Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 38

Project Synopsis

Project Title
Social Networking Site

Project Develpers
1. 2.

Ankit Mishra Anmol Shukla Introduction

Social networking sites allow users to communicate with people, share ideas, activities, events, and interests within their individual networks. Social network sites such as MySpace, Facebook, Orkut, and Google+ have attracted millions of users, many of whom have integrated these sites into their daily practices. There are hundreds of Social Networking Sites, with various technological affordances, supporting a wide range of interests and practices. Sites also vary in the extent to which they incorporate new information and communication tools, such as mobile connectivity, blogging, and photo/video-sharing.

Social Network Sites: A Definition


We define social network sites as web-based services that allow individuals to (1) construct a public or semi-public profile within a bounded system, (2) articulate a list of other users with whom they share a connection, and (3) view and traverse their list of connections and those made by others within the system. While Social Networking Sites have implemented a wide variety of technical features, their backbone consists of visible profiles that display an articulated list of Friends one who are also users of the system. Each profile in Social Networking has unique ID. After joining an Social Networking Sites, an individual is asked to fill out forms containing a series of questions. The profile is generated using the answers to these questions, which typically include descriptors such as age, location, interests, and an "about me" section. Most sites also encourage users to upload a profile photo. Some sites allow users to enhance their profiles by adding multimedia content or modifying their profile's look and feel. Others, such as Facebook, allow users to add modules ("Applications") that enhance their profile.

Aims :
Product intends to provide a well established web-based social networking system. This documents a networking system scope, functionalities, requirements and feasibility. This project

aims to develop a website which provides a Communication among peoples on network, which works quite similar to Social Networking Site like Facebook, Orkut etc.

Objective :
The objective of the project is to explain and elaborate the concept of Social Networking Sites to the users, hence providing a reliable and efficient Communication online so as to assist users to afford it without much trouble.

To have attractive and Secure Login page to access Make new user account in more user friendly and proper validation of details Search People easily on entire network Send Friend Request to other users to make friends Add friends to your friend box accept request Creating a public profile having social, professional and personal information Ease of editing of profile anytime Chat with Online friends Upload and Share Images on network Add, Search and shares videos of youtube Send messages to other friends Reply directly to incoming user messages Post Advertisement of products Administration page to keep eye on user operation Easily password recovery processing

Scope :
The social networking website is an online community designed to make social life more active and stimulating. The social network can help you maintain existing relationships with people and share pictures and messages, and establish new ones by reaching out to people you've never met before. This website also provides the features of blogging all at one place. The main idea behind behind blogging is to share your thoughts with all your friends which can be read by all the users

using the website. This blog can be handled by the user as he wants for example adding videos and photos also. This website enhances Advertisements of products. People using this website can buy and sell products from this website. The main purpose behind this Advertisement functionality will help people to buy products in trusted circle.

Project Category
RDBMS (Relational Database Management System) A short definition of an RDBMS is a DBMS in which data is stored in tables and the relationships among the data are also stored in tables. The data can be accessed or reassembled in many different ways without having to change the table forms.

Hardware Specifications:

Processor Name: Processor Speed: RAM: Hard Disk Capacity: Display Device: Keyboard Type: Mouse Type:

Dual Core 3.2 GHz 1 GB 80 GB 14 to 19 InchMonitor PS2 or USB PS2 or USB

Software Specifications: For Website:


Technology Implemented: Language Used: Database: User Interface Design: Web Browser:

Apache Server PHP 5.2 My SQL 5.2 HTML, AJAX Mozilla,IE8

For Software Product:

Operating System: Programming Language: Software:

Windows XP/ Windows 7/ Linux PHP XAMPP Server

Product Perspective :
This social networking website challenges to give a better socializing and advertising System at the same place. This website helps buying and selling of products in trusted friend circle.

Administrator Functions:

1. Authentication of the users after registration. 2. Mails to the users regarding the approval as a registered user, disapproval mentioning the appropriate reasons. 3. Updating the account details on the request of the users. 4. Answering the user queries. 5. Notification to the end users regarding proposals. 6. Payment of the system by the user. 7. Mentioning the security measures for the systems safety. 8. Deleting an account/user from the systems databases on request of the user.

Process Description
1.

Beginning with User Sign up and Authentication:

Inputs:

User Information. Existing E-Mail Address on any Website. E.g.: XYZ@yahoo.com. Registration on Website.

Output:

Send a mail on user Email Address which contains Password and Special Character Pin. Authentication from website.

2.

Designing:

Inputs:

Display Structure Theme

Functioning:

Interface between User and Website. Preview of Available Resources

3.

Data Flow:

Functioning:

Action in Response to user Input.

Output:

Project Released on internet

4.

Maintenance:

Inputs:

Implement Security Issues Risk Assessment Error and Fault detection Regularly updating and modifying the project

Functioning:

Allows project to sustained and effectively render services as expected

Output:

Constantly monitoring and enhancing the project quality

Data Flow Diagram A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an Information System. A data flow diagram can also be used for the visualization of Data Processing. It is common practice for a designer to draw a context-level DFD first which shows the interaction between the system and outside entities. This contextlevel DFD is then "exploded" to show more detail of the system being modeled. A DFD represents flow of data through a system. Data flow diagrams are commonly used during problem analysis. It views a system as a function that transforms the input into desired output. A DFD shows movement of data through the different transformations or processes in the system.

Dataflow diagrams can be used to provide the end user with a physical idea of where the data they input ultimately has an effect upon the structure of the whole system from order to dispatch to restock how any system is developed can be determined through a dataflow diagram. The appropriate register saved in database and maintained by appropriate authorities.

Data Flow Diagram Notation

Function/Process

File/Database

Input/output

Flow

1LevelDFDs

Designing Module

Implementation

Website template Predefined codes Developers Interface Display structure

Placement of text

Technology in use

ER Diagram:

Entity Relationship Diagrams (ERDs) illustrate the logical structure of databases. An Entity Relationship Diagram is a piece of data-an object or concept about which data is stored.

There are three types of relationships between entities:

one-to-one (1 to 1): one instance of an entity (A) is associated with one other instance of another entity (B). For example, in a database of employees, each employee name (A) is associated with only one social security number (B). one-to-many (1 to N): one instance of an entity (A) is associated with zero, one or many instances of another entity (B), but for one instance of entity B there is only one instance of entity A. For example, for a company with all employees working in one building, the building name (A) is associated with many different employees (B), but those employees all share the same singular association with entity A. many-to-many (N to N): one instance of an entity (A) is associated with one, zero or many instances of another entity (B), and one instance of entity B is associated with one, zero or many instances of entity A. For example, for a company in which all of its employees work on multiple projects, each instance of an employee (A) is associated with many instances of a project (B), and at the same time, each instance of a project (B) has multiple employees (A) associated with it.

Testing
Introduction Testing is the process of running a system with the intention of finding errors. Testing enhances the integrity of a system by detecting deviations in design and errors in the system. Testing aims at detecting error-prone areas. This helps in the prevention of errors in a system. Testing also adds value to the product by conforming to the user requirements. The main purpose of testing is to detect errors and error-prone areas in a system. Testing must be thorough and well-planned. A partially tested system is as bad as an untested system. And the price of an untested and under-tested system is high. The implementation is the final and important phase. It involves usertraining, system testing in order to ensure successful running of the proposed system. The user tests the system and changes are made according to their needs. The testing involves the testing of the developed system using various kinds of data. While testing, errors are noted and correctness is the mode.

OBJECTIVES OF TESTING:
The objectives of testing are:

Testing is a process of executing a program with the intent of finding errors. A Successful test case is one that uncovers an as- yet-undiscovered error. System testing is a stage of implementation, which is aimed at ensuring that the system works accurately and efficiently as per the user need, before the live operation commences. As stated before, testing is vital to the success of a system. System testing makes a logical assumption that if all parts of the as system are correct, the goal will be successfully achieved. A series of tests are performed before the system is ready for the user acceptance test.

TESTING METHODS

System testing is the stage of implementation. This is to check whether the system works accurately and efficiently before live operation commences. Testing is vital to the success of the system. The candidate system is subject to a variety of tests: on line response, volume, stress, recovery, security and usability tests. A series of tests are performed for the proposed system is ready for user acceptance testing.

The Testing Steps are:

Unit Testing
Unit testing focuses efforts on the smallest unit of software design. This is known as module testing. The modules are tested separately. The test is carried out during programming stage itself. In this step, each module is found to be working satisfactory as regards to the expected output from the module.

Integration Testing
Data can be lost across an interface. One module can have an adverse effect on another, sub functions, when combined, may not be linked in desired manner in major functions. Integration testing is a systematic approach for constructing the program structure, while at the same time conducting test to uncover errors associated within the interface. The objective is to take unit tested modules and builds program structure. All the modules are combined and tested as a whole.

Validation
At the culmination of the integration testing, Software is completely assembled as a package. Interfacing errors have been uncovered and corrected and a final series of software test begin in validation testing. Validation testing can be defined in many ways, but a simple definition is that the validation succeeds when the software functions in a manner that is expected by the customer. After validation test has been conducted, one of the three possible conditions exists.

a.

The function or performance characteristics confirm to specification and are accepted.

b. c.

A deviation from specification is uncovered and a deficiency lists is created. Proposed system under consideration has been tested by using validation test and found to be working satisfactory.

Output Testing
After performing the validation testing, the next step is output testing of the proposed system, since no system could be useful if it does not produce the required output in a specific format. The output format on the screen is found to be correct. The format was designed in the system design time according to the user needs. For the hard copy also; the output comes as per the specified requirements by the user. Hence output testing did not result in any correction for the system.

User Acceptance Testing


User acceptance of a system is the key factor for the success of any system. The system under consideration is tested for the user acceptance by constantly keeping in touch with the prospective system users at the time of developing and making changes whenever required. This is done in regard to the following point:

a. b. c.

Input Screen Design Output Screen Design Format of reports and other outputs.

Security mechanisms
This system is provided with authentication without which no user can pass. So only the legitimate users are allowed to use the application. If the legitimate users share the authentication information then the system is open to outsiders.

Bibliography
Books :

Beginning
Author : Dave

PHP5
Mercer

PHP
Author : David Sklar, Adam

CookBook
Trachtenberg

Mysql: The Complete Reference Author : Vaswani

Websites:

www.w3schools.com www.php.net www.mysqltutorial.org

Future Scope and Further Enhancement:


The advantages and disadvantages of a Online Social Networking website are much the same as those for a real life. However, the effort to develop and maintain Oonline Social Networking website is usually far less than that expended for a real life system: The most difficult problem is specifying a virtual machine which can peacefully coexist with the desired target systems. In some respects, this approach makes sense for making people communicate on web. The identification of clear-cut interfaces is a standard structured programming technique, which (in theory at least) reduces software maintenance costs. The only controversy might be over the particular choice of structure (i.e. social networking). In general, whenever organizational site is likely to outlive its hardware, the ONLINE SOCIALNETWORKING approach warrants consideration. This is because of the high redevelopment costs. Now, when such social networking site is easily approachable to the user via website, it is easy and convenient for them to be in touch with their colleagues. It gives further opportunity to the coming users to enhance the IT technologies.

Update website according to user requirements Online Games and other application Different types of advertisement like Auction, Discounts, etc. Privacy of user information among other person on network

DATABASE DESIGN
1.0 General Information
Database design is the process of producing a detailed data model of a database. This logical data model contains all the needed logical and physical design choices and physical storage parameters. Need to generate a design in a data definition language, which can then be used to create a database. A fully attributed data model contains detailed attributes for each entity. The term database design can be used to describe many different parts of the design of an overall database system. Principally, and most correctly, it can be thought of the logical design of the relation of the base data structures used to store the data. In the relational model these are the classes and named relationships. However, the term database design could also be used to apply to overall process of designing, not just the base data structure, but also the forms and queries used as part of the overall database application within the database management system (DBMS).

1.1 Purpose
Database description describes all the databases used in the software to store all the records. The database in turn is further described in detail giving all the fields used with their data type; constraints include primary key, foreign key, etc. Which allow the entities to be uniquely identified.

1.2 Scope
Provide a complete solution for connecting with the friends. Help build online communities of people Provide productive environment as per users reading interest To understand how social network works.

1.3 System overview


We are creating the web application Social Networking Management System. System Title: Social Networking Management System. System Category: RDBMS(Relational Database management system) A sort definition of RDBMS may be a DBMS in which data is stored in the form of tables and the relationship among the data is also stored in the form of tables. Optional status: Under Development status. Undergoing major Modification: Data will be stored in the database after the development.

1.4 Project References


The needed requirement for this project has been obtained by the observing manual records.

1.5 Acronyms and Abbreviations


DBMS Database management system

1.6 Points of contact 1.6.2 Co Ordination:


Database should be Secure, Security is the degree of protection against danger, damage, loss, and criminal activity. Security as a form of protection is structures and processes that provide or improve security as a condition.

Data owners
All data requirements are owned by Social Networking Management System.

2.0 DATABASE IDENTIFICATION AND DESCRIPTION 2.1 Naming Conversion:

When designing a database schema, the choice of names for entity types, attributes, relation types and roles is not always straightforward. One should choose names that convey, as much as possible, the meanings attached to the different constructs in the schema we choose to use similar names for entity types rather than plural ones, because the entity types name applies to each individual entity belonging to that entity types. In our ER diagrams, we will use the convention that entity type and relationship type names are uppercase letters, attributes name s are initial letters capitalized, and role names are lower case letters. As a general practices, given a narrative descriptions of the database requirements, the nouns appearing in the narrative tend to give rise to entity type names, and the verbs tend to indicate names of relationships types. Attribute names generally arise from additional nouns that describe the nouns corresponding to entity types.

2.2 Database Identification:


Database Name: SocialNetworking

address blog bookmark bookmark_category bookmark_info bookmark_sub_category chat city comment country feed feed_category feed_info feed_sub_category friend friend_list

lang message nickname notification privacy privacy_type profile status thumb_up_down user

Features
Friends Interaction Message/Status Update/Reply Like/Dislike Friends Status

Bookmarking Top bookmark suggestion using Analytic Hierarchy Process Personal bookmarks become portable Updates from Feeds Saving web feeds allows user to save browsing time User saves feed as per their reading interest Top feeds Suggestion using Analytic Hierarchy Process

System Breakdown Diagram

The Social Networking Management System Database designed under following features. User profile Friends Friends List Status Updates Thumbs up/down status Bookmark saving RSS feeds saving Notifications Chat Message Blog post, News feed

2.3 Systems using the database:


Processor: Intel core Dual Core CPU M 350 @ 2.27GHZ Installed memory (RAM): 1.00GM (1.86GB usable) System type: 32-bit operating system

2.4 Relationship to other Database:


None

2.5 Schema information:

Schema

Diagram

2.5.2 Physical Design

Intel Model/Physical Model

User Request

External Model

DBMS
Internal Model Access Methods

Operating System Access Methods

Data base

2.5.3 Physical Structure

2.6 ER Diagram
An Entity Relation of (ER) Diagram is a specialized graphics that illustrates the interrelationship between entities in a database. ER diagrams often use symbols to represent 3 different types of information. Boxes are commonly used to represent entities. Diamonds are normally used to represent relationships and ovals are used to represent attributes. An Entity Relationship model (ERM), in software engineering is an abstract and conceptual represent of data. Entity Relationship modeling is a relational schema database modeling method, used to produce a type of conceptual schema or semantic data model of a system, often a relation database, and its requirements in a top-down fashion.

Entity:
Entity is the thing which we want to store information. It is an elementary basic building block of storing information about business process. An entity represents an object defined within the information system about which you want to store information. Entities are distinct things in the enterprise.

Relationships
A relationship is a named collection or association between entities or used to relate two or more entities with some common attributes or meaningful interaction between the objects.

Attributes

Attributes are the properties of the entities and relationship, Descriptor of the entity. Attributes are elementary pieces of information attached to an entity.

profile

updates

country

creates

updates

contains

userid

username

emailid

user

1
address

city

password

token invites friends updates

friendslist nickname

feedback

sends

posts

sends

msg_id

message

feed

stores

Bookmark_info

spam

to

feed_id

feed_url

has

chat

2.7 Data Dictionary: Table Name address


Column address_id address privacy city_id profile_id Type mediumint(8) varchar(45) tinyint(3) mediumint(8) bigint(8) Null No Yes No Yes Yes NULL 0 NULL NULL Default

Table Name bookmark


Column bookmark_id url Rating Privacy created_at bookmark_category_id bookmark_sub_category_id Type bigint(20) varchar(255) smallint(5) tinyint(3) timestamp smallint(5) smallint(5) Null No Yes Yes No Yes No Yes NULL NULL NULL 2 NULL Default

Table Name bookmark_category

Column bookmark_category_id name

Type smallint(5) varchar(45)

Null No Yes

Default

NULL

Table Name bookmark_info


Column bookmark_info_id bookmark_id user_id favorite clicks privacy Type bigint(20) bigint(20) mediumint(8) tinyint(1) smallint(5) tinyint(3) Null No Yes Yes No Yes No NULL NULL 0 NULL 2 Default

Table Name bookmark_sub_category


Column bookmark_sub_category_id Name bookmark_category_id Type smallint(5) varchar(45) smallint(5) Null No Yes Yes NULL NULL Default

Table Name chat


Column chat_id user_id to msg created_at Type mediumint(8) mediumint(8) mediumint(8) varchar(100) timestamp Null No Yes No No Yes NULL NULL Default

Table Name city


Column city_id country_id Type mediumint(8) mediumint(8) Null No Yes NULL Default

city

varchar(45)

Yes

NULL

Table Name comment


Column comment_id message created_at status_id friend_id Type mediumint(8) varchar(255) timestamp mediumint(8) mediumint(8) Null No Yes Yes Yes Yes NULL NULL NULL NULL Default

Table Name country


Column country_id country Type mediumint(8) varchar(45) Null No Yes np Default

Table Name feed


Column feed_id feed_url rating privacy created_at feed_category_id feed_sub_category_id Type bigint(20) varchar(255) smallint(5) tinyint(3) timestamp smallint(5) smallint(5) Null No Yes Yes No No Yes Yes NULL NULL 2 CURRENT_TIMESTAMP NULL NULL Default

Table Name feed_category


Column feed_category_id Type smallint(5) Null No Default

name

varchar(45)

Yes

NULL

Table Name feed_info


Column feed_info_id feed_id user_id favorite clicks privacy Type bigint(20) bigint(20) mediumint(8) tinyint(1) smallint(5) tinyint(3) Null No Yes Yes No Yes No NULL NULL 0 NULL 2 Default

Table Name feed_sub_category


Column feed_sub_category_id name feed_category_id Type smallint(5) varchar(45) smallint(5) Null No Yes Yes NULL NULL Default

Table Name friend


Column friend_id friend_user_id is_subscriber privacy created_at user_id friend_list_id Type mediumint(8) mediumint(8) tinyint(1) tinyint(3) timestamp mediumint(8) smallint(5) Null No Yes No No No No Yes NULL NULL 1 0 CURRENT_TIMESTAMP Default

Table Name friend_list


Column Type Null Default

friend_list_id name privacy friend_id user_id

smallint(5) varchar(45) tinyint(3) mediumint(8) mediumint(8)

No Yes No Yes Yes NULL 0 NULL NULL

Table Name lang


Column language_id lang user_id Type tinyint(3) varchar(45) mediumint(8) Null No No Yes en NULL Default

Table Name message


Column message_id message created_at is_read is_spam to isreply user_id Type mediumint(8) varchar(500) timestamp tinyint(1) tinyint(1) mediumint(8) tinyint(1) mediumint(8) Null No No No No No Yes Yes Yes CURRENT_TIMESTAMP 0 0 NULL 0 NULL Default

Table Name nickname


Column nickname_id nickname privacy user_id Type tinyint(3) varchar(45) tinyint(3) mediumint(8) Null No Yes No Yes NULL 0 NULL Default

Table Name notification


Column notification_id msg type privacy created_at user_id Type mediumint(8) varchar(255) smallint(5) tinyint(3) timestamp mediumint(8) Null No Yes Yes No Yes Yes NULL NULL 0 NULL NULL Default

Table Name privacy


Column privacy_id profile address status bookmark feed activity friend friend_list nickname user_id Type mediumint(8) tinyint(3) tinyint(3) tinyint(3) tinyint(3) tinyint(3) tinyint(3) tinyint(3) tinyint(3) tinyint(3) mediumint(8) Null No No No No No No No No No No Yes 1 2 1 1 1 1 1 0 1 NULL Default

Table Name privacy_type


Column privacy_type_id name Type mediumint(8) varchar(45) Null No Yes NULL Default

Table Name profile


Column profile_id Type bigint(8) Null No Default

user_id privacy rating name_nepali dob about_me relationship looking_for phone interests education hobbies fav_movies fav_artists fav_books fav_animals religion everything_else created_at

mediumint(8) tinyint(3) tinyint(3) varchar(255) timestamp varchar(160) varchar(45) varchar(45) varchar(45) varchar(255) varchar(255) varchar(255) varchar(255) varchar(255) varchar(255) varchar(255) tinyint(3) varchar(255) timestamp

No No Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes 1 1 NULL NULL NULL NULL NULL NULL NULL NULL NULL NULL NULL NULL NULL NULL NULL NULL

Table Name status


Column status_id message created_at thumbs_up thumbs_down privacy is_reply to_fb to_twitter Type mediumint(8) varchar(255) timestamp smallint(5) smallint(5) tinyint(3) tinyint(1) tinyint(1) tinyint(1) Null No No No Yes Yes No No No No CURRENT_TIMESTAMP NULL NULL 0 0 0 0 Default

user_id

mediumint(8)

No

Table Name thumb_up_down


Column thumb_up_down_id flag created_at status_id friend_id Type mediumint(8) tinyint(1) timestamp mediumint(8) mediumint(8) Null No Yes Yes Yes Yes 1 NULL NULL NULL Default

Table Name user


Column user_id token username password name_first name_middle name_last email_id picture active online created_at Type mediumint(8) mediumint(5) varchar(45) varchar(45) varchar(45) varchar(45) varchar(45) varchar(100) varchar(255) tinyint(1) tinyint(3) timestamp Null No No No No No Yes No No No No No No /web/image/default.jpg 1 1 CURRENT_TIMESTAMP NULL Default

3.0 DATABASE ADMINISTRATIVE INFORMATION

3.1 Responsible Essentially the main role of a database administrative has to do with overseeing the installation and ongoing function of software on a system designed for use by the number of users. There are several specific responsibilities that the typical database administrator will perform in the just about any corporate environment. A Basic responsibility for just about every database administrator involves the installation of new databases. As part of the database installation, the database administrator will set up login credential to authorized person, define the privileges associated with each authorized user,and ensure that every work station attached to the network is set up to access the new database. This process usually involves a period of troubleshooting, in which the database administrator will address and resolve any problems that users experience with the new project.

There are four different types of database administrator jobs: Installation, maintenance, data modeling, and user management. A database administrator is responsible for managing the database(s) that are used to hold the data for large database-driven software.

Computer often play an integral role with sales team activities and documentation tracking. Sales administrator jobs may therefore manage information technology to minimize electronic data problem.

3.2 System Information 3.2.1 Database management System (DBMs) Configuration. MySQL Configuration

Server: localhost via TCP/IP Server version: 5.5.16 Protocol version: 10 User: root@localhost

MySQL charset: UTF-8 Unicode (utf8) Webserver Information: Apache/2.2.21 (Win32) mod_ssl/2.2.21 OpenSSL/1.0.0e PHP/5.3.8 mod_perl/2.0.4 Perl/v5.10.1 MySQL client version: mysqlnd 5.0.8-dev - 20102224 - $Revision: 310735 $ PHP extension: mysql

3.2.2 Hardware Configuration


Processor Hard disk Memory Display Keyboard Mouse processor 133-Mhz intel Pentium-class 120GB recommended 128MB of RAM,256MB Standard output display Standard qwerty keyboard for interface Standard mouse with two buttons

3.2.3 Database Software utilities


Utilities software (also known as program, service routine, tool, or utility routine is a type of computer software. It is specially designed to help manage and tune the computer hardware, operating system or application software and perform a single task or a small range of task; as opposed to application software which tend to be software suites. Support Software Available for Maintaining Database Operating System: Minimum hardware requirements for windows XP Architecture 32-bit 64-bit

Processor

1 GHz x86 processor

1 GHz x86 processor

Memory (RAM)

1GB

2GB

Graphics card

Direct X9graphics processor with WDDM driver

Model

1.0

HDD free space

16GB of free disk space 20 GB of free disk space

Optical drive

DVD drive (only to install from DVD/CD media)

3.2.5 Security
To maintain non replication of data Most of the tables are designed with primary key. Data Integration between the tables maintains using foreign key. User Authentication for the system stored in the login tables. Backup provision is given in order to prevent loss of data.

3.3 Storage Requirements


Our application can store in Apache Server Capacity: 83,780,169,728 bytes 78.0 GB Tools: Error Checking Defragmentation Back up Hardware

All Devices:

Name Generic Flash Disk USB Drive Hitachi S545016139A3000 MATSHITA DVD RAM UJ89ASATA

Type Disk Drive Disk Drive DVD/CD

3.4 Recovery
Database recovery is the process of restoring the database to a correct state following a failure. The failure may be the result of a system crash due to hardware or software errors, a media failure, such as a head crash, or a software error in the application, such as logical errors in the program that is access the database. It may also be result of unintentional or intentional

correction or destruction of data. Whatever the underlying cause of the failure, the DBMS must be able to recover from the failure and restore the database to a consistent state. It is the responsibility of DBMS to ensure that the database is reliable and remains in a consistent state in the presence of failures. In general, backup and recovery refers to the various strategies and procedures involved in the protecting the database against data loss and reconstructing the data such that no data is loss after failure.

You might also like