Académique Documents
Professionnel Documents
Culture Documents
CHAPTER 1
INTRODUCTION
1.1 ORGANIZATION PROFILE
STRAWBERRY LAB (P) Ltd. Infopark, Kochi was incorporated as a Private Limited
Company in 2006 with the objective of providing quality service in the field of Information
Technology. It had started with the sole objective of providing quality service in the fields of
Information Technology and IT enabled services adhering to IT industrys international quality
standards.
STRAWBERRY, a software solution firm, with proven business credentials
Headquartered in Scotland, UK. Having its presence in multiple continents. The company is a
leading global consulting and IT services company that offers a wide array of solutions for a
range of business functionalities. It is a rapidly expanding, profit making company with its
software development centers across India and overseas.
The company is totally committed to ensure highest quality standards and to understand
changing customer needs. With its trained professionals including those trained in the USA, we
can provide top class service in such areas as Software Development, Software Consultancy,
Cyber Search, Internet Services, Domain & Server Space, Web Designing & Hosting and other
IT enabled services.
At here, it strives to understand changing customer needs, and enrich their quality of life
by simply making the technology readily usable for them. It is proud to have solid Information
Systems Professionals, including those trained abroad, design, develop, enhance, implement,
maintain and support various aspects of Information Technology.
2
CHAPTER 2
SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
The current systems do not put any restriction to open an account, which has resulted in
the creation of fake details of a user because of lake of validations. The system does not put any
restriction in the creation of communities, which has resulted in the creation of lot of
communities, which are illegal or misguiding in many ways. The existing system does not
provide an option for detailed searching.
The system administrator has only limited control on the system. And a result the users
are allowed to run the system according to their interest. So many malpractices occur. The new
system provides many facilities to overcome the same.
2.1.1 DRAWBACKS
i)Lack of security.
ii)Lack of validation
iii)Lack of searching.
5
2.3.2 OPERATIONAL FEASIBILITY
Operational feasibility analyses the flexibilities of the programs. Once the errors are
known the code should be flexible to change or to remove the unwanted part. The performance
of the ftp client with server monitoring is analyzed by giving the input in different ways.
According to the input if the output is accurate the program will show high performance and
accuracy. The responds time of the software is also noted for a particular input. Based on the
result, of these tests, we can recommend appropriate architecture and design-level changes to
ensure that the users have getting the best level of service. Executive Join shows high
performance. It is highly flexible.
6
CHAPTER 3
SYSTEM SPECIFICATION
Requirement specification plays an important part in the analysis of a system. Only when
the requirement specifications are properly given, it is possible to design a system, which will fit
into required environment. It rests largely in the part of the users of the existing system to give
the requirement specifications because they are the people who finally use the system. This is
because the requirements have to be known during the initial stages so that the system can be
designed according to those requirements.
3.1. HARDWARE REQUIREMENTS
Processor
Pentium IV
RAM
1024MB
Hard Disk
20GB
Keyboard
102 keys
Monitor
Mouse
Scrolling Mouse
Front End
: ASP.NET
Back End
IDE
Web Server
: IIS Server
7
CHAPTER 4
SOFTWARE DESCRIPTION
4.1 ASP.NET
4.1.1 Server Application Development
Server-side applications in the managed world are implemented through runtime hosts.
Unmanaged applications host the common language runtime, which allows your custom
managed code to control the behavior of the server. This model provides you with all the features
of the common language runtime and class library while gaining the performance and scalability
of the host server.
The following illustration shows a basic network schema with managed code running in
different server environments. Servers such as IIS and SQL Server can perform standard
operations while your application logic executes through the managed code.
4.1.2 Server-Side Managed Code
ASP.NET is the hosting environment that enables developers to use the .NET Framework
to target Web-based applications. However, ASP.NET is more than just a runtime host; it is a
complete architecture for developing Web sites and Internet-distributed objects using managed
code. Both Web Forms and XML Web services use IIS and ASP.NET as the publishing
mechanism for applications, and both have a collection of supporting classes in the .NET
Framework.
ASP.NET is a programming framework built on the common language runtime that can
be used on a server to build powerful Web applications. ASP.NET offers several important
advantages over previous Web development models.
Enhanced Performance. ASP.NET is compiled common language runtime code running
on the server. Unlike its interpreted predecessors, ASP.NET can take advantage of early binding,
just-in-time compilation, native optimization, and caching services right out of the box. This
amounts to dramatically better performance before you ever write a line of code.
World-Class Tool Support. The ASP.NET framework is complemented by a rich toolbox
and designer in the Visual Studio integrated development environment. WYSIWYG editing,
drag-and-drop server controls, and automatic deployment are just a few of the features this
powerful tool provides.
4.1.4 Language Support
The Microsoft .NET Platform currently offers built-in support for three languages: C#,
Visual Basic, and JScript.
4.1.5 SQL Server
A database management, or DBMS, gives the user access to their data and helps th m
transform the data into information. Such database management systems include dBase, paradox,
IMS, SQL Server and SQL Server. These systems allow users to create, update and extract
information from their database.
9
relating to a particular person, thing or event are bundled together to form a single complete unit
of data, called a record (it can also be referred to as raw or an occurrence). Each record is made
up of a number of fields. No two fields in a record can have the same field name.
4.1.1 NET FEATURES
The .NET Framework has two main components: the common language runtime and
the .NET Framework class library. The common language runtime is the foundation of the .NET
Framework. You can think of the runtime as an agent that manages code at execution time,
providing core services such as memory management, thread management, and Removing, while
also enforcing strict type safety and other forms of code accuracy that ensure security and
robustness.
The .NET Framework can be hosted by unmanaged components that load the common
language runtime into their processes and initiate the execution of managed code, thereby
creating a software environment that can exploit both managed and unmanaged features. The
.NET Framework not only provides several runtime hosts, but also supports the development of
third-party runtime hosts.
Internet Explorer is an example of an unmanaged application that hosts the runtime Using
Internet Explorer to host the runtime enables you to embed managed components or Windows
Forms controls in HTML documents. Hosting the runtime in this way makes managed mobile
code possible, but with significant improvements that only managed code can offer, such as
semi-trusted execution and secure isolated file storage.
10
The common language runtime manages memory, thread execution, code execution, code
safety verification, compilation, and other system services. These features are intrinsic to the
managed code that runs on the common language runtime.
With regards to security, managed components are awarded varying degrees of trust,
depending on a number of factors that include their origin
11
b) Net Framework Class Library
The .NET Framework class library is a collection of reusable types that tightly integrate
with the common language runtime. The class library is object oriented, providing types from
which your own managed code can derive functionality. This not only makes the .NET
Framework types easy to use, but also reduces the time associated with learning new features of
the .NET Framework. In addition, third-party components can integrate seamlessly with classes
in the .NET Framework.
As you would expect from an object-oriented class library, the .NET Framework types
enable you to accomplish a range of common programming tasks, including tasks such as string
management, data collection, database connectivity, and file access. In addition to these common
tasks, the class library includes types that support a variety of specialized development scenarios.
For example, you can use the .NET Framework to develop the following types of applications
and services:
Console applications.
Scripted or hosted applications.
Windows GUI applications (Windows Forms).
ASP.NET applications.
XML Web services.
Windows services.
The Windows Forms classes are a comprehensive set of reusable types that vastly
simplify Windows GUI development. If you write an ASP.NET Web Form application, you can
use the Web Forms classes.
CHAPTER 5
12
PROJECT DESCRIPTION
5.1 PROBLEM DEFINITION
Executive Join is a social network which helps the user to maintain existing
relationships with pictures and messages, and establish new ones by reaching out to people
you've never met before.
5.2 OVERVIEW OF THE PROJCET
It is a web based system that can be a useful component in our online presence.
This project consists of many forms, by using the login form user can enter into the project and
create their own accounts by using registration form. After registration user can login to the
entire site. The registered user can search for their friends, send scraps to them and can upload
photos. It is a great way for users to communicate and achieve instantaneous results. Certainly
this system has had a tremendous impact on the way information is exchanged over the web.
It also helps the user to find people who share their hobbies and interests. User can also
create and join a wide variety of online communities to discuss current events, reconnect with
old school mates.
13
Executive Join System handles system in four modules
5.3.1 MODULES
i)Administrator
ii)User
iii) Security
i) Administrator
Administrator controls all the functionalities of this web site. Administrator handles the
registration, Community, Abuses and the entire request made by the users. At each entry into the
data base, the administrator has got the power to edit the details before adding to its original list
of items. And it is being performed with in a specified time stamp. Validation of profiles is done
manually. Administrator meticulously validates each and every profile carefully on specific
criterion before it is added to our database. Hence, it takes 24 hrs to validate all the profiles that
are being added on one particular day. Almost every word counts. Administrator has also got the
power to delete an added Item from the list.
a)View members
Administrator has the privilege to view, delete, edit and update the information of the
registered users. After registration of each user the Admin should check their profile for
approving whether the user is valid or invalid, this would take max. 24 hours.
b)View members
Administrator has the privilege to view, delete, edit and update the information of the
registered communities.
c) Approve communities
Administrator can approve the communities created by registered users. If the community
is fake then Admin must delete the community within 24 hours according to the report abuse.
ii) USER
14
Executive join is an online community website designed for friends. This social network
can help user both maintain existing relationships and establish new ones by reaching out to
people they've never met before. This makes it easy to find people who share your hobbies and
interests
a) Create Account
Users must create account. After registration users can login in to the entire site.
And also user can view, edit and delete their profile.
b)View members
The registered users can see their friends list and also view their profile. After login the
users can search their friends by name, location...etc, and also can make scrap to them.
c) Add Friends
The registered users can add friends and approve friends requests. After login the
registered user can search their friends by umpteen options and can send request to other users.
d)View members
The registered users can view messages send by their friends. And also the registered user
can send messages to their friends.
e) Delete friends
The registered users can delete friends from their friends list. And also can report abuse.
f)Searching
Searching allows users to search for friends based on users name.
Users can search user details by users name and they can also search community details by
community name.
g)Create community
The registered users can create communities and the owner can send join request.
15
h)Join community
The registered users can join community according to their interests. But the owner of the
community has to give approval for them.
iii) Security
a)Protect users Account
Users can help secure their own account and their online identity quickly and easily.
a.1) Don't share: Keep user username, password and personal information secret and change
user password regularly.
a.2) Avoid posting sensitive personal data, such as email addresses or pictures, in public
places.
b)Image upload policy
System encourages users to take advantage of our image upload features in both profiles
and communities by uploading personal pictures, such as photos of themselves or their pets.
Profiles or communities containing unwanted images will be permanently removed without
warning or prior notification.
b)Report abuse
If you're certain that you found content violating real world laws or our policies, you can
report it by clicking report abuse on any profile or community page.
When user selects report abuse, admin automatically receive a notification, and user
identity remains confidential. If based on the report admin discover that the content violates real
world laws or our policies, admin may immediately remove it and report any necessary
information to the appropriate authorities.
c) Ignore Other Users
16
Some users may receive unwanted messages, they can prevent another user from sending
messages, invitations, friend requests, and testimonials by adding that user to your ignore list.
Administrator /
User
Request
Friends
Corner
Request
Administrator /
User
17
1
Login
ADMIN
1.2
View
Members
REGISTER
1.1
Receive
Request
REQUEST
1.3
View
Communiti
es
COMMUNITY
1
Login
ADMIN
1.1
Receive
User
Requests
1.1.6
Search
1.1.1
Accept/ Reject
User
registration
REGISTER
1.1.3
Accept/ Reject
Community
registration
1.1.5
Check
Complaints
Details
COMPLAINT BOX
COMMUNITY
USERS
18
Details
1
Registration
USERS
User
Usrnm, pswrd
LOGIN
Login
5.4.5 SECOND LEVEL DFD - USER
Details
1
Registration
REGISTER
Complnt
Login
details
Result
Usrname,
Usrname, pswrd
User
pswrd
2.6
Complaint
Posting
Login
2.5
Search
2.1
Friends
Manageme
nt
Name
2.2
Profile
Manageme
nt
Details
2.3
Scrap
Manageme
nt
2.4
Community
Manageme
nt
scraps
.
REGISTR
FRIEND
PROFILE
PHOTO SCRAP
Name
comm.
Result
Details
COMMUNITY
Details
REGISTER
19
User
Usrname, pswrd
Login
2.1
Friends
Management
2.1.1
Receive
Friends
request
2.1.3
Search
2.1.2
View Friends
Profile
Name
name
FRIENDS
Details
REGISTR
FRIENDS
FRIENDS
20
21
5.6.2
table
Column name
Data type
Description
Int
widt
h
10
usr_id
Fst_name
Varchar
20
Firstname
Lst_name
Varchar
20
Lastname
Gender
Column name
Usr_name
Usr_name
Frnd_id
pwd
Frndtyp_id
Status
Msg
Varchar
Data type
Varchar
Varchar
Int
Varchar
Int
Varchar
Varchar
10 width
30 50
12
20
12
20
200
Sex
user ID
Friends
Description
Username
Username
Friend Id
password
Friend Type Id
Status
Message
Data type
width
Description
Int
Varchar(30)
10
30
Friend type ID
Type name
Data type
Int
Varchar(30)
width
Description
Scrap_ID
From_ID
22
to_id
time_sent
date_sent
msg
Varchar(30)
Datetime
Datetime
Varchar(2000)
To_ID
Time sent
Date sent
message
Data type
Varchar(40)
Int
Varchar(200)
Width
Description
username
Photo_ID
Photo path
23
Input design is a process of converting the user-oriented input into the computer based. The
data is fed into the system with simple interactive forms; the forms have been supplied with
messages. So that user can enter data without facing any difficulty. The data is validated
whenever it requires in the project. This ensures that only the correct data have been incorporated
into the system.
The goal of the designing input data is to make the automation an easy and free from errors as
possible. For providing a good input design for the application easy data input and selection
features are adopted.
CHAPTER 6
SYSTEM TESTING
24
Testing is vital to the success of the system and makes the logical assumption that if all
parts of the system are correct, the goal will be successfully achieved. All tests should be
traceable to the requirements. The testing procedures are as follows,
(i) Unit Testing
(ii) Acceptance Testing
25
Serial
No.
Module
Error Checking
Description
Result
1.
Project
Pass
2.
Bugs
Pass
4.
Employee
Updating employee
Pass
Priorities
Bugs of an each
module for every
project
Check for correct
user ID for managing
project
Highest priority to be
handle first
Updating priorities
Pass
Status
CHAPTER 7
SYSTEM IMPLEMENTATION
Pass
26
System implementation is a stage in the project where the theoretical designs turned into
working system. The most crucial stage is the user confidence that the new system will work
effectively and efficiently.
The performance of reliability of the system was tested and it gained acceptance. The
system was implemented successfully. Implementation is a process that means converting a new
system into operation.
Proper implementation is essential to provide a reliable system to meet organization
requirements. During the implementation stage a live demon was undertaken and made in front
of end-users.
Implementation is a stage of project when the system design is turned into a working
system. The stage consists of the following steps.
i) Testing the developed program with sample data.
ii) Detection and correction of internal error.
iii) Testing the system to meet the user requirement.
iv) Feeding the real time data and retesting.
v) Making necessary change as described by the user.
CHAPTER 8
CONCLUSION AND FUTURE ENHANCEMETS
8.1 CONCLUSION
27
The project entitled Executive Join is an online community designed to make social life
more active and stimulating. By using this network user can maintain existing relationship with
pictures and messages, and establish new ones by reaching out to people ever met before.
The current system does not put any restriction to open an account, which has resulted in
the creation of fake details of a user because of lack of validations. The system does not put any
restriction in the creation of communities, which has resulted in the creation of communities,
which are illegal or misguiding in many ways. The existing system do not provide an for
searching .The system administrator has only limited control on the system and as a result the
users are allowed to run system according to their interest .So many malpractices can occur. The
new system provides many facilities to overcome the same.
It has been a great pleasure for me to work on this exciting and
challenging project. This project proved good for me as it provided practical
knowledge of not only programming in ASP.NET and SQL Server, but also
about all handling procedures.
28
The software has used a good for all concept and further addition and modification can be
accomplished very easily. Right from the beginning of the project provisions were provided to
upgrade the software to meet further enhancement
.
Software development in ASP.NET is very flexible and all application was tested with
live data and has proved to respond successfully. So it is clear that the software readily accepts
changes and it will definitely work efficiently.
The system can be extended in the future by implementing various services which
facilities communication among the members possible through methods such as chatting, teleconferencing and video conferencing.