Escolar Documentos
Profissional Documentos
Cultura Documentos
INTRODUCTION
basically
consists
of
captured could be imported into the second Module; also manual entry
of inventory data is possible in the software.
PROBLEM IN EXISTING SYSTEM
The problem definition for the system is to launching the online system
for the inventory of Technical store.
The objective of the project is to setting up of an on-line
enquiry system about the status of the availability of the hardware
items (printer /laptop /scanner) along with the facility to apply online
and also to automate the issuing procedure.
Time Delay: It is inefficient to deal with voluminous data
manually in the existing system, record stored in different
files. It takes lot of time to search different files.
Redundancy: As the branches are located in different
locations, same files have to be stored at all branches which
involve lot of complications and duplication works thus
causes redundancy.
Accuracy: Since same data is compiled at different branches
the possibility of tabulating data wrong increases also data
is more, validation becomes difficult. It may result in loss of
accuracy of data.
.
Administrator
The activities that are carried out in this module are related to the
maintenance of master records such as Managers, Department
master and Employee master for the entire organization. This
module provides for performing addition, deletion, updating and
viewing the records in the master tables. This module also
provides viewing profiles of branches, departments and users.
The master entries can only be accessed by the administrator of
the organization. this module Also provides Viewing The software
And hardware. Of it resources in Organization
Features of administrator module:
Login system
Add,delete users Profiles
Response for organizations
View system peripherals
Viewing software installations
Solving repairs in Organization
View reports
logout
Users
The activities that are carried out in this module are related to
softwares installation viewing in their systems, Repairs
forwarding to Administrator, and updating, their profiles.. Users
can also view his profile to know the details. He can join the
conference to communicate with people in the Organization.
User can get organization Information and also communicate with
Administrator Those activities that are carried out in this module
are related viewing The Installed Hardware and Software's of a
computers and its Associated Peripherals
Features of USERS module:
Login to system
Updating Users Profiles
Response to administrator
Viewing installed softwares
7
outputs, the format for the output is taken from the outputs, which are
currently being obtained after manual processing. The standard printer
is to be used as output media for hard copies.
PROCESS MODELS USED WITH JUSTIFICATION
SDLC MODEL:
Waterfall Model
Software products are oriented towards customers like any other
engineering products. It is either driver by market or it drives the
market. Customer Satisfaction was the main aim in the 1980's.
Customer Delight is today's logo and Customer Ecstasy is the new
buzzword of the new millennium. Products which are not customer
oriented have no place in the market although they are designed using
the best technology. The front end of the product is as crucial as the
internal technology of the product.
10
are
as
follows:
11
12
4) Code Generation
In Code Generation phase, the design must be decoded into a
machine-readable form. If the design of software product is done in a
detailed manner, code generation can be achieved without much
complication. For generation of code, Programming tools like
Compilers, Interpreters, and Debuggers are used. For coding purpose
different high level programming languages like C, C++, Pascal and
Java are used. The right programming language is chosen according to
application.
5)Testing
After code generation phase the software program testing begins.
Different testing methods are available to detect the bugs that were
committed during the previous phases. A number of testing tools and
methods are already available for testing purpose.
6) Maintenance
Software will definitely go through change once when it is
delivered to the customer. There are large numbers of reasons for the
change. Change could happen due to some unpredicted input values into
the system. In addition to this the changes in the system directly have an
effect on the software operations. The software should be implemented
to accommodate changes that could be happen during the post
development period.
14
15
perception, and different people have different views on it. The lack of
clear separation between analysis and design can also be considered one
of the strong points of the object-oriented approach the transition from
analysis to design is seamless. This is also the main reason OOAD
methods-where analysis and designs are both performed.
The main difference between OOA and OOD, due to the different
domains of modeling, is in the type of objects that come out of the
analysis and design process.
16
Features of OOAD:
It users Objects as building blocks of the application rather
functions
All objects can be represented graphically including the
relation between them.
All Key Participants in the system will be represented as actors
and the actions done by them will be represented as use cases.
A typical use case is nothing bug a systematic flow of series of
events which can be well described using sequence diagrams
and each event can be described diagrammatically by Activity
as well as state chart diagrams.
So the entire system can be well described using OOAD model,
hence this model is chosen as SDLC model.
. SYSTEM ARCHITECTURE
The current application is being developed by taking the 3-tier
architecture as a prototype. The 3-tier architecture is the most common
approach used for web applications today. In the typical example of this
model, the web browser acts as the client, IIS handles the business logic,
and a separate tier MS-SQL Server handles database functions.
Although the 3-tier approach increases scalability and introduces
a separation of business logic from the display and database layers, it
does not truly separate the application into specialized, functional
layers. For prototype or simple web applications, the 3-tier architecture
may be sufficient. However, with complex demands placed on web
applications, a 3-tiered approach falls short in several key areas,
including flexibility and scalability. These shortcomings occur mainly
because the business logic tier is still too broad- it has too many
17
functions grouped into one tier that could be separated out into a finer
grained model.
18
SYSTEM DESIGN
19
DESIGN
Software Requirement Specification:
Software Requirement Specification (SRS) is the starting point of
the software developing activity. As system grew more complex it
became evident that the goal of the entire system cannot be easily
comprehended. Hence the need for the requirement phase arose. The
software project is initiated by the client needs. The SRS is the means of
translating the ideas of the minds of clients (the input) into a formal
document (the output of the requirement phase.)
The SRS phase consists of two basic activities:
1) Problem/Requirement Analysis: The process is order and more
nebulous of the two, deals with understand the problem, the goal and
constraints.
2) Requirement Specification: Here, the focus is on specifying what
has been found giving analysis such as representation, specification
languages and tools, and checking the specifications are addressed
during this activity.
The Requirement phase terminates with the production of the
validate SRS document. Producing the SRS document is the basic goal
of this phase.
20
Role of SRS:
The purpose of the Software Requirement Specification is to
reduce the communication gap between the clients and the developers.
Software Requirement Specification is the medium though which the
client and user needs are accurately specified. It forms the basis of
software development.
21
22
DATA DICTIONARY
23
24
LOGIN TABLE
25
USERTABLE
26
27
HARDWRE DEATAILS
28
SOFTWARE DEATAILS
29
VENDOR DEATAILS
30
ORDERDEATAILS
31
SHIPPING DEATAILS
32
BILLING ADDRESS
33
UML
34
Diagrams:
UML DIAGRAMS
UML stands for UNIFIED MODELING LANGUAGE
The unified modeling language allows the software engineer to express
an analysis model using the modeling notation that is governed by a set
of syntactic,semantic and pragmatic rules.
35
A UML system is represented using five different views that describe the
system from distinctly different perspective. Each view is defined by a
set of diagram, which is as follows.
1. User Model View
This view represents the system from the users perspective.
The analysis representation describes a usage scenario from the endusers perspective.
2. Structural Model view
In this model the data and functionality are arrived from inside the
system.
This model view models the static structures.
3. Behavioral Model View
It represents the dynamic of behavioral as parts of the system, depicting
the interactions of collection between various structural elements
described in the user model and structural model view.
4. Implementation Model View
In this the structural and behavioral as parts of the system are
represented as they are to be built.
5. Environmental Model View
In this the structural and behavioral aspects of the environment in
which the system is to be implemented are represented.
UML is specifically constructed through two different domains they are:
UML Analysis modeling, which focuses on the user model and structural
model views of the system.
UML design modeling, which focuses on the behavioral modeling,
implementation modeling and environmental model views.
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
SCREENS
53
SCREENS:
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
Introduction to .NET
74
provide
consistent
object
oriented
programming
environment.
2. To provide a code execution environment that minimizes software
deployment and versioning conflicts.
3. To provide code execution environment that guarantees safe
execution of code, including code created by an unknown or semi
trusted third party.
4. To provide code execution environment that eliminates the
performance problems of scripted or interpreted environments.
5. To make the developer experience consistent across widely
varying types of applications such as window based applications
and web based applications.
6. To build all communication on industry standards to ensure that
code based on the .NET Framework can integrate with any other
code.
The .NET framework has two main components:
1. Common Language Runtime (CLR)
2. .NET Framework Class Library (FCL)
The CLR is a foundation of .NET Framework. It is like agents that
manages the code at execution time, providing core services such as
memory management, thread management and also enforces strict type
75
safety and other forms of code accuracy that ensures security and
robustness. In fact the concept of code management is a fundamental
principle of the runtime.
Code that targets runtime is known as managed code, while the code
doesnt target the runtime is known as unmanaged code. The class
library, the other main component of the .NET Framework, is a
comprehensive, object oriented collection of reusable types that u can
use to develop applications ranging from graphical user interface
applications to applications based on the latest innovations provided by
VB.NET.
The .NET Framework can be hosted by unmanaged components
that load the CLR their processes and initiate the execution of managed
code there by creating a software environment that can exploit both
managed and unmanaged features. The .NET Framework not only
provides several runtime hosts but also supports the development of
third party runtime hosts.
Features of Common Language Runtime (CLR):
The CLR manages memory, thread execution, code execution,
code safety verification, compilation and other system services. These
features are intrinsic to managed code that runs on the CLR.
With regard to security, managed components are awarded
varying degrees of trust, depending on the number of factors that
include their origin.
76
77
78
79
Introduction To ADO.NET
80
81
for the application and the Dataset objects manage the data model for
the application.
provider
implemented
in
the
System.Data.OracleClient
82
OracleConnection
OracleCommand
OracleParameter
OracleDataReader
OracleDataAdapter
The data set objects:
The second set of ADO.NET objects are the Dataset objects, which
are all contained in the System.Data namespace. Unlike the data
provider objects there is only one set of Dataset objects. The Dataset
objects represent data in an abstract form that which is not tied to any
particular database implementation.
DataSet
Datatable
DataRelation
DataRow
DataColumn
DataView
The DataSet itself is a self-contained memory-resident representation
of relational data. A DataSet contains other objects such as DataTables
and DataRelations that hold the actual data and information about the
design of the data. The dataset is designed to be easy to move between
components.
The Data Table object represents a single table within a DataSet.
A single DataSet can contain many DataTable objects. The Data
83
84
Introduction To C#.NET
85
services
include
language
interoperability,
garbage
86
manipulate
enterprise applications.
87
88
Introduction To ASP.NET
89
ASP.Net :
Server Application Development
Server-side applications in the managed world are implemented
through runtime hosts. Unmanaged applications host the common
language runtime, which allows your custom managed code to control
the behavior of the server. This model provides you with all the features
of the common language runtime and class library while gaining the
performance and scalability of the host server.
The following illustration shows a basic network schema with managed
code running in different server environments. Servers such as IIS and
MS Access can perform standard operations while your application
logic executes through the managed code.
Server-side managed code
ASP.NET is the hosting environment that enables developers to use
the .NET Framework to target Web-based applications. However,
ASP.NET is more than just a runtime host; it is a complete architecture
for developing Web sites and Internet-distributed objects using
managed code. Both Web Forms and XML Web services use IIS and
ASP.NET as the publishing mechanism for applications, and both have
a collection of supporting classes in the .NET Framework.
XML Web services, an important evolution in Web-based technology,
are distributed, server-side application components similar to common
Web sites. However, unlike Web-based applications, XML Web services
components have no UI and are not targeted for browsers such as
90
For example, the Web Services Description Language tool included with
the .NET Framework SDK can query an XML Web service published
on the Web, parse its WSDL description, and produce C# or Visual
Basic source code that your application can use to become a client of the
XML Web service. The source code can create classes derived from
classes in the class library that handle all the underlying communication
using SOAP and XML parsing. Although you can use the class library to
consume XML Web services directly, the Web Services Description
Language tool and the other tools contained in the SDK facilitate your
development efforts with the .NET Framework.
If you develop and publish your own XML Web service, the .NET
Framework provides a set of classes that conform to all the underlying
communication standards, such as SOAP, WSDL, and XML. Using
those classes enables you to focus on the logic of your service, without
concerning yourself with the communications infrastructure required
by distributed software development.
Finally, like Web Forms pages in the managed environment, your XML
Web service will run with the speed of native machine language using
the scalable communication of IIS.
92
Language Support
The Microsoft .NET Platform currently offers built-in support for three
languages: C#, Visual Basic, and JScript.
What is ASP.NET Web Forms?
The ASP.NET Web Forms page framework is a scalable common
language runtime programming model that can be used on the server to
dynamically generate Web pages.
Intended as a logical evolution of ASP (ASP.NET provides syntax
compatibility with existing pages), the ASP.NET Web Forms framework
95
96
ASP.NET Web Forms pages can target any browser client (there
common functionality.
5.
98
99
100
Primary Key:
Every table in SQL server has a field or a combination of
fields that uniquely identifies each record in the table. The Unique
identifier is called the Primary Key, or simply the Key. The
primary key provides the means to distinguish one record form all
other in a table. It allows the user and the database system to
identify, locate and refer to one particular record in the database.
Relational Database:
Sometimes all the information of interest to a business
operation can be stored in one table. SQL server makes it very
easy to link the data in multiple tables. Matching an employee to
the department in which they work in one example. This is what
makes SQL server a relational database management system, or
RDBMS. It stores data in two or more tables and enables you to
define relationship between the tables.
101
Foreign Key:
When a field is one table matches the primary key of
another field is referred to as a foreign key. A foreign key is a field
or a group of fields in one table whose values match those of the
primary key of another table.
Referential Integrity:
Not only does SQL Server allow you to link multiple tables,
it also maintains consistency between them. Ensuring that the
data among related tables is correctly matched is referred to as
maintaining referential integrity.
Data Abstraction:
A major purpose of a database system is to provide users
with an abstract view of the data. This system hides certain details
of how the data is stored and maintained. Data abstraction is
divided into three levels.
Physical Level:
This is the lowest level of abstraction at which one describes
how the data are actually stored.
102
Conceptual Level:
At this level of database abstraction all the attributed and
what data are actually stored is described and entries and
relationship among them.
View Level:
This is the highest level of abstraction at which one
describes only part of the database.
Advantages of RDBMS:
Redundancy can be avoided
Inconsistency can be eliminated
Data can be shared
Standard can be enforced
Security restrictions can be applied
Integrity can be maintained
Conflicting requirements can be balanced
Data independence can be achieved.
103
Disadvantages of DBMS:
A significant disadvantage of the DBMS system is cost. In
addition to the cost of purchasing of developing the software, the
hardware has to be upgraded to allow for the extensive programs
and the workspace required for their execution and storage.
While centralization reduces duplication, the lack of duplication
requires that the database be adequately backed up to that in case
of failure the data can be recovered.
FEATURES OF SQL SERVER (RDBMS)
SQL SERVER is one of the leading database management
system (DBMS) because it is the only database that meets the
uncompromising requirements of today's most demanding
information systems. From complex decision support system
(DSS) to the most rigorous online transaction processing(OLTP)
application, even application that require simultaneous DSS and
OLTP access to the same critical data, SQL Server leads the
industry in both performance and capability.
SQL SERVER is a truly portable, distributed, and open
DBMS
that
delivers
unmatched
performance,
continuous
104
all the
resource.
Portability:
SQL SERVER is fully portable to more than 80 distinct
hardware and operating system platforms, including UNIX,
MSDOS, OS/2, Macintosh and dozens of proprietary platforms.
This portability gives complete freedom to choose the database
server platform that meets the system requirements.
Open System:
SQL SERVER offers a leading implementation of industry
-standard SQL. SQL Server's open architecture integrates SQL
SERVER and non-SQL SERVER DBMS with industries most
105
106
No I/O Bottlenecks:
SQL Server's fast commit groups commit and deferred
write technologies dramatically reduce disk I/O bottlenecks.
While some database write whole data block to disk at commit
time, SQL Server commits transactions with at most sequential
log file on disk at commit time, On high throughput systems, one
sequential writes typically group commit multiple transactions.
Data read by the transaction remains as shared memory so that
other transactions may access that data with out reading it again
from disk. Since fast commits write all data necessary to the
recovery to the log file, modified blocks are written back to the
database independently of the transaction commit, when written
from memory to disk.
107
NORMALIZATION
108
NORMALIZATION:
It is a process of converting a relation to a standard form. The process
is used to handle the problems that can arise due to data redundancy i.e.
repetition of data in the database, maintain data integrity as well as
handling problems that can arise due to insertion, updation, deletion
anomalies.
109
110
Data Dictionary
After carefully understanding the requirements of the client the the
entire data storage requirements are divided into tables. The below
tables are normalized to avoid any anomalies during the course of data
entry.
111
TESTING
112
TESTING
The development of software systems involves of a series of
production activities where opportunities for injection of human
fallibilities are enormous. Errors may begin to occur at the very
inception of the process where the objectives may be erroneously or
imperfectly specified, as well as in later design and development stages.
Because of human inability to perform and communicate with
perfection, software development is accompanied by a quality assurance
activity.
5.1 Testing Techniques:Testing is the process of executing a program with the intention of
finding errors. The various test strategies used for testing the software
are as follows.
Unit Testing:Unit testing focuses on verification effort on the smallest unit of
the software design module. The main goal is to make sure that every
source statement and logic path has been executed correctly at least
once. The output of this stage is the source code.
Integration Testing:In Integration testing, we find errors that have occurred during
the integration. After testing each module, which is then integrated into
subsystems and then to form the entire system on which integration
testing is performed. The goal of testing is to detect the design errors,
while focusing on the testing the interconnection between modules.
113
System Testing:In this testing, the system is tested for the errors after coupling all
the
requirements to see if all the requirements are met and the system
performs as specified by the requirements.
Acceptance Testing:The testing is performed to demonstrate to the client, the
operations of the system. Here the entire software system is tested. The
goal is to see if the software developed meets its requirements. This is
essentially a validation exercise and in many situations this is the only
validation activity.
Alpha testing:A customer conducts the test at the developers site. The software
is used in a natural setting with the developer looking over the
shoulder of the use and recording errors and usage problems. Alpha
tests are conducted in a controlled environment.
Beta Testing:The beta test is conducted at one or more customer sites by the
end users of the software. The developer is generally not present.
Therefore, the beta test is the live application of the software in an
environment that cannot be controlled by the developer. The customer
records all the problems that are encountered during beta testing and
reports these to the developer at regular intervals. As a result of
problems reported during beta test, the software developer makes
modifications and then prepares for release of the software product to
the entire customer base.
114
\Maintenance: Maintenance accounts for the majority of the effort and cost spent
on the computer software. Maintenance activities involve making
enhancements to software products, adapting products to new
environments,
and
correcting
problems.
Software
product
tools
can
greatly
improve
the
software
quality,
116
SYSTEM SECURITY
117
SYSTEM SECURITY
7.1. INTRODUCTION
The protection of computer based resources that includes
hardware, software, data, procedures and people against unauthorized
use or natural
Disaster is known as System Security.
System Security can be divided into four related issues:
Security
Integrity
Privacy
Confidentiality
SYSTEM SECURITY refers to the technical innovations and
procedures applied to the hardware and operation systems to protect
against deliberate or accidental damage from a defined threat.
DATA SECURITY is the protection of data from loss, disclosure,
modification and destruction.
SYSTEM INTEGRITY refers to the power functioning of hardware
and programs, appropriate physical security and safety against external
threats such as eavesdropping and wiretapping.
PRIVACY defines the rights of the user or organizations to determine
what information they are willing to share with or accept from others
118
. SECURITY IN SOFTWARE
119
120
Various Access Control Mechanisms have been built so that one user
may not agitate upon another. Access permissions to various types of
users are controlled according to the organizational structure. Only
permitted users can log on to the system and can have access
according to their category. User- name, passwords and permissions
are controlled o the server side.
Using server side validation, constraints on several restricted
operations are imposed.
121