Académique Documents
Professionnel Documents
Culture Documents
Chapter 1
With the active participation of its multi-disciplinary Assignment Execution Team, Logic
Mind Technologies has emerged as a leader in the ITES in India and has established itself in
the field of software development, data processing, data conversion, digital printing,
Digitization, System integration, smart card personalization, IT facility management and other
IT enabled services. Logic Mind Technologies LLP, incorporated in 2011, is a professionally
managed, rapidly growing, multifaceted Information technology company. The company is
actively involved in developing automation and e-Governance solutions for Transport, Social
Security, Citizen Identity, Education, Public Distribution System, Retail Management and a
host of other application areas.
Logic Mind Technologies is a leading System integrator in India providing complete
turnkey solutions on BOO & BOOT basis including facility management services, Smart
Cards applications, Document Management System (DMS), Work Flow Management and
Manpower Deployment.
Logic Mind Technologies has successfully completed many e-governance projects for
the various departments of Govt of AP and has won accolades for its superior service
delivery, timely execution of projects and the quality of the deliverables. LMT is being trusted
by many clients who are looking for reliable and quality services for their business. LMT is
currently operating and managing in Bangalore and giving services to e-commerce business
services.
Logic mind technologies adopted project team and dedicated organization structure. In
project-based organization, the project manager’s directors have a high level of power to
oversee and control the project assets. The project manager in this structure has downright
power over the project and can secure assets expected to fulfill project targets from inside
then again outside the parent organization, subject just to the extension, quality, furthermore,
budget constraints are identified in the project.
In the project-based structure, staff is particularly relegated to the project and report
specifically to the project manager. The project manager is in charge of the execution
evaluation and vocation movement of all undertaking colleagues while on the project. This
prompts expanded project faithfulness. Complete line power over undertaking endeavors
bears the project manager solid undertaking controls and brought together lines of
correspondence. This prompts quick response time and enhanced responsiveness. In addition,
project work forces are held on a restrictive instead of shared or low maintenance premise.
Project teams create an in number feeling of task recognizable proof and possession, with
profound faithfulness efforts to the project and a decent comprehension of the way of project's
exercises, mission, or objectives.
Logic Mind Technologies Pvt Ltd is one of India most well-known and well-trusted
solution provider. Today, Logic Mind Technologies stands as a source of reliable and
innovative products that enhance the quality of costumer's professional and personal lives.
Logic Mind Technologies is rooted in Bangalore and has its branch in Hyderabad and
Chennai. Logic Mind Technologies is a leading solution provider in all technologies, and has
extensive experience in research and development.
Its employees in all the branches are active in the areas of production, software development,
Implementation, system integration, and training.
Why Logic Mind Technologies?
With a client list spanning nearly in all industries, and colleges, Logic Mind Technologies
product solutions have benefited customers of many different sizes, from non-profit
organizations to companies.
By acquaintance with Logic Mind Technologies you’ll have access to current IT research,
tools, templates, and step-by-step action plans for completing Key projects. You’ll also be
provided full access to our research archives and knowledge base.
Since its inceptions and with initial small steps, Logic Mind Technologies is now
progressing by leaps and bounds. It has grown from a small venture to a medium scale
enterprise with a strong 80+ workforce, our rate of more than 100%. The company is
executing some of the prestigious projects and has earned a very respectable name in the
Indian IT and e-commerce industry.
Our innovative and highly integrated approach means customers benefit from working
with specialists. Our continuous strive to be a technology leader in the industry means that our
clients directly benefit from the huge expertise that our people possess. We strive to be at the
forefront of technology that enables us to provide you with highly effective and optimized
solutions to all your problems. Clients like to have a single point-of-contact for their
solutions, and expect a complete solution from the vendor, which is not possible unless there
are partnerships and alliances within and outside the company.
Logic Mind Technologies fosters partnerships with companies with whom a value
proposition can be offered to clients. One of the key benefits that you receive by partnering
with Logic Mind Technologies is increased project completion certainty, project transparency,
renewed customer confidence and credibility from our unparalleled track record, mature
processes and quality recognition and customer endorsement.
True certainty of success comes from working with a partner you trust to provide the insight,
support and expertise that will propel your business forward. Experiencing certainty with
Logic Mind Technologies means you can count on results, partnership and leadership. When
you work with us, your long-term success is our motivation. This is why we can offer you the
ability to meet every challenge and the agility to capitalize on every opportunity. That’s the
power of certainty. And it is our promise to every client.
Logic Mind Technologies is a global enterprise solutions provider committed to
designing and delivering solutions that enable international companies to thrive in today's
complex business environment. Logic Mind Technologies Pvt Ltd is one of India most well-
known and well-trusted solution provider. Today Logic Mind Technologies stands as a source
of reliable and innovative products that enhance the quality of customer’s professional and
personal lives. With the active participation of its multi-disciplinary Assignment Execution
Team, Logic Mind Technologies has emerged as a leader in the ITES in India and has
established itself in the field of software development, data processing, data conversion,
digital printing, Digitization, System integration, smart card personalization, IT facility
management and other IT enabled services. Logic Mind Technologies LLP, incorporated in
2011, is a professionally managed, rapidly growing, multifaceted Information technology
company. The company is actively involved in developing automation and e-Governance
solutions for Transport, Social Security, Citizen Identity, Education, Public Distribution
System, Retail Management and a host of other application areas.
Historical milestones and a variety of achievements characterize our company’s
journey: from a merchant’s company selling one product to the state player we are today.
Throughout the journey, we have seen many first-time products launch, a steady flow of
innovations, continuous expansions through growth and acquisitions. During this time,
hundreds of employees have contributed to our success, which is marked by numerous awards
and excellent third-party rankings.
Logic Mind Technologies has successfully completed many e-governance projects for
the various departments of Govt of AP and has won accolades for its superior service
delivery, timely execution of projects and the quality of the deliverables. LMT is being trusted
by many clients who are looking for reliable and quality services for their business. LMT is
currently operating and managing in Bangalore and giving services to e-commerce business
services.
The Figure 1.1 shows the organizational structure of Logic Mind Technologies(LMT). The
organization structure depicts how various work roles and responsibilities are delegated,
controlled and coordinated and determines how information flows from level to level within
the company to achieve the organizational aims.
Logic Mind Technologies has ready to implement solutions for e-Commerce which can be
customized and implemented at a short notice. These solutions are developed after conducting
detailed System Requirement Study (SRS) of the respective business and have stabilized by
the live implementation and are running successfully with statewide implementation.
The marketing department consists of Digital Marketing and Sales departments. The presales
department further contains Healthcare, Education, Retail and Networking departments. The
digital marketing departments are classified as Public relations, Analyst and Online
supermarket for the groceries.
ONLINE SUPERMARKET FOR THE GROCERIES: ANDHRAFRESH.COM
ANDHRAFRESH.COM is an Indian online grocery provider listing over 2000+products from
more than 500 brands. It was started in Anathapur and subsequently expanded its operations
to Kurnool, Tirupati and expanding further in Bangalore, Chennai, Hyderabad, Mysore, Pune.
ANDHRAFRESH.COM product categories include Fresh Fruits and Vegetables, Grocery and
Staples, Bread, Dairy, Eggs, Beverages, Branded foods, Household Items, Personal Care,
Health care, Meat, Home & Kitchen Products, Electronics & Appliances, Cosmetics,
imported products and gourmet products. Many more categories are going to be expanded.
Andhrafresh.com also provides all fresh beverages, foods and home appliances
The below showed snapshot of andrafresh.com
KEY ALLIANCES/PARTENERSHIPS
Today a client shop on the web at stands via telephone and cells quickly, its big challenge in
coordinating to the online stores; to give best shopping is very big challenge.
Logic mind technology uses advance tools to connect people to fulfill their
requirements, areas of specialty of logic mind technology are.
Responding to customer requirements.
Cooperating with customers.
Giving presentation to the customers.
Business development support.
Supporting for market.
Functionalist of individual
Director
Director is head of the research and development, he supervises the work done by the research
engineers analysts, project manager and other staff of the department.
The major functionalities of research and development are as follows.
Director analysis the current market trend
Guides the research engineers to work on current market trend
Assigns the theoretical solutions obtained by the research engineers to software
developers for practical implementation
Conducting the timely meetings with the project manager an enquire about the
progress in the project.
Director takes the final decision regarding the budget and implementation of the
project.
Director also gives the solution the solution to the challenge that occur during project
implementation
Research engineers
Research engineers are the people who study about the current market trend and the problems
that are present
Research engineering department is headed by a manger and this manager directly report to
the director of the department. The manager is responsible to supervise the work performed
by all other research engineers in the department the specific functionalities of a research
engineers is as follows.
Conducting study on the problem or researching on the problem posted by the director
Be up to date to the current market trend
Gives possible theoretical solution to the problems
Prepares the clear documentation about the solution and submit it to the director.
Project manager
Project manager heads the solution developing team or team of software engineers
The project manager directly reports to the director of the department.
Project manager is responsible for supervising the work done by the team member
Project manager plans to implement project within the budget
He solves the problems that occur within the team.
Conducts timely meetings with the software engineers and gate the details of the
progressing of the project
Shopping Solutions
Enables you to connect with your customers whenever, wherever & for whatever across the
globe faster than any other way. It also helps you in creating a global visibility/presence of the
products you wanted to sell.
Logic Mind Technologies have improved the quality of communication and satisfied
customers. We have earned their respect by providing excellent products and services.
In addition, we are flexible with services and financial structures for contracts aiming for
mutually beneficial relationships with our customers.
Our customers are dynamic and diverse and include Large Corporate Offices, Universities,
Educational Institutions, Factories, etc.
Since its inceptions and with initial small steps, Logic Mind Technologies is now progressing
by leaps and bounds. It has grown from a small venture to a medium scale enterprise with a
strong 80+ workforce, our rate of more than 100%. The company is executing some of the
prestigious projects and has earned a very respectable name in the Indian IT and e-commerce
industry.
Financial statement often referred to as a Statement of Profit and Loss, or P&L, this financial
report shows the revenues and expense generated and incurred by a company over a specified
period of time. It shows the net gain or loss from the company's equity position during the
stated accounting period. The financials include Income Statements, Balance Sheets,
Statements of Cash Flow and Financial Ratios both on a quarterly and an annual basis is 3
crore.
Chapter 2
Over the course of several years, LMT has used the benefit of its knowledge and
experience of developing enterprise wide, web based applications coupled with its continuing
research and development activity to develop its own in-house web based software
architecture and supporting framework on which all of its current and future web based
solutions are based. Conforming to the latest industry standards and best practice, LMT’s
software architecture has proven to be a reliable, robust, and scalable foundation on which to
build its software products. A qualified and highly specialized team with multi-disciplinary
approach forms the technical core at Logic Mind Technologies. This repository of talented
and committed software developers has a proven track record to ensure success in IT solution
implementation. With skills ranging from business process re-engineering to application
development, Logic Mind Technologies technical team seeks to constantly enhance and
expand its technical knowledge. Capturing knowledge through procedures and processes is
the premise on which the entire organization works. Logic Mind Technologies resource base
consists of IIT engineers (three including the Directors), management graduates, masters in
computer applications and domain experts from various fields.
Logic Mind technologies has a state of the art Software Development Centre located at Delhi
which also hosts a Data Centre with 100 MB bandwidth for the data transfer. The
development center and data center runs in fully secure mode.
Logic mind technology is very prompt providing projects within deadline of project, which it
improves the reliable and robustness.
Current Research and Development
The current R & D efforts are primarily aimed at the following segments in the
healthcare industry:
Developing a system for integrating medical schools with major hospitals for
knowledge gathering, sharing and learning
Developing a Clinical Decision Support System to aid doctors in difficult to diagnose
cases using Artificial Intelligence and Probabilistic Techniques.
New Technology Capability and Positions
The organization has a process in place, which addresses the issue of incorporating emerging
technologies into the product design. The process is as follows:
Core committee on new development evaluates and identifies new technology for
the purpose of integration.
The research and development department identifies the resource and people and
formulates the process for working while setting key performance indicator.
A thorough study of the new technology along the tools is made and documented.
Estimates are made as to the impact of the new technology on the products
developed by the company.
Effort estimates are made for introducing the new technologies
Client feedback is received about the efforts needed and the advantages of the new
technology.
The core committee takes a knowledgeable decision as to the advantages and
efforts required and approve the introduction of the technology
The affected personnel are trained in the new technologies
The new technology is introduced and the product is enhanced
The clients are informed about the enhancement and introduction of related
documents are prepared for the changeover.
The clients are guided in implementing the new technologies.
Being a technology driven company we are always exploring ways of enhancing our product
capabilities and aim at providing the latest state-of-the-art products to our customers. We have
incorporated the PDAs and the smart card already in the system. We are currently evaluating
blue tooth capability and the Tablet PC relevance to the field.
development methodologies actually being used. Also, while every developer does not want
to be an architect, every developer likes to have some say in the design. If developers are too
separated from architects, they may have a built-in incentive to prove the architect’s design
was wrong by not working there hardest to implement it. When this happens, the architect will
most likely blame the problem on developer incompetence than on any architectural flaws.
The whole iterative development process becomes harder to implement smoothly.
Chapter 3
Tasks Performed
The following section describes list of technical activities performed in the company, list of
non-technical activities performed in the company, tasks assigned by the company to perform
the assigned tasks, background study of Technical reports, books, journal papers, participation
in organizational meetings, time management, resource utilization and interpersonal skills &
initiatives taken.
Also, the use of Quick Emulator (QEMU), one of the most powerful processor
emulator as well as virtualizer, used on guest OS. Further, configured the allocated
remote machine using putty software. Mobax is another handy tool with user friendly
GUI, which is used to access the remote machine. WinSCP is another tool which can
be used to exchange the files between remote machine and local machine.
Finally presenting the results, overall conclusions of the study and proposed work.
PDP (provable data possession) is a technique for validating data integrity over remote
servers. In a typical PDP model, the data owner generates some metadata/information for a
data file to be used later for verification purposes through a challenge-response protocol with
the remote/cloud server. The owner sends the file to be stored on a remote server which may
be untrusted, and deletes the local copy of the file. As a proof that the server is still possessing
the data file in its original form, it needs to correctly compute a response to a challenge vector
sent from a verifier — who can be the original data owner or a trusted entity that shares some
information with the owner.
3.3.2 System architecture
The figure 3.1 depicts the system architecture of the components being designed as part of the
internship project.
Data Owner
In this module data owner created by Cloud Provider allocating the space for storing
the owner files. The Data Owner is responsible for browsing and uploading the file to Cloud
Server. The data owner has a file consisting of blocks and the CSP offers to store many copies
of the owner’s file on different servers to prevent simultaneous failure of all copies. The
owner encrypts his data before outsourcing to CSP. After outsourcing all multiple copies of
the file, the owner may interact with the CSP to perform block-level operations on all copies.
These operations include modify, insert, append, and delete specific blocks of the outsourced
data copies. The interaction between the owner and the authorized users to authenticate their
identities and share the secret key.
Cloud Service Provider
The Cloud Server is responsible on behalf of the file content provider for both
allocating the appropriate amount of resources in the cloud, and reserving the time over which
the required resources are allocated. CSP creates virtual machine for each resource requested
by the user If uploading file Size is less than the allocated space, CSP will allocate space,
receive data from owner and stores the data. Whenever CSP get request from an authorized
user, it will send the data to users. Cloud server will store all the data owner information and
stores all the authorized user’s information and it also allows access to the information
through IP network.
CSP stores the number of copies of owner files, depends on the nature of data; more
copies are needed for critical data that cannot easily be reproduced, and to achieve a higher
level of scalability. This critical data should be replicated on multiple servers across multiple
data centers.
Authorized User
In this module, authorized user can download the file content. Before downloading
user must register first, later user can login to the cloud and download the files. User can also
view the uploaded Files and they can access the file. Authorized user everyone downloads the
files. An authorized user of the outsourced data sends a data access request to the CSP and
receives a file copy in an encrypted form that can be decrypted using a secret key shared with
the owner.
CSP
Login
Data Owner
MB-PMDDP scheme
Supports outsourcing of
dynamic
Purchase space
Maintain records
Upload File about owner files
Authorized users
Register & Request data
View User detail File
The figure 3.3 shows the flow chart for data owner module. Data owner is the owner of the
data that is stored on the cloud server. The data owner must register with the application and
then purchase the storage from the CSP for storing the files on cloud. Then the secret keys
need to be generated and the files need to be encrypted and uploaded on to the cloud server.
And then the data owner can share the secret key that is generated with the data user.
Start
Owner request to
upload the data files
Yes If uploading No
file Size <
allocated space
Check for IP
Allocate Space
End
The figure 3.4 shows the flow chart of the cloud service provider module. This Provides the
interface for servicing of the storage allocation request raised by the data owner. Provides the
interface for receiving of data from the data owner and storing it on the storage. Provides the
interface for accepting the challenge vector from the data owner and responds with the meta
data that proves the data possession on the cloud storage. Provides interface for dynamic
updating of the data stored on the cloud storage.
Start
User Register
Yes No
Login
With most programming languages, you either compile or interpret a program so that you can
run it on your computer. The Java programming language is unusual in that a program is both
compiled and interpreted. With the compiler, first you translate a program into an
intermediate language called Java byte codes —the platform-independent codes interpreted
by the interpreter on the Java platform. The interpreter parses and runs each Java byte code
instruction on the computer. Compilation happens just once; interpretation occurs each time
the program is executed. The following figure.3.6 illustrates how this works.
ODBC
Microsoft Open Database Connectivity (ODBC) is a standard programming interface for
application developers and database systems providers. Before ODBC became a de facto
standard for Windows programs to interface with database systems, programmers had to use
proprietary languages for each database they wanted to connect to. Now, ODBC has made the
choice of the database system almost irrelevant from a coding perspective, which is as it
should be. Application developers have much more important things to worry about than the
syntax that is needed to port their program from one database to another when business needs
suddenly change.
Through the ODBC Administrator in Control Panel, you can specify the particular database
that is associated with a data source that an ODBC application program is written to use.
Think of an ODBC data source as a door with a name on it. Each door will lead you to a
particular database. For example, the data source named Sales Figures might be a SQL Server
database, whereas the Accounts Payable data source could refer to an Access database. The
physical database referred to by a data source can reside anywhere on the LAN.
The ODBC system files are not installed on your system by Windows 95. Rather, they are
installed when you setup a separate database application, such as SQL Server Client or Visual
Basic 4.0. When the ODBC icon is installed in Control Panel, it uses a file called
ODBCINST.DLL. It is also possible to administer your ODBC data sources through a stand-
alone program called ODBCADM.EXE. There is a 16-bit and a 32-bit version of this program
and each maintains a separate list of ODBC data sources.
From a programming perspective [13], the beauty of ODBC is that the application can be
written to use the same set of function calls to interface with any data source, regardless of the
database vendor. The source code of the application doesn’t change whether it talks to Oracle
or SQL Server. We only mention these two as an example. There are ODBC drivers available
for several dozen popular database systems. Even Excel spreadsheets and plain text files can
be turned into data sources. The operating system uses the Registry information written by
ODBC Administrator to determine which low-level ODBC drivers are needed to talk to the
data source (such as the interface to Oracle or SQL Server). The loading of the ODBC drivers
is transparent to the ODBC application program. In a client/server environment, the ODBC
API even handles many of the network issues for the application programmer.
The advantages of this scheme are so numerous that you are probably thinking there must be
some catch. The only disadvantage of ODBC is that it isn’t as efficient as talking directly to
the native database interface. ODBC has had many detractors make the charge that it is too
slow. Microsoft has always claimed that the critical factor in performance is the quality of the
driver software that is used. In our humble opinion, this is true. The availability of good
ODBC drivers has improved a great deal recently. And anyway, the criticism about
performance is somewhat analogous to those who said that compilers would never match the
speed of pure assembly language. Maybe not, but the compiler (or ODBC) gives you the
opportunity to write cleaner programs, which means you finish sooner. Meanwhile, computers
get faster every year.
JDBC
In an effort to set an independent database standard API for Java; Sun Microsystems
developed Java Database Connectivity, or JDBC. JDBC offers a generic SQL database access
mechanism that provides a consistent interface to a variety of RDBMSs. This consistent
interface is achieved through the use of “plug-in” database connectivity modules, or drivers. If
a database vendor wishes to have JDBC support, he or she must provide the driver for each
platform that the database and Java run on.
To gain a wider acceptance of JDBC, Sun based JDBC’s framework on ODBC. As you
discovered earlier in this chapter, ODBC has widespread support on a variety of platforms.
Basing JDBC on ODBC will allow vendors to bring JDBC drivers to market much faster than
developing a completely new connectivity solution.
JDBC was announced in March of 1996. It was released for a 90-day public review that ended
June 8, 1996. Because of user input, the final JDBC v1.0 specification was released soon
after.
Java Virtual Machine (JVM) read and translates those byte codes to language that computer
can understand (Machine Language). Then execute the program, store it values in primary
memory.
Our Team members have extensive knowledge in Oracle Products ranging from Oracle 7.3 to
10i, Developer 6i, Oracle 10iAS and other oracle products.
REQUEST CLARIFICATION
After the approval of the request to the organization and project guide, with an
investigation being considered, the project request must be examined to determine precisely
what the system requires. Here our project is basically meant for users within the company
whose systems can be interconnected by the Local Area Network(LAN). In today’s busy
schedule man need everything should be provided in a readymade manner. So taking into
consideration of the vastly use of the net in day-to-day life, the corresponding development of
the portal came into existence.
FEASIBILITY ANALYSIS
An important outcome of preliminary investigation is the determination that the system
request is feasible. This is possible only if it is feasible within limited resource and time.
Operational Feasibility
Operational Feasibility deals with the study of prospects of the system to be developed. This
system operationally eliminates all the tensions of the Admin and helps him in effectively
tracking the project progress. This kind of automation will surely reduce the time and energy,
which previously consumed in manual work. Based on the study, the system is proved to be
operationally feasible.
Economic Feasibility
Economic Feasibility or Cost-benefit is an assessment of the economic justification for a
computer-based project. As hardware was installed from the beginning & for lots of purposes
thus the cost on project of hardware is low. Since the system is a network based, any number
of employees connected to the LAN within that organization can use this tool from at
anytime. The Virtual Private Network is to be developed using the existing resources of the
organization. So the project is economically feasible.
Technical Feasibility
According to Roger S. Pressman, Technical Feasibility is the assessment of the technical
resources of the organization. The organization needs IBM compatible machines with a
graphical web browser connected to the Internet and Intranet. The system is developed for
platform Independent environment. Java Server Pages, JavaScript, HTML, SQL server and
Web Logic Server are used to develop the system. The technical feasibility has been carried
out. The system is technically feasible for development and can be developed with the
existing facility.
REQUEST APPROVAL
Not all request projects are desirable or feasible. Some organization receives so many
project requests from client users that only few of them are pursued. However, those projects
that are both feasible and desirable should be put into schedule. After a project request is
approved, it cost, priority, completion time and personnel requirement is estimated and used
to determine where to add it to any project list. Truly speaking, the approval of those above
factors, development works can be launched.
This system has input screens in almost all the modules. Error messages are developed to alert
the user whenever he commits some mistakes and guides him in the right way so that invalid
entries are not made. Let us see deeply about this under module design.
Input design is the process of converting the user created input into a computer-based format.
The goal of the input design is to make the data entry logical and free from errors. The error is
in the input are controlled by the input design. The application has been developed in user-
friendly manner. The forms have been designed in such a way during the processing the
cursor is placed in the position where must be entered. The user is also provided with in an
option to select an appropriate input from various alternatives related to the field in certain
cases. Validations are required for each data entered. Whenever a user enters an erroneous
data, error message is displayed and the user can move on to the subsequent pages after
completing all the entries in the current page.
OUTPUT DESIGN
The Output from the computer is required to mainly create an efficient method of
communication within the company primarily between the project leader and his team
members, in other words, the administrator and the clients. The output of VPN is the system
which allows the project leader to manage his clients in terms of creating new clients and
assigning new projects to them, maintaining a record of the project validity and providing
folder level access to each client on the user side depending on the projects allotted to him.
After completion of a project, a new project may be assigned to the client. User authentication
procedures are maintained at the initial stages itself. A new user may be created by the
administrator himself or a user can himself register as a new user but the task of assigning
projects and validating a new user rests with the administrator only.
The application starts running when it is executed for the first time. The server has to be
started and then the internet explorer in used as the browser. The project will run on the local
area network so the server machine will serve as the administrator while the other connected
systems can act as the clients. The developed system is highly user friendly and can be easily
understood by anyone using it even for the first time.
SYSTEM TESTING
TESTING METHODOLOGIES
The following are the Testing Methodologies:
Unit Testing.
Integration Testing.
User Acceptance Testing.
Output Testing.
Validation Testing.
Unit Testing
Unit testing focuses verification effort on the smallest unit of Software design that is
the module. Unit testing exercises specific paths in a module’s control structure to
ensure complete coverage and maximum error detection. This test focuses on each module
individually, ensuring that it functions properly as a unit. Hence, the naming is Unit Testing.
During this testing, each module is tested individually and the module interfaces are
verified for the consistency with design specification. All important processing path are tested
for the expected results. All error handling paths are also tested.
Integration Testing
Integration testing addresses the issues associated with the dual problems of
verification and program construction. After the software has been integrated a set of high
order tests are conducted. The main objective in this testing process is to take unit tested
modules and builds a program structure that has been dictated by design.
Bottom-up Integration
This method begins the construction and testing with the modules at the lowest level
in the program structure. Since the modules are integrated from the bottom up, processing
required for modules subordinate to a given level is always available and the need for stubs is
eliminated. The bottom up integration strategy may be implemented with the following steps:
The low-level modules are combined into clusters into clusters that perform a specific
Software sub-function.
A driver (i.e.) the control program for testing is written to coordinate testcase input
and output.
The cluster is tested.
Drivers are removed and clusters are combined moving upward in the program
structure
The bottom up approaches tests each module individually and then each module is module is
integrated with a main module and tested for functionality.
Output Testing
After performing the validation testing, the next step is output testing of the proposed
system, since no system could be useful if it does not produce the required output in the
specified format. Asking the users about the format required by them tests the outputs
generated or displayed by the system under consideration. Hence the output format is
considered in 2 ways – one is on screen and another in printed format.
Validation Checking
Validation checks are performed on the following fields.
Text Field:
The text field can contain only the number of characters lesser than or equal to its size. The
text fields are alphanumeric in some tables and alphabetic in other tables. Incorrect entry
always flashes and error message.
Numeric Field:
The numeric field can contain only numbers from 0 to 9. An entry of any character
flashes an error messages. The individual modules are checked for accuracy and what it has to
perform. Each module is subjected to test run along with sample data. The individually
tested modules are integrated into a single system. Testing involves executing the real data
information is used in the program the existence of any program defect is inferred from the
output. The testing should be planned so that all the requirements are individually tested.
A successful test is one that gives out the defects for the inappropriate data and
produces and output revealing the errors in the system.
USER TRAINING
Whenever a new system is developed, user training is required to educate them about
the working of the system so that it can be put to efficient use by those for whom the system
has been primarily designed. For this purpose, the normal working of the project was
demonstrated to the prospective users. Its working is easily understandable and since the
expected users are people who have good knowledge of computers, the use of this system is
very easy.
MAINTAINENCE
This covers a wide range of activities including correcting code and design errors. To
reduce the need for maintenance in the long run, we have more accurately defined the user’s
requirements during the process of system development. Depending on the requirements, this
system has been developed to satisfy the needs to the largest possible extent. With
development in technology, it may be possible to add many more features based on the
requirements in future. The coding and designing is simple and easy to understand which will
make maintenance easier.
TESTING STRATEGY:
A strategy for system testing integrates system test cases and design techniques into a well-
planned series of steps that results in the successful construction of software. The testing
strategy must co-operate test planning, test case design, test execution, and the resultant data
collection and evaluation. A strategy for software testing must accommodate low-level tests
that are necessary to verify that a small source code segment has been correctly
implemented as well as high level tests that validate major system functions against user
requirements.
Software testing is a critical element of software quality assurance and represents the
ultimate review of specification design and coding. Testing represents an interesting anomaly
for the software. Thus, a series of testing are performed for the proposed system before the
system is ready for user acceptance testing.
SYSTEM TESTING:
Software once validated must be combined with other system elements (e.g. Hardware,
people, database). System testing verifies that all the elements are proper and that overall
system function performance is
achieved. It also tests to find discrepancies between the system and its original objective,
current specifications and system documentation.
UNIT TESTING:
In unit testing different are modules are tested against the specifications produced during the
design for the modules. Unit testing is essential for verification of the code produced during
the coding phase, and hence the goals to test the internal logic of the modules. Using the
detailed design description as a guide, important Conrail paths are tested to uncover errors
within the boundary of the modules. This testing is carried out during the programming stage
itself. In this type of testing step, each module was found to be working satisfactorily as
regards to the expected output from the module.
In Due Course, latest technology advancements will be taken into consideration. As
part of technical build-up many components of the networking system will be generic in
nature so that future projects can either use or interact with this. The future holds a lot to
offer to the development and refinement of this project.
Integration testing
Integration tests are designed to test integrated software components to determine if
they actually run as one program. Testing is event driven and is more concerned with the
basic outcome of screens or fields. Integration tests demonstrate that although the components
were individually satisfaction, as shown by successfully unit testing, the combination of
components is correct and consistent. Integration testing is specifically aimed at exposing the
problems that arise from the combination of components.
System Test
System testing ensures that the entire integrated software system meets requirements. It
tests a configuration to ensure known and predictable results. An example of system testing is
the configuration oriented system integration test. System testing is based on process
descriptions and flows, emphasizing pre-driven process links and integration points.
Login
Purchase Space
Data encryption
Register
Registration Confirmation
Access Information
Delete files
Deletion Confirmation
The figure 3.17 provides snapshot of the viewing of file that is encrypted upon selection of
file before uploading to cloud.
“Provable Multicopy Dynamic Data This paper discusses about the map
4 Possession in Cloud Computing Systems” based provable data possessions of
By Ayad F. Barsoum and M. Anwar Hasan multiple copies of dynamic data.
An approach to problem analysis is
“Problem Analysis and Structure” By presented in which problems are
5 Michael JACKSON decomposed into subproblems of
recognised classes.
Journals
OPENDATACENTERALLIANCE This document offers a perspective
BestPractices: Architecting Cloud- for developers focused on advancing
1
Aware Applications Rev. 1.0 application architectures and
development practices.
This paper describes vendor neutral
Cloud Customer Architecture for
best practices for hosting the services
2 Mobile
and components required to support
mobile apps using cloud computing.
This white paper explains how
CREATING APPLICATIONS
Software AG’s Digital Business
3 FOR DIGITAL TRANSFORMATION
Platform provides the foundation for
your next-generation applications.
Table 3.1. List of references.
language used should be tailored to the audience; maintaining good eye contact; body
language; presenting the ideas appropriately and precisely.
Following are some of the specific non-technical skills, which helped to improve co-
ordination and communication skills.
Participation in Meeting
There will be periodic meetings like daily or weekly, based on the need for good progress.
The participation in these meetings helps to align the individual work. Also, it helps to
prioritize the requirements. The discussions during these meeting will give a clear idea about
the end results expected. The obstacles of work progress can be shared and resolved through
such discussions.
Verbal and Written Communication
Even though it is infrequent that one presents his/her ideas to others, there will probably times
when one needs to present information to a group of people. As a part of industrial training
there were weekly presentations on the researches carried out in HP R&D. These
presentations helped to improve verbal communication as well as written communication.
Another type of written communications to mention is: e-mail writing, which is necessary to
communicate with managers and team members. Also, Lync messenger is used to
communicate and resolve the technical problems that arise. To use the various communication
Chapter 4
Reflection Notes
The following section describes experience regarding your internship and assessment, list of
specific technical outcomes of the internship and list of specific non-technical outcomes.
Personality Development
The different tasks assigned and the strategy to accomplish those tasks had a good
impact on overall personality development. The technical skills acquired helped to choose an
appropriate resource to refer for task completion. Further, the non-technical skills acquired
helped to exchange the ideas and resolve the technical issues during development.
Time Management
The tasks assigned during industrial training were planned according to the priorities
and dependencies. This planning was solely dependent on the intern based on the interactions
with mentors and manager. Time is one of the important resources to be managed properly to
excel in the work environment and deliver the time-bound tasks to co-ordinate with the team.
Time management is also a skill, which can be improved through experience.
tickets. This ticket is used as reference for communication till the end of serving that request .