Académique Documents
Professionnel Documents
Culture Documents
Firstly, we would like to express our heartfelt gratitude to our project guide Mr Swapnil Soner, for guiding us throughout the course of the project. We are highly indebted to them for their invaluable guidance and ever-ready support, which was necessary for the successful completion of the project in, stipulates time. Their deep knowledge of computer engineering field made us realize that theoretical knowledge always helps develop efficient operational industrial software, which are a blend of all core subjects of the field. Working under their guidance has been a fruitful experience, which will be very valuable for us, when we enter the corporate world. We would like to give a warm expression of thanks to Dr.Sunil Somani, Principal S.V.C.E, Indore for providing the facilities and academic environment for our project work. We also thank our respected Head of Department, Mr J. S. Khatwani, for his valuable guidance and encouragement. We also thank all the staff members for their encouragement and support throughout this project and all those who have embedded us with technical knowledge of computer technology. We sincerely thank to all our friends and well-wishers for directly or indirectly helping us during the course of the work.
ABSTRACT
Every one needs a fast and easy access to the medical assistance whether its a small injury or an emergency. As the population of city is increasing day-by-day problems related with health are increasing rapidly. It takes lot of time to search for appropriate medicine practioner or specialists by consulting into the hospitals or clinics. There is no centralized facility which provides easy n convenient access to the medical facility which gives us the required information .We do not have any facility that we could find our nearest located hospitals or clinics so that we dont have to waste much time on them. D is the solution of the problem , which stands for Doctors and Donations . D is a Web Site which provides with a platform which gives us information regarding health .This Web Site provides advanced search of doctors with their Hospitals , Specialization and area . So u can search your desired doctor at the nearest Healthcare Centre. This Web Site also finds the nearest blood donor in case of emergency on basis of its database.
1. INTRODUCTION
1.1 1.2 1.3 1.4 1.5 Problem Definition Problem Solution Need & scope of the project Feature List Report Organization
INTRODUCTION
1.4 FEATURES
D is designed to cope up with the drawbacks of Existing system. D is a Web Site which provides with a platform which gives us fast and easy access to information regarding health services. This Web Site provides advanced search of doctors with their visiting Hospitals, Specialization and area. So u can search your desired doctor at the nearest Healthcare Centre. D keeps a record of blood donors which can be useful in case of an emergency like their contact no. and address. D provides a quick search to hospitals , their address, their e-mail address and phone number Fast operation Reduced time Detailed information Provides a user friendly environment It provides with complete latest information of particular hospital given by the hospital admin. D provides a facility to make appointments with doctor at the time of their visit to a particular hospital. The local Healthcare events and camps like blood donation camps , free checkup camps are informed to the user through our NEWS section.
OBJECTIVE OF THE PROJECT : The objective is to create a web application, which surpasses the expectations of the person needing the information regarding the various IT companies. The following are the objective of the proposed system. USER FRIENDLY INTERFACE: Since main interaction of the system has to be with the user, the user interface should be attractive and meaningful. MINIMUM EFFORT: Ensure that very less effort will be required the site and generation of report. FLEXIBILITY: Provides maximum flexibility to the Administrator in maintaining and modifying the information about existing modules functionalities. SECURITY : Since the information entered is of vital Importance to the organization and to the owner of the website, it should be made to allow only the website developers to manipulate the data FAST : The system should be fast enough to give User of the system the feel of using the best online system.
REPORT ORGANIZATION The report consists of four chapters and appendix. The brief description of each chapter is as follows: CHAPTER 1----------------- INTRODUCTION
This chapter gives an introduction to the project. It explains the problem definition and solution behind this project with the need & scope of the project. CHAPTER 2 ----------------- ANALYSIS
Deals with the literature, tools, and technologies that are being explored and adopted throughout the project development. This chapter describe about various models that were developed during Project designing phase. Such as Use-case models, Use-case description, CHAPTER 3 ----------------- DESIGN
This chapter deals with the architecture of the project means it defines it purpose, design, representation, size and performance goals. This chapter deals with the design of the software components its overview, complete class Diagram, sequence diagram, entity relationship diagram, designing tables and normalization. CHAPTER 4 ----------------------- IMPLEMENTATION
This chapter deals with high level algorithm and data structures. Also details about implementation language, third party software and package diagrams. CHAPTER 5 ----------------------- TESTING
After implementation, this chapter tells how its tested by using various methods of testing and test cases. CHAPTER 6 ------------------------ DEPLOYMENT
This chapter tells about the hardware and software requirements. It also includes Deployment diagrams. APPENDIX
2. ANALYSIS
2.1 2.2 2.3 2.4 2.5 Project Plan Requirement Specification Use Cases Use Case Diagram Activity Diagram
ANALYSIS
2.1 PROJECT PLAN
Before designing a system, the requirement of the system has to be properly determined and user need have to be properly determined and user needs have to be taken into account, initial investigation is the first step in the development of the system. This is the way handle the investigation of need i.e. the user request to change, improve or enhance an existing system. During this phase that are to be considered: How the present system works? Volume of the work type of transaction etc Time taken to process the data through system By the following the above steps of initial investigation are carried out first the existing system was carried out. The reporting format are gathered, the next step in initial investigation is to find out and collect more information from users and respective users who actually carry the existing system.
SYSTEM FEASIBILITY: After the analysis and specifications of the requirements of the proposed system feasibility study is conducted. It is done to find out whether the system is beneficial to the organization or not. For each proposed solution it is checked whether it is practical to implement that solution, this is done through feasibility study. Various feasibility aspects are considered . Econom ic Organizatio Managemen nal t Feasibility study Operation al Leg al
Technic Behavioral al The feasibility study includes the investigation of the information needs of the end user and objectives, constraints, basic resource requirement and cost benefits. The main and prime objective of feasibility study is not to solve the problem but to acquire a sense of its scope. The feasibility study includes the investigation of Information Needs of the end user and objectives Constraints Basic resource requirements
ECONOMIC FEASIBILITY The system is economically feasible because there are no requirements of any special Costly hardware or software to develop the system. This system uses minimum resources for development and usage so it is very economic and user friendly system. The organization for which it is meant can avail it at a very low cost. The objectives are fulfilled within minimum resources. Hence our project is economically feasible. TECHNICAL FEASIBILITY The project is technically feasible because it will not develop or use any technology which is under research. The project uses Java as front end and designing is done using a well recognized software of MICROSOFT that is .NET framework IDE. The back end of the project is SQL SERVER 2005 which is again a genuine product. In technical feasibility the following issues are taken into consideration: Whether the required technology is available or not? The work for the project can be done wih the current equipment and existing software technology that the organisation possessess. Whether the required resources are available? The system does not have any rigid hard-ware and software requirements and there is availability of the people who can perform the software engineering activities required for the development of the system. Hence, the system is technically feasible.
BEHAVIOURAL FEASIBILITY Behavioral feasibility is concerned with as curtaining the views of the examiners and organizers about the use of the computer facility. The support or the lack of the support that the examiners are likely to give to the system is the critical aspect of the feasibility in all respects except the behavioral and fails miserably because of human problems. Our project is behavioral feasible because it is time saving and reliable.
There was need to create a integrated system which surpasses the expectations of the person needing the information regarding pvc pipes manufacturing company and through which Administrators can also update & access the information from any location all over the world. How would you like to solve it?
To solve this problem we have made a web based application through which customer that can do online Registration on the site and without extra effort can get the all the basic information about company.Admin module is also made web based and hence administrators can access from any where in the world.
TECHNOLOGY
Front-End Tool : ASP.NET ASP.NET is a new programming framework from Microsoft for developing next generation web Applications. It talks the net language and is a framework built on the Common Language Runtime and introduces a new paradigm to server-side Web development. ASP.NET is more than the next version of Active Server Pages (ASP); it is a unified Web development platform that provides the services necessary for developers to build enterprise-class Web applications. While ASP.NET is largely syntax compatible with ASP, it also provides a new programming model and infrastructure for more secure, scalable, and stable applications. You can feel free to augment your existing ASP applications by incrementally adding ASP.NET functionality to them. ASP.NET is a managed framework that facilitates building server-side applications based on HTTP, HTML, XML and SOAP ASP.NET supports building HTML-based applications with Web forms, server-side controls and data binding ASP.NET supports building non-visual request handlers and Web services
Performance: - The code written in .Net Framework is complied in Common Language Runtime. ASP.NET can take advantage of early binding, just-in-time compilation, automatic resource optimization, runtime profiling, automatic memory management, enhanced exception handling, and caching services, right out-of-the-box, this improves the performance before you start coding. ASP.NET comes with a data-caching module. This data-caching module allows you to specify what data on an ASP page to cache and on what conditions to empty the cache and re-query the data-store. Tool Support:- Now you can drag-and-drop web controls like you do VB controls, double-click and write the server code for the control. ASP .NET supports XCOPY deployment that requires no registration or stopping of the server, supports dynamic DLL updates and extensible configuration using XML files. Flexibility: - Because ASP.NET is based on the Common Language Runtime, the power and flexibility of that entire platform is made available to web application developers. The Common Language Runtime's Base Class libraries, Messaging, and Data Access solutions are all seamlessly accessible from the web.ASP.NET is also language-independent. Further, Common Language Runtime interoperability guarantees that your existing investment in COM-based development is preserved when migrating to ASP.NET. Simplicity: - ASP.NET makes it easy to perform common tasks, from simple form submission and client authentication to deployment and site configuration. For example, the ASP.NET Page Framework allows you to build user interfaces that cleanly separate application logic from presentation code, and handle events in a simple, VB-like forms processing model. Additionally, the Common Language Runtime simplifies development with managed code services like automatic reference counting and garbage collection.
Manageability: -The ASP.NET configuration system handles both ends, and provides a hierarchical configuration setup that enables extensible configuration data to be defined and used throughout an application, a Web site, and/or an entire domain. No server restart is required, even to deploy or replace running compiled code!
Scalability: -ASP.NET has been designed with scalability in mind, enables automatic process recovery through error and memory overload detection. Session state can now be maintained in a number of ways. Session data can be passed in a hidden field within the pages, or in one of two out-of-process State Stores. The two flavors they come in are the ASP.NET State Store, which maintains stateful data in memory, or the SQL State Store, for writing stateful data to your SQL Server database. Customizability and Extensibility: - ASP.NET delivers a well-factored architecture that allows developers to "plug-in" their code at the appropriate level. In fact, it is possible to extend or replace any sub-component of the ASP.NET runtime with your own custom-written component. Implementing custom authentication or state services has never been easier. SecurityASP.NET works in conjunction with the Microsoft .NET Framework and Internet Information Server (IIS) 5.0 to provide outstanding security capabilities.
several new features that make it an excellent database platform for large-scale online transactional processing (OLTP), data warehousing, and e-commerce applications. The database component of Microsoft SQL Server 2005 is a Structured Query Language (SQL)based, scalable, relational database with integrated Extensible Markup Language (XML) support for Internet applications. SQL statements return their results in a relational, or tabular, result set, the SQL Server 2000 database component supports a FOR XML clause that returns results as an XML document. SQL Server 2005 also supports XPath queries from Internet and intranet applications. XML documents can be added to SQL Server databases, and the OPENXML clause can be used to expose data from an XML document as a relational result set.
Horizontal Ellipse
Actors An actor is a person, organization, or external system that plays a role in one or more interactions with your system (actors are typically drawn as stick figures on UML)
Actors Place Your Primary Actor (S) In the Top-Left Corner of the Diagram.
1. 2. 3. 4. 5. 6. 7.
Draw Actors To The Outside Of A Use Case Diagram Name Actors With Singular, Business-Relevant Nouns Associate Each Actor With One Or More Use Cases Actors Model Roles, Not Positions Use <<system>> to Indicate System Actors Actors Dont Interact With One Another Introduce an Actor Called Time to Initiate Scheduled Events
Relationships There are several types of relationships that may appear on a use case diagram:
An association between an actor and a use case An association between two use cases A generalization between two actors A generalization between two use cases
Associations are depicted as lines connecting two modeling elements with an optional open-headed arrowhead on one end of the line indicating the direction of the initial invocation of the relationship. Generalizations are depicted as a close-headed arrow with the arrow pointing towards the more general modeling element. System Boundary Boxes The rectangle around the use cases is called the system boundary box and as the name suggests it indicates the scope of your system the use cases inside the rectangle represent the functionality that you intend to implement.
Indicate Release Scope with a System Boundary Box. Avoid Meaningless System Boundary
POSTCONDITIONS The post-conditions section describes what the change in state of the system will be after the use case completes. Post-conditions are guaranteed to be true when the use case ends. Use Case diagrams are one of the five diagrams in the UML for modeling the dynamic aspects of systems (activity diagrams, sequence diagrams, state chart diagrams and collaboration diagrams are the four other kinds of diagrams in the UML for modeling the dynamic aspects of systems).
Use case:1
Use case: 2
3. DESIGN
3.1 3.2 3.3 3.4 3.5 Architecture Database Design User Interface Design Logical Design Sequence Diagram
DESIGN
Tier 1: the client contains the presentation logic, including simple control and user input validation. This application is also known as a thin client. Tier 2: the middle tier is also known as the application server, which provides the business processes logic and the data access.
It is easier to modify or replace any tier without affecting the other tiers. Separating the application and database functionality means better load balancing. Adequate security policies can be enforced within the server tiers without hindering the clients
Purpose Of Database Before database management system came along, organizations usually stored information in file-processing systems. Keeping organizations information in a fileprocessing system has a number of major disadvantages: Data redundancy and inconsistency Difficulty in accessing data Data isolation Integrity problems Atomicity problems Concurrent access anomalies Security problems
Characteristics of the Database approach A database management system consists of a collection of interrelated data and a set of programs to access those data. The collection of data usually referred to as the database, contains information about one particular enterprise. The primary goal of a database management system is to provide an environment that is both convenient and efficient to use in retrieving and storing database information. Database systems are designed to manage large bodies of information. This management includes both the definition of structures for the storage of information and the provisions of mechanisms for the manipulation of information. In addition, the database system must provide for the safety of the information stored, despite system crashes or attempts at unauthorized access. A number of characteristics distinguish the database approach from the traditional approach of programming with files. In traditional file processing, each user defines
and implements the files needed for a specific application as part of programming the application. In the database approach, a single repository of data is maintained that is defined once and then is accessed by various users. The main characteristics of the database approach versus the file-processing approach are the following. Self-describing Nature Insulation between Programs and Data, and Data Abstraction Support of Multiple Views of Data. Sharing Of Data and Multi-user Transaction Processing.
Self-Describing Nature of a Database System A fundamental characteristic of the database approach is that the database system contains not only the database itself but also a complete definition or description of the database structure and constraints. This definition is stored in the system catalog, which contains information such as the structure of each file, the type and storage format for each data item, and various constraints on the data. The information stored in the catalog is called meta-data, and it describes the structure of the primary database. Insulation between Programs and Data, and Data Abstraction In traditional file processing, the structure of data files is embedded in the access programs, so any changes to the structure of a file may require changing all programs that access this file. By contrast, DBMS access programs do not require such changes in most cases. The structure of data files us stored in the DBMS catalog separately from the access programs. This property is called program-data independence. In object-oriented and object-relational database, users can define operations as part of the database definitions. An operation (or function) is specified in two parts. The interface (or signature) of an operation includes the operation name and the data types of its arguments (or parameters). The implementation (or method) of the operation is specified separately and can be changed without affecting the interface. User application programs can operate on the data by invoking these operations through their names and arguments, regardless of how the operations are implemented. This may be termed program-operation independence. The characteristic that allows program-data independence and program-orientation independence is called data abstraction. A DBMS provides users with a conceptual representation of data that does not include many of the details of how the data is stored or how the operations are implemented. Support of Multiple Views of the Data
A database typically has many users, each of whom may require a different perspective or view of the database. A view may be a subset of the database or it may contain virtual data that is derived from the database files but is not explicitly stored. Some users may not need to be aware of whether the data they refer to is stored or derived. A multi-user DBMS whose users have a variety of applications must provide facilities for defining multiple views. Sharing of Data and Multi-user Transaction Processing A multi-user DBMS, as its name applies, must allow multiple users to access the database at the same time. This is essential if data for multiple applications is to be integrated and maintained in a single database. The DBMS must include concurrency control software to ensure that several users trying to update the same data do so in a controlled manner so that the result of the updates is correct. Such types of problems generally occur in on-line transaction processing (OLTP) applications. A fundamental role of multi-user DBMS software is to ensure that concurrent transactions operate correctly.
Querying is the process of requesting attribute information from various perspectives and combinations of factors. Example: "How many 2-door cars in Texas are green?" A database query language and report writer to allow users to interactively interrogate the database, analyze its data and update it according to the users privileges on data. It also controls the security of the database. Data security prevents unauthorized users from viewing or updating the database. Using passwords, users are allowed access to the entire database or subsets of it called sub schemas. If the DBMS provides a way to interactively enter and update the database, as well as interrogate it, this capability allows for managing personal databases. However, it may not leave an audit trail of actions or provide the kinds of controls necessary in a multi-user organization. These controls are only available when a set of application programs are customized for each data entry and updating function. Backup And Replication Copies of attributes need to be made regularly in case primary disks or other equipment fails. A periodic copy of attributes may also be created for a distant organization that cannot readily access the original. DBMS usually provide utilities to facilitate the process of extracting and disseminating attribute sets. When data is replicated between database servers, so that the information remains consistent throughout the database system and users cannot tell or even know which server in the DBMS they are using, the system is said to exhibit replication transparency.
Rule Enforcement
Often one wants to apply rules to attributes so that the attributes are clean and reliable. For example, we may have a rule that says each car can have only one engine associated with it (identified by Engine Number). If somebody tries to associate a second engine with a given car, we want the DBMS to deny such a request and display an error message. However, with changes in the model specification such as, in this example, hybrid gas-electric cars, rules may need to change. Ideally such rules should be able to be added and removed as needed without significant data layout redesign. Security Often it is desirable to limit who can see or change which attributes or groups of attributes. This may be managed directly by individual, or by the assignment of individuals and privileges to groups, or (in the most elaborate models) through the assignment of individuals and groups to roles which are then granted entitlements. Computation There are common computations requested on attributes such as counting, summing, averaging, sorting, grouping, cross-referencing, etc. Rather than have each computer application implement these from scratch, they can rely on the DBMS to supply such calculations. Change and access logging Often one wants to know who accessed what attributes, what was changed, and when it was changed. Logging services allow this by keeping a record of access occurrences and changes.
Automated optimization
If there are frequently occurring usage patterns or requests, some DBMS can adjust themselves to improve the speed of those interactions. In some cases the DBMS will merely provide tools to monitor performance, allowing a human expert to make the necessary adjustments after reviewing the statistics collected. DISADVANTAGES OF USING DBMS In spite of the advantages of using a DBMS, there are a few situations in which such a system may involve unnecessary overhead costs, as that would not be incurred in traditional file processing. The overhead costs of using a DBMS are due to the following: High initial investment in hardware, software and training. Generally that a DBMS provides for defining and processing data. Overhead for providing security, concurrency control, recovery and integrity functions. Additional problems may arise if the database designers and DBA do not properly design the database or if the database system applications are not implemented properly. Hence, it may be more desirable to use regular files under the following circumstances: The database and applications are simple, well defined and not expected to change. There are stringent real-time requirements for some programs that be met because of DBMS overhead. Multiple-user access to data is not required. may not
The following are the snap shots of the database being used in this project:
User interface design requires a good understanding of user needs. User interface is the one of the most important feature of a project . It is the User interface through which a user interacts with the project . User interface is the first thing which a user look first time , so it gives the first impression about the project . Good User interface is very essential for the commercial projects to compete in the market , because good features of project are useless if they are not shown properly . User interfaces should be appealing to the users but also they should be meaningful, they must provide easy and fast access to the services of the software even to the user using software first time. Features of UI: 1). It should be good looking. but keeping the aim of project in mind , i.e. It should be decent looking for commercial , medical , education use , and can be glamorous for entertainment purpose. 2). It should provide all the main features at the same place . 3). It should be easy to use and understandable. 4). It should also provide little help for the new user to use the system, it can be done by things like popup messages.
We have tried to design such UI which have all the above features. Our UI is very decent looking which suites the aim of our project , which is in Medical domain . WE have tried to design a UI that is easy to use . Popup help is given at anywhere possible . All the essential features can be assessed from the same place with ease. We have also tried to minimize the user side errors up to some extent .
4 .IMPLEMENTATION
4.1 High Level Algorithm 4.2 Data Structures Used 4.3 Third Party Software 4.4 Package Diagram
5. TESTING
5.1 Unit Testing 5.2 Integration Testing 5.3 System Testing 5.4 Test Plan 5.5 Test Cases
Drivers and stubs can be reused so the constant changes that occur during the development cycle can be retested frequently without writing large amounts of additional test code. In effect, this reduces the cost of writing the drivers and stubs on a per-use basis and the cost of retesting is better controlled.
The advantages of this type of testing include: 1. The test is unbiased because the designer and the tester are independent of each other. 2. The tester does not need knowledge of any specific programming languages. 3. The test is done from the point of view of the user, not the designer. 4. Test cases can be designed as soon as the specifications are complete. The disadvantages of this type of testing include: 1. The test can be redundant if the software designer has already run a test case. 2. The test cases are difficult to design. 3. Testing every possible input stream is unrealistic because it would take a inordinate amount of time; therefore, many program paths will go untested.
Advantages of White box testing are: There are many benefits to white box testing, including the following: 1. Analyzing source code and developing tests based on the implementation details enables testers to find programming errors quickly. For example, a white box tester looking at the implementation can quickly uncover a way, say, through an error handling mechanism, to expose secret data processed by a component. Finding such vulnerabilities through black box testing require comparatively more effort than found through white box testing. This increases the productivity of testing effort. 2. Executing some (hard to set up) black box tests as white box tests reduces complexity in test setup and execution. For example, to drive a specific input into a component, buried inside the software, may require elaborate setup for black box testing but may be done more directly through white box testing by isolating the component and testing it on its own. This reduces the overall cost (in terms of time and effort) required to perform such tests. 3. Validating design decisions and assumptions quickly through white box testing increases effectiveness. The design specification may outline a secure design, but the implementation may not exactly capture the design intent. For example, a design might outline the use of protected channels for data transfer between two components, but the implementation may be using an unprotected method for temporary storage before the data transfer. This increases the productivity of testing effort. 4. Finding unintended features can be quicker during white box testing. Security testing is not just about finding vulnerabilities in the intended functionality of the software but also about
1. As knowledge of code and internal structure is a prerequisite, a skilled tester is needed to carry out this type of testing, which increases the cost. 2.And it is nearly impossible to look into every bit of code to find out hidden errors, which may create problems, resulting in failure of the application. The general outline of the white box testing process is as follows: 1. Perform risk analysis to guide the whole testing process.
2. Develop a test strategy that defines what testing activities are needed to accomplish testing goals.
3. Develop a detailed test plan that organizes the subsequent testing process.
5.4
TEST PLANS
A test plan documents the strategy that will be used to verify and ensure that a product or system meets its design specifications and other requirements. A test plan is usually prepared by or with significant input from Test Engineers.
Depending on the product and the responsibility of the organization to which the test plan applies, a test plan may include one or more of the following:
1. Design Verification or Compliance test - to be performed during the development or approval stages of the product, typically on a small sample of units. 2. Manufacturing or Production test - to be performed during preparation or assembly of the product in an ongoing manner for purposes of performance verification and quality control. 3. Acceptance or Commissioning test - to be performed at the time of delivery or installation of the product. 4. Service and Repair test - to be performed as required over the service life of the product...... 5. Regression test - to be performed on an existing operational product, to verify that existing functionality didn't get broken when other aspects of the environment are changed (e.g., upgrading the platform on which an existing application runs).
A complex system may have a high level test plan to address the overall requirements and supporting test plans to address the design details of subsystems and components.
Test plan document formats can be as varied as the products and organizations to which they apply, but there are three major elements of a test strategy that should be described in the test plan: Test Coverage, Test Methods, and Test Responsibilities.
Test coverage in the test plan states what requirements will be verified during what stages of the product life. Test Coverage is derived from design specifications and other requirements, such as safety standards or regulatory codes, where each requirement or specification of the design ideally will have one or more corresponding means of verification. Test coverage for different product life stages may overlap, but will not necessarily be exactly the same for all stages. For example, some requirements may be verified during Design Verification test, but not repeated during Acceptance test. Test coverage also feeds back into the design process, since the product may have to be designed to allow test .
Username, password The user is prompted Yes or user type fields are to enter username or left blank and Login password. button is clicked. Click the submit button with invalid username or password . If user is not already registered If user create account with the existing user name. If User name and password is matching with the admin id . Enter valid username and password . Either the username or Yes password is incorrect. Invalid entry please re-enter. create account page is loaded. A message is displayed of user name already exist . User is made to navigate to admin mode. Navigation page displayed and user can start accessing the services. Yes Yes
2.
3. 4.
5.
Yes
6.
Yes
2. Register:
Action
Expected Result
Success
Comments
If user gives null The user is prompted Yes values of username, to enter mandatory email id, password fields. (any field in the form) & clicks on submit button.
If user selects a The user is prompted Yes user_id which is to choose another already assigned to username. another user. If user successfully The user is provided Yes registers. with all the services
3.
3) Menu :
Expected Result
Success
Comments
on Then About us page Yes is opened and he can view the company profile on Then the user is Yes provided with create account window after filling that this page is opened. on Then product page is Yes opened from here he can view the specification .
2.
3.
4.
If user Logout .
clicks
on Then user session is Yes invalidated and he is redirected to Home page. on Then user is Yes redirected to home page
5.
If user Home .
clicks
DEPLOYMENT
CLIENT SIDE HARDWARE REQUIREMENTS: Hard disk - 10 GB Minimum Processor - 850 MHz or Higher R.A.M - 256 MB or Higher SERVER SIDE SOFTWARE REQUIREMENTS: ASP.NET as front-end tool IIS server SQL 2005 Windows server edition CLIENT SIDE SOFTWARE REQUIREMENT: Operating system with internet facility . A web browser.
DEPLOYMENT DIAGRAM
APPENDIX
HOME PAGE
HELP PAGE