Академический Документы
Профессиональный Документы
Культура Документы
com
INTRODUCTION
Page
1
ClassifiedsOnline.com
INTRODUCTION
ClassifiedsOnline is being launched because a need for a destination where
the local community could come together and help each other is seen.
Community members within a city can come here to find an apartment to live
in, sell their old car, or music system, promote their small business, find a
life partner, join a salsa class, find people who share their interests, get an
audience for a local event, trade any item that they might want or have to
offer and make new friends while doing all of the above.
ClassifiedsOnline
fulfills the requirements of an individual related to classifieds (situation
vacant / and help each other. A person can search for a house on rent
without the buy n sell / … ). It’s a destination where the local community
could come together involvement of a property dealer and save the extra
money which he/she would have paid as commission. Moreover, the person
do all this in a single click of the mouse button i.e, searching / traversing &
posting advertisements etc. can be done while sitting at home.
Page
2
ClassifiedsOnline.com
system.
Further, the system permits automatic evaluation of potential viewers to
screen posters whose information does not match minimum criteria. It’s a
system for selectively displaying ad listings to potential viewers and for
obtaining ad viewer profile information associated with said potential viewers
which is provided to ad posters of ad described in said ad listings.
Page
3
ClassifiedsOnline.com
OBJECTIVE
• Provide a user friendly environment so that the ad posters can post their
ads easily and free of cost.
• Banner Advertising
• Button Advertising
Page
4
ClassifiedsOnline.com
Page
5
ClassifiedsOnline.com
PHASES:
The concept is further developed to describe how the business will operate
once the approved system is implemented, and to assess how the system will
impact the administrator and user privacy. To ensure the products and /or
services provide the required capability on-time and within budget, project
resources, activities, schedules, tools, and reviews are defined. Additionally,
security certification and accreditation activities begin with the identification
of system security requirements and the completion of a high level
vulnerability assessment.
Page
6
ClassifiedsOnline.com
The physical characteristics of the system are designed during this phase.
The operating environment is established, major subsystems and their inputs
and outputs are defined, and processes are allocated to resources.
Everything requiring user input or approval must be documented and
reviewed by the user. The physical characteristics of the system are specified
and a detailed design is prepared. Subsystems identified during design are
used to create a detailed structure of the system. Each subsystem is
partitioned into one or more design units or modules. Detailed logic
specifications are prepared for each software module.
The detailed specifications produced during the design phase are translated
into hardware, communications, and executable software. Software shall be
unit tested, integrated, and retested in a systematic manner. Hardware is
assembled and tested.
The disposition activities ensure the orderly termination of the system and
preserve the vital information about the system so that some or all of the
information may be reactivated in the future if necessary. Particular
emphasis is given to proper preservation of the data processed by the
system, so that the data is effectively migrated to another system or
archived in accordance with applicable records management regulations and
policies, for potential future access.
Page
8
ClassifiedsOnline.com
SDLC Objectives
Key Principles
Page
9
ClassifiedsOnline.com
Page
10
ClassifiedsOnline.com
The Project Manager has responsibility for the success of the project
and works through a project team and other supporting organization
structures, such as working groups or user groups, to accomplish the
objectives of the project. Regardless of organizational affiliation, the Project
Manager is accountable and responsible for ensuring that project activities
and decisions consider the needs of all organizations that will be affected by
the system. The Project Manager develops a project charter to define and
clearly identify the lines of authority between and within the agency’s
executive management, program sponsor, (user/customer), and developer
for purposes of management and oversight.
Page
11
ClassifiedsOnline.com
REQUIREMENTS ANALYSYS
Page
13
ClassifiedsOnline.com
The user gets into the system using user name and a unique
password. Each user has his own accessibility permission to accomplish his
task flawlessly. The administrator also has a ID and password to get access
to the system so that no unauthorized person is able to keep an eye on the
working of the complete system.
Page
14
ClassifiedsOnline.com
Requirement Analysis
At the heart of system analysis is a detailed understanding of all
important facets of business area under investigation. (For this reason, the
process of acquiring this is often termed the detailed investigation) Analyst,
working closely with the employees and managers, must study the business
process to answer these key questions:
Interview
Questionnaires
Record inspection
On-site observation
Page
15
ClassifiedsOnline.com
IDENTIFICATION OF NEED
In the world we are growing for globalization day by day with the
development in IT resources and advancement, by using latest technologies
it is possible to access any information of any type while sitting at home.
Survival on manual system is difficult that is why computerized systems are
more in demand. The modules should be complete database driven and
interactive that should provide the proper information regarding the online
classifieds and yellow pages system.
Page
16
ClassifiedsOnline.com
In order to reduce the time, there is a need for computerized system that
can retrieve data, insert data, update existing data or delete existing data.
These modules are developed wit the aim of reducing time, reducing
manpower, reducing cost so that the records can be easily maintained.
The volume of work and complexity are increasing year by year. This
system reduces complexity and workload.
PRELIMINARY INVESTIGATION
Request clarification
Feasible Study
Request approval
Many requests from employees and users in the organization are not
clearly defined. Therefore, it becomes necessary that project request must
be examined and clarified properly before considering systems
investigation.
The feasibility study is carried out by a small group of people who are
familiar with information system techniques, understand the parts of the
business or organization that will be involved or affected by the project, and
are skilled in the system analysis and design process.
• Request Approval:
It is not necessary that all request projects are desirable or feasible. Some
organizations receive so many projects request from employees that only a
Page
17
ClassifiedsOnline.com
few of them can be purchased. However, those projects that are feasible and
desirable should be put into a schedule.
In some cases, development can start immediately, although usually
system staff members are busy on other ongoing projects. When such
situation arises, management decides which projects are more urgent and
schedule them accordingly. After a project request is approved, its cost,
priority, completion time and personal requirements are estimated and used
to determine whether to add it to any existing project list. Later on, when the
other projects have been completed, the proposed application development
can be initiated.
Analysis is a process of studying a problem and to find the best
solution to that problem. System analysis gives us the target for the design
and the implementation. Analysis is one phase, which is important phase for
system development life cycle. System development is a problem solving
techniques. Analysis involves interviewing the client and the user. Three
people and the existing documents about the current mode of operation are
the basic source of information for the analyst.
Analysis is the process of studying a problem to find the best solution to that
problem. System analysis gives us the target for the design and the
implementation. Analysis is one phase of the very important phase of the
system development life cycle. System development is a problem solving
techniques. Analyses involve interviewing the client and the user. These
people and the existing document about the current mode of operation are
the basic source of information for the analyst.
Page
18
ClassifiedsOnline.com
In fact some CASE tools remain “point solution:” That is, a tool is used to
assist in a particular software engineering activity (e.g. analysis modeling)
Page
19
ClassifiedsOnline.com
but does not directly communicate with other tools, is not tied into a project
database, is not part of an integrated CASE environment (l-CASE). Although
this situation is not ideal, a CASE tool can be used quite effectively, even if it
is a point solution.
At the low end of the integration spectrum is the individual (point solution)
tool. When individual tools can provide tools provide facilities for data
exchange, the integration level is improved slightly. Such tools produce
output in a standard format that should be compatible with other tools that
can read the format. In some cases, the builder of complementary CASE
tools work together to form a bridge between the tools (e.g. an analysis and
design tool that is coupled with a code generator). Using this approach, the
team develops, synergy between the tools separately. Single source
integration occurs when a single CASE tools vendor integrates a number of
different tools and sells them as a package.
Feasibility Study
Page
20
ClassifiedsOnline.com
1. Economic Feasibility :
2. Technical Feasibility :
3. Operational Feasibility:
Economical feasibility
Page
21
ClassifiedsOnline.com
sophisticated and don’t needs extra components to load the software. Hence
the organization can implement the new system without any additional
expenditure. Hence, it is economically feasible.
• Software Cost :
ASP.NET : 15000/-
• Manpower Cost :
Team cost :
25000/-
System Cost :
40,000/-
Total Cost :
100000/-
Technical Feasibility
Page
22
ClassifiedsOnline.com
Tools Used :
3) SILVERLIGHT
Duration of Project:-
Page
23
ClassifiedsOnline.com
Time Duration
Operational Feasibility
• User support.
Page
24
ClassifiedsOnline.com
Page
25
ClassifiedsOnline.com
Page
26
ClassifiedsOnline.com
• Distributed Projects.
Local Area Network projects are those projects where application has
to be incorporated in the Local area network of the client i.e within its
premises only. In case of LAN, server is not remotely located and client
accesses the application through the network. Here the question of platform
independence does not arise and we can use the technologies like: Visual
Studio C#, Fox pro, D2k or C, C++, etc.
Page
27
ClassifiedsOnline.com
PLATFORM
(Technologies/Tools)
Page
28
ClassifiedsOnline.com
Introduction to C#
History of C#
During the development of the .NET Framework, the class libraries
were originally written using a managed code compiler system called Simple
Managed C (SMC) James Gosling, who created the Java programming
language in 1994, and Bill Joy, a co-founder of Sun Microsystems, the
proprietor of Java, called C# an "imitation" of Java Microsoft had considered
keeping the name "Cool" as the final name of the language, but chose not to
do so for trademark reasons. By the time the .NET project was publicly
announced at the July 2000 Professional Developers Conference, the
language had been renamed C#, and the class libraries and ASP.NET runtime
had been ported to C#.
Page
29
ClassifiedsOnline.com
C# Features
Some of the important features of c# are as follows:
• Simplicity
• Orientation
• Platform Independence
• Security
• High Performance
• Multi Threading
• Dynamic linking.
• Garbage Collection.
Why C# is Independent?
Page
30
ClassifiedsOnline.com
Version 3.5 of the .NET Framework was released on 19 November 2007, but
it is not included with Windows Server 2008. As with .NET Framework 3.0,
version 3.5 uses the CLR of version 2.0. In addition, it installs .NET
Framework 2.0 SP1, (installs .NET Framework 2.0 SP2 with 3.5 SP1) and
Page
31
ClassifiedsOnline.com
.NET Framework 3.0 SP1 (installs .NET Framework 3.0 SP2 with 3.5 SP1),
which adds some methods and properties to the BCL classes in version 2.0
which are required for version 3.5 features such as Language Integrated
Query (LINQ). These changes do not affect applications written for version
2.0, however
Page
32
ClassifiedsOnline.com
ASP.NET:
Page
33
ClassifiedsOnline.com
.NET:
.NET pages, known officially as "web forms", are the main building
block for application development. Web forms are contained in files with an
".aspx" extension; these files typically contain static (X)HTML markup, as
well as markup defining server-side Web Controls and User Controls where
the developers place all the required static and dynamic content for the web
page. Additionally, dynamic code which runs on the server can be placed in a
page within a block <% -- dynamic code -- %> which is similar to other web
development technologies such as PHP, JSP, and ASP, but this practice is
generally discouraged except for the purposes of data binding since it
requires more calls when rendering the page
Code-behind model
, for example, to focus on the design markup with less potential for
disturbing the programming code that drives it. This is similar to the
Page
34
ClassifiedsOnline.com
User controls
Custom Controls
Programmers can also build Custom controls for ASP.NET applications. Unlike
User controls, these controls don't have an ASCX markup-file, having all their
code compiled into a DLL-file. Such Custom controls can be used across
multiple web-applications and Visual Studio projects (which is not allowed
with User controls). By using a Register directive, the control is loaded from
the DLL.
Rendering technique
Actual requests for the page are processed through a number of steps. First,
during the initialization steps, an instance of the page class is created and
the initialization code is executed. This produces the initial control tree which
is now typically manipulated by the methods of the page in the following
steps. As each node in the tree is a control represented as an instance of a
Page
35
ClassifiedsOnline.com
class, the code may change the tree structure as well as manipulate the
properties/methods of the individual nodes. Finally, during the rendering step
a visitor is used to visit every node in the tree, asking each node to render
itself using the methods of the visitor. The resulting HTML output is sent to
the client.
After the request has been processed, the instance of the page class is
discarded and with it the entire control tree. This is usually a source of
confusion among novice ASP.NET programmers that rely on class instance
members that are lost with every page request/response cycle.
State management
ASP.NET applications are hosted by a web server and are accessed using the
stateless HTTP protocol. As such, if an application uses stateful interaction, it
has to implement state management on its own. ASP.NET provides various
functions for state management. Conceptually, Microsoft treats "state" as
GUI state; problems may arise if an application needs to keep track of "data
state", for example, a finite state machine which may be in a transient state
between requests (lazy evaluation) or which takes a long time to initialize.
Application state
Page
36
ClassifiedsOnline.com
Session state
In Process Mode
When using In Process Mode, the session variables are maintained
within the ASP.NET process. This is the fastest way; however, in this
mode the variables are destroyed when the ASP.NET process is
recycled or shut down.
ASPState Mode
In this mode, ASP.NET runs a separate Windows service that maintains
the state variables. As state management happens outside the
ASP.NET process and .NET Remoting must be utilized by the ASP.NET
engine to access the data there is a negative impact on performance
compared to the In Process mode. This mode allows an ASP.NET
application to be load-balanced and scaled across multiple servers and
because the state management service runs independently of
ASP.NET, the session variables can persist across ASP.NET process
shutdowns. However, since session state server runs as a single
instance it is still a single point of failure so far as session state is
concerned. The session-state service cannot be load balanced and
there are restrictions on types that can be stored in a session variable.
SqlServer Mode
In this mode, the state variables are stored in a database allowing
session variables to be persisted across ASP.NET process shutdowns.
The main advantage of this mode is that it allows the application to
Page
37
ClassifiedsOnline.com
View state
The main use for this is to preserve form information across postbacks. View
state is turned on by default and normally serializes the data in every control
on the page regardless of whether it is actually used during a postback. This
behavior can (and should) be modified, however, as View state can be
disabled on a per-control, per-page, or server-wide basis.
Page
38
ClassifiedsOnline.com
Server-side caching
ASP.NET offers a "Cache" object that is shared across the application and can
also be used to store various objects. The "Cache" object holds the data only
for a specified amount of time and is automatically cleaned after the session
time-limit elapses
Directory structure
App_Browsers
holds site-specific browser definition files.
App_Code
This is the "raw code" directory. The ASP.NET server automatically
compiles files (and subdirectories) in this folder into an assembly
which is accessible in the code of every page of the site. App_Code will
typically be used for data access abstraction code, model code and
business code. Also any site-specific http handlers and modules and
web service implementation go in this directory. As an alternative to
using App_Code the developer may opt to provide a separate
assembly with precompiled code.
Page
39
ClassifiedsOnline.com
App_Data
default directory for databases, such as Access mdb files and SQL
Server mdf files. This directory is usually the only one with write
access for the application.
App_LocalResources
Contains localized resource files for individual pages of the site. E.g. a
file called CheckOut.aspx.fr-FR.resx holds localized resources for the
French version of the CheckOut.aspx page. When the UI culture is set
to french, ASP.NET will automatically find and use this file for
localization.
App_GlobalResources
Holds resx files with localized resources available to every page of the
site. This is where the ASP.NET developer will typically store localized
messages etc. which are used on more than one page.
App_Themes
holds alternative themes of the site.
App_WebReferences
holds discovery files and WSDL files for references to web services to
be consumed in the site.
Bin
Contains compiled code (.dll files) for controls, components, or other
code that you want to reference in your application. Any classes
represented by code in the Bin folder are automatically referenced in
your application.
Page
40
ClassifiedsOnline.com
Performance
The ASPX and other resource files are placed in a virtual host on an Internet
Information Services server (or other compatible ASP.NET servers; see Other
Implementations, below). The first time a client requests a page, the .NET
framework parses and compiles the file(s) into a .NET assembly and sends
the response; subsequent requests are served from the DLL files. By default
ASP.NET will compile the entire site in batches of 1000 files upon first
request. If the compilation delay is causing problems, the batch size or the
compilation strategy may be tweaked.
Ajax
and behavior of the existing page. The use of Ajax techniques has led to an
increase in interactive or dynamic interfaces on web pages. Data is usually
retrieved using the XMLHttpRequest object. Despite the name, the use of
XML is not actually required, nor do the requests need to be asynchronous.[2]
Like DHTML and LAMP, Ajax is not a technology in itself, but a group of
technologies. Ajax uses a combination of HTML and CSS to mark up and style
information. The DOM is accessed with JavaScript to dynamically display, and
to allow the user to interact with the information presented. JavaScript and
the XMLHttpRequest object provide a method for exchanging data
asynchronously between browser and server to avoid full page reloads.
Server-side pages are contained in PHP or server-side scripting
In the 1990s, web browsers and web sites were based on static pages and
each user action required that the page be re-loaded from the server (or a
new page loaded). This could slow down user interaction considerably.
Page
42
ClassifiedsOnline.com
The term "Ajax" was coined in 2005 by Jesse James Garrett. However, a
patent application covering this type of user interface was filed on September
3, 2003, thus predating the term itself by two years. This application resulted
in US Patent #7,523,401 being issued to Greg Aldridge of Kokomo, IN.
On April 5, 2006 the World Wide Web Consortium (W3C) released the first
draft specification for the object in an attempt to create an official web
standard.
The ASP.NET Web Site Administration Tool is a utility provided along with
Microsoft Visual Studio which assists in the configuration and administration
of a website created using Microsoft Visual Studio 2005 and later versions.
History
The Web Site Administration tool was first introduced with ASP.NET 2.0 along
with ASP.NET Microsoft Management Console (MMC) Snap-in.
Page
43
ClassifiedsOnline.com
Features
The ASP.NET Web Site Administration tool is a multi-tabbed utility which has
the following features:
The security tab is used to create users and roles, group users under
different roles and assign access rules either at the role-level or user-level.
When the Web site administration tool is opened to modify the existing
settings, a new database is created in the App_Data folder of the application.
This database stores ASP.NET membership-related information. The name of
the database created is ASPNETDB by default.
Page
44
ClassifiedsOnline.com
amount of time, cost and manpower. However, a major drawback of this tool
is that access rules could be defined only at the folder-level and not at the
page-level.
The Provider tab is used to specify the database provider for the ASPNETDB
database used to store ASP.NET membership and role information. The
security page does not appear unless and until the database provider is
specified in the Providers tab. An SQL Data provider is generally used, but
Oracle Data providers are also used in case of Oracle databases. The provider
alloows the user the option of choosing a single database to store all data
related to the ASP.NET Website Administration tool or different databases for
each purpose.
Apart from these tabs, there are a number of other features and components
associated with the ASP.NET Web Administration tool. The ASP.NET
Configuration APIs which the ASP.NET Web Site Administration tool makes
use of to access and modify the security and application settings in the
Web.config file is one of them.
Programmatic access
Page
45
ClassifiedsOnline.com
Versions
Page
46
ClassifiedsOnline.com
History
The first Microsoft web server was a research project at European Microsoft
Windows NT Academic Centre (EMWAC), part of the University of Edinburgh
in Scotland, and was distributed as freeware. However since the EMWAC
server was unable to scale sufficiently to handle the volume of traffic going to
microsoft.com, Microsoft was forced to develop its own webserver, IIS.
IIS 4.0 dropped support for the Gopher protocol and was released as part of
an "Option Pack" for Windows NT 4.0.]
The current shipping version of IIS is 7.5 for Windows 7 and Windows Server
2008 R2, 7.0 for Windows Vista and Windows Server 2008, 6.0 for Windows
Server 2003 and Windows XP Professional x64 Edition, and IIS 5.1 for
Windows XP Professional.
IIS 7.0 on Vista does not limit the number of allowed connections as IIS on
XP did, but limits concurrent requests to 10 (Windows Vista Ultimate,
Business, and Enterprise Editions) or 3 (Vista Home Premium). Additional
requests are queued, which hampers performance, but they are not rejected
as with XP.
Page
47
ClassifiedsOnline.com
IIS 6.0 added support for IPv6. A FastCGI module is also available for IIS
5.1, IIS 6.0 and IIS 7.
IIS 7.0 (Windows Vista/2008) has better performance than IIS 5.1 (Windows
XP) because it relies on the HTTP.SYS kernel driver.
Security
Earlier versions of IIS were hit with a number of vulnerabilities, chief among
them CA-2001-19 which led to the infamous Code Red worm; however, both
versions 6.0 and 7.0 currently have no reported issues with this specific
vulnerability. In IIS 6.0 Microsoft opted to change the behaviour of pre-
installed ISAPI handlers, many of which were culprits in the vulnerabilities of
4.0 and 5.0, thus reducing the attack surface of IIS. In addition, IIS 6.0
added a feature called "Web Service Extensions" that prevents IIS from
launching any program without explicit permission by an administrator.
By default IIS 5.1 and lower run websites in-process under the SYSTEM
account, a default Windows account with 'superuser' rights. Under 6.0 all
request handling processes have been brought under a Network Services
account with significantly fewer privileges so that should there be a
vulnerability in a feature or in custom code it won't necessarily compromise
the entire system given the sandboxed environment these worker processes
run in. IIS 6.0 also contained a new kernel HTTP stack (http.sys) with a
stricter HTTP request parser and response cache for both static and dynamic
content.
There are various built-in security features from Microsoft. Many companies
offer third-party security tools and features, also known as "Web App
Firewalls, or Web Application Firewalls." The advantage of such tools is that
Page
48
ClassifiedsOnline.com
IIS Features
Security Features
Authentication changed slightly between IIS 6.0 and IIS 7, most notably in
that the anonymous user which was named "IUSR_{machinename}" is a
built-in account in Vista and future operating systems and named "IUSR".
Notably, in IIS 7, each authentication mechanism is isolated into its own
module and can be installed or uninstalled.
IIS Extensions
IIS releases new feature modules between major version releases to add new
functionality. The following extensions are available for IIS 7:
Page
50
ClassifiedsOnline.com
Page
51
ClassifiedsOnline.com
BACK-END
• Centralization of database.
• Client Server Technology.
• Security.
• Normalization of Data Base.
• Relationship.
• Transaction Processor.
• It gives some internet related features.
Wether you are working on LAN projects or Distributed projects, there are
two sides of it:-
• Front End
• Back End
Front End remains on client side. Front end is made for end user who uses
our application. Basically in front end, our input-output forms reside which
takes the input from the client and gives output back to client.
What is a database?
• RDBMS
• DBMS
SQL Server Express is also available only as the core database engine or as
mentioned above in the integrated edition with management tools. A SQL
Server Express with Advanced Services edition (first introduced relatively late
in Q2 2006 compared to the original release) is also available with a reduced-
functionality version of SQL Server Reporting Services and full-text search
capabilities.
Page
54
ClassifiedsOnline.com
• High Availability
• Controlled Availbility
sql can selectively control the availability of data at the database level
& sub database level. E.g. an administrator can disallow use of a specific
application .Data can be reloaded without affecting other application.
Page
55
ClassifiedsOnline.com
• Manageable Security
Page
56
ClassifiedsOnline.com
• Portability
sql software is compatible to work under different operating system &
same on all system. Applications developed on sql can be used on virtually
any system with little or no more modification.
• Compatibility
sql software is compatible with industry standards, including most
industry standard operating systems. Applications developed on sql can be
used on virtually any system with little or no modification.
• Connectivity
sql software allows different types of computers & operating system to
share information in networks.
SQL Server Management Studio is a tool included with Microsoft SQL Server
2005 and later versions for configuring, managing, and administering all
components within Microsoft SQL Server. The tool includes both script editors
and graphical tools which work with objects and features of the server.
Page
57
ClassifiedsOnline.com
Database Models
There are three kinds of database models:-
Page
58
ClassifiedsOnline.com
What is Middle-Ware?
Page
59
ClassifiedsOnline.com
SOFTWARE
REQUIREMENT
SPECIFICATION
Page
60
ClassifiedsOnline.com
Some of the difficulty is due to the scope of this phase. The software
project is initiated by the client’s needs. In the beginning these needs are in
the minds of various people in the client organization. The requirement
analyst has to identify the requirements by talking to these people and
understanding their needs. In situations where the software is to automate a
currently manual process, most of the needs can be understood by observing
the current practice.
The SRS is a means of translating the ideas in the minds of the clients
(the input), into formal document (the output of the requirements phase).
Thus, the output of the phase is a set of formally specified requirements,
which hopefully are complete and consistent, while the input has none of
these properties.
Page
61
ClassifiedsOnline.com
Page
62
ClassifiedsOnline.com
Details that is not shown on the different levels of the data flow
diagram such as volumes, timing, frequency, etc. is shown on supplementary
diagrams or in the data dictionary. For example, data store contents may be
shown in the data dictionary.
Page
63
ClassifiedsOnline.com
• Process
A process transforms data values. The lowest level processes are pure
functions without side effects. An entire data flow graphics high level
process.
Graphical representation:
Graphical Representation:
• Data flows
Graphical Representation:
• Actors
An actor is active object that drives the data flow graph by producing
or consuming values.
• Data store
Page
64
ClassifiedsOnline.com
A data store is a passive object with in a data flow diagram that stores
data for later access.
Graphical Representation:
• External Entity
Graphical Representation:
• OutPut Symbol
Graphical Representation:
ADMINISTRATOR
Page
66
ClassifiedsOnline.com
Search View
Contact Contacts
s
Viewer
Contacts
View Send
Search Responses
Ads Response
Ads
View
Respons
Ads Post
es
Ads
Category
Edit Login Poster
Ads Process
New Poster
Maintain
Category View Registered Users
Registere
d Users
Send
Administrator Notificatio
n
Show
Banner
Ads
Maintain
Advertisers’
Details
Advertiser’s
Details
Page
67
ClassifiedsOnline.com
Entity Relationship
diagrams
E - R DIAGRAM
Page
68
ClassifiedsOnline.com
Details that is not shown on the different levels of the data flow
diagram such as volumes, timing, frequency, etc. is shown on supplementary
diagrams or in the data dictionary. For example, data store contents may be
shown in the data dictionary.
Title
Page
69
ClassifiedsOnline.com
Category
id
Category
description
Page
70
ClassifiedsOnline.com
Data Dictionary
Page
71
ClassifiedsOnline.com
Page
72
ClassifiedsOnline.com
Pages of the
system.
AD’s Advertisements In This is a Data
DFD’s Store that stores
different AD’s
posted by the
Poster.
Category - - In This is a Data
DFD’s Store that stores
different
Categories of AD’s
maintained by the
Administrator.
Registered - - In This is a Data
Users DFD’s Store that keeps a
list of users.
Responses - - In This is a Data
DFD’s Store used to store
the viewer’s
responses.
Advertiser’s - - In This is a Data
Details DFD’s Store.
Page
73
ClassifiedsOnline.com
and AD Entities.
Page
74
ClassifiedsOnline.com
1. Login :
In this module Poster enter the User id and
password is checked and only valid user id and
password will get entry into member’s zone. This
is a security feature to avoid entry of unauthorized
users.
2. Registration Process:
3. Poster :
Through this module a poster can post a new ad,
update ad details. He can update including user
name and password and search and shortlist the
Viewers, check the status of advertisement’s
response. He can reply to the viewers In short this
Page
75
ClassifiedsOnline.com
6. Administrator:
7. Log Out:
To provide functionality to logout your id and
return to home page.
Page
76
ClassifiedsOnline.com
Process Logic
Page
77
ClassifiedsOnline.com
Layered Architecture
Page
78
ClassifiedsOnline.com
• Login Process:
• Post AD Process:
Page
79
ClassifiedsOnline.com
Page
80
ClassifiedsOnline.com
Page
81
ClassifiedsOnline.com
DATABASE DESIGN
Page
82
ClassifiedsOnline.com
DATABASE DESIGN
DATA STRUCTURES:
This part of the Design consists the overall database schema or we
can say that tables which consists various types of records. Table of aa
database consists attributes, entities, tuples for storing and manipulating
records
Some of the tables are as follows:
Page
83
ClassifiedsOnline.com
• art table: This table maintains details of the art and craft
of the
Advertisements who is a registered /authorized
user of the
system.
Page
84
ClassifiedsOnline.com
Page
85
ClassifiedsOnline.com
Coding
Page
86
ClassifiedsOnline.com
Page
87
ClassifiedsOnline.com
SYSTEM TESTING
Here the System testing involved is the most widely used testing
process consisting of five stages as shown in the figure. In general, the
sequence of testing activities is component testing, integration testing, and
then user testing. However, as defects are discovered at any one stage, they
require program modifications to correct them and this may require other
stages in the testing process to be repeated.
Page
88
ClassifiedsOnline.com
Unit testing
Module
testing
Sub-system
testing
System
testing
Acceptance
testing
Testing is vital to the success of the system. System testing makes a logical
assumption that if the parts of the system are correct, the goal will be
successfully achieved. In adequate testing or non-testing leads to errors that
may not appear until months or even years later (Remember the New York
three day power failure due to a misplaced ‘Break’ statement).
Page
89
ClassifiedsOnline.com
A small error can conceivably explode into a much larger problem. Effective
testing early in the process translates directly into long term cost savings
from a reduced number of errors.
Another reason for system testing is it’s utility as a user oriented vehicle
before implementation. The best program is worthless if it does not meet the
user requirements. Unfortunately, the user’s demands are often
compromised by efforts to facilitate program or design efficiency in terms of
processing time or design efficiency.
Thus in this phase we went to test the code we wrote. We needed to know if
the code compiled with the design or not? Whether the code gave the desired
outputs on given inputs? Whether it was ready to be installed on the user’s
computer or some more modifications were needed?
application.
PSYCHOLOGY OF TESTING
Page
91
ClassifiedsOnline.com
TESTING OBJECTIVES:
LEVELS OF TESTING
Page
92
ClassifiedsOnline.com
Client Needs
Acceptance Testing
Requirements
System Testing
Design
Integration Testing
Code
Unit Testing
Unit testing
Integration Testing
SYSTEM TESTING
Here the entire software system is tested. The reference document for
this process is the requirements document, and the goal is to see if software
meets its requirements.
Here entire ‘HRRP’ has been tested against requirements of project
and it is checked whether all requirements of project have been satisfied or
not.
ACCEPTANCE TESTING
Page
94
ClassifiedsOnline.com
This is a unit testing method, where a unit will be taken at a time and
tested thoroughly at a statement level to find the maximum possible errors.
I tested step wise every piece of code, taking care that every
statement in the code is executed at least once. The white box testing is also
called Glass Box Testing.
Page
95
ClassifiedsOnline.com
This testing method considers a module as a single unit and checks the
unit at interface and communication with other modules rather getting into
details at statement level. Here the module will be treated as a block that will
take some input and generate output. Output for a given set of input
combinations are forwarded to other modules.
Black-box test are designed to uncover errors functional requirement
without regard to the internal workings of a program. Black-box testing
techniques focus on the information domain of the software, deriving test
cases by partitioning the input and output domain of a program in manner
that provides through test coverage. The black-box test is used to
demonstrate that software functions are operational, that input is properly
produced, and that the integrity of external information are maintained. A
black-box test examines some fundamental aspect of a system with little or
no regard for the integral logical structure of the software.
A strategy for software testing may also be viewed in the context of the
spiral. Unit testing begins at the vortex of the spiral and, concentrates on
each unit, component of the software as implemented in source code. Testing
progresses moving outward along the spiral to integration testing, where the
focus is on designed the construction of the software architecture. Taking
another turn outward on spiral, we encounter validation testing, where
requirements established as part of software requirements analysis are
validated against the software that has been constructed. Finally, we arrive
at system testing, where the software and other system elements are tested
Page
96
ClassifiedsOnline.com
as a whole. To test computer software, we spiral out along stream lines that
broaden the scope of testing with each turn.
System Testing
Validation Testing
Integration Testing
Validation testing
Page
97
System Engineering
Design Code
ClassifiedsOnline.com
System Security
Evaluatio
Software n
Configuration
Test Results
Error
Error
Testing Page
Rate Data Debug
98
ClassifiedsOnline.com
Expected Results
Reliability
Model
Test Configuration
Predicated Reliability
Correction
Screen shots
Page
99
ClassifiedsOnline.com
Page
100
ClassifiedsOnline.com
MAIN PAGE
Page
101
ClassifiedsOnline.com
Page
102
ClassifiedsOnline.com
Page
103
ClassifiedsOnline.com
Page
104
ClassifiedsOnline.com
Page
105
ClassifiedsOnline.com
Project Scheduling
Page
106
ClassifiedsOnline.com
PROJECT SCHEDULING
Once we have the estimates of the effort and time requirement for the
different phases, a schedule for the project can be prepared. This
schedule will be used later to monitor the progress of the project.
Page
107
ClassifiedsOnline.com
GANTT CHART
SRS Completion
Requirements
Finalization
System Design
Detail Design
Coding
Unit Testing
Test Plan
Testing
Page
108
ClassifiedsOnline.com
Time Duration of
Milestones
the Activity
SYSTEM SECURITY
Page
109
ClassifiedsOnline.com
SYSTEM SECURITY
Introduction
One might think that there is a little reason to be concerned about security in
an intranet. After all, by definition an intranet is internal to ones’
organization; outsider can not access it. There are strong arguments for the
position that an intranet should be completely open to its users, with little or
no security. One might not have considered ones’ intranet on any other light.
On the other hand, implementing some simple, built-in security measures in
ones’ intranet can allow one to provide resources one might not have
considered possible in such context. For example, one can give access to
some Web Pages to some people without them available to oner entire
customer base, with several kinds of authentication.
There are basically two types of security associated with this system:
1. Physical security:-
Damage due to natural causes like earth tremor, flooding, water logging,
fire hazards, atmospheric or environmental conditions etc..For
overcoming these difficulties the replica of the data are automatically
stored at various networks and for environmental conditions Air
conditioning environment is created.
Page
110
ClassifiedsOnline.com
2. Data security:-
i) Identification:-
Unique Ids for the different users have been provided.
ii) Authentication:-
System checks the password under the particular user identification.
The computer permits the various resource to the authorized person.
iii) Authorisation:-
The access control mechanism to prevent unauthorized logging to the
system.
Need for Security
Many people view computer and network security in a negative light, thinking
of it only in terms of restricting access to services. One major view of
network security is “that which is not expressly permitted is denied.”
Although this is a good way of thinking about how to connect other
organization to the internet, one can, and possibly should, view intranet
security from a more positive angle. Property set up, intranet security can be
an enabler, enriching ones’ intranet with services and resources one would
not otherwise be able to provide. Such an overall security policy might be
described as “that which is not expressly denied is permitted.”
Page
111
ClassifiedsOnline.com
This does not mean that one should throw caution to the wind and
make everything available to ones’ users on ones’ intranet. There are many
things to consider when placing sensitive business data out on ones’ intranet.
It may fall into the wrong hands, or worse, be used against ones’ business.
For example, some of ones’ users might have information they would li9ke to
make available, provided access to it can be limited to a specified group-for
example, confidential management or financial information. Without the
ability to ensure that only those who have the right to see such information
will have access, the custodians of data will not be willing to put it on ones’
intranet. Providing security increases ones’ organization’s ability to use the
important collaborative aspects of an intranet.
Before going into a great deal of detail about how one can use security to
enhance ones’ intranet, take a high- level look at what security features are
available to ones. These break down into three main categories.
There is a wide range of very flexible security features one can implement on
ones’ Web server. Here’s a summary:
It’s ones’ responsibility to determine the level of security one need on ones’
intranet, and, of course, to implement it. Putting most of the security
measures mentioned into place is not difficult. Ones’ primary concern will be
explaining to customers how intranet security works, not so much as a
limiting factor but as an opportunity for increased use and collaboration using
ones’ intranet. Assuring decision-makers that they can make information
available on ones’ intranet in a secure fashion can go a long way toward
making ones’ intranet a success. At the same time, it’s important to make
Page
113
ClassifiedsOnline.com
Page
114
ClassifiedsOnline.com
Is ones’ intranet is accessible from the internet? If so, all of the security
problems of the Internet are now ones’ intranet’s problems, too. One can,
however, connect safely to the Internet and still protect ones’ intranet. One
can even use the Internet as a means of letting remotes sites in ones’
company access ones’ intranet.
e) Firewalls
It’s a fact of Internet life there are people out there who want to break into
other people’s networks via the Internet. Reasons vary from innocent
curiosity to malicious cracking to business and international espionage. At
the same time, the value of Internet to organizations and businesses is as
great that vendors are rushing to fill the need for Internet security with
Internet firewalls. An Internet firewall is a device that sits between ones’
internal network and outside Internet. Its purpose is to limit access into and
out of ones’ network based on ones’ organization’s access policy.
services to pass but to deny others. For example, one might be able to use
the Telnet utility to log into systems on the Internet, but users on remote
systems cannot use to log into ones’ local system because of the firewall.
Summary
Security is important not so much because it prevents things, but because it
enables them. Judicious use of built-in security features of the Web server
and other intranet resources can add value to ones’ intranet by making new
things possible.
Page
116
ClassifiedsOnline.com
QUALITY ASSURANCE
Page
117
ClassifiedsOnline.com
QUALITY ASSURANCE
INTRODUCTION
Page
118
ClassifiedsOnline.com
IMPLEMENTATION
Page
119
ClassifiedsOnline.com
IMPLEMENTATION
Introduction
Page
120
ClassifiedsOnline.com
For the project we need to install and configure Weblogic server 8.1 ,
database server, and the deployment directory for the project.
Aspects of Implementation
• Training Personnel
• Conversion Procedures
TRAINING
CONVERSION:
• Parallel Run
• Immediate cut-off
Page
121
ClassifiedsOnline.com
Parallel Run
In this approach, the old system and the new system are used
simultaneously for some period of time so that the performance of the new
system can be monitored and compared with that of the old system. Also
in case of failure of the new system, the user can fall back on the old
system. The risk of this approach is that the user may never want to shift
to new system.
Implementation Tools
The project was implemented using asp.net.The implementation work was
carried out in Windows XP/2000 server platform.
1) Asp.net 3.5
2) Sql server
Page
122
ClassifiedsOnline.com
Coding
• Main emphasis while coding was on style so that the end result was
an optimized code.
Coding Style
The structured programming method was used in all the modules the
project.It incorporated the following features
• The code has been written so that the definition and implementation
of each function is contained in one file.
• A group of related function was clubbed together in one file to
include it when needed and save us from the labour of writing it
again and again.
Page
123
ClassifiedsOnline.com
Naming Convention:-
Indentation
Judicious use of indentation can make the task of reading and understanding
a program much simpler.Indentation is an essential part of a goog
program.If code id intended without thought itv will seriously affect the
readability of the program.
• Blank line is also left between each function definition to make the
code look neat.
• Indentation for each source file stating he purpose of the file is also
done.
Page
124
ClassifiedsOnline.com
MAINTENANCE
Page
125
ClassifiedsOnline.com
MAINTENANCE
• Corrective
• Adaptive
• Perfective.
Page
126
ClassifiedsOnline.com
Page
127
ClassifiedsOnline.com
EVALUATION
Page
128
ClassifiedsOnline.com
EVALUATION
The evaluation phase ranks vendor proposals and determines the one best
suited, Evaluation of the system is performed to identify its strengths and
weaknesses. The actual evaluation can occur along any of the following
dimensions:
Page
129
ClassifiedsOnline.com
CONCLUSIONS
In this instance it may be true that on eBay, they have something for
everybody, whatever their tastes may be.
The site is made in all possible way to meet the user requirements
using latest version of available software and hardware.But as user
requirements and operating environment keep changing further extensions
can be made on this.In future some more schemas can be added in the “HR
Recruitment Process” hence these schemas are to be included in the
software developed.
Page
130
ClassifiedsOnline.com
Limitations
• T
hough this system is developed as a multi user system
but it is not a real time system.
• T
he interaction with the database, every time they are
loaded thus the system tends to be a bit slow.
Page
131
ClassifiedsOnline.com
FUTURE SCOPE
DEPENDENCIES
Page
132
ClassifiedsOnline.com
LIMITATIONS
Page
133
ClassifiedsOnline.com
BIBILIOGRAPHY
BOOKS
REFERENCES
• http://www.asp.net
• http://www.serverside.com
• http://www.w3schools.com
• http://www.google.com
• http://www.webopedia.com
• http://www.ddj.com
Page
134
ClassifiedsOnline.com
D((
APPENDIX-A
[ database ]
APPENDIX-A
Data base is the most important thing in this universe as data base gives
identity to a thing without data base existence of a thing is impossible while
working on a project first step is to design a database.
1. RDBMS.
Page
135
ClassifiedsOnline.com
2. DBMS.
• Centralization of database.
• Client Server Technology.
• Security.
• Normalization of Data Base.
• Relationship.
• Transaction Processor.
• It gives some internet related features.
ABOUT sql2005
Sql 2005 contains all the features of previous version. It also supports some
new features & enhancement to some existing features. sql servers provides
deficient & effective solution for the major features.
Page
136
ClassifiedsOnline.com
Page
137
ClassifiedsOnline.com
APPENDIX-B
[ asp.net ]
Page
138
ClassifiedsOnline.com
APPENDIX-B
Technology Used
Introduction to asp
Page
139
ClassifiedsOnline.com
C# Features
• Simplicity
• Orientation
• Platform Independence
• Security
• High Performance
• Multi Threading
• Dynamic linking.
• Garbage Collection.
This information includes details about browser capabilities, cookies, the host
name of the requesting client, and so forth.
Page
140
ClassifiedsOnline.com
Page
141
ClassifiedsOnline.com
Page
142
ClassifiedsOnline.com
APPENDIX-C
[ html ]
Page
143
ClassifiedsOnline.com
APPENDIX-C
What is HTML?
HTML(Hyper Text Markup Language): A markup language used to structure
text and multimedi documents and to set up hypertext links between
documents, used extensively on the World Wide Web. HTML is a display
language , not a programming lanfguage. HTML is a markup language(the ML
in HTML) that uses a fixed set of markup tags.
HTML itself is the set of custumizable “markup” tags that are inserted
into HTML document govern its format, multimedia content, and
hyperlinks. Any HTML viewer can display such documents but they are
normally viewed usinga Web browser.
Page
144
ClassifiedsOnline.com
III. Link into other locations, in the same document, in another web
page, or even on another computer(Server), or
Features of HTML:-
• The markup teg tell the Web browser how to display the page.
Page
145
ClassifiedsOnline.com
APPENDIX-D
[ java script ]
Page
146
ClassifiedsOnline.com
APPENDIX-D
What is JAVASCRIPT?
Features Of JavaScript:-
JavaScript.
Page
147
ClassifiedsOnline.com
Functions Of JavaScript:-
Limitations of JavaScript:-
Page
148