Post on 04-Jun-2018
transcript
8/13/2019 Docum Ntation
1/75
A Project Report On
MULTIMEDIA WEBSITE FOR MUSIC
Submitted By
Mr. Jamsheer Kutty
&
Mr. Pushkar Kulkarni
Under the guidance of
Prof. Kaushal Shah
Submitted in partial fulfillment of the
Requirements for qualifying
B.Sc. (I.T), Semester-VI Examination
Department Of Information Technology
Kishinchand Chellaram College
D.W. Road, Churchgate, Mumbai-400 020
8/13/2019 Docum Ntation
2/75
MUSIC
GARAGE
8/13/2019 Docum Ntation
3/75
Acknowledgement
It gives us immense pleasure to express our sincere gratitude to
those who are associated with our project MUSIC GARAGE
which is a Multimedia Website for Music as a part of the
course of B.Sc.(IT) affiliated by the University of Mumbai .
We are grateful to our Principal Ms. Manju Nichani to
give us an opportunity to take up a project. It is our
Coordinator Dr. Vijay Dabholkars help and encouragement that
has and encouragement that has showed us the right way to
complete the project.
We would like to thank our project guide Prof.
Kaushal Shah who have been a constant source of motivation,
encouragement and guidance. His valuable guidance and timely
help has helped us in completing the project.
We are also thankful to Mr. Balakrishna Hadkar and
Mr. Mukesh Bendal for their help.
Above all our thanks to our Family & Friends for theirhelp and motivation in the making of our project.
8/13/2019 Docum Ntation
4/75
INDEX
1. Introduction
1.1 Synopsis
1.2 Limitation of existing system
1.3 Objective and Scope of Proposed System
1.4 Theoretical Background
1.5 Technology Used
2. System Analysis
2.1 Problem Definition
2.2 Feasibility Study
2.3 Information Gathering
3. System Planning and Scheduling
3.1 Gantt Chart
4. System Design
4.1 Class Diagram
4.2 Use Case Diagram
4.3 Sequence Diagram
4.4 Activity Diagram
5. System Implementation
5.1 Methodology Adopted
5.2 System Requirements
8/13/2019 Docum Ntation
5/75
5.3 Screens Shots
5.4 Process Involved
6. System Testing
6.1 Methodology Adopted for Testing
7. System Maintenance
8. Cost & Benefit Analysis
9. Conclusion and Future Enhancement
Annexure
User Manual Data Dictionary Bibliography / References
8/13/2019 Docum Ntation
6/75
1. INTRODUCTION
8/13/2019 Docum Ntation
7/75
1.1 SYNOPSIS
Subject: Multimedia website for Music
As music is becoming a lifestyle for the generation, we have made an attempt to produce a
website which contain the necessary services for a music patron. This website contains many
easy and useful features which the users may find it very useful for them. The reason for the
development of this website is that user can find this site very user-friendly and may get all
the useful tools and songs which they might be looking for.
In this website the user has the full authority to download ,upload, convert ,and register
himself to become a member for this website. The interactive and proposed design,tools and
social-networking facility makes the user comfortable with the site. The user has the full
authority of adding, removing information in his/her account.
Added features also include audio streaming social-networking and an important feature
which enhances this website is that of a ringtone generator.
8/13/2019 Docum Ntation
8/75
1.2 Limitations of Existing System
The website contains limited support to audio formats such as 'mp3' format and 'wav' format.
The user may/may not get the song he/she desires ,as song listings will be displayed category-
wise as present in the website.
The existing website has following limitations :
Design is not user friendly and attractive.
No user profile features available in these websites.
No admin category.
Does not have online conversion features from one format to another.
8/13/2019 Docum Ntation
9/75
1.3 Objective and Scope of the Proposed System
In this website, the user has full authority to view its contents and register him to the
organization. The interactive activities and the proposed design make it comfortable for the
user. We have emphasized on present information on the website as well as added few
contemporary modules. The additional features include administrator privileges such as
adding, removing and updating the information on the website.
The songs will be uploaded and downloaded
Separate user profile for every user
Interactive activities like social-networking, ringtone creation and song conversion
Audio streaming
Flexible options
Attractive and user friendly design.
8/13/2019 Docum Ntation
10/75
1.4 Theoretical Background
In this website the user has the full authority to download ,upload, convert ,and register
himself to become a member for this website. The interactive and proposed design,tools and
social-networking facility makes the user comfortable with the site. The user has the full
authority of adding, removing information in his/her account.
Added features also include audio streaming social-networking and an important feature
which enhances this website is that of a ringtone generator.
User can also create ringtones from any song available and even can convert the
songs.
The current users of the system are not any computer professionals; so they have
minimum knowledge about the operation of the computer. So the system is designed in such
a way that users find it easy to operate.
The admin can retrieve the records which are stored in the database whenever required.
Admin can view the entire user details of the registered users as well as see their
feedbacks provided which will be very useful for future enhancement of this project.
8/13/2019 Docum Ntation
11/75
1.5 Technology Used
Front End: This project utilizes ASP.NET technology combined with C# for the code
behind. Microsoft Visual Studio 2008 has been used for development of the project.
Back End:Microsoft SQL Server 2005 Express Edition has been used which is packaged
with Microsoft Visual Studio.
Deployment:The Micro soft IIS 5.1 Server for Windows XP Professional has been used for
deploying the site.
What is ASP.NET?ASP.NET is the next generation ASP, but its not an upgraded version of
ASP. It is a part of the Microsoft .NET framework, and a powerful tool for
creating dynamic and interactive web pages. ASP.NET is a server side
scripting technology that enables scripts(embedded in the web pages) to be
executed by an internet server.
ASP.NET builds on the programming classes of the .NET Framework
providing a web application model with the set of controls that encapsulate
common HTML user interface elements, such as text boxes and dropdown
lists. These controls run on the web server, however, and push their user
interface as HTML on the browser. On the server, the controls expose an
object oriented programming to the web developer. ASP.NET also providesinfrastructure services, such as session management and process recycling that
further reduce the code a developer must write and increase application
readability. In addition, asp.net uses the same concept to enable the developers
to deliver software as a service.
How does asp.net work?The process that occurs when a request is made 9for a .aspx page is as follows:
o When a browser requests a html file, the server returns the file.o
When a browser request an asp.net file, IIS passes the request to theasp.net engine to the server.
o The asp .net engine reads the file, line by line, and executes the scriptin the file.
o Finally, the asp.net file is returned to the browser as plain html.
8/13/2019 Docum Ntation
12/75
The Microsoft .NET frameworkThe .NET frame work is the infrastructure for the Microsoft .net platform.
It is an environment for building, deploying and running web applications and
web services. Microsofts first server technology asp(Active Server Pages)was a powerful and flexible programming language. But it was too code
oriented. It was not as application framework and not an enterprise
development tool. The Microsoft.net framework was developed to solve this
problem.
.NET framework key words:
Easier and quicker programming Reduced amount of code Richer server control hierarchy with events Larger class library Better support for development tools
.NET framework consists of three main parts:
Programming languages:
C# Visual basic J#
Server technologies and client technologies
ASP.NET Windows forms Compact framework
Development environment:
Visual studio .NET Visual web developer What is IIS?
IIS (internet information services) is Microsofts internet server. It comes as a
free component with windows servers. IIS is also part of Windows 2000 and XP
professional.
8/13/2019 Docum Ntation
13/75
What is C#?C# is an object oriented language and is the first component oriented
language and is created by Enders Hejlsberg, Scott Wiltmuth and Peter Golde.It has been designed to support the key features of .NET framework, the new
development platform of Microsoft for building component based software
solutions. It is simple, efficient, productive and type safe language derived
from C and C++ languages. C# enables the development of the robust, reliable
and durable components to handle real world application.
What is MSSQL?SQL is a standard language for accessing and manipulating databases. It
stands for structured query language. Basically, in a dynamic website that
displays some form of data from the database, you need RDBMS tools such as
SQL server to access the data stores in the database to access the data by firing
the queries to retrieve the data.
Although SQL is an ANSI (American National Standard Institute) standard,
there are many different version of the SQL language. However, to be
compliant with the ANSI standard, they all support at least the major
commands in a similar manner.
Function of SQL :Data definition SQL lets a user define the structure and organization of the
stored data and relationships among the stored data items.
Data retrieval SQL allows a user or an application program to retrieve
stored data from the database and use it.
Data manipulation SQL allows a user or an application program to update
the database by adding new data, removing old data, and modifying previously
stored data.
Access control SQL can be used to restrict a users ability to retrieve, add,
and modify data, protecting stored data against unauthorized access.
Data sharing SQL is used to coordinate data sharing by concurrent users,
ensuring that changes made by one user do not inadvertently wipe out changes
made at nearly the same time by another user.
8/13/2019 Docum Ntation
14/75
Data integrity SQL defines integrity constraints in the database, protecting it
from corruption due to inconsistent updates or system failures.
What is CSS ?CSS stands for Cascading style sheets. Styles define how to display html
elements. Styles were added to html 4.0 to solve a problem. External style sheets can
save a lot of work. External style sheets are stored in CSS files. Cascading style sheets
or CSS is the recommended way to control the presentation layer in a web document.
The main advantage of CSS over presentational html marker is that the styling can be
kept entirely separate from the content.
8/13/2019 Docum Ntation
15/75
2. SYSTEMANALYSIS
8/13/2019 Docum Ntation
16/75
2.1 Problem Definition
With no proper system in place to carry out activities of registration, modification,
generation, approval and updating, the workload on the individuals involved is high
especially the admin who has to maintain in numerous number of participants for each
activities and events. The current process is not professional as there is no technology and no
tracking mechanism. Loss of data is inevitable in such situations. Availability and the
accessibility to the data also become questionable due to lack of centralized storage.
The pages at the current website lack aesthetic background and a professionaltouch.
The formatting is very inconsistent, with improper colors chosen. Does not contain online features.
Does not contain a Content Management System. This leads to a largecommunication gap between the user and the organization.
8/13/2019 Docum Ntation
17/75
2.2 Feasibility Study
The feasibility study proposes one or more conceptual solutions to the problem set for theproject. The objective in assessing feasibility is to determine whether a development project
has a reasonable chance of success. The following are the criteria that are considered to
confirm project feasibility.
Technical FeasibilityAt first it is necessary to check whether the proposed system is technically
feasible or not and to determine the technologies and skills necessary to carry
out the implementation of the system. If they are not available then find the
solution to obtain them. After studying the technical requirements of the
system the only problem was that the organization did not have a facility to act
as a database server. However the organization has outsourced this to a
manual process of managing the participants and the event description.
Operational FeasibilityThe system has been specifically designed to be user friendly so that the
system is easy to use. The end user of the system is admin personnel and staff
members who are well versed in the use of computers. Also the system hasbeen mirrored to the real world scenario so that the process flow can be better
understood by the users. Hence, migrating the system does not pose much
hindrance.
Economic FeasibilityThe system being fully automate reduces the cycle time from registration to
conducting which many a times can reduce the loss incurred and valuable time
lost by the organization. The hardware and the other resources required for theproject are already present in the organization.
8/13/2019 Docum Ntation
18/75
2.3 Information Gathering
Three different methods were used for information gathering:
Shadowing:It is a technique in which you observe a user performing the tasks in the actual work
environment and as questions related to the task. You typically follow the user and
user performs the task.
The information obtained by using this technique was first hand. In addition it helped
to understand the purpose of performing each specific task.
Interviews :Apart from shadowing, gathering information about the processes. Each different type
of user had to be interviewed thoroughly for a proper and in depth understanding of
the processes. A one on one meeting with each type of user is needed to understand
his grievances with the current process and expectations from the project. Also a one
on one interaction helps to understand the requirements better and since they are the
end user of the system, it helps get their satisfaction as to their involvement in the
project development process flow.
Record View:The requisition records in the department were precise. These were helpful in
understanding the inputs to the system and the details that need to be captured for the
user and maintained by the system. A brief idea was given about the things to keep in
mind. They helped understand the workflow much better.
8/13/2019 Docum Ntation
19/75
3.SYSTEM
PLANNING
8/13/2019 Docum Ntation
20/75
8/13/2019 Docum Ntation
21/75
4. SYSTEM
DESIGN
8/13/2019 Docum Ntation
22/75
Introduction to UML
The Unified Modelling Language UML is the standard language for writing
software blueprints. UML is appropriate for model0ling system ranging from
enterprise information systems to distributed web applications and even hard real time
embedded systems. It is very expressive language, addressing all the views needed to
develop and the deploy such systems. Even though it is expressive, the UML is not
difficult to understand and use. Learning to apply the UML effectively starts with
forming conceptual model of the language, which requires learning three major
elements: the UMLs basic building blocks, the rules that dictate how these building
blocks may be put together and some common mechanism that apply throughout the
language. The UML language is for:
Visualizing Specifying Constructing Documenting
Diagrams in UML:A diagram is the graphical presentation of set of elements. We draw diagrams to
visualize a system from different perspective, so a diagram is a projection into the
system. The underlying premise of the UML is that no one diagram can capture the
different elements of a system in its entirety. Hence, UML is made up of different
diagrams that can be used to model a system at different points of time in the
software life cycle of a system. The diagrams are:
Class Diagram Use Case Diagram Sequence Diagram Activity Diagram
8/13/2019 Docum Ntation
23/75
4.1 CLASS DIAGRAM
The class diagram is used to refine the use case diagram and to define a detailed design of the
system. The class diagram classifies the actors defined in the use case diagram into a set of
interrelated classes. The relationship or association between the classes can either be IS-A
or HAS-A relationship. Each class in the class diagram may be capable of providing certain
functionalities. These functionalities provided by the class are termed as methods of the
class. Apart from this, each class may have certain Attributes that uniquely identify the
class.
8/13/2019 Docum Ntation
24/75
4.2 USE CASE DIAGRAM
Use cases represent typical sets of scenarios that help to structure, relate and
understand the essential requirements of the target systems from the users
perspective. Use case diagrams can be used to describe the functionality of a system
in a horizontal way. That is, rather than merely representing the details of individual
features of the system, it can be used to represent all available functionalities. Use
case diagrams thus:
Describes the behavior of the system from users stand point Provides functional descriptions of a system and its major processes Provides graphical descriptions of the users of a system and what kind of interactions
to expect within the system
Displays the details of the processes that occur within the application area Used to design the test cases for testing the functionality of the system.
Elements of the use case diagram
Actors:An actor portrays any entity that performs certain rules in a given system. An actor
in a use case diagram interacts with the use case. An actor is shown as a stick figure in use
case diagram depicted outside the system boundary.
Use Case:A use case in a use case diagram is a visual representation of distinct business
functionality in a system. Each use case is a sequence of transactions business functions canbe classified as potential use case. A use case is shown in an Ellipse in a use case diagram.
System Boundary:A system boundary defines the scope of what the system will be. A
system cannot have infinite functionality. A system boundary of use case diagram defines the
limits of the system. A system boundary shown as a rectangle spanning all the use cases in
the system.
Associations:This is used to show the participation of the Actor in the use case. That is, an
actor instance communicates with a process instance.
Relationships in use cases:Use cases share different kinds of relationships. Relationship
between two cases is basically a dependency between the two use cases. Defining a
relationship between two use cases is the decision if the modular of the use case diagram.
This reuse of an existing use case using different types of relationships reduces the overall
effort required in defining use case in system
8/13/2019 Docum Ntation
25/75
Use Case Diagram For User
USER
REGISTER NEW
ACCOUNT
LOGIN
USER
PROFILE
SONGS
BOLLYWOOD
ALBUMS
GHAZALS
REMIXES
EDIT
ACCOUNT
UPLOAD A
NEW SONG
CREATE
RINGTONES
CONVERT
SONGS
SEARCH &
ADD
FRIENDS
CREATE
PLAYLISTS
8/13/2019 Docum Ntation
26/75
Use Case Diagram For Administrator
ADMIN
LOGIN
CHECK
UPLOADED
SONGS
CHECK
USER
FEEDBACK
CHECK USER
DETAILS
8/13/2019 Docum Ntation
27/75
4.3 SEQUENCE DIAGRAM
When an object passes a message to another object, the receiving object might in turn send a
message to another object, which might in turn send a message to another object and so on.
This stream form sequence. The messages are ordered in sequence by time. Sequence
diagrams model these sequences.
Sequence diagrams describe interactions among the classes in terms of an exchange of
messages over time. Sequence diagrams demonstrate the behavior of objects in a use case by
describing the objects and the messages they pass. By examining these messages in detail the
functionality and data associated with each of these objects such as operations attributes can
be discovered. The diagrams are read left to right and descending.
A sequence diagram depicts the sequence of actions that occur in a system. The invocation of
methods in each object and the order in which the invocation occurs is captured in the
sequence diagram. This makes the sequence diagram very useful tool to easily represent the
dynamic behavior of the systems.
Modeling the flow of control by time ordering emphasizes the passing of messages as they
unfold over time, which is a particularly useful way to visualize dynamic behavior in the
context of use case scenario. Sequence diagrams do better job of visualizing simple iteration
and branching than do collaboration diagrams.
A sequence diagram is two dimensional in nature. On the horizontal axis, it shows the life the
object that it represents, while on the vertical axis, it shows the sequence of creation or
invocation of these objects.
Elements of the sequence diagram:
Class Roles:Class roles describe the way in which object will behave in context. Use the
UML object symbol to illustrate class roles, but do not list object attributes.
Actor:an external entity that interacts with the system.
Lifeline:Lifelines are vertical dashed lines that indicate the objects presence over time.
Messages:Messages are arrows that represent communication between objects. Each
message sent to a class invokes a static method/operation on that class. Each message sent to
an object invokes an operation on that object.
8/13/2019 Docum Ntation
28/75
Sequence Diagram For User :
pmei
Search
Play Songs
Download
Search
Play Songs
Download
Search
Play Songs
Download
Search
Play Songs Upload
Download songs
Create a new account Convert Songs
Receives Username & Password
Login Using Username & Password Search and Add Friends
Create Playlists
BOLLYWOOD ALBUMS GHAZALS REMIXES REGISTRATION myUpload Converted Friends Playlists
8/13/2019 Docum Ntation
29/75
8/13/2019 Docum Ntation
30/75
Sequence Diagram For Administrator :
Logins
Checks
Registered
Users Details
Checks the Uploaded Songs
Edit and Delete the Songs
Checks the User FeedBacks
REGISTRATION myUPLOADS USER_FEEDBACK
8/13/2019 Docum Ntation
31/75
4.4 ACTIVITY DIAGRAM
Activity diagram is used for business process modeling, for modeling the logic captured by a
single use case or usage scenario, or for modeling the detailed logic of business rule. Activity
diagram is a dynamic diagram that shows the activity and the event that causes the object to
be in a particular state. The easiest way to visualize an activity diagram is to think of a flow
chart and data flow diagram. Activity diagrams show the flow of activities through the
system. Diagrams are read from top to bottom and have branches and forks to describe
conditions and parallel activities.
Elements of Activity Diagram
Initial activity:This shows the starting point or first activity of the flow and is denoted by a
solid circle. There can be only one initial state in a diagram.
Activity: Represented by a rounded rectangle.
Transition:When an activity state is completed, processing moves to another activity states.
Transitions are used to mark this movement. Transitions are modeled using arrows.
Decisions:Similar to flowcharts, a logic where a decision is to be made is depicted by a
diamond, with the options written on either side of the arrows emerging from the diamond.
Final Activity:An end of an activity diagram is shown by a bulls eye symbol, also called as
the final activity. An activity diagram can have zero or more activity final modes.
8/13/2019 Docum Ntation
32/75
Activity Diagram For User :
false
true
BOLLYWOOD
SONGS
ALBUMS
GHAZALS
REMIXES
REGISTRATION
LOGINCHANGE
PASSWORD
UPLOAD A
NEW SONG
CREATE
PLAYLISTS
CONVERT
SONGS
CREATE
RINGTONES
SEARCH
SONGS
PLAY SONGS
& DOWNLOAD
SEARCH &
ADD FRIENDS
SIGN
OUT
8/13/2019 Docum Ntation
33/75
Activity Diagram For Administrator :
LOGIN
CHECK THE
REGISTERED
USERS DETAILS
CHECK THE
USERFEEDBACKS
CHECK & EDIT
THE UPLOADED
SONGS
8/13/2019 Docum Ntation
34/75
5. SYSTEMIMPLEMENTATION :
8/13/2019 Docum Ntation
35/75
5.1 Methodology Adopted :
This project is based on most common process modelIterative
Enhancement Model.The iterative enhancement life cycle model counters the limitation of
thewaterfall model and tries to combine the benefits of bothprototyping and
thewaterfall model.
The basic idea is that the software should be developed in increments, where
each increment adds some functional capability to the system until the full system is
implemented. At each step extensions and design modifications can be made.
The basic idea is to develop a system through repeated cycles (iterative) and in
smaller portions at a time (incremental), allowingsoftware developers to take
advantage of what was learned during development of earlier parts or versions of the
system.
ITERATIVE ENHANCEMENT MODEL
http://www.freetutes.com/systemanalysis/sa2-waterfall-software-life-cycle.htmlhttp://www.freetutes.com/systemanalysis/sa2-prototyping-model.htmlhttp://www.freetutes.com/systemanalysis/sa2-waterfall-software-life-cycle.htmlhttp://en.wikipedia.org/wiki/Software_developerhttp://en.wikipedia.org/wiki/Software_developerhttp://www.freetutes.com/systemanalysis/sa2-waterfall-software-life-cycle.htmlhttp://www.freetutes.com/systemanalysis/sa2-prototyping-model.htmlhttp://www.freetutes.com/systemanalysis/sa2-waterfall-software-life-cycle.html8/13/2019 Docum Ntation
36/75
ARequirementphase, in which the requirements for the software are gathered and
analyzed. Iteration should eventually result in a requirements phase that produces a
complete and final specification of requirements.
ADesign phase, in which a software solution to meet therequirementsis designed.
This may be a new design,or an extension of an earlier design.
AnImplementation and Testphase, when the software is coded, integrated and
tested.
AReviewphase, in which the software is evaluated, the currentrequirementsare
reviewed, and changes and additions torequirementsproposed.
5.2 System Requirements :
Software Requirements : Web Browser with IIS enabled Operating System : Windows 98 / 2000 /XP/ Vista / 7
Hardware Requirements : Intel Pentium 4 1.8 GHz Processor 128 MB RAM Monitor Hard Disk Standard Keyboard Standard Mouse
8/13/2019 Docum Ntation
37/75
5.3 Screenshots
HOMEPAGE
BOLLYWOOD PAGE
8/13/2019 Docum Ntation
38/75
GHAZALS PAGE
REMIX PAGE
8/13/2019 Docum Ntation
39/75
ALBUM PAGE
SONGS SEARCH
8/13/2019 Docum Ntation
40/75
CATEGORY SONG SEARCH
SEARCH RESULTS
8/13/2019 Docum Ntation
41/75
STREAMING SONG (mp3 Player)
REGISTRATION PAGE
8/13/2019 Docum Ntation
42/75
VALIDATION OF REGISTRATION
SUCCESSFUL REGISTRATION
8/13/2019 Docum Ntation
43/75
LOGIN PAGE FOR USER
LOGIN PAGE VALIDATION
8/13/2019 Docum Ntation
44/75
USER PROFILE PAGE
CHANGE PASSWORD PAGE
8/13/2019 Docum Ntation
45/75
CHANGE PASSWORD VALIDATION
EDIT ACCOUNT PAGE
8/13/2019 Docum Ntation
46/75
CHANGE PROFILE PICTURE
IMAGE UPLOAD VALIDATION
8/13/2019 Docum Ntation
47/75
UPLOAD SONGS
BROWSING FOR SONG UPLOADING
8/13/2019 Docum Ntation
48/75
SONG CATEGORY FOR UPLOADING
ADMIN LOGIN PAGE
8/13/2019 Docum Ntation
49/75
VIEW USER FEEDBACKS BY ADMIN
VIEW USER LOGIN DETAILS
8/13/2019 Docum Ntation
50/75
5.4 Process Involved
Register :
Every User should register him and can use that User ID and Password to log
into the Website and use services.
Login :
Login mechanism is to be provided to the user. User should be able to log into
the website and should be able to browse for the songs and upload ,download ,convert
songs and even search for Friends.
Create Playlists:The user can create his/her playlists.
Upload Songs :
The user can Upload a song after he/she is logged in.
Convert Songs :
The user can convert the song from mp3 format to wav format.
Search , Play & Download Songs :
User can Search for various songs like Ghazals, Bollywood, Albums and
Remixes and can then play the individual song and download if needed.
Create Ringtones :
Logged User can create Ringtones of any song
Search & Add Friends :
Search and add new friends like other social networking site
Log Out :
User can then click the link button to Log Out and will be redirected to the
HomePage.
8/13/2019 Docum Ntation
51/75
6. SYSTEM
TESTING
8/13/2019 Docum Ntation
52/75
6.1 Methodology Adopted For Testing
Testing is a process of executing a program with the intent of finding errors. A good test case
is one that has a high probability of finding an as yet undiscovered errors. A successful test
is one that uncovers an as yet undiscovered error.
If testing is conducted successfully it will uncover error in the software and testing
demonstrates that software functions appears to be working according to specification, that
behavior and performance requirements appear to have been met. In addition, data collected
as testing provide good indication of software reliability and some indication of software
quality as a whole. But testing cannot show the absence of errors and defects, it can only
show that errors and defects are present.
Testing Principles
All tests should be traceable to customer requirements. Test should be planned long before testing begins. Testing should begin in small scale and progress towards large scale. Exhaustive testing is not possible. To be most effective testing should be conducted by independent third party.
Testing Methods
Test must be designed with the highest likelihood to find possible errors in the system to
avoid major problems before the system goes live. There are two methods to design the test
cases :
White Box testing:
White box testing is a test case design method that uses the control structure of the
procedural design to drive test cases. Using white box testing the software engineercan derive test cases that
Guarantee that all independent paths within the module have beenexercised at least once.
Exercise all logical decisions on their true or false side. Execute all loops at their boundaries and within their operational bounds.
Exercise internal data structures to ensure their validity.
8/13/2019 Docum Ntation
53/75
Black Box Testing:
Black box tests are used to demonstrate that software function are operational, that input is
properly accepted and output is correctly produced. It is also used to demonstrate the integrity
of external information is maintained. Black box test examine some fundamental aspects of
system with little regard of the internal logical structure of the software.
Verification and validation
Verification refers to the set of activities that ensure, software correctly implements a specific
function. Validation refers to different set of activities that ensure, the software that has been
built is traceable to customer requirements.
Types of tests
Alpha testing: It teststhe software at the developers site. Software testers conduct the tests
using information about customer requirements. It is usually done in the presence of the
developer.
Beta testing: It tests the software at the clients site. End user performs testing in absence of
the developer and list down all the errors and problem occurred during the testing.
System testing: Tests to examine compatibility of software with hardware such as CPU,
RAM, and disk drives etc.
Recovery testing: Uses tests cases to examine how easily and completely system recovers
from disasters such as power failure, or disk crash or any natural disaster.
Performance testing: Tests the performance level of the software when load is low and
when load is heavy or regular and records the amount of resource that the software uses.
8/13/2019 Docum Ntation
54/75
Software testing strategies adopted
The following are the different prospective we tested: Internal program logic by white box test case design techniques. Software requirements using black box test case designtechniques.
After testing individual components integration was done. After integration testing of the
software was tested as a whole. Finally, a series of tests were executed once the full program
was in operation.
Unit testing: All unit testing will be done in White Box fashion. Testing will be conductedusing Basis Path testing methods, because of its simplicity and high effectiveness. Loop
testing will also be conducted to compliment the Basis Path testing. Individual components
are tested separately. Due to the systems modular design, there is no need for tests beds.
Integration testing: The interface of the modules is tested. Using black box techniques the
interfaces and the linking of different modules is checked for flaws. Any corrections to faulty
interface are made.
Functional testing: Testing will be done in a black box fashion to check the functionality of
the system as a whole. Using different test cases the logic of the system is checked for flaws.
System testing: In system checking, the software as a whole is observed and checked to see
if it meets the user requirements. We tested it again actual real life scenarios and data.
8/13/2019 Docum Ntation
55/75
7.SYSTEM
MAINTAINENCE
8/13/2019 Docum Ntation
56/75
System Maintenance :
After the implementation phase is complete and the website has been implemented
and has begun to be used by the customer after a period of time the system maintenance
phase begins to set in. Like any other software or hardware product after a period of time any
product begins to wear out and hence it requires periodic maintenance to be done.
Software Maintenance:
Software Maintenance is the process dealing with the modification of a software
product after a delivery to correct faults which may have arose after the implementation, to
improve performance or to adapt the product to a modified environment.
Generally,Software Maintenance can be classified into four types:
(a)Corrective maintenance
(b)Adaptive maintenance
(c)Preventive maintenance
(a)Corrective maintenance:
Changes necessitated by actual errors(defects or residual bugs) in a system are
termed as corrective maintenance .These defects manifest themselves when the system does
not operate as it was designed to or as it was stated in the requirements.
A defect or a bug can result from design error, logical error and coding error. Designerrors occurs when for e.g. change made to the software are incorrect, incomplete, wrongly
communicated or the change requested misunderstood. Defects are also caused by data
processing error and system performance error.
All these errors sometimes known as residual error or bugs prevent the
software from performing its tasks. On the occurrence of an error we look at the original
specification to find out what the system was actually supposed to perform. Under pressure
from the management we try to put a temporary fix by applying a patch to the system
(b)Adaptive maintenance:
Any effort that is initiated as a result of change in the environment in which a
software
system must operate is termed as adaptive change. Adaptive change is a change driven by
the need to accommodate modifications in the environment of the software system, without
which the system would be increasingly less useful and until it becomes obsolete.
The term environment in this context refers to all the conditions and influences which
act from outside upon the system, for e.g. business rules, government policies, work patterns,
software and hardware operating platform . A change to the whole or part of this environment
8/13/2019 Docum Ntation
57/75
will warrant a corresponding modification of he software. A change to the whole or part of
the environment will warrant a corresponding modification of the software.
Unfortunately this type of maintenance the user does not see a direct change in the
operation of the system, but the software must expand resources to effect the change .This
task is estimated to consume about 25% of the total maintenance activity
(c)Preventive maintenance:
This is rare the reason being that other pressures tend to push it to the end of the
queue. Maintenance companies of a major part in the development of the system. Every
system requires periodic maintenance of hardware as well as software . If new information is
inconsistent with design specification then changes are made . Hardware also needs periodic
maintenance for it to be an tune with design specification , The importance of maintenance is
to standardize the new system.
Hardware and software maintenance consists of the following :
(i)Hardware maintenance:
The primary objective includes comparison of the current performance with the
new specification . The outcome of this evaluation indicates the difference between
expectations and desired results . It also points towards any unnecessary modification
that may be required.
(ii)Software maintenance:
A wide range of activities including correcting, coding, and design errors and update
documentation and testing of data these are labor intensive which come under
software maintenance.
8/13/2019 Docum Ntation
58/75
8. COST &BENEFIT
ANALYSIS
8/13/2019 Docum Ntation
59/75
Developing cost/benefit analysis is a three step process .
The first step is to estimate the development and operational cost.
Development cost are those that are incurred during the development of a new system.
Operational costs are those that are incurred after the system is put into production.
The second step is to estimate the anticipated financial benefits . Financial benefits are
the expected annual savings or increase in revenue derived from the installation of the new
system.
Third the cost/benefit analysis is calculated based on the detailed estimates of costs
and benefits.
Development:
System Analyst Time Programmer Time User Time Possible hardware project cost Possible software project cost Possible outside services cost
Operation:
Computer cost Communication cost Operation staff cost Incremental user cost Maintenance cost Server side application costWhen assessing total cost we should not forget the expenses of operating a new system. A
new system may require the use of part of the time available on an existing computer , an
upgrade on the present system or a new computer or network. As the project is set on the
client server setup, we are required to set an application on the server side.
We believe that technology can be used to increase revenue as well as reduce the cost.The following list of benefits may prove helpful in cost analysis:
1. Ability to obtain information previously unavailable.2. Receipt of information on a more timely basis.3. Improvement in operation.4. Reduction in clerical activity.5. Improvement in service to internal employee6. Improvement in quality and accuracy.7. Reduction in cycle time
8/13/2019 Docum Ntation
60/75
Cost Evaluation :
Research Cost
Research cost=Number of people interviewed * Cost per person
Number of People = 08
Cost per person = `20
Research cost = 08 * 20
Research cost = ` 160
MANPOWER:
Analyzing, Designing and Coding:
Analyzing, Designing and coding = Number of people involved in project *
Number of days * Charges per day
Number of people involved in project = 2
Number of days = 145
Charges per day = ` 40
Manpower Cost = 2 * 145 * 40 = ` 11,600
Testing and Debugging Cost:
Testing and Debugging cost = Number of hours * Number of days * Charges per day
Number of hours = 15Number of days = 20
Charges per day = ` 50
Testing and Debugging Cost = 15 * 20 * 50 = ` 15,000
Software Cost:
Front end: ASP.NET 3.5 = NIL
Back end: Microsoft SQL Server 2005 Express Edition = NIL
8/13/2019 Docum Ntation
61/75
Software Cost = NIL
Overall Cost of the system = 160 + 11600 + 15000 = ` 26, 760
GANTT CHART :
8/13/2019 Docum Ntation
62/75
8/13/2019 Docum Ntation
63/75
9. CONCLUSIONS
& FUTURE
ENHANCEMENT
8/13/2019 Docum Ntation
64/75
8/13/2019 Docum Ntation
65/75
ANNEXURE
8/13/2019 Docum Ntation
66/75
USER MANUAL
8/13/2019 Docum Ntation
67/75
USER MANUAL
The user manual explains the working of the website and the usage as in how the
website works and how to go about it. It is written in easy language so that any native user
can understand how to work with the system.
The system provides easy navigation throughout all the system just by a click. User can
easily navigate from one page to another.
Some important features of the system are:
HOMEPAGE :
Home Page is the start page which gets displayed when the website is opened. HomePage contains Menus for the following :
BOLLYWOOD :
This menu redirects to the Bollywood page , this page has various bollywood
songs and in the center there are images which displays the latest songs. User can
click on any Movie images and can even search the songs in alphabetical order.
GHAZALS :
This menu redirects to the Ghazal page , this page has various Ghazal songs and in
the center there are images which displays the latest songs. User can click on any
Ghazal images and can even search the songs through in order.
ALBUMS :This menu redirects to the Album page , this page has various Album songs and in
the center there are images which displays the latest Albums. User can click on any
Album images and can even search the songs through in order.
REMIXES :
This menu redirects to the Remix page , this page has various Remix songs and in the
center there are images which displays the latest songs. User can click on any Remiximages and can even search the songs through alphabetical order.
8/13/2019 Docum Ntation
68/75
SEARCH PAGE :
After the respective song is searched a new search page is opened which displays the
result of the searched songs. User can click on any song and can stream it. In order
to download the song the user can right click on the song and can save the song to
their particular location in hard disk.
In order to provide additional features to the user apart from streaming and
downloading the song the user needs to get registered with the site. The following
are the procedures for getting registered and use the additional features provided by
our website :
REGISTRATION PAGE :
User can register themselves by filling up the registration form by providing the
appropriate details and the valid E-mail Address. After successful registration the user
would be given a message to login with their Username and Password.
LOGIN PAGE :
With their respective Username and Password user can login.
FORGOT PASSWORD :
If the User forgots his/her password they can provide their E-Mail Address in the
forgot password page and a Email link will be sent to their Inbox and User can then
click on that link and can provide a new password.
myPROFILE PAGE :
Once the user successfully logins to the system he/she would be redirected to their
Profile page. The Profile Page has various menus :
myPLAYLISTS :In this page user can view the playlists created by the user. User can also
click on the Create a playlist button provided at the bottom of the page and can
create new playlists.
myUPLOADS :Through this page User can upload a new song from their hard disk .
8/13/2019 Docum Ntation
69/75
myCONVERTED :In this page user can convert a particular song which is in mp3 format to
wav format .
myFRIENDS :Using this page user can search for other registered users and can add
friends.
myRINGTONES :Through this page ringtones can be created for the mobile phones.
EDIT PROFILE :User can edit their details by changing the Username, Email ID, Date of birth
etc.
CHANGE PASSWORD :User can also change their password to improve security.
USER FEEDBACK PAGE :In order to improve the site user can provide the feedback through this form.
SIGN OUT :At any point of time user can successfully sign out from their profile and will
be redirected back to the homepage.
8/13/2019 Docum Ntation
70/75
DATADICTIONARY
8/13/2019 Docum Ntation
71/75
Data Dictionary
LOGIN TABLE
Field Name Data Type Length KeyUserId varchar 20 Primary Key
UPassword varchar 20
REGISTRATION TABLE
Field Name Data Type Length key
UName Varchar 80 -
UserId Varchar 20 Foreign Key
Email Varchar 20 -
UPassword Varchar 20 -
ConfirmPass Varchar 20 -
Gender Varchar 50 -
DMonth Varchar 10 -DDay int - -
DYear int - -
Country varchar 20 -
Profile_image nvarchar MAX -
BOLLYWOOD TABLE
Field Name Data Type Length key
SName Varchar 40 Primary key
Singers Varchar 40 -
Movie Varchar 30 -
Ratings Varchar 20 -
SYear int - -
SPath Varchar 100 -
8/13/2019 Docum Ntation
72/75
ALBUM TABLE
Field Name Data Type Length key
SName Varchar MAX Primary key
Singers Varchar 30 -Album_name Varchar MAX -
Ratings Varchar 20 -
AYear int - -
APath nVarchar MAX -
GHAZAL TABLE
Field Name Data Type Length key
SName Varchar 30 Primary key
Singers Varchar 30 -
Ghazal_Year int - -
Ghazal_Name Varchar 50 -
Ratings Varchar 20 -
GaPath nVarchar MAX -
REMIX TABLE
Field Name Data Type Length key
SName Varchar 30 Primary keyDJ_Name Varchar 30 -
RYear int - -
Ratings Varchar 20 -
RPath nVarchar MAX -
8/13/2019 Docum Ntation
73/75
myUPLOADS TABLE
Field Name Data Type Length Key
UserId Varchar 20 Foreign Key
SType Varchar 80 -SName Varchar 80 -
myPLAYLISTS TABLE
Field Name Data Type Length Key
UserId varchar 20 Foreign Key
PlaylistName varchar 80 -
FEEDBACK TABLE
Field Name Data Type Length Key
UserId varchar 20 Primary Key
UPassword varchar 20
8/13/2019 Docum Ntation
74/75
REFERENCES
8/13/2019 Docum Ntation
75/75
REFERENCES
Books Referred :
ASP.NET 2.0 UNLEASHED
PRO ASP.NET
C# BALGURUSWAMY
Websites Referred :
www.codesource.net
www.google.com
www.asp.net/forum.aspx
http://www.codesource.net/http://www.google.com/http://www.asp.net/forum.aspxhttp://www.asp.net/forum.aspxhttp://www.google.com/http://www.codesource.net/