Professional Documents
Culture Documents
Project Report On Telephone Directory System
Project Report On Telephone Directory System
Project Report
On
By: k.
(HOD CA Dept..)
Rathor
M.C.A.
CERTIFICATE
This is to certify that this report embodies the original work done by Birendra k. Rathor during this project submission as a partial fulfilment of the requirement for the System Design Project of Masters of Computer Application ! Semester" of the Suresh Gyan Vihar University, Jaipur Bright Keswani (HO o! ".#.$ ept.% Suresh Gyan Vihar Universe
ACKNOWLEDGEMENT
The satisfaction that accompanies that the successful completion of any task would be incomplete without the mention of people whose ceaseless cooperation made it possible" whose constant guidance and encouragement crown all efforts with success# $e are grateful to our project guide "r. Bright Keswani for the guidance" inspiration and constructi%e suggestions that helpful us in the preparation of this project# Birendra k.Rathor
MCA (4th sem)
Chapte$ (&'
2.1. !"te# De"cription 2.2. %loc& Dia'ra# $ 11
Chapte$ )&'
3.1. (ec)nolo'ie" *"ed 3.2. %a"ic +o#ponent" 13 16
18
4.1. Fea"ibilit!
tud!
1$
Chapte$ *&'
5.1. Data (able" 21
Chapte$ +&'
6.1. Cost estimation 6.2. +onclu"ion 23 26
1.! Content
Subscriber names are generally listed in alphabetical order, together with their postal or street address and telephone number. In principle every subscriber in the geographical coverage area is listed, but subscribers may request the exclusion of their number from the directory, often for a fee. Their number is then said to be "unlisted" American nglish, "ex!directory" #nglish or "private" Australia and "ew #ealand. $ractices as to the display of %aller!I& on calls made by unlisted subscribers vary by 'urisdiction. Sometimes the %aller!I& on outbound calls is not shown( in other 'urisdictions unlisted numbers are displayed unless the caller dials
$
a bloc)ing code( in others the customer may request automatic bloc)ing by the telephone company. In the *S, under current rules and practices, mobile phone and +oice over I$ listings are not included in telephone directories. fforts to create cellular directories have met stiff opposition from several fronts, including a significant percentage of subscribers who see) to avoid telemar)eters.In ,--, the *.S. Supreme %ourt ruled .in Feist v. Rural/ that telephone companies do not have a copyright on telephone listings, because copyright protects creativity and not the mere labor of collecting existing information. 0ithin the geographical reach of the %ourt, the Feist ruling has resulted in the availability of many innovative telephone directory services on %&!123 and the 0orld 0ide 0eb.
+#", &6 7/", or ,I+2A/,. -obile ,irectory eli inates the need to call any other call center.
1.5 Features:Secure asy to use 1eliable and accurate "o need of remember
#H$&'(R )
).) iagra*+,
1@
a. +oft!are part b. Aard!are part )o't&are part 11 +oft!are enables us to perfor specific tasks. +oft!are is a tool that interfaces !ith hard!are and i ple ents the user specifications. 7or interfacing bet!een icrocontroller and 32,( icrocontroller and Beypad and ##*/6- various soft!are tools are used. &he soft!are tools used are as follo!s0 a. 21progra b. +,22 c. #C1,o!nloader d. &op vie! si ulator e. *roteus
11
ing
a. C(pro/rammin/ 11 &he 2 progra ing is a popular and !idely used high level progra ing language for creating co puter progra s. *rogra ers around the !orld e brace 2 because it gives a:i u conco ponents used !hile developing progra . c. *roteus is ainly used in si ulation( a si ple odel of ckt !as created and !ith particular progra it !as loaded to vie! output. Hard&are part :1 a. -icrocontroller b.32, display c. ##*/6d.Beypad &he hard!are parts of the pro'ect includes
CHAPTER 3
12
3.32 ID6 lines !ith t!o 151bit ti erDcounters 4.7ive vector t!o1level interrupt architecture $.7ull duple: serial port 5. @n1chip oscillator and clock circuitry.
-icrocontroller <oard01
&he icrocontroller board consists of one crystal oscillator !hose function is to create an electrical signal !ith a very precise fre)uency. &his fre)uency is co only use to keep track of ti e( to provide a stable clock signal for digital integrated circuits( and to stabilize fre)uencies forradio trans itters.
3 Beypad and 32, Interfacing &o scan the keypad co pletely( !e need to ake ro!s lo! one by one and read thecolu ns. If any of the buttons is pressed in a ro!( it !ill take the correspondingcolu n to a lo! state !hich tells us that a key is pressed in that ro!. If button 1 of aro! is pressed then 2olu n 1 !ill beco e lo!( if button 2 then colu n2 and so on. #ach button of Beypad is assigned !ith various functions. %e have assigned keys!ith alphabets and nu ber. +o e keys have been allocated for special function like enu( delete( back. %hen these keys are pressed various special functions such asadd( edit( search etc has been generated !ith certain functions in progra ing. %hencontact has to be added !e insert na e as !ell as nu ber using keypad. Beypad isconnected to *2 through !hich input is given to icrocontroller. &hese datas areconcurrently displayed in the 32,. 32, is connected to *1 and *3( !hich serves as output device. 7irst of all 32, is initialized !ith follo!ing control codes as sho!n in the table. %hen data bus of 32, is provided !ith ;1bit data then certain output is generated.
15
3.$ /#+E3&
and ,I+2E++I6" 0
,#+2/I*&I6" 67 7I",I".01 %orking in this pro'ect led us to any findings !hich initially !e !ere una!are of. %e not only got chance to i ple ent our theoretical kno!ledge into practical but also got opportunity to learn ne! progra ing languages. &his pro'ect has helped us to enhance our kno!ledge about electronics co ponents( soft!are develop ent and !ireless co unication. %orking in 32, !e found out that to display alphanu eric value in 32, !e can either use 32, table !hich provides us he:. code corresponding to the data that is to be displayed or !e can use A+2II value of that data. %hile interfacing Beypad !ith -icrocontroller !e found out that sa e port ust be used for both colu n and ro!s. %hile interfacing of ##*/6- addressing is the key factor and using proper delay is very essential for output generation.
Limitations:&his pro'ect on F#*A6"# ,I/#2&6/GH has follo!ing li itations I ,elay in pressing the keys cannot be achieved perfectly. I #,I& option in this pro'ect could not be i ple ented. I -e ory anage ent is a great dra!back. !hen back button is pressed.
18
*roble
ing occurredJ
I %hile storing the flipped char in the array na eKrrL all the flipped characters !ere also stored so a ne! na e1KttL array !as stored ade and the last value
in na eKrrL after each case !as stored..eg..a(b(c !as pressed then another button pressed then at (MN)case values !as interchanged.. I *roble occurred !hen tried to break out of !hile loop
I 2alculation of particular delay !as difficult. ,uring Aard!are &esting I 2ables created !ere very fragile and ulti ately !e used glue stick to fi: it. I Cip +ocket is troubled us !ith it>s pin holdings. I *roble in 4oltage regulation for icrocontroller !as fetched
. I Interfacing of ##*/6- !as a great challenge. 7urther I ple entation01 electronics pro'ects. &his architecture is a basic backbone for other
I &he concept of F&elephone ,irectory Fcan be i ple ented !ith interfacing of --2 cards using +*I (+erial *eripheral Interface). I &his architecture can be used in syste s such as 1.*ass!ord <ased door lock 2./estaurant Auto ation +yste &his architecture can be i ple ented in all syste s that uses input as Beypad and 6utput as 32,
1;
CH*/TE. 5
2@
22
There are two ma'or types of cost estimation methods4 algorithmic and non-algorithmic. Algorithmic models vary widely in mathematical sophistication. Some are based on simple arithmetic formulas using such summary statistics as means and standard deviations C-D. 2thers are based on regression models C?GD and differential equations C?9D. To improve the accuracy of algorithmic models, there is a need to ad'ust or calibrate the model to local circumstances. These models cannot be used off-the-shelf. ven with calibration the accuracy can be quite mixed. 0e first give an overview of non!algorithmic methods. Non-a'&or%t54%c )et5ods *na'o&$ cost%n&4 This method requires one or more completed pro'ects that are similar to the new pro'ect and derives the estimation through reasoning by analogy using the actual costs of previous pro'ects. stimation by analogy can be done either at the total pro'ect level or at subsystem level. The total pro'ect level has the advantage that all cost components of the system will be considered while the subsystem level has the advantage of providing a more detailed assessment of the similarities and differences between the new pro'ect and the completed pro'ects. The strength of this method is that the estimate is based on actual pro'ect experience. 5owever, it is not clear to what extend the previous pro'ect is actually representative of the constraints, environment and functions to be performed by the new system. $ositive results and a definition of pro'ect similarity in term of features were reported in C??D. E67ert 8ud&4ent4 4! This method involves consulting one or more experts. The experts provide estimates using their own methods and experience. xpert!consensus mechanisms such as &elphi technique or $ 1T will be used to resolve the inconsistencies in the estimates. The De'75% tec5n%9ue wor)s as follows4 ,/ The coordinator presents each expert with a specification and a form to record estimates. >/ ach expert fills in the form individually .without discussing with others/ and is allowed to as) the coordinator questions. ?/ The coordinator prepares a summary of all estimates from the experts .including mean or median/ on a form requesting another iteration of the expertsH estimates and the rationale for the estimates. @/ 1epeat steps >/!?/ as many rounds as appropriate. A modification of the &elphi technique proposed by Ioehm and =ahquhar C<D seems to be more effective4 Iefore the estimation, a group meeting involving the coordinator and experts is arranged to discuss the estimation issues. In step ?/, the experts do not need to give any rationale for the estimates. Instead, after each round of estimation, the coordinator calls a meeting to have experts discussing those points where their estimates varied widely. /ar %nson4 *sing $ar)insonEs principle Jwor) expands to fill the available volumeK C>GD, the cost is determined .not estimated/ by the available resources rather than based on an ob'ective assessment. If the software has to be delivered in ,> months and < people are available, the effort is estimated to be 89 person!months. Although it sometimes gives good estimation, this method is not recommended as it may provide very unrealistic estimates. Also, this method does not
24
promote good software engineering practice. /r%ce-to-2%n4 The software cost is estimated to be the best price to win the pro'ect. The estimation is based on the customerEs budget instead of the software functionality. =or example, if a reasonable estimation for a pro'ect costs ,99 person!months but the customer can only afford person!months, it is common that the estimator is as)ed to modify the estimation to fit 89 personmonthsH effort in order to win the pro'ect. This is again not a good practice since it is very li)ely to cause a bad delay of delivery or force the development team to wor) overtime. Botto4-u74 In this approach, each component of the software system is separately estimated and the results aggregated to produce an estimate for the overall system. The requirement for this approach is that an initial design must be in place that indicates how the system is decomposed into different components. To7-do2n4 This approach is the opposite of the bottom!up method. An overall cost estimate for the system is derived from global properties, using either algorithmic or non!algorithmic methods. The total cost can then be split up among the various components. This approach is more suitable for cost estimation at the early stage. *'&or%t54%c 4et5ods:The algorithmic methods are based on mathematical models that produce cost estimate as a function of a number of variables, which are considered to be the ma'or cost factors. Any algorithmic model has the form4 ffort F f.x1, x2, L, xn/ where Mx1, x2, L, xnN denote the cost factors. The existing algorithmic methods differ in two aspects4 the selection of cost factors, and the form of the function f. 0e will first discuss the cost factors used in these models, then characteri;e the models according to the form of the functions and whether the models are analytical or empirical. Cost 1actors:Iesides the software si;e, there are many other cost factors. The most comprehensive set of cost factors are proposed and used by Ioehm et al in the %2%232 II model C8D. These cost factors can be divided into four types4 /roduct 1actors4 required reliability( product complexity( database si;e used( required reusability( documentation match to life!cycle needs( Co47uter 1actors4 execution time constraint( main storage constraint( computer turnaround constraints( platform volatility( /ersonne' 1actors4 analyst capability( application experience( programming capability( platform experience( language and tool experience( personnel continuity(
2$
/ro8ect 1actors4 multisite development( use of software tool( required development schedule. The above factors are not necessarily independent, and most of them are hard to quantify. In many models, some of the factors appear in combined form and some are simply ignored. Also, some factors ta)e discrete values, resulting in an estimation function with a piece!wise form.
4.1 C",CL5)I",1(
&he ai of this pro'ect !as to build an &elephone directory through !hich allo!ed to add(search( delete contacts of individual andaccess toe:ternal e orydevice. At the co pletion of this pro'ect !e are able to add( search and delete contacts hence the pro'ect is co pleted successfully. A appro:i ate odel of &elephone ,irectory !as asse bled using keypad( lcd( icrocontroller and ##*/6-.
25