+ All Categories
Home > Documents > Shashank Movie

Shashank Movie

Date post: 18-Oct-2015
Category:
Upload: sanjay-ngar
View: 34 times
Download: 1 times
Share this document with a friend
Description:
dff
91
1 JP INSTITUTE OF ENGINEERING & TECHNOLOGY, MEERUT ONLINE MOVIE TICKET SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE AWARD OF THE DEGREE OF BACHELOR OF TECHNOLOGY IN INFORMATION TECHNOLOGY SESSION: 2010-11 SUBMITTED BY SHASHANK SINGH - 0728213050 SHAILJA PANDEY - 0728213049 ANSHUL KUMAR - 0728213006 UNDER THE GUIDANCE OF Mr. AMIT BALYAN PROJECT GUIDE Mrs. RICHA SHARMA SUBMITTED TO UTTAR PRADESH TECHNICAL UNIVERSITY, LUCKNOW  
Transcript

JP INSTITUTE OF ENGINEERING & TECHNOLOGY, MEERUT

ONLINE MOVIE TICKET

SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTSFOR THE AWARD OF THE DEGREE OFBACHELOR OF TECHNOLOGYININFORMATION TECHNOLOGY

SESSION: 2010-11SUBMITTED BYSHASHANK SINGH 0728213050

SHAILJA PANDEY 0728213049

ANSHUL KUMAR 0728213006

UNDER THE GUIDANCE OF Mr. AMIT BALYANPROJECT GUIDEMrs. RICHA SHARMASUBMITTED TOUTTAR PRADESH TECHNICAL UNIVERSITY, LUCKNOW

CERTIFICATE

This is to certify that this Project Report entitled ONLINE MOVIE TICKET which is submitted by SHASHANK SINGH, SHAILJA PANDEY and ANSHUL KUMAR having Roll No 0728213050, 0728213049, 0728213006 in the partial fulfillment, for the award of degree of Bachelor of Technology in Department of Computer Science & Engineering, of JP INSTITUTE OF ENGINEERING & TECHNOLOGY, Meerut, affiliated to UTTAR PRADESH TECHNICAL UNIVERSITY, Lucknow; is carried out by him/her under my supervision. The matter embodied in this Project Work has not been submitted earlier for award of any degree or diploma in any university/institution to the best of our knowledge and belief.

(Richa Sharma) (Sanjeev Kumar Sharma) Project GuideHead of the Department (CSE/IT/MCA)

Date: 18/05/2011

DECLARATION

I hereby declare that this submission is my own work and that, to the best of my knowledge and belief, it contains no material previously published or written by another person nor material which to a substantial extent has been accepted for the award of any other degree or diploma of the university or other institute of higher learning, except where due acknowledgment has been made in the text.

Signature

Name SHASHANK SINGH

Roll No. 0728213050

Date 18/05/2011

Signature

Name SHAILJA PANDEY

Roll No. 0728213049

Date 18/05/2011

Signature

Name ANSHUL KUMAR

Roll No. 0728213006

Date 18/05/2011

ACKNOWLEDGEMENT

It gives us a great sense of pleasure to present the report of the Project Work, undertaken during B. Tech. Final Year. We owe special debt of gratitude to Mrs. Richa Sharma., Department of Computer Science & Engineering, JP Institute of Engineering & Technology, Meerut for his constant support and guidance throughout the course of our work. His sincerity, thoroughness and perseverance have been a constant source of inspiration for us. It is only his cognizant efforts that our endeavors have seen light of the day.We also take the opportunity to acknowledge the contribution of Mr. Sanjeev Kumar Sharma, Associate Professor & Head, Department of Computer Science & Engineering, JP Institute of Engineering & Technology, Meerut for his full support and assistance during the development of the project.We also do not like to miss the opportunity to acknowledge the contribution of all faculty members of the department for their kind assistance and cooperation during the development of our project. Last but not the least, we acknowledge our friends for their contribution in the completion of the project.

Signature

Name SHASHANK SINGH

Roll No. 0728213050

Date 18/05/2011

Signature

Name SHAILJA PANDEY

Roll No. 0728213049

Date 18/05/2011

Signature

Name ANSHUL KUMAR

Roll No. 0728213006

Date 18/05/2011

ABSTRACT

Online movie ticket is web based applications which involve managing movies information that are on site and currently running. No one has to waste time in standing in queue. This is one of the important advantages of using this project. ASP.NET is being used as front end connectivity. Coding is done in ASP.NET and SQL server is used in backend connectivity. ADO.NET is used as programming model for ASP.net framework. .NET framework is used as software technology. This allows us to build our services and web application. To provide security in web application IIS (integrated information system) is used. Security provides three functionalities: authentication, authorization and impersonation.

TABLE OF CONTENT

S.N.CONTENTSPAGE NO.

1.Project profile..1

2.About software technology.13

3.Problem formulation...25

4.Existing system38

5.System analysis42

6.System design...54

7.Overview of testing process62

8.Overview of implementation..67

9.Site map71

10.Limitation of the project.72

11.Snapshots.........74

12.References and Bibliography..91

1. Project Profile:

1.1 Introduction:This project report is submitted in partial fulfillment of the requirement for B.Tech. The course include a topic Online movie tickets .This project work is a golden opportunity for us to apply the theoretically learn tips for system Analysis and Designing of a system practically. Saffron company helps me a lot to work on project and how we can apply theoretical concept practically to work on project. The Project Title Online movie tickets is a web based applications which involve managing movies information, how many movies on our site. .By using this, No one has to waste time to stand in a queue to book Ticket. This Online movie tickets will have all the necessary parts in order to handle the ticket system. Customer is able to search for movies that he/she looking in our database on the basis of movies date, origin. If they like to book movies then he/she have to register for an account. Upon registering a user can book movies and get a confirmed Ticket to watch in theater. This system also provides facility to customer to book movies or International. Any user can visit this system whether they are registered user or guest. But to book ticket first they have to login our account. To become a member of online movie tickets it provides signup facility. To book Ticket first they have to login our account, after that he/she can book ticket. This system also provides fare rules and terms and condition of this system. Customer can easily use this system and book ticket. To get ticket customer have to take printout of the ticket page.1.2 Functions that is available for customers: Registration for an account Login/Logout Select city Search for movies(Domestic or International ) Book Ticket Take Ticket1.3 Functions that is available to Admin: Add New movies Information Delete/Update movies Information Search particular movies Information Search Customer Information1.4 Main Modules of the Project: Login Module Search movies Module Book movies Module movies List Report Customer List Report1.4.1 Login Module:This is the first module of the software. This is very important from the security point of view. Only an authorize user is allowed to enter in the system. This is assured by this module. In this module there is login form, which has t o be filled by two information. One is User name and another is password and one is persistent cookie which maintains user information in system. When a user enters his name and password, the system send a request in the database to check that this user is entry is existing there or not. If the user name and password matches the given user name and password in the database the logging is successful and if it is not than logging is failed and an error message is generated by the system which tells that you are not a registered user.The user of the system is created by the system administrator. System administrator creates the logging id and password for the user. This can be changed also by altering the entry in the database. All the users information is stored in the database which is also very secured. So this insures the complete security for the system and prevent from the information lost.

1.4.2 Search movies Module:This is the Module in which customer can search movies that he/she want. This module has an input form which is being field by the user of the system. In this module there is origin place, destination place, Depart date, Return Date. In this module there is two option button for user one is one way and another is round way. User has to select whether he/she book one way or Round way trip.1.4.3 Book movies Module:This is the Module in which booking information is stored. This module has an input form which is being field by the user of the system. This module contains information related to booking of movies. It contains me, Address, Passenger Name, Passenger strength Children age.1.4.4 Movies List Report:This module is for the report generation. The Reporting module is one of the most important modules of any system. The Correct reports provide the guarantee that the particular system in use is functioning correct and it can be trusted for the future point of view also. This module generates the report which helps the coordinator to view various movies that serve various customers. The user can not edit the information displayed the form. 1.4.5 Customer List Report:This module is for the report generation. The Reporting module is one of the most important modules of any system. The Correct reports provide the guarantee that the particular system in use is functioning correct and it can be trusted for the future point of view also.This module generates the report which helps the coordinator to view various customer information that is registered in this system. The user can edit his information displayed the form. Not others he can only view other information.

1.5 FEATURES OF THE PROJECT:Online movie tickets will provide a lot of help to the customer. It helps customer to book ticket online. Customer is able to search for movies that he/she looking in our database on the basis of movies date, origin and destination. By using this system no one has to waste time by standing in queue to book ticket. Customer can book ticket from anyplace whether he/she is in home or office.There are following features of Online movie tickets: It provides Login/Logout facility. Password protected user functions. Password protected administrative functions. It provides signup facility, to become a member. Real client/server environment reachable all over the world. Administrator can add infinite number of movies information. Administrator can able to delete, update movies information. Customer can able to search movies that he/she looking. Customer can able to book movies & get ticket easily. This system is easy to use no more training require. Security measures so those only users with privileges can access the admin Module.1.6 ADVANTAGES OF THE PROJECT:Online movie tickets will provide a lot of advantageous to the customer. It helps customer to book ticket online. Customer is able to search for movies that he/she looking in our database on the basis of movies date, origin and destination. By using this system no one has to waste time by standing in queue to book ticket. Customer can book ticket from anyplace whether he/she is in home or office. It provides lot of benefits to customers.There are following advantageous of Online movie tickets: It help customer to search movies from origin to destination. It provides login/logout facility. It help administrator to delete, update movies information. It provides signup facility to become a member. It help administrator to add infinite number of movies information. It help customer to book ticket online. It provides excellent & fast service to customer. It save customer time, now he/she has no need to stand in a queue to book ticket. It provides lot of benefit to company, now there is no need of large staff to manage reservation system. It has real client/server environment reachable all around the world. Security measures so those only users with privileges can access the admin Module.

2. About Software technology:

2.1 Microsoft .Net Framework:.NET Framework is made up of the Common Language Runtime (CLR), the Base Class Library (System Classes). This allows us to build our own services (Web Services or Windows Services) and Web Applications (Web forms Or Asp .Net), and Windows applications (Windows forms).

Above Picture shows overall picture, demonstrating how the .NET languages follows rules provided by the Common Language Specifications (CLS). These languages can all be used? Independently to build application and can all be used with built-in data describers (XML) and data assessors (ADO .NET and SQL). Every component of the .NET Framework can take advantage of the large pre- built library of classes called the Framework Class Library (FCL). Once everything is put together, the code that is created is executed in the Common Language Runtime. Common Language Runtime is designed to allow any .NET-compliant language to execute its code. At the time of writing, these languages included VB .Net, C# and C++ .NET, but any language can become .NET- compliant, if they follow CLS rules.

2.2 MICROSOFT .NET FEATURES:There are following features are given below:2.2.1 Powerful Windows-based Applications:.NET comes with features such as a powerful new forms designer, an in-place menu editor, and automatic control anchoring and docking. Visual Basic .NET delivers new productivity features for building more robust applications easily and quickly. With an improved integrated development environment (IDE) and a significantly reduced startup time.2.2.2 Building Web-based Applications:With Visual Basic .NET we can create Web applications using the shared Web Forms Designer and the familiar "drag and drop"feature. You can double-click and write code to respond to events. Visual Basic .NET 2003 comes with an enhanced HTML Editor for working with complex Web pages.2.2.3 Simplified Deployment:With Visual Basic .NET we can build applications more rapidly and deploy and maintain them with efficiency. Visual Basic .NET 2003 and .NET Framework 1.1 makes "DLL Hell" a thing of the past. Side-by-side versioning enables multiple versions of the same component to live safely on the same machine so that applications can use a specific version of a component.2.2.4 Powerful, Flexible, Simplified Data Access:You can tackle any data access scenario easily with ADO.NET and ADO data access. The flexibility of ADO.NET enables data binding to any database, as well as classes, collections, and arrays, and provides true XML representation of data.2.2.5 Full Object-Oriented Constructs:You can create reusable, enterprise-class code using full object-oriented constructs. Language features include full implementation inheritance, encapsulation, and polymorphism. Structured exception handling provides a global error handler.2.2.6 XML Web Services:XML Web services enable you to call components running on any platform using open Internet protocols. Working with XML Web services is easier where enhancements simplify the discovery and consumption of XML Web services that are located within any firewall. XML Web services can be built as easily as you would build any class in Visual Basic 6.0. The XML Web service project template builds all underlying Web service infrastructure.2.2.7 Mobile Applications:Visual Basic .NET 2003 and the .NET Framework 1.1 offer integrated support for developing mobile Web applications for more than 200 Internet-enabled mobile devices. These new features give developers a single, mobile Web interface and programming model to support a broad range of Web devices, including WML 1.1 for WAPenabled cellular phones, compact HTML (HTML) for i-Mode phones, and HTML for Pocket PC, handheld devices, and pagers.2.2.8 Upgrade Wizard:You upgrade your code to receive all of the benefits of Visual Basic .NET 2003. The Visual Basic .NET Upgrade Wizard, available in Visual Basic .NET 2003 Standard Edition, and higher, upgrades up to 95 percent of existing Visual Basic code and forms to Visual Basic .NET with new support for Web classes and User Controls. 2.3 Features of the Common Language Runtime:-The common language runtime manages memory, thread execution, code execution, code safety verification, compilation, and other system services. These features are intrinsic to the managed code that runs on the common language runtime.With regards to security, managed components are awarded varying degrees of trust, depending on a number of factors that include their origin (such as the Internet, enterprise network, or local computer). This means that a managed component might or might not be able to perform file-access operations, registry-access operations, or other sensitive functions, even if it is being used in the same active application.The runtime enforces code access security. For example, users can trust that an executable embedded in a Web page can play an animation on screen or sing a song, but cannot access their personal data, file system, or network. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally featuring rich.The runtime also enforces code robustness by implementing a strict type- and code-verification infrastructure called the common type system (CTS). The CTS ensures that all managed code is self-describing. The various Microsoft and third-party language compilers generate managed code that conforms to the CTS. This means that managed code can consume other managed types and instances, while strictly enforcing type fidelity and type safety.In addition, the managed environment of the runtime eliminates many common software issues. For example, the runtime automatically handles object layout and manages references to objects, releasing them when they are no longer being used. This automatic memory management resolves the two most common application errors, memory leaks and invalid memory references.The runtime also accelerates developer productivity. For example, programmers can write applications in their development language of choice, yet take full advantage of the runtime, the class library, and components written in other languages by other developers. Any compiler vendor who chooses to target the runtime can do so. Language compilers that target the .NET Framework make the features of the .NET Framework available to existing code written in that language, greatly easing the migration process for existing applications.While the runtime is designed for the software of the future, it also supports software of today and yesterday. Interoperability between managed and unmanaged code enables developers to continue to use necessary COM components and DLLs.The runtime is designed to enhance performance. Although the common language runtime provides many standard runtime services, managed code is never interpreted. A feature called just-in-time (JIT) compiling enables all managed code to run in the native machine language of the system on which it is executing. Meanwhile, the memory manager removes the possibilities of fragmented memory and increases memory locality-of-reference to further increase performance.Finally, the runtime can be hosted by high-performance, server-side applications, such as Microsoft SQL Server and Internet Information Services (IIS). This infrastructure enables you to use managed code to write your business logic, while still enjoying the superior performance of the industry's best enterprise servers that support runtime hosting.2.4 .NET FRAMEWORK CLASS LIBRARY:-The .NET Framework class library is a collection of reusable types that tightly integrate with the common language runtime. The class library is objecting oriented, providing types from which your own managed code can derive functionality. This not only makes the .NET Framework types easy to use, but also reduces the time associated with learning new features of the .NET Framework. In addition, third-party components can integrate seamlessly with classes in the .NET Framework.For example, the .NET Framework collection classes implement a set of interfaces that you can use to develop your own collection classes. Your collection classes will blend seamlessly with the classes in the .NET Framework.As you would expect from an object-oriented class library, the .NET Framework types enable you to accomplish a range of common programming tasks, including tasks such as string management, data collection, database connectivity, and file access. In addition to these common tasks, the class library includes types that support a variety of specialized development scenarios. For example, you can use the .NET Framework to develop the following types of applications and services: Console applications. Scripted or hosted applications. Windows GUI applications (Windows Forms). ASP.NET applications. XML Web services. Windows services. For example, the Windows Forms classes are a comprehensive set of reusable types that vastly simplify Windows GUI development. If you write an ASP.NET Web Form application, you can use the Web Forms classes.2.4.1 Client Application Development:Client applications are the closest to a traditional style of application in Windows-based programming. These are the types of applications that display windows or forms on the desktop, enabling a user to perform a task. Client applications include applications such as word processors and spreadsheets, as well as custom business applications such as data-entry tools, reporting tools, and so on. Client applications usually employ windows, menus, buttons, and other GUI elements, and they likely access local resources such as the file system and peripherals such as printers.Another kind of client application is the traditional ActiveX control (now replaced by the managed Windows Forms control) deployed over the Internet as a Web page. This application is much like other client applications: it is executed natively, has access to local resources, and includes graphical elements.2.4.2 Server Application Development:-Server-side applications in the managed world are implemented through runtime hosts. Unmanaged applications host the common language runtime, which allows your custom managed code to control the behavior of the server. This model provides you with all the features of the common language runtime and class library while gaining the performance and scalability of the host server. The following illustration shows a basic network schema with managed code running in different server environments. Servers such as IIS and SQL Server can perform standard operations while your application logic executes through the managed code.Server-Side Managed code

ASP.NET is the hosting environment that enables developers to use the .NET Framework to target Web-based applications. However, ASP.NET is more than just a runtime host; it is a complete architecture for developing Web sites and Internet-distributed objects using managed code. Both Web Forms and XML Web services use IIS and ASP.NET as the publishing mechanism for applications, and both have a collection of supporting classes in the .NET Framework.XML Web services, an important evolution in Web-based technology, are distributed, server-side application components similar to common Web sites. However, unlike Web-based applications, XML Web services components have no UI and are not targeted for browsers such as Internet Explorer and Netscape Navigator. Instead, XML Web services consist of reusable software components designed to be consumed by other applications, such as traditional client applications, Web-based applications, or even other XML Web services. As a result, XML Web services technology is rapidly moving application development and deployment into the highly distributed environment of the Internet.The .NET Framework also provides a collection of classes and tools to aid in development and consumption of XML Web services applications. XML Web services are built on standards such as SOAP (a remote procedure-call protocol), XML (an extensible data format), and WSDL (the Web Services Description Language). The .NET Framework is built on these standards to promote interoperability with non-Microsoft solutions.2.5 Microsoft ASP. NET:2.5.1 Introduction:ASP.NET is the latest version of Active server pages(ASP),Microsofts server-side web technology for building dynamic, interactive and database-driven web sites.ASP.NET is the next era of web development.ASP.Net is a new and powerful server side technology for creating dynamic web pages. It is one of a set of technologies that comprise the Microsoft.Net Framework. It allows us to use a full featured programming language such as C# or VB.Net to build web application easily. It gives us full server side object oriented functionality. It is a robust, easy to use solution for developing complex web sites, rather than building simple pages that are only for display, you will create web pages that visitors can interact with in wonderful ways.ASP.Net Application are based on Common Language Runtime(CLR),.Net class libraries & other tools integrated with Microsoft .Net framework.Asp.Net is a server technology that brings together the different pieces of web to give web site developers more power then ever.Asp.Net solve the problem in request/response modal. In this modal server has no idea what is happening on client, unless it make another request. To solve this problem there is another modal for communicating between server & clients known as Event Driven Modal In this server waits around for something to happen on the client. Once it does, the server takes action & perform some piece of functionality.Asp.Net relies on clever client side processing to simulate an event driven modal. Using client side script, Asp.Net supplies information about what the client is doing during requests. Whenever something is happens on the client, a client side script executes & send information to the server just as submitting a form send information to a server.Asp.Net ties together the server & the client, which allows developers to do things in web pages.ASP.NET is a programming framework built on the common language runtime that can be used on a server to build powerful Web applications.

2.5.2 ADVANTAGES OF ASP.NET:ASP.NET hopes to do for the web that visual basic has done for windows. Visual basic provides a graphical IDE.in which developers can simply drag & drop components from the toolbar and create traditional client/server applications. The actual coding required is minimal and contains just application specific logic.Asp.Net expects to reduce and replace coding with components. It heralds the next generation of web applications, which are based on component-oriented programming. The chief advantages of Asp.Net are listed below:- Support For Programming Languages:ASP.NET pages are developed using .Net-compatible programming languages such as VB.Net and C#. This improves performance in two ways. The source code is compiled, not interpreted .secondly; the strong typing supported by these languages enables early binding. Language-Independence:ASP.NET applications can be developed using any one of the .Net-compatible programming languages. A single application can contain pages and components developed using different languages. This enables you to leverage the existing programming skills of different team members. Simplified Development: ASP.NET minimizes the amount of coding required to develop an application by using server-side controls and event-driven programming. The server-side controls are declarative in nature. You can even convert HTML elements into server-side controls and manipulate them on the server using an intuitive object model. Client Platform Independence:ASP.NET supports multiple client platforms, including mobile devices. It supports XML and can exchange data with other resources on the internet using this language. Web Services: ASP.NET supports the new technology of web services, which is used for accessing application-logic and transferring data across the internet. Support For .Net Framework:ASP.NET is part of the .Net Framework. The .Net Framework provides almost 4000 classes that can be used in ASP.NET pages. Support For Caching:ASP.NET supports page and data caching that enables you to improve the performance of your applications. Support for Separation Of Code and Content:Usually, Web applications involved web developers, people who write the application logic, and web designers, people who design the layout of the application. Separating code and content enables these two groups to work independently of each other. It also simplifies maintenance. Backward Compatibility:ASP.NET maintains backward compatibility with earlier versions of ASP,COM and COM+, and even the windows operating System. The file extension of ASP.NET application is .aspx different from the file extension of ASP application.asp. This implies that ASP application can be run along with ASP.NET applications and developers can migrate to the new platform as their requirement increase. By default, files with extension, .asp are mapped by IIS to asp.dll, and files with the extension, .aspx are mapped to aspnet_isapi.dll.

2.6 ASP.NET AND .NET FRAMEWORK ASP.NET is a unified web platform that provides all the services necessary for you to build enterprise-class applications. It, in turn, is built on the .Net Framework, so the entire framework is available to any ASP.NET application. The .Net Framework acts as an interface between ASP.NET applications and the operating System.

Web Clients

IISASP.NET Applications

.NETFramework

Windows NT/2000Operating System

2.7 SECURITY MANAGEMENTASP.NET works in concert with the .NET Framework and IIS to provide web application security. To secure an ASP.NET application, you must perform the three fundamental functions, authentication, authorization and impersonation. Authentication: It assures that the user is, in fact, who the user claims to be. User credentials(such as name and password)are validated against some authority.ASP.NET implements additional authentication methods that apply after IIS authentication mechanisms.ASP.NET authentication methods include windows Authentication, passport and Forms.ASP.NET controls access to site information by comparing authenticated credentials, or representations of them, to NTFS file system permissions or to an XML file that lists authorized users, authorized roles Or authorized HTTP verbs. Authorization:It limits access rights by granting or denying specific permissions to an authenticated identity. Impersonation: It enables the ASP.NET application to execute in the context of an authenticated or anonymous user. When the request is passed to the application from IIS access is then granted or denied based on the impersonated identity.IIS can also grant or deny access based on a users host name or IP address.ASP.NET application developer also has access to all of the built in security features of the .NET framework, such as code access security and role based user access security.2.8 OVERVIEW OF THE .NET FRAMEWORK:2.8.1 WEB SERVICES:-Web services provide a web-enabled user interface with tools that include various hypertext markup language (HTML) controls and web controls. Web services also handle various web protocols, security, when code is targeted for .NET, it is called managed code, which means that the code automatically runs under a contract of cooperation with the CLR. Managed code supplies the information necessary for the runtime to provide services such as memory management, cross-language integration, code access security, and the automatic lifetime control of all of our objects.The .NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet. The .NET Framework is designed to fulfill the following objectives: To provide a consistent object-oriented programming environment whether object code is stored and executed locally, executed locally but Internet-distributed, or executed remotely. To provide a code-execution environment that minimizes software deployment and versioning conflicts. To provide a code-execution environment that guarantees safe execution of code, including code created by an unknown or semi-trusted third party. To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. To make the developer experience consistent across widely varying types of applications, such as Windows-based applications and Web-based applications. To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code.The .NET Framework has two main components: the common language runtime and the .NET Framework class library. The common language runtime is the foundation of the .NET Framework. You can think of the runtime as an agent that manages code at execution time, providing core services such as memory management, thread management, and remoting, while also enforcing strict type safety and other forms of code accuracy that ensure security and robustness. In fact, the concept of code management is a fundamental principle of the runtime. Code that targets the runtime is known as managed code, while code that does not target the runtime is known as unmanaged code. The class library, the other main component of the .NET Framework, is a comprehensive, object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP.NET, such as Web Forms and XML Web services. The .NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code, thereby creating a software environment that can exploit both managed and unmanaged features. The .NET Framework not only provides several runtime hosts, but also supports the development of third-party runtime hosts. For example, ASP.NET hosts the runtime to provide a scalable, server-side environment for managed code. ASP.NET works directly with the runtime to enable Web Forms applications and XML Web services, both of which are discussed later in this topic. The following illustration shows the relationship of the common language runtime and the class library to your applications and to the overall system. The illustration also shows how managed code operates within a larger architecture.

2.8.2 The ADO.NET Data ArchitectureData Access in ADO.NET relies on two components:Dataset andData Provider. Dataset:The dataset is a disconnected, in-memory representation of data. It can be considered as a local copy ofthe relevant portions of the database. The Dataset is persisted in memory and the data in it can be manipulated and updated independent of the database. When the use of this Dataset is finished, changes can be made back to the central database for updating.

Data Provider:The Data Provider is responsible for providing and maintaining the connection to the database. A Data Provider is a set of related components that work together to provide data in an efficient and performance driven manner. The .NET Framework currently comes with two Data Providers: the SQLData Provider which is designed only to work with Microsoft's SQL Server 7.0 or later and the Old Data Provider which allows us to connect to other types of databases like Access and Oracle.2.8.3 Data access with ADO.NET can be summarized as follows: A connection object establishes the connection for the application with the database. The command object provides direct execution of the command to the database. If the command returns more than a single value, the command object returns a Data Reader to provide the data. Alternatively, the Data Adapter can be used to fill the Dataset object. The database can be updated using the command object or the Data Adapter.

2.8.4 DESIGN GOALS FOR ADO.NET:-As application development has evolved, new applications have become loosely coupled based on the Web application model. More and more of today's applications use XML to encode data to be passed over network connections. Web applications use HTTP as the fabric for communication between tiers, and therefore must explicitly handle maintaining state between requests. This new model is very different from the connected, tightly coupled style of programming that characterized the client/server era, where a connection was held open for the duration of the program's lifetime and no special handling of state was required.ADO.NET was designed to meet the needs of this new programming model: disconnected data architecture, tight integration with XML, common data representation with the ability to combine data from multiple and varied data sources, and optimized facilities for interacting with a database, all native to the .NET Framework.In creating ADO.NET, Microsoft embraced the following design goals. Leverage Current ADO Knowledge:-The design for ADO.NET addresses many of the requirements of today's application development model. At the same time, the programming model stays as similar as possible to ADO, so current ADO developers do not have to start from the beginning in learning a brand new data access technology. ADO.NET is an intrinsic part of the .NET Framework without seeming completely foreign to the ADO programmer. ADO.NET coexists with ADO. While most new .NET-based applications will be written using ADO.NET, ADO remains available to the .NET programmer through .NET COM interoperability services. Support the N-Tier Programming Model:-ADO.NET provides first-class support for the disconnected, n-tier programming environment for which many new applications are written. The concept of working with a disconnected set of data has become a focal point in the programming model.

Integrate Xml SupportXML and data access are intimately tied XML is all about encoding data, and data access is increasingly becoming all about XML. The .NET Framework does not just support Web standards it is built entirely on top of them.XML support is built into ADO.NET at a very fundamental level. The XML classes in the .NET Framework and ADO.NET are part of the same architecture they integrate at many different levels. You no longer have to choose between the data access set of services and their XML counterparts; the ability to cross over from one to the other is inherent in the design of both.2.9 INTRODUCTION TO SQL SERVER:2.9.1 What is SQL server?SQL server is a client/server relational database management system (RDBMS) that uses the transact-SQL to send request between the client and SQL server.2.9.2 Why use SQL server as back end?SQL server is designed to be a client/server system. Client/server systems are constructed so that the database can reside on central computer known as Server and be shared among several users. When users want to access the data in SQL server, they run an application on their local computer known as client that connects over a network to the server running SQL server. SQL server can work with thousands of client applications simultaneously. The server has features to prevent the logical problems that occur if a user tries to read or modify data currently being used by others. While SQL server is designed to work as a client/server network, it is also capable of working as a stand-alone database directly on the client. The scalability and ease of use features of SQL server allow it to work efficiently on a client without consuming too many resources. SQL server effectively allocates the available resources such as memory, network bandwidth and disk I/O among the multiple users.2.9.3 Advantages of SQL client are: Supports multiple hardware platforms Supports multiple software applications2.9.4 Advantages of the SQL server are: Reliable Fault tolerant Centralized control Concurrent Sophisticated lockingThe SQL Server 2003 relational database engine is an RDBMS that manages and stores data in relational tables. Each table represents some object of interest, such as customers, employees, or products.The relational database engine is designed to store detailed records of transactions generated by online transaction processing (OLTP) systems, as well as handle the online analytical processing (OLAP) requirements of data warehouses. The relational database engine is responsible for maintaining data security, providing fault tolerance, dynamically optimizing performance, using locking to provide concurrency, and ensuring data reliability.

Figure: The SQL Server 2003 environment.2.9.5 Key Features: Rich XML support. Web enabled analysis. Web access to data. Application hosting. Click stream analysis. Full text search. Security. High availability. Scalability. Distributed portioned views. Indexed views. Virtual system area LAN. Replication. Simplified database administration. Extend application. English query. Data mining. Analysis services. Closed loop analysis. OLAP flexibility.SQL Server 2003 is a comprehensive database software platform providing enterprise-class data management and integrated business intelligence (BI) tools. The SQL Server 2003 database engine provides more secure, reliable storage for a relational database format or XML. By supporting both a relational database format and XML, the SQL Server 2005 database engine provides the flexibility necessary to support the way you work. It also enables you to build and manage highly available, well-performing database software applications that you and your people can use to take your business to the next level.

2.9.6 SQL Server Enterprise Manager:SQL Server Enterprise Manager allows for easy enterprise-wide configuration and management of SQL and SQL Server objects. SQL Server Enterprise Manager powerful scheduling engine, administrator alert capability, and a built-in replication management interface. You can also SQL Enterprise to: Manage logins, permissions, and users. Create scripts. Manage backup devices and databases. Back up databases and transaction logs. Manage tables, views, stored procedures, triggers, indexes. Create full-text indexes, database diagrams, and database. Import and export data. By default, SQL Server Enterprise Manager is installed by SQL Server Setup as part of the server software on computers running Microsoft Windows and as part of the client soft on computers running Windows NT and MicrosoftWindows95/98. Because SQL Server Enterprise Manager is a 32-bit application, it cannot be installed on computers running 16-bit operating systems.2.9.7 SQL SERVER ARCHITECTURE:-Microsoft SQL Server is a Structured Query Language (SQL) based, client/server relational database. Each of these terms describes a fundamental part of the architecture of SQL Server. Database: A database is similar to a data file in that it is a storage place for data. Like a data file, a database does not present information directly to a user; the user runs an application that accesses data from the database and presents it to the user in an understandable format. A database typically has two components: the files holding the physical database and the database management system (DBMS) software that applications use to access data. The DBMS is responsible for enforcing the database structure, including: Maintaining the relationships between data in the database. Ensuring that data is stored correctly and that the rules defining data relationships are not violated. Recovering all data to a point of known consistency in case of system failures. 2.9.8 Relational Database:There are different ways to organize data in a database but relational databases are one of the most effective. Relational database systems are an application of mathematical set theory to the problem of effectively organizing data. In a relational database, data is collected into tables (called relations in relational theory). When organizing data into tables, you can usually find many different ways to define tables. Relational database theory defines a process, normalization, which ensures that the set of tables you define will organize your data effectively.

2.9.9 STRUCTURED QUERY LANGUAGE (SQL) :-To work with data in a database, you must use a set of commands and statements (language) defined by the DBMS software. There are several different languages that can be used with relational databases; the most common is SQL. Standards for SQL have been defined by both the American National Standards Institute (ANSI) and the International Standards Organization (ISO). Most modern DBMS products support the Entry Level of SQL-92, the latest SQL standard (published in 1992) SQL Server Enterprise Manager.SQL Server Enterprise Manager allows for easy enterprise-wide configuration and management of SQL and SQL Server objects. SQL Server Enterprise Manager powerful scheduling engine, administrator alert capability, and a built-in replication management interface. You can also SQL Enterprise to: Manage logins, permissions, and users. Create scripts. Manage backup devices and databases. Back up databases and transaction logs. Manage tables, views, stored procedures, triggers, indexes. By default, SQL Server Enterprise Manager is installed by SQL Server Setup as part of the server software on computers running Microsoft Windows and as part of the client software on computers running Windows NT and MicrosoftWindows95/98. Because SQL Server Enterprise Manager is a 32-bit application, it cannot be installed on computers running 16-bit operating systems. 2.10 INTRODUCTION OF C#:C#(C Sharp) is a new computer programming language developed by Microsoft Corporation, USA.C# is fully object oriented language like java and is the first component-oriented language. It has been designed to support the key features of .Net Framework, the new development platform of Microsoft for building component based software solution. It is simple, efficient, productive and type-safe language derived from the popular c and C++ languages.Although it belongs to the family of C/C++,it is purely object oriented, modern language suitable for developing web-based applications. C# is designed for building robust, reliable and durable components to handle real-world applications. The main objectives of C# are:- It is a brand new language derived from the C/C++ family. It simplifies and modernizes C++. It is the only componentoriented language available today. It is the only language designed for the .Net framework. It is concise, lean and modern language. It has a lean and consistent syntax. It is intrinsically object oriented and web enabled. Major parts of .Net Framework are actually coded in C#. It combines the best features of many commonly used languages: the productivity of visual Basic, the power of C++ and the elegance of java. It embodies todays concern of simplicity. It is component oriented language available today. The .Net platform and its technologies developed by Microsoft will enable such co-operation among web sites. C# is expected to play a major role in developing applications on co-operating networks of websites. C# is suitable language for .Net Framework. .Net is simply the Microsofts vision of Software as a service. Like Java# is a descendent of C++ which in turn is a descendent of C.C# borrows java features such as grouping of classes, interfaces and implementation together in one file so that programmer can edit the code more easily# also handles objects using references, the same way as java.3. PROBLEM FORMULATION:Formulation of web based system and applications represents a sequence of web engineering action that begins with the identification of business needs, moves into description of web app objectives, defines major features and functions and perform requirement gathering that leads to the development of an analysis model. Formulation focuses on the big picture on business needs and objectives and related information.3.1 PROBLEM DEFINITION:Before doing any step of software development as Analysis, Design, testing and implementation, there is a need of first defining a problem. One must know what the problem is before it can be solved. The basis for a candidate system is recognition of need for improving an information system or procedure. This is the first step in an initial investigation to define the problem that led user request. The problem must be clearly understood and agreed upon by the user and the analyst. It must state the objectives the user is trying to achieve and the result the user wants to see. Emphasis should be on logical requirements of the problem rather than the physical requirements.Among the most fundamental principles of software engineering is: Understand the problem before you begin to solve it, and be sure that the solution you conceive is one that people really want. Another fundamental software engineering principle is: plan the work before you begin performing it. This problem definition is helpful in Requirement Analysis. The goal of this activity is to understand the requirement of new system to be developed. Understanding the properties of new system that does not exist is more difficult and requires creatives thinking. The problem is more complex because an automated system offers possibilities that do not exist otherwise. Consequently, even the client may not really know the needs of the system. The analyst has to make the client aware of the new possibilities, thus helping both client and analyst determines the requirements for the new system. Solving a problem without a clear knowledge of its components may turn out to be a futile exercise. So a problem statement has to be prepared which explains every minute detail of the problem beyond doubt. 3.2 GENERAL DESCRIPTION:The General Description describes all the information related to this project. It describe the main motivation for the web app, the objective that web app must fulfill and who will use the web app.3.3 USER PROBLEM STATEMENT:This statement describes the problem definition of the proposed system. The problem definition of the Online movie tickets is to book Ticket online (means to book ticket at anyplace)never stand in long queue. It is a Web Based Application to develop website in which end user interact with the web application easily. In this analyst communicate with customer and get more information to make project more manageable. Sometimes customer do not know the exact requirement they want, in this case analyst suggest requirement that to be include in proposed system. In problem statement customer define the following things: The Overall objective of the web application. The users background and sophistication relative to the content and functionality of the web application. It define how will the user arrive at the web application. It defines the user category that will use the application. That will be user friendly. That will restrict the user from accessing other users data.3.4 USER OBJECTIVES AND GOALS:The objectives of the proposed system is a description of web application objectives, defines major features and functions. Formulation allows stakeholders and the web engineering team to establish a common set of goals and objectives for the construction of the web application. It also identifies the scope of the development effort and provides a means for determining a successful outcome. The objective of online movie tickets is to Book Ticket online. To Develop a web Based System, advancement over a computer Based System. The main objective of online movie tickets to provide more facility to customer, easily accessible over the web. The following statement describes the main motivation for the web application:Online movie tickets will allow customer to Book Suitable Air Ticket at anyplace never stand in long queue.In General, Web Application identified the two categories of Goals: Informational Goals-Indicate and intention to provide specific content and information for the end user. Applicative Goals-Indicate the ability to perform some task within the web application.In the context of this, one Informational Goal of Online movie tickets: The site will provide users with a suitable movies information, Fair information, and seat information to Book Air Ticket. The one Applicative Goal of Online movie tickets: This site will query the user about the movies that customer want to take and give suitable movies information.

4. EXISTING SYSTEM:Existing System helps developer in collecting information; he/she can examine what is needed in proposed system, what is the Demerit in existing system and why we need a new system. Formulation begins with customer communication that addresses the reasons for the web application-what is business need ,which end user are targeted, what features and functions are desired, what existing system and Databases are to be accessed. The present system is totally manual. Retrieving the information of a particular trainee increases the possibilities of errors. Moreover processes like searching and tracking the records takes too much time also generating reports needs lots of formatting and labor each time for individual trainee.4.1 LIMITATION OF EXISTING SYSTEM:-The Existing System is a computer based system, in which database place at one location which is not accessible outside is. And the customer has to go to booking Office and book Ticket, and there is so much wastage of time for customer. To provide more facility and to overcome time problem there is a need of new system arise. The limitation of Existing System, the customer who wants to Book movies have to go to Booking office and waits a long time and stand in a queue so there is need of new System arise. In Existing System, there is so much wastage of time for customer. It is very costly. Searching the information of particular movies is tedious task.4.2 PROPOSED SYSTEM :-Proposed system is a system which is computerized in every manner. These systems are not just fulfilling requirements but they are capable of doing such complex, tedious and cumbersome tasks. Accessing of data by hand is satisfactory only when the amount of data to processed is small and also the manual data processing is how, monotonous & often subject to error. The need of proposed system arises to overcome the limitation of existing system.4.3 FEATURES OF PROPOSED SYSTEM:The feature of online movie tickets to overcome the limitation of computer based system. It has to fulfill all customer requirements. In this proposed system customer do not have to wait long time and he/she can book Ticket immediately. There are following features in a proposed system:- It solves the time problem and customer doesnt have to wait long time. This System Book Ticket immediately. It provides login/logout facility. It provides signup facility, to become a member. It is Real client/server environment reachable all over the world. Administrator can add infinite number of movies information. Administrator can able to delete, update movies information. Customer can able to search movies that he/she looking Customer can able to book movies & get ticket easily. This system is easy to use no more training require.4.4 BENEFITS OF PROPOSED SYSTEM:There is a lot of benefits of new proposed system which overcome the problem of existing system. Our system is Online movie tickets which is improvement over computer based system. The Benefits of our System: In this customer dont have to wait long time to Book Ticket. There is no need of large staff to manage this; the whole data is managed in tables. The customer who wants to book Movie ticket, search for movies from origin to destination and to book suitable movies he/she want. It provides signup facility, to become a member. Real client/server environment reachable all over the world. Administrator can add infinite number of movies information. Administrator can able to delete, update movies information. Customer can able to search movies that he/she looking. Customer can able to book movies & get ticket easily. This system is easy to use no more training require. Security measures so those only users with privileges can access the admin Module.4.5 FEASIBILITY STUDY:An initial investigation culminates in a proposal that determines whether a alternative system is feasible. When approved, the proposal initiates a feasibility study that describes and evaluates candidate system and provides for the selection of the best system that meets performance requirements. To do feasibility study, we need to consider the economic, technical and behavioral factors in system development. Many feasibility studies are disillusioning for both users and analysts. First, the study often presupposes that when the feasibility document is being prepared, the analyst is in a position to evaluate solutions. Second, most studies tend to overlook the confusion inherent in system development. The feasibility study is to serve as decision document; it must answer three key questions: Is there a new and better way to do the job that will benefit the user? What are the cost and savings of the alternatives? What is recommended?A feasibility study is defined as an evaluation or analysis of the potential impact of a proposed project. A feasibility study is conducted to assist decision makers in or determining whether or not to implement a particular project program. It is performed to describe and evaluate candidate system and to provide for the selection of best system that meets system performance requirement.During the course of completion of this project work the complete analysis of the proposed system was done. In the analyzing task a complete care about the feasibility of the proposed system was taken. The following feasibility analysis was carried during the course of this project work on Online movie tickets: Economic Feasibility. Technical feasibility. Operational feasibility.4.5.1 ECONOMIC FEASIBILITY:The cost involved in designing and implementation of the proposed system is as follows: Analysis and Design Cost: The cost of analysis & designing can be worked out by calculating the number of human days spend on the analysis and designing of the project and then multiplying the number of days with the cost of human day. Programming Cost: The cost is also calculated by calculating the number of human days spends on the coding of the project and then multiplying the number of the days with the cost of human day. Stationary and Miscellaneous Expenses: The cost of computer stationary is less than the cost of other not computer based stationary.4.5.2 TECHNICAL FEASIBILITY:The existing hardware and software facilities support the proposed system. Computers and storage media are available and the software can be developed. Basic technical requirement of the system and all aspects that the existing system facilities. Hardware: Theres need of Pentium machines with windows 2000 Server and printer for reports. Manpower: The technical and non-technical staff required to implementing this system. 4.5.3 OPERATIONAL FEASIBILITY:The present system is operationally feasible, as it has become easy to have details regarding which user has logged on the system and time of login, time of logon, and what information is transferred.The above details regarding the feasibility study show that the design of proposed system is very effective.5. SYSTEM ANALYSIS:

5.1 INTRODUCTION:Analysis is the process of understanding the existing system by gathering and interpreting the facts, diagnosing the problems. It is not just to determining the how best to solve the manual system problems, it should also work for the system observes the feasibility of system then design, coding phases will be executed. Analysis phase delivers requirements specification .The system specification serves as an interface between the designer and developer as well as between developers and users. This describes the external behavior of the software without bothering about the internal implementation. Specification must be carefully checked for suitability, omission, inconsistencies and ambiguities.The basic aim of problem analysis is to obtain a clear understanding of the needs of the clients and the users. Analysis involves interviewing the clients and end users. These people and the existing document about the current mode of operation are the basic source of information for the analyst. The process of obtaining answers to the questions that might arise in an analysts mind continues until the analyst feels that all the information has been obtained.Analysts not just collect and organize the information but they also act as consultants who play an active role of helping the clients and users to identify their need. Due to this, analysts thoroughly understand the problem domain and purpose of automation. During analysis following issues must be kept in mind: - Obtain the necessary information for solving the problem. Gathered information must be properly organized. Resolving contradiction that may exist in the information gathered.In the analysis phase, we apply the divide and conquer technique. That is, decompose the problem into sub problems and its relationship to another sub problem in an effort to understand the whole problem. Generally, during analysis, partitioning is done with respect to objects/functions. Here we apply it according to function. A function is a task, service, process, mathematical function or activity that is now being performed by the system that will be built to solve the real problem.There are three basic approaches to problem analysis: Informal approach Modeling based approach PrototypingThe informal approach doesnt use any methodology for problem analysis. The analyst relies on his experience and uses questionnaires, forms, interviews etc. to elicit the information about the problem.In modeling-based approach, a formal model is built for problem solving. This approach uses the principle of partitioning for building the model.In prototyping, the problem is analyzed and requirements are understood through the feedback from the users working on a prototype system.In the project Online movie ticket, we use the modeling-based approach for the analysis of problem. According to this approach, we break the whole working in different modules, such as, generating registering a member, Search for movies, Book movies, and Display movies list. Modeling approach generates the structure representing some aspect of problem. The structured analysis method helps the analyst to decide at which time and what type of information is needed for the analysis. It is a top-down approach, which was originally called structured analysis.Problem analysis is performed to get a clear understanding of the needs of the clients and the users and what exactly is desired from the software. Analysis leads to the actual specification. During the process of analysis, a massive amount of information is collected in the form of interviews, questionnaires, and information from documentation, and so forth. The major problem during analysis is resolving how to organize the information from documentation. So the information can be effectively evaluated for completeness and consistency.5.2 USER REQUIREMENTS:The user requirements should define the fundamental actions that must take place in the software in accepting and processing the inputs and in processing and generating the outputs. In our web application Online movie tickets the requirement is to satisfy customer to book Ticket. Customer can search movies and can book suitable movies that he/she want. The client of this system want this system should be very attractive and it interacts more easily with customer. It stated following features that are available in this system:Functions that is available to customer: Registered for an account. Login/Logout. Check password if forgot. Search movies. Update movies Information. Submit movies Information. Book particular movies. Take ticket.Functions that is available to Admin: Add new movies information. Update movies Information. Delete movies Information. Check customer information who registered. Add new employee information. Update/Delete movies Information.

Entities that is available in this system: Customer. Administrator. Movies. Book movies. Ticket.5.2 THE USER HIERARCHY:The categories of end user who will interact with the web application are identified as part of the formulation and requirement gathering tasks. In most cases, user categories are relatively limited and a UML representation of them is unnecessary. However, when the number of user category grows, it is sometimes advisable to develop a user hierarchy. In Online movie tickets there are three types of users who can interact with this web application. The following figure shows the user who can interact with the web application:

Online movie tickets Users Guest Registered staff Customer service

User New Existing Customer Customer

Guest: A guest is a user who visits the site but does not register. Such user often searching for general information. Registered User: A registered user takes time to provide contact information. There are two categories of user:1. New Customer:-A registered who wants to customize and then book movies.2. Existing Customer:-A user who already registered in Online movie tickets. Customer Service Staff: These are special users who can also interact with online movie tickets.After the user hierarchy developing use case diagram .Use cases are developed for each user category described in user hierarchy .In the context of web engineering, the use cases itself is relatively informal-a narrative paragraph that describes a specific interaction between a user and the web application. A use case diagrams are created for created for each user category; a top level view of externally observable web application requirements is developed. Use cases are organized in to functional packages. Each package is assessed to ensure that: Comprehensible: The entire stakeholder understands the purpose of the package. Cohesive: The package addresses functions that are closely related to one another. Loosely coupled: Functions or classes within the package collaborate with one another, but collaboration outside the package is kept to a minimum.

5.3 ANALYSIS MODEL:A web application analysis model is driven by information contained within the use-cases that have been developed for the application. Use cases descriptions are parsed to identify potential analysis classes and the operations and attributes associated with each class. content to be presented by the web application are identified and functions to be performed are extracted from the use case description. Finally, Implementation specific requirement should be developed so that the environment and infrastructure that support the web application can be built. Four Analysis activities each contributing to the creation of a complete analysis model is: Content Analysis: This Analysis activity identifies the full spectrum of content to be provided by the web application. Content includes text, graphics and images and video and audio data. The content Model contains structural elements that provide an important view of content requirements for a web application. Interaction Analysis:It describes the manner in which the user interacts with the web application. The interaction model is composed of four elements: Use cases, Sequence Diagrams, State Diagrams and a user interface prototype. Functional Analysis:It defines the operation that will be applied to web application content and describes other processing functions that are independent of content but necessary to the end user. The functional model addresses two processing elements of the web application, each representing a different level of procedural abstraction: User observable functionality that is delivered by the web application to end users and the operations contained within analysis classes that implement behavior associated with classes.

Configuration Analysis: It describes the environment and infrastructure in which the web application resides.5.4 SYSTEM REQUIREMENT: 5.4.1 HARDWARE REQUIREMENTS: This system is developed on the following hardware configuration. Pentium III processor. 504 MB RAM. Hard disk 69.2 GB. Microsoft Compatible 101 or more Key Board. Scroll Mouse.5.4.2 SOFTWARE REQUIREMENTS:This system is developed using the following software. Operating System: Windows XP Professional Service Pack 2 with Internet Information Server. Technology: ASP.NET. Data Access Component: ADO.NET. Back End: MS SQL Server 2000. Front End: Microsoft ASP.NET 3.5 with C#.5.5 PERFORMANCE REQUIREMENTS: Every query should generate results in maximum 30 seconds. When user press the save button TC number should be automatically generate. Every report should be generated in maximum 30 seconds. User interaction with keyboard should be minimum. To avoid the wrong entries a message should be display.

5.6 E-R Diagram:In this model objects of similar structures are collected into an entity set. The relationship between entity sets is represented by a named E-R relationship and is 1:1(one to one), 1: N (one to many) or M: N (many to many) mapping from one entity set to another. The database structures, employing the E-R model is usually shown pictorially using entity relationship (E-R) diagrams. The E-R diagram is useful in representing the relationship among entities. The following terms used in E-R Diagram:- Entity: An entity is a person, place, thing, event or concept about which information is recorded. Attribute: Attribute gives the characteristic of the entity. In other words, every entity has some basic attribute that characterize it. Entity Type: An entity type is defined as a collection of entities that have the same attributes. Relationships: One to many, many to one, many to many and many to one are the relationships are in ER-Diagram.

5.7 Context Diagram:

Online Tickets BookingMovie info.Customer infoReportsMovies & customer infoConfirmed Ticket

5.8 DATA FLOW DIAGRAM (DFD): The DFD represent a System requirement in a graphical form, this led to a modular design. A DFD is also known as bubble chart has the purpose of clarifying system requirements and identifying major transformations that will become programs in system design. so it is the starting point of the design phase that functionally decomposes the requirements specifications down to the lowest level of detail. A DFD consist of a series of bubbled joined by lines. The bubbles represent data transformations and the lines represent data flow in the system.

DFD 1: For customer login.

DFD 2: For admin login.

6. SYSTEM DESIGN:

6.1 OVERVIEW:After the Analysis phase is completed, the System Design phase is started. The Design for web application encompasses technical and non-technical activities. The look and feel of content is developed as part of graphic design, the aesthetic layout of the user interface is created as part of interface design and the technical structure of the web application is modeled as part of architectural and navigational design. In every instance, a design model should be created before construction begins. When design is applied within the context of web engineering, both generic and specific issues must be considered. From generic viewpoint, design results in a model that guides the construction of the web application. 6.2 DESIGN GOALS:The following design goals that are applicable to virtually every web application regardless of application domain, size, or complexity: Simplicity: Although it may seem old-fashioned, the aphorism all things in moderation applies to web application. There is tendency among some designers to provide the end-user with too much-exhaustive content, extreme visuals, intrusive animation, enormous web pages. Consistency:This design goal applies to virtually every element of the design model. Content should be constructed consistently. Graphic design should present a consistent look across all parts of the web application. Architectural Design should establish templates that led to consistent hypermedia structures.

Identity:The aesthetic, interface, and navigational design of a web application must be consistent with the application domain for which it is to be built. The web application architecture will be entirely different interfaces will be constructed to accommodate different categories of users; navigation will be organized to accomplish different objectives. Robustness:Based on the identity that has been established, a web application often makes an implicit promise to a user. The user expects robust content and functions that are relevant to the users need. Navigability:In web application navigation should be simple and consistent. It should also be designed in a manner that is intuitive and predictable. That is, the user should understand how to move about the web application without having to search for navigation links. Visual Appeal:Web application are unquestionably the most visual, the most dynamic, and the most unapologetically aesthetic. Beauty is undoubtedly in the eye of the beholder, but many design characteristics do contribute to visual appeal. Compatibility:A web application will be used in a variety of environment(e.g. different hardware, Internet connection types, operating System, browsers)and must be designed to be compatible with each. 6.3 DESIGN ACTIVITY: In web application there are following Design activity:

Interface Design: It describes the structure and organization of the user interface includes a representation of system layout, a definition of the modes of interaction and a description of navigation mechanisms. Aesthetic Design:This is also called Graphic Design. It describes the look and feel of the web application. Includes color schemes, geometric layout, size, font and placement, the use of graphics and related aesthetic decisions. Content Design:It defines the layout, structure and outline for all content that is presented as part of the web application, establishes the relationships between content object. Navigation Design:It represents the navigational flow between content objects and for all web application functions. Architecture Design:It identifies the overall hypermedia structure for the web application.

6.4 Database Structure:

7. OVERVIEW OF TESTING PROCESS:Testing is a process of executing a program with the intent of finding an error. A good test case is the one that has a probability of finding an as yet undiscovered error. If testing is conducted successfully (according to the objective stated) it will uncover errors in the software. As secondary benefit, testing demonstrates that software function appears to be working according to the specification that performance requirements appear to have been met. In addition data collected as testing is conducted provides a good indication of software reliability and some indication of software quality as a hole.Testing is the set of activities that can be planned in advance and conducted systematically. It is an integral part of program development. It is in this stage, which we check that the program, that has been coded, performs according to the users requirements. The purpose of doing test is not to demonstrate that there are no errors in the program but to detect any bugs that may still exist.In the testing stage, the main aim is to look for errors that unknowingly have been occurred. It is common misconception that the purpose of testing is to prove that a program is working correctly. This is dangerous myth because it can lead insufficient testing, and program with hidden fault. Because the actual result and expected result may differ in the field of reality and it can be hazardous for a program.The importance of software testing and its implications with respect to software quality cannot be over emphasized. Software testing is a crucial element of software quality and represents the ultimate review of specification design and coding.The increasing visibility of software as a system element and the attendant costs associated with a software failure are motivating forces for well planned, thorough testing. It is not unusual for software development organization to expend 40% of total project effort on testing.Testing is the process of exercising software with the intent of finding errors. This fundamental philosophy does not change for web applications. In fact, because web based systems and applications reside on the network and interoperate with many different operating systems, browser, hardware platforms and backroom applications, the search for errors represents a significant challenge for web engineers. The web application testing process begins by focusing on user-visible aspects of the web application and proceeds to tests that exercise technology and infrastructure. Seven testing steps are performed: content, interface, Navigation, component, configuration, Performance and security testing.The testing process for web application engineering begins with test that exercise content and interface functionality that is immediately visible to end users. As testing proceeds, aspects of the design architecture and navigation are exercised. The user may or may not be cognizant of these web application elements. Finally, the focus shifts to tests that exercise technological capabilities that are not always apparent to end user-web application infrastructure and installation issues.7.1 OBJECTIVE OF TESTING:Testing is techniques that uncover error in the web application. There are following objectives of testing: The content model for the web application is reviewed to uncover errors. The interface model is reviewed to ensure that all the use-cases can be accommodated. The design model for the web application is reviewed to uncover navigation errors. The user interface is tested to uncover errors in presentation and navigation mechanics. Selected functional components are unit tested. Performance tests are conducted. The web application is tested by a controlled and monitored population of end-users; the results of their interaction with the system are evaluated for content and navigation errors.

There are seven testing steps that are performed during this webapp: Content Testing:It attempts to uncover errors in content. This testing activity is similar in many respects to copy-editing for a written document. In fact, a large web site might enlist the services of a professional copy editor to uncover typographical errors, grammatical mistakes, errors in content consistency, errors in graphical representations and cross referencing errors. Interface Testing:It exercises interaction mechanisms and validates aesthetic aspects of the user interface. The intent is to uncover errors that result from poorly implemented interaction mechanisms or omissions, inconsistency or ambiguities that have been introduced into the interface inadvertently. Navigation Testing:Navigation Testing applies use-cases, derived as part of the analysis activity, in the design of test cases that exercise each usage scenario against the navigation design. Navigation mechanisms implemented within the interface layout are tested against use-cases to ensure that any errors that impede completion of a use-cases are identified and corrected. Component Testing:It exercises content and functional units within the web application when web application is considered, the concept of the unit changes. The unit of choice within the content architecture is the web page. Each web page encapsulates content, navigation links, and processing elements. A unit within the web application architecture may be defined functional component that provides service directly to an end user or an infrastructure component that enables the web application to perform all of its capabilities. It also called Function Testing.

Security Testing:It incorporates a series of tests designed to exploit vulnerabilities in the web application and its environment. The intent is to demonstrate that a security breach is possible. GUI Testing Input/output Testing:GUI testing is done to ensure the uniform look on feel of the user interface components across the application. All major elements of the graphical interface such as windows, mouse operations etc were validated during GUI testing, various selections were made through mouse and keyboard to ensure that it works both ways. It was tested that appropriate message appear to guide the user through the course of action. It was checked whether all the required outputs are generated and are in the desired and proper format. Also it should serve the purpose for which the application was designed. Integration Testing:Navigation and component testing are used as integration testing. The strategy for integration testing depends on the content and web application architecture that has been chosen. If the content architecture has been designed with a linear, grid, or simple hierarchical structure, it is possible to integrate web pages in much the same way as we integrate modules for conventional software. Thread based testing can be used to integrate the set of web pages required to respond to a user event. Regression Testing is applied to ensure that no side effects occur. Cluster testing integrates a set of collaborating pages. Test cases are derived to uncover errors in the collaborations. Configuration Testing:It attempts to uncover errors that are specific to a particular client or server environment. A cross reference matrix that defines all probable operating systems, browsers, hardware platforms and communication protocols are created. Tests are then conducted to uncover errors associated with each possible configuration. The job of configuration testing is not to exercise only client side; rather it is to test a set of probable client side and server side configuration. Performance Testing:It encompasses a series of tests that are designed to assess 1.how web application response time and reliability are affected by increased user traffic,2.which web application components are responsible for performance degradation and what usage characteristics cause degradation to occur and how performance degradation impacts overall web application objectives and requirements.

8. OVERVIEW OF IMPLEMENTATION:Implementation is the process of having systems personnel check out and put new equipment into use, train users, install the new application and construct any files of data needed to use it. This phase is less creative than system design. Depending on the size of the organization that will be involved in using the application and the risk involved in its use, systems developers may choose to test the operation in only one area of the firm with only one or two persons. Sometimes, they will run both old and new system in parallel way to compare the results. In still other situations, system developers stop using the old system one day and start using the new one the next. The implementation phase is less creative than system design. It is primarily with user training, site preparation and file conversion. When the candidate system is linked to terminals or remote sites, the telecommunication network and test of the network along with system are included under the implementation. During final testing, user acceptance is tested, followed by user training. Depending on the nature of the system, extensive user training may be required. Conversion usually takes place at about the same time the user is being trained. Evaluation of the system is performed to identify its strengths and weaknesses. The actual evaluation can occur along any of the following dimensions: Operational Evaluation: Assessment of the manner in which the system functions, including case of use, response time, overall reliability and level of utilization. Organizational Impact: Identification and measurement of benefits to the organization in such areas as financial concerns, operational efficiency and competitive impact. User Manager Assessment: Evaluation of the attitudes of senior and user manager within the organization, as well as end-users.8.1 IMPLEMENTATION TOOLS: Training of personnel Conversion procedures Post-implementation review or evaluation

8.1.1 Training of personnel:The high quality training is an essential step in systems implementation. Hence to provide the training to personnel they have been provided user manuals. They are asked to read it carefully and same thing try practically on computer if they dont understand anything, can ask without any hesitation. They are asked to enter the data, which is more frequently entered, and print the reports are frequently printed. Users are told about those situations, which he must understand and he should able to handle it. 8.1.2 Conversion Method: The direct conversion method is applied. This method converts from old to the new system abruptly. The old system is used till a planned conversion day. The organization relies fully on the new system. 8.1.3 Evaluation or Post Implantation Review: After the system is implemented and conversion is complete, a review is conducted to determine whether system is meeting expectations and where improvements are needed. A post implementation review measures the systems performance against pre-determined requirements. It determines how well the system continues to meet performance specifications. It also provides information to determine whether major re-design or modification is required. In evaluation system is checked against the pre-determined requirements. All the requirements have been fully attained. Where there was any mistake that had handled through system life cycle. Problem is solved and checked against the original facts.8.2 REVIEW PLAN: For review a team is planned. The Team shall prepare a formal plan around the objectives of the review. An overall plan covers the following areas: Administrator Plan: Review area objectives, operating costs, actual operating performance and benefits. This is an extremely crucial area since it may be possible that over a period of time the system does not meet the initial objectives of the user or objectives get changed as a result of changes in the overall objectives of the organization. The results of the evaluation are documented for future reference. Operating costs and benefits: Under the administration plan, current budget designed manipulate costs and savings of the system will closely reviewed. Personnel Requirements Plan: Review performance objectives and training performance to data. Personnel old performance objectives will be compared with current performance levels and training performance through testing, conducting interviews and other data gathering techniques. Hardware Plan: Review performance specifications. The hardware of the new system will also review. But as we are using existing hardware which full fill the requirement of project. Hence the cost of hardware is not increased. Documentation Review Plan:Review the system development efforts. The reason for review plan is to evaluate the accuracy and completeness of the documentation compiled to date and to its conformity with documentation standards established earlier. 8.3 SYSTEM MAINTENANCE:The last part of system development life cycle is system maintenance, which is actually the implementation of the post-implementation plan. Hence Programmers/ Analyst spend sufficient time for maintaining programs.Hence maintenance will cover a wide range of activities including correcting coding and design errors, updating documentation and test data and upgrading user support. Many activities classified as maintenance actually fall under enhancements. Hence in maintenance of system enhancement also takes place. Therefore in maintenance addition, modification, re-developing of code will take place to support changes in specification.Maintenance is the enigma of system development. It holds the software industry captive, typing up programming resources. Analysts and programmers spend far more time maintaining programs than they do writing them.It basically includes the following activity: Correcting design errors. Correcti


Recommended