Company Peripheral Management System Computer Science Essay

Published: Last Edited:

This essay has been submitted by a student. This is not an example of the work written by our professional essay writers.

The Proposed project is intended for the organization named Galaxy Software solution which is India based organization that provides IT solution for a dynamic environment where buisness and technology strategies converge.There approach focusses on new way of buisness and leveraging an organization's current IT assets.They work to implement new product and to implement prudent buisness and technology strategies in todays environment.There organisation has two objective

  • Effectively address the buisness issues our customers face today
  • Generate new oppurtunities that will help them stay a ahead in the futures.

Galaxy Software Solutions deal with every client in there organization with different problems from different people to deal with.One such domain is addressing to trouble shooting and management of computers and other sharable peripherals connected to a given network has become a norm in all huge,small,private,government corporate,non corporate organizations, especially in huge organizations where the number of employees who use these shared peripherals is quite large allocation of these peripherals and subsequent tracking and trouble shootingmanagement becomes a cumbersome, complicated and inefficient.In organization where timelines play a very vital role immediate handling of all trouble shooting becomes essential, A physical communication of this problems rather becomes too time consuming and is prone to be inefficient.Thereby here we use solution servlet,Jsp for providing to have centralized control and management of all the shared peripherals in a given network.By this we can examine if the system in company is not in working condition then they should call system administrator for specified peripheral ,then he call the vendor on-line for the specific peripheral.

For this reason,the objective of this project is to research how to handle the peripherals in technical manner.A physical communication of this problems rather becomes too time consuming and is prone to be inefficient.Thereby having an management system which allows centralized control and management becomes rather essential,there by helping those organizations where the network is spread across a geographical domain contracts and subcontracts management with various concerned agencies must be handled by the system.The research will assist a good solution to the organization.The research will also include how it is implemented,critically evaluating the solution provided to organization.The organization can have less time consuming for the communication.

The scope of the project includes

  • To have a centralized control and management of all the shared peripherals in a given network.
  • Efficiently addressing to all the troubleshooting of the shared resources in a given network
  • Identifying the problem and improve it with new techniques.
  • The new approachis critically evalauated for the companies present problem.

Product to be delivered to the client:

The product delivered to the client is”Mailing System for a Server”.In detail what actually delivered to client and his need is

To Have a personnel interaction for trouble shoot reporting and subsequent follow up must be eradicated and all issues must be handled by the system, there by helping those organization where the network is spread across a geographical domain.Contract and subcontracts management with various concerned agencies must be handled by the system and designing a foolproof system where unauthorized access to resources is totally eradicated by implementing an appropriate authenticati on mechanism.

The process how it starts and end the process in project

Here it is


· Complaint handling

· Allocation

- Work for engineers

- Sharable peripherals to employees

· Adding of details

- Sharable peripheral details

- Employee details

- Contract Management Details

· Enquires

- Resource enquires

- Dept Enquires

· Reports

- Resource Details

- Dept Enquires

· Mailing

- Check Mails

- Compose Mail


· Complaint Posting

· Status Acquiring

· Mailing

- Check Mails

- Compose Mail

Report Generation:

We will be making the reports of employee,engineering on basic of their performance.The administration will maintain all the details of employee,engineers data using some criteria.

Client Requirement:

The solution which is to be delivered with which the client's requirements can be considered they are

Mainly the client required is to Design a full proof system where unauthorized access to resources is totally eradicated by implementing an appropriate authentication mechanism.Generatingreports about various managerial aspects such as allocation of resources,enquiry reports etc.

  • With this system employees will lodge all the troubles of the shared resources in a given network to administrator.
  • Administrator will take into account of those complaints which are lodged by employees in an organization.
  • After then he will allot the engineers which are suitable to that troubles.
  • The engineers will walk off to the troubles into the system then solve that trouble and lodge the report of that system to administrator.
  • Adminstrator will prepare reports of system like who are employees in organization and what are peripherals are they having.
  • Adminstrator will also maintain reports of computers information and printer's information.

Client Constraints:

The expansion must follow conventions and standards used in the mailing service.


  • Softwares regarding within the project are provided.
  • Online books, journal related to project is provided.
  • A minimum of eight hours for 8-9 hours access for meeting purposes has be guaranteed by the sponsor.
  • Relevant document like domain specifications,standards are provided

Project Objectives:

The main objectives of this project are

  • The company to have centralized control and management off all the shared peripherals in a given network
  • Facilitating desired information display, very quickly, by retrieving information from users.
  • To reduce manual efforts in activities that invloved repetitive work
  • If the developers are working for the company faces any problems related to his peripherals, he will send mail to adminstrator.
  • The administrator will inform it to the system administrator, he will try to solve it or else he will send a mail to peripheral vendor. He will either replace it or solve the problems.
  • This problem solving with the company by the mailing service which is designed by our application.
  • The main objective is to control the managenent with centralized access control in company on peripherals.

The goal of this project is to implement an online control and trouble shooting reporting system for maintaining the peripherals in the network of an huge corporate organization.Here the entire peripheral allotment and subsequent trouble shooting reporting is centralized by implementing the complete control from administrator who is responsible for allocating different shared peripheral including computers to the organization employees.The employess in turn can lodge there trouble shooting complaints online,in turn the administrator can assign the trouble shooting rectifications to the concerned engineers.

Literature review:

The research on previous study on peripherals used in the company, organization took place the reviews follows the articles and journals by previous research reviews.

1) Integrating multiple clinical information systems using the Java Message Service framework:

This article describes an application for capturing, delivering, and tracking urgent radiology exam results. Urgent exam findings are entered using a Web form embedded within the Picture archiving and communication system (PACS) display station. The findings are then accessible via soft copy using the PACS display stations, hospital information system (HIS) terminals, or wireless-enabled personal digital assistants (PDAs) or via hard copy printouts that are generated automatically or on demand. Additionally, quality control is performed on those findings entered by radiology residents and fellows, the results of which are used for both performance tracking and educational activities. The application was developed using Sun Microsystems' Java programming language. The Java Message Service (JMS) was used to manage the delivery of findings. JMS provides a robust, flexible framework for exchanging messages between disparate applications. The application is now used for all urgent exams; completely replacing the original paper-based system. The use of JMS provides the necessary level of reliability needed by this application [1].


Here in hospital information system terminals the capturing, delivering and tracking urgent radiology exam results,or wireless-enabled personal digital assistants via hard copy print outs.

Where the peripheral printer is used and this is developed by Sun Microsystems'Java Programming language.The java message serviceused to manage the delivery of findings.As in my project using the java for mailing service system.

2) Miniaturized planar chromatography using office peripherals:

High-performance thin-layer chromatography is a separation technique commonly used to identify and quantify components in chemical mixtures. Sophisticated analytical tools are required to extract the full analytical power from this technique and especially for miniaturized planar chromatography its utility has not been harnessed. A new approach uses an elegant, simplified system assembled from ordinary consumer printers and scanners to perform separations on monolithic and nanostructured ultrathin-layer phases. This system is shown to outperform existing planar chromatographic tools for analysis on miniaturized plates. Analysis can be completed in a manner of minutes, running numerous samples in parallel at a reduced cost, with very low sample and reagent volumes, all using a familiar computer interface with common office peripherals [2].

Review: Here the common office peripherals are used. The high performance thin layer chromatography where the analysis is completed in a manner of minutes ,running numerous samples in parallel and using familiar computer interface with common office peripherals.

3) Research in computer access assessment and intervention:

Computer access technology (CAT) allows people who have trouble using a standard computer keyboard, mouse, or monitor to access a computer. CAT is critical for enhancing the educational and vocational opportunities of people with disabilities. Choosing the most appropriate CAT is a collaborative decision-making process involving the consumer, clinician(s), and third party payers. The challenges involved and potential technological solutions are discussed [3].

Review: Here the educational and vocational oppurtunities of people disabilities,where CAT(computer access technology)allows people who have trouble to use standard computer ,keyboard,mouse or monitor which comes in computer peripherals.

4) On the use of low-cost computer peripherals for the assessment of motor dysfunction in Parkinson's disease - quantification of bradykinesia using target tracking tasksCitation:

The potential of computer games peripherals to measure the motor dysfunction in Parkinson's diseases is assessed. Of particular interest is the quantification of bradykinesia. Previous studies used modified or custom haptic interfaces; here an unmodified force feedback joystick and steering wheel are used with a laptop. During testing an on screen cursor moves in response to movements of the peripheral, the user has to track a continuously moving target (pursuit tracking), or move to a predetermined target (step tracking). All tasks use movement in the horizontal axis, allowing use of joystick or steering wheel. Two pursuit tracking tasks are evaluated, pseudo random movement, and a swept frequency task. Two step tracking tasks are evaluated, movement between two or between two of five fixed targets. Thirteen patients and five controls took part on a weekly basis. Patients were assessed for bradykinesia at each session using standard clinical measures. A range of quantitative measures was developed to allow comparison between and within patients and controls using analysis of variance (ANOVA). Both peripherals are capable of discriminating between controls and patients, and between patients with different levels of bradykinesia. Recommendations for test procedures and peripherals are given [4].


Here the computer games peripherals are use to measure the motor dysfunction in Parkinsons in diseases is accessed.the testing of cursor moves in reponse with the movement of peripheral.

5) PC applications in routine practice, science and teaching. Why computer peripherals are useful:

The "multimedia" revolution in personal computer systems now permits radiological images to be processed as well as documentation on paper or pictures. A large variety of add-on cards or components are available for such processing. This review article introduces the different components and reports our experience [5].

Review: Here the add-on cards or components the computer peripherals are used for radiological images to be processed in personal computer system.

6) Centralized Control Management System by Integrating Access and Process Controls:

See how to integrate SAP BusinessObjects Access Control and SAP BusinessObjects Process Control. You can optimize reporting practices, consolidate segregation of duties issues, and troubleshoot any potential problems using these two applications. Access Control, GRC Access Control, GRC Process Control.

control methodology. SAP BusinessObjects Access Control and SAP BusinessObjects Process Control formulate the strategies of automated control monitoring of the segregation of duties exceptions and noncompliance events (e.g., role status or operation work) to gain better visibility of key business processes. Automated rule monitoring integrates with SAP BusinessObjects Access Control for effective monitoring and access management in a single solution.

Consider a scenario in which your organization uses SAP BusinessObjects Access Control and SAP BusinessObjects Process Control, with control owners monitoring the automated control setup in SAP BusinessObjects Process Control. This control can be of any type, such as master data control for vendor master system changes or validation of the authorization for new contractors who have joined in the organization. As all employees are assigned certain roles in SAP ERP Central Component (SAP ECC) to perform their jobs, it is challenging to automate such controls in SAP BusinessObjects Process Control.

You need to seek the help of SAP BusinessObjects Access Control for generating segregation of duties (SoD) violations. Once you are satisfied with the authorization assignment for the new contractors, you need to review the report periodically. Control owners need to manage the reporting of the test effectiveness in both the applications. You need to manually perform the test by survey assessment or manual test control and again review the SoD report in SAP BusinessObjects Process Control.

After integrating the two applications, you can automatically view the information you need in one dashboard from one application. By adopting this approach, you can manage the SoD report as well as authorization limitation for contractors and many other areas such as control mechanisms for the use of firefighter or custom role check status. This integrated approach reduces costs and provides better visibility of the end-to-end internal controls in your organization [6].

Review: Here in this journal named the centralized control management system in which the process are used for centralized control management, the techniques used here are

  • SAP BusinessObjects Access Control
  • SAP BusinessObjects Process

The reporting practices are done segregation issues and trouble shooting with this two process control.

7) Personal computing vs personal computers:

The focus is on a peripheral issue: thechoice between distributed computer hardware and central computer hardware. It Is more useful to focus on a very different issue: the difference between organizational computing and personal computing inorganizational information systems. The primary problem is that of control; how can centralized information processing organizations ensure that the correct data is used, that it is protected, that the systems developed are what end users need, and that such development represents productive use of computing resources without getting in the way of productive use of computing resources to solve individuals resource problems? [7].

The proper role of personal computers in organizations is one of the most commonly discussed problems in MIS (Management Information System) today. The primary problem is that of control; how can personal computer users be made subject to controls on the information system, and how can centralized information processing organizations ensure that the correct data is used, that it is protected. Organizational computing refers to the use of computing resources to create systems which are used as utilities or information infrastructures by several members of an organization [8].

There are two differences which distinguish organizational computing from personal computing. The first is impact on others within the organization (direct with organizational computing; indirect with personalcomputing). The second is method of control (through system integration with organizational computing:through the management control system with personal computing).This paper discusses the differences between organizational computing and personal computing, the similarities and differences between their requirements, their relative suitability for end user developed systems, technical and other issues in their support, and the connections between the organizational and the personal computing systems within organizations.

Organizational computing: Organizational computing is the creation of information utilities or infrastructures to support the formal information system within the organization. Traditional system design techniques attempt to determine what computer systems will best serve the needs of the organization as a whole, and how these systems can be fitted together into an integrated organizational information system.

The most basic example of organizational information systems is an accounting system.

Requirement for organizational computing:

The key requirement for organizational information systems is that they be usable by any authorized user who needs to use them. Hence the traditional emphasis on centralized systems; not so much because of the increased efficiencies which arise from Grosch's law, but rather from the need for files and other resources to be accessible to many different users within the organization.

Control of Organizational Computing:

Control of organizational computing is divided into system planning and system operation. Nolan's stages hypothesis [9] emphasizes the importance of both types of control for mature information systems.







Which limit access? These standards could include, for example, the use of accounts and passwords to restrict use of the system, limitations on access to files, the inability to write or replace files which one is allowed to read, limitations on who can change what program, and controls on terminal access[10].

Review: here in the above journal in which how the centralized control management systemis managed by taking the companys accounting system where accessing system arise within the users in the the traditional system design techniques are determined by taking the example of organizational computing.Its similar to my project but here they are using the traditional design techniques where here the peripherals in company are using java and implementing the mail service to server.

Key milestones in this project are:

- Administration

-Employee interactions

- Master interactions

-Reports Generation


Technological milestones are

- Java

- Servlets



Statement of Research:

The research here will be in consideration to identify how the techniques and method for centralized control and management of all the shared peripherals in a given network.with java, how the peripherals do there job to run the system. How the system and controlled and critically evaluating the review with the current techniques.How the methods takes place from the starting to there ending process of the system

Initial list of references:

[1]Tellis WM, Andriole KP. Integrating multiple clinical information systems Using the Java Message Service framework.J Digit Imaging. 2004 Jun; 17(2):80-6.

Epub 2004 Mar 25. PubMed PMID: 15037940.

[2] Morlock GE, Oellig C, Bezuidenhout LW, Brett MJ, Schwack W.

[3] Simpson R, Koester HH, Lopresti E. Department of Veterans Affairs, Human Engineering Research Labs, University of Pittsburgh.

[4] On the use of low-cost computer peripherals for the assessment of motor dysfunction in Parkinson's disease - quantification of bradykinesia using target tracking IEEE Trans Neural Syst Rehabil Eng, 2007, vol. /is. 15/2(286-94), 1534-4320 (2007 Jun)Author(s):Allen DP,Playfer JR,Aly NM,Duffey P,Heald A,Smith SL,Halliday DM

[5] PC applications in routine practice, science and teaching. What computer peripherals are useful?] Der Radiologe, September 1995, vol. /is. 35/9(620-4), 0033-832X

Author(s): Knopp MV, Knopp MA

[6] Centralized Control Management System by Integrating Access and Process Controls

By Raj Behera, Manager, Regional Implementation Group (RIG), SAP GRC (May 2009)

[7]Personal computing vs personal computers by John Lehman, University of Minnesota, Minneapolis, Minnesota

[8] Keen, P., and Hackathorn, R.,"Decision Support Systems and Personal Computing," CISR No. 47,Sloan WP No. 1088-79, MIT, Cambridge, MA, 1979

[9] Nolan, R., "Managing the Crisis in Data Processing," Harvard Business Reviex, March-April 1979, pp.115-126.

[10] Rumelt, R., Strateav.Structure and Economic Performance, Harvard 1974.

Statement of level of challenge:

The research and evaluation for this project is definitely giving the new ideas and implementing my previous studied contents like oracle and java.In course work we used do for evaluating and knowing the knowledge and to know the concept we had learned in Msc programme and here in real world i got oppurtunityto do the project and which is like a real experience .Here definitely I will used my courseMsc Information systems Engineeringconcepts and ideasfrom which I can implement in this project to complete the clients requirement in a smooth and good way and fullfil the requirements of clients.The evaluating is relevant to java techniques for mailing service within the company and really solving the problems of the company.In this project I have got concepts and skills of oracle,java.The researchh in this project will help me for my success in future.

Reporting to Supervisor:

The supervisor is Dr. Ian Potts, my contact with my supervisor will be made through regulat meetings and when the completion of project every section in project is done in the supervision of my supervisor.The provisional and final deliverable will be emailed to my supervisor proir to the meetings for discussion in the meeting.

Supervisor Sign-Off Date

Dr.Ian Potts