Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 40

Chapter 1

Introduction to the Project


1.1 Introduction
Give introduction to your project here

1.2 Nature of Project: Desktop Based Application


By definition, a desktop application means any software that can be installed on a single computer (laptop or a desktop) and used to perform specific tasks. Some desktop applications can also be used by multiple users in a networked environment. When you program using a desktop UI, you get a much richer set of UI controls than you do with HTML. You can make your UI look like almost anything you want. You can make Tab controls; you can use input masking controls, editable grids, and many other controls that make creating a rich UI very easy. You also have total control over the exact positioning of screen elements. When creating a desktop application, you can take advantage of the hardware that is already on the machine. You will need to do this if you are thinking of creating a game. Games typically need to interact directly with the video card, which is very difficult (if not impossible) to do with a browser. If you are developing a Computer-Aided Drawing (CAD) or Computer-Aided Manufacturing (CAM) application, you will also need to interact directly with the machine's hardware. Performance is generally quicker on a desktop because the screen is drawn only once on the desktop and only the data changes. This prevents a lot of screen data coming from the server to the client, which increases the time taken to display the data. If you need to integrate with any special hardware, such as Point of Sale (POS) systems, numerical control machines, printers, and scanners, it is much easier to produce a tidy interface using a 1

desktop application than it is from within a browser. Browsers are such a closed environment that it is difficult to load the DLL needed to interact with this special hardware. If you are using Internet Explorer 5.x, it is not really that hard, but this does lock the user into using one browser and one operating system. If you need to integrate with other products, you will find it much easier to do from a desktop application than you will from a browser. Many times you might need to exchange data with Word or Excel. Doing this using automation is very easy in a desktop application, but not so easy with a browser-based interface. The integration process between applications is hard to make generic enough to work across all browsers.

Chapter 2
2

Organization Overview
Netmax Technologies is a leader in network support, embedded systems, and software & web development services.It offers a vast portfolio of IT solutions to customers spread across Punjab, Haryana & Himachal Pradesh. Netmax Technologies is a pioneer in the field of IT education in north India. Netmax Technologies (Core) & Netmax Web solutions. Netmax Technologies (Core) takes care of IT support, embedded systems R& D & Implementation services. Netmax web solutions is a web & software development company that takes care of Software development & web service solutions. Netmax Technologies was set up in 2001 by young Indian entrepreneurs. It has pioneered the concept of high quality IT education in North India and has trained over 10,000 plus networking, embedded systems & software professionals in the country. In 2001, Netmax Technologies set up education centre in Chandigarh (Punjab) and followed them with centers in Patiala, Jalandhar, Ludhiana & Bhatinda in the years that followed. In 2005, Netmax Technologies introduced corporate training programs which as an initiative were highly appreciated by the industry and corporate alike. Since our inception, we have remained true to five unwavering commitments...

IT Service Provider
As a Network Consultant we provide consultancy to design, implement and secure the networks.We design networks using tools in which we can recommned client the harware needed according to requirement. We also provide consultancy to Implement firewalls and security solutions. After implementing firewall penetration testing performed on the client network by simulating an attack from malicious outsiders. Support Area (Network Solutions) LINUX / UNIX networks SUN networks 3

CISCO devices (Routers, Switches, Firewalls, Cache Engine, RAS etc) Bandwidth Manager software and hardware Radio Links Security Solutions

IT Education:
Netmax Technologies (IT Education) vast education network spans all over Punjab, Himachal Pradesh & Haryana. Our Education wing has trained students from diverse fields in CISCO, REDHAT and MICROSOFT besides various technologies in embedded systems over the past ten years. We were the first to introduce CCNP, CCSP, CCVP and CCIE in north region to meet the current needs of our corporate clients. We are the only company to introduce robotics platform for the 1st time in Region. We believe in hands on training and that has been our philosophy since inception. Following this philosophy religiously,we have introduced 8051,AVR,PIC,ARM,PLC hardware into training modules so that students can be exposed to technologies used in the industry. Draw on the expertise of experienced trainers. Each of our trainers has an average of four years relevant experience in the industry. Together, they have accumulated thousands of teaching hours. No other center in region boasts a team with this level of expertise. Provide an environment that is conducive to learning. Among other things, participants have access to top-of-the-line network and system infrastructure. This is why we adhere to rigorous standards of methodology and ensure that our faculty and technicians provide you with assistance should you encounter any problems. Use comprehensive learning material. We provide each participant with comprehensive material that is recommended and an easy-to-use reference guide in which students can find any of the information covered during the course. Offer an unparalleled price/quality ratio. We are committed to offering high-calibre training at a price/quality ratio. Provide concrete and current course content. We constantly update and improve our course content in response to the changes made by vendors like CISCO, Microsoft. 4

Netmax Websolutions:
Netmax Web Solutions, is the Web Development and software development unit of Netmax Technologies. We believe in the fact that small businesses too deserve the right to be on the world of internet and that is where we come into play by providing them the most cost effective solution. We provide services from design and multimedia to custom programming and database integration. Netmax Websolution specializes in Open Source Website Development such as Joomla, Magento, os Commerce, modx, CMS Made Simple & WordPress. We have an efficient team to work on HTML and Flash enabled website plus SEO and other essential aspects of the web development and Graphics Development. We are also specialized in Magazine Design & Layout, Catalogues Design, Brochure Designing, Animated Banner Designing & Business Card Design. Services: E-Commerce Website Development Content Management System Flash Website Development Search Engine Optimization (SEO) Database Management Website Maintenance Web Hosting Domain Name Registration Logo Designing Magazine Design & Layout Broc hure Designing Banner and Advertisement Design & Layout Flash Animation On-Line Catalogue Maintenance 5

Data Entry and Compilation

Offices: Chandigarh (H.O) SCO 118-120 3rd floor, Sec 34A, Chandigarh 160022 0172-4644644 , 4346046 , 4346045 Chandigarh SCO 198 -200 3rd floor, Sec 34A, Chandigarh 160022 0172-4346047,4346048, 2608351 Jalandhar 3rd Floor,Ratan Towers, Namdev Chowk Ph:0181-4624625 Patiala SCO 52,2nd Floor, Leela Bhawan Ph:0175-5018351 Ludhiana: SCO 1,2nd Floor, Model Town Extension Ph:0161-4416144,98156 10819 Bhatinda crown plaza , 2nd floor ,The Mall Ph-0164-5004727

Chapter 3
6

Product Definition
3.1 Introduction
There are two major parties interested in a new system: users and developer. The system is developed for users through the developer. The problem is that the client usually does not understand software or software development process and the developer does not understand the clients problem and application area. This causes a common gap between the parties involved in the development of the project.

3.2 Problem Statement


Problem statement was to design a module: a) b) c) d) e) Which will be user friendly? Which will restrict the user from accessing other users data? Which will help the client in viewing his data and privileges? In which further additions can be made without changing its design drastically. Which would restrict the server traffic?

Another problem was that the data should be accessed from the server and accordingly changes should be made on the data in the server only.

3.2.1 Processing Environment


Hardware Requirements: The list of the hardware used currently for the project is:

PROCESSOR: INTEL CORE 2 DUO RAM: 2 GB HARD DISK DRIVE: 180 GB MONITOR: 15 color KEYBOARD: Standard 110 keys 7

MOUSE: Scroll

Software Requirements: The list of the software used currently for the project is: Platform: Microsoft Windows XP Professional Front End: Development:

Software: Visual studio(2010) o Coding: C#.NET Interface: o Internet Explorer 6.0 or more o Mozilla Firefox
o

Back End Database


o

SQL SERVER (2008)

Chapter 4
8

Project Plan
.

4.1 Development Schedule


The following steps were followed in developing the application: a.

Study, Analysis and Requirement Specifications: The study of the existing system

and its drawback gave an idea about what kind of interface was required. The study was conducted through information gathering and studying the existing system. b.

Design of the proposed system: The next step was to design the screen, windows and

reports for the inputs and outputs. The concerned authorities consulted during the design phase to ensure user acceptances and not to miss out on any vital information. In the same phase, the project was broken down into various modules. c. Coding of the design system: A modular approach was followed, where, in each module, a welldefined procedure was developed independently. These modules were developed to use the same database file structure to ensure integrity. d. system. e.

System documentation: This stage consists of documenting the layout of entire system.

It indicated the purpose of interlinking of different modules along with the integration of the entire

Testing and Debugging: Preliminary test were done with the self-generating dummy

data. After identifying and removing errors, it was tested for all activities together.

4.3 Programming Languages & Development Tools


The following development tools are used for developing the system: C# (as programming language) Visual Studio 2008 (Development environment) SQL Server 2000 (Database) Windows XP Professional Edition (Operating System)

4.3.1 Understanding .Net Frame Work


DEFINITION:

The .Net framework can be defined as a language neutral platform designed to provide a number of rich and powerful application development tools and technologies. It has an extensive class library that provides wide-ranging support for data access. .Net framework has an independent code execution and management environment called the Common Language Runtime (CLR) which ensures that code is safe to run, and provides an abstract layer on top of the operating system, which allows the elements of the .Net framework to run on many operating systems and devices.

THE .NET VISION: The basic idea behind the development of the .Net framework is that a global broadband network will someday globally connect all devices and the software will become a service provided over this network. The .Net framework provides the foundation and the plumbing on which the Microsoft .Net vision is built. The vision is about having a global network and open standards like XML to make it easier for parties to exchange data and work together. Now devices will use common languages like XML over standardized or shared protocols such as HTTP and these devices will be running a multitude of software on various operating systems. This is not limited to Microsoft but also to other operating systems such as sun, IBM. The .Net framework provides the tools and the technologies needed to write applications that can seamlessly and easily communicate over the Internet using open standards like XML and SOAP. It also aims at solving the various problems that are faced by developers while working on applications made using the windows DNA. It provides a solution to problems such as registering of components and shutting down applications in order to upgrade them.

10

BENEFITS OF USING .NET: The windows platform is inherently complex and may pose several problems for programmers. However the .Net platform is used as it provides solutions to many such problems and offers an Internet centric platform. The following are the benefits of using .Net platform: 1) Multiple platform Support .Net platform has been designed keeping multiple platform support as a key feature. For version 1.1 and 1.0 this means that the code written using the .Net platform can run on all versions of Windows. i.e. Windows 98,95,2000 and so on. Microsoft has included rich support for all the platforms. Also this code shall also work on any 64-bit processor that may be used by Microsoft later. It is also expected that .Net shall run on other platforms like UNIX also, however it is not for sure that all functionality will be available for the same. 2) No more language functionality problem The version 1.1 of the Microsoft .Net consists of 4 languages shipped with Microsoft: Visual Basic. Net C# Jscript.Net Managed C++

There are no significant technical differences between these languages. All the languages are equally fast and can be chosen according to company preference.

3) . Net as a clean start

11

On the windows platform, the technologies available often depend on the programming language that they are written in, so they are very different. Depending on the chosen programming language, these technologies can be restrictive. The problem with this approach is that it makes the Windows platform harder to understand. Using .Net there is just one simple object oriented way of accessing the functionality of the .Net Framework.

VB FO

Windows API

(The best and most commonly used technologies being merged in .Net)

. Net Framework

MFC

ASP

12

4) Performance

. Net has been designed to provide great performance and scalability. For .Net to succeed, the companies must be able to migrate their applications and not suffer due to the way the CLR works. To ensure this CLR converts the code into native machine code. So the conversion can take step-by-step method and will make use of the given machines resources and processor features. As newer versions of the CLR are released and technologies like windows forms are released, each release will have a better performance and smaller memory footprints. Also .Net has succeeded in replacing completely the older technologies like COM with better and efficient design equivalents. At the heart of the .Net platform is the CLR
. NET FRAMEWORK DRILL DOWN:

The .Net framework consists of four major areas: Application development technologies Class libraries Base class libraries The Common Language Runtime These pieces sit on top of each other with each of the higher layers making use of one or more of the lower layers and the services and functionality offered by them. The layers can be represented as:

Application Development Technologies

. Net Framework

Class Libraries

13

Base Class Libraries

Common Language Runtime

(Description of the layered .Net Framework architecture)

The various layers can be explained in detail as: Application Development Technologies:

.Net offers technologies for building web applications, providing many new features and a much cleaner programming model. The two main features are: 1) Web Services: These are programmable business logic components that serve as black boxes to provide access to functionality via the Internet using the standard protocols such as HTTP. Web services are based on the application of XML called the SOAP (Simple Object Access Protocol)

14

2) Window forms: For developing standard GUI applications, the .Net Framework provides the window forms. Window forms is an extensive class library that exposes the functionality of the Windows common Controls using the Object Oriented capabilities of .net Framework. Class libraries: The .Net Framework provides an extensive set of class libraries. This includes classes for: Data access: High performance data access classes for connecting to SQL server, ORACLE or any other database for which OLEDB or ODBC provider is available. XML Support: It includes next generation XML support. Base Class Libraries: The base class library in the .Net framework is huge. It covers areas such as collections; thread support, code generation, IO, reflection and many more. Common Language Runtime: The CLR proves to be one of the most radical tools use in the .Net Framework. It is a language neutral platform that converts code generated by all the languages in the .Net platform to a language called the (IL) Intermediate Language. This is further converted into the native machine language. The CLR enables the .Net framework to run on a number of different devices. It forms an intermediate layer between the operating system and the .Net Framework. THE .NET LANGUAGES: With the advent of the Microsoft Visual Studio .Net, Microsoft has concentrated on providing the best possible platform for future development. This might have come at the expense of compatibility with the existing technologies and risks. However when weighing up the problems the benefits easily compensate for the losses. The .Net framework is supplied multiple languages but mainly used are: 1. Visual Basic .Net 2 Visual C# 15

However the .Net infrastructure is designed to be language independent. The basic description of the languages is as follows: Visual Basic .Net: The latest version of the Visual Basic is a major leap forward in terms of functionality, with several features added to take advantage of the CLR and the CLS (common language specification). The language has several object-oriented features such as Classes Objects Methods Properties Interfaces C#(c-sharp) The language is known for its resemblance with Java. C# can be taken as a member of the C/C+ + family. It contains the best features of C++ but leaves all the bits that are not required to be a part of the .Net framework such as typedef, templates and so on. Leaving out functionality has not caused any hindrance but has made the language more efficient and easy to use. It is a case sensitive language. It also implements classes, methods, constructors, destructors and interfaces. C# is a part of the managed code environment.

Visual J# .Net Visual J# .Net is a Microsoft implementation of Java. It is not only aimed at the developers using the Microsoft J++ tool, but also at third party java developers. As a part of this the Visual J# .Net toolkit provides a tool to convert the Java source code into J#, migrating the language and the library calls. It fully integrates with Visual Studio .Net and supports the Microsoft extension that J++ supported as well as supporting the equivalent of the UI library. 16

Applications developed using the J# will run only within the .Net This is not a virtual Java machine but comprises if all tools and compilers for the .Net Framework. As such it does not produce Java byte code, and is not endorsed by the Sun Microsystems.

Jscript .Net: Jscript .Net is a full .Net language. Like Visual Basic, Jscript has also undergone some changes that are not very radical. It provides the advantage that the other supported languages do. Jscript has been completely written in C#. It now supports types and inheritance and is fully compiled. It still supports Jscript functionality and also other new features.

CLR SERVICES The CLR provides many core services for applications such as garbage collection, code verification, and code access security. The CLR can provide these services due to the way it manages code execution and also due to the rich metadata that the compilers produce, it can understand all types used within the code. The services are briefly described as follows: Garbage Collection: It is a CLR feature that automatically manages the memory on behalf of the application. We can create and use objects but the CLR automatically releases the objects when they are no longer referenced or used. This eliminates memory leaks in applications. One side effect of this feature is that one cannot know if an object is destroyed once it goes out of scope. Code Verification: It is a process that ensures that all code is safe to run prior to execution. Code verification enforces type safety and therefore prevents code from performing illegal operations such as 17

accessing invalid memory locations. With this feature it shouldnt be possible to write code that causes an application to crash. If the code does something wrong, the CLR will throw an exception before any damage is inflicted. Code Access Security: This feature allows the code to be granted or denied permissions to do things, depending on the security configuration for a given machine, the origins of the code and the metadata associated with the types that the code is trying to use. The primary purpose of this feature is to protect the users from malicious code that attempt to access other code residing on the machine.

ADO.NET
Most applications require some kind of data access.ADO.NET data access technology allows simple, powerful data access while maximizing system resource usage.ADO.NET provides consistent access to data sources such as Microsoft SQL Server. Data-sharing applications can use ADO.NET to connect to the data sources and retrieve, manipulate, and update data. Applications with connected data access are difficult to scale. An application that can comfortably maintain connections with two clients might do poorly with 10 and be completely unusable with 100. ADO.NET addresses these issues by implementing a disconnected data access model by default. In this model, data connections are established and left open only long enough to perform the requisite action. For example, if an application requests data from a database, the connection opens just long enough to load the data into the application and then it closes. Likewise, if a database is updated, the connection opens to execute the UPDATE command and then closes again. By keeping connections open only for the minimum required time.ADO.NET conserve system resources and allow data access to scale up with a minimal impact on performance. ADO.NET Data Architecture

18

Data access in ADO.Net relies on two entities: the DataSet, which stores data on the local machine, and the data provider, a set of components that mediates interaction between the program and the database.

The DataSet The DataSet is a disconnected, in-memory representation of data. It can be thought of as a local copy of the relevant portions of a database. Data can be loaded into a DataSet from any valid data source, such as a SQL SERVER database. The DataSet persists in memory, and the data therein can be manipulated and updated independent of the database. When appropriate, the DataSet can then act as a Template for updating the central database. The DataSet object contains a collection of Zero or More DataTable objects, each of which is an in-memory representation of a single table. The structure of a particular DataTable is defined by the DataColumns collection, which enumerates any constraints on the table. A Datatable also contains a DataRows collection, which contains the actual data in the Dataset.

The Data provider The link to the database is created and maintained by a data provider. A data provider is not a single component; rather it is a set of related components that work together to provide data in an efficient, performance-driven manner. The first version of the Microsoft .Net framework shipped with two data providers: the SQL-SERVER, designed specifically to work with Sql server and the OLEDB.net data provider, which connects with other types of data-bases. Microsoft Visual Studio.Net 2003 added two or more data providers. Each data provider consists of versions of the following generic component classes: The Connection object provides the connection to the database. The Command object executes a command against a data source. It can execute non-query commands, such as INSERT, UPDATE or DELETE or return a DataReader with the results of a SELECT command. 19

The DataReader object provides a forward-only, read-only, connected recordset. The DataAdapter object populates a disconnected DataSet or DataTable with data and Performs updates. Data access in ADO.NET is facilitated as follows: a connection object establishes a connection between the application and the database. This connection accessed directly by a command object or by a DataAdapter object. The Command object provides direct execution of a command to the database. If the command returns more than a single value, the command object returns a DataReader to provide the data. This data can be directly processed by the application logic. Alternatively, you can use the DataAdapter to fill a dataset object. The command object The command object is represented by two corresponding classes, sqlcommand and oledbcommand.You can use command objects to execute commands to a database across a data connection. Command objects can be used to execute stored procedures on the database and sql commands or return complete tables. Command Object provides the methods that are used to execute commands on the database: Execute NonQuery(): Executes commands that return no records, such as INSERT, UPDATE or DELETE. Execute Scalar(): Returns a single value from a database query. c) ExecuteReader(): Returns a result set by way of a DataReader object.

The DataAdapter Object The Dataadapter is the class at the core of the ADO.NET disconnected data access. It is essentially the middleman, facilitating all communication between the database and a dataset. The DataAdapter fills a dataset or DataTable with data from the database whenever the fill method is called.

20

SQL SERVER

Microsoft SQL server is a collection of tables and objects like views, indexes, stored procedures and triggers. It contains different kind of database. Following are the names of the databases: 1. MASTER: - It controls operation of sql server; it also keeps track of user account

environment variables and system error messages. 2. MODEL: - Act as a template for new user database. 3. TEMPDB: - Provides storage for temporary table. 4. MSDB: - Provides storage for scheduling information and job history. 5. PUBS: - This is a sample database. 6. NORTHWIND: - This is also sample database. Every object in a database is known as identifier and each identifier should have a unique name.

SQL (STRUCTURED QUERY LANGUAGE) Structured query language (SQL) is the universal language of the relational databases. SQL can be used to retrieve and filter records from databases, to add records to databases, to delete records from a database and to change the values of an existing record. Structured Query Language uses four basic statements to interact with a database. The SELECT statement is used to retrieve records from a database; the UPDATE statement is used to update data in a database; the INSERT statement is used to insert a new row into a table; and a DELETE statement is used to delete a record. SQL statements are divided into following categories:

21

DDL(Data Definition language) DDL define, maintain and drop schema objects when they are no longer needed.DDL includes CREATE, DROP, ALTER AND TRUNCATE commands. DML (Data Manipulation Language): DML manipulates the data, which is stored in database.DML includes INSERT, SELECT, UPDATE AND DELETE commands. TCL (Transaction Control Language): It includes COMMIT, ROLLBACK and SAVEPOINT commands. DCL(Data Control language): It includes GRANT and REVOKE commands. OPERATORS:1. LOGICAL OPERATORS:AND: - Return all the result when all the specified search condition is true. OR: - Return the result when any of the specified search condition is true. NOT: - Returns negative result. 2. RANGE OPERATORS:BETWEEN: Return all the result which lies between the specified range. 3. DISTINCT CLAUSE:Removes duplicate rows from result set; duplicate rows can be eliminated by using distinct keyword in select statement. 4. GROUP BY:Sql server provides a method for grouping the result set using group by clause. The group by clause treat the having clause in the same way as select statement treats the where clause. 22

JOINS:A sql server may provide a method to retrieve data from more than one table using joins. Join can be defined as an operation that included retrieval of data from more than one table at a time: Types of joins are:1. UNRESTRICED JOIN: - A join that includes more than one table without any condition in where clause is called unrestricted join. 2. NATURAL JOIN: - A join that restricts the data from the result set is called natural join. 3. SELFJOIN: - A join is said to be self join when one row in a table correlate with another row in same table. 4. OUTERJOIN: - A join can be termed as outer join when result set contains all the row from one table and matching row from another.

Chapter 5

Project Analysis
5.1 Feasibility Analysis
Depending on the results of initial investigation the survey is expanded to more detailed feasibility study. The objective of feasibility study is not to solve the problem but to acquire a sense of its scope during the study the problem definition is crystallized and aspects of the problem to be included in the system are determined. Consequently, costs and benefits are determined with greater accuracy. Types of Feasibility There are various measures of feasibility that helps to decide whether a particular project is feasible or not. These measures include-

23

Technical Feasibility Operational Feasibility Economical and Financial Feasibility

5.1.1 Technical Feasibility Study The technical issues raised during the technical feasibility analysis are: Does the necessary technology exist to do what is suggested? Does the proposal equipment have the technical capacity to hold the data required to use the new system? Will the proposed system & components provide adequate responses to inquiries, regardless of the number or locations of users? Can the system be expanded?

5.1.2 Operational Feasibility Study People are inherently resistant to change, so this study find out willingness and ability of management, We have designed front end in ASP.net by getting the information from the end user, which help us in designing the GUI according to the end users requirements. The end users can easily understand and expand it in the future. 5.1.3 Economical Feasibility Study Economic analysis is the most frequently method used for evaluating the effectiveness of a candidate system. More commonly known as cost and benefit analysis, the procedure is to determine the benefits and saving that are expected from a candidate system and compare them with cost. If benefits outweigh cost then the decision is make to design and implement the system. The proposed system is economically feasible and it fulfills all the requirements of the existing system with much more accuracy. Lots of paper work will be reduced and the time consumed will become minimum. In short it will overweigh the existing system in costs compared to benefits.

24

5.2 Specific Requirements


5.3.1 Business Requirements
This System will be available 365 X 24 X 7 without any implication. It should maintain all the login of all end users. It should earn to maintain the system and services.

5.3.2 Logical Data Requirements


To develop this project, Developer requires different types of data which will be mentioned in Design document.

5.3.3 Performance Requirements


The Project performance will be based on following parameters: Up to date Hardware, on which the application will be ported. Normalized Database Data backup policies Well Designed Modules Documentation

5.3.4 Quality Requirements


The Quality of System will be determined and analyzed using various factors: Conformance to requirements Scalability Correctness Completeness Absence of Bugs Fault Tolerance 25

Extensibility Maintainability Documentation Irrespective of Software Quality factors that tend to increase the application scalability that is: Readability Ease of maintenance, testing, debugging, fixing, modification and portability Low complexity Low resource consumption Less Compilation and Run time warnings Well Documented

5.3.5 External Interface Requirements


We will support and test this product on two major web browsers: Microsoft Internet Explorer and Mozilla Firefox. The user will login to perform the various tasks. All information will be stored in a database on a server. The users will be able to perform their various roles within this setting. All information will be sent over the web to the server where it will be stored and processed.

5.3.6 Technical Requirements


Hardware Requirements Hardware Environment (Deployment Server) PC Processor RAM HDD Windows server Intel Pentium Processor 4, 2.4GHz or above. 2 GB RAM 160 GB

Hardware Environment (End users PC) PC Processor PC (Windows) Intel Pentium Processor, 233 MHz or equivalent. 26

RAM HDD Internet Connection Software Requirements:

2 GB RAM 500 MB of free HDD space for Internet Cache 512K

Software Environment (Deployment Server) Operating System Other software Web Server Windows 2003 ,Windows XP/Vista/7 VISUAL STUDIO 2008, SQL SERVER 2008 IIS

Software Environment (End User) Operating System Browser Win 2000 / Win XP IE 7.0, Firefox 3.0

Technologies Used This project is a web application that is developed in ASP.NET having SQL Server 2005 as back end. Technologies Used Presentation Layer Business/Logic Layer Database Layer Microsoft .NET 3.5 Microsoft C# Microsoft SQL Server 2008

27

Chapter 6

Design
6.1 Database Design
The general theme behind a database is to handle information as an integrated whole. There is none of artificiality that is normally embedded in separate files or applications. A database is a collection of interrelated data stored with minimum redundancy to serve many users quickly and efficiently. The general objective is to make information access easy, quick, and inexpensive and flexibility for the user. In data base design, several specific objectives are considered. Controlled redundancy: Redundancy data occupies space and therefore, is wasteful. If versions of the same data are in different phases of updating, the system often gives conflicting information. A unique aspect data base design is storing only once, which controls redundancy and improves system performance. Accuracy and Integrity: The accuracy of a database ensures that quality and contents remains constant. Integrity controls detect data inaccuracies where they occur. Data Integration: It refers to the fact that the data is stored physically at different locations, but logically the information is centralized. Data Integrity: Data Integrity means storing all the data. This leads to more consistency, less redundancy and reduces direct access storage requirement.

28

Data Independence: Data Independence is the insulation of application programs from changing aspects of physical data organization.

6.1.1 Design Of Database Tables:


Draw all tables of your database User_id User_first_name User_last_name Address State City Contact_no Email Occupation Is_user_active Created_date Int Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Char Datetime 4 200 200 500 200 200 50 50 200 1 --------------User Id User First Name User Last Name Users Address State City Contact number of User Users Email ID Users Occupation Is User Active or Deactive Date on which User has Registered

6.2 Input/output Screens

29

Chapter 7

Testing
7.1 Introduction
Testing is a process of executing a program with the intent of finding an error. A good test has a high priority of finding an as yet undiscovered error. The characteristics of a good test are: Operatability Absorbability Controllability Decomposability 30

Understandability

7.2 Levels of Testing


7.2.1 Unit Testing: This testing is done for each module of the program to ensure the validity of
each module. This type of testing is done usually by developers by writing test cases for each scenarios of the module and writing the results occurring in each step for each module.

7.2.2 Integration Testing: By making unit testing for each module as explained the process of
integrated testing as a whole becomes simpler. This is because by correcting mistakes or bugs in each module the integration of all units as a system and testing process becomes easier. This testing is needed because unit testing does not cover the aspects of how the system would behave or what error would be reported when modules are integrated .This is done in the level of integration testing.

7.2.3 System Testing: User Acc System testing of software or hardware is testing conducted on
a complete, integrated system to evaluate the system's compliance with its specified requirements. System testing falls within the scope of black box testing, and as such, should require no knowledge of the inner design of the code or logic. As a rule, system testing takes, as its input, all of the "integrated" software components that have successfully passed integration testing and also the software system itself integrated with any applicable hardware system(s). The purpose of integration testing is to detect any inconsistencies between the software units that are integrated together (called assemblages) or between any of the assemblages and the hardware. System testing is a more limited type of testing; it seeks to detect defects both within the "interassemblages" and also within the system as a whole.

7.2.4 User Acceptance Testing: User acceptance testing (UAT) is the term used when the
acceptance tests are performed by the person or persons who will be using the live system once it is delivered. If the system is being built or developed by an external supplier, this is sometimes called customer acceptance testing (CAT).

31

Chapter 8

Implementation
8.1 Introduction
Implementation is the stage in the project where the theoretical design is turned into the working system and is giving confidence to the new system for the users i.e. will work efficiently and effectively. It involves careful planning, investigation of the current system and its constraints on implementation, design of method to achieve the change over, an evaluation, of change over methods. A part from planning major task of preparing the implementation is education of users. The more complex system is implemented, the more will be the system analysis and design effort required just for implementation. The implementation process begins with preparing a plan for the

32

implementation for the system. According to this plan, they are to be carried out; discussions may regarding the equipment have to be acquired to implement the new system. Implementation is the final and important phase. The most critical stage is in achieving a successful new system and in giving the users confidence that the new system will work and be effective. The system can be implemented only after thorough testing is done and if it found to working according to the specification. This method also offers the greatest security since the old system can take over if the errors are found or inability to handle certain types of transaction while using the new system. At the beginning of the development phase a preliminary implementation plan is created to schedule and manage the many different activities that must be integrated into plan. The implementation plan is updated throughout the development phase, culminating in a changeover plan for the operation phase. The major elements of implementation plan are test plan, training plan, equipment installation plan, and a conversion plan.

8.2 Types of Implementation


o o o

Implementation of a computer system to replace a manual system. Implementation of a new computer system to replace an existing system. Implementation of a modified application to replace an existing one, using the same computer.

Successful implementation may not guarantee improvement in the organization using the new system, but improper installation will prevent it. It has been observed that even the best system cannot show good result if the analysts managing the implementation do not attend to every important detail. This is an area where the systems analysts need to work with utmost care.

8.3 Implementation of Project


Training of Personnel involved with system Even well designed system can succeed or fail because of the way they are operated and used. Therefore, the qualities of training received by the personal involved with the system various capacities helps or hinders and may even prevent the successful implementation of management information system. 33

Those who are directly or indirectly related with the system development work must know in detail what must know in detail what their roles will be, how they can make efficient use of the system and what the system will or will not do for them. Both system operators and users need training. System Operators Training Running of the system successfully depend on the personnel working in the Computer Centre. They are Responsible for providing the necessary support. Their training must ensure that they are able to handle all possible operations, both routine and extra ordinary in nature. If the system calls for the installation of new equipment, such as new computer system, special terminals or different data entry machines, the operators training should include such fundamentals as how to turn the equipment on and use it, how to power off and a knowledge of what constitutes normal operations. The operators should also be trained on different type of malfunctioning, how to recognize them and what steps should also be taken whenever they arise.

User Training

User may be trained on use equipment, particularly in the case where, e.g. a micro computer is in use and individual involved is both operator and user. In such cases, user must be given training on how to operate and user. In such cases, user must be given training on how to operator the system also. In most of the cases user training deals with the operation of the system itself, with proper attention given to data handling techniques. It is imperative that users be properly trained in methods of entering transaction, editing data, formulating inquiries, deleting and inserting of records. No training is complete without familiarizing users with simple systems maintenance activities. Weakness in any aspect of training may lead of awkward situation that creates user frustration and error.

8.4 Conversion Plan

34

A conversion is the process of changing from the old system to the new one. It must be properly planned and executed. Four methods are common in use. They are Parallel Systems, Direct Conversion, Pilot System and Phase In method. Each method should be considered in the light of the opportunities that it offers and problems that it may create. In general, system conversion should be accomplished in shortest possible time. Long conversion periods create problems for all persons involved including both analyst and users. Parallel systems

The most secure method of converting from an old to new system is to run both systems in parallel. This method is safest one because it ensures that in case of any problem in using new system, the organization can still fall back to the old system without the loss of time and money. The disadvantages of parallel systems approach are: It doubles operating costs. The new system may not get fair trial.

Direct conversion

This method converts from the old system to new system abruptly, sometimes over a weekend or even overnight. The old system is used until a planned conversion day, when it is replaced by the new system. Pilot system

Pilot approach is often preferred in the case of the new system which involves new techniques or some drastic changes in organization performance. In this method, a working version of the system is implemented in one part of the organization, such as a single work area or department.

Phase-IN- method

This method is used when it is not possible to install a new system throughout an organization all at once. The conversion of files, training of personnel or arrival of equipment may force the staging of the implementation over a period of time, ranging from weeks to months.

8.5 Post Implementation & Software Maintenance


35

After implementation phase the testing of the project is done and in post implementation phase there is an aging process that requires periodic maintenance of hardware and software. If the new information is inconsistent with the design specifications, then changes have to be made. Hardware also requires periodic maintenance to keep in tune with design specifications. The importance of maintenance is to continue to bring the new system to standards. This includes enhancements, modifications, or any change from the original specifications. To ensure the success of the system, careful and often extensive panning is required. This work falls under project management, where a project is organized into work unit levels involving tasks activities, phases, and milestones. The overall management process is crucial to the successful completion of the project.

8.6 Maintenance
Computers are always changing. There are bugs to fix, enhancement to add and optimization to make. So, changes have to done in the older version to make it applicable for current version to make it applicable for current use and current version to cater the need of future. Though efforts have to make develop an error free system but no system is perfect, room for improvement is always there. Thus, proper documentation for the system have been done so that it will be easy in future to handle any break down or any other types of system maintenance activity. For systematic maintenance of the system

Proper reporting has been done. Record keeping system has been developed so that any changes could be properly recorded. System flow and flow of events has been properly shown.

36

Chapter 9

Project Legacy
9.1 Current Status of the Project
The proposed system is concerned with following areas:

Computation of manual system. Contain Information about different topics. Automatically maintain the information.

9.2 Remaining Area of Concern

37

Many more areas can be included in the proposed system such that it can handle multiple areas. This will make the system multipurpose and more general. Areas which can be included in the system are:

The main area of their expertise is developing modern township to cater the growing needs of the people. Community requirements to be met at short distances through shopping malls, main market, community club, school sites, health spa and much more to meet your basic amenities.

Chapter 10

Conclusion
The project has been a rewarding experience in many ways. We have gained an insight into the working of the Real Estate business. This represents a real world situation. Real Estate System is a tool developed for managing the real estate properties sale and purchase procedure manually. The main purpose of Real Estate System is to perform all the tasks online during the buying/selling procedure in an efficient manner and no time wasting for maintaining the records on paper. The application mainly reduces the limitation of existing system and tends to automate manual processing, eliminate the papers work and fundamentally change the basic method of operating. Due to the speed of processing, accuracy of results produced and user friendly, it is easy to use and 38

maintain. The project environment is so user friendly that even a beginner to computers can run this project and handle all the transaction included in this project along with the report generation in this project. Provision for each and every condition is given in this project, so even if the user does something wrong, the database maintained by it remains unchanged as high level of validation checks have been used to guide the user when any error occurs or when he is going through some transaction are so clear that there can never be any problem while using the system.

Bibliography
Database Management System System Analysis and Design C#.Net 3.5 : : : Simplified approach to DBMS Elias M. Awad Wrox Publications, Microsoft Press Teach Yourself in 21 days C#.net By Deitel SQL SERVER : Teach Yourself SQL Server 2005

39

40

You might also like