Escolar Documentos
Profissional Documentos
Cultura Documentos
Project Report
On
Social Network Site (SNS)
Submitted as per the course of
Master of Computer Applications
Of
Visvesvaraya Technological University, Belgaum
Submitted by
Mr.ABHISHEK RANJAN(1RE**MCA**)
Under the Guidance of
Prof. *********
Assoc. Prof Dept of MCA
Reva ITM, Bangalore
__________________________________________________________________________
Page 1
Page 2
Certificate
This is to certify that the project work entitled SOCIAL NETWORKING
SITE
has
been
successfully
completed
by
________having
USN
Signature of
the HOD
External Examination
Name of the Examiners
Signature
with Date
1.
DEPT OF MCA RITM
Page 3
2.
ABSTRACT
A truly Indian social-networking website that is to promote social responsibility (traffic rules,
public hygiene, aversion to bribery etc).Should provide a common platform where people of
India can Voice out violations, injustice, inhumanity, corruption happening in their vicinity. In
Existing System people does not have the ability to tag social discipline violators .Fellow
citizens cant take the measures to rate, control and monitor the social responsibility of a
given individual. Indirectly the crime is increasing very much, everybody is violating the
rules .No one is taking care. The responsible persons are ignoring because of corruption. The
higher authorities not taking any action towards indiscipline. No one is feeling responsibility
to argue .With this in our country the law and order is going out of control. In this current
system if a person wants to give complaint, he has to go to the concerned office and raise a
complaint. In India many rural people dont know the rules and regulations of Govt. Hence
they are blackmailed by the corrupt world. As the crimes are increased, it is becoming very
difficult for a common man to survive. Here as the people dont know the actual duties of the
officers and they dont even have the sources to reach their voice to the higher authorities,
they are becoming helpless
By this no one will be cheated. Hence all the violations of rules can be reduced to a great
extent. In our current system people coming forward, participating in the debates and fighting
against the crimes in their vicinity. Everybody feels their responsibility to minimize the
corruption. Here each and every person has the authority to discuss on any topic .With these
debates many criminals can come into the picture of real world. With these things the
innocent people can get aware. Then basing on these discussions the right decision can be
taken by the concerned authority.
Page 4
TABLE OF CONTENTS
CHAPTERS
1.
INTRODUCTION
1.1 INTRODUCTION TO PROJECT
- STATEMENT OF THE PROBLEM
- BRIEF DESCRIPTION OF THE PROJECT
2.
LITERATURE SURVEY
3.
4.
SYSTEM ANALYSIS
4.1 EXISTING SYSTEM
4.2 LIMITATIONS OF EXISTING SYSTEM
4.3 PROPOSED SYSTEM
4.4 ADVANTAGES OF PROPOSED SYSTEM
4.5 FEASIBILITY STUDY
- TECHNICAL FEASIBILITY
- ECONOMICAL FEASIBILITY
- OPERATIONAL FEASIBILITY
5.
SYSTEM DESIGN
5.4 DATAFLOW DIAGRAM
5.5 ENTITY-RELATIONSHIP DIAGRAM
5.6 TABLE DESIGN
6.
CODING
PSEUDO CODE
7.
TESTING
TEST CASES FOR
- UNIT TESTING
Page 5
CHAPTER 1
INTRODUCTION
1.1 Objective of the Project
A truly Indian social-networking website that is to promote social
responsibility (traffic rules, public hygiene, aversion to bribery etc) .
1.2 Problem Definition
Through the existing system process which is purely manual process and time
taking process. There are chances of having incorrect representation to the traffic
information and aversion to bribery details. In the existing system, people of India
cant voice out violations, injustice, inhumanity, corruption happening in their
vicinity.
Functional Requirements:
o Endorse someone elses concern and augment with more proofs, details etc.
o Call for an online debate or discussion on certain topics of broad applicability
Should be highly dynamic, with minimal static content as framework and maximum
content created by site participants
Should have the ability to tag social discipline violators using their UID
Authenticity for adding users is utmost important for such a website. Definitely one
should not be allowed to have more than one profile.
There should be a placeholder for dealing with disputing situations for the site as it is
quite possible for recipients of negative reward to resist. The dispute resolution
mechanism should not be like traditional court, it should again be based on social
forum like multiple opinions, group actions etc.
Page 6
24 X 7 availability
Flexible service based architecture will be highly desirable for future extension
Modules:
1.
2.
3.
4.
5.
6.
Administrator
Friends
Users
Blogs
Comments Rating
Registration
Users:
1.
2.
3.
4.
Administrator
Friends
Authenticate Users
Public User
Page 7
CHAPTER 2
LITERATURE SURVEY
Literature survey is a documentation of a comprehensive review of the published and
unpublished work from secondary sources data in the areas of specific interest to the
researcher. Literature survey helps in carrying out the task more easily as it gives information
regarding the work you carry out.
With the development of social network sites, security protection of private information
online has been a serious and important research topic. Research status quo on privacy of
social network sites has been investigated and reviewed in this paper. Two main ways of
obtaining private information on social network sites were summarized as based on privacy
disclosure and attack technique. In each category, actions to threaten privacy were brought
forth. A framework of dangers, which users facing on social network sites, was proposed, and
according to privacy risks, protection methods were also discussed. Finally, new topics about
privacy research directions on social network sites, privacy-preserving collaborative social
network and business model of privacy protection, which need further research, were
presented and discussed. The use of social site by students for academic practice is surpassed
by its use for social engagement, direct communications, and relationship building A larger
percentage of female students use social media technologies despite past studies that have
reported that male students generally demonstrate more competence and a favorable attitude
toward the use of technology. A large percentage of social media use and expertise lies with
college students between the ages of 18-24, also known as Generation Z.
CHAPTER 3
SYSTEM DEVELOPMENT STRATEGY
DEPT OF MCA RITM
Page 8
There
Conceptualization
Requirements and cost/benefits analysis
Detailed specification of the software requirements
Software design
Programming
Testing
User and technical training
Maintenance
are many methodologies or models that can be used to guide the software
Page 9
Prototyping Model
The basic reason for little common use of prototyping is the cost involved in this built-ittwice approach. However, some argue that prototyping need not be very costly and can
actually reduce the overall development cost. The prototype are usually not complete
systems and many of the details are not built in the prototype. The goal is to provide a
system with overall functionality. In addition, the cost of testing and writing detailed
documents are reduced. These factors help to reduce the cost of developing the prototype.
On the other hand, the experience of developing the prototype will very useful for
developers when developing the final system. This experience helps to reduce the cost of
development of the final system and results in a more reliable and better designed system.
Project Development Architecture
As a developer, the .NET framework and Visual Studio present many choices for
choosing the right architecture, from placing the data access code directly in the UI through
datasets and data source controls.
Presentation Layer
The
ASP.NET
web
Page 10
Page 11
Hardware Environment
Processor : Intel Pentium or More
RAM
: 512 MB Ram
CHAPTER 4
SYSTEM ANALYSIS
4.1 EXISTING SYSTEM
In Existing System people does not have the ability to tag social discipline violators
.Fellow citizens cant take the measures to rate, control and monitor the social responsibility
of a given individual. Indirectly the crime is increasing very much, everybody is violating the
rules .No one is taking care. The responsible persons are ignoring because of corruption. The
higher authorities not taking any action towards indiscipline. No one is feeling responsibility
to argue .With this in our country the law and order is going out of control.
4.2 LIMITATIONS OF EXISTING SYSTEM
In this current system if a person wants to give complaint, he has to go to the concerned
office and raise a complaint. In India many rural people dont know the rules and regulations
of Govt. Hence they are blackmailed by the corrupt world. As the crimes are increased , it is
becoming very difficult for a common man to survive. Here as the people dont know the
actual duties of the officers and they dont even have the sources to reach their voice to the
higher authorities, they are becoming helpless.
DEPT OF MCA RITM
Page 12
Page 13
Page 14
CHAPTER 5
SYSTEM DESIGN
System design is a solution, how to approach to the creation of a new system. This important
phase is composed of several steps. It provides the understanding and procedural details
necessary for implementation of the system recommended in the feasibility study. Emphasis
is on translating the performance requirements in to design specification. Design goes
through logical and physical stages of development. Logical design reviews the present
physical system. Prepares input and output specification, makes edit security and control
specification details, and the implementation plan prepares a logical design walkthrough.
The design phase is transition from user-oriented document to a document to the
programmers or database personnel. It describes the input, compatible to database and
procedures all in a format compatible to user requirements. The logical design also specifies
input, output, files and screen layouts. Physical design produces the working system by
defining the design specification that tells the programmers exactly what the system should
do in turn.
Page 15
This context-level DFD is next "exploded", to produce a Level 1 DFD that shows some of the
detail of the system being modeled. The Level 1 DFD shows how the system is divided into
sub-systems (processes), each of which deals with one or more of the data flows to or from an
external agent, and which together provide all of the functionality of the system as a whole. It
also identifies internal data stores that must be present in order for the system to do its job,
and shows the flow of data between the various parts of the system.
Page 16
Login DFD
Page 17
Level
ENTITY-RELATIONSHIP DIAGRAM
Page 18
TblAdminLogin
TblUserProfileSetting
TblPollAndSawals
UserId
RequestFrom
ShowImageToWhom
RequestDate
UserName
RequestMessage
Password
StatusOfRequest
AllowToSeeWhom
TblUserDraft
TblUserGangs
UserId
TblUserDetails
blogid
Question
blogtitle
QuestionFrom
description
QuestionPostDate
username
QuestionAnswerFrom
date
AnswerPostedOn
UserId
AnswerPolls
DraftId
AdminPermission
DraftBody
Answer
GangName
UserId
DateOfDraft
GangDescription
CatagoryId
AccountId
DraftTitle
GangOwner
EmailId
ForeName
GangCoOwner
SirName
GangPhoto
HomeAddress
GangActivity
ContactNo
UserId
DateCreated
ScrapFrom
GangMember
DateOfBirth
ScrapMessage
GangCatagory
Gender
ScrapDate
GangLanguage
RelationShipStatus
ScrapId
AdminPaermission
City
GangId
State
UserId
TblUserSentMessages
TblGangMember
Country
UserId
LanguagesKnown
MessageTo
PhotoToProfile
MessageBody
Title
MessageTitle
GangId
SentedOn
MforeName
Meducation
UserId
Mage
PhotoId
Mgender
PhotoDescription
MessageFrom
CatagoryType
tbl_ Rank
Rankid
rank
UserId
AccountId
FriendForeName
TblUserSocial
FriendUserId
AccountId
EyeColour
Childrens
HairColour
Ethinisity
BodyBuild
Religion
IdealDate
HomeTown
RelationShipLike
AboutMe
WebPage
Sports
Books
Music
Movies
tbl_ Comments1
date
comm1id
username
commt1itle
Post_Id
comm1desc
date
username
TblUserProfessionalDetails
Post_Id
AccountId
University
TblUserFriends
TblPersonalDetails
Weight
CatagoryId
Degree
Photo
Height
Post_desc
blogid
MarksTo
MessageId
Post_title
TblAppCatagory
MarksFrom
TblUserPhotoGalary
Maddress
Post_Id
username
FriendUserId
MlastName
tbl_ Posts
date
TblUserScrap
PostalCode
tbl_ Blog
SRNO
YearOfPassing
Occupation
Industry
Company
CompWebSite
J obDescription
WorkEmail
TblLoginAccountDetails
WorkContact
AccountId
CareerSkill
CareerInterest
Password
HintQuestion
Answer
RecoveryMail
LastLogin
SunShine
Page 19
COBOL etc.
UML is a pictorial language used to make software blue prints.
Goals of UML:
A picture is worth a thousand words, this absolutely fits while discussing about UML. Object
oriented concepts were introduced much earlier than UML. So at that time there were no
standard methodologies to organize and consolidate the object oriented development. At that
point of time UML came into picture.
There are a number of goals for developing UML but the most important is to define some
general purpose modeling language which all modelers can use and also it needs to be made
simple to understand and use.
UML diagrams are not only made for developers but also for business users, common people
and anybody interested to understand the system. The system can be a software or non
software. So it must be clear that UML is not a development method rather it accompanies
with processes to make a successful system.
.
Page 20
A conceptual model is the first step before drawing a UML diagram. It helps to
understand the entities in the real world and how they interact with each other.
Structural modeling:
Structural modeling captures the static features of a system. They consist of the followings:
Classes diagrams
Objects diagrams
Deployment diagrams
Package diagrams
Composite structure diagram
Behavioral Modeling:
Behavioral model describes the interaction in the system. It represents the interaction among
the structural diagrams. Behavioral modeling shows the dynamic nature of the system. They
consist of the following:
Activity diagrams
Interaction diagrams
Use case diagrams
Activity Diagrams:
Registration:
Page 21
Submit
Validate Data
Yes
Invalid
Accept
No
Successfully Registered
Page 22
Login
Send mails
Add friends
Search friends
admin
User
search users
create album
Create Blogs
post comments
Log out
Page 23
admin
grant sawals
grant gangs
send mails
Log out
TABLE DESIGN:
DEPT OF MCA RITM
Page 24
TYPE
varchar
varchar
datetime
varchar
varchar
SIZE
30
50
max
20
UserProfileSetting Table :
NAME
TYPE
SIZE
userid
varchar
30
Showimagetowhom
varchar
10
allowtoseewhom
varchar
10
UserDatiels Table:
NAME
TYPE
SIZE
userid
Varchar
30
Accounted
Int
Forename
varchar
30
Homeaddress
varchar
50
Sirname
varchar
50
Contactno
varchar
30
varchar
10
Dateofbirth
Datetime
Gender
Varchar
10
Relationshipstatus
Varcahar
50
City
Varchar
40
State
Varchar
50
CHAPTER 6
CODING
DEPT OF MCA RITM
Page 25
Page 26
Page 27
Page 28
CHAPTER 7
TESTING
TEST CASES FOR
In any endeavor, testing is always important before the actual implementation. SDLC is no
different, in fact testing in SDLC is so important these days that developers have to work in
testing longer that most stages in SDLC.
Types of Testing:
Testing by developers Developers will have to test the software themselves extensively.
Even though they are also the one who have developed the software, they still have to run it
extensively. These are the usual steps developers follow in testing their software:
1. Checking of Syntax The software is checked as it is. Developers just run software and
look for possible errors. A very basic checking to know if there are major functions and errors
that will occur.
.2. Module Testing After the walk through, developers will again check the software in
terms of individual modules. Each module will be tested extensively for possible errors.
3. Integration Testing Once the module has been tested, it is time to test them as being
integrated to other modules.
4. System Testing After the integration, the whole program will again be tested. Case
studies will again be applied with integrated software.
Testing by Users - Once the developers have finished their own testing with the help of other
professional developers, the software is ready for release to the public or to the intended
users.
The stages usually followed are:
Alpha Testing Developers usually choose the users who will try out the program. For the
general public, it is often tested on known users or even technology bloggers who can
honestly give their opinion of the software. It is also the time where developers try to create
scenarios for their software such as:
Recovery Developers will try recovering the software or the program in case it
crashes.
Page 29
SNAPSHOTS
SCREENS
Admin:
Page 30
Page 31
CONCLUSION
Voice out violations, injustice, inhumanity, corruption happening in their vicinity.
In India many rural people dont know the rules and regulations of Govt. Hence they are
blackmailed by the corrupt world. As the crimes are increased, it is becoming very difficult
for a common man to survive. Here as the people dont know the actual duties of the officers
and they dont even have the sources to reach their voice to the higher authorities, they are
becoming helpless.
By this no one will be cheated. Hence all the violations of rules can be reduced to a great
extent. In our current system people coming forward, participating in the debates and fighting
against the crimes in their vicinity. Everybody feels their responsibility to minimize the
corruption. Here each and every person has the authority to discuss on any topic .With these
debates many criminals can come into the picture of real world. With these things the
innocent people can get aware. Then basing on these discussions the right decision can be
taken by the concerned authority.
BIBLIOGRAPHY
Page 32
FOR SQL
www.msdn.microsoft.com
FOR ASP.NET
Asp.Net 3.5 Unleashed
www.msdn.microsoft.com/net/quickstart/aspplus/default.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx
Page 33