Академический Документы
Профессиональный Документы
Культура Документы
INTRODUCTION
we are developing a software for online-Auction .online-Auction is known by
several names, including electronic reverse bid Auctions, reverse auctions or
simply e-Auctions. Online auction is a group which is based for auction. If you
want to something sell by auction then you post that on website. It just a selling of
products. This project user can do a bid on particular Products. The main objective
of the e-Auction process must be to obtain best value and the highest price. It
cannot be possible to achieve best value outcomes whilst the focus remains on
price. There are two categories of persons one is customers and second one is
vendor. Vendor can sell his products on this website and customer will purchase it.
Product will be given to those customer who put a high bid price on product to
purchase. One user can do a more than one bid on products. There are two
categories of persons one is customers and second one is vendor. Both have their
own registration form .There is a common login page for vendors and for users but
when both login in, it would be easily find out that ether it is a vendor or a user
because of their registration details because their registration forms are different.
There are two home page i.e. one page behave different if vendor login then show
the vendors menu or if customer will login then customer menu will
show.Coustomers should have an appropriate knowledge of the e- Auction subject
1
Online Auction is loaded with features and functionality that allows you to create
an auction that is powerful and useful for buyers and sellers.
1. User (customer, vendor)
In our project there are two types of users one is customer who wants to buy
products by auctions and another is vendor who wants to sell his products.
At the time of registration user can select that he want to be a vendor, customer or
both. If he select vendor he can login with his vendor id and password vendor can
add his product details, edit existing product detail and he can delete product also.
But he cant participate on auctions to bid on a product.
If he registers as a customer then he will login with his customer id and password
he can choose any product which is available for auction from the menus then he
can bid on that product. But he cant set any product for auction to sell.
If he selects both at the time of registration he can buy and sell products he can
perform all the functions of customer and vendor.
2. Auction management
In auction management module there are many sub modules
SOFTWARE REQUIREMENTS
OPERATING SYSTEM WINDOWS 7
DATABASE SQL SERVER 2008
FRONT END - C # AND .NET FRAMEWORK
TOOL VISUAL STUDIO 2010
SYSTEM ANALYSIS
System Analysis by definition is a process of systematic investigation for the
purpose of gathering data, interpreting the facts, diagnosing the problem and using
this information to either build a completely new system or to recommend the
improvements to the existing system.
A satisfactory system analysis involves the process of examining a business
situation with the intent of improving it through better methods and procedures. In
its core sense, the analysis phase defines the requirements of the system and the
problems which user is trying to solve irrespective of how the requirements would
be accomplished
There are 2 methods to perform System Requirement Analysis:
(i)
Structured Analysis
.
The components of a Structured Analysis are
Data Dictionary
Entity Relationship Diagram
Data Flow Diagram
Process Specification
Control Specification
It refers to a detailed study of the various objects involved in a system and the
relationship of these objects with each other. While performing an object oriented
analysis, the focus of the system analyst is on the availability of the objects that are
relevant to software development.
10
Identification of Need
In current competitive scenario every business establishment needs
quality
Preliminary Investigation
11
2) On site Observation:
12
Conducting Interviews:
This method of investigation conducted by us involved questioning
the concerned personnel to get the users (client) view about the
system and the features they desired it to have. Some of the Questions
put forward by our team were:
a) The amount of data needed to be stored.
b) The number of customers using the system and number of
which the application needed to be installed.
c) The issue of our application with existing system was widely
discussed.
13
14
FEASIBILITY STUDY
Feasibility study is the process of determination of whether or not a project is
worth doing. Feasibility studies are undertaken within tight time constraints and
normally culminate in a written and oral feasibility report. The contents and
recommendations of this feasibility study helped us as a sound basis for deciding
how to precede the project. It helped in taking decisions such as which software to
use, hardware combinations, etc.
The following is the process diagram for feasibility analysis. In the diagram, the
feasibility analysis starts with the user set of requirements. With this, the existing
system is also observed. The next step is to check for the deficiencies in the
existing system. By evaluating the above points a fresh idea is conceived to define
and quantify the required goals. The user consent is very important for the new
plan. Along with, for implementing the new system, the ability of the organization
is also checked. Besides that, a set of alternatives and their feasibility is also
considered in case of any failure in the proposed system. Thus, feasibility study is
an important part in software development.
15
USERS CONSESUS
DEFICIENCES IN
CURRENT SYSTEM
USER
STATED
REQUIREMENTS
ANALYZE TO FIND
DEFICIENCES
DEFINE AND
QUANTIFY GOALS
CONSTRAINTS ON RESOURCES
EVALUATE
FEASIBILITY OF
ALTERNATES
PROPOSED FEASIBILITY
ALTERNATIVES
FIND BROAD
ALTERNATIVE
SOLUTION
ALTERNATIVES
(ii)
(iv)
(v)
Technical Feasibility
Technical feasibility determines whether the work for the project can be done with
the existing equipment, software technology and available personnel. Technical
feasibility is concerned with specifying equipment and software that will satisfy
the user requirement.
This project is feasible on technical remarks also, as the proposed system is more
beneficiary in terms of having a sound proof system with new technical
components installed on the system. The proposed system can run on any
machines supporting Windows and Internet services and works on the best
software and hardware that had been used while designing the system so it would
be feasible in all technical terms of feasibility.
Technical Feasibility addresses three major issues:
(a) Is the proposed Technology or Solution Practical?
17
VBscript and the compatible H/Ws are so familiar with the todays knowledge
based industry that anyone can easily be compatible to the proposed
environment.
(b)Do we currently posses the necessary technology?
We first make sure that whether the required technologies are available to us or
nor. If they are available then we must ask if we have the capacity. For instance,
Will our current Printer be able to handle the new reports and forms required
of a new system?
(c) Do we possess the necessary Technical Expertise and is the schedule
reasonable?
This consideration of technical feasibility is often forgotten during feasibility
analysis. We may have the technology, but that doesnt mean we have the skills
required to properly apply that technology.
As far as our project is concerned we have the necessary expertise so that the
proposed solution can be made feasible.
Some projects are initiated with specific deadlines. In our case first we have
given three months time but due to some problems regarding time and the
constraints of expertise it has been extended to six months. Now there are some
18
Economical Feasibility
Economical feasibility determines whether there are sufficient benefits in sufficient
benefits in creating to make the cost acceptable, or is the cost of the system too
high. As this signifies cost-benefit analysis and savings. On the behalf of the costbenefit analysis, the proposed system is feasible and is economical regarding its
pre-assumed cost for making a system.
Economical feasibility has great importance as it can outweigh other feasibilities
because costs affect organization decisions. The concept of Economic Feasibility
deals with the fact that a system that can be developed and will be used on
installation must be profitable for the Organization. The cost to conduct a full
system investigation, the cost of hardware and software, the benefits in the form of
reduced expenditure are all discussed during the economic feasibility.
During the economical feasibility test we maintained the balance between the
Operational and Economical feasibilities, as the two were the conflicting. For
example the solution that provides the best operational impact for the end-users
may also be the most expensive and, therefore, the least economically feasible.
19
Personnel costs
(ii)
Computer usage
(iii)
Training
(iv)
(v)
Return on Investment:
Operational Feasibility
Operation feasibility is a measure of how people feel about the system. Operational
Feasibility criteria measure the urgency of the problem or the acceptability of a
20
Project planning
A software project development is a highly labour-intensive activity. Large
software may involve hundreds of people and span of time. A project in it is
dimension can easily turn into chaos if proper management is not done. Proper
21
COST ESTIMATION
22
Rs. 3000
Rs. 12000
Rs. 2000
40.00/hr
Rs. 1300
Rs. 2000
Rs. 1500
Training
6
Planning Tools
23
Gantt chart:
Basic planning uses bar charts that show project activities and the amount of time
they will take. This activity scheduling method was first introduced in 1914 by
Henry L. Gantt as a rudimentary aid to plot individual tasks against time. The
Gantt chart uses horizontal bars to show the durations of actions or tasks. The left
end marks the beginning of the tasks; the right end its finish. Earlier tasks appear
in the upper left and later ones in the lower right.
In planning this project, several steps are undertaken:
1.
24
ii.
Designing Tables
iii.
Designing Forms
iv.
Coding
v.
Report Designing
vi.
Testing
vii.
Implementation
2.
3.
4.
5.
25
26
Project Scheduling
It is important, right at the start of the design process, for the designer or design
team, to set clear objective. The primary objectives will always be to design a
system that delivers the functions required by the client to support the business
objective of their organization. For example the system may be required to speed
up the production of accurate invoices, or to provide up to date, detailed
management information to improve the managing directors control over the
business; or to help senior managers to make strategic decisions. In the other
words, to be a quality product the system must conform to the customers
requirements and be delivered in a way, which meets their expectations in terms of
service. There are many ways in which these requirements might be mat by a
30
Maintainable:
This is closely linked to the previous objective because it is about change. A good
design is easy to maintain ands this reduces the clients maintenance costs, which
usually represent a high proportion of the total lifetime cost of the system.
Portable:
Still on the subject of change, a client who has bought a software system may wish
to change the hardware on which the system runs .A good design is portable-in
31
Easy to use:
With the increasing exposure of people to computer applications in the home as
well as in the office, expectations of computer systems in terms of their ease of use
are also increasing. A good design will result in a system which is user friendly
easy to understand, not difficult to learn how to use and straightforward to operate.
Reliable:
This objective is about designing systems which are secure against human error,
deliberate misuse of machine failure, and in which data will be stored without
corruption. While this is desirable in any computer system, for certain systems in
the areas of defence, process control or banking, it will be a key design objective.
Secure:
Security is nether objective that must be considered by the designer .In order to
protect the confidentiality of the data, particularly if it is commercially sensitive, it
may be important to build in methods to restrict access to authorized users only, for
example by introducing passwords.
32
Cost-effective:
his includes a number of the other objectives, and is about designing a system that
delivers the required functionally, ease (simplicity) of use, reliability, security, etc.
to the client in the most cost-objective way.
33
34
35
Therefore, a properly written SRS limits the range of valid designs, but does not
specify any particular design.
Technical
Status
Development
Quo
Solution
Integration
37
Information description
There are two categoriesof persons one is customers and second one is vendor.
Both have their own registration form .There is a common login page for vendors
and for users but when both login in, it would be easily find out that ether it is a
vendor or a user because of their registration details because their registration
forms are different. There are two home page i.e. one page behave different if
vendor login then show the vendors menu or if customer will login then customer
menu will show.Coustomers should have an appropriate knowledge of the eAuction subject its market, its market price.. In this website anyone wants to sell
products will have to register first then a unique id is given to the registered users.
After registered user have to give details of their products like (price of product
38
39
40
6. Auction closing
At the end of auction date of the product if he puts the highest price for that
product at the end of auction he got a mail that he won the auction and he can
purchase that product.
41
42
Bid Management
User
Online
Auction
Auction Management
43
User
Managem
ent
Username master
User details
User
Auction master
Auction master
Auction
Auction Details
Managem
ent
Auction Type
Bid master
Bid Master
Bid
Managem
ent
paymentmaster
payment_details
Payment
gateway
Bid Details
Chat
44Managemen
t
User Details
Checks Access
User
Managemen
t
Check New
User
Existence
Is It Vendor
or Customer
Vendor
User
New User
Sign up
Page
Store
45
Customer
User
Visible
Show
Auction
Auction Master
Access
Interact
Auction Type
Retrieve
Auction
Manageme
nt
Auction
Type
Create
Auction
Save
Auction
46
Bid Master
Customer
VISIBLE
INTERACT
Show Bid
Bid
Managemen
t
Create Bid
Put
47
Payment
Gateway
Check
Validation
Is valid
is not valid
Payment
Is direct
Pay
Registration
is not direact
Party Pay
Thanks
Payment details
48
auction_catagor
yy
Create date
I_auto id
Interact
49
Auction Type
Interact
I_uid
i_bid
price
C_uid
id
C_pwd
Bid
User
management
management I_net
have
Interact
have
detail
i_uid
i_created by
Auction
Closing
management
History
i_bid id
I_auto
id
Inter
act
1
1
1
D_effect_to
D_create
date
M
d_creat
e date
I_
auto_id
D_effect_fro
m
1
m
1
Have
detai
ls
1
1
i_auto
id
auto_id
I_auctio
n id
Class Digram
50
51
What is ASP?
ASP is a program that runs at server Windows 2000/XP IIS plays the role of server.
IIS comes as a free component with Windows 2000/XP.
An ASP file is just the same as an HTML file; it can contain text, HTML, XML,
and scripts. Scripts in an ASP file are executed on the server and it has an
extension .asp.
In ASP Client-Server Model is implemented. A client computer requests some
needed information from Server computer. The Server returns this information and
the client acts on it. The client is a web browser on internet. With the internet the
server is a particular web server. A server is a computer that contains all the web
pages for a particular web site and has special software installed to send these web
pages to web browsers that request them.
52
.NET FRAMEWORK
When .NET first appeared, it introduced a small avalanche of new technologies.
There was a whole new way to write web applications (ASP.NET), a whole new
way to connect to databases (ADO.NET), new type safe languages (C# and VB
.NET), and a managed runtime (the CLR). Not least among these new technologies
was Windows Forms, a library of classes for building Windows applications.
ASP.NET is Microsofts next-generation technology for creating server side web
applications. Its built on the Microsoft .NET Framework, which is a cluster of
closely related technologies that revolutionize everything from database access to
distributed applications. ASP.NET is one of the most important components of
the .NET Framework its the part that enables you to develop high-performance
web applications.
53
ASP.NET
When the first version of the .NET Framework was released nearly a decade ago, it
was the start of a radical new direction in software design. Inspired by the best of
Java, COM, and the Web, and informed by the mistakes and limitations of previous
technologies, Microsoft set out to hit the reset button on their development
platform. The result was a set of surprisingly mature technologies that developers
could use to do everything from building a Windows application to executing a
database query, and a web-site-building tool known as ASP.NET.
Today, ASP.NET is as popular as ever, but its no longer quite as revolutionary.
And, although the basic functionality that sits at the heart of ASP.NET is
surprisingly virtually the same as it was ten years ago, Microsoft has added layers
of new features and higher-level coding abstractions. It has also introduced at least
54
ABOUT HTML
HTML is a computer language devised to allow website creation. These websites
can then be viewed by anyone else connected to the Internet. It is relatively easy to
learn, with the basics being accessible to most people in one sitting; and quite
powerful in HTML it allows you to create. It is constantly undergoing revision and
evolution to meet the demands and requirements of the growing Internet audience
under the direction of the W3C, the organization charged with designing and
maintaining the language.
56
57
58
60
SYSTEM DESIGN
62
63
OBJECTIVES OF DESIGN:
Since the simplification (i.e. the outside view) of a program should be as free as
possible aspects imposed by how the program will work (i.e. the inside view),
it is seldom a document from which coding can directly be done.
So design the gap between specifications and coding; taking the specifications,
deciding how the program will be organized, and the method it will used, in
sufficient detail as to be direct code able.
If the specifications call for a large or complex program (or both) then the design is
quite likely to work down through a no of levels. At each level, breaking the
implementation problem into a combination of smaller and simpler problems.
64
65
MODULARIZATION DETAILS
1. MODULAR DESIGN CONCEPTS
(i) Functional Independence: The concept of functional independence is a direct
outgrowth of modularity and the concepts of abstraction and information hiding.
The principle of information hiding suggests that modules be characterized by
design decisions that (each) hides from all others. In other words modules should
be specified and designed so that information (procedure and data) contained
within a module is inaccessible to other modules that have no need for such
information. Hiding implies that effective modularity can be achieved by defining
a set of independent modules that communicate with one another only that
information necessary to achieve software function. Abstraction helps to define the
procedure entities that make up the software. As data and procedure are hidden
from other parts of the software inadvertent errors introduced during modification
are less likely to propagate to other locations within the software.Functional
independence is achieved by developing modules with single-minded function
and an aversion to excessive interaction with other modules.
Advantages: Independent modules are easier to maintain (and test) because
secondary effects caused by design or code modification are limited, error
66
68
Client Review:
Client involvement is important in all aspects of design and development of every
successful project. To this end, client is encouraged to understand and input his
reviews throughout the project. Upon completion of each phase, a client review is
conducted. Reviews serve to verify that the program is instructionally sound, meets
established milestones and budget and reflects the expectations and goals of the
69
Control design:
The control design indicates necessary procedures which will ensure correctness of
processing, accuracy of data, timely output etc. This will ensure that the system is
functioning as per plan. One of the controls the access control is achieved by
UserID and password.
All the steps of system design are fully implemented in the project.
70
data
structures,
effect
communication
between
software
73
Admin Master
Attributes
i_autoid
Username
Password
Createdate
Datatype
int
Varchar(50)
Varchar(50)
datetime
Size
Datatype
Int
Int
Int
Int
Date
date
Varchar(100)
datetime
Size
Auction master
Attributes
i_autoid
Userid
starting_amount
Itemid
Startingdate
Endingdate
Description
CreateDate
Bid details
74
Datatype
int
int
int
int
datetime
Size
Datatype
int
int
datetime
Size
Datatype
int
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
datetime
Size
Bid master
Attributes
i_autoid
i_auctionid
Createdate
Contacts Details
Attributes
i_autoid
Name
Mobileno
Msg
Email
Createdate
75
Feedback details
Attributes
i_autoid
Name
Emailed
Subject
Feedback
Createdate
Datatype
int
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(100)
datetime
Size
Datatype
Int
Int
Varchar(50)
Varchar(50)
datetime
Size
76
Datatype
Int
Varchar(50)
Varchar(50)
datetime
Size
Datatype
Int
Int
Varchar(50)
Varchar(100)
bigint
Varchar(50)
Varchar(50)
Varchar(50)
datetime
Size
Datatype
int
Varchar(50)
Varchar(50)
Varchar(50)
Varchar(50)
datetime
Size
User Master
Attributes
i_autoid
username
password
Question
ans
Createdate
77
This page have many options like it shows the list of products in which a user can
bid or set auction , user can login from this page with the username and password
given to him by registration. If a new user wants to do a auction or bid he can sign
up from the sign up link.
78
From this page user can register himself to bid and to do a auction on the site. He
has to enter his full details like his bank account no and mobile no and other
important details he can select option of vendor customer or both at the time of
registration.
79
If a user forgot his password he/she can retrieve his password from this page.
He has to answer his security question and enter his username both information
should be correct if he/she wants to retrieve his/her password after clicking on
submits.
80
This page shows about the project all details summary of the project.
81
If a user wants to contact to the admin of the website he/she can fill the form his all
details like email id mobile no and description about himself.
82
If users wants to give a feedback about the site . his/her problems suggestions and
other type of feedback he/she can fill the feedback form and this information will
send to the admin of the site.
83
This is vendor account page after vendor login this page will show this page have
all details of user his mobile no bank account details address etc. he can edit his
details and he can start auction from the given categories by clicking on it. All
auctions by current user will also shows in this page.
84
85
86
When a user click on categories of product all products will show in this page in
that categories .like a user clicks on electronics then all related products to
electronics will shows in this page user can click on these items and then start
auction.
87
After selecting the item for bidding user will add details of auction from this page
like starting date ending date of the auction and starting price for bidding and
description of his product.
88
From this page admin of the site can login with his username and password. To
manage the site admin will use this page to login.
89
This page opens after admins login from this page side menus have all the options
for the admin , admin can add items delete existing items and updates items.
90
From this page admin can add categories and add items on added categories in
which a vendor can add auctions to the site and bidder can bid on the site.
91
This page shows admin all details of feedback which users and visitors sends to
admin by feedback form. Admin can manage all the feedback details .
92
When admin clicks on contact details from the side menus this page will open this
page shows all the details send by user then admin can manage it and contact to the
users and visitors of the website from this details.
93
This page shows all the running auctions on the site all details of auction last
bidder starting date ending date and price of bidding and maximum bid and bid
user etc. all the details will shows to admin from this page.
94
Coding
Data Context Class
using System;
using System.Collections.Generic;
using System.Web;
using System.Data;
using System.Data.SqlClient;
public class DataContext
{
SqlConnection con = new SqlConnection();
SqlCommand cmd = new SqlCommand();
SqlDataAdapter da = new SqlDataAdapter();
//SqlDataReader dr = new SqlDataReader();
public void Openconnection()
{
if (con.State == ConnectionState.Closed)
{
try
{
95
97
/// <summary>
/// Summary description for BusinessLogic
/// </summary>
public class BusinessLogic
{
DataContext obj_datacontext = new DataContext();
98
int i = obj_datacontext.executeNonquery(query);
string query1 = "select max(i_autoid) as i_autoid from tbl_usermaster ";
DataTable dt = obj_datacontext.getdataTable(query1);
int refid = Convert.ToInt32(dt.Rows[0]["i_autoid"].ToString());
string query2 = "INSERT INTO tbl_userdetails (ref_id, user_type, address,
name, mobile_no, Email_id, Account_no, bankname) VALUES ('"+refid+"',
'"+usertype+"', '"+address+"', '"+name+"', '"+mobile+"', '"+Email+"',
'"+accountno+"', '"+bankname+"')";
DataTable dt = obj_datacontext.getdataTable(query);
return dt;
}
public bool updateuserdetails(int uid, string accountno, string name, string
Email, long mobile, string bankname, string address)
{
100
int i = obj_datacontext.executeNonquery(query);
if (i > 0)
{
return true;
}
else
{
return false;
}
}
101
}
}
102
int i = obj_datacontext.executeNonquery(query);
if (i > 0)
{
return true;
}
else
{
return false;
}
DataTable dt = obj_datacontext.getdataTable(query);
return dt;
}
else
{
return false;
}
}
(tbl_biddetails.i_bidprice =
DataTable dt = obj_datacontext.getdataTable(query);
return dt;
}
else
{
dt = null;
return dt;
107
}
}
tbl_itemsdetailsmaster ON tbl_auctionmaster.itemid =
tbl_itemsdetailsmaster.i_autoid";
DataTable dt = obj_datacontext.getdataTable(query);
if (dt.Rows.Count > 0)
{
return dt;
}
else
108
int i = obj_datacontext.executeNonquery(query);
if (i > 0)
{
return true;
}
else
{
109
111
DataTable dt = obj_datacontext.getdataTable(query);
int refid = Convert.ToInt32(dt.Rows[0]["i_autoid"].ToString());
string query1 = "select * from tbl_userdetails where ref_id = '"+refid+"'";
DataTable dt1 = obj_datacontext.getdataTable(query1);
if (dt.Rows.Count > 0)
{
Session["username"] = dt.Rows[0]["username"].ToString();
Session["userid"] = Convert.ToInt32(dt.Rows[0]["i_autoid"].ToString());
113
}
114
116
117
}
protected void btnSubmit_Click(object sender, EventArgs e)
{
username=txtUsernamereg.Text.ToString();
password=txtpasswordreg.Text.ToString();
name=txtname.Text.ToString();
Email=txtEmailid.Text.ToString();
mobile= Convert.ToInt64(txtMobileno.Text.ToString());
accountno=txtAcountno.Text.ToString();
bankname=txtBankname.Text.ToString();
address = txtAddress.Text.ToString();
if(rbtCustomer.Checked==true)
{
118
}
else if(rbtVendor.Checked==true)
{
usertype="vendor";
}
if(obj_businesslogic.submitdetails(username,
password,name,Email,mobile,accountno,bankname
,usertype,address,ddlSecurityques.Text.ToString(),txtSecurityans.Text.ToString()))
{
LblRegistration.Text = "Registration sucessful";
}
119
}
protected void btnworks_Click(object sender, EventArgs e)
{
Response.Redirect("siteworking.aspx");
}
}
120
DataTable dt = obj_business.getitemsdetails(typeid);
dataitems.DataSource = dt;
dataitems.DataBind();
121
122
}
protected void btnSubmit_Click(object sender, EventArgs e)
{
int userid = Convert.ToInt32(Session["userid"].ToString());
int itemid = Convert.ToInt32(Request.QueryString["itemid"].ToString());
effectedfrom = Convert.ToDateTime(txteffectfrom.Text.ToString());
effectedto = Convert.ToDateTime(txteffectto.Text.ToString());
int starting_amount = Convert.ToInt32(txtStartingprice.Text.ToString());
if (obj_businesslogic.addauctiondetails(effectedfrom, effectedto, description,
userid, itemid, starting_amount))
{
lblmessage.Text = "AUCTION ADDED";
}
}
}
124
}
protected void btnSubmit_Click(object sender, EventArgs e)
{
string name = txtName.Text.ToString();
string email = txtEmailid.Text.ToString();
125
}
}
126
}
protected void btnSubmit_Click(object sender, EventArgs e)
{
string name = txtName.Text.ToString();
string emailid = txtEmailid.Text.ToString();
127
}
}
128
130
DataTable dt = obj_business.getitemtypes();
datalisttypes.DataSource = dt;
datalisttypes.DataBind();
131
133
DataTable dt = obj_business.getitemtypes();
datalisttypes.DataSource = dt;
datalisttypes.DataBind();
134
136
138
}
protected void btngetpass_Click(object sender, EventArgs e)
{
139
if (dt.Rows[0]["ans"].ToString() == txtans.Text.ToString())
{
lblpassword.Text = dt.Rows[0]["password"].ToString();
}
else
{
lblpassword.Text = "Error";
}
}
}
140
}
public string getSRC(object imgSRC)
{
DataRowView dRView = (DataRowView)imgSRC;
string ImageName = dRView["Itemimage"].ToString();
if (ImageName == "NoImage")
{
return ResolveUrl(@"~/itemimages/missing.jpg");
}
else
{
return ResolveUrl(ImageName);
}
}
txtAcountno.Text = dt.Rows[0]["account_no"].ToString();
txtAddress.Text = dt.Rows[0]["address"].ToString();
txtBankname.Text = dt.Rows[0]["bankname"].ToString();
txtEmailid.Text = dt.Rows[0]["email_id"].ToString();
144
}
protected void btnEdit_Click(object sender, EventArgs e)
{
txtAcountno.ReadOnly = false;
txtAddress.ReadOnly = false;
txtBankname.ReadOnly = false;
txtEmailid.ReadOnly = false;
txtMobileno.ReadOnly = false;
txtname.ReadOnly = false;
}
protected void btnUpdate_Click(object sender, EventArgs e)
{
string accountno = txtAcountno.Text.ToString();
string name = txtname.Text.ToString();
string Email = txtEmailid.Text.ToString();
long mobile = Convert.ToInt64(txtMobileno.Text.ToString());
145
}
else
{
Response.Write("error");
}
}
}
DataTable dt = obj_businesslogic.getitemtypes();
ddltypes.DataSource = dt;
ddltypes.DataTextField = "typename";
ddltypes.DataValueField = "i_autoid";
ddltypes.DataBind();
147
uploadtypeimage.PostedFile.SaveAs(ImageSaveURL);
uploadtypeimage.DataBind();
148
}
}
protected void btnsubmit_Click(object sender, EventArgs e)
{
if (uploaditemimage.PostedFile != null)
{
//save the destination path of the image
string mymap = MapPath("~/");
// save the image name into ImageName
string ItemImageName = uploaditemimage.FileName;
//save the full url of the image with folder name and image name
149
uploaditemimage.PostedFile.SaveAs(ImageSave);
uploaditemimage.DataBind();
if (obj_businesslogic.insertitemsdetails(i_refid,itemimagepath,itemname))
{
txtitemname.Text = "";
lblmsg.Text = "Item Inserted";
150
if (dt.Rows.Count > 0)
{
Session["adminid"] = Convert.ToInt32(dt.Rows[0]["i_autoid"].ToString());
Response.Redirect("additems.aspx?id=" + Convert.ToInt32(dt.Rows[0]
["i_autoid"].ToString()))
}
152
}
}
Auction Details
153
Contact Details
using System;
155
if (!Page.IsPostBack)
{
dt = obj_businesslogic.getContactdetails();
gvenquiry.DataSource = dt;
gvenquiry.DataBind();
156
}
}
157
Feedback Details
using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Data;
using System.Web.UI;
using System.Web.UI.WebControls;
}
}
159
167
style51
{
width: 355px;
168
173
177
179
181
.style50
{
width: 500px;
}
.style60
{
width: 164px;
}
182
185
188
Feedback Form
<%@ Page Title="" Language="C#" MasterPageFile="~/MasterPage.master"
AutoEventWireup="true" CodeFile="FeedbackForm.aspx.cs"
Inherits="FeedbackForm" %>
<%@ Register src="Sidemenus.ascx" tagname="Sidemenus" tagprefix="uc1" %>
<asp:Content ID="Content1" ContentPlaceHolderID="head" Runat="Server">
<style type="text/css">
.style1
{
width: 175px;
}
.style2
{
width: 181px;
}
.style4
{
width: 723px;
height: 29px;
}
.style5
194
201
206
210
216
219
223
226
230
233
ERROR HANDLING
An Exception occurs when a program encounter any unexpected
problems. Such as running out of memory or attempting to read from a
file that no longer exists. These problems are not necessarily caused by a
programming error but they mainly occur be cause of violation of
assumption that you might have made about the execution environment.
When a program encounters an exception the default behavior is to
throw the exception which generally translates to abruptly, terminating
the program after displaying an error message. But this is not a
characteristic of a robust application.
But the best way is to bindle the exception situations if possible,
gracefully recover from them. This is called exception handling.
I used try, catch, finally and throw in my project to handle the exception.
The Try Block:
Place the code that might cause exception in a try block. A typical try
block looks like this
Try
{
//Code that may cause exception
}
234
235
PARAMETER PASSING
Passing parameters from one page to another is a very common task in
Web development. There are still many situations in which you need to
pass data from one Web page to another. One of the simplest and most
efficient ways of passing parameters among pages is to use the
querystring. Unfortunately, packing data into the querystring via string
manipulations can quickly lead to cumbersome and often difficult to
maintain code, especially as the parameter list grows. To overcome this
problem, Ive used Session in my project. Session has no. of advantages
over the
QueryString some of them are described below
Query String is client side. But Session is server side.
The information or data stored in Query String is visible to every
one. But in Session it is hidden and cant be viewed easily.
Query String can store only a piece of information but in Session
we can store the more and more data.The Query String speed never
falls as the load increase because it stores a piece of information.
But on the other hand Session increase congestion as the loads
increase.
236
237
Validation Checks
(1) Date Validation: The validation on date data type has been
specified to
be of
unacceptable.
(2) Time validation: The validation on time data type has been
specified to be of
format is unacceptable.
(5) Number field validation: The field specified with number as then
their data- type will not accept character.
(6) User Authentication: When a Customer/user logs on to the
system to access data from tables and database, the Id & password
needs to be checked.
(7) Password change Validation: Only authorized users are allowed
to change the
238
TESTING
Test Case Execution
The workflow diagram below depicts the high level steps necessary to follow in
order to set up and execute test based on the Test Case Template.
Legend
1 - BII WG4 Test Case Template.doc. The Test Case template used to define and
set up the Test Case Description.
2 The test object specification provides a reference to the object subject to test
or if required, enter a copy of the object description excerpted from the object
description for the test object. When referenced, the reference should include at
least :
239
Acceptance
Needs
Testing
Requirements
System
Testing
Design
Integration
Testing
Code
Unit
240
Defect Testing:
241
243
Top-down testing:
This approach tests high levels of system before detailed components.
This is an appropriate when developing the system top-down likely to
show up structural design errors early (and therefore cheaply) has
advantage that a limited, working system available early on.
Validation
(as
distinct
from
verification)
can
begin
early.
Its
Bottom-up testing:
244
Stress testing:
Test system's ability to cope with a specified load (e.g. transactions
per second). Plan tests to increase load incrementally. Go beyond
design limit until system fails (this test particularly important for
distributed systems (check degradation as network exchange data).
Back-to-back testing:
245
Defect testing: A successful defect test is a test that causes the system
to behave incorrectly. Defect testing is not intended to show that a
program meets its specification. If tests don't show up defects it may
mean that the tests are not exhaustive enough.
Exhaustive testing is not always practicable. Subset has to be defined
(this should be part of the test plan, not left to the individual
programmer). Possible methods:
Test capabilities rather than components (e.g. concentrate on tests for
data loss over ones for screen layout).
>Test old in preference to new (users less effected by failure of new
capabilities).
>Test typical cases rather than boundary ones (ensure normal operation
works properly).
246
247
by
module
designer.
Particularly
important
when
OO
TESTING PROCESS
Best testing process is to test each subsystem separately, as we have
done in my project. Best done during implementation. Best done after
small sub-steps of the implementation rather than large chunks.
Once each lowest level unit has been tested, units are combined with
related
units
and
retested
in
combination.
This
proceeds
252
alert you to them and will not allow you to compile your program until
you correct them.
Semantic error
These errors occur in code that is correct according to rules of the
compiler, but that causes unexpected problems such as crashes or
hanging on execution. A good example is code that execute in a loop but
never exists the loop, either because the loop depends on the variable
whose values was expected to be something different than it actually was
253
Code Improvement
We make the Class Datacontext in our project which is useful for
reducing the code redundancy and make code consistency. Datacontext
function improves the code, when by using the Class Datacontext we
can create a connection with database, open the database, close the
database, dispose the database, Through the Datacontext Class can
access the datatable. In our project we can create the object of the
Datacontext then after creating the object we do not need to write the
functions, such as database connectivity, open connection, close
connection, dispose connection, get data table connection. Datacontext
Class make the code improvement in our project. Through the
Datacontext function we can insert, delete, update the records and
show the datatables and check the database so can say that the
Datacontext function is more useful and make code improve.
255
256
Output Registration
257
Input Login
258
Output Login
259
Contact Input
260
Contact Output
261
Feedback Input
262
Feedback Output
263
Admin login
264
265
266
267
268
269
LIMITATION OF PROJECT
Only registered users can do a auction in the websites and registered users can
place bid on website.
User can only do auction on given categories.
User cant bid lower then last bid.
Users can not create his own series of categories.
270
271
Biblography
1. An
Integrated
Approach
to
Software
Engineering:
PANKAJ JALOTE
2. Professional Active Server Pages 4.0: Appress
3. HTML: Sams Teach Your Self: Dick Oliver
4. SQL Server 2008; Database Design Study Guide: Kevin
Hough
5. Structured Analysis and Design (CS-05) of IGNOU
6. http://webdev.wrox.co.uk
272