Vous êtes sur la page 1sur 53

LINUXSOFT TECHNOLOGIES PVT. LTD. A Project Report On www.BookWorm.

com

Online Book Details and Book Management Business Rules and Requirements Document

Rajasthan Technical University, Kota (Raj.) Guide & Project Coordinator: MR. DINESH SUMAN

Submitted By:ANKIT SHARMA PRASKANDAN NAGAR

Table of Contents
1.

Overview Project Overview Introduction of Project Objective and Scope of the Project Company Profile 2.1 Key Services 2.1.1 Website Design And Development 2.1.2 Application Development 2.1.3 Corporate Training 2.1.4 Enterprises Solutions 2.1.5 Networking 2.1.6 Software Consultancy 2.1.7 Database Driven Solutions 2.1.8 Web Hosting 2.1.9 Web Programming And Scripts 2.1.10 Multilingual Sites 2.1.11 Web Promotion & Marketing 3. Methodology(SDLC) 3.1 Survey 3.2 Feasibility Study 3.3 Analysis 3.4 Preliminary Design 3.5 System Design 3.6 Implementation 3.7 Acceptance Test Generation 3.8 Quality Assurance 3.9 Database Conversion 3.10 Installation
2

2.

4. Tools And Technologies 4.1 Introduction to .NET 4.2 Introduction to ASP.NET 4.3 Advantages of ASP.NET 4.4 Features of ASP.NET 4.6 Hardware & Software Specificaion 5. System Implementation 5.1 Outputs/Snapshots 5.2 Database Design 6. Acceptance test Generation 6.1 System Testing And Debugging 6.2 Types Of Testing 7. Implementation 7.1 Description 8. Conclusion 9. Bibliography

Declaration__________________

I express my warmest thanks & deep sense of gratitude to the individuals for their generous help in discussing the project and giving their valuable time in successful completion of this project. Time to time I got constructive suggestions, guidance and encouragement. First of all, with much pride and delight I would like to express my sincere thanks to Mr. Rohit Gupta, Director, LinuxSoft Technologies Pvt. Ltd. , Jaipur, for valuable suggestions throughout the project work and I would like to express my special thanks to Mr.Dinesh Suman,Project Guide, , LinuxSoft Technologies Pvt. Ltd. for her excellent guidance and Without her sustained interest and encouragement, this work could not have been possible to reach the state of completion with satisfaction. In fact it is real devotion to the development work, which instilled in me, the need of a passionate commitment to pursue this dissertation.

The project training here at, LinuxSoft Technologies Pvt. Ltd, Jaipur has been very useful and enlightening experience for me. The knowledge I gained here in the field of Software Development would greatly help me in developing the software in future for the organization. This is a Project work undertaken in context of partial fulfillment of the degree of Bachelors in Technology (B.tech) by Rajasthan Technical University (R.T.U). The project has been prepared jointly by Ankit Sharma and Praskandan Nagar who both are pursuing their Bachelors in Technology in the field of Information Technology. The students are presently studying in their VII semester from Uttam Devi Mohan Lal College of Engineering (A reputed institute of JECRC foundation), Jaipur.
4

PROJECT OVERVIEW
ABSTRACT OF THE PROJECT:The main aim of the project is to make the working of Online Book Store very simple and easily achievable. The major objective of the project is to make the process of Online Book Store easy and user friendly Also, an utmost care has been taken to make this project totally system efficient. This project intends to introduce more user friendliness in the various activities such as- book updating, maintenance, and searching. The process of book maintenance and updation can also be accomplished by the admin. The entire information is maintained in the database or files and has been secured with security measures; only authorized user can retrieve the necessary information which can easily be accessible from the file. Online Book Store has been designed to computerize the following functions Creating new account Providing a specific Books Show the Category Modification to existing Category Modification to existing Details Updation of Books Deletion of existing Books, Author and Publisher Administrative Login Change Password Addition of New User Feedback Help Section
5

COMPANY PROFILE
Linux Soft Technologies Pvt. Ltd. , Jaipur is the Redhat Authorized training partner, exam centre & Registered with Govt. of India. We are the leading TrainingSolution-Development organization of Redhat Linux, Oracle, Cisco, Microsoft, Sun Microsystems, VHDL / VLSI & ROBOMAKING-EMBEDDED SYSTEMS. We have been providing services in imparting training and solution in Networking domain & Programming covering LAN, MAN, WAN with the complete offerings in Internet Security.

Based on our extensive support experience with a variety of customers, Linux Soft Technologies Pvt. Ltd. has developed a unique approach for technical support. We offer consulting and planning, integration and maintenance services for many open source projects, allowing you to deploy them across your network with complete peace of mind. With growing popularity and acceptance of Linux, RoboMaking, VLSI, Oracle, and Routers in the govt. sector we started a company, The Linux Soft Technologies Pvt. Ltd. to provide all Computer based solutions under one roof.

Linux Soft Technologies Pvt. Ltd. is


1) An Authorized Redhat Training partner & Exam Centre from USA, Microsoft Certified Solution Provider (MCSP) & Cisco Solution Provider. 2) Training, Solution & Development Company Registered

by Govt. of INDIA.

Background

Linux Soft TECHNOLOGIES Pvt. Ltd. is providing full service security and data networking solutions provider & Training centre for all major I.T Certifications. We provide complete, reliable, and dynamic network solutions, Web Solution & Security Solution to our clients. We design, develop, train, and deploy state - of - the - art information and communication system that are best suited to the needs of our customers.

Philosophy Linux Soft TECHNOLOGIES Pvt. Ltd. is committed to addressing each and every customer opportunity with a partnering approach. Based upon the customer's requirements, we design a solution that meets their business objectives. We ensure that our solution will provide growth and migration plans for the future. Linux Soft TECHNOLOGIES Pvt. Ltd. incorporates only the highest quality products and services in its solutions. This approach guarantees that all of our solutions meet the following criteria: overall quality, cost effectiveness, reliability, availability, maintainability, and are standards based.

People

The Linux Soft TECHNOLOGIES Pvt. Ltd. family is a team of qualified, skilled, highly trained and highly motivated professionals. We believe in the adage that a company is best defined by its people- dedicated, enthusiastic and innovative. There are no "Sales people" at Linux Soft TECHNOLOGIES Pvt. Ltd. Each employee is responsible for creating new business opportunities through a creative approach which combines cutting edge technology skills with expertise in the domain of networks.
7

Network Security Solution

The number of intrusions/hacking into private computer networks from the Internet is growing rapidly, in parallel with the explosive growth of the Internet; the extent of criminal activities within the Internet is expected to grow at an alarming rate. As businesses make increasing use of the Internet, this has also led to a spurt in deliberate abuse and criminal activities in this new medium. To protect your network from internal and external threats, Linux Soft Technologies Pvt. Ltd. Provides the most complete and comprehensive security solution from start to finish. If your company houses proprietary data and you have not addressed security, contact Linux Soft Technologies Pvt. Ltd. immediately. Security is not just a firewall.

Network Security Linux Soft Technologies Pvt. Ltd. prides itself on its ability to offer scalable, turnkey security solutions, which includes the following process. *Define Security Plan *Create network security design *Provide hardware and software *Implementation of security Architecture *Configuration of hardware and software *Ongoing security consulting services Linux / Windows Server-Setup Solution Linux Soft Technologies have implemented many Linux Windows Solution. In Linux & Windows we provide Solution for DNS, DHCP, WEB, MAIL, FIREWALL, PROXY, NETWORK INSTALLATION, ADS, BACKUP-RESTORE & Troubleshooting.

Security Services Linux Soft Technologies Pvt. Ltd. security audit looks at the current state of your information security and evaluates it against a benchmark - as
8

directed by your internal policies, industry standards or applicable legislation. At the end of this audit, Linux Soft Technologies Pvt. Ltd. will prepare a paper and discuss the "GAP ANALYSIS" along with options to "plug" the gaps. Linux Soft Technologies Pvt. Ltd. will then work with your team to come to a level of risk and cost of security which you feel happy with.

Firewall Services A firewall is protective fence around your network. Linux Soft Technologies Pvt. Ltd. range of firewall services is one of the most comprehensive in the market today. Our firewall solutions are not simply of the shelf, but are designed and implemented after a complete security audit of the organization's network. Linux Soft Technologies Pvt. Ltd. firewall suite has products from all leading vendors. Anti-Virus Services We monitor your gateway to the Internet for viruses, worms and Trojan horse programs, which continue to cause significant losses to organizations. Our continuous monitoring allows us to update patches remotely and immediately from our 24x7 secure lab- thus ensuring you are protected to highest level at all times.

VPN Services We create a secure VPN tunnel from your corporate networks to your clients. We achieve confidentiality, integrity and authenticity for your network users by implementing IPSec with IKE options and using AES or 3DES or IDEA algorithms.

WAN Services

Linux Soft Technologies Pvt. Ltd. range of WAN solutions runs the entire gamut from leased lines, ISDN, Broadband & Frame Relay. From large corporations to small home offices to mobile users we have the WAN Technology to suite every need. Our WAN Solutions are a byword for efficiency, robustness, flexibility and maintainability. . Linux Soft Technologies Pvt. Ltd. undertakes total consultancy for WAN's including the supply and configuration of Modems, CSU/DSU, Remote Access Servers, Routers, Firewalls, etc. We coordinate installation of all necessary cabling and ancillary support infrastructure to insure all elements necessary for a robust network are in place.

Leased Lines Linux Soft Technologies Pvt. Ltd. has setup many Leased lines with speeds ranging from 64Kbps to 512kbps, to provide dedicated connectivity to customers.

ISDN

10

Linux Soft Technologies Pvt. Ltd. is a virtual powerhouse of ISDN solutions, with unsurpassed proficiency in ISDN BRI, ISDN Leased Lines to ISDN Backups to Telecommuter ISDN Dial Ups. We configure ISDN BRI routers, NT Boxes and TA's. Linux Soft Technologies Pvt. Ltd. Is providing Training program on following Technologies Red Hat Linux RHCT, RHCE Cisco System CCNA, CCNP, CSPFA Microsoft MCP, MCSA, MCSE 2003, VB.Net, ASP.Net, C#.Net CompTia A+, Network+ Sun Microsystems Java, J2EE Oracle Oracle DBA/Developer VHDL/VLSI, Robomaking / Embedded Systems Security CEH, CCSA Linux Soft Technologies Pvt. Ltd. Is providing Solution on following Technologies 1) Redhat Linux 2) Cisco Router Switch Implementation 3) Windows Server Installation & Configuration 4) Cisco Pix Firewall Implementation 5) Web Hosting, Domain Registration 6) Web Site Development, Web Solution 7) Software Development 8) Electronic Projects 9) Database Solution

11

Contact Us
Contact: Address: Phone Number: Website: Email Address:

Linux Soft TECHNOLOGIES Pvt. Ltd.


5 Lal Kothi Scheme, Vidhan Sabha Road, Behind Apex Mall , Jaipur (Raj.). 0141-5531790 , +91 9828112636 www.linuxsoftjpr.org info@linuxsoftjpr.org

12

Software Development Life Cycle

Software Development Life Cycle (SDLC) is a structured sequence of phases for implementing an information system. A System/Software development life cycle (SDLC) is a logical process by which systems analysts, software engineers, programmers and end-users build information systems and computer application to solve business problems and needs. The System/Software development life cycle (SDLC) is a conceptual model used in project management that describes the stages involved in an information system development project, from an initial feasibility study through maintenance of the completed application. In the software development process we focus on the activities directly related to the production of the software, for example, design, coding, and testing. A development process is a sequence of steps. Each step performs a welldefined activity leading towards the satisfaction of the project goals, with the output of one step forming the input of the next one. We have followed the concept of SDLC in the following way: Survey Feasibility Study Analysis Preliminary Design System Design Implementation Acceptance Test Generation Quality Assurance Database Conversion Installation

13

Requirement Analysis

Requirement Analysis is the first phase of the SDLC. First, we need to figure out what the problem is (analysis)? We must know exactly what we want to do before we can begin to do it. A clear understanding of exactly what is needed is necessary for creating a solution. In this phase Business Analysts (BA), find out what is the problem and what are requirements and so on.It begins with a request from the user for a new system. It involves the following: Identify the requirement for the system. Clarify deficiencies in the current system. Identify deficiencies in the current system. Establish goals and objectives for the new system. Determine the feasibility for the new system. Prepare a project charter that will be used to guide the reminder of the project.

Feasibility Study

Feasibility Study is basically the test of the proposed system in the light of its workability, meeting users requirements, effective use of resources and of course, the cost effectiveness. It is a set of manual & computerized components for gathering, storing & processing business data for an organization. It also converts such data useful decision oriented information. The main goal of feasibility study is not to solve the problem but to achieve the scope. In the process of feasibility study, the cost and benefits are estimated with greater accuracy. It has three types: Operational Feasibility Technical Feasibility Economic Feasibility 14

Through Feasibility Study, we can specify User Requirement Specification (URS) and Software Requirement Specification (SRS). Depending on the results of the initial investigation, the survey is expanded to a more detailed feasibility study. Formation of a project form and appointment of a project leader. Preparation of System Flow Charts. Enumerate proposed candidate system. Describe the characteristics of that candidate system. Determine and evaluate the performance of that candidate system. Weight system performance and cost data. Selection of the best candidate system. .

ANALYSIS

Analysis is a detailed study of the various operations performed by a system and their relationships within and outside of the system. This activity is also used to study the system in details. The objective of this step is to develop structured system specifications for the proposed system. The structured system specification will be called the Essential Model. It involves: Detailed study of the system. Understand the procedure of the system. Determine the scope of the system. Define the goals of the proposed system.

PRELIMINARY DESIGN
The most creative and challenging phase of the system life cycle is System Design. The term design describes the final system and the

15

process by which it is developed. This activity deals with certain design issues that are to be finalized in consultation with the user. The two most important issues of relevance to the user are the automation boundary & the human machine interface. The output of this activity is the user implementation model. This model, in addition to the essential model defines the following for the system: Automation Boundary Report Layout Workable plan for implementing the candidate system. Screen layouts for the data entry forms Menus Information on personnel, money, hardware, facilities, and their estimated cost must also be available.

DESIGN
System Design involves the transformation of the user implementation model into software design. The first step is to determine how the output is to be produced and in what format.

Second, input data and master files (database) have to be designed to meet the requirements of the proposed output. The design specification of the proposed system consists of the following: Database schema Pseudo code for all the modules.

CODING
After designing the new system/software, the whole

system/software is required to be converted into computer language. Coding the 16

new system/software into computer programming language does this. It is an important stage where the defined procedures are transformed into control specifications by the help of a computer language. This is also called the Programming Phase in which the programmer converts the program specifications into computer instructions, which we refer as programs. The programs coordinate the data movement as and control the entire process in a system/software.

TESTING
Before actually implementing the new system/software into operations, a test

run of the system/software is done removing all the bugs, if any. It an important phase of a successful system. After codifying the whole programs of the system, a test plan should be developed and run on a given set of test data. In the system/software testing stage, we check the overall behavior of the system/software against the functional and the performance requirements. There are two type of testing:
White-Box: Internal part (code) of the project is testing. Black-Box: System behavior (input/output) is checked.

IMPLEMENTATION
After having the user acceptance of the new system/software developed, the Implementation phase begins. Implementation is the stage of a project during which theory is turned into practice. In this phase, user can know how to execute the package, how to enter data and so on. The implementation phase is less creative then system design. This activity includes programming, testing & integration of modules into progressively more complete system.

17

It is primarily concerned with user training, site preparation, and file conversion. During the final testing user acceptance is tested, followed by user training. System testing checks the readiness and accuracy of the system to access, update, and retrieve data from new files. The output of this activity is the complete integrated system. Major sub activities Coding Integration Testing Debugging Inputs Project character Design specification Outputs Integrated Systems

MAINTENANCE
When the implementation report is submitted, an Maintenance should be made to

determine whether the system/software meets the objectives stated in the general design report. In this phase, users may be able to suggest the easy-toimplement improvements.

ACCEPTANCE TEST GENERATION


This activity generated a set of test data that can be used to test the new system before accepting it. If successful, the program(s) is then run with live data. Otherwise a diagnostic procedure is used to locate and correct errors in the program. Input Project Character Output Quality Assurance test set

18

DATABASE CONVERSION
This activity involves conversion of data from the existing system (if any) to the new system.

PROCEDURE DESCRIPTION
The objective of this step is to produce a manual, which may be used as a guide for operating the system. Inputs Project Character User implementation model Outputs User manual (guide for end user)

INSTALLATION
This is another activity of the System Development Life Cycle. The change over from the current system to the new system is done. Inputs Project Character User manual Outputs Installed system This project involves all the activities of the System Development Life Cycle except for the database conversion and installation.

19

: ASP.NET

TOOLS AND TECHNOLOGY

ASP.net is the latest version of Microsofts Active Server pages Technology (ASP). ASP.NET is a unified Web development model that includes the services necessary for you to build enterprise class web application with a minimum of coding. ASP.net is part of .net framework, and when coding ASP.net you have access to classes in the .net framework. You can code your applications in any language compatible with the common language runtime (CLR), including Microsoft Visual Basic, C#, and Jscript, .Net and J #. These languages enable you to develop ASP.Net applications that benefit from the common language runtime, type safety and inheritance and so on.

ASP.NET Includes
A page and control framework. The ASP.NET compiler. Security Infrastructure. State-management facilities. Application configuration. Health monitoring and performance features. Debugging support. An XML web service framework. Extensible hosting environment and application life cycle management. An extensible designer environment. ASP is a server side scripting technology that enables scripts (embedded in web pages) to be executed by an Internet Server. ASP is a Microsoft technology. ASP stands for Active Server Pages. 20

ASP is a program that runs inside IIS. IIS stands for Internet Information Services. IIS comes a free component with Windows 2000. IIS is also a part of the Windows NT 4.0 Option pack. PWS is a smaller but fully functional version of IIS. PWS can be found on your windows 95/98 CD.

ASP file
An ASP file is just the same as an HTML file. An ASP file can contain text, HTML, XML and scripts. Scripts in an ASP file are executed on the server. An ASP file has the file extension .asp.

ABOUT ASP.NET
ASP 3.0 is the latest version of ASP, but there will never be an ASP 4.0 version . ASP.NET is the next generation ASP, but its not an upgraded version of ASP.ASP.NET Framework. Microsoft spent three years rewriting ASP.NET from the ground up, and ASP.NET is not fully backward compatible with ASP 3.0.

.NET FRAMEWORK
The .NET framework is the infrastructure for the Microsoft .NET platform. The .NET Framework is an environment for building, deploying and running web applications and the .NET framework contains a common language runtime and common class libraries like ADO.NET, ASP.NET and Windows Forms to provide advanced standard services that can be integrated into a variety of computer systems. The.NET framework provides a feature-rich application environment, simplified development and easy integration between a numbers of different development languages. The .NET framework is language neutral. Currently it supports C++, C#, Visual Basic and Jscript.Microsoft Visual Studio .Net is a common development for the .net framework. 21

Differences between ASP and ASP.NET


ASP .NET has a better language support, a large set of new ASP.NET provides increased performance by running compiled ASP.NET is not fully backward compatible with ASP.

controls and XML based components and better user authentication. code.

New in ASP.NET
Better language support Programmable controls. Event Driven programming. XML-Based components. User authentication, with accounts and roles. Higher scalability. Increased performance compiled code . Easier configuration and deployment. Not fully ASP compatible.

Language Support
ASP.NET uses the new ADO.NET. ASP.NET supports full Visual Basic , not VB script. ASP.NET supports C# and C++. ASP.NET supports Jscript as before.

ASP.NET Controls
ASP.NET contains a large set of HTML controls. Almost all HTML controls on a page can be defined as ASP.NET control objects that can be controlled by scripts .ASP.NET also contains a new set of object oriented input controls , like programmable list boxes and validation controls. A new data grid control supports sorting, data paging and everything you expect from a dataset control. 22

Software & Hardware Specification

Hardware Specification:

Processor: Minimum: 600 megahertz (MHz) Pentium processor. Recommended: 1 gigahertz (GHz) Pentium processor or higher.

Random Access Memory: Minimum: 256 megabytes (MB). Recommended: 512 MB or higher.

Hard Disk: Without MSDN: 2 GB of available space required on installation drive. 1 GB of available space required on system drive. With MSDN: 3.8 GB of available space required on installation drive with a full MSDN install or 2.8 GB of available space required on installation drive with a default MSDN install. 1 GB of available space required on system drive. Display: Minimum: 800 X 600 256 colors. Recommended: 1024 X 768 High Color - 16-bit.

23

Software Specification:

Operating System: Minimum:Microsoft Windows 2000 SP4. Recommended:Microsoft Windows XP SP2 (All Edition). Microsoft Windows Server 2003 SP1 (All Edition).

Web Browsers: Minimum: Internet Explorer 5, Mozilla 5, Firefox 2, Netscape 7.

DATABASE: Microsoft SQL Server 2005.

SOFTWARE TOOLS:

Language:

ASP.NET 2008 or Visual Studio 2008

Server Language:

C#

24

FRONT-END

The frontend that has been used for developing this project is ASP.NET 3.5 with C#(C Sharp) as the programming language for writing the source code. Now, let us take a brief look at this two frontend tools.

BACK-END

The backend that has been used for developing this project is SQL SERVER2005. SQL pronounced as sequel stands for structured query language. SQL is used to communicate with the database according to ANSI. It is a standard language for a relational database management system that use SQL are oracle, Sybase, Microsoft SQL SERVER, access interface etc. Standard SQL command such as Select, Insert, Delete, Update, Create and Drop can be used to accomplish almost everything that one needs to do with the database.

SYSTEM ANALYSIS AND DESIGN

DATA FLOW DIAGRAM:-

Graphical description of a systems data and how the processes transform the data is known as Data Flow Diagram (DFD). A DFD shows the flow of data through a system. It views a system as a function that transforms the inputs into desired 25

outputs. Any complex system will not perform this transformation in a Single Stop, and the data will typically undergo a series of transformations before it becomes the output. The DFD aims to capture the transformations that take place within a system to the input data so that eventually the output data is produces. The agent that performs the transformation of data form one state to another is called processes. So the DFD show the movement of data through the different transformations of processes in the system. Control information such as record counts, passwords and validation requirements is not pertinent to a data flow diagram. Meaning full names for data flows, processes and data stores must be chosen. To construct the data flow diagrams, we use Arrows: An arrow identifies the data flow- data in motion. It is a pipeline through which information flows. All data flow are identified by unique names. These names are chosen so that they convey some meaning about what the data is. Circles: Circles stands for processes that convert data into information. Open ended boxes: An open-ended box represents a data store or a temporary repository of data. Squares: A square defines a source (originator) or destination of system data. There are three types level of DFD these are as flows-

26

1 Level DATA FLOW DIAGRAM

At this level of D.F.D. all the process together with all the data stores (tables). It shows the true data flow i.e. how data is actually flowing in the system .Data is coming from which table and going into which table is clearly shown by this DFD. This DFD is the main reference for the development of the system. After understanding the whole system, The application developer will fall back upon this DFD during the development phase.

27

Executive Summary : -

BookWorm is Book providing company site. User can see different BOOKS available , by different Authors and Publisher etc. User can select his book of interest and can order online and pay online.

This Web Application is developed for make easiest communication and share the information between Book company & User Of The Web Site. Having studied the various requirements of the customer, Our Team concluded the following requirements of the Application: BookWorm Website is the Book Search Engine. It share the informations related to most famous books, new books, Books of particular category. The user of the site:
a. Administrator: Administrator will access all the page of site. Admin

can modify any information about the Books, Category , Author, Pubisher etc any time.
b. Guest User : Guest user

has interaction with all the information of

site related to any Book, Author, Publisher etc. He can store his feedback on the website

28

Web Page Description

ADMIN LOGIN PAGE :-

Web Page Description Name Admin User-ID Details Tab Order: 1 Control: Text Field Default: Blank Function Description: Administrator will enter there Id. It will accept nvarchar type value. It should not be blank otherwise an error message will be displayed i.e. Enter :Login Id. If Login Id not exist into database, an error message should be displayed i.e. Login Id Not Exist, Please type Password another Login Id. Tab Order: +1 Control: Text Field Default: Blank 29

Function Description: User will enter their password and it Login should be masked. Control: Button Default: Enable Function Description: If Login Id and Password is correct, Index page of Administrator section Open.

Validation in Login Process: When Administrator wants to Login, the Administrator have to fill LoginId otherwise an error message should be displayed i.e. Enter Login Id. Administrator must have to enter Password otherwise an error message should be displayed i.e. Enter Password. LoginId and Password should be correct otherwise an error message will be displayed i.e. Either Login Id or Password is incorrect.

following checks are carried out.

ADMIN PANEL :-

Web Page Description

30

Name Details Main Page Options: ADMIN HOME Category Management Author Management Publisher Management Book Management Account Manager Help Contact Us About Us Control: HyperLink Function Description: This option displays new page that Category Management Author Management Publisher Management Book Management have the options to manage the available Contents. Control: Hyper Link Function Description: This option displays new page that have the options to manage the Category. Control: Hyper Link Function Description: This option display new page that have the options to manage the Author. Control: Hyper Link Function Description: This option display new page that have the options to manage the Publisher. Control: Hyper Link Function Description: This option display new page that Account Manager have the options to manage the Books. Control: Hyper Link Function Description: This option display new page that Help have the options to manage the Admin Accounts. Control: Hyper Link Function Description: This option display new page that 31

FAQ ADMIN HOME

have the options to manage the States in which Tours are Contact Us available. Control: Hyper Link Function Description: This option display new page that About Us have the Contact Details Control: Hyper Link Function Description: This option display new page that FAQ have the About us Details. Control: Hyper Link Function Description: This option display new page that have the options to manage the Frequently Asked Questions.

BOOK MANAGEMENT :-

Web Page Description

Name Select Category

Details Control: Drop Down List Function Description: This control the Category Selection. 32

Book Display

Control: Grid View Function Description: This Grid View control the Books of selected Category Control: Button Function Description: This Opens a a new view which is use to Add New Books Control: Button into Grid View Default: Enable Function Description: This button delete the selected Book from the database.

Add Book

Delete

ADD BOOK :-

Web Page Description Name Details Select Control: DropDownList Category Default: Blank Function Description: This field enables us to enter the category Book Name name from the list. Control: Text Box Default: Blank 33

Author

Function Description: This field accepts nvarchar type value. Control: DropDownList Default: Blank Function Description This field enables us to enter the Author name from the list. Control: DropDownList Default: Blank Function Description: This field enables us to enter the Publisher name from the list. Control: Text Box Default: Select City Function Description: This field accepts nvarchar type value. Control: Text Box Default: Blank Function Description: This field accepts nvarchar type value.. Control: File Upload Default: Blank Function Description: This field accepts the image Url. Control: Button Default: Enable Function Description: This button have the functionality to enter all the values into the database. Control: Button Default: Enable Function Description: Reset all the controls. Control: Link Button Default: Back Function Description: This have the functionality to go one step back from the current page.

Publisher

Edition

Price

Image

Submit

Reset

Finish

34

CATEGORY MANAGEMENT :-

Web Page Description Name Add Category Details Control: Link Button Default: Enable Function Description: This button navigate to new page that Delete have the options to add the new Category Control: Button of GridView Default: Enable Function Description: This button have the functionality to Edit delete the particular schedule. Control: Button of GridView Default: Enable 35

Function Description: This button have the functionality to navigate on new page that have the functionality to edit selected schedule.

ADD CATEGORY :-

Web Page Description Category Name Submit Control: Text Box Function Description: This field accepts nvarchar type value. Control: Button Function Description: This button have the functionality to Reset Finish enter all the values into the database. Control: Button Function Description: Reset all the controls. Control: Button Function Description: This have the functionality to go one step back from the current page

36

AUTHOR MANAGEMENT :-

Web Page Description : Name Author Management Delete Details Control: Grid View Default: Enable Function Description: The gridview shows the Author . Control: Button of GridView Default: Enable Function Description: This button has the functionality to 37

Edit

delete. Control: Button of GridView Default: Enable Function Description: This button have the functionality to navigate on new page that have the functionality to edit

ADD AUTHOR : -

Web Page Description Author Name Author Details E-Mail Website Submit Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description:. This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Button 38

Function Description: This button have the functionality to enter all the values into the database.

PUBLISHER MANAGEMENT :-

Web Page Description Name Publisher Management Delete Details Control: Grid View Default: Enable Function Description: The gridview shows the Publisher Control: Button of GridView Default: Enable Function Description: This button has the functionality to Edit delete. Control: Button of GridView Default: Enable Function Description: This button have the functionality to 39

navigate on new page that have the functionality to edit.

ADD PUBLISHER :-

Web Page Description

Publisher Name Publisher Address Contact No. E-MAIL Website Reset

Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Button Default: Enable 40

Submit

Function Description: Reset all the controls. Control: Button Function Description: This button have the functionality to enter all the values into the database. Control: Button Default: Back Function Description: This have the functionality to go one step back from the current page.

Finish

ACCOUNT MANAGER :-

41

Web Page Description Name Change Password Add New Admin Welcome To Admin Account Manager Details Control: Button Function Description: This button navigate to new page that have the options to Change Password Control: Button Function Description: This button navigate to new page that have the options to Add New Admin Control: Label Function Description: Welcome To Admin Account Manager

CHANGE PASSWORD :-

42

Web Page Description Name User Name Enter Password New Password Confirm Password Details Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description: This field accepts nvarchar type value. Control: Text Box Function Description : This field accepts nvarchar type value.

ADMIN HELP SECTION :-

USER HOMEPAGE :43

ABOUT US :-

CONTACT US :44

FAQ :-

BOOKS PAGE :45

Web Page Description Name Select Category Books Details Control: Drop Down List Function Description: helps to select the desired Category of books Control: Datalist Function Description: Helps to Show the books of the selected Buy category Control: Button Function Description: this button navigates you to the buy section of the website

AUTHOR PAGE :-

46

Web Page Description Name Authors Details Control: Datalist Function Description: Helps to Show the various Authors stored in the database

Database Design
Once the input data is captured in the system, these may

:
have to be

preserved either for a short or long period. These data will generally be stored in files or databases in logical manner. The designer will have to advise the techniques of sorting and retrieving data from these files. The system uses database, which is described as follows.

1. Table Name : author

47

2.Table Name : category

3.Table Name : book

4.Table Name : login

48

5.Table Name : publisher

DATABASE SNAPSHOTS :Category Table :-

Author Table :-

49

Publisher Table :-

Book Table :-

Login Table :-

50

SECURITY FEATURES
Authentication is the process of identifying users. Authorization is the process of granting access to users based on identity. Together, authentication and authorization provide the means to keep your application secure from intruders. The kind of security measures used in our System are as follows: User Authentication Only the Valid users, who are present in the pre defined list of Users stored in User Master table are granted permissions to enter the System . Any user apart from Record of users are denied access.

User Session Creation :This helps in the creation of isolated Login which reduces the chance of trespassing into the Admin Panelor any other restricted part.

CONCLUSION

51

The main objective of this package is to assist an online Book Management System or Search Engine in dealing with the customer of the Books for Ordering and Searching of the books with just a very less span of time..The chance of making mistake is negligible as with every transaction the database is updated. It also reduces service time. With this Website the workload is reduced and hence the efficiency is increased due to the User Friendlyness of this website, the chance of error is Negligiable. The accuracy of this Website is optimum.

BIBLIOGRAPHY
ASP.NET in 21 days

Programming in C# Essential Asp.Net with examples in C#


Professional ASP.NET 3.5 A First Look At Sql Server 2005

52

Vous aimerez peut-être aussi