Академический Документы
Профессиональный Документы
Культура Документы
TRACKER
INDEX
CONTENTS
PGNO
1. Introduction
1.1
Introduction to Project
1.2
Introduction to Modules
2. Analysis
2.1
Identification of Need
2.2
Feasibility Study
2.3
Problem Specification
2.4
Requirement Specification
2.4.1 Functional requirements
2.4.2Hardware requirements
2.4.3software requirements
5
6
8
9
9
3. Software
10
4. Design
23
4.1
4.2
4.3
4.4
4.5
23
24
25
27
32
Software Paradigm
Normalization
Data Dictionary
E-R Diagrams
Data Flow Diagrams.
34
DEPARTMENT OF CSE
51
TKRCET
6.2 Validations
52
7. Conclusion
53
54
9. Bibliography
55
DEPARTMENT OF CSE
TKRCET
1. INTRODUCTION
A private mail storage area that will hold incoming messages until they
get read
It also provides an area for you to store messages once they are read.
DEPARTMENT OF CSE
TKRCET
Allow message access and management from more than one computer.
The
protocol
checking
for
new
messages,
permanently
removing
Admin
User
o Inbox.
o Outbox.
o Checking mails.
o Composing
o Deleting the unnecessary mails.
Admin
Admin is the one who is going to monitor all the users and grant or deny
permissions to any user. Admin can have the information related to the user
like what the entire transactions user is doing.
User
DEPARTMENT OF CSE
TKRCET
He can get into system with the authentication and can access all the
information related to his id that is nothing but mailing services. He can do all
the functionalities of the system and at the same time he can utilize all the
services of the mailing server. He can send the mail or receive the mail and
read whatever features mailing server provides the user can utilize all those
services.
Inbox
User can have all the received mails stored in this module.
It gives the
Out Box
User can store the information related to all the mails sent by him will be
stored in the outbox
Checking Mails
User can access all the mails received by him will be stored in the inbox and
user can check those mails whenever user feels it is required.
Composing
User can sent mails. User can utilize the option called composing to send the
mails. To send the mails the mail has to be composed.
User receives much number of mails. User requires few mails to be stored and
rest to be deleted.
unnecessary mails.
DEPARTMENT OF CSE
TKRCET
2.ANALYSIS
Definition and reason for Condition Analysis
System analysis will be performed to determine if it is feasible to design
an information based on policies and plans of the organization and on user
requirements and to eliminate the weaknesses of the present system.
General requirements
1. The new system should be cost effective.
2. To augment management, improve productivity and services.
DEPARTMENT OF CSE
TKRCET
Proposing System:
As the TRACKER project is developed using JAVA Html, Servlets and Jsp
it provides a user friendly graphical user interface which navigates user
throughout the program by providing various task related to internet mail
messaging facilities when connected to a mail server.
It provides the user to perform various emails messaging operation like
checking, composing, deleting and forward email. It provides all the facilities,
which are provided to the user by Outlook to access his account.
The various protocols available in JAVA API package are implemented to
access the users account using this project.
DEPARTMENT OF CSE
TKRCET
Admin can keep track of all the user transactions irrespective of their usage
and designation.
This tracker is going keep track of all the users transactions from the time
of login to the time of logout.
Allow message access and management from more than one computer.
DEPARTMENT OF CSE
TKRCET
Before commencing the project, we have to be very clear about what are
the
Technologies those are required for the development of new system.
2. Find out whether the organization currently possesses the required
technologies
Is the required technology available with the organization?
If so is the capacity sufficient?
For instance Will the current printer be able to handle the new reports
and forms required for the new system?
2.2.2 Operational Feasibility
Proposed projects are beneficial only if they can be turned into
information systems that will meet the organizations operating requirements.
Simply stated, this test of feasibility asks if the system will work when it is
developed and installed. Are there major barriers to Implementation? Here are
questions that will help test the operational feasibility of a project:
Are the current business methods acceptable to the user? If they are not,
Users may welcome a change that will bring about a more operational and
useful systems.
Have the user been involved in the planning and development of project?
Early involvement reduces the chances of resistance to the system and in
General and increases the likelihood of successful project. Since the proposed
system was to help reduce the hardships encountered. In the existing manual
system, the new system was considered to be operational feasible.
DEPARTMENT OF CSE
TKRCET
Time Delay
In the existing system, information related to all transactions done by
user cannot be accessed by the admin. Because the transactions done by many
users in different systems, so the admin has to login with each and every user
id and take the information. Its a time taking process.
Redundancy
As the transactions done by different users and admin has to track all
Accuracy
Since the same transactions are compiled at different user sections, the
DEPARTMENT OF CSE
TKRCET
10
The major inputs for this application can be categorized module -wise.
Basically all the information is managed by the software and in order to access
the information one has to produce their identity by entering the user-id and
password. Every user has their own domain of access beyond which the access
is dynamically refrained rather denied.
Output
The major outputs of this system are user details and services of different
departments. Links are created dynamically to meet the requirements on
demand. Reports, as it is obvious, carry the gist of the whole information that
flows across all the services.
2.4.2. Hardware Requirements
Processor
Ram
256 MB or more
Cache
512 KB
Hard disk
16 GB
DEPARTMENT OF CSE
TKRCET
11
Operating system
ASP.NET & C#
SQL - SERVER
Servers
IIS Server
DEPARTMENT OF CSE
TKRCET
12
3. Software
JAVA:
The initial release of Java was nothing of revolutionary, but it did not
mark the end of javas era of rapid innovation. Unlike most other software
systems that usually settle into a pattern of small, increment improvements, java
had already created java1.1 were more significant and substantial than the
increase 1 the minor revision number would have you think. Java1.1 added
many new library elements, redefined the way events are handled by applets,
and reconfigured many features of the 1.0 library .It also deprecated several
features originally defined by java1.0. Thus java1.1 both
attributes from its original specification. Continuing in this evolution, java2 also
and subtracts features.
Serialization, which allows you to save and restore the state of an object.
DEPARTMENT OF CSE
TKRCET
13
The Java Native Interface (JNI), which provides a new way for your programs
to interface with code libraries written in other languages.
Significant changes to event handling that improve the way in which events
generated by graphical user interface (GUI) components are handled.
DEPARTMENT OF CSE
TKRCET
14
Performance improvements have been made in several areas. A Just-InTime (JIT) compiler is included in JDK.
TKRCET
15
Simple
Portable
Object-oriented
Robust
Multithreaded
Architectural-neutral
High performance
Distributed
Dynamic
Procedural Language
Pascal, C, Basic, FORTRAN, and similar languages are procedural
languages. That is, each statement in the language tells the computer to do
something: Get some input, add these numbers,, divide by 6, display the
output. A program in a procedural language is a list of instructions.
For very small programs no other organizing principle (often called a
paradigm) is needed. The programmer creates the list of instructions, and the
computer carries them out.
DEPARTMENT OF CSE
TKRCET
16
DEPARTMENT OF CSE
TKRCET
17
Objects
When you approach a programming problem in an object oriented
language, you no longer ask how the problem will be divided into functions, but
how it will be divided into objects. Thinking in terms of objects, rather than
functions, has a surprisingly helpful effect on how easily programs can be
designed and objects in the real world.
What kinds of things become objects-oriented programs? The answer to this is
limited only by your imagination, but there are some typical categories to start
you thinking:
Physical objects
Windows
Menus
DEPARTMENT OF CSE
TKRCET
18
Programming constructs
Customized arrays
Stacks
Linked lists
Collection of data
An inventory
A personnel file
A dictionary
Time
Angles
Complex numbers
DEPARTMENT OF CSE
TKRCET
19
Classes
In OOP we say that objects are members of classes. What does this
mean? Lets look at an analogy. Almost all computer languages have built-in
data types. For instance, a data type int, meaning integer is pre-defined in
Java. You can declare as many variables of type int as you need in your
program:
int day;
int count;
A class serves as a plan, or template. It specifies what data, and what
functions will be included in objects of that class. Defining the class doesnt
create any objects, just as the mere existence of a type int doesnt create any
variables.
Abstraction
An essential element of object-oriented programming is abstraction.
Humans manage complexity through abstraction. For example, people do not
think of a car as a set of tens of thousands of individual parts. They think of it
as a well-defined object with its own unique behavior. This abstraction allows
people to use a car to drive to the grocery store without being overwhelmed by
the complexity of the parts that form the car. They can ignore the details of
DEPARTMENT OF CSE
TKRCET
20
how the engine, transmission, and braking systems work. Instead they are free
to utilize the object as a whole.
Encapsulation
Encapsulation is the mechanism that binds together code and the data it
manipulates, and keeps both safe from outside interference and misuse. One
way to think about encapsulation is as a protective wrapper that prevents the
code and data from being arbitrarily accessed by other code defined outside the
wrapper. Access to the code and data inside the wrapper is tightly controlled
through a well-defined interface. To relate this to the real world, consider the
automatic transmission on an automobile. It encapsulates hundreds of bits of
information about your engine, such as how much you are accelerating, the
pitch of the surface you are on, and the position of the shift lever. You , as the
user, have only one method of affecting this complex encapsulation: by moving
the gear-shift lever. You cant affect the transmission by using the turn signal
or windshield wipers, for example. Thus, the gear-shift lever is a well-defined
(indeed, unique) interface to the transmission.
Inheritance
Inheritance is the process by which one object acquires the properties of
another object.
hierarchical classification.
hierarchies, each object would need to define all of its characteristics explicitly.
DEPARTMENT OF CSE
TKRCET
21
However, by use of inheritance, an object need only define those qualities that
make it unique within its class. It can inherit its general attributes from its
parent. Thus, it is the inheritance mechanism that makes it possible for one
object to be a specific instance of a more general case.
Polymorphism
Polymorphism (from the Greek, meaning many forms) is a feature that
allows one interface to be used for a general class of actions.
The specific
values, and one for characters. The algorithm that implements each stack is
the same, even though the data being stored differs. In a non-object-oriented
language, you would be required to create three difference sets of stack
routines, with each set using different names.
However, because of
polymorphism, in Java you can specify a general set of stack routines that all
share the same names.
DEPARTMENT OF CSE
TKRCET
22
Components of JDBC
There are three components to the JDBC
actually quite small and simple its primary function is to connect java
application s to the connect JDBC driver and then get out of the way.
The JDBC driver test suite provides some confidence that JDBC drivers will
run your program. Only drivers that pass the JDBC driver test suite can be
designated JDBC COMPLIANT.
DEPARTMENT OF CSE
TKRCET
23
JDBC-Net-All-Java-Driver
The main difference when using this driver is that the native CLI
libraries are placed on a remote server and the driver uses a network protocol
to facilitate communication between the application and the driver .All
communication between the application and the database server are 100% java
to java. Communication between the database itself and the server processes is
still done with a native database CLI.
DEPARTMENT OF CSE
TKRCET
24
JAVA SCRIPT
Introduction to Java Script
JAVA script enables you to embed commands in an HTML page. When a
compatible web browser, such as Netscape Navigator 2 or higher or Internet
explorer 3 or higher, downloads the page, your JAVA script commands are
loaded by the web browser as part of the HTML document. These commands
can be triggered when the user clicks page items, manipulates gadgets and
fields in an HTML form, or moves through the page history list.
JAVA script is an interpreted language - the computer must evaluate the
program every time it is run. You embed your JavaScript commands within an
HTML page, and any browser that supports JavaScript can interprets the
commands and act on them. JavaScript is powerful and simple.
Scripting Language
JavaScript enables Web authors to write small scripts that execute on the
users browsers rather than on the server. An application that collects data
from a form and then posts it to the server can validate the data for
completeness and correctness, for example, before sending it to the server. This
can greatly improve the performance of the browsing session because users
dont have to send data to the server until it has been verified as correct.
ORACLE
Database management system (DBMS)
DEPARTMENT OF CSE
TKRCET
25
Data Abstraction
The major purpose of a database system is to provide users with an
abstract
view of data. That is the system hides certain details of how the data
is stored and maintained while the data is sufficiently retrieved. Levels are
Physical Level: The lowest level of abstraction describes how the data is
actually stored.
Conceptual Level: The next level of abstraction describes what data is
actually stored in the database, and the relationships that exist among the
data.
Data Model
DEPARTMENT OF CSE
TKRCET
26
Entity-relationship model
Object-oriented model
Binary model
Semantic model
DEPARTMENT OF CSE
TKRCET
27
Data Dictionary
A data dictionary is a file that contains Meta data that is data about
data. This file is consulted before actual data is read or modified in the
database system. The data storage and definition language specifies the storage
and access methods of the database system.
4. DESIGN
4.1 SOFTWARE ENGINEERING PARADIGM APPLIED (RADMODEL)
The two design objectives continuously sought by developers are
reliability and maintenance.
Reliable System
There are two levels of reliability. The first is meeting the right
requirements. A careful and through systems study is needed to satisfy this
aspect of reliability. The second level of systems reliability involves the actual
working delivered to the user. At this level, the systems reliability is interwoven
with software engineering and development. There are three approaches to
reliability.
1. Error avoidance: Prevents errors from occurring in software.
DEPARTMENT OF CSE
TKRCET
28
Maintenance
While working it is the Key to reduce the need for maintenance, if possible to do
essential tasks.
1. More accurately defining user requirement during system development.
2. Assembling better systems documentation.
3. Using
more
effective
methods
for
designing,
processing,
login
and
Types of output
Whether the output is formatted report or a simple listing of the contents
of a file, a computer process will produce the output.
A Report
A Document
A Message
DEPARTMENT OF CSE
TKRCET
29
Layout Design
It is an arrangement of items on the output medium. The layouts are
building a mock up of the actual reports or document, as it will appear after
the system is in operation. The output layout has been designated to cover
information. The outputs are presented in the appendix.
Avoiding delay
DEPARTMENT OF CSE
TKRCET
30
4.2 Normalization
It is a process of converting a relation to a standard form. The process is
used to handle the problems that can arise due to data redundancy i.e.
repetition of data in the database, maintain data integrity as well as handling
problems that can arise due to insertion, updation, deletion anomalies.
Decomposing is the process of splitting relations into multiple relations to
eliminate anomalies and maintain anomalies and maintain data integrity. To
do this we use normal forms or rules for structuring relation.
DEPARTMENT OF CSE
TKRCET
31
);
2.
create table signupdetails
(uname varchar2(30),
pwd varchar2(30),
age number(30),
sex varchar2(50),
city varchar2(30),
state varchar2(30),
pin number(10),
nation varchar2(20),
status varchar2(1)
);
3.
create table newcompose
(mailid varchar2(25),
mailfrom varchar2(25),
mailto varchar2(25),
subject varchar2(20),
Date1 varchar2(50),
cc varchar2(20),
bcc varchar2(20),
maildata varchar2(4000),
status varchar2(10),
folder varchar2(20)
DEPARTMENT OF CSE
TKRCET
32
);
4.
create table folders(fname varchar2(100),uname varchar2(20));
5.
create table logininfo
(id varchar2(30),
Lin varchar2(50),
port varchar2(20),
status varchar2(1),
lout varchar2(50)
);
4.4 ER-Diagrams
The entity Relationship Diagram (ERD) depicts the relationship between
the data objects. The ERD is the notation that is used to conduct the date
modeling activity the attributes of each data object noted is the ERD can be
described resign a data object descriptions.
The set of primary components that are identified by the ERD are
Data object
Attributes
Relationships
Various types of indicators.
DEPARTMENT OF CSE
TKRCET
33
system. This model view models the static structures. It represents the
dynamic of behavioral as parts of the system, depicting the interactions of
collection between various structural elements described in the user model and
structural model view.
DEPARTMENT OF CSE
TKRCET
34
DEPARTMENT OF CSE
TKRCET
35
Class Diagrams
Class diagrams are widely used to describe the types of objects in a
system and their relationships. Class diagrams model class structure and
contents using design elements such as classes, packages and objects. Class
diagrams describe three different perspectives when designing a system,
conceptual, specification, and implementation. These perspectives become
evident as the diagram is created and help solidify the design
DEPARTMENT OF CSE
TKRCET
36
ER-Diagrams
DEPARTMENT OF CSE
TKRCET
37
Receiver
subject
ms
g
Logi
nid
Sender
Compose
Pwd
Admin
Serv
er
Inbox
sub
i
User
pwd
emai
ld
DEPARTMENT OF CSE
TKRCET
Addr
e
38
Nam
e
ms
g
dat
e
nam
e
Admin
Inbox
Compose
User
Level 0
Inbox
Compose
DEPARTMENT OF CSE
User
Change password
TKRCET
39
Checking mails
Level 1
Inbox
Mails display
Information storage
Particular mail
DEPARTMENT OF CSE
TKRCET
40
5. OUTPUT SCREENS
DEPARTMENT OF CSE
TKRCET
41
DEPARTMENT OF CSE
TKRCET
42
DEPARTMENT OF CSE
TKRCET
43
DEPARTMENT OF CSE
TKRCET
44
DEPARTMENT OF CSE
TKRCET
45
DEPARTMENT OF CSE
TKRCET
46
DEPARTMENT OF CSE
TKRCET
47
DEPARTMENT OF CSE
TKRCET
48
DEPARTMENT OF CSE
TKRCET
49
DEPARTMENT OF CSE
TKRCET
50
DEPARTMENT OF CSE
TKRCET
51
DEPARTMENT OF CSE
TKRCET
52
DEPARTMENT OF CSE
TKRCET
53
DEPARTMENT OF CSE
TKRCET
54
DEPARTMENT OF CSE
TKRCET
55
DEPARTMENT OF CSE
TKRCET
56
DEPARTMENT OF CSE
TKRCET
57
6.
The purpose is to exercise the different parts of the module code to detect
coding errors. After this the modules are gradually integrated into subsystems,
which are then integrated themselves too eventually forming the entire system.
During integration of module integration testing is performed. The goal of this
is to detect designing errors, while focusing the interconnection between
modules. After the system was put together, system testing is performed. Here
the system is tested against the system requirements to see if all requirements
were met and the system performs as specified by the requirements.
Error Messages
The term error is used in two different ways. Errors refer to the
discrepancy between computed and observed values. That is error refers to the
difference between the actual output of the software and the correct output. In
this interpretation, error essentially is a measure of the difference between the
actual and the ideal. Error is also used to refer to human action that results in
the software containing a defect or a fault. This detection is quite general and
encompasses all phases. The consequence of thinking is the belief that the
errors largely occur during
Testing Techniques
DEPARTMENT OF CSE
TKRCET
58
Interface errors
Performance errors
In this testing only the output is checked for correctness. The logical flow of the
data is not checked.
2. White Box Testing
In this the test cases are generated on the logic of each module by
drawing flow graphs of that module and logical decisions are tested on all the
cases. It has been uses to generate the test cases in the following cases:
DEPARTMENT OF CSE
TKRCET
59
3. Unit Testing
Unit Testing is done on individual modules as they are completed and
become executable.
4. Integration Testing
Integration testing ensures that software and subsystems work together
as a whole.
It tests the interface of all the modules to make sure that the
7. Validation Testing
DEPARTMENT OF CSE
TKRCET
60
The system has been tested and implemented successfully and thus
ensured that all the requirements as listed in the software requirements
specification are completely fulfilled. In case of erroneous input corresponding
error messages are displayed.
Compiling Test
It was a good idea to do our stress testing early on, because it gave us
time to fix some of the unexpected deadlocks and stability problems that only
occurred when components were exposed to very high transaction volumes.
Execution Test
This program was successfully loaded and executed. Because of good
programming there was no execution error.
OUTPUT TEST
The successful output screens are placed in the output screens section.
7. Conclusion
Hence, the Client need not maintain any other system for maintaining
their records.
DEPARTMENT OF CSE
TKRCET
61
The project Tracker can be expanded to full pledged Mail Server which
can be implemented at any organization or on any server.
DEPARTMENT OF CSE
TKRCET
62
Tracker can maintain all the transactions of the user so we can also take
the complete transactions done by the user from log in to log out.
DEPARTMENT OF CSE
TKRCET
63
9. Bibliography
The following books were referred during the analysis and execution phase of
the project
Software Engineering
By Roger.S.Pressman
MSDN
By Microsoft
DEPARTMENT OF CSE
TKRCET
64