Vous êtes sur la page 1sur 52

ABSTRACT

This project work deals with “ONLINE GARMENT ADVETISING”. This


project developed by using PHP as front end and MYSQL as a back-end. These project
aims at saving time and improving of the various modules that were involved .

The modules involves in this project are:

o Administrator
o Men
o Women
o Kids
o Accessories.

The need for computerization was to make advertise for a garment


company to attract world wide customers.This also helps in the elimination of clerical
error, which is naturally due to huge volume of work.

1
1. INTRODUCTION

The Online garment advertising is a large web project executed for an American
garment company. The project consists of various modules like admin and price
knowing. The team of programmers employed to undertake this module consists of three
Component Developers, a Photoshop designer and one Relational Database
Administrator. The component developers are responsible for creating/deploying all
COM components using PHP or Hypertext Preprocessor software as well as creating the
HTML pages using the Dreamweaver components. The DBA is responsible for
maintaining and troubleshooting all database-related issues like privilege control,
granting access to network users and internet users, maintaining security logs,
supervising inter-server database connectivity, administering the Web Server and
controlling access to the Web Server (IIS machine).

The Online garment advertising module mainly deals with advertising products
through the internet. Products like Men’s wear, Women’s wear, kids wear & accessories
are advertised in the site. The web application will retrieve product information from the
database and display it required number of items per page, with images, pricing
information . Users will sign into the website with a userid and password. They can
choose the required model and color of their choice. They will choose the product of their
choice and know their price details

2
1.1 Problem Definition

The Online garment advertising is one of the web page development project. The
main aim of this project is to make a business through online all over the world by sitting
in one place. This web page is developed for the American garment company. They
decided to market their product all over the world. Through online they will give the
advertisement for their product and make the customers to purchase it. The company
contains apparels for men’s, women’s, kids wears etc...

The client side was designed in attractive and interactive manner. When the customer
open the website the Homepage will be displayed. In home page there will be a sign in
option for a registered user. The new user can also register by registration option in the
page. The guest is also allowed to view the web site without registration but he can’t
view any price details of products without registration. He is allowed only to surf
through the website. The links to the other pages are available in the home page.

The Homepage has a link to categories of a product displayed in it. For each product
available in the Homepage has different categories and it also has different products. This
products and categories are fetched from the database. They are stored in database by the
administrator. The products which are available in the store are inserted in the database.

This website gives information to the user on a wide vision .The user can see the
various models available for various persons by simply select the model.The end user
also know the various colours available in the model by right side colour menu.The
registered user can also know the price of various models according to their register
information.The two types of end users are ASI/PPAI or RETAILER.The website
retrieve data about the price according to the end user category .

The admin section is used by the administrator for adding product details in the
database. It is maintained by the administrator only. The administrator has the separate
userid and password, so no one can enter in to the admin section. The administrator will
add the product prices

3
1.2 Company Profile

History

Experience counts more than anything else in the offshore outsourced health care
services market…" say our numerous clients. And it is our steadfast commitment backed
by our years of experience in Offshore Outsourcing that has helped them reap rich
dividends. Nittany is now the largest provider of offshore outsourced services in the
medical billing and collections service space. We understand the rules of the billing and
collections business across geographies and medical specialties, and are constantly fine-
tuning our systems, processes and people to stay on top of our accounts. We understand
that, as part of your providers' revenue cycle our role must extend well beyond mere
manpower arbitrage. Fast turnaround times, high quality levels, constant innovation must
all come together to ensure that your practise makes More Money Faster. Something on
our

Product and Services

CLAIM ADMINISTRATION SERVICES Track record: Pioneer in third-party


claim administration services Adjudicated both employer based insurance plans and
commercial schemes in the US Provided administration services for plans across multiple
states in the US Services: Claim processing Stop Loss Management Customer Services
Network Management File Management Information Services Speciality: We provide
adjudication services on all third party or proprietary platforms. Clients can also choose
to offer adjudication services on our in-house software package. The software is built
around a rule-based engine that can be customized to suit the regulations of different risk
carriers and their products. It also enables knowledge-based edits and extensive reporting
systems to track provider contracts and claim histories. The software has extensive
reporting features and supports all federal and state reporting as well. Special features of
the software include flexible fee schedule setup, automated EOB design and extensive
security against data abuse through audit trails and restricted access provisions .

Other Information

Nittany Outsourcing Services Pvt Ltd, 141 Old Mahabalipuram Road,


Kottivakam, Chennai 600041 INDIA. Phone : 91-44-24541581 Fax : 91-44-24540867

4
2. PROJECT DESCRIPTION

The project entitled “Online garment advertising” is one of the web application
projects. The main aim of this project is to enable the customer to know the various
models available in the garments through online.

The following are the modules of the project. It has two sections of modules in a
project.
1. Admin section

2. Client section

Project Modules:

Admin section:

The admin section is used by the administrator of this website. He will


maintain it by the use of following modules.

Admin login:

Admin login module is used by administrator to login to the admin section


of website. He will register with a name and password for logging in. After the
registration completed he will be provided with the userid and password. It will be
his id and password. He is given the id and password for the protection and
maintenance of the website. He is responsible for the errors and non availability
of products in the store.

Price Details:

Price details is the main module in the admin section. In this section the
administrator will add the price of products available in the garment. There are
two sections available in the price module. They are for retailers and whole salers.

5
Client section:

The client section is used by the clients whose browse this website. They
will browse through the modules available in this section. The modules a

1. Men;

Gkwc 6ukIn this men module we can have lot of models for men’s
wear.And we have lot of colours in every model.The available colours in every
model is in the right hand side.When the client move the mouse over the various
colours the available model are also change in the appropriate colour.The
customer download the product and model for their various usages.

2. Women:

In this women module we can have lot of models for women’s wear.And
we have lot of colours in every model.The available colours in every model is in
the right hand side.When the client move the mouse over the various colours the
available model are also change in the appropriate colour.The customer download
the product and model for their various usages.

3. Kids:

In this kids module we can have lot of models for kids wear.And we have
lot of colours in every model.The available colours in every model is in the right
hand side.When the client move the mouse over the various colours the available
model are also change in the appropriate colour.The customer download the
product and model for various usages.

4.Accessories:

In this accessories module we can have lot of models like bags,caps and
blankets..And we have lot of colours in every model.The available colours in
every model is in the right hand side. available model are also change in the
appropriate colour.The customer download the product and model for various
usages.

6
3. SYSTEM ANALYSIS

System Analysis is an activity that encompasses of the tasks that are collectively
called Computer System Engineering. Data are collected to be used in the complete
system further for the decision-making. The basic requirements are checked out
according to the given subject. The emphasis is on identifying what is needed from the
system, not how the system will achieve its goals. Thus in the system analysis part it is
that the complete working moves from the logical to the physical aspect of the complete
life cycle.

System analysis refers to the process examining the situation of an organization


with the view of improving it through better procedures and methods. It is a process of
gathering and interpreting facts, diagnosing problems, and using the information to
recommend improvements to the system.

3.1 Requirement Analysis

Analysis gathers the requirements for the system. This stage includes a detailed
study of the business needs of the organization. Options for changing the business
process may be considered. Design focuses on high level design like, what programs are
needed and how are they going to interact, low-level design (how the individual programs
are going to work), interface design (what are the interfaces going to look like) and data
design (what data will be required). During these phases, the software's overall structure
is defined. Analysis and Design are very crucial in the whole development cycle. Any
glitch in the design phase could be very expensive to solve in the later stage of the
software development. Much care is taken during this phase. The logical system of the
product is developed in this phase.

7
In this phase, the development team visits the studies their official requirements.
They investigate the need for possible software automation in the given system. By the
end of the feasibility study, the team furnishes a document that holds the different
specific recommendations for the candidate system. It also includes the personnel
assignments, costs, project schedule, and target dates. The requirements gathering process
is intensified and focused specially on software. To understand the nature of the
program(s) to be built, the system engineer ("analyst") must understand the information
domain for the software, as well as required function, behavior, performance and
interfacing. The essential purpose of this phase is to find the need and to define the
problem that needs to be solved.

Requirement analysis is one of the first and foremost part of system development
life cycle. It is very important too as company has to prove the feasibility of proposed
system.

Project Preliminary Investigation

A request to receive requirements from user can be made for many site, in any
case user can enter the daily discharge. The data will save correctly is the preliminary
investigation.

Determination of the System Requirement:

At the heart of the system analysis is a detailed understanding of all-important


facts of the project which are under investigation. Analyst, working closely with the
client and user, must study the project’s requirement to answer these key questions-

1. What is being done


2. How is being do
3. How frequently does it occur?

8
3.1 Existing System:

This system is what we have at present? Using this system we have to make our
proposed system. Before designing we must know about our current system. What is its
scope and if it has some limitations, then we must describe them in details. So that user
can understand each and every thing in detail. In this project the current system is done
manually and the marketing is done with in a country only.

In the fastly growing world because of globalisation and computerization the


world market become very small.Every company want the very popular advertising
media.Which Cover and reach the world wide customers.The existing system are
newspapers and television.The advertisements are reach to the small region of peoples.In
existing system the customers canot see the all models and colours available in the
company.

And the customers canot know what are the offeref for whole buyers and retail
buyers in the existing system.The main brawback of the existing systen is time
consuming.And the existing systen is not much interactive.

Drawbacks of the Existing System

♦ Time Consuming.
♦ Advanced search mode not available
♦ Not interactive

9
3.2 Proposed System:

Design phase follows analysis of the system. But before starting the design we
should have a model of proposed system. We attempt to evolve a system, which will be
evaluated during implementation, and testing phase. The proposed system of our project
is to make it computerized and to market the products all over the world.

The new technology is used the internet as a advertising media.These website


reach the maximum number of customers in the world.The customers know/see the
various colours and models available in the garment from their home by simply click the
computer button.There are various type of customers and the whole saler expect offer
from the company .So the we provide two types of prices for whole buyer and retail
buyer.
The proposed system is very user friendly and interactive.The data is retrieve
Very fast from the data base.So we know that the proposed system is mostly better then
the exixting system.

Advantages of Proposed System:

♦ Reach maximum number of customers in the world.


♦ Customer directly see the various models and colors available.
♦ Customer know the various prices for retailers and whole saler.
♦ User friendly and interactive.

10
Feasibility Study

A feasibility study is carried out to select the best system that meets the
performance requirements. This entails identification, description and evaluation
of candidate systems and selection of the best system from the job. It proposes
one or more feasible conceptual solution that gives an idea of what the new
system will. It also indicates what are required by the system and what output will
be produced.

Consideration of Candidate System

In today’s business, there is more demand for computer services than there
are resources available to meet the demand. The demand is made up of the
following:

• Operations of existing system

• Maintenance that focuses on “patching” programs often representing over 50


percent of maintenance.

• Enhancements that involve major modifications in program structure or equipment

• Requests from candidate system

All these demands require resources-human, financial, and technological. Thus


the basic problem is to match the demands for services with the available
resources.

11
Technical Feasibility

Technical feasibility centers on the existing computer system (hardware,


software etc) and to what extent it can support the proposed addition. This
involves financial considerations to accommodate technical enhancements. If the
budget is a serious constraint then the project is judged not feasible. On careful
observation it it concluded that the necessary equipment and technology exists to
do what is suggested. The technical guarantees of accuracy, Reliability, access
power and data security is also available. The system can also be developed if the
new technology is required. Hence the system is found to be technically feasible.

Economic Feasibility

Economic analysis is the most frequently used method for evaluating the
effectiveness of a candidate system. More commonly known as cost/benefit
analysis the procedure is to determine the benefits and savings that are expected
from a candidate system and compare them with the costs. if the benefit
outweighs the costs, then the decision is made to design and implement the
system. Otherwise further justification or alterations in the proposed system will
have to be made if it is to have a chance of being approved. This is an ongoing
effort that improves in accuracy at each phase of the system life cycle.

In the proposed site the financial value of benefits cannot be calculated. However
the system entails the following benefits:

• User can access the data on net.

• Completing jobs in few hours.

• Producing reports with no errors.

• More satisfied customers.

12
3.3 Data Flow Diagrams

User

No Sign Up
New User 1
Validate

Yes

Collections Search

Kids Wear Price retailer


Men’s Wear Price whole sale
Female’s Wear
Accessories

Children

Database 1
13
3.4 Data Dictionary:
DATABASE: mvsport;

Table: useradmin

Table: mv_members_asi;

Table: mv_members_retail;

14
Table: mv_price_asi;

Table: mv_price_retail;

15
4. SYSTEM CONFIGURATION

System Configuration:

The basic software and hardware requirements for the project include the following: -

4.1 On the Server side

Hardware Requirements:

Processor : Intel Pentium Xeon Processor.

RAM : 1024 MB RAM.

Hard Disk : Seagate HDD 80 GB 7200RPM.

Floppy Drive : 1.44 MB.

Monitor : 14” Color Monitor.

Peripheral : Mouse, Keyboard, UPS.

Printer : Laser Printer.

4.1 On the Client side

Hardware Requirement:

Processor : Any Pentium based client preferably Pentium IV.

Memory : 128MB DRAM, DDR-266.

Storage : 512MB (possibly 1GB) NAND SLC type flash memory.

16
4.2 On the Server side

Software Requirements:

OPERATING SYSTEM : Microsoft Windows 2000 Advanced Server.

PHP : Is a widely-used Open Sourc scripting language.

APACHE : Web Server version is 1.3.31

MYSQL : Database Server version is 5.0.21. or above

4.2 On the Client side

Software Requirement:

Browser : Internet Explorer is required.

Operating System : Microsoft Windows 2000 Advanced Server .

17
5.SOFTWARE DESCRIPTION

OPEN SOURCE

Open source usually refers to the software that is released with source code under
a license that ensures that derivative works will also be available as source code, protects
certain rights of the original authors, and prohibits restrictions on how the software can
be used or who can use it.
Open source doesn't just mean access to the source code. The distribution terms of
open-source software must comply with the following criteria:

1. Free Redistribution:

The license shall not restrict any party from selling or giving away the software as
a component of an aggregate software distribution containing programs from several
different sources. The license shall not require a royalty or other fee for such sale.

2. Source Code:

The program must include source code, and must allow distribution in source
code as well as compiled form. Where some form of a product is not distributed with
source code, there must be a well-publicized means of obtaining the source code for
no more than a reasonable reproduction cost preferably, downloading via the Internet
without charge. The source code must be the preferred form in which a programmer
would modify the program. Deliberately obfuscated source code is not allowed.
Intermediate forms such as the output of a preprocessor or translator are not allowed.

3. Derived Works:

The license must allow modifications and derived works, and must allow them to
be distributed under the same terms as the license of the original software.

18
4. Integrity of The Authors Source Code:

The license may restrict source-code from being distributed in modified form
only if the license allows the distribution of "patch files" with the source code for
the purpose of modifying the program at build time. The license must explicitly
permit distribution of software built from modified source code. The license may
require derived works to carry a different name or version number from the
original software.

5. No Discriminations Against Persons or Groups:

The license must not discriminate against any person or group of persons.

6. No Discrimination Against Field of Endeavour:

The license must not restrict anyone from making use of the program in a
specific field of endeavor. For example, it may not restrict the program from
being used in a business, or from being used for genetic research.

7. Distribution of License:

The rights attached to the program must apply to all to whom the program is
redistributed without the need for execution of an additional license by those
parties.

8. License Must Not Be Specific to a Product:


The rights attached to the program must not depend on the program’s being
part of a particular software distribution. If the program is extracted from that
distribution and used or distributed within terms of the program’s license, all

19
parties to whom the program is redistributed should have the same rights as those
that are granted in conjunction with the original software distribution.

9. License Must Not Restrict Other Software:

The license must not place restrictions on other software that is distributed
along with the licensed software. For example, the license must not insist that all
other programs distributed on the same medium must be open-source software.

10. License Must Be technology-Neutral:


No provision of the license may be predicated on any individual technology or
style of interface.

PHP
PHP stands for Hypertext Preprocessor. The initials 'PHP' originally meant
Personal Home Page. The Open Source community renamed it Hypertext Processor, in
keeping with the recursive acronym tradition. Its simplicity in comparison to its elder
brother Perl, leads some aficionados to nickname it People Hate Perl.

Page contents can be generated automatically in PHP. In short, this means that
certain parts of your pages are produced by a program that can write HTML. So you can
be sure that the resulting contents can be read by any browser that understands HTML;
you need not worry about that. You can also interact with a database, such as MySQL, an
open source professional database management system. Today, the Apache/PHP/MySQL
trio forms one of the most popular professional Web platforms in the world.

Another important feature of PHP as a server-side scripting language is its ability


to receive and process HTTP requests containing data collected from a HTML form. This
way, you can easily update a database with the collected data or return customized
information adapted to the user input.

20
Session management is another of PHP's strengths since it helps you to identify
your users from one page to another. Visit tracking or customizing systems can quickly
become exciting applications.

PHP is a so-called server-side scripting language, which means that a PHP


program is interpreted on a server, unlike JavaScript, which is a client-side language, i.e.
one interpreted by the browser. The concept of active pages was born with the advent of
the ASP technology created by Microsoft. They are a mixture of the usual HTML
elements and the tags that enclose the program code. The advantage is that, in a HTML
editor, a script remains plainly visible for the Web designer, while still containing all the
processing logic used by the programmer.

So the development of dynamic pages calls for several different skills:


• Those of a designer, who creates the static page (a template) in any HTML editor

• Those of a programmer, who writes the program delineated by specific tags.

This code is made up of two main types:


• The treatments, which are generally located at the beginning of the files. They

describe all the actual functions.


• The display instructions, which write the results of the procedures in the HTML
code using instructions such as print or echo.

PHP (recursive acronym for "PHP: Hypertext Preprocessor") is a widely-used Open


Source general-purpose scripting language that is especially suited for Web development
and can be embedded into HTML.
Notice how this is different from a script written in other languages like Perl or C --
instead of writing a program with lots of commands to output HTML, you write an

HTML script with some embedded code to do something (in this case, output
some text). The PHP code is enclosed in special start and end tags that allow you to jump
into and out of "PHP mode".
What distinguishes PHP from something like client-side JavaScript is that the
code is executed on the server. If you were to have a script similar to the above on your
server, the client would receive the results of running that script, with no way of
determining what the underlying code may be. You can even configure your web server

21
to process all your HTML files with PHP, and then there's really no way that users can
tell what you have up your sleeve.

Benefits of getting open source:

• Full protection of your investment


• Make custom modification to satisfy your specific needs
• Can be used on your local server without internet connection
• No monthly fee payments

Open Source package includes:

• 100% PHP open source


• No encrypted files
• Comprehensive comments
• Installation script and Guide
• Developer Guide
• Database structure diagram

Speed of Development

Because PHP allows you to separate HTML code from scripted elements, you
will notice a significant decrease in development time on many projects. In many
instances, you will be able to separate the coding stage of a project from the design and
build stages. Not only can this make life easier for you as a programmer, it also can
remove obstacles that stand in the way of effective and flexible design.

PHP Is Open Source

To many people, "open source" simply means free, which is, of course, a benefit
in itself. To quote from the official PHP site at http://www.php.net/: This may sound a little
foreign to all you folks coming from a non-UNIX background, but PHP doesn't cost
anything. You can use it for commercial and/or non-commercial use all you want. You
can give it to your friends, print it out and hang it on your wall or eat it for lunch.

22
Welcome to the world of Open Source software! Smile, be happy, the world is good. For
the full legalese, see the official license. Well-maintained open source projects offer users
additional benefits, though. You benefit from an accessible and committed community
who offer a wealth of experience in the subject. Chances are that any problem you
encounter in your coding can be answered swiftly and easily with a little research. If that
fails, a question sent to a mailing list can yield an intelligent, authoritative response.

You also can be sure that bugs will be addressed as they are found, and that new
features will be made available as the need is defined. You will not have to wait for the
next commercial release before taking advantage of improvements. There is no vested
interest in a particular server product or operating system. You are free to make choices
that suit your needs or those of your clients, secure that your code will run whatever you
decide.

Performance
Because of the powerful Zend engine, PHP4 compares well with ASP in
benchmark tests, beating it in some tests. Compiled PHP leaves ASP far behind.

Portability
PHP is designed to run on many operating systems and to cooperate with many
servers and databases. You can build for a UNIX environment and shift your work to NT
without a problem. You can test a project with Personal Web Server and install it on a
UNIX system running on PHP as an Apache module

Apache Web Server

Apache is the most widely used HTTP-server in the world today. It surpasses all
free and commercial competitors on the market, and provides a myriad of features; more
than the nearest competitor could give you on a UNIX variant. It is also the most used
web server for a Linux system. A web server like Apache, in its simplest function, is
software that displays and serves HTML pages hosted on a server to a client browser that
understands the HTML code. Mixed with third party modules and programs, it can
become powerful software, which will provide strong and useful services to a client
browser.

Once you have DNS correctly setup and your server has access to the Internet,
you'll need to configure Apache to accept surfers wanting to access your Web site. The
Apache web server is a highly scalable product capable of running on many platforms
and serving thousands of pages a minute. It provides a stable and secure environment for
the host server, and is the industry leader in the web server market. The server package
comes bundled with most Linux distributions and only requires little configuration
changes (if any) to be up and serving pages immediately. If you're serious about your
web development and its a fully dynamic hosting environment you need, then Apache,

23
PHP and MySQL are perfectly suited together, and are also provided with most
distributions.

MySQL
MySQL is a multithread, multi-user SQL database management system(DBMS)
which has, according to MySQL AB, more than 10 million installations. The basic
program runs as a server providing multi-user access to a number of databases.

It was originally financed in a similar fashion to the JBoss model, MySQL was
owned and sponsored by a single for-profit firm, the Swedish company MySQL AB,
which holds the copyright to most of the codebase. The project’s source code is available
under terms of the GNU General Public License, as well as under a variety of proprietary
agreements.

Libraries for accessing MySQL databases are available in all major programming
languages with language specific APIs. In addition, an ODBC interface called MyODBC
allows additional programming languages that support the ODBC interface to
communicate with a MySQL database, such as ASP or ColdFusion. The MySQL server
and official libraries are mostly implemented in ANSI C/ANSI C++.

The MySQL Web site provides the latest information about MySQL software and
MySQL AB.

• MySQL is a database management system.

• A database is a structured collection of data. It may be anything from a simple


shopping list to a picture gallery or the vast amounts of information in a corporate
network. To add, access, and process data stored in a computer database, you
need a database management system such as MySQL Server. Since computers are
very good at handling large amounts of data, database management systems play

24
a central role in computing, as standalone utilities, or as parts of other
applications.

• MySQL is a relational database management system.


• A relational database stores data in separate tables rather than putting all the data
in one big storeroom. This adds speed and flexibility. The SQL part of “MySQL”
stands for “Structured Query Language.” SQL is the most common standardized
language used to access databases and is defined by the ANSI/ISO SQL Standard.
The SQL standard has been evolving since 1986 and several versions exist. In this
manual, “SQL-92” refers to the standard released in 1992, “SQL:1999” refers to
the standard released in 1999, and “SQL:2003” refers to the current version of the
standard. We use the phrase “the SQL standard” to mean the current version of
the SQL Standard at any time.

• MySQL software is Open Source.

• Open Source means that it is possible for anyone to use and modify the software.
Anybody can download the MySQL software from the Internet and use it without
paying anything. If you wish, you may study the source code and change it to suit
your needs. The MySQL software uses the GPL (GNU General Public License),
to define what you may and may not do with the software in different situations.
If you feel uncomfortable with the GPL or need to embed MySQL code into a
commercial application, you can buy a commercially licensed version from us.
See the MySQL Licensing Overview for more information .

• The MySQL Database Server is very fast, reliable, and easy to use.

• If that is what you are looking for, you should give it a try. MySQL Server also
has a practical set of features developed in close cooperation with our users. You
can find a performance comparison of MySQL Server with other database
managers on our benchmark page.

25
• The MySQL Database Software is a client/server system that consists of a multi-
threaded SQL server that supports different backends, several different client
programs and libraries, administrative tools, and a wide range of application
programming interfaces (APIs).

• We also provide MySQL Server as an embedded multi-threaded library that you


can link into your application to get a smaller, faster, easier-to-manage standalone
product.

• A large amount of contributed MySQL software is available. It is very likely that


your favorite application or language supports the MySQL Database Server.
The following table lists some examples of operating system file-size limits. This is
only a rough guide and is not intended to be definitive. For the most up-to-date
information, be sure to check the documentation specific to your operating system.
Operating System File-size Limit
Linux 2.2-Intel 32-bit 2GB (LFS: 4GB)
Linux 2.4+ (using ext3 filesystem) 4TB
Solaris 9/10 16TB
NetWare w/NSS file system 8TB
Win32 w/ FAT/FAT32 2GB/4GB
Win32 w/ NTFS 2TB (possibly larger)
MacOS X w/ HFS+ 2TB

Uses of MySQL

MySQL is a popular for web applications and acts as the database component of
the LAMP, MAMP, WAMP and XAMPP platforms (Linux/Mac/Windows-Apache-
MySQL-PHP/Perl/Python), and for open-source bug tracking tools like Bugzilla. Its
popularity for use with web applications is closely tied to the popularity of PHP and on
Rails, which are often combined with MySQL. PHP and MySQL are essential

26
components for running popular content management systems such as Joomla!,
WordPress, Google, EBay and Drupal. Wikipedia runs on Media Wiki software, which is
written in PHP and uses a MySQL database.
PhpMyAdmin

phpMyAdmin is software used for creating and maintaining MySQL databases.


You can access your MySQL account using phpMyAdmin.Once you successfully logged
in, a phpMyAdmin screen appear as shown below.are

Creating a table in your database


The left-hand frame in phpMyAdmin is used for navigation, when you log in,
you'll see the database you created displaying in this area. Tables will also show up under
each database once they are created.

Click on the database you created in the navigation frame and a new window will
appear on the right hand side.

27
We will now create the first table in the database, called "details". This is done by
using the Create new table feature. The name of the new table is typed into the Name:
field, and the number of columns in the table into Fields:. Please note that when you
create your own databases and tables, it's wise to plan them out carefully to allow for
growth - this exercise is only meant to help you to familiarize with basic
php/MySQL/phpMyAdmin functions.
After you click Go a screen similar to the following should appear. Notice that the
table title will now also appear under the database name in the left hand navigation frame.

We now need to enter the names and attributes of our table fields. Enter the
following information:
Field Type Length
id int 6
name char 100

28
telephone char 50
birthday char 50

The Length value indicates the maximum allowable length of characters for input.
There are many different values that can be set for Type; view further documentation
here. The Types specified in this example aren't the most efficient, but just used for the
purposes of this exercise. The "id" field, which will be used as a Primary key for this
table, has been set to auto increment, saving you from having to having to type in the
next number in sequence when you input records.
Once you've entered all the values, click Save. A screen similar to the following will
appear.

You've done it - the table is now created! You'll notice that the corresponding
SQL command for creating these fields is also displayed. While you don't really need to
know this for the purposes of this exercise, it doesn't hurt to get familiar with the lingo
over time.

29
Also on this page, you'll see many other options - explore these later on once you
are familiar with the way everything is working.

Java Script
JavaScript is a compact, object-based scripting language for developing client and
server Internet applications. Netscape Navigator interprets JavaScript statements
embedded in an HTML page, and LiveWire enables you to create server-based
applications similar to Common Gateway Interface (CGI) programs.
JavaScript is Netscape's cross-platform, object-based scripting language for client and
server applications. There are two types of JavaScript:

• Navigator JavaScript, also called client-side JavaScript


• LiveWire JavaScript, also called server-side JavaScript

JavaScript in Navigator
Netscape Navigator 2.0 (and later versions) can interpret JavaScript statements
embedded in an HTML page. When Navigator requests such a page, the server sends the
full content of the document, including HTML and JavaScript statements, over the
network to the client. The Navigator then displays the HTML and executes the
JavaScript, producing the results that the user sees.

JavaScript, the language


Client and server JavaScript differ in numerous ways, but they have the
following elements in common:
• Keywords, statement syntax, and grammar
• Rules for expressions, variables, and literals
• Underlying object model (although Navigator and LiveWire have different object
frameworks)
• Built-in objects and functions

30
Ajax
History of Ajax

Ajax is a concept – a way of making the web more interactive, and as such was never
really created or introduced. In fact, the concept existed much before it became popular.
However, the term was coined in 2005, by Jesse James Garrett, founder of adaptive Path.
With the introduction of the iframe element in HTML by Internet Explorer in 1996,
web developers can now asynchronously load another web page in a section of a
currently loaded page. By using an iframe with zero dimensions, you could use an iframe
to load content from another page, extract the relevant parts and inject it into your own
page, all in the background.
In 1999, the new XMLHttpRequest ActiveX control was developed by Microsoft for
Internet Explorer. The new object can asynchronously load pages, from any website as
desired by the developer. As of now, this is available in all major browsers such as
Firefox, Safari and Opera.
In 2006, this control was standardized by the World Wide Web consortium (W3C), in
a draft specification. As a result, once finalized, any new browser that plans to follow
web standards will have to support this object.

Ajax, which is sometimes referred to as Asynchronous JavaScript and XML, is an


exciting technology that has been taking the Web development world by storm. Ajax has
been largely spurred on by some innovative uses of the technology by Google with Gmail
(http://mail.google.com) and Google Maps (http://maps.google.com).

The idea behind Ajax is that you can send requests to a server, as you normally do;
but instead of refreshing the entire page, you use JavaScript to update only a portion of
the page. As a result, Web applications aren’t constantly forcing users to wait for entirely
new pages to be loaded in their browsers; the application feels more like a desktop
program.

A good example of this is Google’s Gmail application. To compose a new message,


you type the first few letters of the email address into a form. After you type the first few
letters, a new window prompts you to select from a list of email addresses of people you
have already emailed. In the background, Gmail is using Ajax to grab the list of email
addresses from the server and present this list—without sending a new HTML page to the
browser. Ajax offers you a fantastic way of providing a more dynamic experience for
your users.

31
Ajax is not a singular new technology, but instead a combination of a range of
technologies. These include the following:

• HTML
• CSs

6. DESIGN AND DEVELOPMENT

Database Designing is major factor to achieve a high level of efficiency in


development of any application. Improper database designing may leads to unexpected
results. So database designing is a crucial phase. Efficiency of presented work is totally
depends on database designed for the application because all the functionality provided
by this application is a output of query executed on developed database of application.
Various table developed for successfully implement this scenario is shown below:

6.1 DATABASE DESIGN:

DATABASE: mvsport;
Table: useradmin

Table: mv_members_asi;

32
Table: mv_members_retail;

Table: mv_price_asi;

33
Table: mv_price_retail:

34
6.2 Architectural Design

Price for
Asi
costomer

Price for
Retail
Login
customer
Admin

35
s

Forget
password

36
37
7. IMPLEMENTATION AND TESTING

Software Testing is the process of executing a program or system with the intent
of finding errors. Or, it involves any activity aimed at evaluating an attribute or
capability of a program or system and determining that it meets its required results
Software is not unlike other physical processes where inputs are received and outputs are
produced. Where software differs is in the manner in which it fails. Most physical
systems fail in a fixed (and reasonably small) set of ways. By contrast, software can fail
in many bizarre ways. Detecting all of the different failure modes for software is
generally infeasible

Unlike most physical systems, most of the defects in software are design errors,
not manufacturing defects. Software does not suffer from corrosion, wear-and-tear --
generally it will not change until upgrades, or until obsolescence. So once the software is
shipped, the design defects -- or bugs -- will be buried in and remain latent until
activation

Software bugs will almost always exist in any software module with moderate
size: not because programmers are careless or irresponsible, but because the complexity
of software is generally intractable -- and humans have only limited ability to manage
complexity. It is also true that for any complex systems, design defects can never be
completely ruled out.

Discovering the design defects in software is equally difficult, for the same reason
of complexity. Because software and any digital systems are not continuous, testing
boundary values are not sufficient to guarantee correctness. All the possible values need
to be tested and verified, but complete testing is infeasible. Exhaustively testing a simple
program to add only two integer inputs of 32-bits (yielding 2^64 distinct test cases)

38
would take hundreds of years, even if tests were performed at a rate of thousands per
second

Obviously, for a realistic software module, the complexity can be far beyond the
example mentioned here. If inputs from the real world are involved, the problem will get
worse, because timing and unpredictable environmental effects and human interactions
are all possible input parameters under consideration.

The testing activities are done in all phases of the lifecycle in an iterative software
development approach. However, the emphasis on testing activities varies in different
phases. This procedure explains the focus of testing in inception, elaboration,
construction and transition phases. In the inception phase most of requirements capturing
is done and the test plan is developed. In elaboration phase most of design is developed,
and test cases are developed. Construction phase mainly focuses on development of
components and units, and unit testing is the focus in this phase. Transition phase is about
deploying software in the user community and most of the system testing and acceptance
testing is done in this phase.

7.1 Purpose

The main purposes of this procedure are:

• To carry out comprehensive testing of the system/product and its individual


components in order to ensure that the developed system/product conforms to the user
requirements/ design.
• To verify the proper integration of all components of the software.
• To verify that all requirements have been correctly implemented.
• To identify and ensure defects are addressed prior to the deployment of the software.

39
7.2 Test Planning

Initial test plan addresses system test planning, and over the elaboration,
construction and transition phases this plan is updated to cater other testing requirements
of these phases, like, unit & integration testing.

The test Plan must contain the following

• Scope of testing
• Methodology to be used for testing
• Types of tests to be carried out
• Resource & system requirements
• A tentative Test Schedule
• Identification of various forms to be used to record test cases and test results

Testing is usually performed for the following purposes:

• To improve quality.

Quality means the conformance to the specified design requirement. Being


correct, the minimum requirement of quality, means performing as required under
specified circumstances. Debugging, a narrow view of software testing, is performed
heavily to find out design defects by the programmer. The imperfection of human
nature makes it almost impossible to make a moderately complex program correct the

40
first time. Finding the problems and get them fixed, is the purpose of debugging in
programming phase.

• For Verification & Validation (V&V)

Just as topic Verification and Validation indicated, another important purpose of


testing is verification and validation (V&V). Testing can serve as metrics. It is
heavily used as a tool in the V&V process. Testers can make claims based on
interpretations of the testing results, which either the product works under certain
situations, or it does not work. We can also compare the quality among different
products under the same specification, based on results from the same test.

7.3 Testing Methods Used For Project

There is a plethora of testing methods and testing techniques, serving multiple


purposes in different life cycle phases. Classified by purpose, software testing can be
divided into:

correctness testing, performance testing, reliability testing and security testing.


Classified by life-cycle phase, software testing can be classified into the following
categories: requirements phase testing, design phase testing, program phase testing,
evaluating test results, installation phase testing, acceptance testing and maintenance
testing. By scope, software testing can be categorized as follows: unit testing, component
testing, integration testing, and system testing

• Correctness testing

Correctness is the minimum requirement of software, the essential purpose


of testing. Correctness testing will need some type of oracle, to tell the right
behavior from the wrong one. The tester may or may not know the inside details

41
of the software module under test, e.g. control flow, data flow, etc. Therefore,
either a white-box point of view or black-box point of view can be taken in testing
software. We must note that the black-box and white-box ideas are not limited in
correctness testing only.

• Black-box testing

The black-box approach is a testing method in which test data are derived
from the specified functional requirements without regard to the final program
structure It is also termed data-driven, input/output driven or requirements-based
testing. Because only the functionality of the software module is of concern, black
box testing also mainly refers to functional testing -- a testing method emphasized
on executing the functions and examination of their input and output data. The
tester treats the software under test as a black box -- only the inputs, outputs and
specification are visible, and the functionality is determined by observing the
outputs to corresponding inputs. In testing, various inputs are exercised and the
outputs are compared against specification to validate the correctness. All test
cases are derived from the specification. No implementation details of the code
are considered.

It is obvious that the more we have covered in the input space, the more
problems we will find and therefore we will be more confident about the quality
of the software. Ideally we would be tempted to exhaustively test the input space.
But as stated above, exhaustively testing the combinations of valid inputs will be
impossible for most of the programs, let alone considering invalid inputs, timing,
sequence, and resource variables. Combinatorial explosion is the major roadblock
in functional testing. To make things worse, we can never be sure whether the

42
specification is either correct or complete. Due to limitations of the language used
in the specifications (usually natural language), ambiguity is often inevitable.
Even if we use some type of formal or restricted language, we may still fail to
write down all the possible cases in the specification. Sometimes, the
specification itself becomes an intractable problem: it is not possible to specify
precisely every situation that can be encountered using limited words.

And people can seldom specify clearly what they want -- they usually can
tell whether a prototype is, or is not, what they want after they have been finished.
Specification problems contributes approximately 30 percent of all bugs in
software.

The research in black-box testing mainly focuses on how to maximize the


effectiveness of testing with minimum cost, usually the number of test cases. It is
not possible to exhaust the input space, but it is possible to exhaustively test a
subset of the input space. Partitioning is one of the common techniques. If we
have partitioned the input space and assume all the input values in a partition is
equivalent, then we only need to test one representative value in each partition to
sufficiently cover the whole input space. Domain testing partitions the input
domain into regions, and consider the input values in each domain an equivalent
class. Domains can be exhaustively tested and covered by selecting a
representative value(s) in each domain. Boundary values are of special interest.
Experience shows that test cases that explore boundary conditions have a higher
payoff than test cases that do not. Boundary value analysis requires one or more
boundary values selected as representative test cases. The difficulties with domain
testing are that incorrect domain definitions in the specification can not be
efficiently discovered.

Good partitioning requires knowledge of the software structure. A good


testing plan will not only contain black-box testing, but also white-box
approaches, and combinations of the two.

43
• White-box testing

Contrary to black-box testing, software is viewed as a white-box, or glass-


box in white-box testing, as the structure and flow of the software under test are
visible to the tester. Testing plans are made according to the details of the
software implementation, such as programming language, logic, and styles. Test
cases are derived from the program structure. White-box testing is also called
glass-box testing, logic-driven testing or design-based testing.

There are many techniques available in white-box testing, because the


problem of intractability is eased by specific knowledge and attention on the
structure of the software under test. The intention of exhausting some aspect of
the software is still strong in white-box testing, and some degree of exhaustion
can be achieved, such as executing each line of code at least once (statement
coverage), traverse every branch statements (branch coverage), or cover all the
possible combinations of true and false condition predicates (Multiple condition
coverage).

Control-flow testing, loop testing, and data-flow testing, all maps the
corresponding flow structure of the software into a directed graph. Test cases are
carefully selected based on the criterion that all the nodes or paths are covered or
traversed at least once. By doing so we may discover unnecessary "dead" code --
code that is of no use, or never get executed at all, which can not be discovered by
functional testing.

In mutation testing, the original program code is perturbed and many


mutated programs are created, each contains one fault. Each faulty version of the
program is called a mutant. Test data are selected based on the effectiveness of
failing the mutants. The more mutants a test case can kill, the better the test case
is considered. The problem with mutation testing is that it is too computationally
expensive to use. The boundary between black-box approach and white-box

44
approach is not clear-cut. Many testing strategies mentioned above, may not be
safely classified into black-box testing or white-box testing.

It is also true for transaction-flow testing, syntax testing, finite-state


testing, and many other testing strategies not discussed in this text. One reason is
that all the above techniques will need some knowledge of the specification of the
software under test. Another reason is that the idea of specification itself is broad
-- it may contain any requirement including the structure, programming language,
and programming style as part of the specification content.

We may be reluctant to consider random testing as a testing technique.


The test case selection is simple and straightforward: they are randomly chosen.
Study in indicates that random testing is more cost effective for many programs.
Some very subtle errors can be discovered with low cost. And it is also not
inferior in coverage than other carefully designed testing techniques. One can also
obtain reliability estimate using random testing results based on operational
profiles. Effectively combining random testing with other testing techniques may
yield more powerful and cost-effective testing strategies.

• Performance testing

Not all software systems have specifications on performance explicitly.


But every system will have implicit performance requirements. The software
should not take infinite time or infinite resource to execute. "Performance bugs"
sometimes are used to refer to those design problems in software that cause the
system performance to degrade.

45
Performance has always been a great concern and a driving force of
computer evolution. Performance evaluation of a software system usually
includes: resource usage, throughput, stimulus-response time and queue lengths
detailing the average or maximum number of tasks waiting to be serviced by
selected resources. Typical resources that need to be considered include network
bandwidth requirements, CPU cycles, disk space, disk access operations, and
memory usage. The goal of performance testing can be performance bottleneck
identification, performance comparison and evaluation, etc. The typical method of
doing performance testing is using a benchmark -- a program, workload or trace
designed to be representative of the typical system usage.

• Reliability testing

Software reliability refers to the probability of failure-free operation of a


system. It is related to many aspects of software, including the testing process.
Directly estimating software reliability by quantifying its related factors can be
difficult. Testing is an effective sampling method to measure software reliability.
Guided by the operational profile, software testing (usually black-box testing) can
be used to obtain failure data, and an estimation model can be further used to
analyze the data to estimate the present reliability and predict future reliability.

Therefore, based on the estimation, the developers can decide whether to


release the software, and the users can decide whether to adopt and use the
software. Risk of using software can also be assessed based on reliability
information. advocates that the primary goal of testing should be to measure the
dependability of tested software.

46
There is agreement on the intuitive meaning of dependable software: it
does not fail in unexpected or catastrophic ways. Robustness testing and stress
testing are variances of reliability testing based on this simple criterion.

The robustness of a software component is the degree to which it can


function correctly in the presence of exceptional inputs or stressful environmental
conditions. Robustness testing differs with correctness testing in the sense that the
functional correctness of the software is not of concern. It only watches for
robustness problems such as machine crashes, process hangs or abnormal
termination. The oracle is relatively simple, therefore robustness testing can be
made more portable and scalable than correctness testing. This research has drawn
more and more interests recently, most of which uses commercial operating
systems as their target, such as the work in.

Stress testing, or load testing, is often used to test the whole system rather
than the software alone. In such tests the software or system are exercised with or
beyond the specified limits. Typical stress includes resource exhaustion, bursts of
activities, and sustained high loads.

• Security testing

Software quality, reliability and security are tightly coupled. Flaws in


software can be exploited by intruders to open security holes. With the
development of the Internet, software security problems are becoming even more
severe.

47
Many critical software applications and services have integrated security
measures against malicious attacks. The purpose of security testing of these
systems include identifying and removing software flaws that may potentially
lead to security violations, and validating the effectiveness of security measures.
Simulated security attacks can be performed to find vulnerabilities.

7.4 How the Project Is Implemented

A crucial phase in the system life cycle is the successful implementation


of the new system design. The change to make a web based application took place
in phased manner. First the system was used to enter, validate and store the
different types of data in the database used by the systems. The static data were
also entered in the directory files. The comparison testified to the reliability, speed
and accuracy of the web based system.

There are three types of implementation

1. Implementation of a web based application to replace a window based


application The problems encountered are converting files, training users ,
creating accurate files, and verifying printouts for integrity.

2. Implementation of a modified application to replace an existing one using


the same computer. This type of conversion is relatively easy to handle
provided there are no major changes in the fi

Conversion means changing from one system to another. The objective is to


put tested system into operation while holding costs, risks, and personnel irritation
to a minimum. Conversion should be exciting because it is the last step before the
candidate system begins to show result. Unfortunately the results of conversion
have been chaotic and traumatic for many firms. Unforeseen difficulties crop up
as the system breaks down, data files are damaged and tempers grow short. The
training package is frequently not complete and people are trying to figure out

48
what to do. Much of this steams of poor planning at all. Let us examine the steps
that preceded conversion.

• Creating Test files.

• Training the operating staff.

• Installing terminals and hardware.

Creating Test files:s

The best method for gaining control of the conversion is to use well-
planned test files for testing all new programs. Before testing live data, test are
created on the old system, copied over to the new system, and used for initial test
of each program. The test file offers the following:

• Predictable results

• Previously determined output results to check with a sampling of different


types of records.

User Training

It focuses on two factors:

• User capabilities

• Nature of the system being installed

The user may range from naïve to sophisticated users .Naïve users have fear
towards exposure to new system. Therefore formal user training is required with
some training aids like:

• User manual

• User-friendly screen

• Data dictionary

49
• Proper flow of system

8.CONCLUSION

This ONLINE GARMENT ADVERTISING website is


successfully completed.It is developed as a highly user
interaction website.so the end user who have low computer literal
also easily acess the website.It is used advertise the appropriate
garment company world wide and used to increase the sales of
the garment.The end users from all over the world can see the
various models,colours,and prices of the products in the
company.We can extend shopping cart too in this website.

This website is really better then the all other advertising


media like news papers and televisions.Because they only
reached to the particular region people but this website reach all
people around the world.It also save the valuiable time of the
valuable customers

50
BIBLIOGRAPHY AND REFERENCES

Books

• PHP/MySQL Programming for the Absolute Beginner


• Web Database Applications with PHP and MySQL
• LEARNING PHP 5
• Java Script for the World Wide Web

Websites

• www.php.net
• www.hotscripts.com
• www.zend.com/php5
• www.w3schools.com
• www.dynamicdrive.com

ANNEXURE

51
Screen Interfaces:

52

Vous aimerez peut-être aussi