KEMBAR78
Secured File Transfer Agent | PDF | Server (Computing) | Computer Network
0% found this document useful (0 votes)
58 views17 pages

Secured File Transfer Agent

This document describes a secured file transfer agent (SFTA) platform developed by students at PES College of Engineering in Mandya, India. It discusses conducting a feasibility study for the project. It also includes information about the system analysis, which involved creating a data flow diagram and defining modules for the server (including a server manager, user manager, log manager, and encryption manager) and client (including a file receiver). The document concludes with an overview of the system design process for the SFTA.

Uploaded by

Manju SJ
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
58 views17 pages

Secured File Transfer Agent

This document describes a secured file transfer agent (SFTA) platform developed by students at PES College of Engineering in Mandya, India. It discusses conducting a feasibility study for the project. It also includes information about the system analysis, which involved creating a data flow diagram and defining modules for the server (including a server manager, user manager, log manager, and encryption manager) and client (including a file receiver). The document concludes with an overview of the system design process for the SFTA.

Uploaded by

Manju SJ
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 17

PES COLLEGE OF ENGINEERING

Mandya

Secured File Transfer Agent

Submitted By:
Vasanth kumar L.S.(4PS08CS411)
Manju S.J.(4PS08CS403)
Devaraju N.(4PS08CS401)
Chandan L.J.(4PS07CS027)

Guided by:
Madhurgeetha S.
Lecturer
Dept of CS&E
PES college of engineering.
Mandya
SFTA
Secured File Transfer
Agent
Plat Form Independent
Abstraction
File transfer is a generic term for the act of
transmitting files over a computer network or the
Internet. There are numerous ways and protocols to
transfer files over a network. As enterprises become
dispersed geographically, an increasing number of
applications are accessing databases over unsecured
networks. Data transmitted over the network is
susceptible to sniffing and integrity attacks. The
confidentiality and integrity of data transmissions over
the network can be ensured by encrypting the data.
SYSTEM ANALYSIS

FEASIBILITY STUDY:
An important outcome of the preliminary investigation is the determination that
the system requested is feasible. Feasibility studies are actually done in a small
scale. It differs from a full analysis in the level of detail with which it is carried out. The
study involves in most of the tasks a full system analysis but with narrow focus and
more limited time.
  The results of the study help the user decide whether to proceed, amend,
postpone or cancel the project particularly important when the project is large,
complex and costly…The objective of the feasibility study is to determine whether the
proposed system is feasibly when operating under the existing environment.
DATA FLOW DIAGRAM:

The Data Flow Diagram is a modeling tool that


allows us to picture a system as a network of functional
process connected to one another by “pipelines” and
“holding tanks” of data. The data flow diagram is one of
the most commonly used system-modeling tools,
particularly for operational systems in which the
functions of the system are of paramount importance
and more complex than the data that the system
manipulates.
 System Architecture
Modules
The implementation involves

 Server
 Share manager
 User manager
 log manager
 server manager
 encryption manager

  Client
 File receiver
Server Manager
Server Manager
• The “Server Manager” is responsible to start the
server with a port number after the shares are set.
Once the server is set on it listens to the client’s
request. Here the client has to pass the correct IP
address and the port number specified by the server
should be mentioned. Then the server sends the login
forms if the details are valid and again if the log details
are valid the client can view the files and may get it if
required.
Log Manager
Log Manager

• The “Log Manager” in order to view the users


who had made illegal attempts. Here the  details
such as the user name, the password used, the
date and the timings are been displayed. So with
the help of these details actions can be taken on
the respective intruder.
User Manager
User Manager

• The play role starts with the “User Manager” who


is responsible for all the operations performed
regarding the user accounts. Here the users differ
from the normal system users. Options are
provided to add a new user or to delete a user. One
can also view the list of users and search for
particular users.
Share Manager
File Receiver
SYSTEM DESIGN
System design is the process of planning a new system to replace or
complement the older one. All the efforts put on the System Analysis are of no use if
the System design is not proper. System design develops the architectural detail
required to build a system.

The system design process encompasses the following activities:


 
 Partition the analysis model into subsystems.
 Identify concurrency that is dictated by the problem.
 Allocate subsystems to processors and tasks.
 Develop a design for the user interface.
 Choose a basic strategy for implementing data management.
 Identify global resources and the control mechanisms required to access them.
 Design an appropriate control mechanism for the system including task management.
 Consider how boundary conditions should be handled.
 Review and consider trader-off.
Thank you

You might also like