Vous êtes sur la page 1sur 50

A

Project Report
On

INTRA MAILING SYSTEM


Submitted In The Partial Fulfillment Of The Requirement
For The Award Of The Degree Of

BACHELOR OF TECHNOLOGY
IN
COMPUTER SCIENCE & ENGINEERING

SUBMITTED BY:

Krishna Avtar (1247910017)


Mo.Danish (1247910021)
Mo.Faizan (1247910022)
Sahil Husain (1247910033)
Kamal singh (1147910016)
UNDER THE SUPERVISION OF:

Mr. Ankur Bhatnagar

Session 2015-16
Department of Computer Science & Engineering

Rajshree Institute of Mnagement & Technology,


Bareilly.

INTRA MAILING SYSTEM

PROJECT REPORT

CERTIFICATE
This is to certify that the following student of B.Tech final year in computer science of
2012 batch have carried out the project titled INTRA MAILING SYSTEM under our
supervision .

KRISHNA AVTAR (1247910017)


MO.DANISH (1247910021)
MO.FAIZAN (1247910022)
SAHIL HUSAIN (1247910033)
KAMAL SINGH (1147910016)

This project has been completed under the ordinance governing the course leading the
bachelor degree in computer science at Rajshree Institute Of Management And
Technology,Bareilly affiliated to Dr.A.P.J Abdul Kalam University(Lucknow).

ACKNOWLADGEMENT
We are thankful to the faculty members, providing their valuable time and guidance
in elaborating view of studying the project details and getting the right vision for its
implementation.
We are also thankful to Mr. Ankur Bhatnagar, who is having a vast knowledge of
PHP ,System Analysis and Design & Programming concept which are the building
block of project.
We also thank Mrs. Jyoti Agrawal, our H.O.D, and all other faculty members who
are directly or indirectly involved with our project.We are also pleased with the support
and co-operation of the project coordinator.

ABSTRACT
VIRTUAL OFFICE
The VIRTUAL OFFICE is an Enterprise Intranet Application that automates and
improves procedures within organizations. It is a useful technology for delineating
the steps that must be taken, the dependencies that must be enforced, and the approvals
that must be obtained during the completion of projects.
It keeps track the information about the employees and also it keeps track of the task
assigned to each employee. The super users of the system are the ADMIN and the
EMPLOYEES of the different departments allocated by the admin in an organization or
company.
The VIRTUAL OFFICE mainly consists of eight modules Administrative module,
Login module, Bulletin board, E-forum, Task management module, Project management
module, Address book, Documents library and lastly Logout.
In the administrative module administrator the admin may be the owner of the site, he can
create a new employee and can assign a password to them. Login module consists of
Login Registration, Changing password, Password Reminder. Where actually a new user
can register and the existing user can login with user id and password.
E-forum is discussion software allows people from within a corporation to exchange
work and ideas. Included in the software are links to other intranet resources, so that from
within a discussion, people can link out to a Web page on the Internet or intranet, or can
even link into intranet databases.
Project management module gives employees task status reports. We can assign a task to
an employee, can view status of all tasks and also can view todays report of all tasks.
Address book module mainly maintains information about all employees addresses where
we can view addresses of all the employees. Document library module contains the list of
documents available in document library and it also allows posting documents.

INDEX
Chapter
Chapter 1
Introduction Of Intra Mailing System

Introduction
Project Type
Project Scope
Project Outline
Administration
User Role
Project Background
Project Objective & Benefits
Project Specification
Prooject Review

Chapter 2
Software & Hardware Requirments
Hardware Rquirements
Software Requirement

Chapter 3
Software Rquirement Specification

Existing System
Proposed System
Limitation
Related Work
Technical Feasibility
Economic Feasibility
Oprational Feasibility
Module Description
Administrative Module
Login Module
Buletin Board
E-Forum
Project Management Module

Pageno.
8-11
8
8
8
9

10
11

11-12
12

13-17

13
14

14
15

15
16

Address Book
Document Library

Chapter 4
Software Design
Object Oriented Analysis
Data modeling
Unified Modeling Language
Object Oriented Design
Class Diagram
Advantages Of Class Diagram
Components Diagram
Use Case Diagram
Definition
Use case
Actor
Association
Sequence Diagram
View Sequence Diagram
Article
Collaboration Diagram
Micrisoft SQL Server
Features
Chpter 5
Verification & Validation
Validation Specification
Chapter 6
Testing
Testing Principle
Function Oriented Testing
Unit Testing
Boundry Condition Test
Acceptance Test
7

17

18-30
18

19
19
21
22

23
24
26
27
28
30

3131

32-33
32
33
34

Chapter 7
Database Design
Normalization
Relational Database Management
Information Representation
Logical Accessibilty
Representation Of Null Values
Catalogue Facilities
Data Language
View Updatabilty
Insert Update & Delete
Physical Data Independence
Logical Data Independence
Integrity Construction
Non Sub Version
Logical Schema
Conceptual Schema
Chapter 8
Output Screens
Chapter 9
Coclusion
Chapter 10
Further Enhencement
Chapter 11
Bibliography

3434
35

35
36

36
37
37

38
48
49
50

Chapter 1

INTRODUCTION

PROJECT TYPE:
Web Based Application.

PROJECT SCOPE:
VIRTUAL OFFICE is an Enterprise Intranet Application that automates and improves
procedures within organizations. It is a useful technology for delineating the steps that
must be taken, the dependencies that must be enforced, and the approvals that must be
obtained during the completion of projects.
It keeps track the information about the employees and also it keeps track of the task
assigned to each employee. The super users of the system are the ADMIN and the
EMPLOYEES of the different departments allocated by the admin in an organization or
company.

PROJECT OUTLINE:
The Application starts with a login page, which is an html file where the user can
Login to the companys website where he can access his account details, he can do his
Work of doing project tasks there , where he can have an access to the companys
Database with some constraints basing on his designation.
There is link in the page for the Registration of New user and another link for the
forget password for the employees who have forgot their password.
.

ADMINISTRATION:
Administration processes are simplified allowing more time for management of
resources. This project information will assist management in ensuring that projects
underway within the organization are strategically aligned to the business and that the
important projects are receiving the priority required. It also allows management to check
that the project is being managed effectively.
There are many benefits for an organization that opts to follow a standardized
Process or method when investigating, initiating and managing projects. Some of these
benefits are:
It provides a consistent approach to projects in an organization
The project success rate is increased, ultimately saving costs
It raises the skill of project managers in the organization
A common knowledge base is created reducing project risks.

USER ROLE:
Employee can login with his id and password.
He can view his details and can modify if any changes needed. This is called as
Employee Details
He can view the Documents which are needed for his project.
He can view the Announcements which are given by the Administrator.

PROJECT BACKGROUND:
The Virtual office is being charactered to decrease the wastage of time for the
employee. Employee can interact through online for doing his regular works which
will be done at regular conventional office.

10

Project Objectives and Benefits


The primary objective of the virtual office is to fully automate the conventional office.
Connecting Employees to the company site through online, the secondary objectives (and
benefits) are as follows
Seeking a low-risk alternative to renting a conventional office;
Testing a new product or service idea;
Downsizing from a conventional office;
Migrating from using post-office box;
Seeking to establish a business presence in the provider's country or city;
Seeking a business address within an expensive location, for corporate image purpose;
Seeking a business address as its registered business address for complying to
government regulation;
Seeking supportive business services such as answering services;

PROJECT SPECIFICATION:
The Portal Administrator role would typically be allocated to an individual working in the
project office. If your organization does not have a project office, it should be someone
who is involved in the overall prioritization, administration and management of projects
and who has authority in these areas.
Virtual office contains a documentation repository per project and a general
repository of project management templates that can be used by the project managers and
team members. The repository enables all team members to upload specific
documentation relating to the project i.e. project plans, minutes of meetings, specification
documentation, training documentation, agreements with suppliers etc.
This facility enables the easy sharing of documentation by team members and also
assists in ensuring that the latest version is always centrally available to the team
members. It avoids the unnecessary emailing of large documents to several team
members and the risk that documentation could be mislaid. Up-to-date, relevant
documentation is a critical requirement for a successful project.
11

PROJECT REVIEW:
The cost of using project portal is based on the number of users requiring access to the
portal with annual and monthly payment options available.
Costs are also dependant on:
Implementation assistance required
Amount of disk space required
System administration services
Hosting requirements (on-site hosting is available)
Customization requirements
Support requirements

Chapter 2
12

SOFTWARE
AND
HARDWARE
REQUIREMENTS
Hard Ware Requirements:
Components
Minimum
Recommended
Processor
Pentium IV
Pentium IV
Clock Speed
450 MHz
700 MHz
Random Access Memory
128MB
256MB
Hard drive disk space
3GB
NA
Video
800x600, 256 colors
1024x768, 16 bit

Software Requirements:
Operating System: Microsofts Windows NT
Server Software: Internet Information Service
Database; MS Sql Server
Application Designing Software: HTML 5.0, php, wampsever 2.0i

Chapter 3

13

SOFTWARE
REQUIREMENT
SPECIFICATION
Existing System:
Existing systems have has all the features above discussed and its a third party
maintained software to do the tasks like calls receiving and forwarding and handling of
mails and messages receive by us and helps in the business.
Advantages:These Systems are now available as Software products in the market so that we can buy
them and use.
One more Advantage of this system is they will interact and can cooperatively work with
the new media technologies like mobiles.
Disadvantages:All the systems in the Today markets dont have certain security constraints. They
are cryptographically poor.

Proposed System:
Proposed system is mainly concentrating upon creating virtual Environment for the
employees of specific company. We imposed certain security constraints like session
Management, any where access. And this system would be a Best of its kind.

Limitations:
High volume of companies using the same address;
Lack of government regulation, resulting in fly-by-night providers;
Usage by fraudulent companies due to ease of registration;
Lack of structured training of service staff, as it is a niche industry

14

Related Work:
Our project Virtual Office mainly deals with maintaining, storing the employee and
project details in databases. And to automate the tasks in the conventional office that are
usually done by the employees. The employees can login into the site and can do their
work.
Feasibility analysis:
Feasibility study is an important concept in any system development. It should be noted
always how far the system will be feasible on way in its development and after
development. It is made mainly into 3 aspects.
They are:
Technical Feasibility
Economic Feasibility
Operational Feasibility

Technical Feasibility:
The feasibility study involves knowing whether the project can be developed with
the help of current equipment, existing software technologies, employees etc.
The organization contains required equipment and the required software and the
employees. No other special requirements are to be created just for the system
development. The system is technically feasible.

Economic Feasibility:
Economic Feasibility involves cost to develop and install the system.Here, the
check is done whether the organization can meet thee costs involved in developing the
project or not.

Operational Feasibility:
The study involves in finding whether the system will be used if it is developed
and implemented or there will be any resistance from the user due to development of
system.

15

Module Description:
The VIRTUAL OFFICE mainly consists of eight modules
Administrative Module
Login module
Bulletin board
E-forum
Project management module
Address book
Documents library and lastly Logout

Administrative Module:
In the administrative module administrator the admin may be the owner of the site, he can
create a new employee and can assign a password to them.

Login module:
Login module consists of Login Registration, Changing password, Password Reminder.
Where actually a new user can register and the existing user can login with user id and
password.

Bulletin Board:
The Bulletin board is an important module where all the employees can see the articles
which were putted on notice board. Not only they can view they can also post their own
articles. It just acts like notice board where one can get all the information about the
activities which were going on in all departments. A bulletin board (pin board, pin board
or notice board in British English) is a place where people can leave public messages, for
example, to advertise things to buy or sell, announce events, or provide information.
Bulletin boards are often made of a material such as cork to facilitate addition and
removal of messages or it can be placed on the computer so people can leave and erase
messages for other people to read and see.
Bulletin boards are particularly prevalent at universities. Many sport dozens, if not
hundreds or thousands of public bulletin boards, used for everything from advertisements
by extracurricular groups and local shops to official notices.

16

E-Forum:
E-forum is discussion software allows people from within a corporation to exchange
work and ideas. Included in the software are links to other intranet resources, so that from
within a discussion, people can link out to a Web page on the Internet or intranet, or can
even link into intranet databases. Forum software packages are widely available on the
Internet. One significant difference between forums and electronic mailing lists is that
mailing lists automatically deliver new messages to the subscriber, while forums require
the member to visit the website and check for new posts. Because members may miss
replies in threads they are interested in, many modern forums offer an "e-mail
notification" feature, whereby members can choose to be notified of new posts in a
thread, and web feeds that allow members to see a summary of the new posts using
aggregator software. The main difference between newsgroups and forums is that
additional software, a newsreader, is required to participate in newsgroups. Visiting and
participating in forums normally requires no additional software beyond the web browser.

Project Management Module:


Project management module gives employees task status reports. We can assign a task to
an employee, can view status of all tasks and also can view todays report of all tasks. We
can allocate the project tasks to various employees in the office. Project manager can
view the employees work details like how many hours have been

Address Book:
Address book module mainly maintains information about all employees addresses where
we can view addresses of all the employees.

17

Documents Library:
Document library module contains the list of documents available in document library
and it also allows posting documents. Fields to fill out when uploading a
document
To upload a document, click the "Upload Document" link on any Virtual Office web
Page. Fill out the fields as completely as possible. Remember, the information you
Provide about the document is used to allow other users (or even yourself) to search
For and find the document later:
1. Document Title - a brief document name.
2. Document Description - a brief description of the contents of the document.
3. Owner - the user who is currently uploading this document. This field is filled in
automatically by the Virtual Office, which recognizes each user? NOTE: If this User is
not you, you should log out and log in again as yourself.
4. Category - the document category that best fits the document you are uploading.
Document categories are used simply to facilitate searching by dividing the Documents
contained in the Virtual Office into logical groups. Only the Virtual Office administrator
can add or edit the list of document categories.
5. File - click the button to locate the file on your local computer that you wish to
Upload. Filenames should always include a proper 3-letter extension, or users will have
problems trying to download the file. Rename suspicious files before uploading them to
the Virtual Office.
6. Who may view (download) this file - the list of groups you would like to have access
to this file. By default, a document will be accessible to all groups, meaning that any
other user can download the file. You can restrict download of the file to one or more

Chapter 4

18

SOFTWARE DESIGN
Object oriented analysis
Object oriented analysis is concerned with developing software engineering and
specification that expressed as a systems object model as opposed to traditional data or
functional views of a system .OOA can yield following benefits maintainability through
simplified mapping to the real world, which provides less analysis effort, less complexity
in system design and easier verification by the user reusability of the analysis artifacts
which sales time and costs; and depending on the analysis model and programming
language, productivity games through direct mapping to features of data modeling .

Data Modeling:
Modeling is a central part of all activities that ads up to deployment of good software we
build models to communicate the desire structure and behavior of a system we built the
models to visualize control system architecture. We built models to better understand the
system we are building, after exposing opportunities for simplification and reuse we build
models to manage risks. Modeling is proven and well accepted engineering technique. A model
is a simplification of reality.

Unified Modeling Language:Visualizing,

specifying, constructing and


documenting object oriented system is exactly the purpose of UML.UML is standard
language for writing software blue prints. It is very expressive language, easy to
understand and easy to use, addressing all the views needed to develop and then deploy
software systems.

19

Object oriented design:


Object Oriented Design is design strategy where system designers think in terms of
things (objects) instead of operations of functions. The executing system is map of
interacting objects that maintain their own local state and provides operation on the
state information. An Object Oriented Design process involves designing objects and
relationships between these classes. When design is realized as an executing
program, the required objects are created dynamically using class definitions.
The various UML diagrams for the various sub system involved in our website
are given below.

Class Diagram:
Class diagram are the back bone of object oriented modeling. Class diagram shows static
descriptive view of system diagrams visualize, specify, construct, document,
structure of system that is definition. These diagrams are built with structural things
like classes, interaction, collaboration relationships between them thus class diagram
represent design view of a system.
Classes represent an abstraction of entities common and characteristics. Associations
represent the relationships between classes.

Definition:
A class diagram is graphical notation that shows set of classes, interfaces, collaboration
and their relationship graphically.
Graphically it is a collection of vertices and arcs, classes and interfaces are represented as
vertices on relation ships as arcs connecting classes together. Some times these arcs
are represented with extension symbols and different form to represent different
types of relationships.

Advantages of class diagrams:


It designs static view of a system. This view provides functions of systems, services of
system to end users.
It models vocabulary of system. This means defining abstraction from information which
is a part of a system.
It models simple collaboration. Collaboration is society of classes, interfaces that connect
together with common specifics operation implementation.

20

21

Components Diagram:
Component diagram models the instances of things continue in classes diagrams. That is
used to model the instances of classes and interfaces, relationships defined, modeled
in class diagram.
A component diagram that shows set of components and their relationships at a point in
time. A component diagram is collection of vertices and arcs between vertices here
component are acted as vertices and arcs represent relationships between vertices.

22

Use Case Diagrams:


Use case diagram identify the functionality provides by the system (use cases), identifies
users who interact with the system (actor) and provides association between users and use
cases.
This model behavior of a system with respect to users it shows the dynamic
aspects of the system then user interact with the system. A use case can have all possible
interactions of users with use case graphically. Thus use case diagram models use case
view of a system.

Definition:
A use case diagram is set of use cases, actors and relation ships between actors use
cases
A use case diagram contains:
Use cases
Actors
Association relationship between actors, use cases
Generalization between actors
Include , extent, generalization relationships
Common uses of use case diagram:
Provides high level view of a system with respect to user
To model context of a system
Determine human system interaction
The basic components in use case diagram are:
Use case
Actor
Association

Use case:
It is functionality provided by system to user.
Example: lodges a complaint, provides user id and password
Use case is represented graphically as ellipse with name inside it

Actor:
An actor is a user of a system of data base in a system it is represented with stick figure

Association:
Association links actors to use case explain in what way and how actor interacts
23

24

Sequence diagram:
A sequence diagram is an interaction diagram that emphasizes the time ordering
of messages. A sequence diagram shows a set of objects and the messages sent and
received by those objects.
This commonly contains
Objects
Links
Messages
System level sequence diagram

25

Login:

26

View details sequence diagram:

27

Articles:

28

Collaboration Diagrams:

29

30

Microsoft SQL server 2005:


Microsoft SQL server is a relational database management system that can be
used by individuals or business for storing and managing the data. It also offers powerful
functionality for data analysis and reporting SQL server 2005 is major milestone for
Microsoft which is trying to position itself in database market.
Microsoft SQL server is a scalable database system whose primary purpose is to
serve as a backend database for a client program. Most common usage scenarios client
connects to SQL server and request some information where up on SQL server processes
the requests and return results the client must then interpret and display results.

Features:
Scalability and Availability:
It supports features such as federated servers, indexed view and large memory support
that allow it to scale performance levels.
Data warehousing:
It includes tools for extracting and analyzing summary data for online analytical
processing it also includes tools for visually designing databases.

31

Chapter 5

VERIFICATION & VALIDATION


Validation Specification:
The terms verification and validation are used interchangeably, verification is a
processes of determining whether are not the products of given phase of software
development fulfill the specification established during the previous phase. The activities
include providing, testing and previous. Validation is a process of evaluating the software
the software at end of software development process to find out how well the software
satisfies requirement specification.
The development of software starts with requirement document and is there fore
important that requirement specification contain no error and specifies clients
requirements correctly. The validation process of evaluating deployment system at an end
is must, to ensure that it meets all necessary requirement specifications. Requirement
verification also checks the factors as complete ness, consistency and testability of the
requirements.
The major verification and validation activities for software development are
transactions, queries and reports.
Transaction and queries are performed in order to check various inputs and
expected outputs. These outputs are checked against the existing document to see whether
they are matching or not.
Inspections and reviews are performed in order to be careful with calculations
being made. The primary purpose of review was to detect the defects at different stages
during the project. The review processes is generally done by group of people including
author of product, department head and a person from each phase preceding and
succeeding the current phase under review.
The review material usually includes specification, system design, detail, design
code and test plan. Proper execution of reviews is critical to successes of project.
According to pressman validation criteria is probably the most important, and,
ironically, the most often neglected section of SRS. How do we recognize successful
implementation? What losses of tests must be conducted to validate functional
performance and constrains? Specification of validation criteria acts as an implicit review
of all other requirement. Reasonable expectations are defined in SRS under this section
and user visible attributes of software are also defined here. Information contained in this
section forms the basis for a validation testing approach.

32

Chapter 6

TESTING
Software testing is a critical element of software quality assurance and represents
the ultimate role of specification, design and code generation.
Once the source code has been generated, software must be tested to uncover as
many errors as possible before delivery to consumer. We have to design a series of test
cases that have high likelihood of finding errors.
The strategies provide systematic guidance of designing tests that Exercise the
internal logic of software components and Exercise the input and output domains of
program function, behaviors and performance.

Testing principles:
All tests should be traceable to customer requirements.
Test should be planned long before testing begins.
The highly error prone components of the software products should be recognize and
thoroughly exercise.
The testing should start from small components to large components.
For effective testing, team should be a third party rather than developer and client The
physical system specifications are turned over to programmers at the part of the
implementation space.

FUNCTION ORIENTED TESTING:


This can be broadly classified into two categories based on the area in which tests are
conducted.
They are
White box testing
Black box testing
White Box Testing:
White box testing, some time called glass box testing is a test case design method that
uses the control structure procedural design to drive the test cases. As specified design
space the inputs are considered, actual processing that goes on with in the system and
final output.
The test was extensively conducted and checked against the specification given in
the design phase module.
Black Box Testing:
Black box testing focuses on the functional requirements of the software. It enables the
software engineer to derive the sets of input condition for a program.

33

Unit Testing:
Here the entire software system is tested. The reference document for the processes is
requirement document and the goal if system meets its requirements.

Boundary Condition Test:


Boundary conditions as in the case of generating sequences ware tested he ensure that
module operates properly at boundaries establish to limit of restricts processing.

Acceptance Test:
This is normally performed with realistic with data of the clients to demonstrate that the
software is working satisfactory. Testing here focuses on the external behavior of the
system.

34

Chapter 7

DATABASE DESIGN
Data bases are normally implemented by using package called database management
system (DBMS).Each particular DBMS has some what unique characteristics, and so
such, general technique for the database are limited. One of the most useful methods of
analyzing the data required by the system for the data dictionary has developed from
research into relational database, particularly the work of E.F Codd. This method of
analyzing data is called Normalization. UN normalized data are converted into
normalize data by three stages. Each stage has procedure to follow.

NORMALIZATION:
The first stage of normalization is to reduce the data and to its first normal form,
by removing repeating terms showing them as separate records but including in them the
key fields of original record.

35

The next stage of reduction to the second normal form is to check that the record,
which one is first normal form, all the items in each record are entirely dependent
on the key of the record. If a data is not dependent on the key of record, but on
other data item, then it is removed with its key to form another record. This is
done until each record contains data items, which are entirely dependent on the
key of their record.
The final stage of analysis, the reduction of third normal form involves examining
each record which one is in second form to see whether any items are mutually
dependent. If there are any item there are removed to a separate record leaving
one of items behind in the original record and using as the key in the newly
created record.

RELATIONAL DATABASE MANAGEMENT:


A relational database management system only its relational capabilities to
manage the information store in its databases.

INFORMATION REPRESENTATION:
All information stored in a relational is represented only by data items values,
which are stored in tables that makeup the database. Associations between data items are
not logically represented in any other way, such as a use of pointers from one table to
another.

LOGICAL ACCESSIBILITY:
Every data item value stored in relational data base is accessible by stating nature
of table it is stored name of column under which it is stored and value of primary key that
defines the row in which it is stored.

36

REPRESENTATION OF NULL VALUES:


The database management system has a constitute method of representing null
values. For example, null values for numeric data must be distinct from zero or
any other numeric and for character data it must be different from string of blanks
or any other character value.

CATALOGUE FACILITIES:
The logical description of relation database is represented in the same manner or
ordinary data. This is done so that facilities of relational database management
system itself can be used to maintain database description.

37

DATA LANGUAGE:
The relational database management system may support many types of
languages for describing and accessing database. However, there must be at least
one language that uses ordinary character strings to support the definitions if data,
the definition of views, manipulation of data, constrains on data integrity,
information concerning authorization and the boundaries for recovery of units.

VIEW UPDATABILITY:
Any view that can be defined combination of basic tables that are theoretically
updatable, these capitals of being updated by the relational database management system.

INSERT, UPDATE & DELETE:


Any operand that describes the result of single retrieval operation is capable of
being applied an insert, update or delete operation as well.

PHYSICAL DATA INDEPENDENCE:


Changes made to physical storage representation or access methods do not require
changes to be made to application programmers.

LOGICAL DATA INDEPENDENCE:


Changes made to tables that do not modify any data stored in that table, do not
require changes to be made to application programmers.

INTEGRITY CONSTRAINTS:
Constraints that applied to integrity and referential integrity are specifiable by the
data language implemented by the database management system and not by the
statements coded into the application programs.

DATABASE DISTRIBUTION:
The data language implemented by the relation management system supports the
ability to distribute database without requiring changes to be made to application
programmers this facility must be provided in the data language, whether are not
the database management system itself supports distributed databases.

38

NON SUB VERSION:


If the relational database management system supports facilities that allow
application programmers to operate on that table or a row at a time, an application
programmer using this type access is prevented from by passing entity
integrity or referential integrity constraints that are defined for the database.

LOGICAL SCHEMA:
A Logical Schema is a data model of a specific problem domain that is in terms of a
particular data management technology. Without being specific to a particular database
management product, it is in terms of either (for example, in 2007) relational tables and
columns, object-oriented classes, or XML tags. This is as opposed to a conceptual data
model, which describes the semantics of an organization without reference to technology,
or a physical data base model, which describes the particular physical mechanisms used
to capture data in a storage medium.

CONCEPTUAL SCHEMA:
A conceptual schema or conceptual data model is a map of concepts and their
relationships. This describes the semantics of an organization and represents a series of
assertions about its nature. Specifically, it describes the things of significance to an
organization (entity classes), about which it is inclined to collect information, and
characteristics of (attributes) and associations between pairs of those things of
significance (relationships).
Because it represents the semantics of an organization, and not a database design, it may
exist on various levels of abstraction. The original ANSI four-schema architecture began
with the set of external schemas that each represents one person's view of the world
around him or her. These are consolidated into a single conceptual schema that is the
superset of all of those external views. A data model can be as concrete as each person's
perspective, but this tends to make it inflexible. If that person's world changes, the model
must change. Conceptual data models take a more abstract perspective, identifying the
fundamental things, of which the things an individual deals with are but examples.
The model does allow for what is called inheritance in object oriented terms. The set of
instances of an entity class may be subdivided into entity classes in their own right. Thus,
each instance of a sub-type entity class is also an instance of the entity class's super-type.
Each instance of the super-type entity class then is also an instance of one of the sub-type
entity classes.

39

Chapter 8

OUTPUT SCREENS

40

41

42

43

44

45

46

47

Chapter 9

CONCLUSION

The application was tested and implemented successfully. The system behavior was
found to be as expected in the problem definition. By this application employees in the
organization can easily update their day to day work and they can easily clarify their
doubts and get the information what ever he want for example details of their other
employees and can view different documents and Articles what are available and they can
post and update their own Articles and documents and by this department heads or who
are super users get the details of employees and their daily work progress and status of
work assigned. and details So by this The Employees can now use the online system to
do their usual work in the office.

48

Chapter 10

FURTHER ENHANCEMENTS

Implantation of chatting
We emphasize mainly on intranet application which will work in
the same office, but we are trying to get it in the internet where employees can sit in their
home and can login into their workspace provided by company. We can implement the
chatting facility between the employees which help them in their way of doing projects.

49

Chapter 11

BIBLIOGRAPHY

Calvin Austin and Monica pawlan, Advanced Programming for the .Net Platform,
Addison Wesley Longman publication,2000
Patrick Naughton and Herbert Schildt, the Complete Reference Dot Net
, Tata
McGraw-Hill Publication, 1999.
Bryan Pfaffenberger, Bill Karow, Chuck White, Steven M. Schafer, The Complete
Reference Tata McGraw-Hill Publication,1998
www.dotnet.microsoft.com
www.WROX.com
www.contactoffice.com
www.wikipedia.org

THANK YOU

50

Vous aimerez peut-être aussi