Академический Документы
Профессиональный Документы
Культура Документы
Introduction
among
people
who
share
interests,
thoughts,
activities,
Page |1
also
improved
in
global
way
as
the
advancements
of
communication technology. The word online is a very popular word nowa-days. So, I have chosen this topic as it is going to give me a lifetime
experience
of studying
and
developing
a fully fledged
Web-based
Page |2
Page |3
Chapter 2
Objectives
Page |4
Chapter 3
Tools/Environment Used
Page |5
Chapter 4
4.2
socialization has been improved. The globalization makes the distance among
people very short. People prefer internet technology to communicate with each
other as it is reliable and quick and also cost effective. So, the proposed
system entitled social networking website is web-based communication
system over internet which is reliable and cost effective than the conventional
way of communication.
Page |6
4.3
Feasibility study
Before planning the steps for analyzing an existing system and
designing a new one, we have to consider the pros and cons of developing the
project
i.e.
the
cost
effectiveness
and
other
aspects.
4.4
economically
feasible.
It
reduces
the
cost
of
conventional
4.4.1 The conventional way vs. the proposed system for building social
relation:
There are various way of building social interaction among
people. Some examples of them are as follows:
Page |8
A rented house or room which will cost at minimum Rs. 4000 per
month.
Electricity bills which will cost at minimum Rs. 500 per month.
Furniture which will cost approximately Rs. 20000 at minimum.
Weekly maintenance such as cleaning will cost Rs. 500 per month.
Other expenses such organizing parties etc. will cost Rs. 1000 per
month.
So if calculate average expenses per month excluding
Page |10
Page |11
4.5 CONCLUSION
We can thus see that the new system is a feasible one from all
the three angles or sides i.e. economical, technical and operational sides.
Hence, I can safely state that the new system is feasible one and
this carries us to the next phase of development of the said project work.
Page |12
Chapter 5
System Analysis
1.1 Purpose
Page |13
Software developer
Administrator
Security Analysts
Users of the system
Maintenance Team
2. Product Perspective
3. Product Functions
Administrator Functions:
1.
2.
3.
4.
5.
6.
7.
Application Information:
Displaying History: Mentions the history about the system such as founders
of the system.
Contact details: Contact details.
Advertisements: Application will contain advertisements related to all various
products present for selling.
I.
Software:
1. Server Side Scripting language: PHP version 5.4.3
2. RDBMS: mySQL version 5.5.24
3. Server: Apache version 2.2.22
4. Development Platform (IDE): Dreamweaver MX2004
5. Graphics Development: Adobe Photoshop CS5 Extended
6. Application Accessing: via HTML 5 web Browser
7. Other Scripting tools: JavaScript, jQuery and AJAX
II.
Hardware:
Page |16
1. Development Machine:
Processor: Dual Core
RAM:
2GB
2. Client Machine:
Processor: Dual Core
RAM:
1GB
III.
IV.
Internet connection
Security: The system should take care of hacks like SQL injection. It should
also not expose any sensitive information to normal users.
Fault Tolerance: Data should not become corrupted in case of system crash
or power failure.
Page |17
Central server of the system must be able to handle all the incoming
requests simultaneously.
Back up of the databases in case of hardware failure, disaster, natural
calamities.
No data loss in case of handling of the system by the administrators or the
system related personnel
Flow Diagram
Page |18
Communications Interfaces
To use the social networking system efficiently the user needs to have
an internet connection with a personal computer running with an
Operating System, like Windows or Linux and browser software such as
Firefox, Chrome, Opera mini etc.
7. System Features
The social networking application is intended for connecting
people. In addition to this feature the users have the facility to add
videos and photos. This website gives a lot of features all at one place.
Main Features
FE-1: Create/Update Profile
FE-2: Update account
FE-3: Get forgotten password.
FE-4: Message system
FE-5: Search members /add as member/delete member
Page |19
Page |20
Create Groups
The user can create groups, add members to the group and upload
contents to it.
Message system
User can get message to his message box.
Uploading Photographs
The user has a facility to create new Albums and upload and share
photographs.
Blogging
The user has the right to write posts in his blog and publish them.
8. Nonfunctional Requirements
Performance Requirements
Page |21
9. Security Requirements
1. The new profile formed is validated against the given email address.
2. The password should be encrypted using secure method such as MD5
technique.
3. The systems backend or the system databases should not be manipulated by
the normal users.
Description
REQ-SR1
REQ-SR2
REQ-SR3
REQ-SR4
server.
REQ-SR5
Page |23
Page |24
2. Home Page
3. Administrator Page
Page |25
4. Wall Page
5. Group Page
Page |26
6. Blog Page
7. Profile Page
Page |27
9. Photo Page
Page |28
INTRODUCTION
Page |29
While, the Gantt chart depicts the various project activities and
their estimated duration, it does not show the precedence, that is, the relative
sequence between the activities. So, if we also want to express the precedence
relationship between the various projects activities then the Gantt chart is not
a suitable option.
The pert diagram overcomes the difficulty I have stated in case of the Gantt
chart.
In planning the activities if this project works, I have used the PERT diagram
shown below.
20
20
60
60
90
90
110
In the above given PERT diagram I have estimated the duration of various
activities as follows:
1. I start with System Analysis on day 0 and plan to finish it in 20 days.
2. System Design is supposed to begin next and is estimated to be
completed within 40 days.
Page |31
GANTT CHART:
Gantt chart shows project activities and the amount of time
they will take. This activity scheduling method was first introduced in 1914 by
Henry L. Gantt as a rudimentary aid to plot individual tasks against time. The
Gantt chart uses horizontal bars to show the durations of actions or tasks.
The left end marks the beginning of the tasks; the right ends its finish. Earlier
tasks appear left and later ones in the lower right.
Gantt chart, in case, is given below.
weeks
10
11
12
13
14
15
16
Page |32
Page |33
Page |34
Page |35
Page |36
Page |37
Post on wall
Comment on post
Page |38
Page |39
Supervision of administrator
given data element are cross referenced in a data dictionary, which makes it
easy to identify them and make any necessary changes. Finally, a data
dictionary is an important step in building a database.
Sl.
Name
Type
size
key
description
No.
1
id
int
11
Primary Key
User id
uname
varchar
500
User name
uemail
varchar
500
User email
password
varchar
1000
User password to
actHash
varchar
1000
login
User activation
verified
int
11
hash
Used to check the
user is verified or
joinedDate
date
onLine
int
lastLoggedOn
date
10
admin
int
not
User join date
11
11
11
suspended
int
11
privileges
Check the user
whether he has
12
ckey
int
11
been suspended
Used for mass row
deletion
Page |41
13
groupName
Varchar
500
14
crTS
Varchar
1000
to be created
Timestamp of
creation
No of friends
16
fList
Varchar
5000
17
fid
Int
11
18
Fdate
date
19
seed
Varchar
1000
20
positive
Int
11
Whether request is
21
Gid
Int
11
22
JoinDate
Varchar
1000
Joined date
23
Title
Varchar
500
Contents title
24
Filename
Varchar
500
Foreign key
Friends id
Request date
Foreign key
accepted
Group id
25
posterid
Int
11
upload
Id of poster
26
Receiverid
Int
11
Id of receiver
27
Content
Varchar
5000
Posts Content
28
Expression
Varchar
10
Expression contents
29
Fullname
Varchar
1000
30
Gender
Varchar
10
user
Gender of the user
31
Birthyear
Date
32
fromCountry
Varchar
200
33
Livesin
Varchar
500
belongs
Users living place
34
Occu
Varchar
500
Occupation of the
200
user
Designation of the
500
user
Where the user
35
36
Design
worksAt
Varchar
Varchar
Birth date
Page |42
works
37
Phone
Varchar
10
Contact number
38
fatherName
Varchar
200
39
motherName
Varchar
200
Users mothers
1000
name
About some info of
1000
the user
Regional views of
40
41
Aboutme
rViews
Varchar
Varchar
42
pViews
Varchar
1000
the user
Political views of the
43
updateKey
Int
11
user
Updating key of the
44
updateDate
Date
45
Imagestr
Varchar
100
info
Image string
46
albumName
Varchar
200
47
Aid
Int
11
48
photoURL
Varchar
200
Location of the
200
photo
Name of the photo
49
photoName
Varchar
info
Updating date of the
Foreign key
Album id
50
Tags
Varchar
1000
to be uploaded
Photo tagging info
51
instName
Varchar
200
Colleges name
52
City
Varchar
200
53
State
Varchar
200
situated
Name of the state
54
Country
Varchar
200
55
Phone
Varchar
10
Contact no of the
Page |43
college
56
Description
Varchar
1000
Description of the
57
Address
Varchar
500
college
Address of the
58
countryName
Varchar
255
university
Country name
59
Code
Varchar
255
60
wikiLink
Varchar
255
Wikipedia link
61
Occupation
Varchar
200
Name of the
62
Sector
Varchar
100
occupation
Sector of the
63
Industry
Varchar
100
workplace
Industry type
64
Web
Varchar
100
Web link
Page |44
Chapter 6
SYSTEM DESIGN
6.1 Introduction
System design is the process of developing specifications for a
candidate system that meet the criteria established in the system analysis.
Major steps in system design are defining architecture, components, interfaces
and other characteristics, the preparation of the input forms and the output
reports in a form applicable to the user.
System design is the creative act of invention, developing new
inputs, a database, offline files, procedures and output for processing
business to meet an organization objective. System design builds information
gathered during the system analysis.
Page |45
Login module: this module provides the first level of security to a user to
access the system against username and password.
Search friends: it provides a user to search for existing friends in the system.
Friend list: this module tracks who is a friend with whom. It searches for the
database and finds the friends of a logged in user.
Send friend request: this module is used to send friend request to an existing
user of this system.
Page |47
Accept friend request: this module offers a user to accept an incoming friend
request.
Create photo albums and upload photo: it provides a user to create new
photo albums and upload or share photos among his friends.
Post message on wall: this module is used by a user to post or share his/her
thoughts as a form of message in the wall page.
Commenting on post: this module provides a user the facility to crosscomment on each other post.
Page |48
Data Integration
Data Integrity
Data Independence
different
information.
Each
table
contains
key
fields
that
establish
relationships in a MySQL database and how the records are stored. There are
primary key fields that uniquely identify a record in a table. There are also
fields that contain the primary key from another table called foreign keys.
It is a known fact that the program cannot be written until the
data are defined, so the database must be defined. The starting point for this
process is data dictionary. The records data structures and elements to be
stored in each database are identified and extracted. Next the analyst codes
the source statements library. Eventually, the programmer will incorporate
the source code into the various programs, thus assuring consistency and
simplifying the coding process. The databases have been designed in such a
way that there is no duplication of information and loss of information.
The database of the proposed system comprises 18 tables
normalized to 2NF.
Page |50
Page |51
normalization rules simplifies the database and reduce the redundancy of the
data.
Proposed system this relational database rules are applied to
reduce the redundancy make future changes to the table structure easier to
and minimize the impact of these changes on users interface to the database.
This is done first determining what information is needed, how items are
related, what constraints are established. Tables are created and linked by
appropriate key fields. The constraints on the data are used to guide the
building of tables. The tables are created by making use of the normalization
principles. The proposed system has its own tables in the second normal
form.
Data type
Size
Key
Description
id
int
11
Primary Key
User id
uname
varchar
500
User name
uemail
varchar
500
User email
password
varchar
1000
actHash
varchar
1000
Page |52
verified
int
11
joinedDate
date
onLine
int
lastLoggedOn
date
admin
int
suspended
int
11
ckey
groups
int
11
Field Name
Data type
Size
Key
Description
id
int
11
Primary
group id
Key
Uid
Int
11
groupName
Varchar
500
Foreign key
User id
Name of the group to be
created
crTS
Varchar
1000
Timestamp of creation
suspended
int
11
ckey
int
11
Page |53
Data type
Size
Key
Description
id
int
11
Primary
Friends id
Key
Uid
Int
11
Foreign key
User id
fList
Varchar
5000
No of friends
ckey
int
11
Data type
Size
Key
Description
id
int
11
Primary
Friend tracker id
Key
Uid
Int
11
Foreign key
User id
fid
Int
11
Foreign key
Friends id
Fdate
date
seed
Varchar
1000
positive
Int
11
Whether request is
Request date
accepted
ckey
int
11
Page |54
Data type
Size
Key
Description
id
int
11
Primary
Friend tracker id
Key
Uid
Int
11
Foreign key
User id
Gid
Int
11
Foreign key
Group id
JoinDate
Varchar
1000
Joined date
ckey
int
11
Data type
Size
Key
Description
id
int
11
Primary
Group content id
Key
Uid
Int
11
Foreign key
User id
Gid
Int
11
Foreign key
Group id
Title
Varchar
500
Contents title
Filename
Varchar
500
crTS
Varchar
1000
Creation timestamp
ckey
int
11
Field Name
Data type
Size
Key
Description
id
int
11
Primary
Wall post id
Key
posterid
Int
11
Id of poster
Receiverid
Int
11
Id of receiver
Content
Varchar
5000
Posts Content
Ts
Varchar
500
Timestamp of post
ckey
int
11
Data type
Size
Key
Description
id
int
11
Primary
wall comment id
Key
postid
Int
11
Id of poster
uid
Int
11
Content
Varchar
5000
Comments Content
Ts
Varchar
500
Timestamp of comment
ckey
int
11
Foreign key
User id
Data type
Size
Key
Description
Page |56
id
int
11
Primary
wall expressions id
Key
postid
Int
11
Id of the poster
uid
Int
11
Expression
Varchar
10
Expression contents
Ts
Varchar
500
Timestamp of expression
ckey
int
11
Foreign key
User id
Data type
Size
Key
Description
id
int
11
Primary
Group content id
Key
Uid
Int
11
Foreign key
User id
Fullname
Varchar
1000
Gender
Varchar
10
Birthyear
Date
fromCountry
Varchar
200
Livesin
Varchar
500
Occu
Varchar
500
Design
Varchar
200
worksAt
Varchar
500
Phone
Varchar
10
Contact number
fatherName
Varchar
200
Birth date
Page |57
motherName
Varchar
200
Aboutme
Varchar
1000
rViews
Varchar
1000
pViews
Varchar
1000
updateKey
Int
11
updateDate
Date
ckey
int
Data type
Size
Key
Description
id
Int
11
Primary key
Id of profile image
uid
Int
11
Foreign key
User id
Imagestr
Varchar
100
Image string
updateTS
Varchar
500
Updating timestamp
ckey
int
11
Data type
Size
Key
Description
id
Int
11
Primary key
Album id
uid
Int
11
Foreign key
User id
albumName
Varchar
200
Ts
Varchar
500
timestamp
Page |58
ckey
int
11
Data type
Size
Key
Description
id
Int
11
Primary key
Album id
uid
Int
11
Foreign key
User id
Aid
Int
11
Foreign key
Album id
photoURL
Varchar
200
photoName
Varchar
200
Tags
Varchar
1000
Ts
Varchar
500
timestamp
ckey
int
11
Data type
Size
Key
Description
id
Int
11
Primary key
college id
instName
Varchar
200
Colleges name
City
Varchar
200
State
Varchar
200
Country
Varchar
200
Phone
Varchar
10
Description
Varchar
1000
Page |59
ckey
int
11
Data type
Size
Key
Description
id
Int
11
Primary key
university id
instName
Varchar
200
Colleges name
Address
Varchar
500
Phone
Varchar
10
Description
Varchar
1000
ckey
int
11
Data type
Size
Key
Description
id
Int
11
Primary key
country id
countryName
Varchar
255
Country name
Code
Varchar
255
wikiLink
Varchar
255
Wikipedia link
ckey
int
11
Data type
Size
Key
Description
id
Int
11
Primary key
occupation id
Occupation
Varchar
200
Page |60
ckey
int
11
Data type
Size
Key
Description
id
Int
11
Primary key
workplace id
instName
Varchar
200
Phone
Varchar
10
Address
Varchar
500
Country
Varchar
200
Sector
Varchar
100
Industry
Varchar
100
Industry type
Web
Varchar
100
Web link
Description
Varchar
1000
ckey
int
11
Page |61
access the system. The project work entitled social networking website is
based on Graphical User Interface which very easy to use and comfortable as
it provide validation and verification of input data. Here are some screenshots
which will describe the easiness of the user interface of the system.
Page |62
Page |63
Page |64
Page |65
Chapter 7
Testing
according to
specifications.
Page |66
Page |67
Page |68
named verifyUserEmail.php. The PHP script will give output 1 if the given
email is correct and give output 0 if it is not.
Page |70
For example if a user enter his username but forgot to enter the
password the follow will happen. The JavaScript, which validate the user
input, finds absence of required data will show an alert message and then
redirecting the user to fill the specified field. Here is a screen shot of the above
said example.
Page |72
error message else if it outputs 0 there must be some error in the code in
the module.
Page |73
Page |74
Page |75
Chapter 8
Figure 1.
Figure 2.
Input/output Screen
Home Page
Page |76
Figure 3.
Figure 4.
Figure 5.
Page |78
Figure 6.
Figure 7.
Page |79
Figure 8.
Figure 9.
Page |80
Figure 10.
Admin Page
Figure 11.
Page |81
Figure 12.
Page |82
Figure 13.
Figure 14.
Blog Page
Page |83
Chapter 9
Page |84
Chapter 10
User manual
application
will
be
accessed
at
two
basic
levels
of
authorization. One will be the administrator of the web application and the
other will be the average user who will follow a special procedure to register
himself at the website, then verify his email id and finally start maintaining
and using his account. After accessing the system with the username and
password the user can do the various activities like search friends, post a
message on the wall, upload photo and other contents etc.
10.2 Creating an account
To create an account the user has to register himself by filling up
the sign up form on the home page and click on the submit button. It will
mail an activation link to his respective email. So he has to click on the
activation link to make him a valid user on the system.
10.3 Edit Profile Info
To edit profile, first a user has to log in to the system. After log in
he has to click on the edit profile link on the user home page. Next, he has to
enter his info one by one and then click save button.
10.4 Search friend and send request
Page |85
On the user home page, at the top there is a textbox where a user
can type his friends name to search and hit enter keys. If the friend exist he
can send a friend request by clicking on add as a friend.
Chapter 11
Conclusion
The system has been developed for the given condition and is
found working effectively. The developed system is flexible and changes
whenever can be made easy. The software has been developed in a neat and
simple manner, thereby reducing the operators work.
The speed and accuracy are maintained in proper way. The user
friendly nature of this software makes comfortable for any type of user with a
little knowledge of computer and the internet. The results obtained were fully
satisfactory from the user point of view.
The system was verified with valid as well as invalid data in each
manner. The system is run with an insight into the necessary modifications
that may require in the future. Hence the system can be maintained
successfully without much network.
Page |86
Chapter 12
Page |87
Chapter 13
Page |88
Chapter 14
Bibliography
References:
1. An introduction to database system by Bipin C. Desai
2. System Analysis and Design by Elias M. Awad
3. Advanced JavaScript by Chuck Easttom
4. Pro PHP and jQuery by Jason Lengstorf
5. Software Engineering (IDOL Study Material).
Page |89