Вы находитесь на странице: 1из 26

*INTRODUCTION*

The system entitled "STUDENT LOGIN"in computer security,logging is the process by


which an individual gains access to a computer system by identifying and themeselves.

The Difference Between CSS, HTML and PHP. ... The colors, fonts and styles of this entire
website are driven by CSS. HTML = Content: HyperText Markup Language (HTML) is the
building-blocks of web pages. HTML allows you to put images, text, videos, forms and other
pieces of content together into a cohesive webpage.

HTML, HyperText Markup Language, gives content structure and meaning by defining that
content as, for example, headings, paragraphs, or images. CSS, or Cascading Style Sheets, is a
presentation language created to style the appearance of content—using, for example, fonts or
colors.

HTML front end :

Back End Programming Languages. Many back end developers know front endlanguages such
as HTML and CSS but need to use languages such as Java, PHP, Ruby on Rails, Python, and
.Net to get the back end job done. Back end developers are most focused on a site's
responsiveness and speed.

PHP :

PHP was at first created as a simple scripting platform called "Personal Home Page". Nowadays
PHP is an alternative of the Microsoft's Active Server Pages (ASP) technology. PHP is an open
source server-side language which is used for creating dynamicweb pages. It can be embedded
into HTML.

MODULES

• User Name Module

• Password Module

• Login Module

• Sign In and Sign Up Module


• SYSTEM SPECIFICATIONS
• HARDWARE CONFIGURATION

Processor : Intel Core i3

RAM : 2 GB

Hard disk drive : 250 GB

Clock Speed : 2.1 GHz

Monitor : Color Monitor

Printer : Laser Printer

Keyboard : Multi Media

Mouse : Optical Mouse

• SOFTWARE CONFIGURATION

Technology : PHPMyadmin,Notepad

Front end : HTML,CSS,PHP

Back end : SQL Server 2008

ABOUT PHP:

PHP (recursive acronym for PHP: Hypertext Preprocessor) is a widely-used open source general-
purpose scripting language that is especially suited for web development and can be embedded
into HTML.
Nice, but what does that mean? An example:

Example #1 An introductory example

<!DOCTYPE HTML>

<html>

<head>

<title>Example</title>

</head>

<body>

<?php

echo "Hi, I'm a PHP script!";

?>

</body>

</html>

Instead of lots of commands to output HTML (as seen in C or Perl), PHP pages contain HTML
with embedded code that does "something" (in this case, output "Hi, I'm a PHP script!"). The
PHP code is enclosed in special start and end processing instructions <?php and ?> that allow
you to jump into and out of "PHP mode."

What distinguishes PHP from something like client-side JavaScript is that the code is executed
on the server, generating HTML which is then sent to the client. The client would receive the
results of running that script, but would not know what the underlying code was. You can even
configure your web server to process all your HTML files with PHP, and then there's really no
way that users can tell what you have up your sleeve.
The best things in using PHP are that it is extremely simple for a newcomer, but offers many
advanced features for a professional programmer. Don't be afraid reading the long list of PHP's
features. You can jump in, in a short time, and start writing simple scripts in a few hours.

Although PHP's development is focused on server-side scripting, you can do much more with it.
Read on, and see more in theWhat can PHP do? section, or go right to the introductory tutorial if
you are only interested in web programming.

SQL SERVER
Microsoft SQL Server is a relational database management system developed
by Microsoft. As a database, it is a software product whose primary function is to store and
retrieve data as requested by other software applications, be it those on the same computer or
those running on another computer across a network (including the Internet). There are at least a
dozen different editions of Microsoft SQL Server aimed at different audiences and for workloads
ranging from small single-machine applications to large Internet-facing applications with many
concurrent users.
It included native support for managing XML data, in addition to relational. For this
purpose, it defined an xml data type that could be used either as a data type in database columns
or as literals in queries. XML columns can be associated with XSD schemas; XML data being
stored is verified against the schema. XML is converted to an internal binary data type before
being stored in the database. Specialized indexing methods were made available for XML data.
XML data is queried using Query.
SQL Server 2008 also includes support for structured and semi-structured data, including
digital media formats for pictures, audio, video and other multimedia data. In current versions,
such multimedia data can be stored as BLOBs (binary large objects), but they are generic bit
streams. Intrinsic awareness of multimedia data will allow specialized functions to be performed
on them.
According to Paul HYPERLINK
"http://en.wikipedia.org/w/index.php?title=Paul_Flessner&action=edit&redlink=1"Flessner,
senior Vice President, Server Applications, Microsoft Corp., SQL Server 2008 can be a data
storage backend for different varieties of data: XML, email, time/calendar, file, document,
spatial, etc as well as perform search, query, analysis, sharing, and synchronization across all
data types.
Other new data types include specialized date and time types and a spatial data type for
location-dependent data. Better support for unstructured and semi-structured data is provided
using the new FILESTREAM data type, which can be used to reference any file stored on the file
system.
Structured data and metadata about the file is stored in SQL Server database, whereas the
unstructured component is stored in the file system. Such files can be accessed both
via Win32 file handling APIs as well as via SQL Server using T-SQL; doing the latter accesses
the file data as a BLOB.

SYSTEM DESIGN AND DEVELOPMENT

FILE DESIGN

File Designs are incrementally and iteratively produced during the system development
life cycle, based on the particular circumstances of the IT project and the system development
methodology used for developing the system. Its intended audience is the project manager,
project team, and development team. Some portions of this document such as the user interface
(UI) may on occasion be shared with the client/user.

INPUT DESIGN

Input Design is one of the most expensive phases of the operation of


computerized system and is often the major problem of a system. A large number of
problems with a system can usually be tracked backs to fault input design and method.
Needless to say, therefore, that the input data is the life blood of a system and have to
be analyzed and designed with utmost case and consideration. The decisions made during
the input design are

• To provide cost effective method of input


• To achieve the highest possible level of accuracy
The input forms involved in this system are,
• User Name Module

• Password Module

• Login Module

• Sign In and Sign Up Module

OUTPUT DESIGN
Output Design generally refers to the results and information’s that are generated
by the system for many end-users, output is the main reason for developing the system
and the basis on which they evaluate the usefulness of the application. The objective of
a system finds its shape in terms of the output. The analysis of the objective of a
system leads to determination of outputs. External outputs are those whose destination
will be outside the organization and which require special attention as they project the
image of the organization. Internal outputs are those whose destination is within the
organization. It is to be carefully designed as they are the users main interface with the
system.
The output forms involved in this system are,
• User Name Module

• Password Module

DATABASE DESIGN
In a database, information from several files are coordinated, accessed and operated upon
as through it is in a single file. Logically, the information are centralized, physically, the data
may be located on different devices, connected through data communication facilities.
The database design steps are applied to identify the various entities and relationships
between them. General access methods are then applied to the conceptual schema to get the
logical model, which is then further transformed into relational tables. The database design refers
to the data organization, in the backup storage system. This design place and important and
critical role for the successful performance.
A database component that is developed for reuse would be correct and would contain no
defects. In reality, formal verification is not carried out routinely, and defects can add to occur.
However, with each reuse, defects are found eliminated, and a components qualify improve as a
result. Over time the components virtually defect free. The database quality and reliability,
failure is non conformance to software requirements. Failure can be only anything or
catastrophic.

SYSTEM DEVELOPMENT
The System Development is for a base level system which will work as a proof of
concept for the use of building a system that provides a base level of functionality to show
feasibility for large scale production use. The Software Design is focused on the base level
system and critical parts of the system. Within the Software Design are narrative and graphical
documentation of the software design for the project including use case models, sequence
diagrams and other supporting requirement information.
.

TESTING AND IMPLEMENTATION

TESTING
A strategy for software testing must accommodate low-level tests that are necessary to
verify that all small source code segments has been correctly implemented as well as high-level
tests that validate major system functions against customer requirements. Testing is a process of
executing program with the intent of finding error. A good test case is one that has high
probability of finding an undiscovered error. If testing is conducted successfully it uncovers the
errors in the software. Testing cannot show the absence of defects, it can only show that software
defects present. Test configuration includes test plan and test cases and test tools.
Tests are conducted and all the results are evaluated. That is test results are compared
with expected results. When erroneous data are uncovered, an error is implied and debugging
commences. Two class of input provided to test the process. The software configuration includes
a software requirements specification, a design specification and source code. System testing
tests the integration of each module in the system. It also tests to find discrepancies between the
system and its original objective, current specification and system documentation. The primary
concern is the compatibility of individual modules. Entire system is working properly or not will
be tested here, and specified path connection IS correct or not, and giving output or not are tested
here these verifications and validations are done by giving input values to the system and by
comparing with expected output.
• Unit Testing
Unit testing is essential for the verification of the code produced during the coding
phase and hence the goal is to test the internal logic of the modules. Using the detailed
design description as a guide, important paths are tested to uncover errors within the
boundary of the modules. These tests were carried out during the programming stage
itself.
• Integration Testing
Integration testing focuses on unit tested modules and build the program structure that
is dictated by the design phase.
• Acceptance Testing
This testing is done to verify the readiness of the system for the implementation.
Acceptance testing begins when the system is complete. Its purpose is to provide the end
user with the confidence that the system is ready for use. It involves planning and
execution of functional tests, performance tests and stress tests in order to demonstrate
that the implemented system satisfies its requirements.
Tools to special importance during acceptance testing include:
• Test coverage Analyzer

Records the control paths followed for each test case.


• Timing Analyzer

Also called a profiler, reports the time spent in various regions of the code are
areas to concentrate on to improve system performance.
• Coding standards

Static analyzers and standard checkers are used to inspect code for deviations
from standards and guidelines.
• Black-box testing

Black box testing is designed to validate functional requirements without regard to


the internal workings of a program. Black box testing mainly focuses on the information
domain of the software, deriving test cases by partitioning input and output in a manner that
provides through test coverage. Incorrect and missing functions, interface errors, errors in
data structures, error in functional logic are the errors falling in this category.

• White-box testing

White box testing focus on the control structure of the program. Test
cases are derived to ensure that all statements in the program have been
executed at least once during testing and that all logical conditions have
been executed.

APPENDIX

• DATAFLOW DIAGRAM

LEVEL 0

View
Username, password

Student Login
Login

Genarate

Report
errors

LEVEL 1
Login

User name

Password
Student
Generate

Report
errors

LEVEL 2

Register
Username
E-mail Id
Sign-Up

Enter password

Current Password

Report
errors

• SYSTEM FLOW DIAGRAM

Login
(Or)

Sign-up

Student Login
Username Details
EmailDetails
PasswordDetails
Confirm password Details

Logout
Username
Student Login
Password

Login

Username Details
EmailDetails
PasswordDetails
Confirm password Details

• ENTITY RELATIONSHIP DIAGRAM

Student Login

Username
Password

Home page
Logout

Table Name: STUDENT LOGIN


Foreign Key: USERS
ID Details

Username Durai

E-mail Dr1@gmail.com

Password *********

Login Homepage
Logout Return
Loginpage

CODING:
Login page
<?php include('server.php') ?>
<!DOCTYPE html>
<html>
<head>
<title>Student Login</title>
<link rel="stylesheet" type="text/css" href="style.css">
</head>
<body>
<div class="header">
<h2>Register</h2>
</div>

<form method="post" action="register.php">

<?php include('errors.php'); ?>

<div class="input-group">
<label>Username</label>
<input type="text" name="username" placeholder="Enter username"
value="<?php echo $username; ?>">
</div>
<div class="input-group">
<label>Email</label>
<input type="email" name="email" placeholder="Enter your email"
value="<?php echo $email; ?>">
</div>
<div class="input-group">
<label>Password</label>
<input type="password" name="password_1" placeholder="Enter your
password">
</div>
<div class="input-group">
<label>Confirm password</label>
<input type="password" name="password_2" placeholder="confirm your
Password">
</div>
<div class="input-group">
<button type="submit" class="btn" name="reg_user">Register</button>
</div>
<p>
Already a member? <a href="login.php">Sign in</a>
</p>
</form>
</body>
</html>

Register page

<?php include('server.php') ?>


<!DOCTYPE html>
<html>
<head>
<title>Student Login1</title>
<link rel="stylesheet" type="text/css" href="style.css">
</head>
<body>

<div class="header">
<h2>Login</h2>
</div>
<form method="post" action="login.php">

<?php include('errors.php'); ?>

<div class="input-group">
<label>Username</label>
<input type="text" name="username" placeholder="Enter your
username" >
</div>
<div class="input-group">
<label>Password</label>
<input type="password" name="password" placeholder="Enter your
password">
</div>
<div class="input-group">
<button type="submit" class="btn" name="login_user">Login</button>
</div>
<p>
Not yet a member? <a href="register.php">Sign up</a>
</p>
</form>

</body>
</html>

Index page
<?php
session_start();

if (!isset($_SESSION['username'])) {
$_SESSION['msg'] = "You must log in first";
header('location: login.php');
}
if (isset($_GET['logout'])) {
session_destroy();
unset($_SESSION['username']);
header("location: login.php");
}

?>
<!DOCTYPE html>
<html>
<head>
<title>Home</title>
<link rel="stylesheet" type="text/css" href="style.css">
</head>
<body>
<div class="header">
<h2>Home Page</h2>
</div>
<div class="content">

<!-- notification message -->


<?php if (isset($_SESSION['success'])) : ?>
<div class="error success" >
<h3>
<?php
echo $_SESSION['success'];
unset($_SESSION['success']);
?>
</h3>
</div>
<?php endif ?>

<!-- logged in user information -->


<?php if (isset($_SESSION['username'])) : ?>
<p>Welcome <strong><?php echo $_SESSION['username'];
?></strong></p>
<p> <a href="index.php?logout='1'" style="color: red;">logout</a> </p>
<?php endif ?>
</div>

</body>
</html>
Errors page
<?php if (count($errors) > 0) : ?>
<div class="error">
<?php foreach ($errors as $error) : ?>
<p><?php echo $error ?></p>
<?php endforeach ?>
</div>
<?php endif ?>
Server page
<?php
session_start();

// variable declaration
$username = "";
$email = "";
$errors = array();
$_SESSION['success'] = "";

// connect to database
$db = mysqli_connect('localhost', 'root', '', 'Login1');

// REGISTER USER
if (isset($_POST['reg_user'])) {
// receive all input values from the form
$username = mysqli_real_escape_string($db, $_POST['username']);
$email = mysqli_real_escape_string($db, $_POST['email']);
$password_1 = mysqli_real_escape_string($db, $_POST['password_1']);
$password_2 = mysqli_real_escape_string($db, $_POST['password_2']);

// form validation: ensure that the form is correctly filled


if (empty($username)) { array_push($errors, "Username is required"); }
if (empty($email)) { array_push($errors, "Email is required"); }
if (empty($password_1)) { array_push($errors, "Password is required"); }

if ($password_1 != $password_2) {
array_push($errors, "The two passwords do not match");
}

// register user if there are no errors in the form


if (count($errors) == 0) {
$password = md5($password_1);//encrypt the password before saving in the
database
$query = "INSERT INTO users (username, email, password)
VALUES('$username', '$email', '$password')";
mysqli_query($db, $query);

$_SESSION['username'] = $username;
$_SESSION['success'] = "You are now logged in";
header('location: index.php');
}

// ...

// LOGIN USER
if (isset($_POST['login_user'])) {
$username = mysqli_real_escape_string($db, $_POST['username']);
$password = mysqli_real_escape_string($db, $_POST['password']);
if (empty($username)) {
array_push($errors, "Username is required");
}
if (empty($password)) {
array_push($errors, "Password is required");
}

if (count($errors) == 0) {
$password = md5($password);
$query = "SELECT * FROM users WHERE username='$username' AND
password='$password'";
$results = mysqli_query($db, $query);

if (mysqli_num_rows($results) == 1) {
$_SESSION['username'] = $username;
$_SESSION['success'] = "You are now logged in";
header('location: index.php');
}else {
array_push($errors, "Wrong username/password combination");
}
}
}

?>
Page Style
*{
margin: 0px;
padding: 0px;

}
body {
font-size: 120%;
background: #F8F8FF;
}

.header {
width: 30%;
margin: 50px auto 0px;
color: white;
background: #5F9EA0;
text-align: center;
border: 1px solid #B0C4DE;
border-bottom: none;
border-radius: 0px 0px 0px 0px;
padding: 20px;
}
form, .content {
width: 30%;
margin: 0px auto;
padding: 20px;
border: 1px solid #B0C4DE;
background: white;
border-radius: 0px 0px 0px 0px;
}
.input-group {
margin: 10px 0px 10px 0px;
outline: none;
}

.input-group label {
display: block;
text-align: left;
margin: 3px;
}
.input-group input {
height: 30px;
width: 93%;
padding: 5px 10px;
font-size: 16px;
border-radius: 0px;
border: 1px solid gray;
}
.btn {
padding: 10px;
font-size: 15px;
color: white;
background: #5F9EA0;
border: none;
border-radius: 0px;
}
.error {
width: 92%;
margin: 0px auto;
padding: 10px;
border: 1px solid #a94442;
color: #a94442;
background: #f2dede;
border-radius: 0px;
text-align: left;
}
.success {
color: #3c763d;
background: #dff0d8;
border: 1px solid #3c763d;
margin-bottom: 20px;
}
SAMPLE OUTPUT:
LOGIN

REGISTER:
LOGOUT:

Вам также может понравиться