A Project Report On “ONLINE ROOMMATE SEARCH”

(MINOR PROJECT) Submitted in partial fulfillment of the requirement For the award of the Degree of

Bachelor of Technology
IN

Computer Science

Submitted By SAURAV GANGULY, (06ESBCS049) HARISH KUMAR , (06ESBCS017) B.Tech VII Sem(CSE)

January 2010 Sri Balaji College of Engineering & Technology Benad Road Macheda, Jaipur (Raj.)-302013 (Rajasthan Technical University,Kota)

1

ACKNOWLEDGEMENT

The beatitude, bliss & euphoria that accompany the successful completion of any task would be incomplete without the expression of the appreciation of simple virtues to the people who made it possible. So, reverence, veneration and honors. I acknowledge all those whose guidance and encouragement has made successful in winding up this. I owe a huge debt of thanks to a large number of people without whom none of this would have been possible. I am thankful to MRS. NEERAJ CHOUDHARY FACULTY(CSE) for being our mentor and for valuable suggestions and enthusiastic interest during the entire process of the preparation of Project. Lastly, I extend my heartiest thanks to all those who have contributed in making this project a success.

2

CERTIFICATE
This is to certify that the project entitled “ONLINE ROOMMATE SEARCH” is the bonafide work carried out by SAURAV GANGULY student of B.Tech (CSE),
UNIVERSITY ROLL NO

(06ESBCS049),

of

SRI

BALAJI

COLLEGE

OF

ENGINEERING AND TECHNOLOGY, JAIPUR, is hereby accepted and approved as a credible work, submitted in the partial fulfillment of the requirements of Degree of B.Tech. (CSE) from RAJASTHAN TECHNICAL UNIVERSITY, KOTA.

Signature of the Coordinator:

Signature of the HOD: Place: Date:

3

ABSTRACT

INTRODUCTION This project is basically deals with search a appropriate Roommate and Paying guest.with addition to the knowledge of client personal information, professional information , its likes and dislikes , habits etc. the client can hide some of the personal details as according to its needs. BRIEF DESCRIPTION In this project we will make an online website which will deal with online searching of appropriate roommate search for paying guest. In minor project we will derive few models with different phases, to describe by different sets of attributes. Some of the page description are:       Client/user Registration/Login Page. Client/user Personal Information with Edit facility Search page Client/user requirements Advertisements of PG‟s and Roommates User request for Pg.

Thus are some basic requirements module, the whole set can be enlarge with including more phases in it. In this project we worked on .NET platform, with C# for coding.

4

LIST OF FIGURES S.NO. 1. 2.

TITLE

PAGE NO. 30 31-34

Entity relationship diagram Dataflow Diagrams 2.1 0 level DFD 2.2 1-level DFD of Login page 2.3 1-level DFD of Registration page 2.4 1-level DFD of search page

3.

Screenshots 3.1 Homepage 3.2 Search people 3.3 Registration page 3.4 Login page 3.5 About us 3.6 Help 3.7 Contact us

36-42

4

CodingShots 4.1 Master.aspx page 4.2 Master.cs page

43-44

5

1) Objective 6. System Design 6 TITLE PAGE NO.4) Limitations 7.3) C# 4.1) Company Profile 3.4 ) SQL Server 2008 5.2 ) Design Phase 3.3) Development Phase 3. 16-22 23 24-25 26-33 .2) ASP.1) Microsoft .4) Coding Phase 3. METHODOLOGY USED 3. 6.6 ) Implementation Phase 3.CONTENTS S. Project Title Introduction 2.3 ) Scope 6. 8 9-13 14-15 4.1) Requirement Analysis Phase 3. FEASIBILITY STUDY Introduction To Project 6.Net Framework 4. 2.5 ) Testing Phase 3.NO. 1.7 ) Post Implementation and Maintainence Technology Used 4.NET 4.2) Life Cycle 6.

4) Entity Relationship Diagrams 7. 8 9 10 11 12 SCREENSHOTS TESTING AND IMPLEMENTATIONS MAINTAINENCE CONCLUSION BIBLOGRAPHY 36-44 45-49 50 51 52 7 .2) Steps 7.5) Dataflow diagrams.7.1) Introduction 7.3) Database and attributes used 7.

1. NEERAJ CHOUDHARY SUBMITTED BY: SAURAV GANGULY (06ESBCS049) HARISH KUMAR (06ESBCS017) 8 . PROJECT TITLE “ONLINE ROOMMATE SEARCH” „LIFE MAKE EASY‟ SUBMITTED TO: MRS.

promises to break into the top league of service providers to a 9 . We are perfectly poised to partner the client‟s business to new levels of efficiency. an effective design team and custom product development expertise. kota in 1991.2. engineering and mobile applications. ready-to-use packaged products. D ZONE SOFTWARES.in INTRODUCTION DZone is a leading provider of information technology. human resource and training.co. has an excellent and experience team of professionals from various background and academics. D ZONE SOFTWARE.dzone. products and designs for addressing the needs of businesses . development of customized solutions for varied industries. Having worked in vast variety of fields related to commercial. Giving services to 100+ global corporate clients through a team of dedicated and highly skilled set of programmers. Web Solution Services and Design Company developing leading-edge solutions. D ZONE SOFTWARE. graduated from Kota university. consultancy. with its strong technology. Here's an idea about DZone strength categorically Promoters Mr Hemant Sexena. we combine a unique onsite/offshore delivery model infused by a distinct culture of customer satisfaction. INTRODUCTION TO COMPANY www. his innovations and vision have been the key factor in the great success Intecons enjoys by way of the client satisfaction and implementing some of the most difficult domain projects. He has a vast experience of around 15 years in software analysis to development to delivery. profitability and growth. D ZONE SOFTWARE. offers a range of solutions. is premier Software. consulting and outsourcing services.

develop and operate the infrastructure and provide the client with maximum leverage to handle its day-today activities. We provide full-range service to Define. Whether you have the full product specification or only the business idea. India promises high quality and a competitive cost advantage to its customers. We develop and deliver products that enable our customers to manage. Our proven step-by-step methodology helps us maintain accurate development schedules and documentation of development. secure and increase efficiency of their business. 10 . Our capabilities span both the technology and design domains. We lay emphasis on designing customized software solutions. People at D ZONE SOFTWARE work to provide its customers with a single platform for all business solutions. efficient and scalable. Its development center in Jaipur. We analyze and evaluate business requirements for our clients and design systems to help our clients in achieving their goals. We analyze your project in order to define goals and plan a detailed roadmap to reach those goals. Design.wide clientele. which are based on the present and future business requirement of our clients. The company has created a niche in a very small time span and has developed solutions that are flexible. we turn your project concept into reality. Develop Deploy and support Web & Software Application projects. We provide unique end-to-end solutions to our clients in a variety of markets that really work for them and help them to increase their work efficiency and reduce their costs.

combining quality. Flexibility We are custom-build to client specific requirements. we use the most modern development tools and technologies available on the market today. D ZONE SOFTWARE Soft has a wellmanaged staff to assist in meeting your needs. We have proven to be able to react quickly and to adjust to any changes or additions thrown at us during the course of a project. fully integrated systems in a variety of industrial standards. We are staying on pace with the fast evolving Web development capabilities. commercial and technical disciplines into coherent approach.          Understanding our customers needs and requirements Meeting or exceeding our customer‟s expectations Use of a practical mix of new and proven techniques and technologies Constant development of our staff and management expertise Our commitment of the continual improvement of our processes Propensity to innovate. Technically Advanced Our Web development tools and products implement Object-Oriented design and Programming.Strategy of Company We operate as an integrated management system. 11 . Further. creation and transparency Selectivity of product and producer Quest for excellence and perfection to offer the highest standards of service Exploration of the concealed energies and talents of our employee Company performance Expertise All of our team members have several years of expertise developing customized.

XML. Environments Our areas of expertise include web solutions. you'll get more for your software & web Development budget. Reasonable cost India has low operating costs and low-cost labor. We focus on providing complete Resource Planning and Management solutions. Our people put in whatever work is required.NET. yet India is a world technological superpower. We provide solutions on a wide array of platforms such as Windows. Expandability For our clients' proprietary development projects. to keep our clients happy. migration and new application development. overhead and salaries. Business Process re-engineering. is very concerned about the project confidentiality. developing Enterprise wide application (EWA). we can pass on significant savings to you. Security D ZONE SOFTWARE. We ensure that full confidentiality of clients project is maintained while in development as well as after completion of project. Therefore. Photoshop and Macromedia Studio MX. whenever needed. ASP. FLASH. The Team Profile 12 . PHP. These skills form the foundation of our ability to provide complete enterprise solutions to our clients ranging from legacy system maintenance. Ultimately. Our location provides us with a rich pool of talent and low-cost environment for operating. client-server / distributed computing architectures. Linux. we tap a virtually unlimited supply of highly skilled programmers and professionals. ASP. web enabling of applications.Dedication Our programmers are professionals in the truest sense of the word. When we have your deadlines to meet we ensure the deadline is met.

geographical reach. one owning the media and another owning the system/network integration skills. The increasing automation and integration of multifarious applications into the system also necessitates the need of a robust network underpinning so that the organization can reap the benefits fast enough and sustain the edge over its rivals. Our Approach & Strengths One of the prime movers of any business of today is the provisioning of a reliable. downtime and limited spread of quality IT development centers locally. B. Engineers. The Indian scene had two types of players in networking. and shall always remain that way in the future. Enterprise communication needs with interests over large geographic spreads have never been completely addressed by a single connectivity solution. Industry Certified Engineers.Tech and Post Graduates who share their experience and expertise to make every project a confirmed success. The hurdle being reasons like affordability. BE.We have excellent team of skilled and experienced professionals. 13 . Analysts and consultants who are well qualified and experienced in their respective fields. scalable. flexible communication infrastructure. The team consists of qualified MCA. Information Technology has not always been able to address the needs of SME markets..

The basic WATERFALL MODEL is being used that is its stages. This cycle back or feedback may occur as a result of the failure with the system to meet a performance objective or as a result of changes in redefinition of System activities. coding generation and testing. In order to identify the problem: we have to know information about the problem the purpose of the evaluation for the problem to be known. Post Implementation Phase EXPLANATION OF DIFFERENT STAGES OF WATERFALL MODEL REQUIREMENT ANALYSIS This Phase includes the definition of the problem. Testing Phase 6.it even leads to interfaces that reduce the complexity of the connections between modules and with that external environment. These are as follows. Like most systems the life cycle of the computer based system also exhibits distinct phases. Implementation Phase 7. the s/w is logically partitioned into components that perform specific functions and sub functions. One of the software have been analyzed and specified. Design Phase 3. DESIGN Software design is a process through which the requirements are translated into a representation of an s/w.3. 14 . DEVELOPMENT The development phase includes choosing of a suitable s/w to solve the particular problem given the various facilities and the sophistication in the selected software gives a better development of the problem. 1. the s/w design involves three technical activities: design. The Design Phase leads to modules those exhibit independent functional characteristics . The design of the system is in modular form i. The design phase is for main importance because in this activity decisions ultimately affects the success of software implementation and maintains. Development Phase 4. Requirement Analysis Phase 2. We have to clearly know about the client‟s requirements and the objectives of the project.) METHODLOGY USED IN WEBSITE DEVELOPMENT The general methodology in developing a system is involved in different phases which describe the system‟s life cycle model for developing software project.e. Coding Phase 5. The concept includes not only forward motion but also have the possibility to return that is cycle back to an activity previously completed.

CODING The coding phase is for retranslating the design of the system produced during the design phase into code in a given programming language. Which can be executed by a computer and which performs the computation specified by the design? TESTING Testing is done in various ways such as testing the algorithm. sample data debugging is one. programming code. IMPLEMENTATION After testing is over project is implemented by providing training to the users and providing manuals so that they can be refreshed as and when needed POST IMPLEMENTATION If any problem occurs after the implemented they are removed from time to time so that so that the users can work on the prepared system easily finally a satisfied user when all things are almost right 15 .

0 of the . databaseconnectivity. and exception handling. COMMON RUNTIME ENGINE: 16 . Windows Vista. and Windows 7.InteropServices and System. Programs written for the .0 The Microsoft .NET FRAMEWORK 3. this runtime environment is known as the Common Language Runtime (CLR). The .Runtime. The CLR also provides other important services such as security.NET environment.NET Framework provides means to access functionality that is implemented in programs that execute outside the .EnterpriseServices namespaces of the framework.4.NET Framework. the .NET Framework execute in a software environment that manages the program's runtime requirements. Version 3. web application development.cryptography. MICROSOFT . It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. who combine it with their own code to produce applications.NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform.NET Framework. Access to COM components is provided in the System. PRINCIPAL DESIGN FEATURES INTEROPERABILITY: Because interaction between new and older applications is commonly required. The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. access to other functionality is provided using the P/Invoke feature.NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems.NET Framework is included with Windows Server 2008. The framework's Base Class Library provides a large range of features including user interface. The class library and the CLR together constitute the . numeric algorithms. The class library is used by programmers. memory management. and network communications. Also part of the . dataaccess.

and exception handling. ASP. is a library of functionality available to all languages using the . so you can be more productive while programming. Additionally.NET programs execute under the supervision of the CLR. All .NET version of ASP is ASP.NET Languages.NET framework. that have been exploited by malicious software.NET Framework. AS. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other.NET or VB. SECURITY The design is meant to address some of the vulnerabilities. The . It also comes with a great set of reusable.NET to create your web application. such as C#.The Common Language Runtime (CLR) is the virtual machine component of the . database interaction and XML document manipulation. predefined and ready to use control for your ASP.NET framework. such as buffer overflows. Microsoft has introduced ASP. The BCL provides classes which encapsulate a number of common functions.NET. ASP.NET allows you to build dynamic web pages and tailors the HTML output to whatever browser you are using.NET is a programming framework used to create Enterprise class of efficient information management.NET Framework introduces a Common Type System.NET languages. BASE CLASS LIBRARY The Base Class Library (BCL). guaranteeing certain properties and behaviours in the areas of memory management.NET Framework supports the exchange of instances of types between programs written in any of the .NET projects. or CTS.NET To create dynamic web pages by using server side scripts. and that it conforms to security requirements. security.NET framework includes design features and tools that help manage the installation of computer software to ensure that it does not interfere with previously installed software. Jscript. part of the Framework Class Library (FCL). Because of this feature. LANGUAGE INDEPENDENCE: The . This is discussed in more detail in Microsoft . graphic rendering.NET is the way you can use any programming language based on the . the .NET provides a common security model for all applications. These reduce the amount the code you have to write. . 17 . SIMPLIFIED DEVELOPMENT The . including file reading and writing. One of the most EYECATCHING things about the ASP.

the number of lines f source code in ASP applications increase the dramatically and was hard to maintain. ASP offered the efficiency of ISAPI applications along with the new level of simplicity that made it easy to understandable and use. as applications grew bigger in the size and became more complex. As a result.NET? Since 1995. As the web consists of many different technologies. ASP script was an interpreted script and consisted unstructured code and was difficult to debug and maintain. an architecture was needed that would allow the development of a Web application in structured and consisted way. 18 . software integration for web development was complicated and required to understand many different technologies. Microsoft has been constantly working to shift its focus from Window based platforms to the INTERNET.WHY ASP. Also. Microsoft introduced ASP ( Active Server Pages) in November 1996. However. Therefore.

NET APPLICATIONS 19 .THE COMPONENTS OF ASP.

3. An IIS Server process the ASP.NET application by using the tools integrated with the Microsoft. 4. 20 . the results are sent to the web Browser that requested the ASP. STEPS ARE : 1. A web browser sends a request for an ASP. The web Server.NET Script Engine for processing. After creation of an ASP. receives the request and retrieves the appropriate ASP. The Web Server forward the ASP.0).NET application the ASP.NET file.NET file from the disk or Memory.NET APPLICATION WORKING ON ASP.NET file to a Web Server by using Uniform Resource Locator (URL). which is the web Server for the Window Platform.NET files need to be stored on as IIS Server.NET APPLICATION We create an ASP. Finally. IIS.NET files from top to bottom and then executes the Script.THE ARCHITECTURE OF ASP.NET framework (2. 2 . The ASP.NET Script Engine reads the files from top to Bottom and executes any Server side Script it encounters.NET files to the ASP.

As a result it helps to hide the code of ASP. Web Server (IIS) 3. internet explorer.NET file from the user who access an ASP. Enriched Tool Support 3. Security 21 . Power and flexibility 4. The Web Server then sends the HTML page to the client.5 . This architecture consists of these three components: 1.NET Script Engine sends the HTML page to the Web Server. 7. 6 .NET SERVER 1. The basic description of how this architecture works is as described below in the diagram: CLIENT WEB BROWSER WEB SERVER IIS APPLICATION SERVER DATABASE SERVER FEATURES OF ASP. and the ASP. These steps are also expressed by 3-Tier client Server Architecture. Database Server.NET Web pages.) 2. Simplicity 5. The web Browser interprets the output and displays it. Complied code 2.NET file is generated as an HTML document. The processed ASP. A web server generates and sends only the HTML-OUTPUT to the client. Manageability 6. Web Browser (Netscape navigator.etc.

SQL Server 2008 also includes support for structured and semi-structured data.NET platform. including digital media formats for pictures.NET framework. The SQL Server data platform includes the following tools:  Relational Database  Replication Services  Notification Services  Integration Services  Analysis Services  Reporting Services  Management Tools  Development Tools  Increase Productivity 22 .NET platform. developer can quickly implement applications and component‟s code is managed by CLR. the new development platform of Microsoft for building Component based Software Solutions. It becomes linear and safer. end-to-end data solution that empowers people by providing a more secure. and it is first component oriented language.NET projects  Creating web controls  Providing Web services MICROSOFT SQL SERVER 2008 Microsoft SQL Server 2008 is a relational database system that is scalable from single user database running on a single user system such as Laptop to enterprise-wide networks and global dotcom websites. video and other multimedia data. It has been designed to support the KEY feature of . mature and stable platform? SQL Server is a comprehensive. integrated. With the help of C# language. APPLICATIONS OF C# C# is a new language developed exclusively to suit the feature of . audio.  Console Applications  Window Applications  Developing Windows controls  Developing ASP.C# (C SHARP) : C# is fully Object Oriented Language like JAVA. SQL server 2008 is the eighth SQL Server release making a featurerich. reliable and productive platform for enterprise data applications. It can be used for a variety of applications that are supported by the .

ability to meet user needs and effective use of the resources. 2. Since the system is partially manual and partially computerized. There are 3 types of the feasibilities which are discussed here. as the software required for developing it and the software and hardware required for using it are easily available. It‟s software and hardware cost is also low then the existing system. Our system has a lot of features at a minimum cost so it is feasible to implement and it will be very much beneficial to the sellers in the reduced cost. The cost of hardware and software for class of application being considered. The cost to conduct a full system investigation. 3. Therefore maintaining both the resource become easy and feasible as compared to a fully manual system which it was previously or a fully computerized system. 23 . Operationally Feasibility The proposed system is operationally feasible because it requires minimal knowledge of working with computer for using it. The user can easily learn to use the system from the user manual. Economical Feasibility In this we consider following costs: 1.5)FEASIBILITY STUDY Feasibility Study is a test of the system according to its workability. We can test our system by different type of the feasibilities. impact of the organization. The benefit in the form of the reduced cost. These are as follows: Technical Feasibility The proposed system is technically feasible.

INTRODUCTION TO THE PROJECT SOFTWARE DEVELOPMENT LIFE CYCLE Project Initiation and Planning Requirement Analysis System Designing Coding Testing Implementation Maintenance Project Delivery 24 .6).

it is essential that one identifies personal requirements. Roomate services like RoommateWire.com eliminate such problems by displaying criteriaspecific results. human labor and are subject to change drastically as the technology changes . system manuals etc. This helps you evaluate your options better. Before looking for a roomate. 25 . the time and effort taken to look for roomates is significantly reduced.PROJECT OBJECTIVE  To get practical knowledge for preparation of websites in ASP. Since these websites offer roomate services regardless of the place. which is time consuming. one is today wellequipped to deal with them. preferences and other such criteria for roomate selection.  To reduce the work efficiency to find appropriate roommate or paying guest. PROJECT SCOPE Roomate services are in high demand these days. facebook etc. With comprehensive search options. one finds it very convenient to search for roomates in any part of the world. PROJECT LIMITATION  Cost: It is costly as one needs to satisfy software and hardware requirements  Documentation: It is time consuming and requires expertise in creating good documentation from view point of top administrators users  Manuals: Various manuals are to be prepared such as user manuals. Although a new place throws up its unique challenges. requires human labor. this site makes sure that only results that meet your specific requirements are displayed. The advent of the net has made this possible. Sites like RoommateWire. with people finding it increasingly easy to relocate to a new apartment and find a suitable roomate in no time at all.  Online Help: One needs to provide online help to various users so that all the features of the software can be properly understood by the user  Backup: The software requires the periodical backup.com offer a marketplace where you can search for potential roomates and also post a roomate requirement ad. With the world getting flatter by the day. The last thing you want is to end up with an inconsiderate roomate who finds it almost impossible to get along with you. In doing so. more resources such as Hard Disk etc. Roomate services on the internet offer different tools and features to make the search experience highly rewarding. gmail. Roomate services such as RoommateWire.NET environment.com offer a private mailbox and use a highly advanced search algorithm to make the search a lot more effective.  To do more publicity by RSS feed. It needs time. people have transcended physical boundaries to look for study and work options in places they haven‟t visited before.  To do the publicity by transfer the contacts via RSS feed by mail portal such as yahoo.

which are supported by the browsers like Internet Explorer. the inputs (source).  Database Design The Database (collection of data) is at the core of any information system. It translates the system requirement into ways of operating them and focuses on the detail implementation of the system. A key is to determine how the access paths are to be implemented. outputs (destination). coding and debugging procedure prior to conversion. A physical path is derived from the logical path.  Program Design In conjunction with database design is a decision on the programming language to be used and the flowcharting. Preparing security and control specification. Steps of Design Process  Logical design (DFD) In the DFD.SYSTEM DESIGN AND DEVELOPMENT Introduction System Design is a transition from a user-oriented document to a document oriented to programmers or database personnel.Net is used as server side scripting while JavaScript and HTML are used as client side scripting. one-to-many. The nature of data stored in the database as well as the organization of the data has wide implications on the performance of the system. The database should also be flexible so that any future change in requirements can be incorporated with minimum changes. The relationships existing among the entities like one-to-one. Specifying the implementation plan. which may be required by the users of the system. Preparing a logical design walkthrough before implementation.7). but at the same time. ASP. procedures (Data Flow) and boundaries of the system are described that needs the user requirement. In this application. 26 . The design of the proposed system has gone through logical and physical design with emphasis on the following:    Preparing input/output specifications. It specifies the user need at a level of detail that virtually determines the information flow into and out of the system and the required data resources. many-to-many are considered while designing the database.  Physical design (Database design) This activity deals with the design of the physical database. Visual Web Developer 2008 is used for coding. A good database design should hold all the data. Relational structured database is used in this system. Databases (data stores). avoid any harmful or unnecessary redundancy.

One of the major constraints is also the heavy volume of data to be entered for creation of Master database. It should serve as “Objective Evidence” that the designers and/or implementers are following through on their commitment to implement the functionality described in their requirements specifications. which is described as follows. These data will generally be stored in files or databases in logical manner. 2. these may have to be preserved either for a short or long period.e.The data in Online Roommate Site is organized in the form of 2-D relational tables. The system uses database. the authentication and acceptance of responsibilities of the data entered still rests with the RR section In-charge. The performance of the software shall also depend on the hardware configuration at the implementation sites. Design Consideration General Constraints 1. Although the software will take care of many aspects. Design Constraints It is imperative that the RAM and storage requirements are met. The client machines must have minimum 128 MB RAM and 8 GB Hard disk. 3. Other tables are used with bi-directional role of data i. Different tables have been created for different type of information. The designer will have to advise the techniques of sorting and retrieving data from these files. The server machines must have minimum 256 MB RAM and 20 GB Hard disk. Online mutations and progress reporting cannot begin till the entire database is initially created. The rules of normalization have also been applied while designing the tables. Organization of data into tables allows easy categorization. 27 . imparting them enough information and understanding about the project implementation. Manual intervention cannot be fully avoided. Detailed Design Specification Complete design specification serves the following purposes: It should be able to adequately serve as training material fir new project members. Since the system requirement is manipulation of data. for both input and output. retrieval and storage of data. Once the input data is captured in the system. validated and corrected. some of the tables used are almost static in nature and are already available with the standard data for the selection of the parameter values.

User id of user password of User Confirmation of user Name of user Email address of user Detail explaination of user Country of user State of User 28 .Detailed System Design Each subsection of this section will refer to or contain a detailed description of a system software component.) userid password Password confirm Name Email address Other detail country state TYPE Int Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) REMARKS Auto generate no. The discussion provided covers the following software component attributes:  Purpose  Input  Processing  Output  Validation Checks  Implied Requirements DATABASE AND ATTRIBUTES USED REGISTRATION PAGE FIELD NAME Id(P.K.

LOGIN PAGE userid password Varchar(50) Varchar(50) User id of user password of User SEARCH userid country Varchar(50) Varchar(50) User id of user Country of user 29 .

Entity Relationship Diagram id E Mail Password User fgbvb Registr ation Password confirm User State Name Country Other detail User Login User fgbvb Name E Mail Password E Mail Search people City People Country State 30 .

0-LEVEL DFD of website Starting Database Login Home Registra tion search 31 .

1-LEVEL DFD of login page Master page User id Login form Password Central Database 32 .

1-LEVEL DFD of Registration page Master pages User id Password Password confirm Name Email Country State City Central database 33 .

1-LEVEL DFD of Search page Master pages Search User -id Country State City 34 Central database .

35 .

8)SCREEN SHOTS HOME PAGE Its a homepage of website in which we use the master page for maintain the uniqueness in project. find rooms or roommates that fit your needs. 36 . With our easy roommate finder system. Looking for roommate? Search all of the US for roommate with the best rooms absolutely free.

SEARCH PEOPLE This page is used to search the appropriate roommate according to its desired needs and provide Best accommodation according to the user „s budget. 37 .

REGISTRATION PAGE This is the registration page where user can register its detail to the database of the website at the backend. 38 .

USER LOGIN PAGE This is user login page where user can login into its account by entering its userid And password. 39 .

40 .ABOUT US Detail about the webite .how it is helpful to the user for finding best roommate.

HELP In this page of the website user can enter its query and can submit to us by which in maintenance phase we can remove the problem of the user according to its needs. 41 .

42 .CONTACT US In this page we have given the contact details of us so that user can directly contact us for further assistance.

CODING PHASE MASTER PAGE 43 .

MASTER . CS PAGE 44 .

 Testing and debugging are different activities. If the errors are uncovered they are debugged and corrected.  Testing should begin “in the small” and progress towards “in the large”. Detailed definition of the test cases can begin as soon as the design is solidified.  The Pareto principle applies to software testing.9)TESTING AND IMPELMENTATIONS What is testing? Software testing is a critical element of the ultimate review of specification design and coding. Testing also provides a good indication of software reliability and software quality as a whole. A strategy approach to software testing has the generic characteristics:  Testing begins at the module level and works “outwards” towards the integration of the entire computer based system. The result of different phases of testing are evaluated and then compared with the expected results. Stated simply the Pareto principle implies that 80% of all errors uncovered during testing will likely to be traceable to 20% of all program modules. but debugging must be accommodated in the testing strate GOALS AND OBJECTIVES Our Objective is to design test processes that systematically uncover different classes of errors and do so with minimum amount of time and effort Testing Principles The basic principles that guide software testing are:  All test cases should be traceable top customer requirements. The most severe defects from the customer‟s point of view are those that cause the program to fail to meet its requirements. Therefore the entire test can be planned before any code has been generated. Testing plan can begin as soon as the requirement model is complete.  Test case should be planned long before testing begins. The program of course is to isolate these suspect modules and to thoroughly test them.  Different testing techniques are appropriate at different points of time. The first test planned and executed generally focus on the individual modules. As testing progresses 45 . Testing of software leads to the uncovering of errors in the software functional and performance requirements are met.

The number of paths permutations for even a moderately sized program is exceptionally large.testing shifts focus in an attempt to find errors in integrating clusters of modules and ultimately in the entire system. 46 . It is possible however to ensure that all conditions in the procedural design have been exercised  To be most effective an independent third party should conduct testing.  Exhaustive testing is not possible. For this reason it is impossible to execute every combination of path during testing. The third party has the highest probability of finding the errors.

response time given by the module. New Test Case Existing Test Case Software Under Testing Output Comparator Result of Testing Following types of testing are done on the System. drivers and/or stubs software must be developed for each unit. New test cases are prepared and added to this existing test suit to check for the added functionality. Unit Testing The module interface is tested to ensure that information properly flows into and out of the program unit under test. A stub serves to replace the modules that are subordinate to the modules to be tested. 47 . A stub may do minimal data manipulation.Test Case Before the project is released.  Performance Test: These determined the amount of execution time spent on various parts of units and the resulting throughput. Approaches used for Unit Testing were:  Functional Test: Each part of the code was tested individually and the panels were tested individually on all platforms to see if they are working properly. A pictorial representation of this can be shown as follows. The unit testing is normally considered as an adjunct step to coding step. there is existing test cases which checks for the previous functionality.  Stress Test: A lot of test files were made to work at the same time in order to check how much workloads can the unit bear. Because modules are not a standalone program. A driver is nothing more than a “main program” that accepts test cases data and passes it to the module. 1. so that the required functionality is met and previous functionality of the system is also not broken to do this. it has to have passed through a test cases suit. prints verification of entry and returns.

2. In the latter case the person performing debugging may suspect a cause.  Bottom up integration: It begins with construction and testing with atomic modules i. Debugging Debugging occurs as a consequence of successful testing i. The poorly understood mental process that connects a symptom to cause is debugging.  Configuration review: Ensures that all the elements of software configuration have been properly developed cataloged and have support for the maintenance phase of software life cycle. modules at the lowest level of the program structure. Beta test is conducted at one or more customer site by software end user.e. 48 . corrected and then removed or  The cause will not be found. This can be done in two ways:  Top down integration: Modules are integrated by moving downwards through the control hierarchy. and then work towards the correction of errors in the interactive fashion. beginning with main control module are incorporated into the structure in either a depth first or breadth first manner. This process will always have one of the two outcomes:  The cause will be found. when a test case uncovers an error. It covers the following: Validation test criteria: Performance.  Alpha Beta testing: Alpha test is conducted by developer‟s site by customer. Integration Testing “If they all work individually. processing required for the modules subordinate to a given level is always available and the need of stubs is eliminated.” The problem of course is “putting them together “. 3. they should work when we put them together. debugging is the process that results in the removal of error. design a test case to help validate his suspicion. Validation Testing Validation succeeds when software functions in a manner that can be reasonably expected by the customer. Because modules are integrated from the bottom up. functional characteristics and uncovered deviation from specification.e.

 Shortcut keys to menu option can be added. 49 . We please people to let us know the bugs and enhancement required.  Help option can be added. As you are the user of this Software. you are our most important critic and commentator. which we could not have covered.Scope of Future Enhancements  Extra menu options can be added according to requirement. what we could do better and what areas you would like to see in this software and any other words of wisdom you are willing to pass our way. We value your opinion and want to know what we are doing right. There can be even some bugs. We will be highly obliged by the people who have made suggestion and helped us to know the uncovered bugs in the software.

it may affect the other parts also. Defects can result from design errors. Adaptive Maintenance It includes modifying the software to match changes in the ever-changing environment. Thus. Process The process of maintenance for given software can be divided into four stages as follows:  Program understanding: It consists of analyzing the program in order to understand it. The ease of understanding the program is primarily affected by complexity and documentation of the program. E. work patterns and software/hardware operating platforms. 50 . data processing errors and system performance errors. Environment refers to the totality of all conditions and influences which act from outside upon the software.  Modified program testing: The modified program is to be tested again and again to check that the software has enhanced and reliability is validated. logic errors. government policies. there is a kind of ripple effect from the location of modification to the other parts of the software. coding errors. business rules.  Account for ripple effect: If any change is made to any part of the system. Perfective Maintenance It means improving processing efficiency or performances. or restructuring the software to improve changeability.10)MAINTAINENCE Categories Corrective Maintenance It means modifications made to the software to correct the defects. The primary feature affecting the ripple effect is stability.  Generate particular maintenance proposal: The ease of generating the maintenance proposal is primarily affected by extensibility of the program.g.

by doing that. Various software guides and directories have been attached with the software.11)Conclusion This software will be used for “SEARCH OF APPROPRIATE ROOMMATE”. bill payments. Customization takes lots of time. For better management of receipt and revenue resources. No software package can meet all requirements of a given RR section. easy to use. The functions that will be covered by this software are maintaining user details. To avoid maintenance of registers such as new entry. these main modules are combined with the overall project. flexible. The following objectives have been achieved with the development of billing software: Generalized and comprehensive software package: It is user friendly. Sub-modules are designed and integrated with main module. Reviews are being conducted periodically. Report generation in PDF as well as in Microsoft word. bill generation. Inevitably. is compatible. report formats. other problems could arise. All input/output screens have been put in their corresponding menus and submenus. modification etc. This menu-driven approach adds value to the software. outputs. For use of various modules based on customer details. which serves as one of the best software for creation of forms. has good documentation Integrated with multi-user capability: It serves large user community. inputs. thus. thus. 51 . Supporting utility: It provides continuous support to users. All the predefined project objectives have been achieved with development of billing software such as: To automate the Work order sheet activity of all the customers for various services. Stored information has been indexed. Finally. eliminating bypass of even a minor requirement of user. retrieval of information is fast. Modularized approach: It has been developed using modular approach. It will be used as management tool for various activities in the Clear Edge Filtration. Menu driven: It has been designed with Visual Studio as front end. can be upgraded as per the requirements. some compromises will be needed in workflows. More precisely it will be used to automate various functions in any Clear Edge Filtration branch in whole world.

com  www.com 52 . Unleashed ASP . 3.codeproject. NET 2.0 Websites:- - Walther and Stephen Wrox Publications Wrox Publications  www.12)Bibliography 1. 4.0 Beginning ASP.com  www. NET 2.NET Professional ASP.java2s.asp.dotnetspiders.net  www. 2.

53 .

Sign up to vote on this title
UsefulNot useful