Sie sind auf Seite 1von 61

1.

SYNOPSIS

The Project “Intranet based Administer Package” is developed for


automating the complete operations of M/S Thamizh Technologies, Sivagangai.
The Project is composed of Four Major Modules namely Training Management,
Marketing Management, Administration and Financial Management. The Training
Management module deals with Maintaining information about students, faculties,
Batches, Courses, Training aids, Infrastructure, Computers, Peripherals, Student &
Faculties Skill Sets, Course Materials, Breaks, Transfers and Dropouts.

The Training Management Module is also responsible for Maintaining


information about Staffs like Personnel Management, Skill Sets, Timings, Weekly
Shift Schedules, Salary Details, Incentives & Allowances, Appraisals, Leave and
Transfers. The System also contains a Library Management Module, which consists
of maintaining Library books, which are broadly classified into two categories
namely Reference and Loanable books.

1
2. ORGANISATION PROFILE

Thamizh Technologies is a professionally managed organization providing


total HR Solutions, Recruitments, Outsourcing and Training to various companies.
We provide services to various types of students which include Engineering, IT,
Management department etc.

 GROUP
We have an enviable history of providing high quality services in the fields
of R&D, Design and Development, Training and HR Consulting in Sivaganga. Our
organization has already established its reputation in offering High quality education
in the areas of Engineering, Arts, Science, and Management Courses.

We have a well-documented quality system, which helps us to monitor


measure and analyze our performance and also to improve our service and delivery
standards. We have a dedicated team of people for monitoring the quality norms.

SERVICES
We dedicate our trainees in Software Development, Human Resource
Consulting, Academic Assistance and Training.

2
3. PROJECT PROFILE

The Project is composed of Four Major Modules namely Training


Management, Marketing Management, Administration and Financial Management.
The Training Management module deals with Maintaining information about
students, faculties, Batches, Courses, Training aids, Infrastructure, Computers,
Peripherals, Student & Faculties Skill Sets, Course Materials, Breaks, Transfers and
Dropouts.

Training Management:
The Training Management module deals with Maintaining information about
students, faculties, Batches, Courses, Training aids, Infrastructure, Computers,
Peripherals, Student & Faculties Skill Sets, Course Materials, Breaks, Transfers and
Dropouts.

The Training Management Module is also responsible for maintaining


information about Staffs like Personnel Management, Skill Sets, Timings, Weekly
Shift Schedules, Salary Details, Incentives & Allowances, Appraisals, Leave and
Transfers.

It also deals with Maintenance of Faculty Load Charts, Student Attendance,


and weekly Shift Schedule for Staffs, Course Allocations, Classroom Allocations,
Login Id creation for students, Issuing ID Cards for the students, Maintaining
reservations & Cancellations for the Night Lab, etc. Various Reports viz. Weekly
Marketing Report, Weekly Financial Report, Daily Financial Report, Inventory
Movement Report, Peripherals Utilization Report, Enquiry by Area Report, Faculty
Load Chart, Faculties Performance Report, Student Performance Report, Monthly
Attendance Report, Lab Machine Allocation Report and Defaulters Report are
generated.

3
Financial Management:
The Financial Management deals with maintaining data about collection,
billing, miscellaneous expenses, conveyance, invoices, Cash/Cheque transactions,
Fine Amount Collection and Internal Rate of Return.

Administrator:
In Administrator module, the whole company details are handled by
administrator. The administrator is automated the complete operation of company
and the controller of the company.

Project:
This module is used to estimate the cost for project and buy needed resource
for project and warranty period, service for resource is also defined. The name of the
developed is also placed for future enhancement.

4
4. SYSTEM ANALYSIS

4.1. DEFINITION OF PROBLEM


A single-user application which is typically found on a desktop computer
there is no need for any access control - the user has access to every function within
the application. However, in a multi-user application which is deployed over
numerous devices which are linked together in a network it is more than likely that
not all functionality will be available to all users. In this situation a method is
required to allocate the trainer for the suitable participants at correct timing with
class rooms. Also maintain the records of the corporate like Participants details,
trainer profile, fees details, book entries whereby functions within the application
can only be accessed by persons to whom permission has been granted.

4.2. FEASIBILITY STUDY


Feasibility is the determination of whether or not a project is worth doing.
the processes is followed in making this determination is called a feasibility study is
the test of system proposal according to its work ability impact on the organization
ability to meet users needs, and effective use of resources the result feasibility is a
formal proposal . This simply reports – a formal document detailing the nature and
scope of the proposed solution.

The main objective of the feasibility study is test the technical, social and
economic feasibility of developing a computer system. This is done by investigation
the existing system in the area under investigation and generating ideas about a new
system on studying the feasibility of the system three major consideration are deal
with, to find whether the automation of the system feasible .

4.3. TECHNICAL FEASIBLITY


A system that can be developed technically and that will be used if installed
must still be a good invested for the organization. The assesment of technical

5
feasibility must be based on an outline design of system requirements in terms of
inputs, outputs, files, programs, procedures.

The current project has implemented to user access only details about them.
Technically, user can’t access other user details and vice versa. The current project
is to be designed so as to fit to the expectations of various categories of users
concerned with it.

4.4. ECONOMIC FEASIBILITY


The technique of cost benefit analysis is often used as a basic for accessing
economic feasibility economic feasibility deals with the analysis of cost against
benefits ( i.e.,) whether the benefits to enjoyed to the new system are worthy when
compared to the cost to be spent on the system . Economic analysis is most
frequently used technique for evaluating the cost effectiveness of the proposed
project
More commonly know us cost / benefit analysis the procedure is used to
determined whether the project have the benefits and savings. Further compared
with the existing cost in the manual procedure, the current project involves less
investment
The cost when compared to the benefits of the system are much low. Hence
the system is economically feasible. The conversion of the staff in maintaining the
paper records to sum other important work is possible which may be taken us added
advantages of this project.

Accurate and reliable information exchange with reasonable cost is possible.


Taking this into consideration, the system is found to the economically feasible.

6
4.5. PROPOSED SYSTEM
In the proposed system, maintaining different category wise security using
the types like roles, responsibilities, and the links with the above two to assign user
roles.

4.6. NEED FOR PROPOSED SYSTEM


 Reporting and with the case maintenance with the severity level is
easily give the identity of the event traced and the response to be
taken against the system.
 Automatic mailing to the users with the administrative category users
will the next added advantage over all the systems present. Since they
are all automated the hacking possibility is totally reduced to
considerable extend in our system.
 Analysis will give as further implementation of the system more
secured, and the design of the future system can be modified as per
the results of the analysis of the system proposed.
 Process can be assigned to the employees to identify the category
level with configured identity explains the development design
involved behind the application.

System proposed in entirely new to the world with the web technology and
application wise security enhancement. Since in all the cases all the systems will
take care of the positive results from the users and they normally won’t care of the
issues regarding the failures, which only can prove the applications reliability and
user interface, and mainly the accessibility control. Our application will surely met
that criteria and it can be included to any module to support the same.

7
5. SYSTEM REQUIREMENTS

5.1. HARDWARE SPECIFICATION


 Processor : Intel PIV.
 RAM : 512 MB.
 Hard Disk : 40GB.
 Display : SVGA.
 Keyboard : 108 Keys.
 Mouse : Optical.
 Digital Storage : CD or DVD

5.2. SOFTWARE SPECIFICATION


 Operating System : Windows XP.
 Frond End : ASP.NET 2005.
 Back End : MS-Access.
 Web Tool : HTML.
 Scripting Tool : VBScript.

8
ASP.NET
ASP.Net, the next generation of visual basic is designed to be the easiest and
most productive tool for creating .NET applications, including Windows
applications, Web Services and Web applications. Active Server Page.NET is a
major component of Microsoft Visual Studio .NET suite. The .NET version of
Active Server Page is a new improved version with more features and additions.
After these new additions, VB qualify to become a full object-oriented language
such as C++. ASP.NET is the following version of VB 6.0. Microsoft .NET is a new
programming and operating framework introduced by Microsoft. All .NET
supported languages access a common .NET library to develop applications and
share common tools to execute applications. Programming with visual basic using
.net is called VB.Net.

While providing the traditional ease-of-use of Visual Basic development,


Visual Basic .NET also allows optional use of new language features. Inheritance,
method overloading, structured exception handling, and free threading all make
Visual Basic a powerful object-oriented programming language. Visual Basic .NET
fully integrates with the .NET Framework and the Common Language Runtime,
which together provide language interoperability, simplified deployment, enhanced
security, and improved versioning support.

. NET Framework
The .NET Framework is an environment for building, deploying, and
running Web Services and other applications. It is the infrastructure for the
overall .NET Platform. The framework consists of three main parts: the Common
Language Runtime, the class libraries, and ASP.NET.

The Common Language Runtime and class libraries, including Windows


Forms, ADO.NET, and ASP.NET, combine together to provide services and
solutions that can be easily integrated within and across a variety of systems. The
.NET Framework provides a fully managed, protected, and feature-rich application

9
execution environment, simplified development and deployment, and seamless
integration with a wide variety of languages.

Overview of the .NET Framework


The .NET Framework is a managed, type-safe environment for application
development and execution.
It allocates memory for the storage of data and instructions
 Grants or denies the appropriate permissions to your application
 Initiates and manages application execution
 Manages the reallocation of memory for resources that are no longer
needed

The .NET Framework consists of two main components


 The Common Language Runtime and
 The .NET Framework class library.

Common Language Runtime


The common language runtime can be thought of as the environment that
manages code execution. It provides core services such
 Code compilation
 Memory allocation
 Thread management, and
 Garbage collection

.NET Framework class library


The .NET Framework class library provides a collection of useful and
reusable types that are designed to integrate with the common language runtime.
 Types are object-oriented and
 Fully extensible

10
Languages and the .NET Framework
The .NET Framework is designed for cross-language compatibility.This
means that .NET components can interact with each other no matter what language
they were originally written in.

This level of cross-language compatibility is possible because of the


common language run time. When a .NET application is compiled, it is converted
from the language it was written in (Visual Basic .NET, C#, or any other .NET
compliant language) to Microsoft Intermediate Language (MSIL or IL). This is a
low-level language designed to be read and understood by the common language run
time. Because all .NET executables and DLLs exist as intermediate language, they
can freely interoperate.

The Common Language Specification defines the minimum standards that


.NET language compilers must conform to, and thus ensures that any source code
compiled by a .NET compiler can interoperate with the .NET Framework.

The Common Type System ensures type compatibility between .NET


components. Because .NET applications are converted to IL prior to deployment and
execution, all primitive data types are represented as .NET types. Thus, a Visual
Basic Integer and a C# int are both represented in IL code as a System.Int32.
Because both languages use a common and interconvertable type system, it is
possible to transfer data between components and avoid time-consuming
conversions or hard-to-find errors.

The Structure of a .NET Application


The primary unit of a .NET application is the assembly. An assembly is a
self-describing collection of code, resources, and metadata. The assembly manifest
contains information about what is contained within the assembly. The assembly
manifest provides
 Identity information, such as the name and version number of the
assembly.

11
 A list of all types exposed by the assembly.
 A list of other assemblies required by the assembly.
 A list of code access security instructions for the assembly. This includes
a list of permissions required by the assembly and permissions to be
denied the assembly

Each assembly has one and only one assembly manifest, and it contains all
the description information for the assembly. The assembly manifest can be
contained in its own separate file, or it can be contained within one of the assembly's
modules.

Compilation and Execution of a .NET Application


When you compile a .NET application, it is not compiled to binary machine
code; rather, it is converted to IL, which is a low-level set of instructions understood
by the common language run time. This is the form that your deployed application
takes—one or more assemblies consisting of executable files and DLL files in IL
form. At least one of these assemblies will contain an executable file that has been
designated as the entry point for the application.
When execution of your program begins,
1. The first assembly is loaded into memory.
At this point, the common language run time examines the assembly
manifest and determines the requirements to run the program. It examines
security permissions requested by the assembly and compares them to the
system's security policy. If the system's security policy does not allow the
requested permissions, the application will not be run.
2. If the application passes the system's security policy, the common
language run time executes the code.
3. It creates a process for the application to run in and begins application
execution.
4. When execution starts, the first bit of code that needs to be executed is
loaded into memory and compiled into native binary code from IL by the
common language run time's Just-In-Time (JIT) compiler.

12
Once compiled, the code is executed and stored in memory as native code, so
each portion of code is compiled only once during the execution of an application.
Whenever program execution branches to code that has not yet been executed, the
JIT compiler compiles it ahead of execution and stores it in memory as binary code.
This way, application performance is maximized because only the parts of a
program that are executed are compiled.

Some of the services provided by the Execution Support are


 Automatic Memory Management
 Security
 Interoperability with Unmanaged Code
 Cross – Language Debugging Support
 Enhanced Deployment and Versioning Support

Why Should we Move to Visual Basic.NET?


There are significant changes to the language:
 A new optional Error handling structure
 Namespaces
 True Inheritance
 Free threading, and many others.

13
Components of CLR

.NET also provides many other features, such as garbage collection for
freeing up resources, true inheritance for the first time, debugging that works across
languages and against running applications, and the ability to create Windows
services and console applications.

Common Type System


The Common Type System specifies the types supported by the CLR. The
types specified by the CLR include
 Classes— the definition of what will become an object; includes properties,
methods, and events
 Interfaces— the definition of the functionality a class can implement, but
does not contain any implementation code
 Value Types—User-defined data types that are passed by value
 Delegates—Similar to function pointers in C++, delegates are often used for
event handling and call-backs

The type system sets out the rules that language compilers must follow to
produce code that is cross-language compatible. By following the type system,

14
vendors can produce code that is guaranteed to work with code from other languages
and other compilers because all languages are consistent in their use of types.

Integrated Development Environment


Visual Studio .NET provides a single integrated development environment
(IDE) that helps developers build solutions faster using key productivity features
accessible by any .NET language. The IDE is a completely customizable cockpit
that enables the highest performance for developers.  It provides unified access to
the designers, editors, and tools of Visual Studio from any .NET language.

In this system, the concept of ADO.NET will have different requirements for
working with data. In some cases, the user might simply want to display data on a
form. In other cases, the user might need to device a way to share information with
another company. The user might never need to know some of the details of data
handling — for example, user might never need to directly edit an XML file
containing data — but it is very useful to understand the data architecture in
ADO.NET.

In traditional client/server applications, components establish a connection to


a database and keep it open while the application is running. Open database
connections take up valuable system resources. In most cases, databases can
maintain only a small number of concurrent connections. The overhead of
maintaining these connections detracts from overall application performance.

Similarly, applications that require an open database connections are


extremely difficult to scale up. An application that does not scale up well might
perform acceptably with four users but will likely not to do so with hundreds.

A model based on always-connected data can make it difficult and


impractical to exchange data across application and organizational boundaries using
a connected architecture. If two components need to share the same data, both have

15
to be connected, and a way must be devised for the components to pass data back
and forth.

For all these reasons, data access with ADO.NET is designed around an
architecture that uses connections sparingly. Applications are connected to the
database only long enough to fetch or update the data. Because the database is not
holding on to connections that are largely idle, it can service many more users of
languages.

ADO.NET
ActiveX ® Data Objects.NET (ADO.NET), formerly known as ADO+, is a
new set of classes that expose the data access services of the .NET
Framework. ADO.NET is a natural evolution of ADO and is built around N-Tier
application development. ADO.NET has been created with XML at its core.

The ADO.NET object model is composed of two central components: the


connected layer, which consists of the classes that comprise the .NET Data Provider,
and the disconnected layer, which is rooted in the Dataset. 

.NET Data Providers includes the following components: the Connection


object, the Command object, the Data Reader, and the Data Adapter. The first two
should be familiar to existing ADO programmers; they are used to open a
connection to a data source and execute a command against it. The Data Reader
loosely corresponds to a forward-only, read-only

ADO.NET is essentially a collection of classes that expose methods and


attributes used to manage communications between an application and a data store.
An integral part of the .NET Framework, ADO.NET simplifies integration of data
sharing in distributed ASP.NET applications.ADO.NET is an expansion of ADO
with some of the key concepts retained. ADO.NET has greatly extended to provide
access to structured data from diverse sources, which are all accommodated in a

16
consistent, standardized programming model. ADO.NET can be used in any
consumer application that needs to connect to, and communicate with, data sources
such as Microsoft SQL Server, as well as data sources exposed via OLE DB and
XML.
The ADO.NET object model is made up
 Data View
 Data Set
 Data Provider
Data View
The Data View speaks to the Dataset and is a special class designed for
objects to bind to and can provide customized views of the Data Set. It provides
methods and properties that enable objects such as a Data Grid to bind to a Dataset
and contains properties such as Allow Edit and Count that allow the object to work
with the data in meaningful ways. A Data View is only used in conjunction with a
Dataset and never with a Data Reader.

Data Set
The Dataset is the core component of the disconnected architecture of
ADO.NET that caches data locally on the client. The Dataset is explicitly designed
for data access independent of any data source. As a result it can be used with
multiple and differing data sources, XML data, or used to manage data local to the
application. The Dataset contains a collection of one or more DataTable objects
made up of rows and columns of data, as well as primary key, foreign key,
constraint and relation information about the data in the DataTable objects.

Data Provider

The Data Provider connects to the database on behalf of ADO.NET. It


encapsulates all connections to a database. The Data Provider containing some
objects in it:
 Connection

17
 Command
 DataAdaptor
 DataReader

Connections
Connections are part of a Data Provider and the Connection object provides
connectivity to a data source. Connections can be opened in two ways:
1. Explicitly by calling the Open method on the connection;
2. Implicitly when using a DataAdapter.

The following examples demonstrate how to create and open connections to


SQL Server (SqlClient) and OLE DB (OleDb) databases.

Closing the Connection


We must always close the Connection when we are finished using it. This
can be done using either the Close or Dispose methods of the Connection object.
Connections are not implicitly released when the Connection object falls out of
scope or is reclaimed by garbage collection.

Commands
The Command object enables access to database commands to return data,
modify data, run stored procedures, and send or retrieve parameter information.
Commands contain information that is submitted to a database as a query, and, like
connections, are represented by the provider-specific classes SqlCommand and
OleDbCommand. Functionally, once the Connections are established and the
Commands are executed the results are in the form of streams. These resultant
streams can be accessed either by DataReader object, or passed into a DataSet object
via a DataAdapter.

18
The SqlCommand class provides four different methods to execute a
command. They are: ExecuteReader, ExecuteNonQuery, ExecuteScalar and
ExecuteXmlReader.

Data Adapters
The DataAdapter provides a set of methods and properties to retrieve and
save data between a DataSet and its source data store. It does the actual work of
putting returned data from a database into a DataSet. It also manages reconciling
how data should be updated against a database. Connections and Commands whose
properties are set early on in code are often passed into DataAdapters for use when
their action methods are invoked. The DataAdapter object encapsulates a set of data
commands and a database connection, which are used to fill the DataSet and update
the data source.

Data Readers
When dealing with large read only data, e.g. reading 5,000 rows of data,
the .NET framework includes the DataReader object, which is a read-only, forward-
only stream returned from the database record set. It is a highly optimized, no
buffering, and fire hose-style interface for getting the results of a query executed
against the data source. The Data Adapter provides the bridge between the .NET
Data Providers and the Dataset. The Dataset is a local buffer of tables or a collection
of disconnected record sets.

Database Interactions Are Performed Using Data Commands


To perform operations in a database, you execute SQL statements or stored
procedures (which include SQL statements). You use SQL statements or stored
procedures to read and write rows and perform aggregate functions, such as adding
or averaging. You also use SQL statements or stored procedures to create or modify
tables or columns, to perform transactions, and so on.

19
In ADO.NET you use data commands to package a SQL statement or
stored procedure.

When you want to get the records, do the following:


 Open a connection.
 Call an execute method of the command, which in turn:
 Executes the SQL statement or stored procedure referenced by the command.
 Then closes the connection.
 The connection stays open only long enough to execute the statement or
stored procedure.

Improved Reliability
The .NET Framework takes the core achievements originally made in
Windows 2000 and brings them to new levels. With advanced ways of monitoring
the health of running applications, as well as isolating applications from each other,
applications built using the .NET Framework stay up-and-running longer than ever
before.
Increased Performance
Thanks in part to advanced compilation and caching techniques, server
applications have never been faster than with the .NET Framework and its ASP.NET
technology. Customers who have moved from ASP to ASP.NET are seeing
significant increases in speed on the order of 300- to 500-percent improvements.

Developer Productivity
Developers of all backgrounds are finding that they can rapidly get up to
speed on the .NET Framework. The intuitiveness of the programming model, the
amount of code already provided in the class libraries and the amount of work that
the .NET Framework handles behind the scenes in areas such as memory
management have enabled .NET Framework developers to reap huge productivity
gains.

20
Security
The code access security technology in the .NET Framework was designed for
today's Internet environments. The .NET Framework can collect evidence about the
origin and author of an application. The .NET Framework run-time environment can
then combine that evidence with administrator-set or default security policies to
make fine-grained decisions about whether to run that application or enable it to
access a particular resource. It can even "negotiate" with the application, for
example, denying it the permission to write to a protected directory and enabling the
application to choose whether it will run, given that it has been denied that
permission.

Integration with existing systems


The COM intro technology in the .NET Framework generates a wrapper
around your existing COM components and Windows—based applications (such as
Microsoft Office), enabling us to program against them as though they were
originally written using the .NET Framework. Applications built using the .NET
Framework can connect with existing systems and packaged applications—
regardless of their underlying platform.

Mobility Support
The .NET Framework provides one unified programming model for
developing smart client and Web applications for both PCs and mobile devices such
as personal digital assistants (PDAs) and mobile phones.

Native XML Web Service Support


The .NET Framework was designed from the ground up to support XML
Web services, a model for cross-platform, distributed computing based on standard
protocols such as XML, SOAP, and HTTP. Web services can be used to integrate
applications running on different platforms, or to offer software as a service. With
the .NET Framework, an application can be transformed into a Web service with
just one simple line of code.

21
MS-ACCESS
A database program for windows, available separately or included in the
Microsoft office suite. Access is programmable using visual basic for
applications(VBA). Access can read Paradox, dBase and Btrieve files, and using
ODBC, Microsoft SQL Server, SYBASE SQL Server and Oracle data.

Microsoft Access (current full name Microsoft Office Access) is a relational


database management system from Microsoft, packaged with Microsoft Office
Professional which combines the relational Microsoft Jet Database Engine with a
graphical user interface.

Microsoft Access can use data stored in Access/Jet, Microsoft SQL Server,
Oracle, or any ODBC-complaint data container. Skilled software developers and
data architects use it to develop application software. Relatively unskilled
programmers and non-programmer “power users” can use it to build simple
applications. It supports some object-oriented (OO) techniques but falls short of
being a fully Object-Oriented development tool.

Microsoft Access was also the name of a communications program from


Microsoft, meant to compete with ProComm and other programs. This Microsoft
Access proved a failure and was dropped. Years later Microsoft reused the name for
its database software.

FEATURES
One of the benefits of Access from a programmers perspective is its relative
compatibility with SQL – queries may be viewed and edited as SQL statements, and
SQL statements can be used directly in Macros and VBA Modules to manipulate
Access tables. Users may mix and use both VBA and “Macros” for programming
forms and logic and offers object-oriented possibilities.

22
MSDE (Microsoft SQL Server Desktop Engine) 2000, a mini-version of MS
SQL Server 2000, is included with the developer edition of Office XP and may be
used with Access as an alternative to the Jet Database Engine.

Unlike a complete RDBMS, the Jet Engine lacks database triggers and stored
procedures. Starting in MS Access 2000(Jet 4.0), there is a syntax that allows
creating queries with parameters, in a way that looks like creating stored procedures,
but these procedures are limited to one statement per procedure. Microsoft Access
does allow forms to contain code that is trigged as changes are made to the
underlying table (as long as the modifications are done only with that form), and it is
common to use pass-through queries and other techniques in Access to run stored
procedures in RDBMS that support these.

In ADP files (supported in MS Access 2000 and later), the database-related


features are entirely different, because this type of file connects to a MSDE or
Microsoft SQL Server, instead of using the Jet Engine. Thus, it supports the
creation of nearly all objects in the underlying server (tables with constraints and
triggers, views, stored procedures and UDF-s). However, only forms, reports,
macros and modules are stored in the ADP file (the other objects are stored in the
back-end database).

ACCESSIBILITY FEATURES IN MICROSOFT ACCESS


If you have disabilities, you can do the following to take advantage of
accessibility features in Access:
 View and print list of all available shortcut keys.
 Use the keyboard to define relationship, add or copy text
boxes or other controls on forms and reports, and rearrange
columns in Datasheet view.
 Create a toolbar that consists only the buttons and menus you use
most often for the current databases. You can also increase the
size of the buttons and group related buttons together.

23
6. SYSTEM DESIGN

The design of the system is essentially a blue print or a plan for a solution for
the system. At the first level the focus is made which modules are needed for the
system and how modules should be interconnected. This is called system design.

In the second level, the internal design of the modules and how the
specification of the module can be satisfied is decide upon. Thus design level is
called detailed design. Since the detailed design delineates the major characteristics
of the system and also its efficiency. A Design methodology is a systematic
approach to create a design by application of a set of techniques and guidelines.

6.1. PROCESS FLOW DIAGRAM

24
6.2. DATA FLOW DIAGRAM
Data Flow Diagram (DFD) is a directed graph in which the nodes specify
processing activities and the arcs specify data items transmitted between processing
nodes.

Data Flow Diagrams are excellent mechanisms for communicating with


customers during analysis. Data Flow Diagram are quit valuable for establishing
naming conventions and names of system components such as subsystems, files and
data link.

DFD is used to represent the functional relationship of input, process and


output values presented by system. DFD shows how information moves through the
system and how it is modified by series of transformation that are applied as data
moves from input to output. DFD may be used to represent a system at any level of
abstraction.

A level 0 DFD also called context diagram represents entire system as a


single module with input to output data indicated by incoming and outgoing allows
respectively. Additional processes and information flow paths are represent as a
level 0 DFD is partitioned to reveal more detail represent the system with major
modules, data flows and data stores, the other levels will show each module in the
top level DFD in a more detailed fashion.
Square - denotes the source or destination of system data.
Arrow - identifies the flow of information it is like a PIPELINE
Circle - specify the incoming data flow or the outgoing data flow.
Open Rectangle - data store or temporary repository of data.

25
Level – 0

26
Level – 1

27
Level – 2

28
Level – 3

29
6.3. DETAILED DESIGN

Table 6.3.1 Room

Field Name Data Type Description


Room no INT IDENT Unique Identification for a room
Descp VARCHAR(10) Elaborate description of a room
Ohp BIT Whether the room has OHP facility
Lcd BIT Whether the room has LCD facility
MMedia BIT Whether the room has Multi Media facility
Capacity INT Seating capacity of this particular room
Floor VARCHAR(10) Which floor this room is located in
Office VARCHAR(10) Which branch office this room is located in

Table 6.3.2 Batch

Field Name Data Type Description


BatchId VARCHAR(5) Unique Identification for a batch
CourseId VARCHAR(10) ID of the course that this batch is pursuing
StartDate DATETIME Start Date of this batch
PEndDate DATETIME Proposed end Date Of this Batch
AendDate DATETIME Actual end date Date. Contains NULL for most
batches
ModuleId INTEGER Current module viz.HTML, Javascript, Asp,
Dhtml,etc
TimeslotId INTEGER Any one time_slot from the TIMESLOT table

Table 6.3.3 Course

Field Name Data Type Description


Course Id VARCHAR(10) Unique Identification for a course
Course Name VARCHAR(20) Name of this course viz. ECOM, Java etc
Description VARCHAR(100) Elaborate description of course
Has BIT Whether this course has placement assistance or

30
Placement not
Duration VARCHAR(10) Duration of this course
Fees VARCHAR(20) Total fees for this course

Table 6.3.4 Module

Field Name Data Type Description


Module ID INT Unique Identification for a MODULE
Module Name VARCHAR(20) Name of this MODULE viz. HTML,
JAVASCRIPT, ASP etc.
Description VARCHAR(100) Elaborate description of module
Trainer ID INT Employee Id of this Faculty who handle
this module
Duration VARCHAR(10) Duration of this particular module

Table 6.3.5 Trainer

Field Name Data Type Description


Employee ID INTEGER Unique identification for every employee
First Name VARCHAR(20) First name of the Employee
Last Name VARCHAR(20) Last name of the Employee
Gender I VARCHAR(20) Sex of the Employee
Qualification VARCHAR(20) Most recent Educational Qualification of
this employee
Birth Date DATETIME Employee’s date of birth
Hire Date DATETIME Date of the employee’s joining the
company

31
Home Phone VARCHAR(100) Employee’s Residence Phone Number
Address VARCHAR(100) Employee’s Residence Address
Email ID VARCHAR(100) Employee’s Email id
Notes VARCHAR(10) A descriptive note about this employee
Description VARCHAR(100) Elaborate description about this particular
skill set

Table 6.3.6 CRAllocation


Field Name Data Type Description
Working day DATETIME Date time vale denoting a particular
working day
Batch ID VARCHAR(5) Id of Batch for which a particular class
room is allocated
Room No INT Id of room which is allocated for a
particular timeslot
Employee ID INT Trainer who handles class in this room
Time Slot ID INT Timeslot in which this class is engaged

Table 6.3.7 Fresher

Field Name Data Type Description


Participants ID INTEGER INDENT Unique identification for every employee

First Name VARCHAR(20) First name of the Employee


Gender VARCHAR(20) Last name of the Employee
Course VARCHAR(20) Sex of the Employee
Fees VARCHAR(20) Most recent Educational Qualification of
this employee
Batch ID DATETIME Employee’s date of birth
Qualification DATETIME Date of the employee’s joining the
company
Birth Date VARCHAR(100) Employee’s Residence Phone Number

Join Date VARCHAR(100) Employee’s Residence Address

Home Phone VARCHAR(100) Employee’s Email id


Address VARCHAR(10) A descriptive note about this employee

Email ID VARCHAR(100) Elaborate description about this particular

32
skill set
Notes VARCHAR(10) Notes about the fresher

Table 6.3.8 Project

Field Name Data Type Description


Project Id Integer Unique Identification about Id
Project Name Varchar(20) Name Of the Project
No of module Integer How many Module are there
Technology used Varchar(30) What technology are used
Start date Date time When the project will be start
End date Date Time End of the project
Team Id Integer Unique Identification about Team ID
Team Name Varchar(20) Unique Identification about Team Name
Leader Name Varchar(20) Unique Identification about Leader Name
Client Id Integer(20) Unique Identification about Client Id
Client Name Varchar(20) Unique Identification about Client Name

Emp Id Varchar(20) Unique Identification about Empid

Table 6.3.9 Resource

Field Name Data Type Description


Resource ID Integer Unique Identification about Resource ID
Resource Name Varchar(20) Unique Identification about Resource
Name

33
Description Varchar(20) Description about Resource
Date Of Purchase Date Time When the resource is going to pay
Warranty Period INTEGER Warranty period for the Resource
Service INTEGER Service for the Resource

6.4. INPUT DESIGN


Identification of the correct Input and Output for a system from the major
parts of a system analysis. During the System analysis the provider’s and seeker’s
needs, the data stores, the key system elements are identified. Based on this
identification the input to be provided to the system and the outputs that are to be
generated and their formats are decided. The Input Design is the kink that ties the
information system into the World of its users. Output refers to the results that are
generated by the system. The design decision for handling input specified how data
are accepted for computer processing.

Objectives of Input Design


The quality of system input determines the quality of system output. Input
specification describes the manner in which data enter the system for processing.
Input design features can ensure the reliability of the system and produce results
from accurate data, or they can result in the production of erroneous information.
The input design also determines whether the user can interact efficiently with the
system.
Six Objectives guiding the design of the input focus on
 Effectiveness
 Accuracy
 Easy to use
 Consistency
 Simplicity
 Effectiveness

34
This means that input forms and screens serve specific
purposes.
 Accuracy
Refers to design that assures proper completion.
 Easy to Use
Means that forms and screens should are straight forward and
require no extra time to understand.
 Consistency
Means that forms and screens should group data of similar
nature together.
 Simplicity
Refers to keeping the forms and screens simple are
uncluttered.

6.5. OUTPUT DESIGN


One of the most important features of an information system for users is the
output it produces. Output is the information delivered to the users through the
information system. Without quality output, the entire system may appear to the
unnecessary that users will avoid using it. Users generally merit the system solely by
its output. Therefore an effective output design is an important feature of design
specifications.

Objective of the Output Design


Since useful output is essential to gaining use and acceptance of the system,
the system analyst should try and follow the following objectives, which are useful
for designing acceptable outputs.
 Design the output to serve the intended purpose.
 Design the output to fit the users.
 Deliver the appropriate quantity of output.

35
7. SYSTEM IMPLEMENTATION

Implementation is the stage, which is crucial in the life cycle of the new
system designed. The main stage in the implementation is planning, training,
system testing. Implementation is converting a new or revised system into an
operational one. Conversion is the main aspect of implementation. It is the process
of changing from the old system to the new one. After system is implemented, user
conducts a review of the system. It is used to gather information for the maintenance
of the system. The basic review method is a data collection method of questionnaire,
interview etc.

The proposed system is implemented by direct method in which a new a


system will be designed and implemented. The implementation plan consists of:

 Testing the developed system with sample data.

 Detection and correction of errors.

 Making necessary changes in the system.

 Checking the report with that of the existing system

 Training on new software.

 Installation of new software utilities

36
8. SYSTEM TESTING

The system as a whole was deployed in the ASP.NET 2005 and was tested.
The system was found to be working perfect and an end user has been asked to enter
the data, and further the connected systems has been tested with the sample.

5.1. UNIT TESTING


Unit testing different modules are tested against the specifications produced
during the design of the modules. Unit testing is essential for Verification of the
code produced during the coding phase and hence the goal is to test the internal
logic of the modules. Using the details design description as a guide, important paths
are tested to uncover errors with in the boundary of the Modules.

In the project, the login details of the user are being verified by various
conditions. All the conditions are satisfied, then after the user go to visit the main
form.
This testing was carried out during the programming stage itself.
 Performance Test
 Stress Test

Performance Test
It determines the amount of execution time spent in various parts of the unit,
program throughput, and response time and device utilization by the program unit.

Stress Test

37
Stress Test is those test designed to intentionally break the unit. A Great deal
can be learned about the strength and limitations of a program by examining the
manner in which a programmer in which a program unit breaks.

The main strength of the project “Intranet Based Administer Package” is


Data Integrity. Most of the data are flow entirely through the project without
breaking and any units.
5.2. INTEGRATION TESTING
System has been partitioned into sub Modules. The integration of them must
be subjected to a strong checking, so that data gets prevented from loss across the
interface. Thus Integration Testing system is subjected to integration.

There is a strong support between all the modules. All the modules were
depends the participant and trainer detail. The datas are flows to the other modules
like Class room allocation, library and bill entries.

5.3. SYSTEM TESTING


System Testing involves two kinds of activities: Integration Testing and
Acceptance Testing. Strategies for integrating software components into a
functioning product include the bottom-up strategy, the top-down strategy and the
sandwich strategy. Acceptance Testing involves planning and execution of the
functional tests, performance tests and the stress tests to verify that the implemented
system satisfies its requirements.

The System testing does not test the module wise, but the integration of each
module in the systems. System testing helps to find in discrepancies between the
original objectives of the system.

5.4. ACCEPTANCE TESTING


Acceptance testing is done with live data provided by the administrator to
ensure that the software works satisfactorily. Acceptance testing focuses on the

38
external behavior of the system. Giving inputs from actual data tested the system
and the results were found to be satisfactory.

The inputs are well verified by different conditions at different stages.


Suppose the user may give wrong username or password, then the system will
inform the wrong entry. The ID will be automatically generated for to avoid the
redundancy and duplication.
9. CONCLUSION

This project “Intranet Based Administer Package“ has been developed for
the present requirements of Neway Technologies and it works satisfactorily under
all circumstances that may arise in the real environment. It caters to need of
organizations effectively.

The programming convention like library management, billing entries are


followed ensures future updating and maintenance. Future enhancement capabilities
can be carried out without having to perform too many environment and correction
of software bugs.

The data generated with live data have proved to be information and also
helpful in making important decisions. This newly development system like
automatically billing, class room allocation and fine calculations makes consumes
less processing time and high productivity. Since the screens are user friendly like
select their date of birth by using DateTimePicker and user get familiarized with use
it. The system is designed to be highly flexible so that any future modifications and
requirement can be easily incorporated without much design complications.

The project was developed in all the cases as desired earlier. The project is
completed successfully trial runs are completed and reports are generated as desired.

39
The main aim of the project is to automate the complete operation of
company and it can be done.

APPENDIX - A
SAMPLE SCREEN

New User Registration

40
User’s Profiles

41
Login of User’s Profile

42
Full Details of the User’s information

43
Modify the user’s Profile

44
Modify / Delete the user Information

45
Different Level of Students

46
First Level (Under Graduate) Student Information

47
Examination Results

48
Mark Detail of Computer Science

49
Online Examination

50
Mark Details of the Student

51
APPENDIX - B
SOURCE LISTING

Compose.aspx
Imports System.Data.SqlClient
Public Class adcompose
Inherits System.Web.UI.Page
Dim cn As SqlConnection
Protected WithEvents Image1 As System.Web.UI.WebControls.Image
Protected WithEvents Image2 As System.Web.UI.WebControls.Image
Dim adap As SqlDataAdapter

#Region " Web Form Designer Generated Code "


<System.Diagnostics.DebuggerStepThrough()> Private Sub
InitializeComponent()
End Sub

Protected WithEvents TextBox1 As System.Web.UI.WebControls.TextBox


Protected WithEvents Button8 As System.Web.UI.WebControls.Button
Protected WithEvents Label1 As System.Web.UI.WebControls.Label
Protected WithEvents Button2 As System.Web.UI.WebControls.Button
Protected WithEvents Button1 As System.Web.UI.WebControls.Button
Protected WithEvents TextBox3 As System.Web.UI.WebControls.TextBox

52
Protected WithEvents DropDownList1 As
System.Web.UI.WebControls.DropDownList

Private Sub Page_Init(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Init
InitializeComponent()
End Sub
#End Region

Private Sub Page_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load
strpath = Server.MapPath(".") & "\CITS.mdb"
strconnect = "Provider=Microsoft.Jet.oledb.4.0;Data Source=" & strpath
fillvalues()
End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button2.Click
TextBox1.Text = ""
TextBox3.Text = ""
Label1.Text = ""
End Sub

Private Sub Button1_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button1.Click
Dim ids As Integer
Try
cn = New SqlConnection(constr)
Dim stselect As String
stselect = "select inboxid from uinbox order by inboxid"
adap = New SqlDataAdapter(stselect, cn)

53
Dim dtable As New DataTable
Dim drow As DataRow
adap.Fill(dtable)
For Each drow In dtable.Rows
ids = drow(0)
Next
ids = ids + 1
Catch ex As Exception
Response.Write(ex.ToString)
End Try
Try
cn = New SqlConnection(constr)
Dim stselect As String
Dim d As Date = Now.Date
stselect = "insert into uinbox values (" & ids & ",'" & d & "','" &
TextBox1.Text & "','" & TextBox3.Text & "','" &
DropDownList1.SelectedItem.ToString & "')"
Dim cmd As SqlCommand
cn.Open()
cmd = New SqlCommand(stselect, cn)
cmd.ExecuteNonQuery()
cn.Close()
Label1.Text = "Successfully Inserted"
Catch ex As Exception
Response.Write(ex.ToString)
End Try
End Sub

Private Sub Button8_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button8.Click
Response.Redirect("WelAdmin.aspx")

54
End Sub
End Class

Adinbox.aspx

Imports System.Data.SqlClient
Public Class adinbox
Inherits System.Web.UI.Page
Dim cn As SqlConnection
Protected WithEvents Button8 As System.Web.UI.WebControls.Button
Protected WithEvents Image1 As System.Web.UI.WebControls.Image
Protected WithEvents Image2 As System.Web.UI.WebControls.Image
Dim adap As SqlDataAdapter

#Region " Web Form Designer Generated Code "


<System.Diagnostics.DebuggerStepThrough()> Private Sub
InitializeComponent()
End Sub

Private designerPlaceholderDeclaration As System.Object


Private Sub Page_Init(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles MyBase.Init
InitializeComponent()
End Sub
#End Region

Private Sub Page_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load
'Put user code to initialize the page here
strpath = Server.MapPath(".") & "\CITS.mdb"
strconnect = "Provider=Microsoft.Jet.oledb.4.0;Data Source=" & strpath

55
fillvalues()
End Sub

Private Sub fillvalues()


Try
cn = New SqlConnection(constr)
Dim stselect As String
stselect = "select * from admininbox"
adap = New SqlDataAdapter(stselect, cn)
Dim dtable As New DataTable
Dim drow As DataRow
adap.Fill(dtable)
Response.Write("<br><br><br><br><br><center><table
border=1><tr><th> From <th> Date <th>Subject")
For Each drow In dtable.Rows
Response.Write("<tr><td> " & drow(1) & "<td>" & drow(2) & "<td><a
href=adminview.aspx?mesid=" & drow(0) & ">" & drow(3) & "</a>")
Next
Response.Write("</table>")
Catch ex As Exception
Response.Write(ex.ToString)
End Try
End Sub

Private Sub Button8_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button8.Click
Response.Redirect("weladmin.aspx")
End Sub

Private Sub ImageButton1_Click(ByVal sender As System.Object, ByVal e As


System.Web.UI.ImageClickEventArgs)

56
End Sub
End Class

Clientform.aspx

Imports System.Data.SqlClient
Public Class clientform
Inherits System.Web.UI.Page
Dim cn As New SqlConnection
Protected WithEvents Button8 As System.Web.UI.WebControls.Button
Protected WithEvents Label1 As System.Web.UI.WebControls.Label
Protected WithEvents DropDownList1 As
System.Web.UI.WebControls.DropDownList
Protected WithEvents DropDownList2 As
System.Web.UI.WebControls.DropDownList
Protected WithEvents DropDownList3 As
System.Web.UI.WebControls.DropDownList
Protected WithEvents Button3 As System.Web.UI.WebControls.Button
Protected WithEvents Button2 As System.Web.UI.WebControls.Button
Protected WithEvents Button1 As System.Web.UI.WebControls.Button
Protected WithEvents TextBox1 As System.Web.UI.WebControls.TextBox
Protected WithEvents TextBox2 As System.Web.UI.WebControls.TextBox
Protected WithEvents TextBox3 As System.Web.UI.WebControls.TextBox
Protected WithEvents TextBox4 As System.Web.UI.WebControls.TextBox
Protected WithEvents Label3 As System.Web.UI.WebControls.Label
Dim adap As SqlDataAdapter
Protected WithEvents TextBox5 As System.Web.UI.WebControls.TextBox
Protected WithEvents Image1 As System.Web.UI.WebControls.Image
Protected WithEvents Image2 As System.Web.UI.WebControls.Image
Dim adap1 As SqlDataAdapter

57
#Region " Web Form Designer Generated Code "
<System.Diagnostics.DebuggerStepThrough()> Private Sub
InitializeComponent()
End Sub

Private designerPlaceholderDeclaration As System.Object


Private Sub Page_Init(ByVal sender As System.Object, ByVal e As
System.EventArgs) Handles MyBase.Init
InitializeComponent()
End Sub
#End Region

Private Sub Page_Load(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles MyBase.Load
Dim intLoopIndex As Integer
For intLoopIndex = 0 To 2
Next
strpath = Server.MapPath(".") & "\CITS.mdb"
strconnect = "Provider=Microsoft.Jet.oledb.4.0;Data Source=" & strpath
fillvalues()
fill1values()
End Sub

Private Sub Button2_Click(ByVal sender As System.Object, ByVal e As


System.EventArgs) Handles Button2.Click
TextBox1.Text = ""
TextBox2.Text = ""
TextBox3.Text = ""
TextBox4.Text = ""
TextBox5.Text = ""
Label3.Text = ""

58
End Sub

Private Sub fill1values()


If Page.IsPostBack = True Then
Else
DropDownList2.Items.Clear()
Try
cn = New SqlConnection(constr)
Dim stselect1 As String
stselect1 = "select availprojecttitle from Cregis"
adap1 = New SqlDataAdapter(stselect1, cn)
Dim dtable As New DataTable
Dim drow As DataRow
adap1.Fill(dtable)
For Each drow In dtable.Rows
DropDownList2.Items.Add(drow(0))
Next
Catch ex As Exception
Response.Write(ex.ToString)
End Try
End If
End Sub

Private Sub Button8_Click(ByVal sender As Object, ByVal e As


System.EventArgs) Handles Button8.Click
Response.Redirect("clientdetail.aspx")
End Sub

Private Sub Button1_Click(ByVal sender As Object, ByVal e As


System.EventArgs) Handles Button1.Click
Response.Redirect("weladmin.aspx")

59
Try
cn = New SqlConnection(constr)
Dim stselect As String
stselect = "insert into clientregis values ('" &
DropDownList1.SelectedItem.ToString & "','" & TextBox1.Text & "','" &
TextBox2.Text & "','" & Val(TextBox3.Text) & "'," & TextBox4.Text &
Dim cmd As SqlCommand
cn.Open()
cmd = New SqlCommand(stselect, cn)
cmd.ExecuteNonQuery()
cn.Close()
Label1.Text = "Successfully Inserted"
Catch ex As Exception
Response.Write(ex.ToString)
End Try
End Sub

Private Sub DropDownList2_SelectedIndexChanged(ByVal sender As


System.Object, ByVal e As System.EventArgs) Handles
DropDownList2.SelectedIndexChanged
If DropDownList2.SelectedItem.Text = "Networkmonitoring" And
DropDownList2.SelectedIndex = 0 Then
Label3.Text = ""
Label3.Text = "This is Network Project"
ElseIf DropDownList2.SelectedItem.Text = " Punch Card Reader " And
DropDownList2.SelectedIndex = 1 Then
Label3.Text = ""
Label3.Text = "Reduces user's work by providing authentication to user's "
ElseIf DropDownList2.SelectedItem.Text = "Congestion control" And
DropDownList2.SelectedIndex = 2 Then
Label3.Text = ""

60
Label3.Text = " Provides solution to easier Traffic Routing "
End If
End Sub
end Class

10. BIBLIOGRAPHY

BOOK REFERENCE
1. Essential .NET, James S.Miller, Tata McGraw Hill Publications, 2002
Second Edition.
2. ASP.NET Programming, Matt J.Crouch, Neway Publicatons Private
Limited, Third Edition, 2003.
3. Programming in the .NET Environment, Damien Watking, Mark
Hammond, Brand Abrams, APress Publications, 2002.

WEBSITE REFERENCE
1. http://code.msdn.microsoft.com/GotDotNet.aspx
2. http://www.devarticles.com/c/b/MSAccess/
3. http://www.aspdotnetheaven.com/

61

Das könnte Ihnen auch gefallen