Sie sind auf Seite 1von 36

COLLEGE WEBSITE CREATION

MINI PROJECT REPORT Submitted by MANU P.K JITHESH T.S NITHIN GOPINADH RIJO GEORGE CHERIAN
ABSTRACT

A website is a collection of Web pages, images, videos and other digital assets that is hosted on one or several Web server, usually accessible via the Internet, cell phone or a LAN. The pages of websites can usually be accessed from a common root U L called the homepage, and usually reside on the same physical server. The U Ls of the pages organi!e them into a hierarchy, although the hyperlin"s between them control how the reader perceives the overall structure and how the traffic flows between the different parts of the sites. The colle e website has been developed using A#$.Net as the %ront &nd and #'L #erver as the (ac" &nd. It follows the three tier architecture with )* for coding and A+,.Net providing the classes for database connectivity. TABLE O! CONTENTS

CHAPTER

TITLE

PAGE NO

LIST O! TABLES LIST O! !IGURES

" #

INTRODUCTION

-.- A(,UT T.& T,$I) -.0 A(,UT T.& $ ,1&)T


& S'STEM ANAL'SIS

/ /

$$

0.- INT ,+U)TI,N 0.0 &2I#TIN3 #4#T&5 0.6 $ ,$,#&+ #4#T&5


-

----

0.7 %&ATU &# ,% #,%TWA & 0.7.- A#$.N&T 8 % ,NT &N+ 0.7.0 )*.N&T 8 5I++L& &N+ 0.7.6 #'L #& :& 0;;; 8 (A)< &N+ 0.7.7 A+,.N&T 0.9 T.& A ).IT&)TU AL 5,+&L 0.> #,%TWA & &'UI &5&NT# 0.? .A +WA & &'UI &5&NT#
( S'STEM DESIGN

-0 -0 -9 -9 -= 00 07 07 &)

6.- TA(L& +&#I3N 6.0 +ATA(A#& +&#I3N


6.0.- N, 5ALI#ATI,N

09 0= 0=

CHAPTER

TITLE

PAGE NO

6.6 %I3U &#


,% W&( %, 5 6-

6;

6.7 W&( %, 5 +&#I3N6- 6.7.- ),5$,N&NT# 6.9 .,5& $A3& 6.> LIN<# AN+ W&( $A3&#
* CODING 60 67

("

7.- %&ATU &# ,% LAN3UA3&

6=

TESTING

**

9.- #4#T&5 T&#TIN3

77 79 7> 7> 7>

9.-.- UNIT T&#TIN3 9.-.0 INT&3 ATI,N T&#TIN3 9.-.6 :ALI+ATI,N T&#TIN3 9.-.7 ,UT$UT T&#TIN3
+ CONCLUSION APPENDICES

*" *#

RESUME RE!ERENCES LIST O! TABLES TABLE TABLE NAME

), )$

PAGE

6.-.6.-.0 6.-.6 6.-.7 6.-.9

),NTA)T 5&##A3& 1,( &) UITL,3IN L,3IN #TU+&NTL,3 LIST O! !IGURES

09 0> 0? 0? 0=

!IGURE

!IGURE NAME

PAGE

0.7.7.0.9.6.6.6.6.0 6.6.6 6.9.6.9.0 6.>.6.>.0 6.>.6 6.>.7 6.>.9 6.>.> 6.>.? 6.>.= 6.>./

A+,.N&T +ATA A ).IT&)TU & T.& A ).IT&)TU AL 5,+&L +%+ %, A))&##IN3 W&($A3&# +%+ %, &) UIT& L,3IN +%+ %, &), + ) &ATI,N .,5& $A3& .,5& $A3& @ &) UIT& L,3INA $ ,%IL& 5ANA3&5&NT ),5$UT& #)I&N)& +&$A T5&NT $LA)&5&NT# &) UIT& &3I#T ATI,N &) UIT& #U(5I##I,N %, 5 #TU+&NT &3I#T ATI,N %, 5 A+5INI#T AT, :I&W 5(A ),U #& CHAPTER $ INTRODUCTION

0; 00 6; 6; 666 66 67 69 69 6> 6> 6? 6? 6= 6=

-.- A(,UT T.& T,$I) A website is a collection of Web pages, images, videos and other digital assets that is hosted on one or several Web server, usually accessible via the Internet, cell phone or a LAN. The pages of websites can usually be accessed from a common root U L called the homepage, and usually reside on the same physical server. The U Ls of the pages organi!e them into a hierarchy, although the hyperlin"s between them control how the reader perceives the overall structure and how the traffic flows between the different parts of the sites.

A website reBuires attractive design and proper arrangement of lin"s and images, which enables a browser to easily interpret and access the properties of the site. .ence it provides the browser with adeBuate information and functionality about the organi!ation, community, networ" etc. -.0 A(,UT T.& $ ,1&)T The website has been developed for our college @#N3)&A in an effort to ma"e it as attractive and dynamic as possible. )ompared to the eCisting site a database has been added to our proDect. The wor"ing of the proDect is as follows. The first page provides several lin"s. The .ome page contains several information about the site li"e campus, management, facilities, infrastructure etc. User Login module helps the user to login to the site. %or that he must type the username and password correctly. The login provision in this page helps the already registered user to directly access the site and there is a lin" for registration to a user who is new to this site. 5ember egistration module helps the new user to register into the site. The information

entered by the users is added into the table registration. In the Login lin" a recruiter can login using the appropriate Username and password, through which he can submit the reBuired criteria for a student to appear for a placement drive. .e can also post the number of vacancies that are available and the salary pac"ages offered. The flash news and the events corner display the latest developments, announcements and events associated with the college activities. The administrator has the responsibility for displaying the recruiters form on the notice board, in response to which student can submit his willingness to attend the drive along with his resume. CHAPTER & S'STEM ANAL'SIS 0.- INT ,+U)TI,N #ystem analysis is the process of gathering and interpreting facts, diagnosing problems and using the information to recommend improvements on the system. #ystem analysis is a problem solving activity that reBuires intensive communication between the system users and system developers.

#ystem analysis or study is an important phase of any system development process. The system is studied to the minutest detail and analy!ed. The system analyst plays the role of an interrogator and dwells deep into the wor"ing of the present system. The system is viewed as a whole and the inputs to

the system are identified. The outputs from the organi!ation are traced through the various processing that the inputs phase through in the organi!ation.

A detailed study of these processes must be made by various techniBues li"e Interviews, 'uestionnaires etc. The data collected by these sources must be scrutini!ed to arrive to a conclusion. The conclusion is an understanding of how the system functions. This system is called the eCisting system. Now, the eCisting system is subDected to close study and the problem areas are identified. The designer now functions as a problem solver and tries to sort out the difficulties that the enterprise faces. The solutions are given as a proposal. The proposal is then weighed with the eCisting system analytically and the best one is selected. The proposal is presented to the user for an endorsement by the user. The proposal is reviewed on user reBuest and suitable changes are made. This loop ends as soon as the user is satisfied with the proposal. 0.0 &2I#TIN3 #4#T&5 The eCisting college website is static which ma"es it less interactive. It doesnEt have a database connectivity. 5oreover students didnEt have an access to the details of the college through the site, hence they were not updated about the latest events and placement drives. 0.6 $ ,$,#&+ #4#T&5 In order to ma"e the site dynamic and more interactive we have tried to include a database lin" to our college website. .ence the recruiters have been provided with the facility to post their eligibility criteria, vacancies and salary pac"ages. In response to which a student can submit his willingness to appear for the drive along with his personal details. $rovision has also been made to display the latest events and announcements associated with the college online. We have developed our proDect using the t-.ee tie. /.c-itect0.e which uses the following languages. 0.7 %&ATU &# ,% #,%TWA &# :I#UAL #TU+I, .N&T &+ITI,N# 0.7.- A#$.N&T 8 % ,NT &N+ A#$.N&T is not Dust a simple upgrade or the latest version of A#$. A#$.N&T combines unprecedented developer productivity with performance, reliability, and deployment. A#$.N&T redesigns the whole process. ItEs still easy to grasp for new comers but it provides many new ways of managing proDects. (elow are the features of A#$.N&T. F &asy $rogramming 5odel

A#$.N&T ma"es building real world Web applications dramatically easier. A#$.N&T server controls enable an .T5L8li"e style of declarative programming that let you build great pages with far less code than with classic A#$. +isplaying data, validating user input, and uploading files are all ama!ingly easy. (est of all, A#$.N&T pages wor" in all browsers including Netscape, ,pera, A,L, and Internet &Cplorer. F %leCible Language ,ptions A#$.N&T lets you leverage your current programming language s"ills. Unli"e classic A#$, which supports only interpreted :(#cript and 1 #cript, A#$.N&T now supports more than 09 .N&T languages @built8in support for :(.N&T, )*, and 1#cript.N&TA, giving us unprecedented fleCibility in the choice of language. F 3reat Tool #upport We can harness the full power of A#$.N&T using any teCt editor, even Notepad. (ut :isual #tudio .N&T adds the productivity of :isual (asic8style development to the Web. Now we can visually design A#$.N&T Web %orms using familiar drag8drop8double clic" techniBues, and enDoy full8fledged code support including statement completion and color8coding. :#.N&T also provides integrated support for debugging and deploying A#$.N&T Web applications. The &nterprise versions of :isual #tudio .N&T deliver life8cycle features to help organi!ations plan, analy!e, design, build, test, and coordinate teams that develop A#$.N&T Web applications. These include U5L class modeling, database modeling @conceptual, logical, and physical modelsA, testing tools @functional, performance and scalabilityA, and enterprise framewor"s and templates, all available within the integrated :isual #tudio .N&T environment. F ich )lass %ramewor" Application features that used to be hard to implement, or reBuired a 6rd8party component, can now be added in Dust a few lines of code using the .N&T %ramewor". The .N&T %ramewor" offers over 79;; classes that encapsulate rich functionality li"e 25L, data access, file upload, regular eCpressions, image generation, performance monitoring and logging, transactions, message Bueuing, #5T$ mail, and much more. With Improved $erformance and #calability A#$.N&T lets we use serve more users with the same hardware. F )ompiled eCecution A#$.N&T is much faster than classic A#$, while preserving the GDust hit saveG update model of A#$. .owever, no eCplicit compile step is reBuired. A#$.N&T will automatically detect any changes, dynamically compile the files if needed, and store the compiled results to reuse for subseBuent reBuests.

>

+ynamic compilation ensures that the application is always up to date, and compiled eCecution ma"es it fast. 5ost applications migrated from classic A#$ see a 6C to 9C increase in pages served. F ich output caching A#$.N&T output caching can dramatically improve the performance and scalability of the application. When output caching is enabled on a page, A#$.N&T eCecutes the page Dust once, and saves the result in memory in addition to sending it to the user. When another user reBuests the same page, A#$.N&T serves the cached result from memory without re8eCecuting the page. ,utput caching is configurable, and can be used to cache individual regions or an entire page. ,utput caching can dramatically improve the performance of data8driven pages by eliminating the need to Buery the database on every reBuest. F &nhanced eliability A#$.N&T ensures that the application is always available to the users. F 5emory Lea", +ead Loc" and )rash $rotection A#$.N&T automatically detects and recovers from errors li"e deadloc"s and memory lea"s to ensure our application is always available to our users. %or eCample, say that our application has a small memory lea", and that after a wee" the lea" has tied up a significant percentage of our serverEs virtual memory. A#$.N&T will detect this condition, automatically start up another copy of the A#$.N&T wor"er process, and direct all new reBuests to the new process. ,nce the old process has finished processing its pending reBuests, it is gracefully disposed and the lea"ed memory is released. Automatically, without administrator intervention or any interruption of service, A#$.N&T has recovered from the error. F &asy +eployment A#$.N&T ta"es the pain out of deploying server applications. GNo touchG application deployment. A#$.N&T dramatically simplifies installation of our application. With A#$.N&T, we can deploy an entire application as easily as an .T5L page, Dust copy it to the server. No need to run regsvr60 to register any components, and configuration settings are stored in an 25L file within the application. F +ynamic update of running application A#$.N&T now lets we update compiled components without restarting the web server. In the past with classic ),5 components, the developer would have to restart the web server each time he

deployed an update. With A#$.N&T, we simply copy the component over the eCisting +LL, A#$.N&T will automatically detect the change and start using the new code. 0.7.0 )*.N&T 8 5I++L& &N+ In brief, )*.N&T a neCt generation of A#$ @Active #erver $agesA introduced by 5icrosoft. #imilar to previous server8side scripting technologies, )*.N&T allows us to build powerful, reliable, and scalable distributed applications. )*.N&T is based on the 5icrosoft .N&T framewor" and uses the .N&T features and tools to develop Web applications and Web services. &ven though )*.N&T sounds li"e A#$ and syntaCes are compatible with A#$ but )*.N&T is much more than that. It provides many features and tools, which let you develop more reliable and scalable, Web applications and Web services in less time and resources. #ince )*.N&T is a compiled,. N&T8based environmentH we can use any .N&T supported languages, including :(.N&T, )*, 1#cript.N&T, and :(#cript.N&T to develop )*.N&T applications. 0.7.6 #'L #& :& 0;;; 8 (A)< &N+ #'L #erver 0;;; eCceeds dependability reBuirements and provides innovative capabilities that increase employee effectiveness, integrate heterogeneous IT ecosystems, and maCimi!e capital and operating budgets. #'L #erver 0;;; provides the enterprise data management platform our organi!ation needs to adapt Buic"ly in a fast8changing environment. With the lowest implementation and maintenance costs in the industry, #'L #erver 0;;; delivers rapid return on the data management investment. #'L #erver 0;;; supports the rapid development of enterprise8class business applications that can give our company a critical competitive advantage. (enchmar"ed for scalability, speed, and performance, #'L #erver 0;;; is a fully enterprise8 class database product, providing core support for &Ctensible 5ar"up Language @25LA and Internet Bueries. F User8defined functions #'L #erver has always provided the ability to store and eCecute #'L code routines via stored procedures. In addition, #'L #erver has always supplied a number of built8in functions. %unctions can be used almost anywhere an eCpression can be specified in a Buery. This was one of the shortcomings of stored proceduresIthey couldnEt be used inline in Bueries in select lists, where clauses, and so on. $erhaps we want to write a routine to calculate the last business day of the month. With a stored procedure, we have to eCec the procedure, passing in the current month as a parameter and returning the value into an output variable, and then use the variable in our Bueries. If only we could write our own

function that we could use directly in the Buery Dust li"e a system function. In #'L #erver 0;;;, we have. F IndeCed views :iews are often used to simplify compleC Bueries, and they can contain Doins and aggregate functions. .owever, in the past, Bueries against views were resolved to Bueries against the underlying base tables, and any aggregates were recalculated each time we ran a Buery against the view. In #'L #erver 0;;; &nterprise or +eveloper &dition, we can define indeCes on views to improve Buery performance against the view. When creating an indeC on a view, the result set of the view is stored and indeCed in the database. &Cisting applications can ta"e advantage of the performance improvements without needing to be modified. F +istributed partitioned views #'L #erver ?.; provided the ability to create partitioned views using the UNI,N ALL statement in a view definition. It was limited, however, in that all the tables had to reside within the same #'L #erver where the view was defined. #'L #erver 0;;; eCpands the ability to create partitioned views by allowing us to hori!ontally partition tables across multiple #'L #ervers. The feature helps to scale out one database server to multiple database servers, while ma"ing the data appear as if it comes from a single table on a single #'L #erver. In addition, partitioned views can now be updated. F New datatypes #'L #erver 0;;; introduces three new datatypes. Two of these can be used as datatypes for local variables, stored procedure parameters and return values, user8defined function parameters and return values, or table columnsJ bigintIAn =8byte integer that can store values from 80 >6 @8/0066?0;6>=97??9=;=A through 0>68
-

@/0066?0;6>=97??9=;?A. sBlvariantIA variable8si!ed column that can store values of various #'L #erver8supported

data types, with the eCception of teCt, nteCt, timestamp, and sBlvariant. The third new datatype, the table datatype, can be used only as a local variable datatype within functions, stored procedures, and #'L batches. The table datatype cannot be passed as a parameter to functions or stored procedures, nor can it be used as a column datatype. A variable defined with the table datatype can be used to store a result set for later processing. A table variable can be used in Bueries anywhere a table can be specified. F TeCt in row data

In previous versions of #'L #erver, teCt and image data was always stored on a separate page chain from where the actual data row resided. The data row contained only a pointer to the teCt or image page chain, regardless of the si!e of the teCt or image data. #'L #erver 0;;; provides a new teCt in row table option that allows small teCt and image data values to be placed directly in the data row, instead of reBuiring a separate data page. This can reduce the amount of space reBuired to store small teCt and image data values, as well as reduce the amount of IK, reBuired to retrieve rows containing small teCt and image data values. F )ascading ri constraints In previous versions of #'L #erver, referential integrity @ IA constraints were restrictive only. If an insert, updates, or delete operation violated referential integrity, it was aborted with an error message. #'L #erver 0;;; provides the ability to specify the action to ta"e when a column referenced by a foreign "ey constraint is updated or deleted. We can still abort the update or delete if related foreign "ey records eCist by specifying the N, A)TI,N option, or we can specify the new )A#)A+& option, which will cascade the update or delete operation to the related foreign "ey records. F 5ultiple #'L server instances $revious versions of #'L #erver supported the running of only a single instance of #'L #erver at a time on a computer. unning multiple instances or multiple versions of #'L #erver reBuired

switching bac" and forth between the different instances, reBuiring changes in the Windows registry. #'L #erver 0;;; provides support for running multiple instances of #'L #erver on the same system. This allows us to simultaneously run one instance of #'L #erver >.9 or ?.; along with one or more instances of #'L #erver 0;;;. &ach #'L #erver instance runs independently of the others and has its own set of system and user databases, security configuration, and so on. Applications can connect to the different instances in the same way they connect to different #'L #ervers on different machines. F 25Lsupport &Ctensible 5ar"up Language has become a standard in Web8related programming to describe the contents of a set of data and how the data should be output or displayed on a Web page. 25L, li"e .T5L, is derived from the #tandard 3enerali!e 5ar"up Language @#35LA. When lin"ing a Web application to #'L #erver, a translation needs to ta"e place from the result set returned from #'L #erver to a format that can be understood and displayed by a Web application. $reviously, this translation needed to be done in a client application. F Log shipping

-;

The &nterprise &dition of #'L #erver 0;;; now supports log shipping, which we can use to copy and load transaction log bac"ups from one database to one or more databases on a constant basis. This allows you to have a primary readKwrite database with one or more readonly copies of the database that are "ept synchroni!ed by restoring the logs from the primary database. The destination database can be used as a warm standby for the primary database, for which we can switch users over in the event of a primary database failure. Additionally, log shipping provides a way to offload read8only Buery processing from the primary database to the destination database. 0.7.7 A+,.N&T 8 +ATA(A#& ),NN&)TI:IT4 5ost applications need data access at one point of time ma"ing it a crucial component when wor"ing with applications. +ata access is ma"ing the application interact with a database, where all the data is stored. +ifferent applications have different reBuirements for database access. A#$.N&T uses A+, .N&T @Active 2 +ata ,bDectA as itEs data access and manipulation protocol which also enables us to wor" with data on the Internet. F A+,.N&T +ata Architecture +ata Access in A+,.N&T relies on two componentsJ +ata#et and +ata $rovider. -. +ata#et The dataset is a disconnected, in8memory representation of data. It can be considered as a local copy of the relevant portions of the database. The +ata#et is persisted in memory and the data in it can be manipulated and updated independent of the database. When the use of this +ata#et is finished, changes can be made bac" to the central database for updating. The data in +ata#et can be loaded from any valid data source li"e 5icrosoft #'L server database, an ,racle database or from a 5icrosoft Access database. 0. +ata $rovider The +ata $rovider is responsible for providing and maintaining the connection to the database. A +ata$rovider is a set of related components that wor" together to provide data in an efficient and performance driven manner. The .N&T %ramewor" currently comes with two +ata$rovidersJ the #'L +ata $rovider which is designed only to wor" with 5icrosoftEs #'L #erver ?.; or later and the ,le+b +ata$rovider which allows us to connect to other types of databases li"e Access and ,racle. &ach +ata$rovider consists of the following component classesJ The )onnection obDect which provides a connection to the database. The )ommand obDect which is used to eCecute a command. The +ata eader obDect which provides a forward8only, read only, connected recordset. The +ataAdapter obDect which populates a disconnected +ata#et with data and performs update.

--

F +ata access with A+,.N&T can be summari!ed as followsJ A connection obDect establishes the connection for the application with the database. The command obDect provides direct eCecution of the command to the database. If the command returns more than a single value, the command obDect returns a +ata eader to provide the data. Alternatively, the +ataAdapter can be used to fill the +ataset obDect. The database can be updated using the command

%ig 0.7.7.- A+,.N&T +ATA A ).IT&)TU &


obDect or the +ataAdapter. F )omponent classes that ma"e up the +ata $roviders -. The )onnection ,bDect The )onnection obDect creates the connection to the database. 5icrosoft :isual #tudio .N&T provides two types of )onnection classesJ the #Bl)onnection obDect, which is designed specifically to connect to 5icrosoft #'L #erver ?.; or later, and the ,le+b)onnection obDect, which can provide connections to a wide range of database types li"e 5icrosoft Access and ,racle. The )onnection obDect contains all of the information reBuired to open a connection to the database. 0. The )ommand ,bDect The )ommand obDect is represented by two corresponding classesJ #Bl)ommand and ,le+b)ommand. )ommand obDects are used to eCecute commands to a database across a data connection. The )ommand obDects can be used to eCecute stored procedures on the database, #'L commands, or return complete tables directly. 6. The +ata eader ,bDect

-0

The +ata eader obDect provides a forward8only, read8only, connected stream recordset from a database. Unli"e other components of the +ata $rovider, +ata eader obDects cannot be directly instantiated. ather, the +ata eader is returned as the result of the )ommand obDectEs &Cecute eader

method. The #Bl)ommand.&Cecute eader method returns a #Bl+ata eader obDect, and the ,le+b)ommand.&Cecute eader method returns an ,le+b+ata eader obDect. The +ata eader can provide rows of data directly to application logic when we do not need to "eep the data cached in memory. 7. The +ataAdapter ,bDect The +ataAdapter is the class at the core of A+, .N&TEs disconnected data access. It is essentially the middleman facilitating all communication between the database and a +ata#et. The +ataAdapter is used either to fill a +ataTable or +ata#et with data from the database with its %ill method. After the memory8resident data has been manipulated, the +ataAdapter can commit the changes to the database by calling the Update method. The +ataAdapter provides four properties that represent database commandsJ #elect)ommand, Insert)ommand, +elete)ommand and Update)ommand When the Update method is called, changes in the +ata#et are copied bac" to the database and the appropriate Insert)ommand, +elete)ommand, or Update)ommand is eCecuted. 0.9 T.& A ).IT&)TU AL 5,+&L#

F $hase -J )lassic

%ig 0.9.- T.& #4#T&5 A ).IT&)TU AL 5,+&L#

-6

In the classic model, note how all layers are held within the application itself. This architecture would be very aw"ward to maintain in a large8scale environment unless eCtreme care was ta"en to fully encapsulate or modulari!e the code. (ecause $hase - of the +uwamish (oo"s sample focuses on a small retail operation, this type of design is perfectly acceptable. ItEs easy to develop and, in the limited environment of a single retail outlet, easy to maintain. In $hase -, we deliver the basic functionality and documentation of the code and design issues. F $hase 0J Two8tier $hase 0 moves to a two8tier design, as we brea" out the data access code into its own layer. (y brea"ing out this layer, we ma"e multiple8user access to the data much easier to wor" with. The developer does not have to worry about record loc"ing, or shared data, because all data access is encapsulated and controlled within the new tier. F $hase 6 and $hase 6.9J Logical three8tier and physical three8tier The business rules layer contains not only rules that determine what to do with data, but also how and when to do it. %or an application to become scalable, it is often necessary to split the business rules layer into two separate layersJ the client8side business logic, which we call wor"flow, and the server8side business logic. Although we describe these layers as client and server8side, the actual physical implementations can vary. 3enerally, wor"flow rules govern user input and other processes on the client, while business logic controls the manipulation and flow of data on the server. $hase 6 of the +uwamish (oo"s sample brea"s out the business logic into a ),5 component to create a logical three8tier application. ,ur second step in creating a three8tier application is to provide a physical implementation of the architecture. To distribute the application across a number of computers, we implement 5icrosoft Transaction #erver in $hase 6.9. The application becomes easier to maintain and distribute, as a change to the business rules affects a smaller component, not the entire application. This involves some fairly lengthy analysis because the business rules in $hase - were deliberately not encapsulated. F $hase 7J A Windows8based application $hase 7 of the +uwamish (oo"s sample is the culmination of the migration from a des"top model to a distributed n8tier model implemented as a Web application. In $hase 7, we offer three client types aimed at different browser types. We also brea" out the wor"flow logic from the client application. This logic is now implemented through a combination of A#$ script, some client8side processing @depending on the client typeA, and a ),5 component. The Wor"flow component converts

-7

A+,

ecordsets it receives from the (usiness Logic Layer component into 25L data, which is, in

turn, converted into .T5L for presentation. $hase 7 documents the benefits, architecture, and implementation issues relating to the migration of a three8tier application to a Web8based application $erformance has not been tuned for minimum system configuration. Increasing your A5

above the recommended system configuration will increase our performance, specifically when running multiple applications, wor"ing with large proDects, or doing enterprise8level development. 0.> #,%TWA & &'UI &5&NT# ,$& ATIN3 #4#T&5 ( ,W#& % ,NT &N+ +ATA(A#& LA4& W&( #& :& #& :& #I+& #) I$TIN3 J WIN+,W# 2$ J INT& N&T &2$L, & A#$.N&T J #'L #& :& 0;;; J II# J )*.N&T J 1A:A #) I$T J T)$ K I$ J .TT$, #5T$, $,$6, WA$ >.; , AN4 .TT$ ( ,W#& J

)LI&NT #I+& #) I$TIN3 ),NN&)TI,N $ ,T,),L

0.? .A +WA & &'UI &5&NT#

$ ,)&##, )L,)< #$&&+ #4#T&5 (U# A5 .++ 5,NIT, <&4 (,A + 5,+&5 5,U#& %++

J $&NTIU5 I: J 0 3.L J 60 (IT J -0= 5( J 7;3( J #:3A ),L, J -;= <&4# J 9> <($# J $#K0 J -.77 5( CHAPTER ( S'STEM DESIGN

#ystem design is the solution to the creation of a new system. This phase is composed of several systems. This phase focuses on the detailed implementation of the feasible system. It emphasis on translating design specifications to performance specification. #ystem design has two phases of development logical and physical design. +uring logical design phase the analyst describes inputs @sourcesA, out puts @destinationsA, databases @data soresA and procedures @data flowsA all in a format that meats the uses reBuirements. The analyst also specifies the user needs and at a level that virtually determines the information flow into

-9

and out of the system and the data resources. .ere the logical design is done through data flow diagrams and database design. The physical design is followed by physical design or coding. $hysical design produces the wor"ing system by defining the design specifications, which tell the programmers eCactly what the candidate system must do. The programmers write the necessary programs that accept input from the user, perform necessary processing on accepted data through call and produce the reBuired report on a hard copy or display it on the screen.

6.- TA(L& +&#I3N


T/ble (.$.$ CONTACT MESSAGE

!iel1 name email phone msg

T23e

varchar varchar bigint varchar

Co4st./i4ts null null null null

Table 6.-.0 1,( %ield)onstraintspostvarcharnullyearintnullblogintnullbtechdecimalnulltendeci malnulltwldecimalnulleCpvarcharnullsalintnullrecruitervarcharnull

The above table is used to display the details of a user viewed only by the administrator. The above table is used to display the criteria for a student to appear for a drive i.e., to be filled by the recruiter.

->

Table 6.-.6 &) UIT& L,3 %ieldTy$e)onstraintsrnamevarcharcnameintphonenobigintfaCbigintemailv archarurlvarcharunamevarcharpasswvarcharThe above table is used to signing into the website.collect the information about the recruiter whileTable 6.-.7 L,3IN%ield)onstraintsunamevarcharpassvarchar

The above table is used to store the user name and password of a recruiter to be validated later.

-?

Table 6.-.9 #TU+&NTL,3 %ield)onstraintsnamevarcharbranchvarcharyearvarchartenthfloattwelvthfloatnu lldiplomafloatnullbtechfloatbac"logintemailvarchar

The above table is used to post the details of a student.


6.0 +ATA(A#& +&#I3N

The overall obDective in the development of database technology has been to treat data as an organi!ational resource and as an integrated whole. +(5# allow data to be protected and organi!ed separately from other resources. +atabase is an integrated collection of data. The most significant form of data as seen by the programmers is data as stored on the direct access storage devices. This is the difference between logical and physical data.

+atabase files are the "ey source of information into the system. It is the process of designing database files, which are the "ey source of information to the system. The files should be properly designed and planned for collection, accumulation, editing and retrieving the reBuired information. The organi!ation of data in database aims to achieve three maDor obDectivesJ 8

F F F

+ata integration. +ata integrity. +ata independence.

The proposed system stores the information relevant for processing in the 5# #'L #& :& database. This database contains tables, where each table corresponds to one particular type of information. &ach piece of information in table is called a field or column. A table also contains records,

-=

which is a set of fields. All records in a table have the same set of fields with different information. There are primary "ey fields that uniBuely identify a record in a table. There are also fields that contain primary "ey from another table called foreign "eys.

6.0.- N, 5ALILATI,N

Normali!ation is a techniBue of separating redundant fields and bra"ing up a large table in to a smaller one. It is also used to avoid insertion, deletion and updating anomalies. All the tables have been normali!ed up to the third normal form. In short the rules for each of the three normal forms are as below.

%irst normal form

A relation is said to be in -N% if all the under lying domain of attributes contain simple individual values.

#econd normal form

The 0N% is based on the concept of full functional dependency. A relation said to be in 0N% if and only if it is in -N% and every non8"ey attribute is fully functionally dependent on candidate "ey of the table. F Third normal form

The 6N% is based on the concept of transitive dependency. A relation in 0N% is said to be in 6N% if every non8"ey attribute is non8transitively.

6.6 %I3U &#

User

#ervices
!i (.(.$ D!D !OR ACCESSING WEB PAGES

-/

U#&

%ig 6.6.0 +%+ %, L,3IN

&) UIT&

0;

ecruitlogin

#tudentlog

ecruiter I+

#tudent details

+rive details :alidation #tudent login #TU+&NT#

&) UIT&

!i (.(.( D!D !OR STUDENT RECORD CREATION

6.7 W&( %, 5 +&#I3N Web %orms are based on A#$.N&T. Wor"ing with Web %orms is similar to wor"ing with Windows %orms. (ut the difference is that we will create Web pages with Web forms that will be accessible by a Web browser. Web %orms are Web pages that serve as the user interface for a Web application. A Web %orms page presents information to the user in any browser or client device and implements application logic using server8side code. Web %orms are based on the #ystem.Web.UI.$age class. The class hierarchy for the page class is shown below.

F F F F

,bDect )ontrol Template)ontrol $age

6.7.- ),5$,N&NT# ,% W&( %, 5# In Web %orms pages, the user interface programming is divided into two partsJ the visual component @design pageA and the logic @code behind pageA.

0-

The visual element is the Web %orms page. The page consists of a file with static .T5L, or A#$.N&T server controls, or both simultaneously. The Web %orms page wor"s as a container for the static teCt and the controls we want to display. Using the :isual #tudio Web %orms +esigner and A#$.N&T server controls, we can design the form Dust li"e in any :isual #tudio application. The logic for the Web %orms page consists of code that we create to interact with the form. The programming logic is in a separate file from the user interface file. This file is the Gcode8behindG file and has an G.aspC.vbG @:(A or G.aspC.csG @)8#harpA eCtension. The logic we write in the code8behind file can be written in :isual (asic or :isual )*. The code8behind class files for all Web %orms pages in a proDect are compiled into the proDect dynamic8lin" library @.dllA file. The .aspC page file is also compiled, but differently. The first time a user loads the aspC page, A#$.N&T automatically generates a .N&T class file that represents the page, and compiles it to a second .dll file. The generated class for the aspC page inherits from the code8behind class that was compiled into the proDect .dll file. When the user reBuests the Web page U L, the .dll files run on the server and dynamically produces the .T5L output for your page. 6.9 .,5& $A3&

The home page of a website is the first page that a user perceives upon entering the website url at the browser address area. The entire website depends on how the home page is designed which forms the platform for viewing other web forms. In short, a home page forms the abstract of the entire website.

The #N3)& website begins with an interactive home page in which a recruiter username and password can be entered. A validation is performed at the database to verify whether the recruiter is an already authori!ed user, if not a recruiter is allowed to sign in by filling up the necessary details on a form. The home page appears as given below.

!i (.).$ HOME PAGE

uloilam Cclls:ii

:r;iir=irir;i - Vlicrcsc": ln:eme: Explorer http://lQealhQ 5t: !"/#ur$i/%pme &'sp(

^ \Z\

[Xj

Address

"6 7 8
GURU THE !OUNTAIN HEAD S.ee N/./2/4/ G0:. t-e .e/t soci/l . .e6o.:e. /41 3biloso3be..LS o0. 4e<e.@8 e41i4 so0.ce o6 i4s3i./tio4. T/9e / To0. o6 t-e C/:30s A Pict0.es;0e loc/tio4 06 *, /c.es /t K/1/2i.0330 o0 t-e K4le4cbe.2 Pe.0:b/<oo. .o0te. S.ee N/./2/.i/ G0.090L/: Colle e o6 E4 i4ee.i4 is * bi4s= 4o.t- o6 Kole4c-e.2 /41 $*K:s. so0tb o6 3e.0:b/<oo..

B lo i4 to /ccess .ec.0ite.s sectic

All contents M ;? #N3 ;? 0;;?, All rights reserved 5aintained by 1 5N 3roup

Web #ite +esigned and

!i (.).& HOME PAGE >RECRUITER LOGIN SECTION?

6.> LIN<# AN+ W&($A3&#

06

Through the home page a number of other web pages can be lin"ed. &ach lin" gives an elaborated detail about itself with adeBuate lists and photos. #ome of them are listed below.

%ig 6.>.$A3&

$ ,%IL&

07

%ig 6.>.0 5ANA3&5&NT

%ig 6.>.6 ),5$UT& +&$A T5&NT

#)I&N)&

%ig 6.>.9 &3I#T ATI,N

&) UIT&

0>

0?

%ig 6.>./ ),U #&

5(A
CHAPTER * CODING

7.- %&ATU &# ,% LAN3UA3&

0=

5icrosoft :isual #tudio .Net :isual #tudio .N&T is a complete set of development tools for building A#$ Web applications,

25L Web services, des"top applications, and mobile applications. :isual (asic .N&T, :isual )NN .N&T, and :isual )* .N&T all use the same integrated development environment @I+&A, which allows them to share tools and facilitates in the creation of miCed8language solutions. In addition, these languages leverage the functionality of the .N&T %ramewor", which provides access to "ey technologies that simplify the development of A#$ Web applications and 25L Web services. F The .N&T %ramewor" The .N&T %ramewor" is a multi8language environment for building, deploying, and running 25L Web services and applications. It consists of two main partsJ -. )ommon Language untime +espite its name, the runtime actually has a role in both a componentEs runtime and development time eCperiences. While the component is running, the runtime is responsible for managing memory allocation, starting up and stopping threads and processes, and enforcing security policy, as well as satisfying any dependencies that the component might have on other components. At development time, the runtimeEs role changes slightlyH because it automates so much @for eCample, memory managementAH the runtime ma"es the developerEs eCperience very simple, especially when compared to ),5 as it is today. In particular, features such as reflection dramatically reduce the amount of code a developer must write in order to turn business logic into a reusable component. 0. Unified programming classes The framewor" provides developers with a unified, obDect8oriented, hierarchical, and eCtensible set of class libraries @A$IsA. )urrently, )NN developers use the 5icrosoft %oundation )lasses and 1ava developers use the Windows %oundation )lasses. The framewor" unifies these disparate models and gives )*.netand 1#cript programmerEs access to class libraries as well. (y creating a common set of A$Is across all programming languages, the common language runtime enables cross8language inheritance, error handling, and debugging. All programming languages, from 1#cript to )NN, have similar access to the framewor" and developers are free to choose the language that they want to use. F Introduction to )*.N&T In brief, )*.N&T a neCt generation of A#$ @Active #erver $agesA introduced by 5icrosoft. #imilar to previous server8side scripting technologies, )*.N&T allows us to build powerful, reliable, and

0/

scalable distributed applications. )*.N&T is based on the 5icrosoft .N&T framewor" and uses the .N&T features and tools to develop Web applications and Web services. &ven though )*.N&T sounds li"e A#$ and syntaCes are compatible with A#$ but )*.N&T is much more than that. It provides many features and tools, which let we develop more reliable and scalable, Web applications and Web services in less time and resources. #ince )*.N&T is a compiled, .N&T8based environmentH we can use any .N&T supported languages, including :(.N&T, )*, 1#cript.N&T, and :(#cript.N&T to develop )*.N&T applications. F Advantages of )*.N&T -. .N&T )ompatible .N&T compatibility feature of )*.N&T provides applications to use the features provides by .N&T. #ome of these features are multi8language support, compiled code, automatic memory management, and .N&T base class library. We have choice to select a programming language. We can write Web applications using any .N&T supported language, including )*, :(.N&T, 1#cript.N&T and :(#cript.N&T. All )*.N&T code is compiled, rather than interpreted, which allows early binding, strong typing, and Dust8in8time @1ITA compilation to native code, automatic memory management, and caching. The .N&T base class library @()LA provides hundreds of useful classes. This library can be accessed from any. N&T supported language. 0. Web %orms and apid +evelopment Web %orms allows you to build rapid Web 3UI applications. Web %orms provides us web pages and server side controls. We can use web forms and server side controls in :#.N&T similar to we write Windows applications. :#.N&T provides Windows application similar drag and drop features, which allows us to drag server side controls on a page and set control properties and write event handlers by using wi!ard property page. The :#.N&T framewor" writes code for us under the hood and our application is ready in no time. In most of the cases, we donEt even need to "now what wi!ards write for us under the hood. 6. Native 25L #upport and 25L Web #ervices 25L is a vital part of entire .N&T framewor". . N&T uses 25L to store and transfer data among applications. The .N&T base class library provides high8level programming model classes, which can be used to wor" with 25L.

6;

An 25L Web service provides the means to access server functionality remotely. Web services use #,A$ @#imple ,bDect Access $rotocolA to provide access to clients. Web services can be used to build different layers of distributed applications and we can use different layers remotely. 7. +atabases and A+,.N&T A+,.N&T is a new version of A+, @Active2 +ata ,bDectsA. &vent though A+,.N&T sounds li"e A+,, but it are a complete redesigned database access technology. A+,.N&T allows us to access different "inds of databases using only one programming model. We must be familiar with +A,, A+,, ,+(), +, and other database access technologies previous to A+,.N&T. &ach of these technologies had its own pros and cons. A+,.N&T combines features of all of these techniBues and provides a single higher level8programming model and hides all details for us. It ma"es our Dob much simpler and provides a way to write rapid development. #ee A+,.N&T section of )* )orner for A+,.N&T source code samples and tutorials. 9. 3raphics and 3+IN 3+IN is an improved version of 3+I @3raphics +evice InterfaceA to write Windows and Web graphics applications. The .N&T base class library provides 3+I classes to write graphics applications. Using these classes not only we can write Windows applications, but we can also write Web graphics applications. #ee 3+IN section of )* )orner for sample applications and tutorials of 3+IN. >. )aching and #tate 5anagement ,ne of the most important factors in building high8performance, scalable Web applications is the ability to store items, whether data obDects, pages, or parts of a page, in memory the initial time they are reBuested. We can store these obDects on the server or on the client machine. #toring data on a server or a client is called caching. )*.N&T provides two types of caching 8 page caching and reBuest caching. We use reBuest caching to improve code efficiency and to share common data across the pages and we use page caching to provide fast access to the Web applications from clients. )*.N&T provides easy8to8use application8state and session8state management, which allows managing states of Web applications. )*.N&T also provides coo"ie less state management, means we donEt need to use coo"ies to for state storage. ?. &nhanced #ecurity )*.N&T provide us to authenticate and authori!e users for our applications. We can easily remove, add to, or replace these schemes, depending upon the needs of our application.

6-

=. 5obile +evice +evelopment New addition to )*.N&T, 5obile #+< allows us to write Web application that run on Wireless Application $rotocol @WA$A and Wireless 5ar"8up Language @W5LA and .+5L compliant devices. We can download 5obile #+< from the following lin"J .ere are many source code samples and tutorials on how to develop 5obile applications using 5obile .N&T. /. 5essaging and +irectory #ervices )*.N&T uses the 5essaging services class library, which is a high8level programming wrapper for 5#5' messaging services. The .N&T base class library also contains class wrappers for Active +irectory that enables you to access Active +irectory #ervices Interface @A+#IA, Lightweight +irectory Access $rotocol @L+A$A, and other directory services through )*.N&T applications. -;. 5igration from A#$ to )*.N&T &ven though )*.N&T syntaCes are similar to A#$, but )*.N&T is a new designed model and more obDect oriented. A#$ pages wonEt wor" without modifying it. The only advantages A#$ developers will have is familiar code syntaCes. CHAPTER ) TESTING

9.- #4#T&5 T&#TIN3

Testing is a set activity that can be planned and conducted systematically. Testing begins at the module level and wor" towards the integration of entire computers based system. Nothing is complete without testing, as it is vital success of the system.

F Testing ,bDectivesJ

There are several rules that can serve as testing obDectives, they are

-. Testing is a process of eCecuting a program with the intent of finding an error 0. A good test case is one that has high probability of finding an undiscovered error. 6. A successful test is one that uncovers an undiscovered error.
If testing is conducted successfully according to the obDectives as stated above, it would uncover errors in the software. Also testing demonstrates that software functions appear to the wor"ing according to the specification, that performance reBuirements appear to have been met. There are three ways to test a program

60

-. %or )orrectness 0. %or Implementation efficiency 6. %or )omputational )ompleCity.


Tests for correctness are supposed to verify that a program does eCactly what it was designed to do. This is much more difficult than it may at first appear, especially for large programs.

Tests for implementation efficiency attempt to find ways to ma"e a correct program faster or use less storage. It is a code8refining process, which reeCamines the implementation phase of algorithm development. Tests for computational compleCity amount to an eCperimental analysis of the compleCity of an algorithm or an eCperimental comparison of two or more algorithms, which solve the same problem.

F Testing )orrectness

The following ideas should be a part of any testing planJ

-. $reventive 5easures 0. #pot chec"s 6. Testing all parts of the program 7. Test +ata 9. Loo"ing for trouble >. Time for testing ?.
e Testing

The data is entered in all forms separately and whenever an error occurred, it is corrected immediately. A Buality team deputed by the management verified all the necessary documents and tested the #oftware while entering the data at all levels. The entire testing process can be divided into 6 phases

-. Unit Testing 0. Integrated Testing 6. %inalK #ystem testing


9.-.- UNIT T&#TIN3

As this system was partially 3UI based WIN+,W# application, the following were tested in this phase

-. Tab ,rder 0.
everse Tab ,rder

66

6. %ie ld len gth 7. %ront end validations


In our system, Unit testing has been successfully handled. The test data was given to each and every module in all respects and got the desired output. &ach module has been tested found wor"ing properly.

9.-.0 INT&3 ATI,N T&#TIN3

Test data should be prepared carefully since the data only determines the efficiency and accuracy of the system. Artificial data are prepared solely for testing. &very program validates the input data.

9.-.6 :ALI+ATI,N T&#TIN3

In this, all the )ode 5odules were tested individually one after the other. The following were tested in all the modules

-. Loop testing 0. (oundary :alue analysis 6. &Buivalence $artitioning Testing


In our case all the modules were combined and given the test data. The combined module wor"s successfully with out any side effect on other programs. &verything was found fine wor"ing.

9.-.7 ,UT$UT T&#TIN3

This is the final step in testing. In this the entire system was tested as a whole with all forms, code, modules and class modules. This form of testing is popularly "nown as (lac" (oC testing or system testing.

(lac" (oC testing methods focus on the functional reBuirement of the software. That is, (lac" (oC testing enables the software engineer to derive sets of input conditions that will fully eCercise all functional reBuirements for a program. (lac" (oC testing attempts to find errors in the following categoriesH incorrect or missing functions, interface errors, errors in data structures or eCternal database access, performance errors and initiali!ation errors and termination errors. CHAPTER + CONCLUSION

67

The proDect report entitled G),LL&3& W&(#IT& ) &ATI,NG has come to its final stage. The system has been developed with much care that it is free of errors and at the same time it is efficient and less time consuming. The important thing is that the system is robust. We have tried our level best to ma"e the site as dynamic as possible. Also provision is provided for future developments in the system. The entire system is secured. This online system will be approved and implemented soon. APPENDICES

,:& :I&W ,% :I#UAL #TU+I, 0;;9 Introduction to :isual #tudio .N&T In %ebruary 0;;0, software developers and architects worldwideH were introduced to :isual #tudio .N&T and the 5icrosoft .N&T %ramewor". This landmar" release, four years in the ma"ing, offered a unified development environment and programming model for constructing a range of software solutions. With the recent launch of :isual #tudio .N&T 0;;6, customers gained the benefits of enhanced tool and framewor" functionality, as well as increased performance, security and scalability for building enterprise8critical software. %eatures of :isual #tudio 0;;9 F efractoring

5a"ing changes to your code li"e, Gpulling a large stretch of inline code into its own methodG or Gconverting a field to be a property.G The efactoring support ma"es this easy to do the "ey tenet of

&Ctreme $rogramming created by <ent (ec" is constant efactoring. Under this programming model, we are developing code rapidly and iteratively, but to "eep our code from becoming a Dumbled mess, we must constantly efactor. efactoring is a )* only feature.

&dit and )ontinue

:isual (asic has always been about apid Application +evelopment @ A+A. ,ne "ey feature is the ability to fiC runtime errors on the fly. With :isual (asic .N&T -.; and :isual (asic .N&T -.-, this powerful feature wasnEt included. This feature is on8board for Whidbey. If we run into an eCception at runtime, we get an eCception helper that provides tips for fiCing common errors, but more importantly, we can edit the code, select %9, and it continues right where us left off. &dit and )ontinue is :( .N&T only feature. F )lic",nce

)lic",nce ma"e it easy to install applications and provide ongoing updates @#elf8UpdatingA, rather than forcing to distribute new versions of application, can Dust deploy the portion of the application

69

which has changed. In the .N&T %ramewor" -.; and -.-, href8eCes were not able to solve many deployment issues. .ref8eCes are also "nown as EEno8touch deployment, or !ero impact deploymentEE.

&ssentially, with versions -.;K-.-, we can deploy an application to a Web server, allowing users to browse to the U L for the eCe, as inJ Oa hrefPGsomeapp.eCeGQ we can run me by clic"ing this lin" OKaQ When the user clic"s the lin", the application downloads to their Internet files cache and runs. To "eep this from being a huge security hole, the application permissions are restricted based on the U L @Intranet applications get different permissions than Internet applications, for eCampleA, or other factors. This means that some applications no longer need to be deployed in the traditional senseH no more setup.eCe or 5#I href8eCes have a number of limitations

R The .N&T %ramewor" must be pre8installed on the client machine. R ThereEs no good way to bootstrap the .N&T %ramewor" down if itEs not there. R 5ost non8trivial applications consist of the main .eCe and a number of assembly files. With href8eCes,
the assembly files are downloaded on demand, which is great for corporate Intranet applications, but thereEs no way to download the application in one shot so that we "now it can be safely used off8line.

R Limited support for versioning. R The application doesnEt hoo" into AddK emove $rograms, and the application doesnEt install #tart
menu shortcuts. RESUME

The developed system is fleCible and changes can be made easily. The system is developed with an insight into the necessary modification that may be reBuired in the future. .ence the system can be maintained successfully without much rewor".

,ne of the main future enhancements of our system is to include student record that facilitates Buic" and easy retrieval of student details. #cope has aloes be made to add a lin" to the library. RE!ERENCES

-. A#$.N&T (ible 8 5ridula $arihar. 0. #'L #erver0;;; 8 1effrey . #hapiro. 6. www.c8sharpcorner.com 7. www.programmersheaven.com

6>

Das könnte Ihnen auch gefallen