Sie sind auf Seite 1von 66

Submitted In The Partial Fulfillment of The Requirement For The Award of Degree Of Master Of Computer Applications (MCA) (Session:

2011-2012)

Kurukshetra University, Haryana

Declaration from the student


I, XYZ, a student of Master of Computer Applications (MCA), in the Directorate of Distance Education, Kurukshetra University, Kurukshetra, under Regn. No-09DE1418, for the session 20112012, hereby, declare that the project entitled CITY GUIDE has been completed by me under the supervision of Mr. Kumar. The matter embodied in this project has not been submitted earlier for award of any degree or diploma to the best of my knowledge and belief.

Date:

xyz

CERTIFICATE It is certified that XYZ, a student of Master of Computer Applications (MCA) in the Directorate of Distance Education, Kurukshetra University, Kurukshetra, under Regn. No.09DE1418 fi=or the session 2011-2012, has completed the project entitled CITY GUIDE under my supervision.

Guide Name: Mr. Kumar

ACKONWLEDGEMENT
During the entire project I encounter many new experience and problem with several difficulties. As any project work, this one wouldnt have been possible without the contribution of many people behind the scenes .It is not always easy to make and introduces new things but I am very happy to complete this project. I extend my sincerest thanks to our respected trainer Mr. Kumar under whose management and direction this project has been undertaken. He guiding force and prime motivation to lift me from the initialization state to the successful completion of the project. His friendly guidance and discussion over the complexities of a real time project invoked a deep though in me. Undertaking a project such as this place an equal if not greater pressure on friends and family members closest to me. Thanks to although who helped me in one-way or, other to all whose name unmentioned. The website is developed using Front End C# ASP.NET and MSSQL Server.

INDEX
S. No .
1.

Topic
Introduction About the project About the company

Page No.
6-7

2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15.

Current System Limitations of current system Proposed System ER-Diagram DFDs System Flowchart Structured Chart Gantt Chart Menu Tree Form Layout Table Listing Report Listing References Conclusion

6 7 7 10 11 17 18 19 20 21 22 24 25 26

1. Introduction
1.1 About the project :
Mandi district (earlier known as Mandavya Nagar) is one of the central districts of Himachal Pradesh state in northern India. Mandi town is the headquarters of Mandi district Mandi. The town has both mythological and historical significance and boasts of a unique temple architecture. It is also referred to as ChhotaKashi as there are many ancient temples in the city and on the banks of river Beas. The river Beas flows through the town and hills, which makes this town more scenic. It has a serene ambiance though the modern development has made its inroads here in terms of infrastructural developments. The town is an important commercial hub of the state. It is a major transit route to KulluManali and other adjoining places from both NH-21 (Chandigarh-Manali highway) and NH-20 (Pathankot-Mandi highway). Sundarnagar is one of the emerging towns of the district. Mandi has an educated middle class and people converse in Mandyali, one of the Pahari languages of Himachal. This web site contains information about Distt. Mandi, including geography, health studies, science, history, news, and preparation. This we site also contains links District Blog, Forum, News & Events, Industries, Hotels, Tour & Travels, Bank & ATM, Hospitals, Govt. Offices, Internet & Computers, Bakers &Resturant, Malls & Shops, Studio & Printing, Jewelers.

1.2

About the company :


Swarniminfosoft Pvt. Ltd. a leading offshore Development Company that delivers solutions to meet the client's objectives by combining technical expertise, quality and value has been providing services to its clients from India, Working with Swarniminfosoft makes life open to a world on innovation, creativity,

challenge and style. We are here with the opportunity that gives you continual career growth and knowledge. IT Training Training is often your opportunity to proactively move your IT career forward.This hunger is driven by the rapid rate of change in all spheres of life that are now affected by information technology.Cramming for tests and reading text materials alone are not enough to establish your IT career.If you want to build a career in IT and you have a degree or certification without practical skills, training is essential for you. You need to acquire these skills and knowledge to advance your IT career. SwarnimInfosoft Pvt. Ltd. is specialized in imparting different types of training according to the needs of the IT Global Market. SwarnimInfosoft Pvt. Ltd. offers high end industrial training under the brand Tech Mentro. Tech Mentro is a renowned name in IT training in Noida, Delhi (NCR).

System Analysis and Design:


Systems are created to solve problems. One can think of the systems approach as an organized way of dealing with a problem. In this dynamic world, the subject System Analysis and Design (SAD), mainly deals with the software development activities.

OBJECTIVES After going through this lesson, you should be able to - define a system - explain the different phases of system development life cycle - enumerate the components of system analysis - explain the components of system designing

DEFINING A SYSTEM A collection of components that work together to realize some objectives forms a system. Basically there are three major components in every system, namely input, processing and output.

Basic System Components Input Output Processing

Computer Applications In a system the different components are connected with each otherand they are interdependent. For example, human body representsa complete natural system. We are also bound by many nationalsystems such as political system, economic system, educational systemand so forth. The objective of the system demands that someoutput is produced as a result of processing the suitable inputs. Awell-designed system also includes an additional element referredto as control that provides a feedback to achieve desired objectivesof the system.

SYSTEM LIFE CYCLE

System life cycle is an organizational process of developing and maintainingsystems. It helps in establishing a system project plan, becauseit gives overall list of processes and sub-processes required fordeveloping a system.System development life cycle means combination of various activities.In other words we can say that various activities put togetherare referred as system development life cycle. In the System Analysisand Design terminology, the system development life cycle alsomeans software development life cycle. Following are the different phases of system development life cycle: Preliminary study Feasibility study Detailed system study System analysis System design Coding Testing Implementation Maintenance

Phases of System Development Life Cycle System Study Feasibility Study System Analysis System Design Maintenance Implementation Testing Software Development Life Cycle Coding

PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE Let us now describe the different phases and related activities ofsystem development life cycle. 9

(a) Preliminary System Study Preliminary system study is the first stage of system developmentlife cycle. This is a brief investigation of the system under considerationand gives a clear picture of what actually the physical systemis? In practice, the initial system study involves the preparation of aSystem Proposal which lists the Problem Definition, Objectives ofthe Study, Terms of reference for Study, Constraints, Expected benefitsof the new system, etc. in the light of the user requirements.The system proposal is prepared by the System Analyst (who studiesthe system) and places it before the user management. The managementmay accept the proposal and the cycle proceeds to thenext stage. The management may also reject the proposal or requestsome modifications in the proposal. In summary, we wouldsay that system study phase passes through the following steps: problem identification and project initiation background analysis inference or findings (system proposal)(b) Feasibility StudyIn case the system proposal is acceptable to the management, the Computer Applicationsnext phase is to examine the feasibility of the system. The feasibilitystudy is basically the test of the proposed system in the light of its workability, meeting users requirements, effective use of resourcesand of course, the cost effectiveness. These are categorized as technical,operational, economic and schedule feasibility. The main goalof feasibility study is not to solve the problem but to achieve thescope. In the process of feasibility study, the cost and benefits areestimated with greater accuracy to find the Return on Investment(ROI). This also defines the resources needed to complete the detailedinvestigation. The result is a feasibility report submitted tothe management. This may be accepted or accepted with modificationsor rejected. The system cycle proceeds only if the managementaccepts it.

Detailed System Study The detailed investigation of the system is carried out in accordancewith the objectives of the proposed system. This involves detailedstudy of various operations performed by a system and their relationshipswithin and outside the system. During this process, dataare collected on the available files, decision points and transactionshandled by the present system. Interviews, on-site observation andquestionnaire are the tools used for detailed system study. Usingthe following steps it becomes easy to draw the exact boundary ofthe new system under consideration: Keeping in view the problems and new requirements Workout the pros and cons including new areas of the system 10

All the data and the findings must be documented in the form ofdetailed data flow diagrams (DFDs), data dictionary, logical data structuresand miniature specification. The main points to be discussedin this stage are: Specification of what the new system is to accomplish based onthe user requirements. Functional hierarchy showing the functions to be performed bythe new system and their relationship with each other. Functional network, which are similar to function hierarchy butthey highlight the functions which are common to more thanone procedure. List of attributes of the entities these are the data items whichneed to be held about each entity (record)Introduction to System Analysis and Design

System Analysis Systems analysis is a process of collecting factual data, understandthe processes involved, identifying problems and recommending feasiblesuggestions for improving the system functioning. This involve studying the business processes, gathering operational data, understandthe information flow, finding out bottlenecks and evolvingsolutions for overcoming the weaknesses of the system so as toachieve the organizational goals. System Analysis also includes subdividingof complex process involving the entire system, identificationof data store and manual processes.

System Design Based on the user requirements and the detailed analysis of theexisting system, the new system must be designed. This is the phaseof system designing. It is the most crucial phase in the developmentsof a system. The logical system design arrived at as a result of systems analysis is converted into physical system design. Normally,the design proceeds in two stages: Preliminary or General Design Structured or Detailed Design Preliminary or General Design: In the preliminary or general design,the features of the new system are specified. The costs of implementingthese features and the benefits to be derived are estimated.If the project is still considered to be feasible, we move to the detaileddesign stage. Structured or Detailed Design: In the detailed design stage, computeroriented work begins in earnest. At this stage, the design ofthe system becomes more structured. 11

Structure design is a blueprint of a computer system solution to a given problem having the Computer Applicationssame components and inter-relationships among the same componentsas the original problem. Input, output, databases, forms, codificationschemes and processing specifications are drawn up in detail. There are several tools and techniques used for describing the system design of the system. These tools and techniques are: Flowchart Data flow diagram (DFD) Data dictionary Structured English Decision table Decision tree Each of the above tools for designing will be discussed in detailed in the next lesson. The system design involves: i. Defining precisely the required system output ii. Determining the data requirement for producing the output iii. Determining the medium and format of files and databases iv. Devising processing methods and use of software to produce output v. Determine the methods of data capture and data input vi. Designing Input forms vii. Designing Codification Schemes viii. Detailed manual procedures ix. Documenting the Design

Coding The system design needs to be implemented to make it a workablesystem. This demands the coding of design into computer understandablelanguage, i.e., programming language. This is also calledthe programming phase in which the programmer converts the proIntroductionto System Analysis and Design gram specifications into computer instructions, which we refer to asprograms. It is an important stage where the defined procedures aretransformed into control specifications by the help of a computerlanguage. The programs coordinate the data movements and controlthe entire process in a system.It 12

is generally felt that the programs must be modular in nature.This helps in fast development, maintenance and future changes, if required.

Testing Before actually implementing the new system into operation, a testrun of the system is done for removing the bugs, if any. It is animportant phase of a successful system. After codifying the wholeprograms of the system, a test plan should be developed and run ona given set of test data. The output of the test run should match theexpected results. Sometimes, system testing is considered a part ofimplementation process.Using the test data following test run are carried out: Program test System test Program test: When the programs have been coded, compiled andbrought to working conditions, they must be individually tested withthe prepared test data. Any undesirable happening must be notedand debugged (error corrections)System Test: After carrying out the program test for each of theprograms of the system and errors removed, then system test isdone. At this stage the test is done on actual data. The completesystem is executed on the actual data. At each stage of the execution,the results or output of the system is analysed. During theresult analysis, it may be found that the outputs are not matchingthe expected output of the system. In such case, the errors in theparticular programs are identified and are fixed and further testedfor the expected output.When it is ensured that the system is running error-free, the usersare called with their own actual data so that the system could beshown running as per their requirements.

Implementation After having the user acceptance of the new system developed, theimplementation phase begins. Implementation is the stage of a projectduring which theory is turned into practice. The major steps involvedin this phase are: l Acquisition and Installation of Hardware and Software l Conversion l User Training l Documentation The hardware and the relevant software required for running the system must be made fully operational before implementation. The 13

conversion is also one of the most critical and expensive activities in the system development life cycle. The data from the old system needs to be converted to operate in the new format of the new system. The database needs to be setup with security and recovery procedures fully defined. During this phase, all the programs of the system are loaded onto the users computer. After loading the system, training of the user starts. Main topics of such type of training are: How to execute the package How to enter the data How to process the data (processing details) How to take out the reports After the users are trained about the computerized system, workinghas to shift from manual to computerized working. The process iscalled Changeover. The following strategies are followed forchangeover of the system. (i) Direct Changeover: This is the complete replacement of the oldsystem by the new system. It is a risky approach and requirescomprehensive system testing and training. (ii) Parallel run: In parallel run both the systems, i.e., computerizedand manual, are executed simultaneously for certain definedperiod. The same data is processed by both the systems. Thisstrategy is less risky but more expensive because of the following: Manual results can be compared with the results of the computerizedsystem.

Online Medical shop Management system


Overview:It is the complete Online medical shop management software is so designed as to ease the work load of medical shop professionals. The main feature includes invoicing, inventory and stock control, accounting, client and vendor management. This software helps you to track all the profits, loss, profitable clients and products of medical shop moreover its a medical shop accounting software. Flexible and adaptive software suited to medical shops or stores or pharmacies of any size.

Current system Features:14

Menu driven, Key board and mouse navigation Paperless practice Improve efficiency, productivity Cost effective solutions Graphical User Interface with Context Sensitive Help Automatic importing of drug list Inbuilt account group and account ledgers Option for setting default company Keep address book / telephone directory for easy access Option for setting default company

Limitations of current system: We cant view a financial report of past financial year We cant created multiple companies with different financial year Not maintain all financial report and financial statements such as day book, profit and loss amount and balance sheet It allows only one user therefore it is not provide a high security Not have a better search option for finding available product of company It provide only 50 reports~ 15 ~

Proposed system:It is the complete medical shop management software is so designed as to ease the work load of medical shop professionals. The main feature includes invoicing, inventory and stock control, accounting, client and vendor management. This software helps you to track all the profits, loss, profitable clients and products of medical shop moreover its a medical shop accounting software. Flexible and adaptive software suited to medical shops or stores or pharmacies of any size. This System will store the information of medicines & customers in the system. It will also store the information about stock details. This system provides security by granting access rights for changing the sensitive data to administrator only. Customized search

15

options are also available in this system. This system can generate all kinds of reports as per the users requirements.

Proposed system feature:


Multiple companies with different financial year can be created We can view report of past financial year Back up and restore facility Keep record of daily customers Keep records of salesmen Tracking sales done by a particular salesman Manage counter sale Keep track of instant collecting medicines from near by medical shop and selling directly Reminders for product low stock, product short expiry Keeps track of all payment , receipt of company Creating different users with different privilege level for providing high security Handle financial accounting. Provides around 100 reports with maximum filtering option Better search option for finding available products of company Search can be filtered by product group, product, shelf,

System Requirements: Required processor :Pentium 90 MHz or faster Required RAM :128 MB (256 or more recommended) 25 MB of available hard-disk space for installation CD-ROM drive (only for installation) 1,024x768 display (1,280x800 recommended)

16

Software Specification: Operating system: .Net framework 2.0 version compactable software platform Technology: Microsoft .net 2005 Front end: C#.NET Back end: Microsoft SQL Server 2005

INTRODUCTION C# Language
Welcome to this C# tutorial. With the introduction of the .NET framework, Microsoft included a new language called C# (pronounced C Sharp). C# is designed to be a simple, modern, general-purpose, object-oriented programming language, borrowing key concepts from several other languages, most notably Java.

C# could theoretically be compiled to machine code, but in real life, it's always used in combination with the .NET framework. Therefore, applications written in C#, requires the

17

.NET framework to be installed on the computer running the application. While the .NET framework makes it possible to use a wide range of languages, C# is sometimes referred to as THE .NET language, perhaps because it was designed together with the framework.

C# is an Object Oriented language and does not offer global variables or functions. Everything is wrapped in classes, even simple types like int and string, which inherits from the System.Object class.

C# can be written with any text editor, like Windows Notepad, and then compiled with the C# Command line compiler, csc.exe, which comes with the .NET framework. However, most people prefer to use an IDE (Integrated Development Environment), and Microsoft offers several options for this. Their flagship is Visual Studio, which can be used to work on every possible aspect of the .NET framework. This product is very advanced, and comes in several editions. Visual Studio is not exactly cheap, and might even be too advanced for hobby programmers.

With .NET framework 2.0, Microsoft introduced the so-called Express versions, targeted at hobby programmers and people wanting to try .NET, and they continued this tradition with the later release of .NET 3.0 and 3.5. The Express versions only work for one language, like C# or VB.NET, and miss some of the really advanced features of Visual Studio. However, they are free and will work just fine for learning the languages, which is why we will use it for this tutorial. C# and it's Features :-

18

1. C# is a simple, modern, object oriented language derived from C++ and Java. 2. It aims to combine the high productivity of Visual Basic and the raw power of C++. 3. It is a part of Microsoft Visual Studio7.0. 4. Visual studio supports Vb, VC++, C++, Vbscript, Jscript. All of these languages provide access to the Microsoft .NET platform. 5. .NET includes a Common Execution engine and a rich class library. 6. Microsoft's JVM equiv. is Common language run time (CLR). 7. CLR accommodates more than one languages such as C#, VB.NET, Jscript, ASP.NET, C++. 8. Source code --->Intermediate Language code (IL) ---> (JIT Compiler) Native code. 9.The classes and data types are common to all of the .NET languages. 10. We may develop Console application, Windows application, and Web application using C#. 11. In C# Microsoft has taken care of C++ problems such as Memory management, pointers etc.

12. It supports garbage collection, automatic memory management and a lot. MAIN FEATURES OF C#LANGUAGE 1. Pointers are missing in C#. 2. Unsafe operations such as direct memory manipulation are not allowed. 3. In C# there is no usage of ": or "->" operators. 4. Since it`s on .NET, it inherits the features of automatic memory management and garbage collection. 5. Varying ranges of the primitive types like Integer, Floats etc.

19

6. Integer values of 0 and 1 are no longer accepted as Boolean values. Boolean values are pure true or false values in C# so no more errors of "="operator and "=="operator. "==" is used for comparison operation aC# and its Features.

CHAPTER 9
INTRODUCTION ABOUT ASP .NET AND RDBMS:.NET FRAMEWORK

20

Microsoft introduced the .NET Framework with the intention of enhancing the interoperability of applications. This framework aims at integrating various programming languages and services. It is designed to make significant improvements in code reuse, code specialization resource management, Multilanguage development, security, deployment and administration. It consists of all the technologies that help in creating and running robust, scalable and distributed applications. .NET offer complete suit for developing and deploying applications. This suite consist of .NET Products, .NET Services and the .NET framework.

.NET Product:
Microsoft has already introduced Visual Studio.NET, which is a tool for developing .NET applications, by using programing language with Visual Basic, Visual C# and Visual C++. This product allows developer to create applications that are capable of interacting seamlessly with each other.

.NET Service:
.NET Framework helps us to create software such as web services. A web service is an application or business logic that is accessible through slandered Internet protocol such as HTTP (Hyper Text Transfer Protocol) and Simple object Access Protocol (SOAP). We can identify the service by a Uniform Resource Locator (URL). The public Interfaces and binding of 21

the web service are described by using XML. Users can subscribe to such a service and use it as long as they need it, regardless of their hardware and software platforms. .NET Framework: it is the foundation on which you design, develop, and deploy applications. It is a consistent and simplified programming model that helps you to easily build robust applications. It is the core of the .NET infrastructure because it exists as a layer between .NET applications and the underlying operating system. In other words , the .NET Framework encapsulates most of the basic functionality, such as debugging and security services, which were earlier built into various programming languages in the form of a collection of services and classes.

Common Language Runtime (CLR)


The CLR is one of the essential components of the .NET framework. CLR is the environment in which all programs that use .NET technologies are executed. It provides services such as code compilation, memory allocation, and garbage collection. The CLR allows the execution of code across Different platforms by translating code into Intermediate Language (IL). IL is a low level language that the CLR understands.

IL is converted into machine language during execution by the JIT compiler. During JIT compilation, code is also checked for type safety. Type safety ensures that objects are always accessed in a compatible way. If you try to assign an 8-byte value to a variable of size 4 byte, the CLR will detect and trap it. 22

CLR consists of a set of common rules followed by all the languages of the .NET framework. This set of rules is known as CLS. CLS enables an objects or application to interact with objects or applications of other languages. The classes that follow the rules specified by CLS are termed as CLS-compliant classes.

One of the specifications defined in CLS is common Type System (CLS), which provides a type system that is common across all languages. CTS defines how data types, how data types are declared, used, and managed in the code during run time. The CTS also defines the rules that ensure that the data types of objects written in various languages are table to interact with each other. The source code needs to be compiled before execution.CLR plays an important role in the process of compilation and execution of the program.

pRO Program code

IL

Metadata

During execution ,CLR performs the following steps: Loading assemblies and identifying namespaces: Assemblies are loaded into the memory.After loading assemblies, CLR identifies namespace for code in assemblies. Namespace are a collection of classes. The .NET Framework uses namespaces to organize its classes in a hierarchy.Namespace implicitly have public access and this cannot be changed.

23

JIT compilation: Before execution, IL is converted into machine language by JIT compiler. Next, during the verification process, the IL code is examined to confirm the following points: The memory location that code needs to access is available. Methods are called only through properly defined types IL has been correctly generated.

Garbage collection:
The garbage collection process begins after JIT compilation and manages the allocation and deallocation of memory for an application. Whenever you create an object, the CLR allocates memory for the object from the managed heap. A managed heap is of the memory that is available for program execution. If sufficient memory is not available on the managed heap, the garbage collection process is invoked.

Advantage of the.NET Framework


Some of the advantages of the .NET Framework are:

Consistent programming model :


The .NET Framework provides a common object-oriented programming model across language. This model can be used to perform severl, and retrieving data.

Multi-platform applications:
There are several versions of Windows most of which run on x86 CPUs. Some versions, such as Windows CE and the 64-bit Windows, run on non-x86 CPUs as well. A .NET application can execute on any architecture that is supported by the CLR. In future, a CLR version could even be built for non-Windows platforms. 24

Multi-language integration:
.NET allows multiple languages to be integrated. For example, it is possible to create a class in VC# that is derived from a class implemented in VB.NET. To enable objects to interact with each other regardless of the language used to develop them, a set of language feature has been defined in CLS.

Automatic resource management:


While creating an application, a programmer may be required to write code for managing resources such as files, memory, network connections, and database resources.

Ease of develop:

One of the goals of the .NET Framework is to simplify application deployment. .NET application can be deployed simply by copying files to the target computer. Deployment of components has also been simplified. Till now, Microsofts Component Object Model(COM) has been used for creating components. However, COM sffers from various problems related to deployment. For example, every COM component needs to be before it can be used in an application.

The .NET framework is a new computing platform that simplifies application development in the highly distributed environment of the internet. The .NET Framework 25

is designed to fulfill the following objectives: the .NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. The key components of the .NET Framework are the common language runtime and the .NET Framework class library, which include VB.NET, ADO.NET and Windows Forms. The .NET Framework provides a managed execution environment, simplified development and deployment, and integration with a wide variety of programming languages.

To provide a consistent objectives-oriented programming environment whether object code is stored and executed locally, executed locally but internetdistributed or executed remotely.

To provide a code-execution environment that minimizes software deployment and versioning conflicts. To provide a code-execution environment that guarantees safe execution of code, including code created by an unknown or semi trusted hired party. To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments. To build all communication on industry standards to ensure that code based on the .NET Framework can integrate with any other code. The .NET Framework has two main components:

26

The common language runtime and

The .NET Framework class library.

ASP (Active Server Pages)


Microsoft Active Server Pages (ASP) was developed by Microsoft on July 16, 1996. It is a powerful and easy technology to create dynamic web pages. The main purpose of ASP is to decrease the load on the browser by performing many of the tasks done earlier by the Browser, which increases the response time for each request. With the help of ASP, you can combine HTML pages, script commands and Active X components to create interactive web pages.

Server-Side Scripting
ASP is a Server-Side Scripting language. Server-Side Scripting deals with storage of data, server-side validations, security issues and the management of transactions.ASP Scripts are processed on the Web Server. The Web Server then generates the Web pages that are sent to the browser. The benefit of ASP is that users cannot view document, because only the generated result is sent to the browser.

Working of ASP

27

ASP is process on the web server. So it requires web server application to be executed. You can use Internet Information Server (IIS) or Personal Web Server (PWS) to process ASP files. In executing ASP files following steps are performed: 1. The browser sends a request for an ASP page to the web server by form or URL. 2. The web server receives the request and finds the ASP file from the storage unit. 3. The web server forwards the ASP file to the ASP script engine i.e. ASP.DLL for processing. 4. ASP engine reads the ASP file to generate an HTML file and sends HTML page to the server. 5. The web server sends the HTML page to the client. In this way the ASP file is processed and output is displayed in the browser.

ASP File
An ASP file is a text file with the extension .asp, which contains HTML tags Client-Side Scripts ASP Scripts

Using ASP Scripts


ASP scripts are written simply in the HTML file. It also includes scripting language, whether it is VB Script or Java Script or other. You can write ASP Scripts in two ways: Using <Script> and </Script> tags:

28

The <Script> and </Script> tags are normally used in client side scripting to enclose VB Script or Java Script. Using the attribute RUNAT within the tags can also use these tags to enclose ASP Scripts. E.g.: <Script Language= VBScript Runat= Server> .. . </Script>

Using the <%and %> delimiters You can enclose the ASP scripts between the <% and %> delimiters. These delimiters are used in two ways in the script. a) If you want to enclose general ASP script, you can use <% and %> delimiters. b) If you want to display output of variable of expression directly in HTML page, you can use <%= and %> delimiters. Accessing ASP Files ASP files are stored on the web server. So to host the asp files on the web server, you have to create a virtual directory in the server application. To create virtual directory in IIS you can follow the steps given below: 1. Open Internet Service Manager, through start menu programs.

2. Click the right button of mouse on the Default Web Site icon and from the context menu select New option to click Virtual Directory option. This will display New Virtual Directory Wizard. 29

3. Type the name of the Virtual Directory and Click Next button. 4. Now, type the path of the directory where ASP files are located on the disk (or you can used Browse button to select the path) and click Next button. 5. Now make sure that read and script permissions are selected for this directory and click on the Finish button. This will set the virtual directory to host the asp files on the server. You can browser the asp file in the Internet Explorer, using the following format: http://<servername>/<virtual_directory_name>/asp_filename e.g. http://server/neha/ttt.asp

Scripting Engine
Scripting Engine is a special program that processes the scripting statement in a web page. A browser can execute a client-side script if the proper runtime script engine is built into it. To execute server side script the script engine must b e available with the web server. ASP scripts are processed by script engine ASP.DLL installed in the IIS application. ASP.DLL executes ASP scripts to generate HTML.

ASP Objects
ASP provides some built in objects, which have methods, properties and collections. Methods of an object are used to perform some tasks with an object. A property of an object can be set to a

value to specify the state of object. The collections of an object consist of different sets of key and value pairs related to the object. The asp objects are:

30

Request: This object is used to specify information about a client request send using http request through GET or POST method. Response: This object is used to control the response sent from the server to the client. Server: This object is used to provide access to the methods and properties of web server. Application: This object is used for the processes of a web application. Session: This object is used for storing user information that is needed for a particular user session. ASP Error: This Object can be used to trap ASP Error and provide information to the users. Object Context:This object is used to link ASP and the Microsoft Transaction Server

ASP.NET
Visual Basic developers have long enjoyed the ease of programming with forms and controls. Writing a VB form-based application is as simple as dragging some controls onto a form and writing some event-handling functions. This is one of the reasons VB has attracted lots of programmers interested in speed of development. Microsoft wisely built this feature into ASP.NET. ASP.NET simplifies web page development with form-based Programming. In ASP.NET, these forms are called Web Formsand are analogous to VB forms, replacing ASP pages. Similar to VB, Web Forms programming is also event based. We don't have to write in-line ASP scripts and rely on the top-down parsing interpretation as in ASP programming. To match the rich set of

31

ActiveX controls that VB programmers love in their toolset, ASP.NET equips ASP programmers with server controls. To further enhance the productivity of developers, ASP. Nets Web Forms also allow for the separation of the application logic and the presentation layer. ASP.NET evolves from the ASP programming model with the following additional benefits:

Clean separation between the application logic (server-side code) and the presentation layer (HTML markup)no more spaghetti code

A rich set of server controls that automatically render HTML suitable for any clients and that additionally manage their states

Enhanced session-state management An event-based programming model on the server side, which is simpler and more intuitive

Application logic that can be written in any Microsoft .NET language (VB, C# etc.); application server-side code is compiled for better performance

Visual Studio.NET as a RAD tool, which simplifies the development process of Web Forms

32

ASP.NET Architecture

As the illustration shows, all Web clients communicate with ASP.NET applications through IIS. IIS deciphers and optionally authenticates the request. If Allow Anonymous is turned

on, no authentication occurs. IIS also finds the requested resource (such as an ASP.NET application), and, if the client is authorized, returns the appropriate resource.

Internet Information Services (IIS) Internet Information Services (IIS) is the Windows component that makes it easy to publish information and bring business applications to the Web. IIS makes it easy for you to create a strong platform for network applications and communications. Internet Information Services 5.1 has many features to help Web administrators to create scalable, flexible Web applications. Security 33

Administration

Programmability Internet Standards

Microsoft Internet Information Services 5.0 and 5.1 comply with the HTTP 1.1 standard, including features such as PUT and DELETE, the ability to customize HTTP error messages, and support for custom HTTP headers. IIS 5.1 offers greater protection and increased reliability for your Web applications. By default, IIS runs all of your applications in a common or pooled process that is separate from core IIS processes. In IIS 5.1, administrators and application developers have the ability to add custom objects, properties, and methods to the existing ADSI provider, giving Administrators even more flexibility in configuring their sites. Internet Information Services (IIS) makes it easy for you to publish information on the Internet or your intranet. IIS includes a broad range of administrative features for managing

CHAPTER 10 MSSQL SERVER 2005:SQL server is a Microsoft Back office product that is deployed on Windows NT, Windows 95,98,SQL server is a SQL based, client-server, RDBMS.SQL stands for structured Query Language is used in writing queries to retrieve data from 34

databases.SOLserver stores data at a central location known as server and delivers it on demand to others locations known as clients. The server is responsible to manage the databases and memory for multiple requests. The clients are responsible for presenting data and business logic to the end users. Clients programming interfaces provides the means for applications to run on separate clients computers and communicate to the server over a network. SQL server takes care of the following: Updating the databases. Retrieving information from the databases. Accepting query language statements. Enforcing security specifications Enforcing data integrity specifications. Enforcing transaction consistency. Managing data sharing. Optimizing system catalogs.

Query Analyzer
The query analyzer is the interface for passing SQL statements to the SQL servers, view results or analyze the results or analyze a query plan. The query analyzer can be started from two places. From the SQL server program icon. From command prompt by typing the command. The first dialog box that is displayed enables you to login. Once a server name and login name is authenticated by the SQL server, the query analyzer screen is displayed .once the query analyzer is opened the SQL statements can 35

be typed in it. The SQL statements then need to be submitted to SQL server by using the F5 key or clicking on the toolbar (Execute query) button.

THE OTHERS TOOLS THAT SQL SERVER IS SHIPPED WITH ARE:


Service Manager Client Network Utility Server Network Utility

System Analysis
The basic aim of System Analysis is to obtain a clear understanding of the needs of the clients and the users, what exactly is desired from the software and what the constraints on the solution are. Analysis leads to actual specification.

Analysis involves interviewing the clients and the actual users. These people and the existing documents about the current mode of operation are the basic source of information for the analysis. There are two approaches to system analysis: Informal Approach

Structured Approach

36

The informal approach to analysis is one where no defined methodology is used. The information about the system is obtained by interaction with the client, end, users, questionnaires, study of existing documents etc. The structured analysis uses function-based decomposition while modeling the problem. It focuses on the function performed in the problem domain and the data consumed and produced by these functions. This method helps the analyst decide what type of information to obtain at different points in analysis, and it helps organize information. It is top down refinement approach.

Table: MS-Sql 2005 table makes data that should be organized in a table structure. With the help of tables we can present data organized in raw and columns. The rules of which elements occurs in a table is called a table model. After we have decided upon the tables that we will have in our database, we can define the various field and their properties. For every field we have to decide the o Field Name o Field Type o Field size

Queries:We use a query to extract information from a database. A query can select a group of records that fulfill a certain condition. An example of query is when we want to see the list of books published Name Publishing. The query feature of access creates a search based on the criteria that the publishers name is Name Publishing and displays

37

the selected records in a datasheet format. Most access databases contain more then one table. We can combine specific fields from multiple tables into one datasheet.

Reports:A report is a flexible way of viewing and printing summary information. It enables us to display information to the required level or detail. The information can be viewed or printed in any format. Subtotals, statistical evaluations, pictures and graphs can be inserted into a report.

Database:Database is a collection of related items grouped together under a single heading, for e.g. a customer file, Bank A/C in a Bank, Employee Details etc. According to Oxford dictionary a database is organized store of data for computer processing. A database can be said as a collection of files containing records of similar nature. Each record contains all the data relating to one subject in the file. The grouping of such files is called a Database. Database can be kept manually or electronically.

Components of database
1. 2. Records: A record is a collection of fields containing the alphanumeric characters. Fields: A field is an item, which distinguishes one record, from another. A field can either be in form of alphabets, numeric, or alphanumeric. Each field is identified by a field name.

38

3.

Key Fields: a key field is a field that is unique to a particular record and is used to distinguish a file from another in one or the other respect.

4. 5.

Entity: A person, place, thing or event about which information must be kept. Attribute: Piece of information describing a particular entity. These are mainly characteristics about the individual entity.

Data Base Models:Database models are broadly classified into two categories, They are: Object-based logical models Record-based logical models

Object Based Logical Models


Object based logical models are used in describing data at the logical and view levels. They are characterized by the fact that they provide fairly flexible structuring capabilities and allow data constraints to be specified explicitly. There are many different models, and are likely to come. Several of the widely known ones are The entity-relationship model The object-oriented model The semantic data model The functional data model

39

Record-Based Logical Model


Record-based logical models are used in describing data at the logical and view level. In contrast to object-based data models, they are used both to specify the overall logical structure of the database and to provide a higher-level description of the implementation. Record-based models are so named because the database is structured in fixed format record of several types. Each records type defines a fixed number of fields, or attributes, and each field is usually of a fixed length. The three most widely accepted record-based models are The Hierarchical models. The Network models. The Relational models.

Hierarchical Database Model


Data storage is in form of child parent relationship. The origin of data tree is root. Data located at different levels among a particular branch is called node. The last node in tree is called a leaf. This models support one-to-many relationship.

Network Model
Data in network model is represented by collection of records (in Pascal sense), and relationships among data are represented by links, which can be viewed as pointers. The records in the database are organized as collections of arbitrary graphs.

40

The main idea behind the Network Database System model is to bring about Many-toMany relationship. The relationship between the different data items is called as sets. This system also uses pointers to locate a particular record.

The Relation Database System came into existence to overcome all the drawbacks of these models. Now, let us consider an example of the network model. The network model differs from the relational model in that data are represented by collections of records, and relationships among data are represented by links.

Relational Model
Dr E.F Codd first introduced the relational Database model in 1970. The relational model allows data to be represented in a simple row-column format. Each data field is considered as a column and each record is considered as a row of a table.

Object Relational Model


As the name implies the object relational model supports both object-oriented and relational concepts. It eliminates certain discrepancies in the relational model. In this model it is possible to provide well-defined interfaces for the application. A structure once created can be reused-this in the fundamental property of the OOPs concept. By combining the object oriented and relational concepts Oracle now offers the best of both worlds.

Components of DBMS
41

Let us now examine the components and structure of a database management system. A DBMS is a complex software system that is used to manage, store and manipulate data and the metadata used to describe the data. It is utilized by a large variety of users from the very nave user to most sophisticated to retrieve and to manipulate data under its control. The users could be utilizing the database concurrently from online terminals and/or in a batch environment via application programs written in a high level language. Before looking at various components of the DBMS, let us examine its facilities and classify its users.

Classification of DBMS Users


The primary goal of a database system is to provide an environment for retrieving information from and storing new information into the database. There are four different type of database system users differentiated by the way that they expect to interact with the system.

Naive Users

42

Nave users are unsophisticated users who interact with the system by invoking one of the application programs that have been written previously. These are users who are not aware of the presence of database system or any other system supporting their usage. Example: A user of an automatic teller machine falls under this category.

Online Users
Online users are the users who may communicate with the database directly. These users are aware of presence of the database system. The more sophisticated of these users may also use a data manipulation language (which will dealt in later chapters) to manipulate the database.

Application Programmers
Application programmers are computer professionals who interact with the system through Data Manipulation Language calls, which are embedded in a program written in a host language (for example, COBOL, PL/I, PASCAL, C). These programs are commonly referred to as application programs.

Example:In banking system include a program that generate payroll checks, that debit accounts, that credit accounts, or that transfers fund between accounts.

Database Administrator
43

Centralized control of the database in exerted by a person or group of persons under the supervision of a high level administrator, this person is referred to as the Data Base Administrator (D.B.A). He is the user who is most familiar with the database and is responsible for creating, modifying and maintaining it. He is custodian of the data and controls the database structure.

Advantages of a RDBMS
One of the main advantages of using a database system is that the organization can exert, via the DBA, centralized management and control over the data. The database administrator is the focus of the centralized control. Any application requiring a change in the structure of a data record requires an arrangement with the DBA, who makes the necessary modifications.

Reduction in Redundancies
Centralized control of the data by the DBA avoids unnecessary duplication of the data and effectively reduces the total amount of data storage is required. It also eliminates the extra processing necessary to trace the required data in large mass of data. Another advantage of avoiding duplication is the elimination of the inconsistencies that tend to be present in redundant data files. Any redundancies that exist in the DBMS are controlled and the system ensures that these multiple copies are consistent.

Shared Data

44

A database allows the sharing of data under its control by any number of applications programmers or users. For the sake of an example, lets consider a situation in the office of a publishing company, where a data file is shared or worked upon by many users, for instance, the data is shared by the different departments/sections of the company, like Accounts Department, Editing Department, Personnel Department, etc. So, a single resource is shared and used by multiple users.

Integrity
Centralized control can also ensure that adequate checks are incorporated in the DBMS to provide data integrity. Data integrity means that the data contained in the database is both accurate and consistent. Therefore, data values being entered for storage could be checked to ensure that they fall within a specified range and are of the correct format. Another data integrity check that should be incorporated in the database is to ensure that if there is a reference to certain object, that object must exist. In case of Automatic Teller Machine, for example, a user is not allowed to transfer funds from a nonexistent savings account to a checking account.

Security
Data is of vital importance to an organization and may be confidential. Unauthorized persons must not access such confidential data. The DBA who has the ultimate responsibility for the data in the DBMS can ensure that proper access to the RDBMS and additional checks before permitting access to sensitive data. Different levels of security should be implemented for various types of data and operations. Conflict Resolutions 45

Since the database is under the control of the DBA, she or he should resolve the conflicting requirements of various users and applications. In essence, the DBA chooses the best file structure and access method to get optimal performance for the responsecritical applications, while permitting less critical applications to continue to use the database, albeit with a relatively slower application.

Disadvantages of RDBMS A main disadvantage of the DBMS system is cost. In addition to the cost of purchasing or developing the software, the hardware has to be upgraded to allow for the extensive programs and the workspaces required for their execution and storage. The processing overheads introduced by the DBMS to implement security, integrity, and sharing of the data causes a degradation of the response and through-put times. An additional cost is that of the migration from traditionally separate application environment to an integrated one.While centralization reduces duplication, the lack of duplication requires that the database be adequately backed up so that in case of failure the data can be recovered. Backup and recovery operations are fairly complex in DBMS environment, and this is exacerbated in a concurrent multiuser database system In Summary

Advantages are:Centralized control Data independence allows dynamic changes and growth potential Data duplication eliminated with controlled redundancy Data quality enhanced

46

Security enforcement possible

Disadvantages are:Problems associated with centralization Cost of software/hardware and migration

ER-diagram:-

47

Context level diagram:-

48

Context analysis diagram:-

49

LOGICAL DFD:-

50

DFD FRAGMENTATION:First level DFD:51

1.3
View specifn Specification

Second level DFD :-

52

53

Third level DFD:-

System flow chart:-

54

STRUCTURE CHART:-

55

56

57

58

59

60

61

Table layout:62

Product:-

Column name data type P_idint


P_namevarchar (50) P_gen_namevarchar (50) P_quality float P_priceint

Pharmacist:Column name Phar_name Phar_id Phar_cont_no timing Date of joining Data type Varchar(50) int int int int

Company:-

63

Column name Comp_id Comp_name

Data type int Varchar(50)

Customer:-

Column name Cust_name Cust_ID

Data type Varchar(30) int

Reference:-

64

www.projectguidance.com http://e-library.net/ www.sourcecodeonline.com www.developers.net www.codeproject.com

Conclusion:It is the complete online medical shop management software is so designed as to ease the work load of medical shop professionals. The main
65

feature includes invoicing, inventory and stock control, accounting, client and vendor management.

66

Das könnte Ihnen auch gefallen