Академический Документы
Профессиональный Документы
Культура Документы
ABSTRACT
As the world is ushering into the new era where prime focus is given to technology and where time and speed are becoming important criteria to evaluate the performance of an individual, in such a scenario it becomes prerequisite to equip the students with new technology to solve common day to day problems. Our project CONNECTING M.B.S.C.E.T acts as a technological tool aiming to bridge the student teacher communication gap, instigating awareness and knowledge among students through the most popular medium i.e. the Internet. The project provides a platform to students to genuinely explore their potential and caliber. CONNECTING MBSCET is an open discussion forum where each individual of college is free to put forward his genuine opinions, clarify their doubts, know about the schedule of concerning teachers and have firsthand knowledge about recent notices etc. The project is designed to cover different aspects of students curriculum which not only confine to the pages of his book but also put forward various opportunities that open up the doors of technology to place him in a strong competent position in the demanding market of the existing scenario.
Page 1
CONNECTING M.B.S.C.E.T
CHAPTER 1 INTRODUCTION
"NECESSITY IS THE MOTHER OF INVENTION"
The foundation to every new project arises from a problem, which appears to be unsolved by the available resources of the existing system. This leads either to the development of a new technology or modification of the existing technology that could enhance the efficiency of available resources in the system. Our project "CONNECTING M.B.S.C.E.T" is a "NETWORKING FORUM" that provides a platform to the solution of various problems encountered by students, faculty members and higher administrative personnels of the college.
Page 2
CONNECTING M.B.S.C.E.T
bridge this gap. This is the major problem which a student faces from the very first day of his college life.
NO TECHNICAL INTERACTIONS
The teacher-student interaction is confined to class rooms only, where discussions are based on the subjective topics. There is no such discussion regarding the latest technology in the market, about the recent developments in technical world and in the social world too. Such kind of discussions proves very valuable to explore the social cum technical knowledge of student.
Page 2
CONNECTING M.B.S.C.E.T
intelligent student. There is no such provision present to judge the actual caliber of the student, which is very much important to be explored.
LACK OF FEEDBACK:
In the college there is absence of such a mechanism by which a student can give his opinion on various ongoing activities. Sometimes college authorities wish to start some extra-activity in the college and look forward for some feedback from students about its effectiveness and know about the interest students possess towards that activity. But unfortunately at present there is no such mechanism to get an appropriate feedback from students.
1.2 OBJECTIVES:
The above mentioned problems are very much important to be solved and our project "CONNECTING M.B.S.C.E.T" proves to be very effective in solving some of these problems. The main objectives of our project are as under:
GAP:
As explained in the problem section above, the gap the teacher and student have is very important to be bridged. The project somehow helps to bridge this gap by providing a forum. In the project both teacher and student have their individual profiles which are interlinked with a communication mechanism. Here student can approach any of the faculty members, put up his query and get his query answered whenever the teacher is available. This provides a facility to student to approach his faculty after the college hours. Their interaction is not confined to mere a short span of time they spend in college.
Page 2
CONNECTING M.B.S.C.E.T
Page 1
CONNECTING M.B.S.C.E.T
feedback regarding concerned activity and can act accordingly. This feedback mechanism would lead to various improvements in the ongoing as well as the upcoming activities in the college.
USER CERTAINITY:
In our forum only students of the college are allowed to access it. Any other individual who is not a part of the college cannot utilize the facilities provided by this forum. To make sure the student accessing this forum is a college student we provide him with a Registration ID and security code, which is very essential to be entered during his first time access.
NO CUSTOMIZATION:
In networking sites we are provided with a facility of customizing our friend lists, but here in this forum we are not giving any kind of customization of lists. Every user here is a general user and can interact to anyone.
PRIVACY:
Privacy is always a major question while accessing such kind of networking sites, here in our networking forum we are not providing any kind of privacy to the users, because when privacy occurs, misuse starts. To avoid any kind of misuse we eliminate privacy from the forum. Any action a user performs will be made visible to all other users using the forum including the faculty members as well as the higher administrative staff.
This forum would be very much interactive and hence it would generate a will among students to explore the resources and facilities provided by it. This would prove to be very effective in creating a healthier technical cum social environment in the college.
Page 2
CONNECTING M.B.S.C.E.T
Page 1
CONNECTING M.B.S.C.E.T
Database server
Web Server DEVELOPERS SIDE SOFTWARE REQUIREMENTS MS Office Acrobat Reader SOFTWARE ENVIRONMENT Operating system UML Diagrams
IIS 6.0 or onwards MS Visio 2003 or onwards 2003 or onwards 8.0 Onwards SPECIFICATION
2003 or onwards 8.0 Onwards Internet Explorer 6.0 or onwards, Mozilla Firefox (with minimum 800600 resolution and ActiveX Control Enabled)
Page 1
CONNECTING M.B.S.C.E.T
Processor
Page 1
CONNECTING M.B.S.C.E.T
Forms, Web Services, or Server Controls gives ASP.NET the power to build real Web applications.
Page 2
CONNECTING M.B.S.C.E.T
environments. However, these tools never achieved the ease of use or the level of acceptance achieved by Microsoft Windows application development tools, such as Visual Basic or Microsoft Access. ASP developers still rely heavily or exclusively on Notepad. Debugging is an unavoidable part of any software development process, and the debugging tools for ASP have been minimal. Most ASP programmers resort to embedding temporary Response.Write statements in their code to trace the progress of its execution. NO REAL STATE MANAGEMENT Session state is only maintained if the client browser supports cookies. Session state information can only be held by using the ASP Session object. And one has to implement additional code if one, for example, wants to identify a user. UPDATE FILES ONLY WHEN SERVER IS DOWN If Web application makes use of components, copying new files to other application should only be done when the Web server is stopped. Otherwise it is like pulling the rug from under the application's feet, because the components may be in use (and locked) and must be registered. OBSCURE CONFIGURATION SETTINGS The configuration information for an ASP web application (such as session state and server timeouts) is stored in the IIS metabase. Because the metabase is stored in a proprietary format, it can only be modified on the server machine with utilities such as the Internet Service Manager. With limited support for programmatically manipulating or extracting these settings, it is often an arduous task to port an ASP application from one server to another.
Page 2
CONNECTING M.B.S.C.E.T
Page 2
CONNECTING M.B.S.C.E.T
application. Removed or old files that are still in use are kept in memory until the clients have finished. XML-BASED CONFIGURATION FILES Configuration settings in ASP.NET are stored in XML files that can easily be read and edited. We can also easily copy these to another server, along with the other files that comprise the application.
3.1.2.2
ASP.NET OVERVIEW
controls, which are responsible for generating the user interface. They mirror typical HTML widgets like text boxes or buttons. If these controls do not fit needs, it is free to create our own user controls.
Web Forms are designed to make building web-based applications as easy as building Visual
Basic applications.
Page 2
CONNECTING M.B.S.C.E.T
At the bottom of the Architecture is Common Language Runtime. NET Framework common language runtime resides on top of the operating system services. The common language runtime loads and executes code that targets the runtime. This code is therefore called Managed code. The runtime provides, for example, the ability for cross-language integration.
.NET Framework provides a rich set of class libraries. These include base classes, like networking and input/output classes, a data class library for data access, and classes for use by programming tools, such as debugging services. All of them are brought together by the Services Framework, which sits on top of the common language runtime.
ADO.NET is Microsofts ActiveX Data Object (ADO) model for the .NET Framework. ADO.NET is not simply the migration of the popular ADO model to the managed environment but a completely new paradigm for data access and manipulation. ADO.NET is intended specifically for developing web applications. This is evident from its two major design principles:
Disconnected Datasets: In ADO.NET, almost all data manipulation is done outside
Page 2
CONNECTING M.B.S.C.E.T
Effortless Data Exchange with XML Datasets can converse in the universal data format of the Web, namely XML.
The 4th layer of the framework consists of the Windows application model and, in parallel, the Web application model. The Web application model-in the slide presented as ASP.NETincludes Web Forms and Web Services. ASP.NET comes with built-in Web Forms controls, which are responsible for generating the user interface. They mirror typical HTML widgets like text boxes or buttons. If these controls do not fit your needs, you are free to create your own user controls. Web Services brings a model to bind different applications over the Internet. This model is based on existing infrastructure and applications and is therefore standard-based, simple and adaptable. Web Services are software solutions delivered via Internet to any device.
One of the obvious themes of .NET is unification and interoperability between various programming languages. In order to achieve this; certain rules must be laid and all the languages must follow these rules. In other words we cannot have languages running around creating their own extensions and their own fancy new data types. CLS is the collection of the rules and constraints that every language (that seeks to achieve .NET compatibility) must follow.
The CLR and the .NET Frameworks in general, however, are designed in such a way that code written in one language can not only seamlessly be used by another language. Hence ASP.NET can be programmed in any of the .NET compatible language whether it is VB.NET, C#, Managed C++ or JScript.NET.
Page 1
CONNECTING M.B.S.C.E.T
COMPILATION, WHEN PAGE IS REQUESTED THE FIRST TIME The first time a page is requested, the code is compiled. Compiling code in .NET means that a compiler in a first step emits Microsoft intermediate language (MSIL) and produces metadata if you compile your source code to managed code. In a following step MSIL has to be converted to native code.
MICROSOFT INTERMEDIATE LANGUAGE (MSIL) Microsoft intermediate language is code in an assembly language like style. It is CPU independent and therefore can be efficiently converted to native code. The conversion in turn can be CPU-specific and optimized. The intermediate language provides a hardware abstraction layer. MSIL is executed by the common language runtime.
COMMON LANGUAGE RUNTIME The common language runtime contains just-in-time (JIT) compilers to convert the MSIL into native code. This is done on the same computer architecture that the code should run on. The runtime manages the code when it is compiled into MSIL the code is therefore called managed code.
3.1.4 VERSIONS
Page 1
CONNECTING M.B.S.C.E.T
Date January 16, 2002 April 24, 2003 November 7, 2005 November 21, 2006 November 19, 2007 August 11, 2008 April 12, 2010
Version 1.0 1.1 2.0 3.0 3.5 3.5 Service Pack 1 4.0
The ASP.NET releases history tightly correlates with the .NET Framework releases:
New data controls (GridView, FormView, DetailsView) New technique for declarative data access (SqlDataSource, ObjectDataSource,
XmlDataSource controls) Navigation controls Master pages Login controls Themes Web parts Personalization services Full pre-compilation Support for 64-bit processors
Page 2
CONNECTING M.B.S.C.E.T
The language, and implementations thereof, should provide support for software engineering principles such as strong type checking, array bounds checking, detection of attempts to use uninitialized variables, and automatic garbage collection. Software robustness, durability, and programmer productivity are important.
The language is intended for use in developing software components suitable for deployment in distributed environments.
Source code portability is very important, as is programmer portability, especially for those programmers already familiar with C and C++.
Page 1
CONNECTING M.B.S.C.E.T
C# is intended to be suitable for writing applications for both hosted and embedded systems, ranging from the very large that use sophisticated operating systems, down to the very small having dedicated functions. Although C# applications are intended to be economical with regard to memory and processing power requirements, the language was not intended to compete directly on performance and size with C, C++ or assembly language
OPERATIONAL PERSPECTIVE
VB .NET is significantly different from Java in terms of syntax and structure. C# is based
on the Java/C++ syntax. VB .NET developers will have a steeper learning curve when adopting Java than C# developers. For this reason C# lends itself better to being a secondary language in a Java based organization.
The .NET CLR (Common Language Infrastructure) has been submitted to ECMA and
accepted. C# has the same status. C# is better protected than VB .NET to changes in strategic direction.
C# is used within the companies to develop live applications. Visual Studio 2005 comes with JLCA (Java Language Conversion Assistant) allowing Java
code to be ported to C#. There is no comparable tool for VB .NET. C# provides the ability to work with C/C++ style pointers. This is rarely required and should be avoided. The exception to this rule is some forms of interoperability with legacy Microsoft code. VB .NET does not have this capability.
Page 1
CONNECTING M.B.S.C.E.T
C# supports Java style code documentation where definitions of properties and methods are commented in such a way as to make the component interfaces self documenting. VB .NET does not support this.
Visual Studio .NET itself was written using C#. Community support for C# is wider than
FINANCIAL PERSPECTIVE
In terms of the cost of multi-skilled developers, the "C# & Java" SkillSet should be cheaper than "VB & Java" due to the languages similarities. Not only does this relate to less training but also a higher quality of code/output as the developer is more likely to be highly competent in both languages.
The lack of case sensitivity in VB means that there can be no common coding standards across Java/VB as there could be across Java/C#. This further increases the cost of cross training and maintaining those skills.
The Internet is the first stop when a development problem is encountered, and here the significantly larger online C# community reduces time required to resolve problems.
The greater industry-wide take up of C# (compared to VB) means that more developers are available to recruit. Most C# developers were previously Java or C/C++ developers, and most VB developers come from a VB5/6 background. As a result the average C# developer will have more background in object oriented design (and is more likely to be to be competent in Java also).
Page 1
CONNECTING M.B.S.C.E.T
Local variables cannot shadow variables of the enclosing block, unlike C and C++. Variable shadowing is often considered confusing by C++ texts.
C# supports a strict Boolean data type, bool. Statements that take conditions, such as while and if, require an expression of a type that implements the true operator, such as the Boolean type. While C++ also has a Boolean type, it can be freely converted to and from integers, and expressions such as if (a) require only that a is convertible to bool, allowing a to be an int, or a pointer. C# disallows this "integer meaning true or false" approach, on the grounds that forcing programmers to use expressions that return exactly bool can prevent certain types of common programming mistakes in C or C++ such as if (a = b) (use of assignment = instead of equality ==).
In C#, memory address pointers can only be used within blocks specifically marked as unsafe, and programs with unsafe code need appropriate permissions to run. Most object access is done through safe object references, which always either point to a "live" object or have the well-defined null value; it is impossible to obtain a reference to a "dead" object (one that has been garbage collected), or to a random block of memory. An unsafe pointer can point to an instance of a value-type, array, string, or a block of memory allocated on a stack. Code that is not marked as unsafe can still store and manipulate pointers through the System.IntPtr type, but it cannot dereference them.
Managed memory cannot be explicitly freed; instead, it is automatically garbage collected. Garbage collection addresses the problem of memory leaks by freeing the programmer of responsibility for releasing memory that is no longer needed.
In addition to the try...catch construct to handle exceptions, C# has a try...finally construct to guarantee execution of the code in the finally block.
Multiple inheritance is not supported, although a class can implement any number of interfaces. This was a design decision by the language's lead architect to avoid complication and simplify architectural requirements throughout CLI.
Page 1
CONNECTING M.B.S.C.E.T
C# is more type safe than C++. The only implicit conversions by default are those that are considered safe, such as widening of integers. This is enforced at compile-time, during JIT, and, in some cases, at runtime. No implicit conversions occur between Booleans and integers, or between enumeration members and integers (except for literal 0, which can be implicitly converted to any enumerated type). Any user-defined conversion must be explicitly marked as explicit or implicit, unlike C++ copy constructors and conversion operators, which are both implicit by default. Starting with version 4.0, C# supports a "dynamic" data type that enforces type checking at runtime only.
Enumeration members are placed in their own scope. C# provides properties as syntactic sugar for a common pattern in which a pair of methods, accessor (getter) and mutator (setter) encapsulate operations on a single attribute of a class.
Full type reflection and discovery is available. Checked exceptions are not present in C# (in contrast to Java). This has been a conscious decision based on the issues of scalability.
3.2.4 CONCLUSION
The differences between VB. NET and C#, as standalone languages, are fairly minimal. C# can do very few things that VB.NET cannot, and VB.NET provides a slightly easier migration path for existing Microsoft VB developers. However, in the context of Java being the primary language in the organization, C# is a considerably better fit as a preferred .NET language.
CONNECTING M.B.S.C.E.T
A database management, or DBMS, gives the user access to their data and helps them transform the data into information. Such database management systems include dBase, paradox, IMS, SQL Server and SQL Server. These systems allow users to create, update and extract information from their database. A database is a structured collection of data. Data refers to the characteristics of people, things and events. SQL Server stores each data item in its own fields. In SQL Server, the fields relating to a particular person, thing or event are bundled together to form a single complete unit of data, called a record (it can also be referred to as raw or an occurrence). Each record is made up of a number of fields. No two fields in a record can have the same field name.
PRIMARY KEY
Every table in SQL Server has a field or a combination of fields that uniquely identifies each record in the table. The Unique identifier is called the Primary Key, or simply the Key. The primary key provides the means to distinguish one record from all other in a table. It allows the user and the database system to identify, locate and refer to one particular record in the database.
RELATIONAL DATABASE
SQL Server makes it very easy to link the data in multiple tables. Matching an employee to the department in which they work is one example. This is what makes SQL Server a relational database management system, or RDBMS. It stores data in two or more tables and
Page 1
CONNECTING M.B.S.C.E.T
enables you to define relationships between the tables and enables you to define relationships between the tables.
FOREIGN KEY
When a field in one table matches the primary key of another field is referred to as a foreign key. A foreign key is a field or a group of fields in one table whose values match those of the primary key of another table
DATA ABSTRACTION:
A major purpose of a database system is to provide users with an abstract view of the data. This system hides certain details of how the data is stored and maintained. Data abstraction is divided into three levels.
PHYSICAL LEVEL: This is the lowest level of abstraction at which one describes how the data are actually stored.
CONCEPTUAL LEVEL: At this level of database abstraction all the attributed and what data are actually stored is described and entries and relationship among them.
VIEW LEVEL: This is the highest level of abstraction at which one describes only part of the database.
Page 2
CONNECTING M.B.S.C.E.T
Redundancy can be avoided Inconsistency can be eliminated Data can be Shared Standards can be enforced Security restrictions can be applied Integrity can be maintained Conflicting requirements can be balanced Data independence can be achieved.
Page 2
CONNECTING M.B.S.C.E.T
SERVER with transactions processing option offers features which contribute to very high level of transaction processing throughput.
The unrivaled portability and connectivity of the SQL SERVER DBMS enables all the systems in the organization to be linked into a singular, integrated computing resource
PORTABILITY
SQL SERVER is fully portable to more than 80 distinct hardware and operating systems platforms, including UNIX, MSDOS, OS/2, Macintosh and dozens of proprietary platforms. This portability gives complete freedom to choose the database server platform that meets the system requirements.
OPEN SYSTEMS
SQL SERVER offers a leading implementation of industry standard SQL. SQL Servers open architecture integrates SQL SERVER and NONSQL SERVER DBMS with industrys most comprehensive collection of tools, application, and third party software products SQL Servers Open architecture provides transparent access to data from other relational database and even non-relational database.
UNMATCHED PERFORMANCE
Page 2
CONNECTING M.B.S.C.E.T
The most advanced architecture in the industry allows the SQL SERVER DBMS to deliver unmatched performance.
Page 1
CONNECTING M.B.S.C.E.T
The initial investigation in the development of the project points to the question whether the project is feasible. Feasibility is conducted to identify the best system that meets all the requirements. This includes an identification description, and evaluation of the proposed systems and selection of the best system for the job. The feasibility study is carried out to test if the proposed system is worth being implemented. Given unlimited and infinite time, all projects are feasible. Unfortunately such resources and time are not possible in real life situations. Hence it becomes both necessary and prudent to evaluate the feasibility of the project at the earliest possible time in order to avoid unnecessarily wastage of time, effort and professional embarrassment over an ill conceived system. Feasibility study is a test of system proposed regarding its work ability, impact on the organization ability to meet the user needs and effective use of resources. The main objective of feasibility study is to test the technical, operational and economical feasibility of developing a computer system application. The following feasibility studies were carried out for the proposed system:
ECONOMIC FEASIBILITY:
An evaluation of development cost weighed against the income of benefit derived from the developed system. Here the development cost is evaluated by weighing it against the ultimate benefits derived from the new system. The proposed system is economically feasible if the benefits obtained in the long run compensate rather than overdo the cost incurred in designing and implementing. In this case the benefits outweigh the cost that makes the system economically feasible.
TECHNICAL FEASIBILITY:
Technical feasibility involves the study of function performance and constraints that may affect the ability to achieve the acceptable system. A system is technically feasible, if it can be designed and implemented within the limitations of available resources like funds, hardware, software etc. The considerations that are normally associated with technical
Page 2
CONNECTING M.B.S.C.E.T
feasibility include development risk, resources availability and technology. Management provides latest hardware and software facilities for successful completion of the project. The proposed system is technically feasible as the Technology we are using to implement the Project (i.e. ASP.NET) is fully capable to implement our projects requirement analysis that was performed in the analysis section.
OPERATIONAL FEASIBILITY:
The Project is Operationally Feasible as it can be implemented easily on to a web server. Its operation will make it more popular as a complete discussion forum.
SCHEDULE FEASIBILITY:
It evaluates the time taken in the development of the project. This program has schedule feasibility.
Page 2
CONNECTING M.B.S.C.E.T
CONNECTING MBSCET
Page 3
CONNECTING M.B.S.C.E.T
LOGIN REGISTER
ABOUT MBSCET
PHOTOG ALLERY
ACHIEVE MENTS
GENERAL ANNOUNCEMENTS
PLACEME NTS
B.E
STREAM S AVAILAB LE
Page 1
CONNECTING M.B.S.C.E.T
5.2 REGISTER
REGISTRATION FORM
REGISTRATION I.D MBS-CON-T00001/MBS-CONS00001
SECURITY CODE
KEJHOI7893JU
OK
5.3 LOGIN
Page 1
CONNECTING M.B.S.C.E.T
LOGIN
USER NAME ROHIT8794
PASSWORD
*******************
OK
5.4 TEACHER REGISTRATION FORM
TEACHER REGISTRATION FORM
Page 1
CONNECTING M.B.S.C.E.T
MBS-CON-T00001
REGISTRATION NO:
DHEERAJ SHARMA
NAME:
DATE OF BIRTH:
11
AUG
1985
DEPARTMENT:
C.S.E
QUALIFICATION:
M.TECH
MALE
GENDER
FEMAL
9999999999
dheeraj123@gmail.com
CONNECTING M.B.S.C.E.T
CONNECTING MBSCET
BROW
CANCE
Page 3
CONNECTING M.B.S.C.E.T
Page 4
CONNECTING M.B.S.C.E.T
NAME:
DHEERAJ
SHARMA
DEPARTMENT: CSE
QUALIFICATION: M TECH.
GENDER: MALE
Page 5
CONNECTING M.B.S.C.E.T
OK
CANCE
Page 3
CONNECTING M.B.S.C.E.T
CONNECTING MBSCET
CONNECTING M.B.S.C.E.T
IS
NOTE DOWN DETAILS FOR FURTHER .ACCESS TO YOUR ACCOUNT
Page 1
CONNECTING M.B.S.C.E.T
MBS-CON-S00001
REGISTRATION NO:
ROHIT GUPTA
NAME:
DATE OF BIRTH:
11
AUG
1990
DEPARTMENT: SEMESTER
C.S.E
7TH
MALE
FEMAL
GENDER
rohit789@gmail.com
CONNECTING M.B.S.C.E.T
BROW
SUBMIT
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING
CANC
Page 2
CONNECTING M.B.S.C.E.T
Page 3
CONNECTING M.B.S.C.E.T
DEPARTMENT: CSE
SEMESTER: 7TH
GENDER: MALE
Page 4
OK
CANCEL
CONNECTING M.B.S.C.E.T
& IS
Page 3
CONNECTING M.B.S.C.E.T
Page 1
CONNECTING M.B.S.C.E.T
CONNECTING MBSCET
Page 2
CONNECTING M.B.S.C.E.T
ABOUT MBSCET
PHOTOGAL LERY
ACHIEVEME NTS
WATCH LECTURES
Page 3
CONNECTING M.B.S.C.E.T
CONNECTING MBSCET
Page 3
CONNECTING M.B.S.C.E.T
ABOUT MBCET
PHOTOGALL ERY
ACHIEVEME NTS
Page 2
CONNECTING M.B.S.C.E.T
CONNECTING
MBSCET
HOME
SEARC H
Page 2
CONNECTING M.B.S.C.E.T
USER: RAKESH QUERY: IS THERE A COMPANY PLACEMENT DRIVE TOMORROW?????? DATE: 6-12-2011. TIME:4.45 P.M
ANSWERED BY: ROHIT
DATE:6-12-2011
TIME:5PM
COMMENT
Page 1
CONNECTING M.B.S.C.E.T
Page 2
CONNECTING M.B.S.C.E.T
CONNECTING
MBSCET
ADMINISTRATOR ACTIONS:
DATESHEET SYLLABUS TIME TABLE Add | Remove Add | Remove Add | Remove
LATEST ANNOUNCEMENTS
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
CONNECTING M.B.S.C.E.T
HOME
CONNECTING
MBSCET
Page 4
CONNECTING M.B.S.C.E.T
ADMINISTATOR
ACTION: DATESHEET/SYLLABUS/TIMETABLE ADD
Page 5
CONNECTING M.B.S.C.E.T
CONNECTING
MBSCET
ADMINISTRATOR
ACTION: ADD COLLEGE ANNOUNCEMENTS EVENT DESCRIPTION
Page 2
CONNECTING M.B.S.C.E.T
FILE PATH
SUBM IT
BROWSE
Page 2
CONNECTING M.B.S.C.E.T
HOME
CONNECTING
MBSCET
ADMINISTRATOR
ACTION: ADD BRANCH ANNOUNCEMENTS
SEMESTER EVENT
DEPARTMENT OF COMPUTER SCIENCE ENGINEERING Page 3
SUBM
BROWSE
CONNECTING M.B.S.C.E.T
CONNECTING
MBSCET
ADMINISTRATOR
ACTION: ADD TEACHER ANNOUNCEMENTS
COMMON FOR ALL TEACHERS YES DEPARTMENT
NO
Page 5
CONNECTING M.B.S.C.E.T
EVENT DESCRIPTION
FILE PATH
BROWSE
SUBM IT
CONNECTING
MBSCET
Page 1
CONNECTING M.B.S.C.E.T
ADMINISTRATOR
ACTION: ADD LECTURES
BRANCH SEMESTER SUBJECT TOPIC FILE PRESENTED BY
BROWSE
SUBM IT
Page 2
CONNECTING M.B.S.C.E.T
Page 2
CONNECTING M.B.S.C.E.T
unique user id and password (which are selected by the user itself) are given to the user for further login process. LOGIN PROCESS: Now the user can login by making use of his User_id and Password provided to him through the Registration process. This process would direct the user to his individual profile. In his profile he can perform a variety of operations, depending upon his role (teacher or student). FORGOT PASSWORD: This process would enable the user to change his password, in case he has forgotten the existing one. This process involves verifying user authentication by querying his User_id, security question and Security answer. After this verification process, a new valid password is allotted to the user. The detailed working of our project which includes the flow of data, is illustrated in the data flow Diagrams below:
Page 2
CONNECTING M.B.S.C.E.T
Page 1
CONNECTING M.B.S.C.E.T
Page 1
CONNECTING M.B.S.C.E.T
Page 2
CONNECTING M.B.S.C.E.T
Page 1
CONNECTING M.B.S.C.E.T
Page 1
CONNECTING M.B.S.C.E.T
Page 2
CONNECTING M.B.S.C.E.T
Page 3
CONNECTING M.B.S.C.E.T
Page 5
CONNECTING M.B.S.C.E.T
Page 1
CONNECTING M.B.S.C.E.T
ACTIVE DATABASE:
An active database is a database that includes an event-driven architecture which can respond to conditions both inside and outside the database. Possible uses include security monitoring, alerting, statistics gathering and authorization.
DATA WAREHOUSE:
Data warehouses archive data from operational databases and often from external sources such as market research firms. Often operational data undergoes transformation on its way into the warehouse, getting summarized, anonymized, reclassified, etc. The warehouse becomes the central source of data for use by managers and other end-users who may not have access to operational data. Operations in a data warehouse are typically concerned with bulk data manipulation, and as such, it is
Page 2
CONNECTING M.B.S.C.E.T
unusual and inefficient to target individual rows for update, insert or delete. Bulk native loaders for input data and bulk SQL passes for aggregation are the norm.
DISTRIBUTED DATABASE:
The definition of a distributed database is broad, and may be utilized in different meanings. In general it typically refers to a modular DBMS architecture that allows distinct DBMS instances to cooperate as a single DBMS over processes, computers, and sites, while managing a single database distributed itself over multiple computers, and different sites. Examples are databases of local work-groups and departments at regional offices, branch offices, manufacturing plants and other work sites. These databases can include both segments shared by multiple sites, and segments specific to one site and used only locally in that site.
EMBEDDED DATABASE:
An embedded database system is a DBMS which is tightly integrated with application software that requires access to stored data in a way that the DBMS is hidden from the applications end-user and requires little or no ongoing maintenance. The "embedded database is used in real-time embedded systems such as telecommunications switches and consumer electronics devices.
END-USER DATABASE:
These databases consist of data developed by individual end-users. Examples of these are collections of documents, spreadsheets, presentations, multimedia, and other files. Several products exist to support such databases. Some of them are much simpler than full fledged DBMSs, with more elementary DBMS functionality (e.g., not supporting
Page 2
CONNECTING M.B.S.C.E.T
multiple
concurrent
end-users
on
same
database),
with
basic
programming interfaces, and a relatively small "foot-print" (not much code to run as in "regular" general-purpose databases). However, also available general-purpose DBMSs can often be used for such purpose, if they provide basic user-interfaces for straightforward data. Three types of people are involved with a general-purpose DBMS:
1. DBMS DEVELOPERS - These are the people that design and build the
DBMS product, and the only ones who touch its code. They are typically the employees of a DBMS vendor (e.g., Oracle, IBM, Microsoft, Sybase), or, in the case of Open source DBMSs (e.g., MySQL), volunteers or people supported by interested companies and organizations. They are typically skilled systems programmers.
2. APPLICATION DEVELOPERS- These are the people that design and
build a database-based application that uses the DBMS. The group members write the needed application programs which the application comprises of.
3. DATABASE ADMINISTRATORS These group members design the
needed database and maintain it. Both are well familiar with the DBMS product and use its user interfaces (as well as usually other tools) for their work. Sometimes the application itself is packaged and sold as a separate product, which may include the DBMS inside (see Embedded database; subject to proper DBMS licensing), or sold separately as an add-on to the DBMS. Every database transaction obeys the following rules:
Page 2
CONNECTING M.B.S.C.E.T
ATOMICITY - Either the effects of all or none of its operations remain ("all or nothing" semantics) when a transaction is completed (committed or aborted respectively). In other words, to the outside world a committed transaction appears (by its effects on the database) to be indivisible, atomic, and an aborted transaction does not leave effects on the database at all, as if never existed.
CONSISTENCY - Every transaction must leave the database in a consistent (correct) state, i.e., maintain the predetermined integrity rules of the database (constraints upon and among the database's objects). A transaction must transform a database from one consistent state to another consistent state (however, it is the responsibility of the transaction's programmer to make sure that the transaction itself is correct, i.e., performs correctly what it intends to perform (from the application's point of view) while the predefined integrity rules are enforced by the DBMS). Thus since a database can be normally changed only by transactions, all the database's states are consistent. An aborted transaction does not change the database state it has started from, as if it never existed (atomicity above).
ISOLATION - Transactions cannot interfere with each other (as an end result of their executions). Moreover, usually (depending on concurrency control method) the effects of an incomplete transaction are not even visible to another transaction. Providing isolation is the main goal of concurrency control.
DURABILITY - Effects of successful (committed) transactions must persist through crashes (typically by recording the transaction's effects and its commit event in a non-volatile memory).
Page 1
CONNECTING M.B.S.C.E.T
AUTH: FIELD U_ID DATA TYPE VAR CHAR(20) CONSTRAINT PRIMARY KEY
Page 1
CONNECTING M.B.S.C.E.T
VAR CHAR(10) VAR CHAR(10) VAR CHAR(50) VAR CHAR(50) CHAR(1) CHECK
REG: FIELD REG_ID SEC_CODE CREATED ROLE DATA TYPE VARCHAR(15) VARCHAR(20) CHAR(1) VARCHAR(10) CHECK CONSTRAINT PRIMARY KEY
ST_REG: FIELD REG_ID ST_NAME BRANCH DOB SEM DATA TYPE VARCHAR(15) VARCHAR(50) VARCHAR(20) CHAR(10) INTEGER(1) CONSTRAINT FOREIGN KEY,UNIQUE
Page 1
CONNECTING M.B.S.C.E.T
TE_REG: FIELD REG_ID TE_NAME DEPT QUAL DATA TYPE VARCHAR(15) VARCHAR(50) VARCHAR(20) VARCHAR(50) CONSTRAINT
Page 1
CONNECTING M.B.S.C.E.T
FORUM FIELD U_ID TOPIC QUERY ANS ANS_BY DATE DATA TYPE VARCHAR(20) VARCHAR(60) VARCHAR(200) VARCHAR(500) VARCHAR(50) DATE FOREIGN KEY CONSTRAINT FOREIGN KEY
DATESHEET: FIELD D_ID FILE DATE SEM BRANCH DATA TYPE VARCHAR(10) VARCHAR(100) DATE INTEGER(1) VARCHAR(20) CONSTRAINT PRIMARY KEY
Page 1
CONNECTING M.B.S.C.E.T
TIMETABLE: FIELD T_ID FILE DATE SEM BRANCH DATA TYPE VARCHAR(10) VARCHAR(100) DATE INTEGER(1) VARCHAR(20) CONSTRAINT PRIMARY KEY
SYLLABUS: FIELD S_ID FILE DATE SEM BRANCH DATA TYPE VARCHAR(10) VARCHAR(100) DATE INTEGER(1) VARCHAR(20) CONSTRAINT PRIMARY KEY
CLG_ANC: FIELD A_ID EVENT DESCP POST_BY DATE DATA TYPE VARCHAR(10) VARCHAR(50) CHAR(100) CHAR(50) DATE FOREIGN KEY CONSTRAINT PRIMARY KEY
Page 1
CONNECTING M.B.S.C.E.T
BRN_ANC: FIELD B_ID EVENT DESCP POST_BY BRANCH SEM DATE DATA TYPE VARCHAR(10) VARCHAR(50) CHAR(100) CHAR(50) VARCHAR(20) INTEGER(1) DATE FOREIGN KEY CONSTRAINT PRIMARY KEY
TE_ANC: FIELD TE_ID EVENT DESCP -DEPTT DATA TYPE VARCHAR(10) VARCHAR(50) CHAR(100) VARCHAR(20) CONSTRAINT PRIMARY KEY
Page 1
CONNECTING M.B.S.C.E.T
DATE
DATE
AV_LEC: FIELD AV_ID BRANCH SUB TOPIC PRESENT_BY FILE DATE SEM DATA TYPE VARCHAR(10) VARCHAR(20) VARCHAR(50) VARCHAR(50) VARCHAR(50) VARCHAR(100) DATE INT(1) FOREIGN KEY FOREIGN KEY CONSTRAINT PRIMARY KEY
Page 1
CONNECTING M.B.S.C.E.T
SEC_ANS AVAL
REG REG_ID SEC_CODE CREATED ROLE TE_REG ST_REG REG_ID REG_ID TE_NAME ST_NAME DEPT BRANCH QUAL DOB GENDER SEM TE_PHNO GENDER TE_EMAIL ST_PHNO PIC ST_PARPHNO U_ID ST_EMAIL ST_PIC U_ID
Page 1
CONNECTING M.B.S.C.E.T
CHAPTER 8 CONNECTIVITY
8.1 ADO .NET 8.1.1 INTRODUCTION:
Most applications need data access at one point of time making it a crucial component when working with applications. Data access is making the application interact with a database, where all the data is stored. Different applications have different requirements for database access. VB .NET uses ADO .NET (Active X Data Object) as its data access and manipulation protocol which also enables us to work with data on the Internet.
Page 3
CONNECTING M.B.S.C.E.T
Page 3
CONNECTING M.B.S.C.E.T
access technology would be uniform components would share a common type system, design patterns, and naming conventions. ADO.NET was designed to meet the needs of this new programming model: disconnected data architecture, tight integration with XML, common data representation with the ability to combine data from multiple and varied data sources, and optimized facilities for interacting with a database, all native to the .NET Framework. In creating ADO.NET, Microsoft embraced the following design goals.
Page 2
CONNECTING M.B.S.C.E.T
XML support is built into ADO.NET at a very fundamental level. The XML classes in the .NET Framework and ADO.NET are part of the same architecture they integrate at many different levels. We no longer have to choose between the data access set of services and their XML counterparts; the ability to cross over from one to the other is inherent in the design of both.
DATASET
The dataset is a disconnected, in-memory representation of data. It can be considered as a local copy of the relevant portions of the database. The DataSet is persisted in memory and the data in it can be manipulated and updated independent of the database. When the use of this DataSet is finished, changes can be made back to the central database for updating. The data in DataSet can be loaded from any valid data source like Microsoft SQL server database, an Oracle database or from a Microsoft Access database.
DATA PROVIDER
The Data Provider is responsible for providing and maintaining the connection to the database. A DataProvider is a set of related components that work together to provide data in an efficient and performance driven manner. The .NET Framework currently comes with two DataProviders: the SQL Data Provider which is designed only to work with Microsoft's SQL Server 7.0 or later and the OLEDB DataProvider which allows us to connect to other types of databases like Access and Oracle. Each DataProvider consists of the following component classes:
Page 2
CONNECTING M.B.S.C.E.T
The Connection object which provides a connection to the database The Command object which is used to execute a command The DataReader object which provides a forward-only, read only, connected recordset The DataAdapter object which populates a disconnected DataSet with data and performs update. Data access with ADO.NET can be summarized as follows: A connection object establishes the connection for the application with the database. The command object provides direct execution of the command to the database. If the command returns more than a single value, the command object returns a DataReader to provide the data. Alternatively, the DataAdapter can be used to fill the Dataset object. The database can be updated using the command object or the DataAdapter.
Page 1
CONNECTING M.B.S.C.E.T
Fig: ADO.NET Architecture COMPONENT CLASSES THAT MAKE UP THE DATA PROVIDERS
Page 2
CONNECTING M.B.S.C.E.T
Access and Oracle. The Connection object contains all of the information required to open a connection to the database.
Page 3
CONNECTING M.B.S.C.E.T
SelectCommand InsertCommand DeleteCommand UpdateCommand When the Update method is called, changes in the DataSet are copied back to the database and the appropriate InsertCommand, DeleteCommand, or UpdateCommand is executed.
Page 1
CONNECTING M.B.S.C.E.T
REFERENCES
1. 2. 3. 4. 5. 6. 7. 8.
http://en.wikipedia.org/wiki/ASP.NET http://asp.net-tutorials.com/ http://en.wikipedia.org/wiki/C_Sharp_(programming_language) http://www.csharp-station.com/Tutorial.aspx http://en.wikipedia.org/wiki/SQL http://en.wikipedia.org/wiki/ADO.NET http://msdn.microsoft.com/en-us/library/h43ks021(v=vs.71).aspx Asp.net, tips ,tutorial and code by Adam Nathan.
Page 1