Vous êtes sur la page 1sur 39

1

SHOPENMART.COM FOR MOSAIC TECHNOLOGIES

A Project Report submitted In the requirement of the partial fulfillment of the degree of

Bachelor of Technology In Information Technology


Under the Guidance of

Mr. Prabhat Kumar Mosaic technologies Noida

Submitted By:-

Sushma Yadav Roll No. 0703313051

Raj Kumar Goel Institute of Technology, Ghaziabad

TABLE OF CONTENTS
Certificate 3 Acknowledgement4 Abstract.5 List of symbols..5 List of Abbreviations.5 List of Diagrams....5 Chapter -1: Introduction ....6
1.1 Purpose6 1.2 Scope of the Project....6

1.3 Technical overview..8


1.4 Technology Used17

Chapter -2: Overall Description ......18 2.1 Hardware Interface....18 Chapter -3: Specific Requirements....19 3.1 Use Case Reports..19 3.2 Data Flow Diagram...21 3.3 Database Design .14 Chapter -4: System Behaviour28 4.1 Architecture Diagram...28 Chapter -5 Implementation and Results...29 5.1 General User Interface29 Chapter -6: Conclusion 30 Chapter-7: Screenshots ....33 Bibliography.36

CERTIFICATE
This is to certify that Project Report entitled SHOPENMART which is submitted by Sushma Yadav in partial fulfillment of the requirement for the award of degree B.Tech. in Department of Information Technology of U.P. Technical University, is a record of the candidates own work carried out by them under my supervision. The matter embodied in this thesis is original and has not been submitted for the award of any other degree.

Project Guide Mr. Prabhat Kumar Mr. Vipul Mishra

ACKNOWLEDGEMENT

I would like to thanks to my project guide Mr. Prabhat kumar , for his indefatigable guidance, valuable suggestion, moral support, constant encouragement and contribution of time for the successful completion of project work. I am very grateful to him, for providing all the facilities needed during the project development. At the outset, I sincerely thank all faculty members of my institution for his extra effort to make our session on line inspire of all ideas. I thank my Counselors for his indispensable support and encouragement thought the project. I must also thanks to respected Mr. Vipul Mishra for his valuable suggestion while working on the project. I would like to thank all those who helped me directly or indirectly.

Sushma Yadav B.Tech (IT 7TH Sem) Raj kumar goel institute of technology Roll No. (0703313051)

ABSTRACT
The SHOPENMART .COM Web site is the application that provides customers with online shopping. Through a Web browser, a customer can browse the catalog, place items to purchase into a virtual shopping cart, create and sign in to a user account, and purchase the shopping cart contents by placing an order with a credit card FEATURES: Secure Easy to use Reliable and accurate

DEFINITIONS, ACRONYMS AND ABBREVIATIONS


DEFINITIONS:

Microsoft Access- a database by Microsoft SRS - Software Requirements Specification (this document) Database - an organized body of related information ADO.NET - ADO.NET includes .NET Framework data providers for connecting to a database, executing commands, and retrieving results. Visual C#.NET - enables you to build rich, connected Web and client applications on the .NET Framework.

ABBREVIATIONS:

SQL Structured Query Language ADO ->Activex Data Object.

LIST OF DIAGRAMS
Figure 2.1 Figure 2.2 Figure 2.3 Figure 2.4 User-User Interaction Diagram Architecture Diagram Database Diagram Data Flow Diagram (DFD)

CHAPTER 1
INTRODUCTION
1.1

Purpose

The SHOPENMART Web site is the application that provides customers with online shopping. Through a Web browser, a customer can browse the catalog, place items to purchase into a virtual shopping cart, create and sign in to a user account, and purchase the shopping cart contents by placing an order with a credit card. The Application is a working demonstration of how to use blueprints principles in a real application design. This document is an online guide to the design and the implementation of the application Enterprise Applications with web technology. Each release of the application maintains consistent design features such as separating logic and presentation, using web component for control and web pages for presentation, using business components, and so on. high-level design features, this document goes deeper into the implementation details of the current application release. This document is provided as an online-only resource so that it may be continually extended and updated. This document begins with a description of the separate applications that the sample application comprises, describes the modular structure of the EMAT application, and provides an in-depth description of several pieces of the modules.

1.2 Scope of the Project


The above mentioned project is intended to develop a website with the use of latest development tools in Microsoft .NET technology

Various features implemented in our project :

Control modulethe control module dispatches requests to business logic,

controls screen flow, coordinates component interactions, and activates user sign on and registration. The control module is implemented by the WAF and applicationspecific WAF extensions.
Shopping cart modulethe shopping cart tracks the items a user has

selected for purchase


Sign on modulethe sign on module requires a user to sign on before accessing

certain screens,
Messaging

and manages the sign on process modulethe messaging module asynchronously transmits pet store to the OPC

purchase orders from the based on user search criteria

Catalog modulethe catalog module provides a page-based view of the catalog Customer modulethe customer module represents customer information:

addresses, credit cards, contact information, and so on

As far as the future is concerned the website will be: 1. WAP enabled. 2. More safety and Security. 3. Other forms of Authentication. etc. etc. will be incorporated in the near future. So, the future scope is never going to end of this kind of project

Control Module Requirements The control module forms the framework underlying the application, so it naturally has the most highlevel requirements. Extensibility and maintainability are prime considerations in this module. The control module must be extensible because all real-world enterprise applications change constantly. Because the control module plays a role in virtually every interaction, its code must be well-structured to avoid complexity-related maintenance problems. The requirements of the control module are:

The module must handle all HTTP requests for the application. This module controls a Web application, and interacts with a user who sends HTTP service requests. The control module is responsible for classifying and dispatching each of these requests to the other modules. HTTP responses may be of any content type. Web application developers do not want to be limited to just textual content types. The control module must also be able to produce binary responses. Business logic must be easily extensible. Enterprise applications are always changing and growing as business rules and conditions change. A developer familiar with the control module should be able easily to add new functionality with minimal impact on existing functions. New views must be easy to add. Most business logic changes imply new user views, so developers must be able to create new views easily. Module must provide application-wide control of look and feel. Manually editing hundreds or dozens of user views is not a practical way to manage application look and feel. The control module must provide a way for application screen layout and style to be controlled globally. Application must be maintainable even as it grows. The control module must be structured so that new functions added over time do not result in a thicket of unmentionable spaghetti code. It should be possible to easily understand the control of even an application with several hundred business classes. Application-wide functionality must be easy to add. New application requirements occasionally apply to every operation or view in an application. The control module must be structured so that such requirements can be easily met.

1.3 Technology Overview of my Project

.Net 2005 Framework, SQL SERVER 2000 and SDLC of Project

.Net 2005 with c# 2.0


The Microsoft .NET Framework version 2.0 extends the .NET Framework version 1.1 with new features, improvements to existing features, and enhancements to the documentation. This section provides information about some key additions and modifications. For more information about compatibility and for a list of the public API modifications to the class library that might affect the compatibility of your application.

64-Bit Platform Support The new generation of 64-bit computers enables the creation of applications that can run faster and take advantage of more memory than is available to 32-bit applications. New support for 64-bit applications enables users to build managed code libraries or easily use unmanaged code libraries on 64-bit computers. For more information, see 64-bit Applications. Access Control List Support An access control list (ACL) is used to grant or revoke permission to access a resource on a computer. New classes have been added to the .NET Framework that allow managed code to create and modify an ACL. New members that use an ACL have been added to the I/O, registry, and threading classes. ADO.NET New features in ADO.NET include support for user-defined types (UDT), asynchronous database operations, XML data types, large value types, snapshot isolation, and new attributes that allow applications to support multiple active result sets (MARS) with SQL Server 2005. For more information about these and other new ADO.NET features, see What's New in ADO.NET. ASP.NET The Microsoft .NET Framework 2.0 includes significant enhancements to all areas of ASP.NET. For Web page development, new controls make it easier to add commonly used functionality to dynamic Web pages. New data controls make it possible to display and edit data on an ASP.NET Web page without writing code. An improved code-behind model makes developing ASP.NET pages easier and more robust. Caching features provide several new ways to cache pages, including the ability to build cache dependency on tables in a SQL Server database. You can now customize Web sites and pages in a variety of ways. Profile properties enable ASP.NET to track property values for individual users automatically. Using Web Parts, you can create pages that users can customize in the browser. You can add navigation menus using simple controls. Improvements to Web site features allow you to create professional Web sites faster and more easily. Master pages allow you to create a consistent layout for all the pages in a site, and themes allow you to define a consistent look for controls and static text. To help protect your sites, you can precompile a Web site to produce executable code from source files (both code files and the markup in .aspx pages). You can then deploy the resulting output, which does not include any source information, to a production server. Enhancements to ASP.NET also include new tools and classes to make Web site management easier for Web site developers, server administrators, and hosters.

10

ASP.NET accommodates a wide variety of browsers and devices. By default, controls render output that is compatible with XHTML 1.1 standards. You can use device filtering to specify different property values on the same control for different browsers. For a more complete list of new features in ASP.NET, see What's New in ASP.NET.

Authenticated Streams Applications can use the new Negotiate Stream and Stream classes for authentication and to help secure information transmitted between a client and a server. These authenticated stream classes support mutual authentication, data encryption, and data signing. The Negotiate Stream class uses the Negotiate security protocol for authentication. The Stream class uses the Secure Socket Layer (SSL) security protocol for authentication. COM Interpol Services Enhancements Four major enhancements have been made to the classes and tools that support interoperability with COM:

The operating system maintains a limited number of handles, which are used to reference critical operating system resources. The new Safe Handle and Critical Handle classes, and their specialized derived classes, provide safe and reliable means of manipulating operating system handles.

Marshaling improvements make interoperating with native code easier. Two enhancements to the interlope marshaled satisfy the two most common user requests: the ability to wrap native function pointers into delegates and the ability to marshal fixed-size arrays of structures inside structures. The performance of calls between applications in different application domains has been made much faster for common call types. New switches on the Type Library Importer (Tlbimp.exe) and Type Library Exporter (Tlbexp.exe) eliminate dependency on the registry to resolve type library references. This enhancement is important for creating robust build environments.

Console Class Additions New members of the Console class enable applications to manipulate the dimensions of the console window and screen buffer; to move a rectangular area of the screen buffer, which is useful for performing smooth, simple animation; and to wait while reading console input until a key is pressed. Other new class members

11

control the foreground and background colors of text, the visibility and size of the cursor, and the frequency and duration of the console beep. Data Protection API The new Data Protection API (DPAPI) includes four methods that allow applications to encrypt passwords, keys, connections strings, and so on, without calling platform invoke. You can also encrypt blocks of memory on computers running Windows Server 2003 or later operating systems. Debugger Display Attributes You can now control how Visual Studio displays a class or member when an application is being debugged. The debugger's Display Attributes feature enables you to identify the most useful information to display in the debugger.

Debugger Edit and Continue Support The .NET Framework 2.0 reintroduces the Edit and Continue feature that enables a user who is debugging an application in Visual Studio to make changes to source code while executing in Break mode. After source code edits are applied, the user can resume code execution and observe the effect. Furthermore, the Edit and Continue feature is available in any programming language supported by Visual Studio. Detecting Changes in Network Connectivity The Network Change class allows applications to receive notification when the Internet Protocol (IP) address of a network interface, also known as a network card or adapter, changes. An interface address can change for a variety of reasons, such as a disconnected network cable, moving out of range of a wireless local area network, or hardware failure. The Network Change class provides address change notification by raising events when a change is detected. Distributed Computing In the System.Net namespace, support has been added for FTP client requests, caching of HTTP resources, automatic proxy discovery, and obtaining network traffic and statistical information. The namespace now includes a Web server class that you can use to create a simple Web server for

responding to HTTP requests. Classes that generate network traffic have been instrumented to output trace information for application debugging and diagnostics. Security and performance enhancements have been added to the System.Net.Sockets.Socket and System.Uri classes.

12

In the System.Web.Services namespaces, support for SOAP 1.2 and nullable elements has been added. In the System.Runtime.Remoting.Channels namespaces, channel security features have been added. The TCP channel now supports authentication and encryption, as well as several new features to better support load balancing. Event Log Enhancements You can now use custom DLLs for EventLog messages, parameters, and categories. Expanded Certificate Management The .NET Framework now supports X.509 certificate stores, chains, and extensions. In addition, you can sign and verify XML using X.509 certificates without using platform invoke. There is also support for PKCS7 signature and encryption, and CMS (a superset of the PKCS7 standard available on Microsoft Windows 2000 and later operating systems). PKCS7 is the underlying format used in Secure/Multipurpose Internet Mail Extensions (S/MIME) for signing and encrypting data. For more information, see the X509Certificate2 class topic. FTP Support Applications can now access File Transfer Protocol resources using the WebRequest, WebResponse, and WebClient classes.

Generics and Generic Collections The .NET Framework 2.0 introduces generics to allow you to create flexible, reusable code. Language features collectively known as generics act as templates that allow classes, structures, interfaces, methods, and delegates to be declared and defined with unspecified, or generic type parameters instead of specific types. Actual types are specified later when the generic is used. Several namespaces, such as System Namespace and System.Collections.Generic, namespace provide generic classes for and methods. typed The new System.Collections.Generic provides support strongly collections.

System.Nullable<T> is a standard representation of optional values. Generics are supported in three languages: Visual Basic, C#, and C++. Reflection has been extended to allow runtime examination and manipulation of generic types and methods. New members have been added to System.Type and System.Reflection.MethodInfo, including IsGenericType to identify generic types (for example, class Gen<T,U> {...}), GetGenericArguments to

13

obtain type parameter lists, and MakeGenericType to create specific types (for example, new Gen<int, long>()). Globalization Five new globalization features provide greater support for developing applications intended for different languages and cultures.

Support for custom cultures enables you to define and deploy culture-related information as needed. This feature is useful for creating minor customizations of existing culture definitions, and creating culture definitions that do not yet exist in the .NET Framework. For more information, see the CultureAndRegionInfoBuilder class.

Encoding and decoding operations map a Unicode character to or from a stream of bytes that can be transferred to a physical medium such as a disk or a communication line. If a mapping operation cannot be completed, you can compensate by using the new encoding and decoding fallback feature supported by several classes in the System.Text namespace.

Members in the UTF8Encoding class, which implements UTF-8 encoding, are now several times faster than in previous releases. UTF-8 is the most common encoding used to transform Unicode characters into bytes on computers. The .NET Framework now supports the latest normalization standard defined by the Unicode Consortium. The normalization process converts character representations of text to a standard form so the representations can be compared for equivalence.

The GetCultureInfo method overload provides a cached version of a read-only CultureInfo object. Use the cached version when creating a new CultureInfo object to improve system performance and reduce memory usage.

I/O Enhancements Improvements have been made to the usability and functionality of various I/O classes. It is now easier for users to read and write text files and obtain information about a drive. You can now use the classes in the System.IO.Compression namespace to read and write data with the GZIP compression and decompression standard, described in the IETF RFC 1951 and RFC 1952 specifications,

14

which are available at the IETF Request for Comments (RFC) search page. Note: search is limited to RFC numbers. Manifest-Based Activation This feature provides new support for loading and activating applications through the use of a manifest. Manifest-based activation is essential for supporting ClickOnce applications. Traditionally, applications are activated through a reference to an assembly that contains the application's entry point. For example, clicking an application's .exe file from within the Windows shell causes the shell to load the common language runtime (CLR) and call a well-known entry point within that .exe file's assembly. The manifest-based activation model uses an application manifest for activation rather than an assembly. A manifest fully describes the application, its dependencies, security requirements, and so forth. The manifest model has several advantages over the assembly-based activation model, especially for Web applications. For example, the manifest contains the security requirements of the application, which enables the user to decide whether to allow the application to execute before downloading the code. The manifest also contains information about the application dependencies.

Manifest-based activation is provided by a set of APIs that allow managed hosts to activate applications and add-ins described by a manifest. These APIs contain a mixture of both new classes and extensions to existing classes. This activation model also invokes an entity called a Trust Manager that performs the following tasks:

1. Determines whether an application is allowed to be activated. This decision can be made by prompting the user, querying policy, or by any other means deemed appropriate for a given Trust Manager.

2. Sets up the security context to run an application in. Most commonly, this step involves setting up a code access security (CAS) policy tree on the application domain in which the application will run.

.NET Framework Remoting .NET Framework remoting now supports IPv6 addresses and the exchange of generic types. The classes in the System.Runtime.Remoting.Channels.Tcp namespace support authentication and encryption using the

15

Security Support Provider Interface (SSPI). Classes in the new System.Runtime.Remoting.Channels.Ipc namespace allow applications on the same computer to communicate quickly without using the network. Finally, you can now configure the connection cache time-out and the number of method retries, which can improve the performance of network load-balanced remote clusters. Using classes in the System.Net.NetworkInformation namespace, applications can access IP, IPv4, IPv6, TCP, and UDP network traffic statistics. Applications can also view address and configuration information for the local computers network adapters. This information is similar to the information returned by the Ipconfig.exe command-line tool. Ping The Ping class allows an application to determine whether a remote computer is accessible over the network. This class provides functionality similar to the Ping.exe command-line tool, and supports synchronous and asynchronous calls. Processing HTTP Requests from Within Applications You can use the HttpListener class to create a simple Web server that responds to HTTP requests. The Web server is active for the lifetime of the HttpListener object and runs within your application, with your application's permissions. This class is available only on computers running the Windows XP Service Pack 2 or Windows Server 2003 operating systems. Programmatic Control of Caching Using the classes in the System.Net.Cache namespace, applications can control the caching of resources obtained using the WebRequest, WebResponse, and WebClient classes. You can use the predefined cache policies provided by the .NET Framework or specify a custom cache policy. You can specify a cache policy for each request and define a default cache policy for requests that do not specify a cache policy.

The .NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. The .NET Framework is designed to fulfill the following objectives:

To provide a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely. To provide a code-execution environment that minimizes software deployment and versioning conflicts.

16

To provide a code-execution environment that promotes safe execution of code, including code created by an unknown or semi-trusted third party. To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. To make the developer experience consistent across widely varying types of applications, such as Windows-based applications and Web-based applications. To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code.

The .NET Framework has two main components: the common language runtime and the .NET Framework class library. The common language runtime is the foundation of the .NET Framework. You can think of the runtime as an agent that manages code at execution time, providing core services such as memory management, thread management, and remoting, while also enforcing strict type safety and other forms of code accuracy that promote security and robustness. In fact, the concept of code management is a fundamental principle of the runtime. Code that targets the runtime is known as managed code, while code that does not target the runtime is known as unmanaged code. The class library, the other main component of the .NET Framework, is a comprehensive, object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP.NET, such as Web Forms and XML Web services. The .NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code, thereby creating a software environment that can exploit both managed and unmanaged features. The .NET Framework not only provides several runtime hosts, but also supports the development of third-party runtime hosts. For example, ASP.NET hosts the runtime to provide a scalable, server-side environment for managed code. ASP.NET works directly with components or Windows Forms controls in HTML documents. Hosting the runtime in this way makes managed mobile code (similar to Microsoft ActiveX controls) possible, but with significant improvements that only managed code can offer, such as semi-trusted execution and isolated file storage. The following illustration shows the relationship of the common language runtime and the class library to your applications and to the overall system. The illustration also shows how managed code operates within a larger architecture.

1.3 Technologies used

17

1. .NET Framework The Microsoft .NET Framework is a software technology that is available with several Microsoft Windows operating systems. It includes a large library of pre-coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. The .NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform. The pre-coded solutions that form the framework's Base Class Library cover a large range of programming needs in a number of areas, including user interface, data access, database connectivity, cryptography, web application development, numeric algorithms, and network communications. The class library is used by programmers, who combine it with their own code to produce applications. Programs written for the .NET Framework execute in a software environment that manages the program's runtime requirements. Also part of the .NET Framework, this runtime environment is known as the Common Language Runtime (CLR). The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. The CLR also provides other important services such as security, memory management, and exception handling. The class library and the CLR together compose the .NET Framework. Version 3.0 of the .NET Framework is included with Windows Server 2008 and Windows Vista. The current version of the framework can also be installed on Windows XP and the Windows Server 2003 family of operating systems.[2] A reduced "Compact" version of the .NET Framework is also available on Windows Mobile platforms, including smart phones

Interoperability Because interaction between new and older applications is commonly required, the .NET Framework provides means to access functionality that is implemented in programs that execute outside the .NET environment. Access to COM components is provided in the System .Runtime. Interoperative Services and System .Enterprise Services namespaces of the framework; access to other functionality is provided using the P/Invoke feature. Common Runtime Engine The Common Language Runtime (CLR) is the virtual machine component of the .NET framework. All .NET programs execute under the supervision of the CLR, guaranteeing certain properties and behaviors in the areas of memory management, security, and exception handling. Base Class Library The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of functionality available to all languages using the .NET Framework. The BCL provides classes which encapsulate a number of common functions, including file reading and writing, graphic rendering, database interaction and XML document manipulation. Simplified Deployment

18

Installation of computer software must be carefully managed to ensure that it does not interfere with previously installed software, and that it conforms to security requirements. The .NET framework includes design features and tools that help address these requirements. Security The design is meant to address some of the vulnerabilities, such as buffer overflows, that have been exploited by malicious software. Additionally, .NET provides a common security model for all applications. Portability The design of the .NET Framework allows it to theoretically be platform agnostic, and thus crossplatform compatible. That is, a program written to use the framework should run without change on any type of system for which the framework is implemented. Microsoft's commercial implementations of the framework cover Windows, Windows CE, and the Xbox 360. In addition, Microsoft submits the specifications for the Common Language Infrastructure (which includes the core class libraries, Common Type System, and the Common Intermediate Language) the C# language, and the C++/CLI language to both ECMA and the ISO, making them available as open standards. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms.

ADO.NET:- Is a set of computer software components that can be used by programmers to access data and data services. It is a part of the base class library that is included with the Microsoft .NET Framework. It is commonly used by programmers to access and modify data stored in relational database systems, though it can also be used to access data in non-relational sources. ADO.NET consists of two primary parts o Data Provider o Data Sets Visual C#.NET:- Is a simple, general-purpose programming language that enables you to build rich, connected Web and client applications on the .NET Framework. It is a programming environment used to create various types of applications, including console, graphical (GUI), XML, databases, and file-based, etc.
2. MICROSOFT ACCESS:- MS SQL server is a relational database management systems server

provides a suite of tools for managing all aspects of SQL server development, querying, tuning, testing and administration.
3. HTML: - Hypertext Markup Language, is the predominant markup language for Web pages. It provides

a means to describe the structure of text-based information in a document by denoting certain text as links, headings, paragraphs, lists, and so on and to supplement that text with interactive forms, embedded images, and other objects. HTML is written in the form of tags, surrounded by angle brackets.
4. XML: - Extensible Hypertext Markup Language is an application of XML. XHTML documents allow

for automated processing to be performed using standard XML tools. XHTML can be thought of as the intersection of HTML and XML in many respects, since it is a reformulation of HTML in XML. XML represents the database data and many other kinds of documents in a structured format. It is particularly useful as a data format when an application must communicate with another application or integrate information from many other applications. Xml is used as a data representation and exchange format.

19 5. Smart Draw: - A UML modeling tool.

CHAPTER 2
OVERALL DESCRIPTION
2.1 Hardware Interface
Processor RAM Intel Core 2 Duo CPU 2 GB

20

Storage(Hard Drive)

10GB

At least 256 MB RAM. Colored Monitor. Hard disk with minimum 40GB space. Keyboard. Mouse. P4 or higher microprocessor

CHAPTER 3
SPECIFIC REQUIREMENTS
3.1 Use Case Reports

In the SHOPENMART.com l we are working on various modules. They are :

Login:-

21

There is a quality login window because this is more secure than other login forms as in a normal login window there are multiple logins available so that more than one person can access to placement information with there individual login. Hence it is more secure and reliable. Control modulethe control module dispatches requests to business logic, controls screen flow, coordinates component interactions, and activates user sign on and registration. The control module is implemented by the WAF and application-specific WAF extensions.

Shopping cart modulethe shopping cart tracks the items a user has selected for purchase Sign on modulethe sign on module requires a user to sign on before accessing certain screens, Messaging and manages the sign on process messaging module asynchronously transmits pet store to the OPC modulethe

purchase orders from the based on user search criteria

Catalog modulethe catalog module provides a page-based view of the catalog Customer modulethe customer module represents customer information: addresses, credit cards, contact information, and so on

3.2 Data Flow Diagram (DFD)


The Data flow Diagram shows the flow of data. It is generally made of symbols given below :-

A square shows the Entity.

A Circle shows the Process

An open Ended Rectangle shows the data store.

An arrow shows the data flow. The DFD can be up to several levels. The 0 level DFD states the flow of data in the system as seen from the outward in each module.

The first level DFD show more detail, about the single process of 0 level DFD.

22

Data flow can take place:

Between process File to process External entity to process Process to external entity Process to file.

Information Flow of Data for Testing

Software Configuration

Te st

Evaluati on

Testing

Error Rate Data Reliabilit y Model

Debu g

Te st C onf i g u rati on

Expected Results

C orre cti o ns

Information Flow of Data Testing

PERT CHART

23

Program Evaluation and Review Technique (PERT) and Critical Path Method (CPM) are the project scheduling techniques that can be applied to software development. Both technique are driven by information already gathered in earlier project planning activities: Estimation of effort A decomposition of the product function The solution of the appropriate model and task set Decomposition of tasks

Both PERT and CPM provide quantitative tools that allow the software planning to determine critical path the claim of task that determined the duration of the project establish most likely times estimates for individual tasks by applying statically models: and Calculation boundary times that define a time window for a particular task. Both PERT and CPM have been implemented in a wide verity of automated tools that are available for the personal computer. Such tools are easy to use and make the scheduling methods described previously available to every software project manager

GANTT CHART
When creating a software project schedule, the planner begins with a set of tasks (the work break down structure). If automated tools are used, the work break down is input as a task network or task outline. Efforts, duration, and start date are then input for each task. In addition, task may be assigned to specific individuals. As a sequence of this input, a timeline chart, also called a Gantt Chart, is generated. A Gantt Chart can be developed for the entire project. Alternatively, separated it depicts a part of a software project schedule that emphasizes the concept scooping task for a new word processing software project. All project task (for

24

concept scooping) are listed in the left hand column. The horizontal bars occur at the same time on the calendar, task concurrency is implied. The diamonds indicate milestones.

Work Flow of Future Fashion.

0s Level

User

FASHION

Admin

25

1stLevel

2ndLe

User

LOGIN

Data Base

PURCHASE

26

vel

User

LOGIN

ORDER PURCHASE GENERATE CREDITCAR D VERIFICATI ON

3.3 Database Design

Table Structure
Login

Order Details

27

Payment

Product

Stock

User Details

28

Database

Module: - Table Entity Relationship of Future Fashion

CHAPTER 4 System Behaviour

4.1 Architecture Diagram

29

.Net Framework Architecture

CHAPTER 5
IMPLEMENTATION AND RESULTS
5.1 General User Interfaces
Technology alone may not win user acceptance and subsequent marketability. We have designed our website with full functionality and meets user requirements, full care have been taken to design buttons, links and pictures placements. User Interface Design, Usability, Ergonomics concept applied while developing our project.

30

Navigation bar: it is placed properly on the top column of webpage, easy user navigation on a single click. Buttons: buttons are properly placed with their specific names Tabs: placed at the top of Web pages to give users an easier way to find popular content on the massive Web site. The fact that you now see tab-navigation everywhere on the Web is proof of its usability.

A application which will provide interfaces to achieve the following. The exact interface details vary according to the position of the employee in the company hierarchy and the permissions given to him. Project

Login Screen This login Form is made For Security purpose. So only Authenticated User only Access into the . Registration The registration menu provides a facility to students to registered to this site.The faculty or students can view the registered students and update their information through update menu.

It provides the information regarding the number of students placed in various courses like BE,MCA,MBA, Mtech. The students have to only enter their enrolment number it gives the information about that student like id, name,company in which he/she placed . Search: Through search menu the students can find out placed or non-placed students by just entering their batch and semester .

CHAPTER 6
CONCLUSION
SHOPENMART is developed using Visual studio 2008 and Microsoft Access fully meets the objectives
of the system for which it has been developed. The system has reach a steady state where all bugs have been eliminated. The system is operated at high level efficiency and all the teachers and user associated with the system understands its advantage. The system solves the problem. It was intended to solve as requirement specification. We are undergoing this project under the able guidance of Mr. Prabhat Kumar

31

We have carefully designed each phase of this project. Our Contribution is: 1. Initiation Phase The initiation of a system (or project) begins when a business need or opportunity is identified. A Project Manager should be appointed to manage the project. This business need is documented in a Concept Proposal. After the Concept Proposal is approved, the System Concept Development Phase begins. 2. System Concept Development Phase Once a business need is approved, the approaches for accomplishing the concept are reviewed for feasibility and appropriateness. The Systems Boundary Document identifies the scope of the system and requires Senior Official approval and funding before beginning the Planning Phase. 3. Planning Phase

The concept is further developed to describe how the business will operate once the approved system is implemented, and to assess how the system will impact employee and customer privacy. To ensure the products and /or services provide the required capability on-time and within budget, project resources, activities, schedules, tools, and reviews are defined. Additionally, security certification and accreditation activities begin with the identification of system security requirements and the completion of a high level vulnerability assessment. 4. Requirements Analysis

Phase Functional user requirements are formally defined and delineate the requirements in terms of data, system performance, security, and maintainability requirements for the system. All requirements are defined to a level of detail sufficient for systems design to proceed. All requirements need to be measurable and testable and relate to the business need or opportunity identified in the Initiation Phase. 5. Design Phase

The physical characteristics of the system are designed during this phase. The operating environment is established, major subsystems and their inputs and outputs are defined, and processes are allocated to resources. Everything requiring user input or approval must be documented and reviewed by the user. The physical characteristics of the system are specified and a detailed design is prepared. Subsystems identified

32

during design are used to create a detailed structure of the system. Each subsystem is partitioned into one or more design units or modules. Detailed logic specifications are prepared for each software module. 6. Development Phase

The detailed specifications produced during the design phase are translated into hardware, communications, and executable software. Software shall be unit tested, integrated, and retested in a systematic manner. Hardware is assembled and tested. 7. Integration and Test Phase

The various components of the system are integrated and systematically tested. The user tests the system to ensure that the functional requirements, as defined in the functional requirements document, are satisfied by the developed or modified system. Prior to installing and operating the system in a production environment, the system must undergo certification and accreditation activities. 8. Implementation Phase

The system or system modifications are installed and made operational in a production environment. The phase is initiated after the system has been tested and accepted by the . This phase continues until the system is operating in production in accordance with the defined user requirements. 9. Operations and Maintenance Phase

The system operation is ongoing. The system is monitored for continued performance in accordance with user requirements, and needed system modifications are incorporated. The operational system is periodically assessed through In-Process Reviews to determine how the system can be made more efficient and effective. Operations continue as long as the system can be effectively adapted to respond to an organizations needs. When modifications or changes are identified as necessary, the system may reenter the planning phase. 10. Disposition Phase

The disposition activities ensure the orderly termination of the system and preserve the vital information about the system so that some or all of the information may be reactivated in the future if necessary. Particular emphasis is given to proper preservation of the data processed by the system, so that the data is effectively migrated to another system or archived in accordance with applicable records management regulations and policies, for potential future access.

33

CHAPTER 7
SCREEN SHOTS

34

35

36

Bibliography

37

Software Requirements Specification Template http://www.processimpact.com/process_assets/srs_template.doc BE Project Guidelines - Writing your System Requirements www.it.iitb.ac.in/drona/guidelines/srs.jsp

Writing Effective Use Cases. Alistair Coburn http://www.amazon.com/Writing-Effective-Cases-Alistair-Cockburn/dp/0201702258 Jan Kettenis, Getting started with use case modeling

2005.

Navathe , Henry F.Korth , Database System Concepts 5th edition

Christian Nagel , Professional C# 3rd Edition ASP.NET 2.0 Wiley publishing, Inc www.w3schools.com HTML tutorials www.1000projects.com

38

39

Vous aimerez peut-être aussi