, BPB PublicationsIntroduction to SQL