Computer Science Project Topics

Data Centralization Over Network Application for Insurance Services

Data Centralization Over Network Application for Insurance Services

Data Centralization Over Network Application for Insurance Services

Chapter One

AIM AND OBJECTIVES

The aim of this system is to produce a system that will serve as repository for all other systems connected to it, whereby they will be able to add, edit and query the database whenever the need arise.

Objectives of this system are:

  1. To develop a central server that maintains, manages and controls the activities of all other systems.
  2. To develop a system that will reassure data security, integrity and reliability.
  3. To develop a system that will be cost effective compared to individual database system.
  4. To enable easy access to any required data and information within a little period of time.

CHAPTER TWO

LITERATURE REVIEW

THE EVOLUTION FROM LOCAL TO CENTRAL TAPE BACKUP

Though a very small bandwidth consumer, the local backup model is rapidly being supplanted by more manageable architectures. IT departments are finding the headaches and costs associated with maintaining an increasingly complex matrix of distributed tape technologies can be alleviated by performing backup over the WAN. But the move toward replacing the local backup model is also driven by the security implications of keeping sensitive data on thousands of tape cartridges at remote offices across the world. Tapes can be lost or stolen, compromising not only disaster recovery efforts but the protection of company data from competitors, thieves or others intending harm to the company or its customers.

Providing better control over loose media and reducing administrative overhead with standardized tape media, centralized backup provides a more secure and scalable approach to data protection. Centralized backup can be successfully deployed over metropolitan-area networks (MANs), where low-latency, high-bandwidth branch inter-connectivity has provided a feasible, low cost medium for bulk data transport. Extending this model beyond the MAN, however, introduces high connectivity costs and latency issues that cannot be overcome with more bandwidth alone. IT departments have had to look to smarter technology to help scale data protection architectures beyond a few city blocks to anywhere in the world.

 THE EMERGENCE OF DISK-BASED BACKUP

For faster and more reliable access to protected data, backup technology has moved beyond tape cartridges to spinning disk. Using disk-to-disk and more scalable volume management systems, technologies like Network Appliance’s Near Store VTL allow low-latency data to be backed up or restored in a fraction of the time required with tape. And with specialized support for transactional databases that allows for differential point-in-time snapshots, software like Network Appliance’s Snap Manager or EMC’s Replication Manager further reduces data backup and recovery windows. These innovations open the way for IT organizations to build security and scalability into their data protection architecture. Yet without a WDS strategy to extend these benefits to distant remote branches, centralized backup cannot operate beyond the MAN without also creating congested pipes and soaring bandwidth costs.

 HOW WIDE-AREA DATA SERVICES ACCELERATE WAN BACKUP

Whether protecting remote data onto centralized tape or disk backup systems using Net Backup, or replicating company assets between redundant data centers with Snap Mirror, WDS solutions enable organizations to move data between sites without the constraints of distance and throughput. The Riverbed Optimization System (RIOS™), software that powers Riverbed’s Steel head product family, accelerates applications typically by five to 50 times and in some cases up to 100 times faster than conventional transport mechanisms with up to a 95% reduction in WAN bandwidth utilization. This technology delivers immediate benefits to remote data protection processes, transporting backup payloads that don’t congest existing circuits and providing remote data recovery at rates fast enough to match local tape metrics.

RIOS consists of four tiers, each streamlining the inherent inefficiencies of applications across the WAN:

  • Data streamlining ensures the same data never crosses the WAN twice;
  • Transport streamlining eliminates dead time on high-latency circuits;
  • Application streamlining accelerates popular business applications for  remote users to speeds available at the central office;
  • Management streamlining facilitates deployment and administration of WDS technology.

A key value of RIOS is that it is designed to accelerate all traffic that runs over TCP. While this paper is designed to focus on the backup and recovery process, it is important to note that this same technology can be used to accelerate file sharing, email, document management, and all other applications that are important to your organization.

 

CHAPTER THREE

METHODOLOGY AND ANALYSIS OF EXITING SYSTEM

RESEARCH METHOD

Research techniques vary depending on the social phenomena studied. Data-collection techniques differ from participant observation, content analysis, interviewing, and documentary analysis. In this approach each problem studied requires a specific unit of observation, be it an individual, an organization, a city, a relationship between units, or a statistical rate. Even the way a concept is defined can affect data collection. For instance, when measuring occupational mobility, the definition of occupation is critical.

Qualitative researchers typically rely on four methods for gathering information:

(a) Participating in the setting,

(b) Observing directly,

(c) Interviewing in depth, and

(d) Analyzing documents and material culture.

These form the core of their inquiry—the staples of the diet. Several secondary and specialized methods of data collection supplement them.

Out of all this method only analyzing documents and material culture which comprising of the following were used:

Book Review: There are different methods used in collection of data during the research made on this project work for the benefit of the research.

The method use in book review is a secondary method of review, which relate to reading of textbooks, internet search, past project work and other daily business magazine etc. This method helps to get the idea and enlightened the writer more about the work.

Internet Surfing: During the process of my research some website are been visited and some data are been retrieve.

Website like the search engine e.g. Google search, yahoo search, mamma search, PDF search engine etc. and also website like www.wikipedia.com/datacentralization.html etc. for data collection and programme design.

CHAPTER FOUR

DESIGN AND IMPLEMENTATION OF THE SYSTEM

DESIGN OF THE SYSTEM This is the process of designing the input, output and the processing steps to meet the user’s requirement identified in the system analysis. It starts with logical design, which produces a specification of major features of the system. These include the data, input, output, processing storage and other control requirement.

CHAPTER FIVE

SUMMARY

This project is basically on data centralization over network and everything it entails. It deals with enrollment of personnel for benefits and management of records. Through the application software, registered person can get various advantages through as soon as he/she is cleared for the program.

The project work handled the issue of childcare information management from any part of the world through online application and entitlement can be collected at any designated area that operates the service. The time factor also made it impossible to include as many bio data; it is also useful for the programmer who would want to modify the program as it will serve to remind him of what each step of the program accomplishes.

EXPERIENCE GAINED

This project showed us clearly that with the computer nothing is impossible. It also broadens our scope on how to develop a good program with ease which has improved our programming skill.

 PROBLEM ENCOUNTERED   

Lack of fund almost crippled the successful completion of the project. Apart from fund, there was a little problem in sourcing for valuable data about how data centralization works

CONCLUSIONS

The use of computer in managing insurance has been found to be very useful, effective and efficient.

It has highlighted the role of computer system as being the major communication tool around the world.

This project also enlighten us about the significance of the knowledge of networking on carrying out the data centralization activities because we made use of LAN cable to connect computer systems together for the purpose of resource sharing.

Above all this project reveals why insurance companies choose the have the use for data centralization as it reduces the stress of going through stress in accessing a particular record

RECOMMENDATIONS

The program has been limited to an extent. This program can be further appreciated by those in the field if it can be made to cater for more insurance activities

The project will be a valuable tool for government and other private organizations handling data centralization as it reduces errors that so often occur in their operation to it minimal level.

REFERENCES

  • Abiodun E. T. and Ajibola (2009): Introductory to Software Engineering in Ilorin Olad Publisher.
  • Ashby, W. R. (1956): An Introduction to Cybernetics. Wiley, New York.
  • Brian W. Kernighan and Dennis M. Ritchie (1999): C++ Programming Language Prentice Hall Software Series.
  • Conrad, M. (1993): Adaptability. Plenum Press, New York.
  • Conrad, M. (1995): “On Design Principles for a Molecular Computer, Communications of the ACM, 28:464-480.
  • David Hughs Wikipeadia (2010): Advancement of technology in insurance. httl/www.wikipaedia/insurance.com
  • Kampfner, R. (1997): “A Hierarchical Model of Organizational Control for the Analysis of Information Systems Requirements,” Information Systems.12, 3:243-254.
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!