Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 86

Matrimonial site (nmdata.

com)

Satya Prakash Malav (Reg. No. : - CA31055)

Submitted to:

Department of Computer Applications, for the award of the Degree of Master of Computer Applications May, 2013.

Table Of Contents

Certificate by Project Guide Declaration Acknowledgemts Preface Abstract

CHAPTER 1 INTRODUCTION 1.1 INTRODUCTION OF THE PROJECT 1.1.1 Nokari Plus Marriage Data Product Overview 1.2 HOW TO USE NOKARI PLUS MARRIAGE DATA.COM 1.3 Stop Waiting. Start living. Get Married!! 1.4 ADVANTAGES 1.5 DISADVANTAGES CHAPTER 2 SYSTEM ANALYSIS 2.1 System study Existing system 2.2 SOFTWARE AND HARDWARE REQUIREMENTS SPECIFICATION:2.2.1 Hardware Requirements 2.2.2 Software Requirements 2.3 OBJECTIVE 2.4 FEASIBILITY STUDY:2.4.1 Economical Feasibility 2.4.2 Technical Feasibility

2.4.3 Operational Feasibility 2.5 SOFTWARE MATRICS:2.5.1 Estimation 2.5.2 Application Authoring And Design Tool 2.5.3 Calculation CHAPTER 3 TOOLS AND TECHNOLOGY 3.1 INTRODUCTION TO PHP 3.1.1 What Is PHP 3.1.2 Error Reporting 3.1.3 Connecting to Database 3.1.4 Encrypt Storage Model 3.1.5 Hiding PHP 3.2 HTTP AUTHENTICATION WITH PHP 3.2.1 Cookies 3.2.2 Installation 3.2.3 PHP vs. .ASP? 3.2.4 PHP vs. Perl 3.3 ABOUT MYSQL 3.3.1 Introduction 3.3.2 Installing MySQL 3.3.3 Simple Validation 3.4 E-R DIAGRAM (ENTITY RELATIONSHIP DIAGRAM) 3.5 DATA FLOW DIAGRAM 3.6 USE CASE DIAGRAM

3.6.1 Admin Use Case :3.6.2 User Use Case :3.7 SEQUENCE DIAGRAM 3.8 ACTIVITY DIAGRAM 3.9 CLASS DIAGRAM 3.9.1 Admin class diagram:3.9.2 User Class Diagram 3.9.3 Login Class Diagram CHAPTER 4 DESIGN 4.1 SCREEN SHOT 4.1.1 Admin Part 4.1.2 User part 4.2 DATA MODELING 4.2.1 Data Dictionary CHAPTER 5 TESTING 5.1 TESTING PLAN 5.2 STRATEGY PLAN 5.3 TESTING METHOD 5.4 TEST CASES CHAPTER 6 CONCLUSION AND FUTURE PROSPECTUS 6.1 CONCLUSION 6.2 FUTURE EXTENSION CHAPTER 7 BIBLIOGRAPHY

Certificate of Project Guide

This is to certify that Mr. Satya Prakash Malav, a student of MCA from National Institute Of Technology, Jasmshedpur is doing his 6th Semester Project Training at 3ilogics, Jaipur from feb 2013 to apr 2013. The project work entitled Matrimonial Site embodies the original work done by him during his tenure.

Mr. Nitesh Ranjan (Project Manager & Team Leader)

Declaration
I hereby declare that the project work entitled Matrimonial Site in partial fulfillment of the requirement for the award of degree of Master of Computer Applications (M.C.A.) and submitted to the Department Of Computer Applications, NIT Jamshedpur in authentic record of my own work carried out during the period from 1st Feb 2013 to 30th April 2013 course at 3ilogics. The project report has not been submitted by me for any award of any other degree/diploma of this university.

Satya Prakash Malav MCA (6th Sem.) Department Of Computer Applications National Institute Of Technology, Jamshedpur.

Acknowledgement
First of all, an honorable mention goes to my Project Manager, Mr. Nitesh Ranjan for making me familiar with the intricacies of Software Development. Also I would like to thank Mr. Balram for the way he supported me and showed me the way during the training period. Also a special mention of Mr. Pankaj , who were always there for any sort of help. Working with them has added a new dimension in my stock of knowledge. Sincere thanks to all my colleagues at 3ilogics for their support and assistance throughout the project. It is definitely a wonderful experience to have such a good surrounding of people who have helped me on every step where I might have fallen. My heartfelt gratitude also goes to the Prof. Ashok Kumar Mehta , Head Of Department of Department Of Computer Applications , National Institute Of Technology, Jamshedpur for providing me with the opportunity to avail the excellent facilities and infrastructure. The knowledge and values inculcated have proved to be of immense help at the very start of my career. I would, especially like to express my gratitude to my internal guide, Mrs. Susmita Mahato for all her help, support and guidance to this juncture. I also extend my apologies for all errors or omissions, which are solely my responsibility.

Preface
Computer is an inherent part of the life today. Virtually, in every walk of life, a person in expected to be able to use computers. The impact of computer technology in several aspect of accounting profession and practice has been pronounced over the last two decades in India.

Now, we are in hyper technology area. There are several revolutions in any field. We are got more and more machine support in any kind of work in the world. In the medical science we are more efficient equipments available having all more facility, so computerization becomes a powerful factor behind this technology. And we can do any work faster and time consumed all this process become very less than ancient area.

We are doing a project named Matrimonial Site The project has maintained all types of information of the bride and groom and educational information of the job seeker.

Abstract
This project report is submitted in partial fulfillment of the requirement for the award of the degree of Masters of Computer Applications. The project report is prepared for the project pursued during the course of training undertaken at Matrix Computers as a part of the sixth semester M.C.A curriculum prescribed by National Institute Of Technology , Jamshedpur. The project report includes information about project entitled Matrimonial Site at 3ilogics, Jaipur which was assigned during the course of training.

CHAPTER 1 INTRODUCTION

1.1 INTRODUCTION OF THE PROJECT


1.1.1 Nokari Plus Marriage Data Product Overview:
Nokari Plus Marriage Data is a free matrimonial website developed in PHP. This website is available in net nowadays. Many Matrimonial websites claim they have thousands of "members" profile but one thing we want to mention here is Nokari Plus Marriage Data.com will offer you 99.9% genuine profiles. You can able to find genuine brides and grooms in Nokari Plus Marriage Data.com. Nokari Plus Marriage Data.com choose to stay honest in our efforts of matrimonial and deliver you the best results without charging you anything, because we realize the seriousness of your concern about finding your 'right' life partner. For us, matrimonial matchmaking is not just a business, but also a social cause. This attitude of ours that makes us unique amongst hundreds of other Matrimony and Matrimonial websites. Once again we assure that you will get 99.9% genuine information from our matrimonial website Nokari Plus Marriage Data.com .our main aim is to provide a unique matrimonial service to whole community no matter where you are based, to help you to find your life partner. More and more people are joining online matrimonial websites to find their match. This website deals with the registration for various types of communities. Salient features of the project are its user friendly. Data entry screen and the reports that provide the necessary details of the user. Nokari Plus Marriage Data (a web application for matrimonial) provides the efficient matrimonial website, a provision for viewing the latest status of the service. It is a free matrimonial website. The web service provides you the maximum benefit by providing the information about various users located at various places, there by managing them effectively. This system provides services in web server and bride and groom. That needs a particular person can register their name in the system and get the username and password through which they can find their soul mates. System also provides provision to view the profile of the registered user. provided that they give correct username and password.

Welcome to Nokari Plus Marriage Data.Com, the best Indian Matrimonial site with profiles of Indian brides and grooms that includes listings of Hindu Matrimonial, Muslim Matrimonial, Sikh

Matrimonial, Tamil Matrimonial, Telugu Matrimonial, Oriya Matrimonial, Kannada Matrimonial and many more from all over the world. We provide the most comprehensive listing of Indian matrimonial profiles for singles seeking love and marriage.

1.2 HOW TO USE NOKARI PLUS MARRIAGE DATA.COM


Using Nokari Plus Marriage Data.com is simple and easy. Here is a quick guide to help you make the best of your Nokari Plus Marriage Data.com membership. Get familiar with the various search options. Use the different search options and begin your search for a life partner. Photos lets you search for members with photos. Use 'Caste Search' to look for members from a caste of your choice. Search' has many criteria to search by, so your search is as specific as you'd like it. If you are searching for a specific caste, profession, lifestyle etc. you could use the 'Keyword Search'. Describe yourself and your partner preference Register as a member and create your detailed profile. Your profile is the quickest way of letting others know who you are. Just as you are more likely to express interest in a member with a detailed profile similarly others too would respond to your detailed profile : Add your photo - Our research shows that members with photos get 12 times more response. Add astroinfo, hobbies, interests etc. - Encourages response from members more suited for you. Contact and be contacted. Once you have found a likely match, show interest by clicking 'Express Interest' on the profile page of the member. The member will then get a message and can accept or decline after viewing your profile. Check and respond to the interests and messages you receive regularly. Also improves your Activity Factor (an indication of how well you interact on the site) keeping you high in other's search results Once the other member accepts your interest you can get to know the other person or share contact details by typing messages and initial in Gmails Respond to messages and chat requests from Premium Members Login regularly. To ensure higher ranks in search results login regularly. There are other advantages too: You can check interests you receive and respond to them Thousands of new members join each week and your special someone may be one of them new features and enhancements are regularly made to improve your experience here.

1.3 Stop Waiting. Start living. Get Married!!


Here's how you can find your Indian matrimonial match. Post your matrimonial profile for FREE Thousands of Indian brides and grooms will view your profile

Browse thousands of Indian matrimonial profiles Contact Profiles of your choice Get Married. Be Happy. Matrimonial web sites are gaining popularity among young men, women and their parents. A big attraction for them is cost effectiveness of this idea. Gone are the days when harried parents of the marriageable daughters waited for marriage brokers to come up with proposals from prospective bridegrooms who could match their choice and pockets. The scene was almost the same in the homes of bachelors; with the only difference that their parents were less harassed and less worried about money. Now, things have changed quite a lot. The education of women has brought with it the power of independence. The Indian society has come a long way. There has been a drastic change in the attitude of both Parents and their daughters. Women nowadays exercise their veto more often while choosing their bridegrooms. The situation for the boys too has improved; though even earlier their conditions were better off than the girls. One thing that has become clear and loud with the change is that today the Indian marriage is increasingly becoming a union of two individuals rather being a union of two families. Marriages in India are categorized mainly under two types: love marriage and arranged marriage. Love marriage is getting full-fledged support from our own dear dream weaver, the one and only Bollywood. Things now have come a long way. It is not that the earlier two forms do not exist anymore, but there has been a perceptible change in the outlook of the educated middle and the upper middle class. The classifieds of the renowned English and the vernacular dailies now have taken place of the marriage brokers. But, the ones who are Creating ripples in the business of finding the right match are the matrimonial sites. Shaadi.com, Jeevansaathi.com 123India.com Matrimonial, BharatMatrimony.com, etc. are some of the popular matrimonial web sites. Just a click of the mouse and a whole world of information about men and women of marriageable age unravel in front of the user. These sites provide free registrations for their users and also help them in creating Attractive looking profiles. The sites enable their user to search matches, that meet their respective criteria and can even email or chat with the registered members. The site does not only help the prospective brides and bridegrooms but are helpful for their parents also. The choice is extensive for the netizens, who are hooked on to these sites. The user can avail many search options. The member just has to mention about the desired community or the desired job profile or the choice of the country or city for the match search. There are options for selecting the desired complexion and height in these matrimonial web sites. Some sites are exclusively for the Non-Resident Indians (NRIs). India Canada Marriage is one such web site for Indo-Canadians. India Matches is another matrimonial web site where one can search for a life partner or find a date or meet a friend through the Internet. The matrimonial sites do not restrict themselves to the role of an information provider of the ready-to-be brides and the bridegrooms. They are just ready with all kinds of information associated with marriage starting from the information about designers, renowned shops of trousseau, to even decorators, florists, caterers and wedding halls. Now,

the question that may come to everybody's mind is that whether people are really benefited by it or not. The success stories that have been put up on these sites assert that the people do get benefits. But, there is also another side of the story. Many young men and women log on to these sites just for chatting and dating on the net. In many offices, guys are often seen these sites regularly just to see the pictures of the girls, to take their email addresses, to chat and to meet them later on to be browsing through.

1.4 ADVANTAGES
1. Easy and simple to use. 2. Upload your photo for FREEit is said that a "Photo" is worth a thousand words" Upload your Digital Photo yourself OR send us your photo & we will scan & digitize& Upload it - Absolutely Free . 3. Free Registration--If you have not register yet, and then register now it will only take few minutes and start searching for your soul mate. If you have any suggestions or comments on how to make this website better then please do not hesitate to contact us. To ensure higher ranks in search results login regularly. There are other advantages too: 4. You can check interests you receive and respond to them . 5. Thousands of new members join each week and your special someone may be one of them. 6. New features and enhancements are regularly made to improve your experience here. 7. Photo security. 8. The aficionados of the first type snub arrange marriage as the marriage of convenience. Moreover, the second type really has a long fan following among the fraternity of parents. With even love marriages Breaking apart too often, some of the younger generations are also shifting their allegiance.

1.5 DISADVANTAGES
1. Poor communication between users. 2. Photo size is small.

CHAPTER-2 SYSTEM ANALYSIS

The prime objective of the system is to develop a application for satisfying all requirements of the client and it should be capable of handling large volume of customers. The overall system must be fast and convenient. The Classical System Development life Cycle (SDLC) method, the Prototype model has been used here. It is the most widely used paradigm for system development. This process demands a systematic, sequential approach to software development. The life cycle involves the following activities

2.1 System study System studies results in finding out details of the existing methodologies that are being followed and that whether any developments is to be made. These studies considered both the existing and the proposed system. System study had been conducted to analyze the current existing system of matrimonial websites. All the current websites have been analyzed.

Existing system

In the existing system the advertisement and marriage is done through newspapers and marriage beauro. So the current system is an old one in this computer world and it has many drawbacks. The main problem is regarding time as well as cost. The cost of advertisement and searching of the partners through newspapers and consultancy are difficult. In the manual system we waist the time. Later it leads to confusion and lack of knowledge of the bride and grooms. As paper advertisement involved in the manual maintenance is high, keeping of unnecessary data, leading piles of waste paper. In this fast changing world, in each and every home there is a computer with net connection. So the present system has become an easy, fast, and cost effective way of through mails.

2.2 SOFTWARE AND HARDWARE REQUIREMENTS SPECIFICATION:2.2.1 Hardware Requirements PROCESSOR CLOCK SPEED SYSTEM BUS RAM : : : : B PENTIUM IV 500 MHZ 32 BIT 512 MB

HDD MONITOR KEY KEY BOARD MOUSE FDD

: : : : :

40 GB SVGA COLOR 108 KEYS LOGITECH 1.44 MB

2.2.2 Software Requirements

OPERATING SYSTEM

WINDOWS XP AND HIGHER VERSION

ENVIRONMENT

DREAMVIEWER

FRONT END SERVER SIDE SCRIPTING WEB ADMINSTRATIOR BACKEND BROWSER

: : : : :

PHP JAVA SCRIPT APACHE MYSQL INTERNET EXPLORER 6.0

2.3 OBJECTIVE

What is Matrimonial Web Application? The main objective of Matrimonial Web Application is to provide Grooms and Brides with excellent matchmaking experience by exploring the opportunities and resources to meet true potential partner. Keeping our objective in mind, we have created a world renowned

online matchmaking services that will touch the souls of millions of people all over the globe.

What are the purposes of Matrimonial Web Application? The purposes of the Matrimonial Web Application are:

by applying the information in the field. perspective bride or groom and other information regarding them online. life partner at his/her home at his/her convenience. ity which helps those users who have a certain criteria of qualities in mind to make online matrimonial easier. Since internet is a pivot for modern business, our project which is based on Internet paves a path for modernization in trade.

2.4 FEASIBILITY STUDY:Feasibility study is a process to check possibilities of system development. It is a method to check various different requirements and availability of financial & technical resources.

Before starting the process various parameters must be checked like:

Estimated finance is there or not? The man power to operate the system is there or not?

The man power is trained or not?

All the above conditions must be satisfied to start the project. This is why in depth analysis of feasibility is carried out.

There are three different ways feasibility can be tested

1) Economical Feasibility 2) Technical Feasibility 3) Operational Feasibility.

2.4.1

Economical Feasibility:-

in economical feasibility, analysis of the cost of the system is carried out. The system should be only developed if it is going to give returned the current manual system user can get the price only by purchasing the newspapers. In addition if he/she wants to see archives of particular equity then he has to refer to all the old newspapers. For research reports he has to buy another magazine. So Instead of buying no of magazines user has to just go online and with a single click he can get whatever information he wants. So our project of online share news passes the test of economical feasibility.

2.4.2

Technical Feasibility:

It is basically used to see existing computer, hardware and software etc, weather it is sufficient or additional equipments are required? Minimum System Requirement is such that it can be affordable by of the user who is having computer. All the user requires is compatible browser and .net framework installed so our system is fully technical feasible.

2.4.3 Operational Feasibility:Once the system is designed there must be trained and expert operator. If there are not trained they should given training according to the needs of the system. From the users perspective our system fully operational feasible as it just requires some knowledge of computer. Operators only need add daily prices of various equities and there are enough validations available so operator does not require any special technical knowledge. So our system also passes the test of operational feasibility.

2.5 SOFTWARE MATRICS:-

2.5.1 Estimation:In Web engineering, the metrics have three goals: 1 2 3 To provide the indication of the quality from the technical point of view. To provide the basis for effort estimation. To provide an indication of the success from the business point of view.

2.5.2 Application Authoring And Design Tool :-

Suggested measure

Description

Structuring effort

Time

to

structure

Web

App

and/or

device architecture.

Interlinking effort

Time to interlink pages to build the Apps.

Interfacing planning

Time taken to plan Web Application Interface.

Interface building

Time taken to implement Web Application interface.

Link-testing effort

Time taken to test all links in Web Application

. Media-testing effort Time taken to test all media in Web Application.

Total effort

Structuring effort + Interlinking effort + Interface Planning + Interface Building

PAGE AUTHORING

Text effort

Time taken to author or reuse text in Page.

Page-linking effort taken to structure page.

Time taken to author links in page.

Time

Total page effort

Text effort + Page-linking effort + Page structuring effort

MEDIA AUTHORING Media Effort Time taken to author or re-use media files. Media-digitizing effect Total Media Effort PROGRAM AUTHORING Time taken to digitize media. Media Effort + Media-digitizing effort.

Programming effort PHP or language implementations. Re-use effort 2.5.3 Calculation :Structuring effort Interfacing planning Interlinking effort Interface Building Link-testing effort Media-testing effort Total Effort Text Effort Page-linking effort Page structuring effort Total Page Effort Programming Effort Reuse effort

Time taken to author HTML,

Time to reuse / modify existing.

6-PDay 3-PDay 3-PDay 6-PDay 3-PDay 3-PDay (6+3+3+6+3+3)=24-PDay 6-PDay 4-PDay 6-PDay (6+4+6)days=16-PDay 40-PDay 10-PDay

CHAPTER 3 TOOLS AND TECHNOLOGY

3.1 INTRODUCTION TO PHP


PHP is a powerful language and the interpreter, whether included in a web server as a module or executed as a separate CGI binary, is able to access files, execute commands and open network connections on the server. These properties make anything run on a web server insecure by default. PHP is designed specifically to be a more secure language for writing CGI programs than Perl or c, and with correct selection of compile-time and runtime configuration options, and proper coding practices, it can give you exactly the combination of freedom and security you need. As there are many different ways to utilizing PHP, there are many configuration options controlling its behavior. A large selection of options guarantees you can use PHP for a lot of purpose, but it also means there are combination of these options and server combinations that result in an insecure setup. The configuration flexibility of PHP is equally reveled by the code flexibility .PHP can built complete server applications, with all the power of shell user or it can be used for simple server- side includes with little risk in a tightly controlled environment. how you build that environments, and how secure it is largely up to the PHP developer. This chapter starts with some general security advice, explains the different configuration option combinations and the situations they can be safely used and describes different considerations in coding for different level of security.

3.1.1 What Is PHP


PHP (recursive acronym for "PHP: Hypertext Preprocessor") is a widely used open source general purpose scripting language that is especially suited for Web development and can be embedded in to HTML. Notice how this is different from a script written in other languages like Perl or cinstead of writing a program with lots of commands to output HTML, you write an HTML script with some embedded code to do something (in this case, output some text). The PHP code is enclosed in special start and end tags that allow you to jump in to and out of'PHP mode" What distinguishes PHP from something like client-side JavaScript is that the code is executed on the server. If you were to have a script similar to above on the server, the client would receive the result of running that script, with no way of determining what they underlying code may be. You can even configure your web server to process all your HTML files with PHP, and then there's really no way that users can tell what you have up your sleeve. The best things in using PHP are that it is extremely simple for a newcomer, but offers many advanced features for a professional programmer. Dont be afraid reading the long list

of PHP's features. You can jump in a short time, and start writing simple scripts in a few hours. General Installation considerations Before starting the installation, first you need to know what do you want to use PHP for. There are three main fields you can use PHP Server-side scripting Command line scripting Client-side GUI applications For the first and most common form, you need three things: PHP itself, a web server and a web browser. You probably already have a web browser, and depending on your operating system setup, you may also have a web server (e.g. Apache on Linux and MacOS X;IIS on Windows). You may also rent web space at accompany. This way, you don't set up anything on your own, only write your PHP scripts, upload it to the server you rent, and see the results in your browser. While setting up the server and PHP on your own, you have two choices for the method of connecting PHP to the server. For many servers PHP has a direct module interface (also called SAPI). These servers include Apache, Microsoft Internet Information Server, Netscape and iPlanet servers. Many other servers have support for ISAPI, the Microsoft module interface (Omni HTTP for example). If PHP has no module support for your web server, you can always use it as a CGI or Fast CGI processor. This means you setup your server to use the CGI executable of PHP to process all PHP file requests on the server. If you are also interested to use PHP for command line scripting (e.g. write scripts auto generating some images for you offline, or processing text files depending on some arguments you pass to them), you always need the command line executable. With PHP you can also write to the desktop GUI application using the PHP-GTK extension. This is a completely different approach than writing the pages, as you do not output any HTML, but manage windows and objects within them.

3.1.2 Error Reporting


With PHP security, there are two sides to error reporting. One is beneficial to increasing security, the other is detrimental. A standard attack tactic involves profiling system by feeding it improper data, and checking for the kinds, and context, of the errors, which are return. This allows the system cracker to probe for information about the server, to determine possible weaknesses. For e.g. If an attacker an had gleaned information about a page based on prior form submission, they may attempt to override variables, or modify them: The PHP errors normally return can be quite helpful to a developer who is trying to debug a script, indicating such things as the function or file that failed the PHP file it failed in, and the line number that occurred in. This is all information that can be exploited. it is not uncommon for a PHP developer to use show source() ,highlight string(),or highlight files() as a debugging measure, but in a live site , this can be expose hidden variables, unchecked syntax ,and other dangerous information. Especially dangerous

is running code from non-sources with built-in debugging handlers or using common debugging technique. If the attacker can determine what general technique you are using, they may try to brute-force a page, by sending various common debugging strings: Regardless of the method of error handling, the ability to probe a system for error leads to providing attacker with more information. For example, the very style of a generic PHP error indicates system is running PHP. If the attacker was looking at an .html page, and wanted probe for the back-end (To look for known weakness in the system), by feeding it the wrong data they may be able to determine that a system pass built with PHP. A function error can indicate whether a system may be running a specific database engine, or give clues as to how a web page or programmed or designed. This allows for deeper investigation into open database ports, or to look for specific bugs or weakness in a web page. By feeding different pieces or bad data, for example, an attacker can determine the order of authentication in a script, (from the line number errors) as well as probe for exploits that may be exploited in different locations in the scripts. A file system or general PHP error can indicate what permissions the webserver has, as well as the structure and organization of files on the web server. Developer written error code can aggravate this problem, leading to easy exploitation of formerly "hidden" information. There are three major solutions to this issue. The first is to scrutinize all functions, and attempt to compensate for the bulk of the errors. The third is to use PHP's custom error handling functions to create your own error handler. Depending on your security policy, you may find all three to be applicable to your situation. One way of catching this issue ahead of time is to make use of PHP's own error reporting (), to help you secure your code and find variable usage that may be dangerous. By testing your code, prior to deployment, with EALL, yo can quickly find you area where your variables may be open to poisoning or modification in other ways. Once you are ready for deployment, you should either disable error reporting completely by setting error reporting () to 0, or turn off the error display using the php.ini option display_ errors, to insulate your code from probing. If you choose to do the latter, you should also define the path to your log file using the error log in directive, and turn log error on.

3.1.3 Connecting to Database


You may want to establish the connection over SSL to encrypt client/server communications for increased security, or you can use the database server. If either of these is used, then monitoring your traffic and gaining information about your database will be difficult for a would-be attacker.

3.1.4 Encrypt Storage Model


SSL/SSH protects data traveling from the client to the server SSL/SSH does not protect the persistent data stored in a database. SSL is an on-the-wire protocol.

Once an attacker gains access to your database directly (bypassing the web server), the stored sensitive may be exposed or misused, unless the information is protected by the database itself. Encrypting the data is a good way to mitigate this threat, but very few databases offer this type of data encryption. The easiest way to work around this problem is to first create your encryption package, and then use it from within your PHP scripts. PHP can assist you in this with several extensions, such as Mcrypt and Mhash covering a wide variety of encryption algorithms. The script encrypts the data before inserting it in to the database, and decrypts it when retrieving. See the reference for further examples of how encryption works. In case of truly hidden data, if its raw representation is not needed (i.e. not be displayed), hashing may also be taken in to consideration. The well-known example for the hashing is storing the MD5 hash of a password in a database, instead of password itself.

3.1.5 Hiding PHP


In general security by obscurity is one of the weakest forms of security. But in some cases, every little bit of extra security is desirable. A few simple techniques can help to hide PHP, possibly slowing down an attacker who is attempting to discover weakness in your system. By setting expose_php=off in your php.ini file, you reduce the amount of information available to them. Another tactic is to configure is to configure web servers such as apache to parse different file types through PHP, either with a hatches directive, or in the apache configuration file itself. You can then use misleading file extensions:

3.2 HTTP AUTHENTICATION WITH PHP


The HTTP Authentication hooks in PHP are only available when it is running as an Apache module and is hence not available in the CGI version .In an Apache module PHP script, it is possible to use the header ()function to send an "Authentication Required " message to the client browser causing it to pop up a Username /Password input window. Once the user has filled in a username and password, the URL containing the PHP script will be called again with the predefined variables_PHP_AUTH_USER, PHP_AUTH_PW, and AUTH_TYPE set to the username, password and authentication type respectively. These predefined variables are found in the $SERVER and $HTTP_SERVER_VARS arrays. Only "Basic" authentication is supported.

3.2.1 Cookies
PHP transparently supports HTTP cookies. Cookies are a mechanism for storing data in the remote browser and thus tracking or identifying return users. You can set cookies using the set cookie or set raw cookie () function. Cookies are part of the HTTP header; so set cookie () must be called before any output is sent to the browser. This is the same limitation that header () has. You can use the output buffering functions to delay the script output until you have decided whether or not to set any cookies or sent any headers. Any cookies sent to

you from the client will automatically be turned in to a PHP variable just like GET and POST method data, depending on the register global and variables order configuration variables .If you wish to assign multiple values to a single cookie, just add [] to the cookie name. In PHP 4.1.0and later, the $_COOKIE auto global array will always be sent with any cookies sent from the client. $HTTP_COOKIE_VARS is also set in earlier versions of PHP when the track vars configuration variable is set 3.2.2 Sessions Session supports in PHP consist of a way to preserve certain data across subsequent accesses. This enables you to build more customized applications and increase the appeal of your web site. The session module cannot guarantee that the information you store in a session .You need to take additional measure to actively protect the integrity of the session, depending on the value associated with it. Assess the importance of the data carried by your sessions and deploy additional protections _this usually comes at a price, reduced convenience for the user. For example, if you want to protect users from simple social engg: tactics, you need to enable session. Use _only _cookies. In that case, cookies must be enabled unconditionally on the user side, or sessions will not work. There are several ways to leak an existing session id to third parties. A leaked session id enables the third party to access all resources, which are associated with a specific id. First URLs caring session ides' you link to an external site, the URL including the session id might be stored in the external sites referrer logs. Second, a more attacker might listen to your network traffic .If it is not encrypted ,session ids will flow in plain text or the network the solution here is to implement SSL on your server and make it mandatory for users . Optionally you can use shared memory allocation (mm) developed by Ralf S.engle hall for session storage you have to download mm and install it. This option is not available to windows platforms .not that the session storage module for mm does not guaranty that concurrent access to the same session is properly locked.

3.2.2 Installation
Session support is enable in PHP by default if you would not like to build your PHP with session support you should specify the disable session options to configure to use shared memory allocation (mm) for session storage configure PHP -with-mm [=DIR]. The windows version of PHP has built in support for this extension you do not need to load any additional extension in order use this functions. BY default all data related to particular session will be stored in file in the directory specified by the session. Save path INI option. File for each session (regardless if any data if associated with that session) will be created. This is due to the fact that session is opened (file is created) but no data is even return to that file not that these behavior is a side effect of limitation of working with the file system and it is possible that accustom session handler (such as one which uses database) does not keep track of session which store no data

3.2.3 PHP vs. .ASP?


ASP is no really a language in itself, it's an aroma for active server pages the actual language is used to program asp with is Visual Basic Script or Jscript.The biggest draw of

ASP is that a it's a proprietary system that is natively used on Microsoft internet information server (IIS). This limit it's availability to win 32-based servers there are a couple of projects in the works that allows ASP to run in other environments and webservers. InstantASP from Halcyon (commercial) chily! Soft ASP from chily! Soft (commercial) ASP is said to be slower and comp some language than script it's Relatively easy to pick up the language you already know how to program in Visual Basic. ASP support is also enabled by default in the IIS server making it easy to get up and running. The components built in ASP are really limited, so if you need to use" advanced" features like interacting with FTP servers you need to buy additional components. PHP is commonly said to be faster and more efficient for complex programming tasks and trying out new ideas. PHP generally referred to as more stable and less resource intensive as well. Cold Fusion has better error handling, database abstraction and date parsing although database abstraction is addressed in PHP 4.Another thing that is listed as one of Cold Fusion's strength is its excellent search engine, but it has been mentioned that a search engine is not something should be included in a web scripting language .PHP runs on almost every platform there is Cold Fusion is only available on Win 32,Solaris, Linux and HP/UX.Cold Fusion has a good IDE and Is generally easier to get started with where as PHP initially requires more programming knowledge. Cold Fusion is designed with nonprogrammers in mind while PHP is focused on programmers.

3.2.4 PHP vs. Perl


The biggest advantage of PHP over perl is that PHP was designed for scripting for the web where Perl was designed to do a lot more and can because of these get very complicated the flexibility or complexity of Perl makes it easier to write code that another author or coder has a hard time reading PHP was a less confusing and stricter format without losing flexibility. PHP is easier to integrate in to existing HTML than Perl. PHP has pretty much all the" good" functionality of Perl constructs, syntax and so on ,without making it as complicated as Perl can be. Perl is very tried and true language its been around since late eighties but PHP is maturing very quickly.

3.3 ABOUT MYSQL 3.3.1 Introduction


PHP and MySQL, two make up what must be the best combination for data-driven Web sites on the planet. You needn't take my word for it. An unofficial Netcraft survey shows that PHP usage has jumped from 7,500 hosts in June 1998 to 410,000 in March 1999.That's not bad. The combination was also awarded Database of the year at Webcon98, where it received a lovely tiara. MySQL is a small, compact database server ideal for small - and not so small - applications. In addition to supporting standard SQL (ANSI), it compiles on a number of platforms and has multithreading abilities on Unix servers, which make for great performance. For non-Unix people, MySQL can be run as a service on Windows NT and as a normal process in Windows 95/98 machines.

In addition to being free (My SQL does have some licensing restrictions though), the PHPMySQL combination is also cross-platform, which means you can develop in Windows and serve on a Unix platform. Also, PHP can be run as an external CGI process, a stand-alone script interpreter, or an embedded Apache module.

3.3.2 Installing MySQL


MySQL central is http://www.mysql.com/._As befits a program of its stature, there are a zillion mirrors located all over the globe, so do the internet a favor and pick the one closet to you. You've got plenty of choices at this point. If you're a do-it yourselfer, then grab the source code. If you're not that brave, there are some precompiled binaries for other platforms already available for download. In addition, there is a shareware version of MySQL for windows users. It is an older version of MySQL. If you want the latest version, you'll have to purchase a license. There are also ODBC drivers that let your applications talk to MySQL. Various other exciting bits and pieces are lurking about on the site, too, so take a look. The precompiled Unix versions and the Windows version are as simple as unpacking and going, and they don't require much explanation. So let's compile from the source code. Windows users, please keep in mind that you need to run MYSQL in the mysql/bin directory. MySQL comes with a handy configuration script. Simply type /configure and let things take care of them. If you need to specify what happens and where, typing. /configurehelp gives you a list of options to choose from. For example, if you're compiling on a machine with little memory, you can opt for the with-low-memory flag. I like MySQL to install in one handy directory tree rather than in various locations on my machine, so I specify an install location with the -prefix flag. You can also specify lots of other options, such as what to compile and what to skip. Let's assume that we want everything under /user/local/mysql on our server. This means we'd type. /configure -prefix=/user/local/mysql. The configure script will run and inspect your system and then build the necessary files to successfully compile .If it fails, you'll usually get a helpful error message saying why. Quite often, you'll find the script will fail when it's looking for threading libraries. Check that you've got MIT-p threads installed on your machine, and if not, add them. Linux users will have to download Linux Threads. These are critical libraries that allow MySQL to multithread (i.e. run multiple versions of itself). Recent distributions of Linux may already have these libraries installed. If everything goes according to plan, simply type make and go get a coffee. MySQL is a complex program and takes some time to compile. If you get an error, check the documentation to see if there is anything specific that you've missed for your particular OS. Next, type makes install and all the necessary files will be installed in all the necessary spots. Now you're almost ready to roll! If you are a MySQL virgin and you've never installed MySQL before, you need to create the default permissions, so type... scripts/mysql_install_db to set these up.

3.3.3 Simple Validation

Imagine for a moment that we've got our database nicely laid out and we're now requesting information from users that will be inserted into the database. Further, let's imagine that you have a field in your database waiting for some numeric input, such as a price. Finally, imagine your application falling over in a screaming heap because some smart aleck put text in that field. MySQL doesn't want to see text in that portion of your SQL statement- and it complains bitterly. Validation simply means that we'll examine a piece of data, usually from an HTML form, and check to make sure that it fits a certain model. This can range from ensuring that an element is not blank to validating that an element meets certain criteria (for example, that a numeric value is stipulated or that an email address contains an @ for an email address). Validation can be done on the server side or on the client side. PHP is used for server-side validation, while JavaScript or another client-based scripting language can provide clientside validation. This article is about PHP, so we're going to concentrate on the server end of things. Let's ignore our database for the moment and concentrate on PHP validation. If you wish, you can add additional fields to our employee database quite simply by using the MySQL ALTER statement that is, if you want to commit to the values that we'll validate. There are several useful PHP functions we can use to validate our data and they range from simple to highly complex. a simple function we could use might be strlen (),which tells us the length of the variable. A more complex function would be ereg (), which uses full regular expression handling for complex queries. I wont delve in to the complexities of regex here, as entire books have been written on the subject, but I will provide some examples on the next page. To select a value from the database we can use the following script inside PHP tags $sql="SELECT * from my table"; $result=db_query ($sql);

3.4 E-R DIAGRAM (ENTITY RELATIONSHIP DIAGRAM)


Member id Member shiptype Domain Fname Lname Age Country City Cast About myself
ns ze ty Ci

Mobileno
u Ed n1 tio ca

Address

Email

try1 Re lig ion 1

Sta te1

or d1

Mother Country Resident occupation Horoscope code city Interest Description Phoneno Exsport
Coun

Area code
ent Resid t sta e ly Fami g i or in
yee lik

Pa ss

p1 hi

n1 dre hil o Sp rt1

plo Em

Do

ma in1 Dr ink
Register

Sp e Ag m o r f

2 ort

ng Ma

3 Sport 4 Sport

Gothra Body type Subcast

Age month Age date Age year Gender Marital status

Movie1 Movie2

Read1 Read2
Ph y sta sical tus 1

Movie3
e4 M ovi vie Exmo
1 sic Mu 2 sic Mu Mu sic 3

ht Heig m fro

Read3

Weight

Heig Re ht ad4
Ex rea d La ng uag e1
2 3 ge ge ua ua

Sta r

Children Children status Religion


ig He o t ht

Raasi Family value Family status Family type

ng La

ic 4

ng La

M E In te xmu re st1 sic

us

H ob 2 es bi 1 es ob bi H

Int ere st2

Complexion Physical status Blood group Father occupation

Ho es3 bbi

Int ere st3

Mothertongue About family

Intere st4 Exint erest Resid en status t 1 Mother tongue1 No of brother Ageto

Ho es4 bbi

ho Ex

er Broth d e marri ing Look for

No of sister

es bbi

Income

Smoke

Eatinghabits

Occupation

Education

Register

1 1 1

Female

Male

Msgto

Story

1 Story

Has successful story

Has express interest

Emsgtable

Id

Email

Msg from

Msg

Has loan

Fullname Date of month Date of day Date of year Mobileno

Emailid

Memberid

Msgto

Need for loan Loan amount Income City

1 Has personal msg

Pmsgtable

Loan

Msg from

Msg

Landlineno1

Employee type Occupation Organization

Landlineno2

3.5 DATA FLOW DIAGRAM

3.5.1 Level 0

3.5.2 Level 1

3.5.2 1 Data Flow Diagram For User

3.5.3 Level 1

3.5.2 1 Data Flow Diagram For Admin

3.6 USE CASE DIAGRAM 3.6.1 Admin Use Case :-

Add/Update Records

Admin can Add or Update the records

Sending Mail

Admin can send the mail to the customer

Delete Records

Admin can delete the records.

Admin

3.6.2 User Use Case :-

Registration

User can register himself/herself in the system

User can login to the system Login

User can edit his/her profile. Edit Profile

Searching

User can search the record for male/female.

USER

3.7 SEQUENCE DIAGRAM

Sequence Diagram For Registration::User :Home :Registration personal :Registration physical :Registration socio-occupation :Profile :Database

click on registration

fill-up data

fill-up physical data

store to database

profile is created now user can login by user-id login page

login using userid and password

check username and password

username and password is valid or not valid not valid

valid username and password wellcome user now you can edit/update your profile

Sequence Diagram For Edit Profile:-

:User

:Profile

:Registration

:Photoupload

:database

login with correct username and password

click on edit profile

update imformation

give remaining registration screen

fillup form and click on update

store to database

profile updated

click on photoupload

browes photo

click on upload photo uploaded

3.8 ACTIVITY DIAGRAM

Enter I/P Data

[Prompt For Correcrion]

[Data Valid]

[Data Invalid]

Valid Data From User

Invalid Data Entered by User

I/P Validation

Fetch Record from Database

Display Data on form

No Data in to Database

Display Records

Enter Search Criteria

[Data Valid]

[Data not Valid]

find data from the database

Search fails

Search Records

Array Passed by I/p validate

Add data in to database

Add Records

User Issues Update Command

Update Records in to Database

Store updated data in to database

Update Record

3.8 CLASS DIAGRAM

(1) Admin class diagram:-

(2) User Class Diagram

(3) Login Class Diagram

Chapter 4 DESIGN

4.1 Screen Shot


R1: Login page

R.1.1 For unregistered person, registration process

Input:

Click on link for new registration.

Output: Registration is done for new user Flow: Control is redirected to registration form and after fill up the form and after click on the register button data of new user is stored database and an email is sent to the user into

R.2.2 For registered person, login process

Input:

MemberId and password.

Output: Get the screen of verify MemberId and Password. Flow: If MemberId and Password correct then user will get his/her profile. user can do update profile, create album, change photo, hide profiletoure, apply for loan after correct login.

R.1.3 If Password is forgotten than redirect to retrieve page

R.2.5: For search partner (According caste)

Input: Click on given caste. Output: Control is redirect to the search screen.

R3: View profile

Input: Click on view profile button. Output: Get the screen of directory.

R4: Genius profile

Input: Click on link of genius profile. Output: Control is redirect to the screen of genius profile.

4.2 DATA MODELING 4.2.1 Data Dictionary Register:

Name

Null ?

Type

Description

Id profile_for Userid contact_person email_id Password Name Gender marital_status Mobile Phone Dob Height Country

No No No No No No No No No No No No No No

Int Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar varchar Varchar Varchar Varchar Varchar

Primary key Relation with bride and groom User login id Name of the person to whom you can contact User mail id User password Name of the bride or groom Gender of the bride or groom Marital Status Contact no of the bride or groom Contact no of the bride or groomhouse Date of birth Height of the bride and groom Country of the bride and groom

Religion Caste mother_tongue Occupation Children father_name Mother_name gm_name mgm_name father_village mother_village gm_village mgm_village father_gothram mother_gothram gm_gothram mgm_gothram country_residence Address

No No No No No No No No No No No No No No No No No No No

Varchar Varchar Varchar Varchar Int Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar Varchar varchar Varchar Varchar

Religion of the bride and groom Caste of bride and groom mother_tongue of the bride or groom Occupation of the bride or groom No of the children Fathers name of the bride or groom Mother name of the bride or groom Grand Mother name of the bride or groom Maternal grand mother Fathers village Mothers village Grand mothers name Maternal grand mothers name Fathers gothram Mother s gothram Grand Mother s gothram Maternal Grand Mother s gothram Residential country Address of the user

Citizenship Immigration_Statu s Living_Situation House_Ownership Highest_Education Specific_Degree other_job_details Income Features Complexion Built Special_Cases

No No

Varchar Varchar

Citizenship of the user Status immigration

No No No No No No No No No No

Varchar Varchar Varchar Varhar Varchar Varchar Varchar Varchar Varchar Varchar

Bride or groom living situation Info about house of the bride or groom Education of the bride or groom Specific degree of the bride and groom Other job detail of the user Monthly income of the bride or groom Features of the bride and groom Complexion (fair , dark etc.) Built (slim , medium ,athletic etc) Special Cases(mentally challenged, physically handicap etc.)

blood_group Weight Smoke Habits take_hard_drinks About

No No No No No No

Varchar Int Varchar Varchar Varchar Varchar

Blood group of the user Weight of the user in k.g. Smoke habit of the user Other habits of the user Whether user take hard drinks or not About the user

Photo Status updated_on

No No No

varchar Varchar Date

Pics of the bride or groom Status of the user profile Updated date of profile

Success_Story:

Name

Null?

Type

Description

Female Male Id Email Story

No No No No No

Nvarchar(50) Nvarchar(50) Int Nvarchar(50) Nvarchar(MAX)

Female Male Primary Key EmailID Success Story

Caste info.

Name

Null?

Type

Description

Id Caste

No No

Int Varchar

Primary key Variety of castes

Admin info

Name

Null?

Type

Description

Id admin_name

No No

Int Varchar

Primary key User name of the admin

password

No

Varchar

Password

Chapter

TESTING

5.1 TESTING PLAN Similar to the project plan, due to confidentiality issues, we cannot provide details test plan to the development team. We will still add the core components that make up our test plan.

1.1.1 Test plan identifier 1.1.2 References 1.1.3 Introduction 1.1.4 Test items (functions) 1.1.5 Application risk issues. 1.1.6 Features to be tested 1.1.7 Features not to be tested 1.1.8 Approach (strategy) 1.1.9 Item pass/fail criteria 1.1.10 Entry & exit criteria 1.1.11 Suspension criteria & resumption requirements 1.1.12 Test deliverables 1.1.13 Remaining test tasks 1.1.14 Environmental needs 1.1.15 Staffing and training needs 1.1.16 Responsibilities

1.1.17 Planning risks and contingencies 1.1.18 Approvals 1.1.19 Glossary

5.2 STRATEGY PLAN Test More and Test Frequent is organizations tagline for testing. A typical screen in asp.net is tested at four levels before it goes for production. Level 1 is generally the work to be tested by other developers or other interns (this is typical first level of testing where focus is not on requirement but end user testing) Ratio: 0% end user: 100% Technical Level 2 is level where a senior programmer comes into the testing cycle of the screen that was unit tested by the developer in this phase the onus is to test software for technical requirements specified. Ratio: 80% Technical: 20% end user Level 3 is where a tester will come into picture. The tester will test the software for both end user as well as technical point of view. The ratio here is: 50% Technical: 50% end user Level 4 is where we make the code at Release-Ready. Here screen is tested to the core and each and every standard must be followed and verified. Ratio here is: 80% User Testing 20% Technical This allows us to text a screen at four levels and at the end of four weeks when the screen goes to production, it is generally bug free because more people have looked at this screen from different viewpoints.

References available while testing Project Plan. System Requirements specifications. High Level design document. Detail design document. Development and Test process standards. Methodology. Low level design.

Also organization has Separate module to store all bugs So each screen is released for testing as a build and all information for that screen (till release) is maintained using this particular build.

CONTENT TESTING:
Errors in Web Application content can be as trivial as minor typographical error as incorrect information, improper organization or validation of intellectual property laws. Content Testing attempt to uncover this and many other problems before the user encounter them.

Content Testing Objectives


There are three types of objectives. To uncover syntactic errors in text-based documents, graphical representation and other media. To uncover semantic errors in any content object represented as navigation occurs, and To find errors in organization or structure of content that is presented to the enduser

DATABASE TESTING:
Modern Web Application does much more than present static content objects. In many application domains, Web Application interface with sophisticated database management system and build dynamic content object that are created in real time using the data acquired from a database. Database Testing for Web Application is complicated by a variety of factor. 1) The original client side request for information is rarely presented in the form that can be input to a database management system. 2) The database may be remote to the server that houses the Web application. 3) RAW data acquired from the database must be transmitted to the Web application Server and properly formatted for subsequent transmittal to the client. 4) The dynamic content objects must be transmitted to the client in a form that can be displayed to the end user.

Client layer-user interface

Server layer- WebApp

Server layerData transformation

Server layer - data Management

Database layer data access

Database

[Layers of interaction]

In figure testing should be ensure that 1. Valid information is passed between the client and server from the interface layer 2. The Web application process script correctly and properly extract or formats user data. 3. Queries are passed to a data management layer that communicates with database access routines. 4. User data are passed correctly to a server side data transformation function that format appropriate queries.

INTERFACE TESTING
Interface design model is reviewed to ensure that generic quality criteria established for all user interfaces have been achieved and that application specific interface design issue has been properly addressed.

Interface testing strategy:


The overall strategy for interface testing is to (1) Uncover error related to specific Interface mechanisms (2) uncover errors in the way the interface implements the semantics of navigation, Web Application functionality, or content display. to accomplish this strategy, a number of objectives must be achieved: Interface futures are tested to ensure that design rules, aesthetics, and related visual content are available for the user without error. Individual interface mechanisms are tested in a manner that is a logo us to unit testing For example; tests are designed to exercise all forms, client-side scripting, dynamic HTML. Each interface mechanism is tested within the context of a use-case or NSU for a specific user category the interface is tested within a variety of environments to ensure that it will be compatible. Testing Interface Mechanisms When a user interacts with a Web Application, the interaction occurs through one or more interface mechanisms. Links: Each link is tested to ensure that the proper content object or Function is

reached. The Web engineer builds a list of all associated with interface layout. and then executes each individually. Forms: -

At a microscopic level, tests are performed to ensure that Labels correctly identified fields within the form and that mandatory fields are identified visually for the user. The server receives all information content within the form and their no data are lost in the transmission between client and server Appropriate defaults are used when the user does not select from a pull down menu or set of buttons. Browser function dont corrupt data enter in a form and Scripts that perform error checking on data entered work Properly and provide meaningful error message. Client side scripting:Black box tests are conducted to uncover any error in processing As the script is executed . These tests are coupled with forms testing because script input is often derived from data provided as part of forms processing Dynamic HTML:Each Web page that contain dynamic HTML is executed to ensure that the dynamic display is correct. In addition a compatibility test should be conducted to ensure that the dynamic HTML is work properly in the environmental configuration that support the Web application. Application specific interface mechanisms:Test conforms to a checklist of functionality and features that are defined by the interface mechanism. Boundary test minimum and maximum number of item that can be placed in to shopping chart. Test to determine persistence of shopping chart contents. Test to determine whether the Web Application can be record shopping chart content at some future date.

USABLITY TESTING
Usability test may be designed by Web engineering team. Define a set of usability testing categories and identify goal for each. Design test that will enable each goal to be evaluate Select participants who will conduct test. Instrument participants interaction with Web Application while testing is conducted. Develop a mechanism for assessing the usability of the Web Application.

The following test categories and objective illustrate establish testing Interactivity Are interaction mechanism easy to understand and use? Layout- Are navigation mechanism, content and function place in a manner that allows the user to find them quickly? Readability- Is text well written and under stable? Aesthetics-Do layout color, typeface, and related characteristics lead to ease of use ? Display Characteristics- Does the Web Application make optimal use of screen size and resolution? Time Sensitivity- Can important features, functions and content be used in a manner? Accessibility- Is the Web application accessible to people who have Disabilities? timely

COMPATIBILITY TESTING
Web application must operate within

environment that differs from one another. Different computer, display device, OS, browser and network connection speed can have significant on Web application operation. Different

browser some time produced slightly different results, regardless of the degree of HTML standardization within the Web application. The Web Engineering team derives a series of compatibility, validation tests, derived from existing interface tests, navigation tests, performance tests and security tests.

5.3 TESTING METHOD


Testing presents an interesting anomaly for the software engineering activities, the engineer attempts to build software from an abstract concept to a tangible product. Now comes testing. The engineer creates a series of test case that are initiated to "demolish" the software that has been build. Infect, testing is the one step in the software process that could be viewed (psychologically, at least) as destructive rather than constructive. Models of Testing:There are different Models of testing. On the basis of testing methods there are two types of testing: 1. Black-box testing. 2. White-box testing Black-box tests are used to demonstrate that software functions are operational, that input is properly accepted and output is correctly produced, and that integrity of external information is maintained. White-box tests are used to examine the procedural details. It checks the logical paths by test case. It can also checks the conditions, loops used in the software coding. It checks that loops are working correctly on defined boundary value.

WHITE-BOX TESTING: White-box testing sometimes called glass-box testing, is a test case design method that users the control structure of the procedural design to drive the test case .Always we are thinking that there is no necessary to execute or checks the loops and conditions. And so large number of errors is uncovered. With using white-box testing methods, we have checked that; All independent paths within a function have been executed at least once. All logical decisions on their true and false side. A11 loops working correctly at their boundary values and within their specified conditions.

In our coding we test that all the loops works truly in each module. The one technique of white-box testing is basis path testing. It contains two parts, one is flow graph notation and the second is cyclometer complexity. In flow graph notation we are checking logical control of flow. By using cyclometer complexity we find complexity of our project structure. BLACK-BOX TESTING: Black-box testing focuses on the functional requirements of the software. That is black-box testing enables the software engineer to drive sets of input conditions that will fully exercise all functional Requirements for the program. Black-box testing is not an alternative to white-box testing techniques. Rather, it is a complementary approach that is likely to uncover a different class of errors than white-box methods. We use in our coding to find errors in the following categories: Incorrect or missing functions Interface errors Errors in database Performance errors

Initialization and termination errors.

Unlike white-box testing, which is performed earlier in the testing process, black-box testing tends to be applied during later stages of testing. Because black-box testing purposely disregards control structure, attention is focused on the information domain. By applying black-box techniques, we derive a set of test cases that satisfy following criteria Test cases that reduce, by a count that is greater then one, the number of additional test cases must be designed to achieve reasonable testing. Level 1 - Build Acceptance Tests:Other related test cases ensure that adopters received the proper Development Release Document plus other build related information (drop point, etc.). The objective is to determine if further testing is possible. If any Level 1 test case fails, the build is returned to developers un-tested.

Level 2 - Smoke Tests:The objective is to determine if further testing is possible. These test cases should emphasize breadth more than depth. All components should be touched, and every major feature should be tested briefly by the Smoke Test. If any Level 2 test case fails, the build is returned to developers un-tested.

Level 2a - Bug Regression Testing:Every bug that was Open during the previous build, but marked as Fixed, Needs Re-Testing for the current build under test, will need to be regressed, or re-tested. Once the smoke test is completed, all resolved bugs need to be regressed. It should take between 5 minutes to 1 hour to regress most bugs.

Level 3 - Critical Path Tests:Critical Path test cases must pass by the end of every 23 Build Test Cycles. They do not need to be tested every drop, but must be tested at least once per milestone. Thus, the Critical Path test cases must all be executed at least once during the Iteration cycle, and once during the Final Release cycle.

Level 4 - Standard Tests:Test Cases that need to be run at least once during the entire test cycle for this release. These cases are run once, not repeated as are the test cases in previous levels. Functional Testing and Detailed Design Testing (Functional Spec and Design Spec Test Cases, respectively). These can be tested multiple times for each

Milestone Test Cycle (Iteration, Final Release, etc.). Standard test cases usually include Installation, Data, GUI, and other test areas.

Level 5 - Suggested Test:These are Test Cases that would be nice to execute, but may be omitted due to time constraints.

Bug Regression
Bug Regression will be a central tenant throughout all testing phases. When a Severity 1 bug fails regression, adopters Testing team should also put out an immediate email to development. The Test Lead will be responsible for tracking and reporting to development and product management the status of regression testing.

5.4 TEST CASES 5.4.1 Test Cases 1 Checks system behavior when credentials provided by admin are correct. Click on all member link by admin.

Test Case No. Test Case Action

Input

Expected output

Result page which contain information about only all member. Pass

Pass/Fail

5.4.2

Test Cases 2 Checks system behavior when credentials provided by admin are correct.

Test Case No. Test Case Action

Input

Click on paid member link by admin.

Expected output

Result page which contain information about only paid member. Pass

Pass/Fail

5.4.3

Test Cases 3 Checks system behavior when credentials provided by admin are correct. Click on statistic link by admin.

Test Case No. Test Case Action

Input

Expected output

Result page which contain total member, total male member, total female member, free member, paid member.

Pass/Fail

Pass

5.4.4

Test Cases

Test Case No. Test Case Action

4 Checks system behavior when credentials provided by the user are correct. In Login page user enter correct credentials in respected text fields. User profile page.

Input

Expected output

Pass/Fail

Pass

5.4.5 Test Cases Test Case No. 5

Test Case Action

Checks system behavior when credentials provided by the user are not correct. In Login page user enters incorrect credentials in respected text fields. Login page with message saying that credentials are incorrect..

Input

Expected output

Pass/Fail

Pass

5.4.6

Test Cases 6 Checks system behavior when credentials provided by user are not correct.

Test Case No. Test Case Action

Input

If user enters in-correct credentials in respected text fields of register pages. Same register page with alert message

Expected output

Pass/Fail

Pass

5.4.7

Test Cases 7 Checks system behavior when credentials provided by the are correct. Click on details button for see more information about user . Redirect to the hide profile error message page if membership type of logged user is free type. Pass

Test Case No. Test Case Action

Input

Expected output

Pass/Fail

5.4.8

Test Cases

Test Case No. Test Case Action

8 Checks system behavior when credentials provided by user are correct. If user click on profile details button in result page of search. Redirect to the page which contain message like prolix has been hidden by profile owner.

Input

Expected output

Pass/Fail

Pass

5.4.9Test Cases

Test Case No. Test Case Action

9 Checks system behavior when credentials provided by user are incorrect. User enters incorrect credentials in respected text fields of Email-Id. Register page with message saying that credentials are incorrect. Pass

Input

Expected output Pass/Fail

5.4.10 Test Cases

Test Case No. Test Case Action

10 Checks system behavior when credentials provided by the user are correct. In quick search page user enters required information for quick search. Display result according to match with information given by user.

Input Expected output

Pass/Fail

Pass

5.4.11 Test Cases Test Case No. Test Case Action 20 Checks system behavior when credentials provided by the user are correct. In wedding directory page user select correct category and city. Display result according to match with information given by user. Pass

Input

Expected output

Pass/Fail

Chapter 6 CONCLUSION AND FUTURE PROSPECTUS

6.1 CONCLUSION
Matrimonial Web Application is to provide Grooms and Brides with excellent matchmaking experience by exploring the opportunities and resources to meet true potential partner. Matrimonial website which will provide platform to a lot of Bride/Groom for finding perfect match. There are different sectors like Registration, Partner Search, etc. So the Bride/Groom can get their interest for find their partner. Bride/Groom can directly search Partner according to their required criteria. The Bride/Groom can use match By Email functionality so he/she can get directly E-mail alert for the match which fulfill their required criteria. It helps the user by providing profiles of perspective Bride or Groom and other information regarding them online. Matrimonial web application provides facility like quick tour. This is a module that contains the flow of the website .Here user can have a idea how he can commit himself in the website. Matrimonial web application provides facility to change preference about partner. This application provide facility like edit profile, update photo and delete photo, hide profile, create album, send express interest, send personal message, apply for loan to the use.

6.2 FUTURE EXTENSION


It is possible to provide the web space to the users for creating his portal.

It is possible to create our own mail server. It is possible to create chat server so that user can communicate with each other. It is possible to provide facility like create video album.

BIBLIOGRAPHY

Books

PHP(Ivan bayross). Professional ASP.NET(Wrox Publication). C# Vijaymukhi. ASP.NET Complete Reference. Software engineering Concepts By Roger S.Presman UML IN A NUTSHELL By Alhir Fundamentals of Software Engineering By Rajib Mall SQL Server 2005 (Wrox Publication).

Web Sites

www.bharatmatrimonial.com www.shadi.com www.jeevansathi.com www.patelvivah.com www.simplymary.com www.w3school.com

You might also like