ABOUT NIIT
NIIT is a leading Global Talent
Development Corporation, building
skilled manpower pool for global
industry requirements. The company
which was set up in 1981, to help the
nascent IT industry and overcome its
human resource challenges, has today
grown to be amongst world’s leading
talent development companies offering
learning solutions to Individuals,
Enterprises and Institutions.
NIIT’s training solutions in IT, Business Process Outsourcing, Banking, Finance &
Insurance, Executive Management Education, and Communication & Professional Life
Skills, touch 5 million learners every year. NIIT’s expertise in learning content development,
training delivery and education process management make us the most preferred training
partner, worldwide.Research-based Innovation, a key driver at NIIT, has enabled us to
develop programs and curricula that use cutting-edge instructional design methodologies and
training delivery. NIIT’s Individual Learning Solutions include industry-endorsed IT training
programs like GNIIT, Integrated programs for Engineers (NIIT Edgeineers);Infrastructure
Management programs (NIIT Global Net+).
For working professionals, NIIT Imperia, Centre for Advanced Learning, brings Executive
Management Education Programs from premier B-schools in India.
NIIT Institute of Finance Banking & Insurance (IFBI), formed by NIIT with equity
participation from ICICI Bank, offers programs for individuals and for people in corporate
sector in Banking Services, Financial Services and Insurance Services.
NIIT Unique, Centre for Process Excellence, addresses the increasing demand for skilled
workers in the business and technology services industry by providing training.
NIIT’s School Learning Solutions offers IT integration program for schools and has provided
computer – based learning to nearly 7.8 million students in over 9,500 government and
private schools. NIIT eGuru is a comprehensive learning solution for schools. To address the
vast population of underprivileged, school aged children NIIT launched the Hole-in-the-Wall
1
education initiative. Our achievements in the area of Minimally Invasive Education earned
the coveted Digital Opportunity Award by the World Information Technology Services.
NIIT’s Corporate Learning Solutions offers integrated learning solutions, including strategic
consulting, learning design, content development, delivery, technology, assessment and
learning management to Fortune 500 companies, Universities, Technology companies,
Training corporations and Publishing houses. Element K delivers learning solutions for
customers and partners through a tailored combination of catalog learning products,
technology, and services. The offerings include: Hands-on Labs, Instructor-led Courseware,
and Comprehensive E-reference libraries, Technical Journals, and Knowledge Hub. NIIT
together with Element K is now the first and the best choice for comprehensive learning
solutions, worldwide.
SUCCESS ACHIEVEDBYNIIT:
NIIT has been accorded the Business Super brand 2008 status for the second time by the
Super brands Council, US. The first one being for the period 2003-2005.
Ranked as ‘Top Training Company 2008’, by Dataquest magazine, India’s leading ICT
publication group Cyber media.
NIIT, USA has been awarded the Gold for ‘Excellence in E-learning Award’ by Chief
Learning Officer magazine as part of its Learning in Practice Awards, one of the
industry’s highest honors.
NIIT ranked among the ‘Top 20 Companies in the IT Training Industry’ in 2008 by
TainingOutsourcing.com.
NIIT was recognized by UNESCO for innovation in ICT in Education in 2008.
NIIT (HiWEL) has been conferred the coveted ‘Digital Opportunity Award’ by World
Information Technology Services Alliance (WITSA) in 2008.
Ranked amongst ‘India’s Most Trusted Services Brand’ in a survey by India's one of
the leading financial daily- The Economic Times Brand Equity Survey, in 2008.
NIIT is the only Indian Education company from India to be featured in "The BCG 50
Local Dynamos “in 2008.
2
Ranked amongst India’s ‘Most Respected Companies’ in the IT sector in a survey done
by Business World magazine in 2007.
NIIT was ranked as ‘India’s Most Customer Responsive Educational Institution’ as per
Avaya GlobalConnect Customer Responsiveness Awards in 2007 for the third
consecutive year.NIIT was voted as the ‘Most Popular Education Brand’ by College and
University students in China.
3
4
INTRODUCTION TO DEVELOPMENT TOOLS
Project preparation requires following tools:
HTML
PHP
MY SQL SERVER 2008
2.1 HTML
Hyper Text Mark Up Language (HTML) is the main mark-up language for displaying web
pages and other information that can be displayed in a web browser. HTML is written in the
form of HTML elements consisting of tags enclosed in angle brackets, within the web page
content. HTML tags most commonly come in pairs like <h1> and </h1>, although some tags,
known as empty elements, are unpaired. The first tag in a pair is the start tag, the second tag
is the end tag (they are also called opening tags and closing tags). In between these tags web
designers can add text, tags, comments and other types of text-based content. The purpose of
a web browser is to read HTML documents and compose them into visible or audible web
pages. The browser does not display the HTML tags, but uses the tags to interpret the content
of the page.HTML elements form the building blocks of all websites. HTML allows images
and objects to be embedded and can be used to create interactive forms. It provides a means
to create structured documents by denoting structural semantics for text such as headings,
paragraphs, lists, links, quotes and other items. It can embed scripts in languages such
as JavaScript which affect the behaviour of HTML web pages.
HTML Versions
Since the early days of the web, there have been many versions of HTML:
HTML(1991)
HTML+(1993)
HTML 2.0(1995)
HTML 3.2(1997)
XHTML 4.01(1999)
5
HTML 1.0(2000)
HTML 5(2012)
XHTML
2.2 INTRODUCATION TO PHP
PHP is a server-side scripting language designed for web development but also used as a general-purpose programming language. PHP is now installed on more than 244 million websites and 2.1 million web servers. Originally created by Rasmus Lerdorf in 1995, the reference implementation of PHP is now produced by The PHP Group.While PHP originally stood for Personal Home Page, it now stands for PHP: Hypertext Preprocessor, a recursive backronym. PHP code is interpreted by a web server with a PHP processor module, which generates the resulting web page: PHP commands can be embedded directly into an HTML source document rather than calling an external file to process data. It has also evolved to include a command-line interface capability and can be used in standalone graphical applications.PHP is free software released under the PHP License. PHP can be deployed on most web servers and also as a standalone shell on almost every operating system and platform, free of charge.
PHP ADVANTAGES
Exceptionally short learning curve
Quick development time
Very high performance
Supports all major platforms(UNIX,Windows and even mainframes)
Features native support for most popular databases
INTRANET DESIGN MAGAZINE
PHP was built with the needs of web developers in mind….unlike other cumbersome, overhead-laden approaches, PHP is lightweight and focused on the web-where it can solve complex problem scenarios quicker and more easily than comparable technologies.
PHP-ENABLED WEB PAGES Treated just like regular HTML pages and you can create and edit them the same way
you normally create regular HTML pages. As simple as HTML files with a whole new family of magical tags that let you do all
sorts of things.
SIMPLE EXAMPLES:
6
File name: hello.php
<html><head><title>PHPTest</title></head>
<body>
<?php echo “HELLO WORLD”;?>
</body>
</html>
PHP LANGUAGE
Condition statements,Loop statements,Arrays…. Built in libraries.(sorting,list,queue…) Functions. Classes.(object and inheritance.. ) String manipulation. (Perl) Built in support for encryption/decryption functions. (MDF5,DES_
More on PHP language:
Text files manipulation. (Raed,Write,…)
Supports JAVA objects,COM objects …
Session Cookies…
2.3 CSS
Cascading style sheets (CSS) is a style sheet language used for describing the presentation
semantics (the look and formatting) of a document written in a mark-up language. Its most
common application is to style web pages written in HTML and XHTML, but the language
can also be applied to any kind of XML document, including plain
XML, SVG and XUL.CSS is designed primarily to enable the separation of document
content (written in HTML or a similar mark-up language) from document presentation,
including elements such as the layout, colours, and fonts. This separation can improve
content accessibility, provide more flexibility and control in the specification of presentation
characteristics, enable multiple pages to share formatting, and reduce complexity and
repetition in the structural content (such as by allowing for table less web design). CSS can
also allow the same mark-up page to be presented in different styles for different rendering
methods, such as on-screen, in print, by voice (when read out by a speech-based browser
7
or screen reader) and on Braille-based, tactile devices. It can also be used to allow the web
page to display differently depending on the screen size or device on which it is being
viewed. While the author of a document typically links that document to a CSS style sheet,
readers can use a different style sheet, perhaps one on their own computer, to override the one
the author has specified. CSS specifies a priority scheme to determine which style rules apply
if more than one rule matches against a particular element. In this so-called cascade, priorities
or weights are calculated and assigned to rules, so that the results are predictable.
CSS and Text:
Before having the control that CSS gives you over text, you were severely limited in how you
could present your words. Yeah, you could use the <font> tag to change the color and
typeface of the text, but sizing was hampered by the fact that you could only use the pre-
defined font sizes. Other effects like boldness and strike-throughs were possible in only basic
forms through more HTML tags. Now, you have complete control over how your text looks.
TEXT COLOR:
You’ve already seen this being used in the examples in the preceding tutorials, so you should
know it now. To change the color of your text you simply use the property, color, like so:
h2{color:silver;}
a:active {color: #ff0000; }
As in every part of web design, you can specify the color as a HEX code or a named color
value.
CSS and Links
Applying CSS to your links allows you to do all sorts of nice roll-over effects and advanced
text highlighting. You will also be able to have many sets of links on a single page, all with
different formatting.
Basic links
There are four style sheet entities that govern how your links look:
a:link{}
a:visited{}
a:hover{}
a:active {}
8
These four selectors basically cover the old link, vlink and alink <body> attributes, but the
last one allows you to set up text roll-over effects. Your a:hover line comes into play when a
user puts their mouse on a link. The link can change in appearance in many ways, from a
simple color switch to a complete morph into another typeface and size. These effects are
very helpful in showing the reader exactly which link they are pointing at. They look great
too.
The CSS Box Model
The box model is a very important concept, one that you must have right in your head before
you start tackling all this spacing stuff. All HTML block-level elements have five spacing
properties: height, width, margin, border and padding. When discussing these attributes
you'll need a diagram to see what part of the spacing we're talking about. Have a look at the
diagram below and check out the three areas that surround every block-level page
element. Together, they form the box that the element takes up.
CSS and Backgrounds
Once you've set up boxes around all your elements you'll more than likely want to add
backgrounds to them. In this tutorial I'll be going into the properties that give color to your
layouts, and let you control your background images. You will soon be able to control the
background color and image of all your elements.
2.4 ABOUT MYSQL SERVER
What is MYSQLSERVER?
Microsoft SQL Server is a relational database management system developed by Microsoft.
As a database, it is a software product whose primary function is to store and retrieve data as
requested by other software applications, be it those on the same computer or those running
on another computer across a network (including the Internet).
Server Database Systems
Server based database systems are designed to run on a central server, so that multiple users
can access the same data simultaneously. The users normally access the database through an
application.
SQL Server Management Studio (SSMS)
9
SQL Server Management Studio (SSMS) is the main administration console for SQL Server.
SSMS enables you to create database objects (such as databases, tables, views etc.), view the
data within your database; you can configure user accounts, transfer data between databases,
and more.
SQL CREATE DATABASE Syntax:
CREATE DATABASE database_name
The CREATE TABLE Statement
The CREATE TABLE statement is used to create a table in a database.
SQL CREATE TABLE Syntax:
CREATE TABLE table_name
(
column_name1 data_type,
column_name2 data_type,
column_name3 data_type, ....
)
Example:
CREATE TABLE Persons
(
P_Id int,
LastName varchar(255),
FirstName varchar(255),
Address varchar(255),
City varchar(255)
)
The empty "Persons" table will now look like this:
P_Id LastName FirstName Address City
SQL Constraints
Constraints are used to limit the type of data that can go into a table.
Constraints can be specified when a table is created (with the CREATE TABLE statement) or
after the table is created (with the ALTER TABLE statement).
We will focus on the following constraints:
NOT NULL
10
UNIQUE
PRIMARY KEY
CHECK
DEFAULT
SQL NOT NULL Constraint
The NOT NULL constraint enforces a column to NOT accept NULL values.
The following SQL enforces the "P_Id" column and the "LastName" column to not accept
NULL values:
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255)
)
SQL UNIQUE Constraint
The UNIQUE constraint uniquely identifies each record in a database table.
CREATE TABLE Persons
(
P_Id int NOT NULL UNIQUE,
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255)
)
SQL PRIMARY KEY Constraint
The PRIMARY KEY constraint uniquely identifies each record in a database table.
Primary keys must contain unique values.
A primary key column cannot contain NULL values.
CREATE TABLE Persons
(
P_Id int NOT NULL PRIMARY KEY,
LastName varchar(255) NOT NULL,
11
FirstName varchar(255),
Address varchar(255),
City varchar(255)
)
SQL CHECK Constraint
The CHECK constraint is used to limit the value range that can be placed in a column.
CREATE TABLE Persons
(
P_Id int NOT NULL CHECK (P_Id>0),
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255)
)
SQL DEFAULT Constraint
The DEFAULT constraint is used to insert a default value into a column.
CREATE TABLE Persons
(
P_Id int NOT NULL,
LastName varchar(255) NOT NULL,
FirstName varchar(255),
Address varchar(255),
City varchar(255) DEFAULT 'Sandnes'
)
The DROP TABLE Statement
The DROP TABLE statement is used to delete a table.
DROP TABLE table_name
The DROP DATABASE Statement
The DROP DATABASE statement is used to delete a database.
DROP DATABASE database_name
The ALTER TABLE Statement
The ALTER TABLE statement is used to add, delete, or modify columns in an existing table.
SQL ALTER TABLE Syntax
To add a column in a table, use the following syntax:
12
ALTER TABLE table_name
ADD column_name datatype
To delete a column in a table, use the following syntax (notice that some database systems
don't allow deleting a column):
ALTER TABLE table_name
DROP COLUMN column_name
To change the data type of a column in a table, use the following syntax:
ALTER TABLE table_name
ALTER COLUMN column_name datatype
The SQL SELECT Statement
The SELECT statement is used to select data from a database.
The result is stored in a result table, called the result-set.
SQL SELECT Syntax
SELECT column_name,column_name
FROM table_name;
and
SELECT * FROM table_name;
The SQL INSERT INTO Statement
The INSERT INTO statement is used to insert new records in a table.
SQL INSERT INTO Syntax
It is possible to write the INSERT INTO statement in two forms.
The first form does not specify the column names where the data will be inserted, only their
values:
INSERT INTO table_name
VALUES (value1,value2,value3,...);
The second form specifies both the column names and the values to be inserted:
INSERT INTO table_name (column1,column2,column3,...)
VALUES (value1,value2,value3,...);
The SQL UPDATE Statement
The UPDATE statement is used to update existing records in a table.
SQL UPDATE Syntax
UPDATE table_name
SET column1=value1,column2=value2,... WHERE some_column=some_value;
The SQL DELETE Statement
13
The DELETE statement is used to delete rows in a table.
SQL DELETE Syntax
DELETE FROM table_name
WHERE some_column=some_value;
2.5 MAGENTOMagento is an open source e-commerce web application that was launched on March 31, 2008 under the name Bento. Magento is a content management system (CMS) based on PHP and MySQL for web hosting service, which was built using parts of the Zend Framework. It provides full support for object-oriented programming and Model-View-Controller (MVC) architecture. Magento also uses the entity-attribute-value (EAV) database model to store data. It was developed by Varien (now Magento, a division of eBay) with help from the programmers within the open source community but is now owned solely by eBay Inc.
In April 2014, W3Techs estimated that Magento was used by 1.0% of all websites. According to the research conducted by aheadWorks in April, 2014, Magento's share is about 34% among 20 most popular e-commerce platforms. Magento officially started development in early 2007. Seven months later, on August 31, 2007, the first public beta version was released. Varien, the company owning Magento, formerly worked with osCommerce.
They had originally planned to fork osCommerce but later decided to rewrite it as Bento. Due in part to a naming conflict with FileMaker Inc. who had already trademarked the name Bento, Varien and osCommerce renamed Bento to Magento, a mix of Bento and Mage. The term Mage is said to pay homage to the Mage or Wizard of traditional D&D style role playing games.In February 2011, eBay announced it had made an investment in Magento in 2010, worth a 49% ownership share of the company.As of June 6, 2011 eBay owns 100% of Magento. eBay announced that Magento would join eBay's new X.Commerce initiative.[8] Magento's CEO and co-founder Roy Rubin wrote on the Magento blog stating that "Magento will continue to operate out of Los Angeles, with Yoav Kutner and me as its leaders.” Yoav Kutner left Magento in April 2012 citing the vision for Magento has changed since the time of acquisition due to high level staff changes.
2.6 INTRODUCTION TO PROJECT
The website has been developed for the eCommerce venture MyPetPlaza in an effort to make it as attractive and dynamic as possible.The purpose of this website is to provide a friendly interface for customers, make it easy to navigate and at the same time provide sufficient depth and information about products. The website will be a authenticated and the site provides a safe environment of online users. It may fall short of certain requirements and may require some additional functionality if it is to be used for general audience.
Benefits for using the site should include Detailed information about all the products that are being sold by the website
like Timely and upto date information that encourages readers to return to the site.
14
Call to action and plans for students to follow to prepare for of B.Tech, MBA,MCA, Diploma, Pharmacy,M.Tech etc.
Major features of website include the following pages:
News and events Daily activities and updates of college Jobs Placement scenario About us/mission Specifies the aim of institute Our uniqueness Notices alumni
ADVANTAGES
The basic problem faced by the students is inconvenient of visiting college for each and every requirement viz. fee structure, registration, announcements ,bus route. This is very time consuming and this website provide ease of access all the basic information related to the college. So the college website gives flexibility to students so that they can obtained the respective information right from their desk.
AIM
This website is aimed at the smooth functioning of the college management procedure.
A user friendly college site where any kind of information about the college is provided on the single click.
Website is aimed towards students who have completed their higher studies are looking for a college for the further higher studies .
REQUIREMENTS
Hardware :
Hardware Environment (Deployment Server)
PC Apache Tomcat 6.0 Server
Processor Intel Pentium Processor 4, 2.4GHz or above.
15
RAM 1GBRAM
HDD 40 GB
Hardware Environment (End user’s PC)
PC PC (Windows), Apple, Linux
Processor Intel Pentium Processor, 233 MHz or equivalent.
RAM 1 GB RAM
HDD 2GB of free HDD space for Internet Cache
Internet Connection 512K
2. SOFTWARE
Software Environment (Deployment Server)
Operating System All
Other software MS SQL Server 2008, JDK1.6
Net Beans IDE 6.0
Web Server Apache Tomcat 6.0
Software Environment (End User)
Operating System Win 2000 / Win XP, Win 7, Win 8 or higher, Apple, Linux
Browser IE 8.0 and 9.0, Firefox 8.0, Mac Safari5.0, Google Chrome
Software Technologies :-
Frond End
16
PHP
HTML
CSS
Back End
MYSQL
Server Requirements:
Operating System: Linux
Server: Apache
Memory usage: 39.84 MByte
MYSQL Version: 5.1.69
SQL Mode: Not set
PHP Version: 5.3.24
PHP Safe Mode: Off
PHP Allow URL fopen: On
PHP Memory Limit: 256M
PHP Max Upload Size: 8M
PHP Max Post Size: 8M
PHP Max Script Execute Time: 30
PHP Exif support: Yes ( V1.4 )
PHP IPTC support: Yes
PHP XML support: Yes
17
18
3.1 SYSTEM ANALYSIS INTRODUCTION
System analysis is the process of studying the business processors and procedures, generally
referred to as business systems, to see how they can operate and whether improvement is
needed. This may involve examining data movement and storage, machines and technology
used in the system, programs that control the machines, people providing inputs, doing the
processing.
3.1.1 INVESTIGATION PHASE
The investigation phase is also known as the fact-finding stage or the analysis of the current
system. This is a detailed study conducted with the purpose of wanting to fully understand the
existing system and to identify the basic information requirements. Various techniques may
be used in fact-finding and all fact obtained must be recorded. A thorough investigation was
done in every effected aspect when determining whether the proposed system is feasible
enough to be implemented.
3.1.2 CONSTRAINTS AND LIMITATIONS
The constraints and limitation within a system are the drawbacks that occur during the
implementation of the system. These limitations and constraints can crop up in almost every
system; the most important fact is to find a way to overcome these problems.
Software design is the first of three technical activities – design, code generation, and test that
are required to build and verify the software. Each activity transforms information in manner
that ultimately results in validated computer software.
The design task produces a data design, an architectural design, an interface design and
component design. The design of an information system produces the details that clearly
describe how a system will meet the requirements identified during system analysis.
3.2 SOFTWARE REQUIREMENT SPECIFICATION
The software requirement specification is produced at the culmination of the analysis task.
The function and performance allocated to software as part of system engineering are refined
19
by establishing a complete information description, a detailed functional description, a
representation of system behavior, an indication of performance requirement and design
constraints appropriate validation criteria, and other information pertinent to requirement.
The introduction to software requirements specification states the goals and objectives of the
software, describing it in the context of the computer based system. The Information
Description provides a detailed description of the problem that the software must solve.
Information content, flow and structure are documented.
A description of each function required to solve the problem is presented in the Functional
Description. Validation Criteria is probably the most important and ironically the most often
neglected section of the software requirement specification. Software requirement
specification can be used for different p
3.2.1 STATEMENT OF USER NEEDS
The main purpose of the product specification is to define the need of the product’s user.
Sometimes, the specification may be a part of a contract sign between the producer and the
user. It could also form part of the user manuals. A user‘s needs are sometimes not clearly
understood by the developer. If this is the case, a careful analysis – involving much
interaction with the user should be devoted to reaching a clear statement of requirements, in
order to avoid possible misunderstandings. Sometimes, at the beginning of a project, even the
user has no clear idea of what exactly the desired product is. Think for instance of user
interface , a user with no previous experience with computer products may not appreciate the
difference between , say menu driven interaction and a command line interface. Even an
exact formation of system functions and performance may be missing an initial description
produced by an experienced user.
3.3 FEASIBILITY STUDY
A feasibility study is a short, focused study, which aims to answer a number of questions:
-Does the system contribute to the overall objectives of the organizations?
-Can the system be implemented using current technology and within givencost and schedule
constraints?
-Can the system be integrated with systems which are already in place?
20
SYSTEM FEASIBILITY
Prior to stating whether the system we have to develop is feasible or not we believe that we
should emphasize on what is implied by the word “Feasibility”. Feasibility is the measure of
how beneficial or practical the development of the system will be to the organization. It is a
preliminary survey for the systems investigation. It aims to provide information to facilitate a
later in-depth investigation.
3.3.1 TYPES OF FEASIBILITY:
There are various measures of feasibility that helps to decide whether a particular project is
feasibleor not. These measures include :–
1. Operational Feasibility
2. Technical Feasibility
3. Economic Feasibility
3.3.1.1 OPERATIONAL FEASIBILITY
A proposed system is beneficial only if it can be turned into an information system that
will meet the operational requirements of an organization. A system often fails if it does
not fit within existing operations and if users resist the change.
Important issues a systems developer must look into are:
Will the new system be used if implemented in an organization?
Are there any major barriers to implementation or is proposed system accepted
without destructive resistance?
3.3.1.2 TECHNICAL FEASIBILITY
Based on the outline design of the system requirements in terms of inputs, output,
Procedures, the technical issues raised during technical feasibility include:
Does the necessary technology exist to do what is proposed?
Does the proposed equipment have the technical capacity to hold the data required to
use in the new system?
Adequate responses provided by the proposed system?
Is the system flexible enough to facilitate expansion?
Is there any technical guarantee of accuracy, reliability, ease of access and data
21
security?
Is the project feasibility within the limits of current technology?
Does the technology exist at all?
Is it available within given resource constraints (i.e., budget, schedule)?
The system developer’s task is to view needed capabilities in light of currently available
technology. Our site works hand in hand with high technology. A database has to be
maintained in order to update and backup data whenever required. To create databases we use
SQL server. After taking the above facts into consideration we can state that the new
proposed system technicallyfeasible.
3.3.1.3 ECONOMICAL FEASIBILITYIn making recommendations a study of the economics of the proposed system should be
made. Even though finding out the costs of the proposed project is difficult we assume and
estimate the costs and benefits as follows. According to the computerized system we propose,
the costs can be broken down in two categories.
Costs associated with the development of the system.
Costs associated with operating the system.
22
4.1 SYSTEM DESIGN
System design is the process of developing specifications for a candidate system that meet the
criteria established in the system analysis. Major step in system design is the preparation of
the input forms and the output reports in a form applicable to the user.
The main objective of the system design is to make the system user friendly. System design
involves various stages as:
Data Entry
Data Correction
Data Deletion
Processing
Report GenerationSystems design is the creative act of invention, developing new
inputs, a database, offline files, procedures and output for processing business to
23
meet an organization objective. System design builds information gathered during
the system analysis
4.1.1 CHARACTERISTICS OF A WELL DEFINED SYSTEM
In design an efficient and effective system is of great importance to consider the human
factor and equipment that these will require to use. System analyst must evaluate the
capabilities and limitations of the personal and corresponding factors of the equipment itself.
The characteristics associated with effective system operations are:
Accessibility
Decision Making Ability
Economy
Flexibility
Reliability
Simplicity
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
4.4 DATA FLOW DIAGRAMS (DFD)
42
To construct DFD’s we use following Notations: -
An arrow identifies Data flow
Circle stands for aProcess that converts data into information.
Bubble
It represents a source or sinks of system data
Rectangle
It represents data store.
Open rectangle
In the late 1970s data-flow diagrams (DFDs) were introduced and popularized for
structured analysis and design (Gane and Sarson 1979). DFDs show the flow of data
from external entities into the system, showed how the data moved from one process
to another, as well as its logical storage.
There are only four symbols:
Squares representing external entities, which are sources or destinations of data.
43
Rounded rectangles representing processes, which take data as input, do something to
it, and output it.
Arrows representing the data flows, which can either, be electronic data or physical
items.
Open-ended rectangles representing data stores, including electronic stores such as
databases or XML files and physical stores such as or filing cabinets or stacks of
paper.
There are several common modeling rules that I follow when creating DFDs:
All processes must have at least one data flow in and one data flow out.
All processes should modify the incoming data, producing new forms of outgoing
data.
Each data store must be involved with at least one data flow.
Each external entity must be involved with at least one data flow.
A data flow must be attached to at least one process.
44
LEVEL 0
45
LEVEL 1
46
4.5 ER DIAGRAMS
47
4.6 CODING
48
<li><a href="tech dept.html"
target="_self">Departments</a></li>
49
1 TESTING
5.1.1 INTRODUCTION
The testing activities are done in all phases of the lifecycle in an iterative software
development approach. However, the emphasis on testing activities varies in different phases.
This procedure explains the focus of testing in inception, elaboration, construction and
transition phases. In the inception phase most of requirements capturing is done and the test
plan is developed. In elaboration phase most of design is developed, and test cases are
developed. Construction phase mainly focuses on development of components and units, and
unit testing is the focus in this phase. Transition phase is about deploying software in the user
community and most of the system testing and acceptance testing is done in this phase.
The purpose of system testing is to identify and correct errors in the candidate system.
Testing is an important element of software quality assurance and represents the ultimate
review of specification, design and coding. The increasing visibility of the software as a
system element and the cost associated with a software failure are motivated forces for well
planned , through testing.
Testing presents an interesting challenge for the software engineers attempt to build software
from an abstract concept to an acceptable implementation in testing. Engineer creates a series
of test case that occurs when errors are uncovered. Testing is the process of executing a
program for finding errors. A good test is one that has high probability of finding an
uncovered error.
A successful error is one that uncovers undiscovered errors.
The term error is used to refer the difference between actual output of the software and the
current output . Fault is a condition that causes the software to fail to perform is required
function.
50
Software reliability is define required function. Software reliability is defined as a
probability that the software well not undergoes failures for a specified time under specified
condition . Failure is the inability of a system or a component to perform a required according
it its specification . Different levels of testing were implied for software to make it error free,
fault free and reliable.
5.1.2 PURPOSE OF TESTINGThe main purposes of this procedure are:
To carry out comprehensive testing of the system/product and its individual
components in order to ensure that the developed system/product conforms to the user
requirements/design.
To verify the proper integration of all components of the software.
To verify that all requirements have been correctly implemented.
To identify and ensure defects are addressed prior to the deployment of the software.
5.1.3 TEST PLANNINGInitial test plan addresses system test planning, and over the elaboration, construction and
transition phases this plan is updated to cater other testing requirements of these phases, like,
unit & integration testing. The test Plan must contain the following:
Scope of testing
Methodology to be used for testing
Types of tests to be carried out
Resource & system requirements
A tentative Test Schedule
Identification of various forms to be used to record test cases and test results
The Test Plan is reviewed as per the Review Procedure as defined by the Project
Manager. Adequate Review Records are maintained.
5.1.4 PREPARATION OF TEST CASESTest cases describe the details of every test for each feature of the module. The inputs for
preparation of test cases are the software requirement specifications and/or Design
document/model. System test cases are prepared in elaboration phase, and initial integration
test cases are prepared which are refined and completed in construction phase. These test
51
cases are reviewed as per Review Procedure as defined by the Project Manager and adequate
review records are maintained. These reviews are done against requirements and Design to
ensure adequacy and completeness.
The expected results are specified in test cases, against test to be carried out.
One of the test cases made for the Registration module is shown next.
4.1.5 PREPARATION OF ACCEPTANCE PLANAn Acceptance Plan is prepared and handed over to the customer. However it is at the
discretion of the Project Manager to decide when to prepare the Acceptance Plan but the
Project Manager should ensure that it is at least prepared before the completion of
construction phase.
This Plan helps the customer in planning, scheduling and providing resources to
carry out the customer acceptance testing. The acceptance testing is done during deployment.
The Acceptance plan must consist of:
-A suggested schedule for Acceptance Testing by the customer.
-Hardware, Software and other resources required for Acceptance Testing.
-Confirmation of Acceptance criteria.
The Acceptance Plan is reviewed as defined in PHP based on the Review Procedure and the
review records are maintained properly.
5.1.5.1 UNIT TESTINGUnit testing is conducted first .Different modules of the software are tested against the
specification produced during design of the modules. Verification of the code produced
during the coding phase is done. Unit testing comprises the set of tests performed by an
individual programmer prior to integration of the unit into a large system.
5.1.5.2 INTEGRATION TESTINGThe system integrator compiles and links the system in increments. Each increment needs to
go through testing of the functionality that has been added, as well as all tests the previous
builds went through (regression tests). Within iteration,integration testing is executed several
times until the whole system has been successfully integrated.
52
Testing is done as per the Test Plan for the project. A Testing Team who may be an
independent team or may include members of the project team carries out the tests.
5.1.5.3 SYSTEM TESTINGSystem testing is initiated through a System release and a Release Note from Development
team to the testing team. The purpose of the System Testing is to ensure that the complete
system functions are intended. The system roles in PMP compile and link the system in
increments.
System Testing is similar to the Integration testing except that it is
run under customer environment or in an environment as similar as to the customer
environment, as possible. During the System testing the performance criteria is tested and
factors like stress, transaction timing, volume of data, transaction frequency etc. are
validated. The ability of the Software to be installed in an environment likely to be
encountered at the site of the customer is also checked here.
System testing of the software is performed against base lined software and
the base lined documentation of the customer requirements and the software requirements
specification documentation.
After System Testing, efforts should be made to conduct other types of testing such as:
Stress Testing/Volume Testing (testing the performance etc.) Security testing (testing the
system against security measures e.g. password, etc.) Recovery testing (the recovery
techniques, in case the system crashes) Regression testing (to ensure that changes have not
caused unintended effects on the baseline).
Once the system is adequately tested, the software is handed over to the customer.
5.2 TYPES OF TESTING:-
5.2.1 UNIT TESTINGIn unit testing different modules are tested against the specification produced during design
for the modules. Unit testing is for verification of the code produced during the coding phase,
and hence the goal is to test the internal logic of the modules.
5.2.2 INTEGRATION TESTING
53
In this, many units tested modules are combined into subsystems, which are then tested. The
goal here is to see if the modules can be integrated properly. Hence, the emphasis is on
testing interfaces between modules. This testing activity can be considered testing the design.
5.2.3 PRE-ACCEPTANCE TESTINGAcceptance testing is running the system with live data by the actual. It is performed with
realistic data of the client to demonstrate that the software is working satisfactorily.
5.2.4 REGRESSION TESTINGIt is performed when some changes are made up to an existing system. A change is made to
upgrade the software by adding new features and functionality. The modified software needs
to
be testing to make sure that new features to be added do indeed work. Besides ensuring the
desired behavior of the new services, testing has to sure that the desired behavior of the old
services is maintained. This is task of regression testing.
5.2.5 VALIDATION TESTINGUser input must be validated to conform to expected values. For example, if the software
program is requesting input on the price of an item, and is expecting a value such as 3.99, the
software must check to make sure all invalid cases are handled. A user could enter the price
as “-1” and achieve results contrary to the design of the program. Other examples of entries
that be entered and cause a failure in the software include: “1.20.35”, “Abc”, “0.000001”, and
“999999999”. These are possible test scenarios that should be entered for each point of user
input. Typically when invalid user input occurs, the program will either correct it
automatically, or display a message to the user that their input needs to be corrected before
proceeding.
5.2.6 STRESS TESTINGIn software testing, stress testing refers to tests that determine the robustness of software by
testing beyond the limits of normal operation. Stress testing is particularly important for
“mission critical” software, but is used for all types of software. Stress tests commonly put a
greater emphasis on robustness, availability, and error handling under a heavy load, than on
what would be considered correct behavior under normal circumstances.
54
Reasons for stress testing include:
The software being tested is “mission critical”, that is, failure of the software (such as a
crash) would have disastrous consequences.
The amount of time and resources dedicated to testing is usually not sufficient, with
traditional testing methods, to test all of the situations in which the software will be used
when it is released.
Even with sufficient time and resources for writing tests, it may not be possible to
determine beforehand all of the different ways in which the software will be used. This
particularly true for operating systems and middleware, which will eventually be used by
software that doesn’t even exist at the time of the testing.
Customers may use the software on computers that have significantly fewer
computational resources (such as memory or disk space) than the computers used for
testing.
Concurrency is particularly difficult to test with traditional testing methods.
Stress testing may be necessary to find race conditions and deadlocks.
Software such as web servers that will be accessible over the Internet may be subject to
denial of service attacks.
Under normal conditions, certain types of bugs, such as memory leaks, can be fairly begin
and difficult to detect over the short periods of time in which testing is performed.
However, these bugs can still be potentially serious. In a sense, stress testing for a
relatively short period of time can be seen as simulating normal operation for a longer
period of time.
5.4.7 PERFORMANCE TESTINGIn software engineering, performance testing is testing that is performed, from one
perspective, to determine how fast some aspect of a system performs under a particular
workload. It can also serve to validate and verify other quality attributes of the system, such
as scalability and reliability. Performance testing can serve different purposes. It can
demonstrate that the system meets performance criteria. It can compare two systems to find
which performs better.
It can measure what parts of the system or workload cause the system to perform badly. In
the diagnostic case, software engineers use tools such as profilers to measure what parts of a
55
device or software contribute most to the poor performance or to establish throughput levels
(and thresholds) for maintained acceptable response time. It is critical to the cost performance
of a new system that performance test efforts begin at the inception of the development
project and extend through to deployment. The later a performance defect is detected, the
higher the cost of remediation. This is true in the case of functional testing, but even more so
with performance testing, due to the end-to-end nature of its scope. In performance testing, it
is often crucial (and often difficult to arrange) for the test conditions to be similar to the
expected actual use. This is, however, not entirely possible in actual practice.
5.3 IMPLEMENTATION
Implementation is the stage in the project where the theoretical design is turned into the
working system and is giving confidence to the new system for the users i.e. will work
efficiently and effectively. It involves careful planning, investigation of the current system
and its constraints on implementation, design of method to achieve the changeover, an
evaluation, of change over methods. A part from planning major task of preparing the
implementation is education of users. The more complex system is implemented, the more
involved will be the system analysis and design effort required just for implementation. An
implementation coordinating committee based on policies of individual organization has been
appointed. The implementation process begins with preparing a plan for the implementation
for the system. According to this plan, the activities are to be carried out, discussions may
regarding the equipment has to be acquired to implement the new system.
Implementation is the final and important phase. The most critical stage is
in achieving a successful new system and in giving the users confidence that the new system
will work and be effective. The system can be implemented only after thorough testing is
done and if it found to working according to the specification. This method also offers the
greatest security since the old system can take over if the errors are found or inability to
handle certain types of transaction while using the new system.
The major elements of implementation plan are test plan,
training plan, equipment installation plan, and a conversion plan.
There are three types of implementation:
56
Implementation of a computer system to replace a manual system.
Implementation of a new computer system to replace an existing system.
Implementation of a modified application to replace an existing one, using the same
computer.
Successful implementation may not guarantee improvement in the
organization using the new system, but improper installation will prevent it. It has
been observed that even the best system cannot show good result if the analysts
managing the implementation do not attend to every important detail. This is an area
where the systems analysts need to work with utmost care.
5.4. IMPLEMENTATION TOOLS
Training personnel
Conversion Procedures
Post-implementation review
5.4.1 TRAINING OF PERSONNEL INVOLVED WITH SYSTEM
Even well designed system can succeed or fail because of the way they are operated
and used. Therefore, the quality of training received by the personal involved with the
system in various capacities helps or hinders and may even prevent the successful
implementation of management information system.
5.4.1.1 SYSTEM OPERATORS TRAINING
Running of the system successfully depends on the personnel working in the
Computer Centre. They are Responsible for providing the necessary support. Their
training must ensure that they are able to handle all possible operations, both routine
and extra-ordinary in nature.If the system calls for the installation of new equipment,
such as new computer system, special terminals or different data entry machines, the
operators training should include such fundamentals as how to turn the equipment on
and use it, how to power off and a knowledge of what constitutes normal operations.
The operators should also be trained on different type of malfunctioning, how to
recognize them and what steps should also be taken whenever they arise.
57
5.4.1.2 USER TRAINING
User may be trained on use equipment, particularly in the case where, e.g. a
microcomputer is in use and individual involved is both operator and user. In such
cases, user must be given training on how to operate and user. In such cases, user
must be given training on how to operate the system also. Questions that may be
trivial to the analyst, such as how to turn on a terminal, how to insert a diskette into a
micro-computer or when it is safe to turn off equipment without danger of data loss
are significant problems to new users who are not familiar.
Inmost of the cases user training deals with the operation of the system itself, with
proper attention given to data handling techniques. It is imperative that users be
properly trained in methods of entering transaction, editing data, formulating
inquiries, deleting and inserting of records. No training is complete without
familiarizing users with simple systems maintenance activities. Weakness in any
aspect of training may lead of awkward situation that creates user frustration and
error.
5.4.2 CONVERSION METHODS
A conversion is the process of changing from the old system to the new one. It must
be properly planned and executed. Four methods are common in use. They are
Parallel Systems, Direct Conversion, Pilot System and Phase In method. Each method
should be considered in the light of the opportunities that it offers and problems that it
may create. In general, system conversion should be accomplished in shortest possible
time. Long conversion periods create problems for all persons involved including both
analysts and users.
58
5.4.2.1 PARALLEL SYSTEMS
The most secure method of converting from an old to new system is to run both systems in
parallel. This method is safest one because it ensures that in case of any problem in using new
system, the organization can still fall back to the old system without the loss of time and
money.
The Disadvantages Of Parallel Systems Approach Are:
1. It doubles operating costs.
2. The new system may not get fair trial.
5.4.2.2 DIRECT CONVERSION
This method converts from the old system to new system abruptly, sometimes over a
weekend or even overnight. The old system is used until a planned conversion day, when it is
replaced by the new system.
5.4.2.3 PILOT SYSTEM
Pilot approach is often preferred in the case of the new system which involves new
techniques or some drastic changes in organization performance. In this method, a working
version of the system is implemented in one part of the organization, such as a single work
area or department.
5.4.2.4 PHASE-IN-METHOD
This method is used when it is not possible to install a new system throughout an
organization all at once. The conversion of files, training of personnel or arrival of equipment
may force the staging of the implementation over a period of time, ranging from weeks to
months.
5.4.3 POST IMPLEMENTATION REVIEW
After the system is implemented and conversion is complete, a review should be conducted to
determine whether the system is meeting expectations and where improvements are needed.
A post implementation review measures the systems performance against predefined
requirement. It determines how well the system continues to meet the performance
specifications.
59
5.5 MAINTENANCE
The term implementation has different meanings, ranging from the conversion of a basic
application to a complete replacement of a computer system. However the procedure is
almost similar. Implementation is used here to mean the process of converting a new or a
revised system design into an operational one. Conversion is one aspect of implementation.
The other aspects are the post implementation review and software maintenance.
There are three types of implementation:
Implementation of a computer system to replace a manual system.
Implementation of a new computer system to replace an existing one.
Implementation of a modified application to replace an existing one using the
same computer.
In our case we are having third type of implementation in which we are replacing the existing
excel work in a web based centralized system. This type of implementation is relatively easy
as compared to other two.
This phase is less creative than design phase. It is primarily concerned with user training, site
preparation and file conversions. The final communications and links to other modules and
hardware components are established to make the software operative. After that the program
is run with live data otherwise a diagnostic.
Procedure is used to locate and correct the errors in program. In most of the cases, a parallel
run is conducted where the new software runs simultaneously with the older one, that’s why
software implementation includes the installation of original software and made it operational
in an operative environment. It continues until the software is operating in accordance with
the defined user requirements.
60
CONCLUSION
61
In the concluding session , it can be said that proposed system is efficient enough for the
given requirements, it is quite time –efficient, convenient to use, user friendly, consistent and
provides enough security.
The system has been developed for given position and is found working
effectively. The developed system is flexible and changes whenever can be made easy.
Using the facilities and functionalities of PHP, the software has been developed in a neat and
simple manner,thereby reducing the operators work.
The speed and accuracy are maintained in proper ways. The user friendly nature
of this project developed in PHP is very easy to work with both for the higher management as
well as other people with little knowledge of computer. The results obtained were full
satisfactory from the user point of view.
BIBLOGRAPHY
1. www.google.com
2. www.w3school.com
62
3. www.mysql.com
4.Developing Dynamic Web Applications with MYSQL and PHP(book)
.
.
63
64
65
66