Vous êtes sur la page 1sur 28

1

CHAPTER 1
INTRODUCTION
1.1 ORGANIZATION PROFILE
STRAWBERRY LAB (P) Ltd. Infopark, Kochi was incorporated as a Private Limited
Company in 2006 with the objective of providing quality service in the field of Information
Technology. It had started with the sole objective of providing quality service in the fields of
Information Technology and IT enabled services adhering to IT industrys international quality
standards.
STRAWBERRY, a software solution firm, with proven business credentials
Headquartered in Scotland, UK. Having its presence in multiple continents. The company is a
leading global consulting and IT services company that offers a wide array of solutions for a
range of business functionalities. It is a rapidly expanding, profit making company with its
software development centers across India and overseas.
The company is totally committed to ensure highest quality standards and to understand
changing customer needs. With its trained professionals including those trained in the USA, we
can provide top class service in such areas as Software Development, Software Consultancy,
Cyber Search, Internet Services, Domain & Server Space, Web Designing & Hosting and other
IT enabled services.
At here, it strives to understand changing customer needs, and enrich their quality of life
by simply making the technology readily usable for them. It is proud to have solid Information
Systems Professionals, including those trained abroad, design, develop, enhance, implement,
maintain and support various aspects of Information Technology.

2
CHAPTER 2
SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
The current systems do not put any restriction to open an account, which has resulted in
the creation of fake details of a user because of lake of validations. The system does not put any
restriction in the creation of communities, which has resulted in the creation of lot of
communities, which are illegal or misguiding in many ways. The existing system does not
provide an option for detailed searching.
The system administrator has only limited control on the system. And a result the users
are allowed to run the system according to their interest. So many malpractices occur. The new
system provides many facilities to overcome the same.
2.1.1 DRAWBACKS
i)Lack of security.
ii)Lack of validation
iii)Lack of searching.

2.2 PROPOSED SYSTEM


It is based on the user interaction and creation of communities. Here the user can search
for their friends, interested communities and send messages. Only registered members have the
privilege to create communities. The user can view all his\her friends and relatives communities.
They can upload their picture at the time of editing their profile.
The user can view all joined communities and the registered members in that community.
Anyone can send messages between the friends. And can reply to the received messages. Only
registered members can become a part of this network. Administrator administers all the
functionalities of the web site. He will administer each operation in website such as registration,
community, abuses and the entire request made by the users. The administrator has the
proficiency to delete requested users. Whenever a user registers in the site the administrator will
look after the overall details. If he finds any entry which is misleading, he has the proficiency to
edit it. He can also have the privilege to delete the registered.
2.2.1 ADVANTAGES
i)Efficient Searching
ii)All the functions in this site are controlled by administrators

2.3 FEASIBILITY STUDY


Feasibility analysis is a procedure for identifying the candidate system, evaluating and
electing the most feasible system. This is done by investigating the existing system in the area
under investigation or generally ideas about a new system. It is a test of a system proposal
according to its workability, impact on the organization, ability to meet user needs, and effective
use of resources. The objective of the feasibility study is not to solve the problem but to acquire a
sense of its scope.
2.3.1 ECONOMIC FEASIBILITY
The developing system must be justified by cost benefit criteria have to ensure that effort
take on the project. One of the factors, which affect the development of a new system, is the cost
it would require. Since the system developed is a part of a project work, there is no manual cost
to spend for the proposed system. As all the resources are readily available like software,
hardware applications the development of the system is very cost effective. The cost require for
it implementation is also getting reduced .As the users are trained. Economic analysis is the most
frequently used method for evaluating and effectiveness of the candidate system. It is most
commonly known as cost benefit analysis, the producer to determine the benefits and saving that
are expected from a candidate system and compare them with costs. If the benefits overweigh
costs then decision is made to design and implement the system. Otherwise make alterations in
the proposed system. Executive Join is justified by cost benefit criteria have to ensure that effort
take on project.

5
2.3.2 OPERATIONAL FEASIBILITY
Operational feasibility analyses the flexibilities of the programs. Once the errors are
known the code should be flexible to change or to remove the unwanted part. The performance
of the ftp client with server monitoring is analyzed by giving the input in different ways.
According to the input if the output is accurate the program will show high performance and
accuracy. The responds time of the software is also noted for a particular input. Based on the
result, of these tests, we can recommend appropriate architecture and design-level changes to
ensure that the users have getting the best level of service. Executive Join shows high
performance. It is highly flexible.

2.3.3 TECHNICAL FEASIBILITY


The assessment of this feasibility must be based on an outline design of the system
requirement in the terms of input, output, programs, procedure and staff. Having identified an
outline system, the investigation must go to suggest the type of the equipment, required method
developing system, method of running the system once it has been designed. The project should
be developed such that the necessary functions and performance are achieved within the
constraints. As the result the front end is very user friendly, to do programming is very easier.
Computers with high computational capability help to connect to the remote system easily. Since
the back end is used to avoid problems in terms of volumes of data, trends, frequency of
updating the project is technically feasible for the development. The assessment of technical
feasibility centers on an outline design of system requirements in terns of inputs, files, programs,
procedures, and staff.

6
CHAPTER 3
SYSTEM SPECIFICATION
Requirement specification plays an important part in the analysis of a system. Only when
the requirement specifications are properly given, it is possible to design a system, which will fit
into required environment. It rests largely in the part of the users of the existing system to give
the requirement specifications because they are the people who finally use the system. This is
because the requirements have to be known during the initial stages so that the system can be
designed according to those requirements.
3.1. HARDWARE REQUIREMENTS
Processor

Pentium IV

RAM

1024MB

Hard Disk

20GB

Keyboard

102 keys

Monitor

VGA Display Monitor

Mouse

Scrolling Mouse

3.2. SOFTWARE REQUIREMENTS


Platform

: Windows XP with SP2

Front End

: ASP.NET

Back End

MS-SQL Server 2005

IDE

Ms-Visual Studio.Net 2005

Web Server

: IIS Server

7
CHAPTER 4
SOFTWARE DESCRIPTION
4.1 ASP.NET
4.1.1 Server Application Development
Server-side applications in the managed world are implemented through runtime hosts.
Unmanaged applications host the common language runtime, which allows your custom
managed code to control the behavior of the server. This model provides you with all the features
of the common language runtime and class library while gaining the performance and scalability
of the host server.
The following illustration shows a basic network schema with managed code running in
different server environments. Servers such as IIS and SQL Server can perform standard
operations while your application logic executes through the managed code.
4.1.2 Server-Side Managed Code
ASP.NET is the hosting environment that enables developers to use the .NET Framework
to target Web-based applications. However, ASP.NET is more than just a runtime host; it is a
complete architecture for developing Web sites and Internet-distributed objects using managed
code. Both Web Forms and XML Web services use IIS and ASP.NET as the publishing
mechanism for applications, and both have a collection of supporting classes in the .NET
Framework.

4.1.3 Active Server Page .Net

ASP.NET is a programming framework built on the common language runtime that can
be used on a server to build powerful Web applications. ASP.NET offers several important
advantages over previous Web development models.
Enhanced Performance. ASP.NET is compiled common language runtime code running
on the server. Unlike its interpreted predecessors, ASP.NET can take advantage of early binding,
just-in-time compilation, native optimization, and caching services right out of the box. This
amounts to dramatically better performance before you ever write a line of code.
World-Class Tool Support. The ASP.NET framework is complemented by a rich toolbox
and designer in the Visual Studio integrated development environment. WYSIWYG editing,
drag-and-drop server controls, and automatic deployment are just a few of the features this
powerful tool provides.
4.1.4 Language Support
The Microsoft .NET Platform currently offers built-in support for three languages: C#,
Visual Basic, and JScript.
4.1.5 SQL Server
A database management, or DBMS, gives the user access to their data and helps th m
transform the data into information. Such database management systems include dBase, paradox,
IMS, SQL Server and SQL Server. These systems allow users to create, update and extract
information from their database.

A database is a structured collection of data. Data refers to the characteristics of people,


things and events. SQL Server stores each data item in its own fields. In SQL Server, the fields

9
relating to a particular person, thing or event are bundled together to form a single complete unit
of data, called a record (it can also be referred to as raw or an occurrence). Each record is made
up of a number of fields. No two fields in a record can have the same field name.
4.1.1 NET FEATURES
The .NET Framework has two main components: the common language runtime and
the .NET Framework class library. The common language runtime is the foundation of the .NET
Framework. You can think of the runtime as an agent that manages code at execution time,
providing core services such as memory management, thread management, and Removing, while
also enforcing strict type safety and other forms of code accuracy that ensure security and
robustness.
The .NET Framework can be hosted by unmanaged components that load the common
language runtime into their processes and initiate the execution of managed code, thereby
creating a software environment that can exploit both managed and unmanaged features. The
.NET Framework not only provides several runtime hosts, but also supports the development of
third-party runtime hosts.
Internet Explorer is an example of an unmanaged application that hosts the runtime Using
Internet Explorer to host the runtime enables you to embed managed components or Windows
Forms controls in HTML documents. Hosting the runtime in this way makes managed mobile
code possible, but with significant improvements that only managed code can offer, such as
semi-trusted execution and secure isolated file storage.

a) Features of the Common Language Run Time

10
The common language runtime manages memory, thread execution, code execution, code
safety verification, compilation, and other system services. These features are intrinsic to the
managed code that runs on the common language runtime.
With regards to security, managed components are awarded varying degrees of trust,
depending on a number of factors that include their origin

This means that a managed

component might or might not be able to perform file-access operations, registry-access


operations, or other sensitive functions, even if it is being used in the same active application.
The runtime enforces code access security. For example, users can trust that an
executable embedded in a Web page can play an animation on screen or sing a song, but cannot
access their personal data, file system, or network. The security features of the runtime thus
enable legitimate Internet-deployed software to be exceptionally featuring rich.
The runtime also enforces code robustness by implementing a strict type- and codeverification infrastructure called the common type system (CTS). The CTS ensures that all
managed code is self-describing. The various Microsoft and third-party language compilers
Generate managed code that conforms to the CTS. This means that managed code can
consume other managed types and instances, while strictly enforcing type fidelity and type
safety.
While the runtime is designed for the software of the future, it also supports software of
today and yesterday. Interoperability between managed and unmanaged code enables developers
to continue to use necessary COM components and DLLs.
The runtime is designed to enhance performance. Although the common language
runtime provides many standard runtime services, managed code is never interpreted. A feature
called just-in-time (JIT) compiling enables all managed code to run in the native machine
language of the system on which it is executing.

11
b) Net Framework Class Library
The .NET Framework class library is a collection of reusable types that tightly integrate
with the common language runtime. The class library is object oriented, providing types from
which your own managed code can derive functionality. This not only makes the .NET
Framework types easy to use, but also reduces the time associated with learning new features of
the .NET Framework. In addition, third-party components can integrate seamlessly with classes
in the .NET Framework.
As you would expect from an object-oriented class library, the .NET Framework types
enable you to accomplish a range of common programming tasks, including tasks such as string
management, data collection, database connectivity, and file access. In addition to these common
tasks, the class library includes types that support a variety of specialized development scenarios.
For example, you can use the .NET Framework to develop the following types of applications
and services:
Console applications.
Scripted or hosted applications.
Windows GUI applications (Windows Forms).
ASP.NET applications.
XML Web services.
Windows services.
The Windows Forms classes are a comprehensive set of reusable types that vastly
simplify Windows GUI development. If you write an ASP.NET Web Form application, you can
use the Web Forms classes.

CHAPTER 5

12
PROJECT DESCRIPTION
5.1 PROBLEM DEFINITION
Executive Join is a social network which helps the user to maintain existing
relationships with pictures and messages, and establish new ones by reaching out to people
you've never met before.
5.2 OVERVIEW OF THE PROJCET
It is a web based system that can be a useful component in our online presence.
This project consists of many forms, by using the login form user can enter into the project and
create their own accounts by using registration form. After registration user can login to the
entire site. The registered user can search for their friends, send scraps to them and can upload
photos. It is a great way for users to communicate and achieve instantaneous results. Certainly
this system has had a tremendous impact on the way information is exchanged over the web.
It also helps the user to find people who share their hobbies and interests. User can also
create and join a wide variety of online communities to discuss current events, reconnect with
old school mates.

5.3 MODULE DESCRIPTION

13
Executive Join System handles system in four modules
5.3.1 MODULES
i)Administrator
ii)User
iii) Security
i) Administrator
Administrator controls all the functionalities of this web site. Administrator handles the
registration, Community, Abuses and the entire request made by the users. At each entry into the
data base, the administrator has got the power to edit the details before adding to its original list
of items. And it is being performed with in a specified time stamp. Validation of profiles is done
manually. Administrator meticulously validates each and every profile carefully on specific
criterion before it is added to our database. Hence, it takes 24 hrs to validate all the profiles that
are being added on one particular day. Almost every word counts. Administrator has also got the
power to delete an added Item from the list.
a)View members
Administrator has the privilege to view, delete, edit and update the information of the
registered users. After registration of each user the Admin should check their profile for
approving whether the user is valid or invalid, this would take max. 24 hours.
b)View members
Administrator has the privilege to view, delete, edit and update the information of the
registered communities.
c) Approve communities
Administrator can approve the communities created by registered users. If the community
is fake then Admin must delete the community within 24 hours according to the report abuse.

ii) USER

14
Executive join is an online community website designed for friends. This social network
can help user both maintain existing relationships and establish new ones by reaching out to
people they've never met before. This makes it easy to find people who share your hobbies and
interests
a) Create Account
Users must create account. After registration users can login in to the entire site.
And also user can view, edit and delete their profile.
b)View members
The registered users can see their friends list and also view their profile. After login the
users can search their friends by name, location...etc, and also can make scrap to them.

c) Add Friends
The registered users can add friends and approve friends requests. After login the
registered user can search their friends by umpteen options and can send request to other users.
d)View members
The registered users can view messages send by their friends. And also the registered user
can send messages to their friends.

e) Delete friends
The registered users can delete friends from their friends list. And also can report abuse.
f)Searching
Searching allows users to search for friends based on users name.
Users can search user details by users name and they can also search community details by
community name.
g)Create community
The registered users can create communities and the owner can send join request.

15

h)Join community
The registered users can join community according to their interests. But the owner of the
community has to give approval for them.
iii) Security
a)Protect users Account
Users can help secure their own account and their online identity quickly and easily.
a.1) Don't share: Keep user username, password and personal information secret and change
user password regularly.
a.2) Avoid posting sensitive personal data, such as email addresses or pictures, in public
places.
b)Image upload policy
System encourages users to take advantage of our image upload features in both profiles
and communities by uploading personal pictures, such as photos of themselves or their pets.
Profiles or communities containing unwanted images will be permanently removed without
warning or prior notification.
b)Report abuse

If you're certain that you found content violating real world laws or our policies, you can
report it by clicking report abuse on any profile or community page.
When user selects report abuse, admin automatically receive a notification, and user
identity remains confidential. If based on the report admin discover that the content violates real
world laws or our policies, admin may immediately remove it and report any necessary
information to the appropriate authorities.
c) Ignore Other Users

16
Some users may receive unwanted messages, they can prevent another user from sending
messages, invitations, friend requests, and testimonials by adding that user to your ignore list.

5.4 DATA FLOW DIAGRAM


A data flow diagram is graphical tool used to describe and analyze movement of
data through a system. These are the central tool and the basis from which the other components
are developed. The transformation of data from input to output, through processed, may be
described logically and independently of physical components associated with the system. These
are known as the logical data flow diagrams. The physical data flow diagrams show the actual
implements and movement of data between people, departments and workstations. Process is
further identified with a number that will be used for identification purpose. The development of
DFDS is done in several levels. Each process in lower level diagrams can be broken down into
a more detailed DFD in the next level. The lop-level diagram is often called context diagram. It
consists of a single process bit, which plays vital role in studying the current system. The
process in the context level diagram is exploded into other process at the first level DFD.

5.4.1 CONTEXT LEVEL DFD

Administrator /
User

Request

5.4.2 FIRST LEVEL DFD - ADMIN

Friends
Corner

Request

Administrator /
User

17

1
Login

ADMIN

1.2
View
Members

REGISTER

1.1
Receive
Request

REQUEST

1.3
View
Communiti
es

COMMUNITY

5.4.3 SECOND LEVEL DFD ADMIN

1
Login

ADMIN

1.1
Receive
User
Requests
1.1.6
Search

1.1.1
Accept/ Reject
User
registration

REGISTER

1.1.3
Accept/ Reject
Community
registration

1.1.5
Check
Complaints
Details
COMPLAINT BOX

COMMUNITY

USERS

18

5.4.4 FIRST LEVEL DFD - USER

Details

1
Registration

USERS

User
Usrnm, pswrd
LOGIN

Login
5.4.5 SECOND LEVEL DFD - USER

Details

1
Registration

REGISTER

Complnt

Login

details
Result

Usrname,
Usrname, pswrd

User

pswrd

2.6
Complaint
Posting

Login
2.5
Search

2.1
Friends
Manageme
nt
Name

2.2
Profile
Manageme
nt
Details

2.3
Scrap
Manageme
nt

2.4
Community
Manageme
nt

scraps

.
REGISTR

FRIEND

PROFILE

PHOTO SCRAP

Name

comm.
Result
Details
COMMUNITY

Details

REGISTER

19

5.4.6 THIRD LEVEL DFD - USER


Friends Management

User

Usrname, pswrd

Login

2.1
Friends
Management
2.1.1
Receive
Friends
request

2.1.3
Search
2.1.2
View Friends
Profile

Name

name

FRIENDS

Details
REGISTR

FRIENDS

FRIENDS

20

5.5 E-R DIAGRAM


The relation upon the system is structure through a conceptual ER-Diagram, which not
only specifics the existential entities but also the standard relations through which the system
exists and the cardinalities that are necessary for the system state to continue.

21

5.6 DATABASE DESIGN


5.6.1 Register table

5.6.2
table

Column name

Data type

Description

Int

widt
h
10

usr_id
Fst_name

Varchar

20

Firstname

Lst_name

Varchar

20

Lastname

Gender
Column name
Usr_name
Usr_name
Frnd_id
pwd
Frndtyp_id
Status
Msg

Varchar
Data type
Varchar
Varchar
Int
Varchar
Int
Varchar
Varchar

10 width
30 50
12
20
12
20
200

Sex

user ID
Friends

Description
Username
Username
Friend Id
password
Friend Type Id
Status
Message

5.6.3 Friend type table


Column name
Frndtype_id
Typ_name

Data type

width

Description

Int
Varchar(30)

10
30

Friend type ID
Type name

5.6. 4. Scrap table


Column name
Scrap_id
Frm_id

Data type
Int
Varchar(30)

width

Description
Scrap_ID
From_ID

22
to_id
time_sent
date_sent
msg

Varchar(30)
Datetime
Datetime
Varchar(2000)

To_ID
Time sent
Date sent
message

5.6. 5 Photo table


Column name
User_name
Photo_id
path

Data type
Varchar(40)
Int
Varchar(200)

Width

Description
username
Photo_ID
Photo path

5.7 INPUT DESIGN


Input design is a part of overall system design, which requires very careful attention and often
the collection of input data is the most expensive part of the system. The user interface is very
important for any application. The interface design describes the software communities within
itself to system that interpreted with it and with human who use it.

23

Input design is a process of converting the user-oriented input into the computer based. The
data is fed into the system with simple interactive forms; the forms have been supplied with
messages. So that user can enter data without facing any difficulty. The data is validated
whenever it requires in the project. This ensures that only the correct data have been incorporated
into the system.
The goal of the designing input data is to make the automation an easy and free from errors as
possible. For providing a good input design for the application easy data input and selection
features are adopted.

5.8 OUTPUT DESIGN


Output generally refers to the result that is generated by the system. This system provides
output by this user environment and produces the desired result. Thus the output is designed in
such a way to satisfy the user by the web page.
The normal procedure in developing a system is to design the output in required format.
The output may be in the form of Web page. In this system the output is designed carefully
according to the user requirements.
Without the quality output, the entire system may appear to be so unnecessary that users
will use it, possibly causing it to fail.

CHAPTER 6
SYSTEM TESTING

24
Testing is vital to the success of the system and makes the logical assumption that if all
parts of the system are correct, the goal will be successfully achieved. All tests should be
traceable to the requirements. The testing procedures are as follows,
(i) Unit Testing
(ii) Acceptance Testing

6.1 UNIT TESTING


This testing method considers a module as single unit and checks the unit at interfaces
and communicates with other modules rather than getting into details at statement level. Here the
module will be treated as a black box, which will take some input and generate output. Outputs
for a given set of input combination are pre-calculated and are generated by the module.
6.2 ACCEPTANCE TESTING
This is the key factor for the success of any system. The system under consideration is
tested for user acceptance by being constantly in touch with the user and making changes
whenever required. This has been done. In fact acceptance cumulative errors that might degrade
the system over time will incorporate test cases developed during integration testing.

6.3 TEST CASES

25

Serial
No.

Module

Error Checking

Description

Result

1.

Project

Check for different


module of same
project

Adding a new project

Pass

2.

Bugs

Verifying bugs for each


module

Pass

4.

Employee

Updating employee

Pass

Priorities

Bugs of an each
module for every
project
Check for correct
user ID for managing
project
Highest priority to be
handle first

Updating priorities

Pass

Status

Check for incomplete Updating status


project

Table 6.3.1 Test Cases

CHAPTER 7
SYSTEM IMPLEMENTATION

Pass

26
System implementation is a stage in the project where the theoretical designs turned into
working system. The most crucial stage is the user confidence that the new system will work
effectively and efficiently.
The performance of reliability of the system was tested and it gained acceptance. The
system was implemented successfully. Implementation is a process that means converting a new
system into operation.
Proper implementation is essential to provide a reliable system to meet organization
requirements. During the implementation stage a live demon was undertaken and made in front
of end-users.
Implementation is a stage of project when the system design is turned into a working
system. The stage consists of the following steps.
i) Testing the developed program with sample data.
ii) Detection and correction of internal error.
iii) Testing the system to meet the user requirement.
iv) Feeding the real time data and retesting.
v) Making necessary change as described by the user.

CHAPTER 8
CONCLUSION AND FUTURE ENHANCEMETS
8.1 CONCLUSION

27
The project entitled Executive Join is an online community designed to make social life
more active and stimulating. By using this network user can maintain existing relationship with
pictures and messages, and establish new ones by reaching out to people ever met before.
The current system does not put any restriction to open an account, which has resulted in
the creation of fake details of a user because of lack of validations. The system does not put any
restriction in the creation of communities, which has resulted in the creation of communities,
which are illegal or misguiding in many ways. The existing system do not provide an for
searching .The system administrator has only limited control on the system and as a result the
users are allowed to run system according to their interest .So many malpractices can occur. The
new system provides many facilities to overcome the same.
It has been a great pleasure for me to work on this exciting and
challenging project. This project proved good for me as it provided practical
knowledge of not only programming in ASP.NET and SQL Server, but also
about all handling procedures.

8.2 FUTURE ENHANCEMENTS

28
The software has used a good for all concept and further addition and modification can be
accomplished very easily. Right from the beginning of the project provisions were provided to
upgrade the software to meet further enhancement
.
Software development in ASP.NET is very flexible and all application was tested with
live data and has proved to respond successfully. So it is clear that the software readily accepts
changes and it will definitely work efficiently.
The system can be extended in the future by implementing various services which
facilities communication among the members possible through methods such as chatting, teleconferencing and video conferencing.

Vous aimerez peut-être aussi