(MINOR PROJECT) Submitted in partial fulfillment of the requirement For the award of the Degree of

Bachelor of Technology

Computer Science


January 2010 Sri Balaji College of Engineering & Technology Benad Road Macheda, Jaipur (Raj.)-302013 (Rajasthan Technical University,Kota)



The beatitude, bliss & euphoria that accompany the successful completion of any task would be incomplete without the expression of the appreciation of simple virtues to the people who made it possible. So, reverence, veneration and honors. I acknowledge all those whose guidance and encouragement has made successful in winding up this. I owe a huge debt of thanks to a large number of people without whom none of this would have been possible. I am thankful to MRS. NEERAJ CHOUDHARY FACULTY(CSE) for being our mentor and for valuable suggestions and enthusiastic interest during the entire process of the preparation of Project. Lastly, I extend my heartiest thanks to all those who have contributed in making this project a success.


This is to certify that the project entitled “ONLINE ROOMMATE SEARCH” is the bonafide work carried out by SAURAV GANGULY student of B.Tech (CSE),







ENGINEERING AND TECHNOLOGY, JAIPUR, is hereby accepted and approved as a credible work, submitted in the partial fulfillment of the requirements of Degree of B.Tech. (CSE) from RAJASTHAN TECHNICAL UNIVERSITY, KOTA.

Signature of the Coordinator:

Signature of the HOD: Place: Date:



INTRODUCTION This project is basically deals with search a appropriate Roommate and Paying guest.with addition to the knowledge of client personal information, professional information , its likes and dislikes , habits etc. the client can hide some of the personal details as according to its needs. BRIEF DESCRIPTION In this project we will make an online website which will deal with online searching of appropriate roommate search for paying guest. In minor project we will derive few models with different phases, to describe by different sets of attributes. Some of the page description are:       Client/user Registration/Login Page. Client/user Personal Information with Edit facility Search page Client/user requirements Advertisements of PG‟s and Roommates User request for Pg.

Thus are some basic requirements module, the whole set can be enlarge with including more phases in it. In this project we worked on .NET platform, with C# for coding.




PAGE NO. 30 31-34

Entity relationship diagram Dataflow Diagrams 2.1 0 level DFD 2.2 1-level DFD of Login page 2.3 1-level DFD of Registration page 2.4 1-level DFD of search page


Screenshots 3.1 Homepage 3.2 Search people 3.3 Registration page 3.4 Login page 3.5 About us 3.6 Help 3.7 Contact us



CodingShots 4.1 Master.aspx page 4.2 Master.cs page



6. System Design 6 TITLE PAGE NO.5 ) Testing Phase 3. 2.CONTENTS S.3) C# 4. FEASIBILITY STUDY Introduction To Project 6.NO.2) ASP.NET 4.4) Limitations 7.6 ) Implementation Phase 3.4 ) SQL Server 2008 5. METHODOLOGY USED 3.1) Requirement Analysis Phase 3.4) Coding Phase 3. 1.1) Company Profile 3.1) Microsoft .7 ) Post Implementation and Maintainence Technology Used 4. 16-22 23 24-25 26-33 .3) Development Phase 3.Net Framework 4.1) Objective 6.3 ) Scope 6. 8 9-13 14-15 4.2 ) Design Phase 3. Project Title Introduction 2.2) Life Cycle 6.

1) Introduction 7. 8 9 10 11 12 SCREENSHOTS TESTING AND IMPLEMENTATIONS MAINTAINENCE CONCLUSION BIBLOGRAPHY 36-44 45-49 50 51 52 7 .7.5) Dataflow diagrams.3) Database and attributes used 7.2) Steps 7.4) Entity Relationship Diagrams 7.


D ZONE SOFTWARE. human resource and training. ready-to-use packaged products. an effective design team and custom product development expertise. Web Solution Services and Design Company developing leading-edge solutions.co. INTRODUCTION TO COMPANY www. kota in 1991. offers a range of solutions. He has a vast experience of around 15 years in software analysis to development to delivery. D ZONE SOFTWARE. products and designs for addressing the needs of businesses . has an excellent and experience team of professionals from various background and academics.dzone. Here's an idea about DZone strength categorically Promoters Mr Hemant Sexena. Giving services to 100+ global corporate clients through a team of dedicated and highly skilled set of programmers. consultancy. We are perfectly poised to partner the client‟s business to new levels of efficiency. D ZONE SOFTWARES. his innovations and vision have been the key factor in the great success Intecons enjoys by way of the client satisfaction and implementing some of the most difficult domain projects. development of customized solutions for varied industries. Having worked in vast variety of fields related to commercial. we combine a unique onsite/offshore delivery model infused by a distinct culture of customer satisfaction.2. is premier Software. consulting and outsourcing services. engineering and mobile applications. profitability and growth. with its strong technology. D ZONE SOFTWARE. promises to break into the top league of service providers to a 9 . graduated from Kota university.in INTRODUCTION DZone is a leading provider of information technology.

We lay emphasis on designing customized software solutions. The company has created a niche in a very small time span and has developed solutions that are flexible. Our capabilities span both the technology and design domains. secure and increase efficiency of their business. India promises high quality and a competitive cost advantage to its customers. Whether you have the full product specification or only the business idea. People at D ZONE SOFTWARE work to provide its customers with a single platform for all business solutions. We develop and deliver products that enable our customers to manage. we turn your project concept into reality. efficient and scalable. We analyze your project in order to define goals and plan a detailed roadmap to reach those goals. We provide unique end-to-end solutions to our clients in a variety of markets that really work for them and help them to increase their work efficiency and reduce their costs. Design. 10 .wide clientele. develop and operate the infrastructure and provide the client with maximum leverage to handle its day-today activities. We provide full-range service to Define. Our proven step-by-step methodology helps us maintain accurate development schedules and documentation of development. Develop Deploy and support Web & Software Application projects. which are based on the present and future business requirement of our clients. Its development center in Jaipur. We analyze and evaluate business requirements for our clients and design systems to help our clients in achieving their goals.

creation and transparency Selectivity of product and producer Quest for excellence and perfection to offer the highest standards of service Exploration of the concealed energies and talents of our employee Company performance Expertise All of our team members have several years of expertise developing customized. commercial and technical disciplines into coherent approach. We are staying on pace with the fast evolving Web development capabilities. fully integrated systems in a variety of industrial standards. combining quality. D ZONE SOFTWARE Soft has a wellmanaged staff to assist in meeting your needs. Further. Technically Advanced Our Web development tools and products implement Object-Oriented design and Programming.Strategy of Company We operate as an integrated management system. we use the most modern development tools and technologies available on the market today.          Understanding our customers needs and requirements Meeting or exceeding our customer‟s expectations Use of a practical mix of new and proven techniques and technologies Constant development of our staff and management expertise Our commitment of the continual improvement of our processes Propensity to innovate. 11 . Flexibility We are custom-build to client specific requirements. We have proven to be able to react quickly and to adjust to any changes or additions thrown at us during the course of a project.

you'll get more for your software & web Development budget. is very concerned about the project confidentiality. web enabling of applications. developing Enterprise wide application (EWA). Ultimately. ASP. overhead and salaries. migration and new application development. Linux. we can pass on significant savings to you. We ensure that full confidentiality of clients project is maintained while in development as well as after completion of project. Our people put in whatever work is required. Reasonable cost India has low operating costs and low-cost labor. Business Process re-engineering. we tap a virtually unlimited supply of highly skilled programmers and professionals. Environments Our areas of expertise include web solutions. We provide solutions on a wide array of platforms such as Windows. whenever needed. Our location provides us with a rich pool of talent and low-cost environment for operating. PHP. When we have your deadlines to meet we ensure the deadline is met. XML. Therefore. FLASH. Expandability For our clients' proprietary development projects. Photoshop and Macromedia Studio MX. We focus on providing complete Resource Planning and Management solutions. ASP. The Team Profile 12 . These skills form the foundation of our ability to provide complete enterprise solutions to our clients ranging from legacy system maintenance. client-server / distributed computing architectures.Dedication Our programmers are professionals in the truest sense of the word.NET. yet India is a world technological superpower. to keep our clients happy. Security D ZONE SOFTWARE.

Our Approach & Strengths One of the prime movers of any business of today is the provisioning of a reliable. Industry Certified Engineers.. B. and shall always remain that way in the future. BE. geographical reach. Engineers. The Indian scene had two types of players in networking. The team consists of qualified MCA. Information Technology has not always been able to address the needs of SME markets. downtime and limited spread of quality IT development centers locally. The increasing automation and integration of multifarious applications into the system also necessitates the need of a robust network underpinning so that the organization can reap the benefits fast enough and sustain the edge over its rivals. scalable. 13 .We have excellent team of skilled and experienced professionals. Analysts and consultants who are well qualified and experienced in their respective fields. flexible communication infrastructure.Tech and Post Graduates who share their experience and expertise to make every project a confirmed success. one owning the media and another owning the system/network integration skills. The hurdle being reasons like affordability. Enterprise communication needs with interests over large geographic spreads have never been completely addressed by a single connectivity solution.

coding generation and testing.e. the s/w design involves three technical activities: design. These are as follows. Development Phase 4. We have to clearly know about the client‟s requirements and the objectives of the project.) METHODLOGY USED IN WEBSITE DEVELOPMENT The general methodology in developing a system is involved in different phases which describe the system‟s life cycle model for developing software project. Post Implementation Phase EXPLANATION OF DIFFERENT STAGES OF WATERFALL MODEL REQUIREMENT ANALYSIS This Phase includes the definition of the problem. Implementation Phase 7. In order to identify the problem: we have to know information about the problem the purpose of the evaluation for the problem to be known. Testing Phase 6. DESIGN Software design is a process through which the requirements are translated into a representation of an s/w. the s/w is logically partitioned into components that perform specific functions and sub functions. The design of the system is in modular form i. 14 . The concept includes not only forward motion but also have the possibility to return that is cycle back to an activity previously completed. The basic WATERFALL MODEL is being used that is its stages. Requirement Analysis Phase 2. Design Phase 3. Like most systems the life cycle of the computer based system also exhibits distinct phases. The Design Phase leads to modules those exhibit independent functional characteristics . 1.3. Coding Phase 5. One of the software have been analyzed and specified. DEVELOPMENT The development phase includes choosing of a suitable s/w to solve the particular problem given the various facilities and the sophistication in the selected software gives a better development of the problem. The design phase is for main importance because in this activity decisions ultimately affects the success of software implementation and maintains. This cycle back or feedback may occur as a result of the failure with the system to meet a performance objective or as a result of changes in redefinition of System activities.it even leads to interfaces that reduce the complexity of the connections between modules and with that external environment.

programming code. IMPLEMENTATION After testing is over project is implemented by providing training to the users and providing manuals so that they can be refreshed as and when needed POST IMPLEMENTATION If any problem occurs after the implemented they are removed from time to time so that so that the users can work on the prepared system easily finally a satisfied user when all things are almost right 15 . Which can be executed by a computer and which performs the computation specified by the design? TESTING Testing is done in various ways such as testing the algorithm. sample data debugging is one.CODING The coding phase is for retranslating the design of the system produced during the design phase into code in a given programming language.

databaseconnectivity. The .NET Framework is included with Windows Server 2008. Access to COM components is provided in the System. The framework's Base Class Library provides a large range of features including user interface. The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program.NET FRAMEWORK 3. The CLR also provides other important services such as security.InteropServices and System. MICROSOFT . this runtime environment is known as the Common Language Runtime (CLR).0 The Microsoft . Version 3.NET environment. who combine it with their own code to produce applications.NET Framework. the . COMMON RUNTIME ENGINE: 16 . memory management.0 of the .NET Framework provides means to access functionality that is implemented in programs that execute outside the . and Windows 7.cryptography. web application development. The class library is used by programmers. It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework. access to other functionality is provided using the P/Invoke feature.4. Also part of the .EnterpriseServices namespaces of the framework.NET Framework. and network communications.NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. The class library and the CLR together constitute the .NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform.NET Framework execute in a software environment that manages the program's runtime requirements. and exception handling.Runtime. Windows Vista. PRINCIPAL DESIGN FEATURES INTEROPERABILITY: Because interaction between new and older applications is commonly required. dataaccess. Programs written for the . numeric algorithms.

This is discussed in more detail in Microsoft .NET provides a common security model for all applications. ASP. the . The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other.NET projects. including file reading and writing. database interaction and XML document manipulation.NET framework.NET framework. is a library of functionality available to all languages using the . These reduce the amount the code you have to write.NET version of ASP is ASP. so you can be more productive while programming.NET or VB.NET is the way you can use any programming language based on the . security.The Common Language Runtime (CLR) is the virtual machine component of the .NET To create dynamic web pages by using server side scripts. such as C#.NET allows you to build dynamic web pages and tailors the HTML output to whatever browser you are using.NET framework includes design features and tools that help manage the installation of computer software to ensure that it does not interfere with previously installed software. or CTS. predefined and ready to use control for your ASP.NET Framework.NET to create your web application. LANGUAGE INDEPENDENCE: The . Microsoft has introduced ASP. One of the most EYECATCHING things about the ASP.NET. BASE CLASS LIBRARY The Base Class Library (BCL). Additionally. and exception handling.NET programs execute under the supervision of the CLR. part of the Framework Class Library (FCL). that have been exploited by malicious software. guaranteeing certain properties and behaviours in the areas of memory management. such as buffer overflows. Jscript.NET Framework introduces a Common Type System. ASP. SECURITY The design is meant to address some of the vulnerabilities. All . Because of this feature. AS. The .NET Framework supports the exchange of instances of types between programs written in any of the . The BCL provides classes which encapsulate a number of common functions. and that it conforms to security requirements.NET Languages. SIMPLIFIED DEVELOPMENT The . 17 . . It also comes with a great set of reusable.NET languages. graphic rendering.NET is a programming framework used to create Enterprise class of efficient information management.

Therefore. ASP script was an interpreted script and consisted unstructured code and was difficult to debug and maintain. an architecture was needed that would allow the development of a Web application in structured and consisted way.WHY ASP.NET? Since 1995. Microsoft has been constantly working to shift its focus from Window based platforms to the INTERNET. Microsoft introduced ASP ( Active Server Pages) in November 1996. As the web consists of many different technologies. As a result. 18 . the number of lines f source code in ASP applications increase the dramatically and was hard to maintain. ASP offered the efficiency of ISAPI applications along with the new level of simplicity that made it easy to understandable and use. Also. as applications grew bigger in the size and became more complex. However. software integration for web development was complicated and required to understand many different technologies.


NET file to a Web Server by using Uniform Resource Locator (URL). receives the request and retrieves the appropriate ASP. which is the web Server for the Window Platform.NET Script Engine for processing. Finally.NET files from top to bottom and then executes the Script.NET APPLICATION WORKING ON ASP.NET file.NET files need to be stored on as IIS Server. IIS. After creation of an ASP.NET APPLICATION We create an ASP. The Web Server forward the ASP. The ASP. STEPS ARE : 1. The web Server. 4.NET files to the ASP.THE ARCHITECTURE OF ASP. the results are sent to the web Browser that requested the ASP.NET file from the disk or Memory. A web browser sends a request for an ASP.0). 2 .NET Script Engine reads the files from top to Bottom and executes any Server side Script it encounters. 20 . 3.NET framework (2. An IIS Server process the ASP.NET application the ASP.NET application by using the tools integrated with the Microsoft.

and the ASP. Manageability 6. Web Browser (Netscape navigator. These steps are also expressed by 3-Tier client Server Architecture.NET file from the user who access an ASP. As a result it helps to hide the code of ASP. The web Browser interprets the output and displays it.etc.NET Script Engine sends the HTML page to the Web Server.NET file is generated as an HTML document. Enriched Tool Support 3.NET Web pages. Database Server.NET SERVER 1. Security 21 . 6 . The Web Server then sends the HTML page to the client. Web Server (IIS) 3. The processed ASP. Simplicity 5. Complied code 2.) 2. A web server generates and sends only the HTML-OUTPUT to the client. This architecture consists of these three components: 1.5 . 7. Power and flexibility 4. The basic description of how this architecture works is as described below in the diagram: CLIENT WEB BROWSER WEB SERVER IIS APPLICATION SERVER DATABASE SERVER FEATURES OF ASP. internet explorer.

C# (C SHARP) : C# is fully Object Oriented Language like JAVA.NET projects  Creating web controls  Providing Web services MICROSOFT SQL SERVER 2008 Microsoft SQL Server 2008 is a relational database system that is scalable from single user database running on a single user system such as Laptop to enterprise-wide networks and global dotcom websites. video and other multimedia data. mature and stable platform? SQL Server is a comprehensive. including digital media formats for pictures. The SQL Server data platform includes the following tools:  Relational Database  Replication Services  Notification Services  Integration Services  Analysis Services  Reporting Services  Management Tools  Development Tools  Increase Productivity 22 . It has been designed to support the KEY feature of . end-to-end data solution that empowers people by providing a more secure. SQL server 2008 is the eighth SQL Server release making a featurerich. and it is first component oriented language.  Console Applications  Window Applications  Developing Windows controls  Developing ASP. APPLICATIONS OF C# C# is a new language developed exclusively to suit the feature of . integrated. SQL Server 2008 also includes support for structured and semi-structured data.NET platform. the new development platform of Microsoft for building Component based Software Solutions. reliable and productive platform for enterprise data applications. audio. It can be used for a variety of applications that are supported by the .NET platform. It becomes linear and safer. developer can quickly implement applications and component‟s code is managed by CLR.NET framework. With the help of C# language.

The cost of hardware and software for class of application being considered. We can test our system by different type of the feasibilities. 23 . as the software required for developing it and the software and hardware required for using it are easily available. 3. 2. impact of the organization. These are as follows: Technical Feasibility The proposed system is technically feasible. Operationally Feasibility The proposed system is operationally feasible because it requires minimal knowledge of working with computer for using it.5)FEASIBILITY STUDY Feasibility Study is a test of the system according to its workability. The cost to conduct a full system investigation. Economical Feasibility In this we consider following costs: 1. Therefore maintaining both the resource become easy and feasible as compared to a fully manual system which it was previously or a fully computerized system. Since the system is partially manual and partially computerized. ability to meet user needs and effective use of the resources. Our system has a lot of features at a minimum cost so it is feasible to implement and it will be very much beneficial to the sellers in the reduced cost. It‟s software and hardware cost is also low then the existing system. The user can easily learn to use the system from the user manual. The benefit in the form of the reduced cost. There are 3 types of the feasibilities which are discussed here.

6).INTRODUCTION TO THE PROJECT SOFTWARE DEVELOPMENT LIFE CYCLE Project Initiation and Planning Requirement Analysis System Designing Coding Testing Implementation Maintenance Project Delivery 24 .

Roomate services like RoommateWire. gmail. this site makes sure that only results that meet your specific requirements are displayed. With comprehensive search options. human labor and are subject to change drastically as the technology changes . which is time consuming.  Online Help: One needs to provide online help to various users so that all the features of the software can be properly understood by the user  Backup: The software requires the periodical backup. Since these websites offer roomate services regardless of the place.com offer a private mailbox and use a highly advanced search algorithm to make the search a lot more effective. preferences and other such criteria for roomate selection. Roomate services on the internet offer different tools and features to make the search experience highly rewarding. facebook etc. In doing so. 25 . requires human labor. one finds it very convenient to search for roomates in any part of the world.  To do more publicity by RSS feed.com offer a marketplace where you can search for potential roomates and also post a roomate requirement ad. The advent of the net has made this possible. PROJECT LIMITATION  Cost: It is costly as one needs to satisfy software and hardware requirements  Documentation: It is time consuming and requires expertise in creating good documentation from view point of top administrators users  Manuals: Various manuals are to be prepared such as user manuals.PROJECT OBJECTIVE  To get practical knowledge for preparation of websites in ASP.NET environment. system manuals etc.  To reduce the work efficiency to find appropriate roommate or paying guest. The last thing you want is to end up with an inconsiderate roomate who finds it almost impossible to get along with you. the time and effort taken to look for roomates is significantly reduced. Although a new place throws up its unique challenges. more resources such as Hard Disk etc. Before looking for a roomate. it is essential that one identifies personal requirements.com eliminate such problems by displaying criteriaspecific results. Sites like RoommateWire. with people finding it increasingly easy to relocate to a new apartment and find a suitable roomate in no time at all. one is today wellequipped to deal with them. people have transcended physical boundaries to look for study and work options in places they haven‟t visited before. Roomate services such as RoommateWire. With the world getting flatter by the day.  To do the publicity by transfer the contacts via RSS feed by mail portal such as yahoo. PROJECT SCOPE Roomate services are in high demand these days. It needs time. This helps you evaluate your options better.

Specifying the implementation plan. Relational structured database is used in this system. A physical path is derived from the logical path. A key is to determine how the access paths are to be implemented.  Database Design The Database (collection of data) is at the core of any information system. but at the same time. Visual Web Developer 2008 is used for coding. Preparing security and control specification.  Physical design (Database design) This activity deals with the design of the physical database. which are supported by the browsers like Internet Explorer.Net is used as server side scripting while JavaScript and HTML are used as client side scripting. ASP. the inputs (source). coding and debugging procedure prior to conversion. It specifies the user need at a level of detail that virtually determines the information flow into and out of the system and the required data resources. procedures (Data Flow) and boundaries of the system are described that needs the user requirement. In this application.  Program Design In conjunction with database design is a decision on the programming language to be used and the flowcharting. avoid any harmful or unnecessary redundancy. A good database design should hold all the data. Databases (data stores). which may be required by the users of the system. one-to-many. 26 .SYSTEM DESIGN AND DEVELOPMENT Introduction System Design is a transition from a user-oriented document to a document oriented to programmers or database personnel. It translates the system requirement into ways of operating them and focuses on the detail implementation of the system. Preparing a logical design walkthrough before implementation. The nature of data stored in the database as well as the organization of the data has wide implications on the performance of the system. Steps of Design Process  Logical design (DFD) In the DFD. outputs (destination). The database should also be flexible so that any future change in requirements can be incorporated with minimum changes.7). The design of the proposed system has gone through logical and physical design with emphasis on the following:    Preparing input/output specifications. many-to-many are considered while designing the database. The relationships existing among the entities like one-to-one.

retrieval and storage of data. for both input and output. The performance of the software shall also depend on the hardware configuration at the implementation sites.e. Manual intervention cannot be fully avoided. Once the input data is captured in the system. Although the software will take care of many aspects. The system uses database. Online mutations and progress reporting cannot begin till the entire database is initially created. The client machines must have minimum 128 MB RAM and 8 GB Hard disk.The data in Online Roommate Site is organized in the form of 2-D relational tables. Since the system requirement is manipulation of data. The designer will have to advise the techniques of sorting and retrieving data from these files. validated and corrected. these may have to be preserved either for a short or long period. 27 . Organization of data into tables allows easy categorization. which is described as follows. Different tables have been created for different type of information. 3. The server machines must have minimum 256 MB RAM and 20 GB Hard disk. One of the major constraints is also the heavy volume of data to be entered for creation of Master database. Detailed Design Specification Complete design specification serves the following purposes: It should be able to adequately serve as training material fir new project members. the authentication and acceptance of responsibilities of the data entered still rests with the RR section In-charge. imparting them enough information and understanding about the project implementation. These data will generally be stored in files or databases in logical manner. Design Consideration General Constraints 1. It should serve as “Objective Evidence” that the designers and/or implementers are following through on their commitment to implement the functionality described in their requirements specifications. Design Constraints It is imperative that the RAM and storage requirements are met. some of the tables used are almost static in nature and are already available with the standard data for the selection of the parameter values. 2. The rules of normalization have also been applied while designing the tables. Other tables are used with bi-directional role of data i.

) userid password Password confirm Name Email address Other detail country state TYPE Int Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) REMARKS Auto generate no.K.Detailed System Design Each subsection of this section will refer to or contain a detailed description of a system software component. The discussion provided covers the following software component attributes:  Purpose  Input  Processing  Output  Validation Checks  Implied Requirements DATABASE AND ATTRIBUTES USED REGISTRATION PAGE FIELD NAME Id(P. User id of user password of User Confirmation of user Name of user Email address of user Detail explaination of user Country of user State of User 28 .

LOGIN PAGE userid password Varchar(50) Varchar(50) User id of user password of User SEARCH userid country Varchar(50) Varchar(50) User id of user Country of user 29 .

Entity Relationship Diagram id E Mail Password User fgbvb Registr ation Password confirm User State Name Country Other detail User Login User fgbvb Name E Mail Password E Mail Search people City People Country State 30 .

0-LEVEL DFD of website Starting Database Login Home Registra tion search 31 .

1-LEVEL DFD of login page Master page User id Login form Password Central Database 32 .

1-LEVEL DFD of Registration page Master pages User id Password Password confirm Name Email Country State City Central database 33 .

1-LEVEL DFD of Search page Master pages Search User -id Country State City 34 Central database .

35 .

36 .8)SCREEN SHOTS HOME PAGE Its a homepage of website in which we use the master page for maintain the uniqueness in project. With our easy roommate finder system. Looking for roommate? Search all of the US for roommate with the best rooms absolutely free. find rooms or roommates that fit your needs.

37 .SEARCH PEOPLE This page is used to search the appropriate roommate according to its desired needs and provide Best accommodation according to the user „s budget.

REGISTRATION PAGE This is the registration page where user can register its detail to the database of the website at the backend. 38 .

39 .USER LOGIN PAGE This is user login page where user can login into its account by entering its userid And password.

40 .ABOUT US Detail about the webite .how it is helpful to the user for finding best roommate.

41 .HELP In this page of the website user can enter its query and can submit to us by which in maintenance phase we can remove the problem of the user according to its needs.

42 .CONTACT US In this page we have given the contact details of us so that user can directly contact us for further assistance.



The most severe defects from the customer‟s point of view are those that cause the program to fail to meet its requirements. The result of different phases of testing are evaluated and then compared with the expected results.  Test case should be planned long before testing begins. Testing plan can begin as soon as the requirement model is complete. Testing also provides a good indication of software reliability and software quality as a whole. Therefore the entire test can be planned before any code has been generated.  The Pareto principle applies to software testing. Testing of software leads to the uncovering of errors in the software functional and performance requirements are met. If the errors are uncovered they are debugged and corrected. Detailed definition of the test cases can begin as soon as the design is solidified. Stated simply the Pareto principle implies that 80% of all errors uncovered during testing will likely to be traceable to 20% of all program modules. but debugging must be accommodated in the testing strate GOALS AND OBJECTIVES Our Objective is to design test processes that systematically uncover different classes of errors and do so with minimum amount of time and effort Testing Principles The basic principles that guide software testing are:  All test cases should be traceable top customer requirements. As testing progresses 45 .9)TESTING AND IMPELMENTATIONS What is testing? Software testing is a critical element of the ultimate review of specification design and coding. The program of course is to isolate these suspect modules and to thoroughly test them.  Different testing techniques are appropriate at different points of time. A strategy approach to software testing has the generic characteristics:  Testing begins at the module level and works “outwards” towards the integration of the entire computer based system.  Testing and debugging are different activities. The first test planned and executed generally focus on the individual modules.  Testing should begin “in the small” and progress towards “in the large”.

46 . The third party has the highest probability of finding the errors. The number of paths permutations for even a moderately sized program is exceptionally large.testing shifts focus in an attempt to find errors in integrating clusters of modules and ultimately in the entire system. It is possible however to ensure that all conditions in the procedural design have been exercised  To be most effective an independent third party should conduct testing.  Exhaustive testing is not possible. For this reason it is impossible to execute every combination of path during testing.

Approaches used for Unit Testing were:  Functional Test: Each part of the code was tested individually and the panels were tested individually on all platforms to see if they are working properly.  Stress Test: A lot of test files were made to work at the same time in order to check how much workloads can the unit bear. Unit Testing The module interface is tested to ensure that information properly flows into and out of the program unit under test. response time given by the module. prints verification of entry and returns. A stub may do minimal data manipulation. so that the required functionality is met and previous functionality of the system is also not broken to do this. New Test Case Existing Test Case Software Under Testing Output Comparator Result of Testing Following types of testing are done on the System. The unit testing is normally considered as an adjunct step to coding step. 1.  Performance Test: These determined the amount of execution time spent on various parts of units and the resulting throughput. it has to have passed through a test cases suit. drivers and/or stubs software must be developed for each unit. A pictorial representation of this can be shown as follows.Test Case Before the project is released. New test cases are prepared and added to this existing test suit to check for the added functionality. A stub serves to replace the modules that are subordinate to the modules to be tested. 47 . there is existing test cases which checks for the previous functionality. A driver is nothing more than a “main program” that accepts test cases data and passes it to the module. Because modules are not a standalone program.

 Bottom up integration: It begins with construction and testing with atomic modules i. It covers the following: Validation test criteria: Performance. Debugging Debugging occurs as a consequence of successful testing i. Integration Testing “If they all work individually. Because modules are integrated from the bottom up. Validation Testing Validation succeeds when software functions in a manner that can be reasonably expected by the customer. 48 . debugging is the process that results in the removal of error. This process will always have one of the two outcomes:  The cause will be found. beginning with main control module are incorporated into the structure in either a depth first or breadth first manner. and then work towards the correction of errors in the interactive fashion. functional characteristics and uncovered deviation from specification.  Configuration review: Ensures that all the elements of software configuration have been properly developed cataloged and have support for the maintenance phase of software life cycle. Beta test is conducted at one or more customer site by software end user. when a test case uncovers an error. 3.e.2. This can be done in two ways:  Top down integration: Modules are integrated by moving downwards through the control hierarchy. they should work when we put them together. corrected and then removed or  The cause will not be found. The poorly understood mental process that connects a symptom to cause is debugging.” The problem of course is “putting them together “. In the latter case the person performing debugging may suspect a cause. processing required for the modules subordinate to a given level is always available and the need of stubs is eliminated.e. modules at the lowest level of the program structure. design a test case to help validate his suspicion.  Alpha Beta testing: Alpha test is conducted by developer‟s site by customer.

We value your opinion and want to know what we are doing right. We please people to let us know the bugs and enhancement required.  Shortcut keys to menu option can be added.  Help option can be added. what we could do better and what areas you would like to see in this software and any other words of wisdom you are willing to pass our way. We will be highly obliged by the people who have made suggestion and helped us to know the uncovered bugs in the software. As you are the user of this Software. There can be even some bugs.Scope of Future Enhancements  Extra menu options can be added according to requirement. 49 . you are our most important critic and commentator. which we could not have covered.

Environment refers to the totality of all conditions and influences which act from outside upon the software. government policies. there is a kind of ripple effect from the location of modification to the other parts of the software. The ease of understanding the program is primarily affected by complexity and documentation of the program. data processing errors and system performance errors. business rules. Process The process of maintenance for given software can be divided into four stages as follows:  Program understanding: It consists of analyzing the program in order to understand it.  Generate particular maintenance proposal: The ease of generating the maintenance proposal is primarily affected by extensibility of the program. or restructuring the software to improve changeability. Adaptive Maintenance It includes modifying the software to match changes in the ever-changing environment. 50 . The primary feature affecting the ripple effect is stability. E. work patterns and software/hardware operating platforms. Perfective Maintenance It means improving processing efficiency or performances. Thus.  Modified program testing: The modified program is to be tested again and again to check that the software has enhanced and reliability is validated. it may affect the other parts also.  Account for ripple effect: If any change is made to any part of the system. coding errors. Defects can result from design errors. logic errors.g.10)MAINTAINENCE Categories Corrective Maintenance It means modifications made to the software to correct the defects.

flexible. is compatible. Reviews are being conducted periodically. More precisely it will be used to automate various functions in any Clear Edge Filtration branch in whole world. 51 . Stored information has been indexed. This menu-driven approach adds value to the software. some compromises will be needed in workflows.11)Conclusion This software will be used for “SEARCH OF APPROPRIATE ROOMMATE”. thus. other problems could arise. All input/output screens have been put in their corresponding menus and submenus. No software package can meet all requirements of a given RR section. retrieval of information is fast. Finally. which serves as one of the best software for creation of forms. For use of various modules based on customer details. thus. It will be used as management tool for various activities in the Clear Edge Filtration. Modularized approach: It has been developed using modular approach. Inevitably. The functions that will be covered by this software are maintaining user details. Supporting utility: It provides continuous support to users. Various software guides and directories have been attached with the software. these main modules are combined with the overall project. modification etc. can be upgraded as per the requirements. To avoid maintenance of registers such as new entry. Report generation in PDF as well as in Microsoft word. by doing that. Menu driven: It has been designed with Visual Studio as front end. inputs. outputs. All the predefined project objectives have been achieved with development of billing software such as: To automate the Work order sheet activity of all the customers for various services. Sub-modules are designed and integrated with main module. The following objectives have been achieved with the development of billing software: Generalized and comprehensive software package: It is user friendly. bill generation. Customization takes lots of time. easy to use. For better management of receipt and revenue resources. eliminating bypass of even a minor requirement of user. bill payments. report formats. has good documentation Integrated with multi-user capability: It serves large user community.

java2s. 3.com 52 . 4. 2.0 Websites:- - Walther and Stephen Wrox Publications Wrox Publications  www.dotnetspiders.NET Professional ASP. NET 2.net  www.0 Beginning ASP.12)Bibliography 1.com  www. Unleashed ASP . NET 2.codeproject.asp.com  www.

53 .

Sign up to vote on this title
UsefulNot useful