A Project Report On “ONLINE ROOMMATE SEARCH”

(MINOR PROJECT) Submitted in partial fulfillment of the requirement For the award of the Degree of

Bachelor of Technology
IN

Computer Science

Submitted By SAURAV GANGULY, (06ESBCS049) HARISH KUMAR , (06ESBCS017) B.Tech VII Sem(CSE)

January 2010 Sri Balaji College of Engineering & Technology Benad Road Macheda, Jaipur (Raj.)-302013 (Rajasthan Technical University,Kota)

1

ACKNOWLEDGEMENT

The beatitude, bliss & euphoria that accompany the successful completion of any task would be incomplete without the expression of the appreciation of simple virtues to the people who made it possible. So, reverence, veneration and honors. I acknowledge all those whose guidance and encouragement has made successful in winding up this. I owe a huge debt of thanks to a large number of people without whom none of this would have been possible. I am thankful to MRS. NEERAJ CHOUDHARY FACULTY(CSE) for being our mentor and for valuable suggestions and enthusiastic interest during the entire process of the preparation of Project. Lastly, I extend my heartiest thanks to all those who have contributed in making this project a success.

2

CERTIFICATE
This is to certify that the project entitled “ONLINE ROOMMATE SEARCH” is the bonafide work carried out by SAURAV GANGULY student of B.Tech (CSE),
UNIVERSITY ROLL NO

(06ESBCS049),

of

SRI

BALAJI

COLLEGE

OF

ENGINEERING AND TECHNOLOGY, JAIPUR, is hereby accepted and approved as a credible work, submitted in the partial fulfillment of the requirements of Degree of B.Tech. (CSE) from RAJASTHAN TECHNICAL UNIVERSITY, KOTA.

Signature of the Coordinator:

Signature of the HOD: Place: Date:

3

ABSTRACT

INTRODUCTION This project is basically deals with search a appropriate Roommate and Paying guest.with addition to the knowledge of client personal information, professional information , its likes and dislikes , habits etc. the client can hide some of the personal details as according to its needs. BRIEF DESCRIPTION In this project we will make an online website which will deal with online searching of appropriate roommate search for paying guest. In minor project we will derive few models with different phases, to describe by different sets of attributes. Some of the page description are:       Client/user Registration/Login Page. Client/user Personal Information with Edit facility Search page Client/user requirements Advertisements of PG‟s and Roommates User request for Pg.

Thus are some basic requirements module, the whole set can be enlarge with including more phases in it. In this project we worked on .NET platform, with C# for coding.

4

LIST OF FIGURES S.NO. 1. 2.

TITLE

PAGE NO. 30 31-34

Entity relationship diagram Dataflow Diagrams 2.1 0 level DFD 2.2 1-level DFD of Login page 2.3 1-level DFD of Registration page 2.4 1-level DFD of search page

3.

Screenshots 3.1 Homepage 3.2 Search people 3.3 Registration page 3.4 Login page 3.5 About us 3.6 Help 3.7 Contact us

36-42

4

CodingShots 4.1 Master.aspx page 4.2 Master.cs page

43-44

5

7 ) Post Implementation and Maintainence Technology Used 4.NO. Project Title Introduction 2.Net Framework 4.3) C# 4.4 ) SQL Server 2008 5.2) Life Cycle 6.3) Development Phase 3.1) Microsoft .NET 4.4) Coding Phase 3.1) Requirement Analysis Phase 3. 6.6 ) Implementation Phase 3. 2. 16-22 23 24-25 26-33 .3 ) Scope 6.5 ) Testing Phase 3. 1.1) Objective 6.4) Limitations 7. 8 9-13 14-15 4.2 ) Design Phase 3. METHODOLOGY USED 3.2) ASP.1) Company Profile 3. System Design 6 TITLE PAGE NO.CONTENTS S. FEASIBILITY STUDY Introduction To Project 6.

1) Introduction 7.3) Database and attributes used 7.7.2) Steps 7. 8 9 10 11 12 SCREENSHOTS TESTING AND IMPLEMENTATIONS MAINTAINENCE CONCLUSION BIBLOGRAPHY 36-44 45-49 50 51 52 7 .5) Dataflow diagrams.4) Entity Relationship Diagrams 7.

PROJECT TITLE “ONLINE ROOMMATE SEARCH” „LIFE MAKE EASY‟ SUBMITTED TO: MRS.1. NEERAJ CHOUDHARY SUBMITTED BY: SAURAV GANGULY (06ESBCS049) HARISH KUMAR (06ESBCS017) 8 .

promises to break into the top league of service providers to a 9 . we combine a unique onsite/offshore delivery model infused by a distinct culture of customer satisfaction. consultancy. has an excellent and experience team of professionals from various background and academics. ready-to-use packaged products. with its strong technology. offers a range of solutions. Giving services to 100+ global corporate clients through a team of dedicated and highly skilled set of programmers.dzone. Having worked in vast variety of fields related to commercial. He has a vast experience of around 15 years in software analysis to development to delivery. D ZONE SOFTWARE. is premier Software. D ZONE SOFTWARES. D ZONE SOFTWARE. his innovations and vision have been the key factor in the great success Intecons enjoys by way of the client satisfaction and implementing some of the most difficult domain projects. Web Solution Services and Design Company developing leading-edge solutions. development of customized solutions for varied industries. an effective design team and custom product development expertise.co. profitability and growth. consulting and outsourcing services. Here's an idea about DZone strength categorically Promoters Mr Hemant Sexena.2. products and designs for addressing the needs of businesses . D ZONE SOFTWARE. human resource and training. kota in 1991.in INTRODUCTION DZone is a leading provider of information technology. We are perfectly poised to partner the client‟s business to new levels of efficiency. INTRODUCTION TO COMPANY www. engineering and mobile applications. graduated from Kota university.

Whether you have the full product specification or only the business idea. The company has created a niche in a very small time span and has developed solutions that are flexible. we turn your project concept into reality.wide clientele. We analyze and evaluate business requirements for our clients and design systems to help our clients in achieving their goals. We provide full-range service to Define. efficient and scalable. India promises high quality and a competitive cost advantage to its customers. We lay emphasis on designing customized software solutions. secure and increase efficiency of their business. Its development center in Jaipur. Design. which are based on the present and future business requirement of our clients. Our capabilities span both the technology and design domains. 10 . Our proven step-by-step methodology helps us maintain accurate development schedules and documentation of development. We analyze your project in order to define goals and plan a detailed roadmap to reach those goals. develop and operate the infrastructure and provide the client with maximum leverage to handle its day-today activities. Develop Deploy and support Web & Software Application projects. We develop and deliver products that enable our customers to manage. People at D ZONE SOFTWARE work to provide its customers with a single platform for all business solutions. We provide unique end-to-end solutions to our clients in a variety of markets that really work for them and help them to increase their work efficiency and reduce their costs.

Strategy of Company We operate as an integrated management system. 11 . creation and transparency Selectivity of product and producer Quest for excellence and perfection to offer the highest standards of service Exploration of the concealed energies and talents of our employee Company performance Expertise All of our team members have several years of expertise developing customized. combining quality. We are staying on pace with the fast evolving Web development capabilities.          Understanding our customers needs and requirements Meeting or exceeding our customer‟s expectations Use of a practical mix of new and proven techniques and technologies Constant development of our staff and management expertise Our commitment of the continual improvement of our processes Propensity to innovate. Flexibility We are custom-build to client specific requirements. Further. D ZONE SOFTWARE Soft has a wellmanaged staff to assist in meeting your needs. We have proven to be able to react quickly and to adjust to any changes or additions thrown at us during the course of a project. fully integrated systems in a variety of industrial standards. Technically Advanced Our Web development tools and products implement Object-Oriented design and Programming. commercial and technical disciplines into coherent approach. we use the most modern development tools and technologies available on the market today.

migration and new application development. Business Process re-engineering. web enabling of applications. Photoshop and Macromedia Studio MX. FLASH. developing Enterprise wide application (EWA). overhead and salaries. XML. we can pass on significant savings to you. Linux. These skills form the foundation of our ability to provide complete enterprise solutions to our clients ranging from legacy system maintenance.NET. Environments Our areas of expertise include web solutions. whenever needed. PHP. The Team Profile 12 . When we have your deadlines to meet we ensure the deadline is met. Ultimately. We provide solutions on a wide array of platforms such as Windows. Reasonable cost India has low operating costs and low-cost labor. Expandability For our clients' proprietary development projects. ASP. ASP. Therefore. Security D ZONE SOFTWARE. is very concerned about the project confidentiality. to keep our clients happy. Our location provides us with a rich pool of talent and low-cost environment for operating. you'll get more for your software & web Development budget. We ensure that full confidentiality of clients project is maintained while in development as well as after completion of project. Our people put in whatever work is required.Dedication Our programmers are professionals in the truest sense of the word. we tap a virtually unlimited supply of highly skilled programmers and professionals. yet India is a world technological superpower. client-server / distributed computing architectures. We focus on providing complete Resource Planning and Management solutions.

The increasing automation and integration of multifarious applications into the system also necessitates the need of a robust network underpinning so that the organization can reap the benefits fast enough and sustain the edge over its rivals. Analysts and consultants who are well qualified and experienced in their respective fields. flexible communication infrastructure. Enterprise communication needs with interests over large geographic spreads have never been completely addressed by a single connectivity solution. The team consists of qualified MCA. scalable. geographical reach. 13 . one owning the media and another owning the system/network integration skills. Our Approach & Strengths One of the prime movers of any business of today is the provisioning of a reliable.Tech and Post Graduates who share their experience and expertise to make every project a confirmed success.We have excellent team of skilled and experienced professionals. Engineers. The hurdle being reasons like affordability. downtime and limited spread of quality IT development centers locally. The Indian scene had two types of players in networking.. B. and shall always remain that way in the future. BE. Information Technology has not always been able to address the needs of SME markets. Industry Certified Engineers.

Design Phase 3. The concept includes not only forward motion but also have the possibility to return that is cycle back to an activity previously completed. The design phase is for main importance because in this activity decisions ultimately affects the success of software implementation and maintains.3. The basic WATERFALL MODEL is being used that is its stages. 1. Testing Phase 6. DEVELOPMENT The development phase includes choosing of a suitable s/w to solve the particular problem given the various facilities and the sophistication in the selected software gives a better development of the problem. The design of the system is in modular form i.) METHODLOGY USED IN WEBSITE DEVELOPMENT The general methodology in developing a system is involved in different phases which describe the system‟s life cycle model for developing software project. Requirement Analysis Phase 2. Coding Phase 5. One of the software have been analyzed and specified. Implementation Phase 7. coding generation and testing.it even leads to interfaces that reduce the complexity of the connections between modules and with that external environment. the s/w design involves three technical activities: design. Development Phase 4. The Design Phase leads to modules those exhibit independent functional characteristics . Like most systems the life cycle of the computer based system also exhibits distinct phases. Post Implementation Phase EXPLANATION OF DIFFERENT STAGES OF WATERFALL MODEL REQUIREMENT ANALYSIS This Phase includes the definition of the problem.e. These are as follows. We have to clearly know about the client‟s requirements and the objectives of the project. 14 . This cycle back or feedback may occur as a result of the failure with the system to meet a performance objective or as a result of changes in redefinition of System activities. In order to identify the problem: we have to know information about the problem the purpose of the evaluation for the problem to be known. DESIGN Software design is a process through which the requirements are translated into a representation of an s/w. the s/w is logically partitioned into components that perform specific functions and sub functions.

Which can be executed by a computer and which performs the computation specified by the design? TESTING Testing is done in various ways such as testing the algorithm.CODING The coding phase is for retranslating the design of the system produced during the design phase into code in a given programming language. programming code. sample data debugging is one. IMPLEMENTATION After testing is over project is implemented by providing training to the users and providing manuals so that they can be refreshed as and when needed POST IMPLEMENTATION If any problem occurs after the implemented they are removed from time to time so that so that the users can work on the prepared system easily finally a satisfied user when all things are almost right 15 .

Windows Vista.NET environment.NET Framework provides means to access functionality that is implemented in programs that execute outside the . The framework's Base Class Library provides a large range of features including user interface. Access to COM components is provided in the System.0 of the . who combine it with their own code to produce applications. COMMON RUNTIME ENGINE: 16 . access to other functionality is provided using the P/Invoke feature. and network communications.NET Framework is included with Windows Server 2008. databaseconnectivity.InteropServices and System.EnterpriseServices namespaces of the framework. The class library is used by programmers. memory management. The class library and the CLR together constitute the .0 The Microsoft . and Windows 7.4. Also part of the .Runtime.NET Framework is a software framework that can be installed on computers running Microsoft Windows operating systems. The CLR also provides other important services such as security.NET Framework. The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program.NET Framework. The . Version 3. numeric algorithms.NET FRAMEWORK 3.cryptography. Programs written for the . and exception handling. web application development. It includes a large library of coded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework.NET Framework is a Microsoft offering and is intended to be used by most new applications created for the Windows platform.NET Framework execute in a software environment that manages the program's runtime requirements. this runtime environment is known as the Common Language Runtime (CLR). MICROSOFT . dataaccess. PRINCIPAL DESIGN FEATURES INTEROPERABILITY: Because interaction between new and older applications is commonly required. the .

part of the Framework Class Library (FCL). Additionally. SIMPLIFIED DEVELOPMENT The . One of the most EYECATCHING things about the ASP.NET provides a common security model for all applications.NET To create dynamic web pages by using server side scripts. ASP. guaranteeing certain properties and behaviours in the areas of memory management. ASP.NET is a programming framework used to create Enterprise class of efficient information management. or CTS.The Common Language Runtime (CLR) is the virtual machine component of the . such as C#. LANGUAGE INDEPENDENCE: The . is a library of functionality available to all languages using the .NET allows you to build dynamic web pages and tailors the HTML output to whatever browser you are using.NET framework. These reduce the amount the code you have to write.NET is the way you can use any programming language based on the . It also comes with a great set of reusable. database interaction and XML document manipulation. that have been exploited by malicious software. 17 . Jscript.NET version of ASP is ASP.NET framework. SECURITY The design is meant to address some of the vulnerabilities. Because of this feature. graphic rendering.NET framework includes design features and tools that help manage the installation of computer software to ensure that it does not interfere with previously installed software. This is discussed in more detail in Microsoft .NET or VB.NET programs execute under the supervision of the CLR. such as buffer overflows. AS. All . predefined and ready to use control for your ASP. security.NET to create your web application. Microsoft has introduced ASP.NET Framework supports the exchange of instances of types between programs written in any of the .NET Framework. The CTS specification defines all possible data types and programming constructs supported by the CLR and how they may or may not interact with each other.NET. The BCL provides classes which encapsulate a number of common functions.NET projects. the . and exception handling. so you can be more productive while programming. The . including file reading and writing. and that it conforms to security requirements.NET languages. .NET Framework introduces a Common Type System. BASE CLASS LIBRARY The Base Class Library (BCL).NET Languages.

ASP script was an interpreted script and consisted unstructured code and was difficult to debug and maintain.NET? Since 1995. an architecture was needed that would allow the development of a Web application in structured and consisted way. ASP offered the efficiency of ISAPI applications along with the new level of simplicity that made it easy to understandable and use. As the web consists of many different technologies.WHY ASP. Also. the number of lines f source code in ASP applications increase the dramatically and was hard to maintain. as applications grew bigger in the size and became more complex. 18 . However. Microsoft has been constantly working to shift its focus from Window based platforms to the INTERNET. As a result. software integration for web development was complicated and required to understand many different technologies. Therefore. Microsoft introduced ASP ( Active Server Pages) in November 1996.

THE COMPONENTS OF ASP.NET APPLICATIONS 19 .

NET application by using the tools integrated with the Microsoft. The ASP.NET APPLICATION WORKING ON ASP. After creation of an ASP.NET APPLICATION We create an ASP. Finally. The Web Server forward the ASP. A web browser sends a request for an ASP.NET file from the disk or Memory.NET framework (2. which is the web Server for the Window Platform. The web Server.NET Script Engine for processing.NET files to the ASP.NET Script Engine reads the files from top to Bottom and executes any Server side Script it encounters. 3. 4.THE ARCHITECTURE OF ASP. receives the request and retrieves the appropriate ASP.NET files from top to bottom and then executes the Script.NET file to a Web Server by using Uniform Resource Locator (URL). STEPS ARE : 1. 2 .NET application the ASP.NET files need to be stored on as IIS Server.0). IIS. the results are sent to the web Browser that requested the ASP. 20 .NET file. An IIS Server process the ASP.

This architecture consists of these three components: 1. The Web Server then sends the HTML page to the client.NET file from the user who access an ASP. 7. 6 . As a result it helps to hide the code of ASP.NET SERVER 1. Simplicity 5.NET file is generated as an HTML document. Web Server (IIS) 3. Power and flexibility 4. internet explorer. The web Browser interprets the output and displays it. The basic description of how this architecture works is as described below in the diagram: CLIENT WEB BROWSER WEB SERVER IIS APPLICATION SERVER DATABASE SERVER FEATURES OF ASP. These steps are also expressed by 3-Tier client Server Architecture. and the ASP. Manageability 6. The processed ASP. Security 21 . A web server generates and sends only the HTML-OUTPUT to the client.etc. Enriched Tool Support 3.) 2. Complied code 2. Database Server. Web Browser (Netscape navigator.NET Script Engine sends the HTML page to the Web Server.5 .NET Web pages.

integrated. mature and stable platform? SQL Server is a comprehensive. audio.NET framework.NET projects  Creating web controls  Providing Web services MICROSOFT SQL SERVER 2008 Microsoft SQL Server 2008 is a relational database system that is scalable from single user database running on a single user system such as Laptop to enterprise-wide networks and global dotcom websites. SQL server 2008 is the eighth SQL Server release making a featurerich. reliable and productive platform for enterprise data applications. developer can quickly implement applications and component‟s code is managed by CLR. It can be used for a variety of applications that are supported by the . APPLICATIONS OF C# C# is a new language developed exclusively to suit the feature of . the new development platform of Microsoft for building Component based Software Solutions.C# (C SHARP) : C# is fully Object Oriented Language like JAVA. end-to-end data solution that empowers people by providing a more secure.NET platform. The SQL Server data platform includes the following tools:  Relational Database  Replication Services  Notification Services  Integration Services  Analysis Services  Reporting Services  Management Tools  Development Tools  Increase Productivity 22 . It becomes linear and safer.  Console Applications  Window Applications  Developing Windows controls  Developing ASP. including digital media formats for pictures. and it is first component oriented language. It has been designed to support the KEY feature of . SQL Server 2008 also includes support for structured and semi-structured data.NET platform. With the help of C# language. video and other multimedia data.

23 . There are 3 types of the feasibilities which are discussed here. as the software required for developing it and the software and hardware required for using it are easily available. Our system has a lot of features at a minimum cost so it is feasible to implement and it will be very much beneficial to the sellers in the reduced cost. Operationally Feasibility The proposed system is operationally feasible because it requires minimal knowledge of working with computer for using it. Therefore maintaining both the resource become easy and feasible as compared to a fully manual system which it was previously or a fully computerized system. 3. We can test our system by different type of the feasibilities. ability to meet user needs and effective use of the resources. It‟s software and hardware cost is also low then the existing system. 2. These are as follows: Technical Feasibility The proposed system is technically feasible. impact of the organization. The benefit in the form of the reduced cost. The user can easily learn to use the system from the user manual.5)FEASIBILITY STUDY Feasibility Study is a test of the system according to its workability. Economical Feasibility In this we consider following costs: 1. Since the system is partially manual and partially computerized. The cost of hardware and software for class of application being considered. The cost to conduct a full system investigation.

INTRODUCTION TO THE PROJECT SOFTWARE DEVELOPMENT LIFE CYCLE Project Initiation and Planning Requirement Analysis System Designing Coding Testing Implementation Maintenance Project Delivery 24 .6).

facebook etc.PROJECT OBJECTIVE  To get practical knowledge for preparation of websites in ASP. The advent of the net has made this possible. 25 . it is essential that one identifies personal requirements.com eliminate such problems by displaying criteriaspecific results. gmail.  To do the publicity by transfer the contacts via RSS feed by mail portal such as yahoo. It needs time. Roomate services on the internet offer different tools and features to make the search experience highly rewarding. preferences and other such criteria for roomate selection. human labor and are subject to change drastically as the technology changes . requires human labor. system manuals etc. With the world getting flatter by the day. With comprehensive search options.NET environment. Sites like RoommateWire.  To do more publicity by RSS feed. In doing so. Roomate services like RoommateWire.  Online Help: One needs to provide online help to various users so that all the features of the software can be properly understood by the user  Backup: The software requires the periodical backup. with people finding it increasingly easy to relocate to a new apartment and find a suitable roomate in no time at all. which is time consuming. people have transcended physical boundaries to look for study and work options in places they haven‟t visited before. Although a new place throws up its unique challenges. this site makes sure that only results that meet your specific requirements are displayed. PROJECT LIMITATION  Cost: It is costly as one needs to satisfy software and hardware requirements  Documentation: It is time consuming and requires expertise in creating good documentation from view point of top administrators users  Manuals: Various manuals are to be prepared such as user manuals. Roomate services such as RoommateWire. PROJECT SCOPE Roomate services are in high demand these days. one finds it very convenient to search for roomates in any part of the world.  To reduce the work efficiency to find appropriate roommate or paying guest.com offer a private mailbox and use a highly advanced search algorithm to make the search a lot more effective.com offer a marketplace where you can search for potential roomates and also post a roomate requirement ad. This helps you evaluate your options better. the time and effort taken to look for roomates is significantly reduced. Before looking for a roomate. more resources such as Hard Disk etc. The last thing you want is to end up with an inconsiderate roomate who finds it almost impossible to get along with you. one is today wellequipped to deal with them. Since these websites offer roomate services regardless of the place.

 Database Design The Database (collection of data) is at the core of any information system.  Physical design (Database design) This activity deals with the design of the physical database. It specifies the user need at a level of detail that virtually determines the information flow into and out of the system and the required data resources. Preparing security and control specification. but at the same time. In this application. Preparing a logical design walkthrough before implementation. A physical path is derived from the logical path.7). Relational structured database is used in this system. The nature of data stored in the database as well as the organization of the data has wide implications on the performance of the system. many-to-many are considered while designing the database. outputs (destination). procedures (Data Flow) and boundaries of the system are described that needs the user requirement. which may be required by the users of the system. The relationships existing among the entities like one-to-one. Databases (data stores). 26 . Steps of Design Process  Logical design (DFD) In the DFD.Net is used as server side scripting while JavaScript and HTML are used as client side scripting. It translates the system requirement into ways of operating them and focuses on the detail implementation of the system. one-to-many. which are supported by the browsers like Internet Explorer. avoid any harmful or unnecessary redundancy. coding and debugging procedure prior to conversion. A key is to determine how the access paths are to be implemented. Specifying the implementation plan. Visual Web Developer 2008 is used for coding. ASP. The design of the proposed system has gone through logical and physical design with emphasis on the following:    Preparing input/output specifications. A good database design should hold all the data.SYSTEM DESIGN AND DEVELOPMENT Introduction System Design is a transition from a user-oriented document to a document oriented to programmers or database personnel. The database should also be flexible so that any future change in requirements can be incorporated with minimum changes.  Program Design In conjunction with database design is a decision on the programming language to be used and the flowcharting. the inputs (source).

some of the tables used are almost static in nature and are already available with the standard data for the selection of the parameter values. Detailed Design Specification Complete design specification serves the following purposes: It should be able to adequately serve as training material fir new project members. The system uses database. It should serve as “Objective Evidence” that the designers and/or implementers are following through on their commitment to implement the functionality described in their requirements specifications. Once the input data is captured in the system. Although the software will take care of many aspects. 27 . Other tables are used with bi-directional role of data i. The designer will have to advise the techniques of sorting and retrieving data from these files. Design Consideration General Constraints 1. These data will generally be stored in files or databases in logical manner. the authentication and acceptance of responsibilities of the data entered still rests with the RR section In-charge. 3. The server machines must have minimum 256 MB RAM and 20 GB Hard disk.e.The data in Online Roommate Site is organized in the form of 2-D relational tables. validated and corrected. Online mutations and progress reporting cannot begin till the entire database is initially created. Manual intervention cannot be fully avoided. The performance of the software shall also depend on the hardware configuration at the implementation sites. One of the major constraints is also the heavy volume of data to be entered for creation of Master database. Design Constraints It is imperative that the RAM and storage requirements are met. Since the system requirement is manipulation of data. for both input and output. The rules of normalization have also been applied while designing the tables. 2. Different tables have been created for different type of information. Organization of data into tables allows easy categorization. retrieval and storage of data. these may have to be preserved either for a short or long period. The client machines must have minimum 128 MB RAM and 8 GB Hard disk. which is described as follows. imparting them enough information and understanding about the project implementation.

) userid password Password confirm Name Email address Other detail country state TYPE Int Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) REMARKS Auto generate no.Detailed System Design Each subsection of this section will refer to or contain a detailed description of a system software component. User id of user password of User Confirmation of user Name of user Email address of user Detail explaination of user Country of user State of User 28 . The discussion provided covers the following software component attributes:  Purpose  Input  Processing  Output  Validation Checks  Implied Requirements DATABASE AND ATTRIBUTES USED REGISTRATION PAGE FIELD NAME Id(P.K.

LOGIN PAGE userid password Varchar(50) Varchar(50) User id of user password of User SEARCH userid country Varchar(50) Varchar(50) User id of user Country of user 29 .

Entity Relationship Diagram id E Mail Password User fgbvb Registr ation Password confirm User State Name Country Other detail User Login User fgbvb Name E Mail Password E Mail Search people City People Country State 30 .

0-LEVEL DFD of website Starting Database Login Home Registra tion search 31 .

1-LEVEL DFD of login page Master page User id Login form Password Central Database 32 .

1-LEVEL DFD of Registration page Master pages User id Password Password confirm Name Email Country State City Central database 33 .

1-LEVEL DFD of Search page Master pages Search User -id Country State City 34 Central database .

35 .

With our easy roommate finder system.8)SCREEN SHOTS HOME PAGE Its a homepage of website in which we use the master page for maintain the uniqueness in project. Looking for roommate? Search all of the US for roommate with the best rooms absolutely free. 36 . find rooms or roommates that fit your needs.

SEARCH PEOPLE This page is used to search the appropriate roommate according to its desired needs and provide Best accommodation according to the user „s budget. 37 .

38 .REGISTRATION PAGE This is the registration page where user can register its detail to the database of the website at the backend.

USER LOGIN PAGE This is user login page where user can login into its account by entering its userid And password. 39 .

ABOUT US Detail about the webite .how it is helpful to the user for finding best roommate. 40 .

41 .HELP In this page of the website user can enter its query and can submit to us by which in maintenance phase we can remove the problem of the user according to its needs.

CONTACT US In this page we have given the contact details of us so that user can directly contact us for further assistance. 42 .

CODING PHASE MASTER PAGE 43 .

CS PAGE 44 .MASTER .

 Testing should begin “in the small” and progress towards “in the large”. Detailed definition of the test cases can begin as soon as the design is solidified.  Different testing techniques are appropriate at different points of time. Testing also provides a good indication of software reliability and software quality as a whole.  The Pareto principle applies to software testing. Stated simply the Pareto principle implies that 80% of all errors uncovered during testing will likely to be traceable to 20% of all program modules. A strategy approach to software testing has the generic characteristics:  Testing begins at the module level and works “outwards” towards the integration of the entire computer based system. Therefore the entire test can be planned before any code has been generated. but debugging must be accommodated in the testing strate GOALS AND OBJECTIVES Our Objective is to design test processes that systematically uncover different classes of errors and do so with minimum amount of time and effort Testing Principles The basic principles that guide software testing are:  All test cases should be traceable top customer requirements.9)TESTING AND IMPELMENTATIONS What is testing? Software testing is a critical element of the ultimate review of specification design and coding.  Test case should be planned long before testing begins. Testing plan can begin as soon as the requirement model is complete.  Testing and debugging are different activities. The most severe defects from the customer‟s point of view are those that cause the program to fail to meet its requirements. As testing progresses 45 . If the errors are uncovered they are debugged and corrected. The result of different phases of testing are evaluated and then compared with the expected results. Testing of software leads to the uncovering of errors in the software functional and performance requirements are met. The program of course is to isolate these suspect modules and to thoroughly test them. The first test planned and executed generally focus on the individual modules.

 Exhaustive testing is not possible. The number of paths permutations for even a moderately sized program is exceptionally large. 46 . For this reason it is impossible to execute every combination of path during testing. The third party has the highest probability of finding the errors.testing shifts focus in an attempt to find errors in integrating clusters of modules and ultimately in the entire system. It is possible however to ensure that all conditions in the procedural design have been exercised  To be most effective an independent third party should conduct testing.

Approaches used for Unit Testing were:  Functional Test: Each part of the code was tested individually and the panels were tested individually on all platforms to see if they are working properly. so that the required functionality is met and previous functionality of the system is also not broken to do this. 1. A stub serves to replace the modules that are subordinate to the modules to be tested. it has to have passed through a test cases suit.Test Case Before the project is released. A pictorial representation of this can be shown as follows. prints verification of entry and returns.  Stress Test: A lot of test files were made to work at the same time in order to check how much workloads can the unit bear. The unit testing is normally considered as an adjunct step to coding step. New Test Case Existing Test Case Software Under Testing Output Comparator Result of Testing Following types of testing are done on the System. Unit Testing The module interface is tested to ensure that information properly flows into and out of the program unit under test. Because modules are not a standalone program. response time given by the module. drivers and/or stubs software must be developed for each unit. 47 .  Performance Test: These determined the amount of execution time spent on various parts of units and the resulting throughput. there is existing test cases which checks for the previous functionality. New test cases are prepared and added to this existing test suit to check for the added functionality. A driver is nothing more than a “main program” that accepts test cases data and passes it to the module. A stub may do minimal data manipulation.

3.e. The poorly understood mental process that connects a symptom to cause is debugging. modules at the lowest level of the program structure. processing required for the modules subordinate to a given level is always available and the need of stubs is eliminated. 48 . corrected and then removed or  The cause will not be found. Integration Testing “If they all work individually.  Bottom up integration: It begins with construction and testing with atomic modules i. Beta test is conducted at one or more customer site by software end user.  Configuration review: Ensures that all the elements of software configuration have been properly developed cataloged and have support for the maintenance phase of software life cycle. they should work when we put them together.2. Validation Testing Validation succeeds when software functions in a manner that can be reasonably expected by the customer. design a test case to help validate his suspicion. and then work towards the correction of errors in the interactive fashion.” The problem of course is “putting them together “. Because modules are integrated from the bottom up. when a test case uncovers an error. In the latter case the person performing debugging may suspect a cause.e.  Alpha Beta testing: Alpha test is conducted by developer‟s site by customer. This can be done in two ways:  Top down integration: Modules are integrated by moving downwards through the control hierarchy. This process will always have one of the two outcomes:  The cause will be found. Debugging Debugging occurs as a consequence of successful testing i. debugging is the process that results in the removal of error. It covers the following: Validation test criteria: Performance. beginning with main control module are incorporated into the structure in either a depth first or breadth first manner. functional characteristics and uncovered deviation from specification.

what we could do better and what areas you would like to see in this software and any other words of wisdom you are willing to pass our way. As you are the user of this Software.  Shortcut keys to menu option can be added. which we could not have covered.Scope of Future Enhancements  Extra menu options can be added according to requirement. There can be even some bugs. you are our most important critic and commentator. 49 . We please people to let us know the bugs and enhancement required.  Help option can be added. We will be highly obliged by the people who have made suggestion and helped us to know the uncovered bugs in the software. We value your opinion and want to know what we are doing right.

government policies. data processing errors and system performance errors. coding errors. there is a kind of ripple effect from the location of modification to the other parts of the software. or restructuring the software to improve changeability. The primary feature affecting the ripple effect is stability. it may affect the other parts also. The ease of understanding the program is primarily affected by complexity and documentation of the program. Perfective Maintenance It means improving processing efficiency or performances.10)MAINTAINENCE Categories Corrective Maintenance It means modifications made to the software to correct the defects. E. Environment refers to the totality of all conditions and influences which act from outside upon the software. Defects can result from design errors.  Generate particular maintenance proposal: The ease of generating the maintenance proposal is primarily affected by extensibility of the program. Thus. logic errors. Process The process of maintenance for given software can be divided into four stages as follows:  Program understanding: It consists of analyzing the program in order to understand it.g. work patterns and software/hardware operating platforms.  Account for ripple effect: If any change is made to any part of the system. Adaptive Maintenance It includes modifying the software to match changes in the ever-changing environment. 50 .  Modified program testing: The modified program is to be tested again and again to check that the software has enhanced and reliability is validated. business rules.

retrieval of information is fast. Report generation in PDF as well as in Microsoft word. For use of various modules based on customer details. can be upgraded as per the requirements. For better management of receipt and revenue resources. All the predefined project objectives have been achieved with development of billing software such as: To automate the Work order sheet activity of all the customers for various services. Reviews are being conducted periodically. inputs. Inevitably. Stored information has been indexed. The following objectives have been achieved with the development of billing software: Generalized and comprehensive software package: It is user friendly. Supporting utility: It provides continuous support to users. has good documentation Integrated with multi-user capability: It serves large user community. is compatible. bill payments.11)Conclusion This software will be used for “SEARCH OF APPROPRIATE ROOMMATE”. More precisely it will be used to automate various functions in any Clear Edge Filtration branch in whole world. Menu driven: It has been designed with Visual Studio as front end. easy to use. All input/output screens have been put in their corresponding menus and submenus. No software package can meet all requirements of a given RR section. outputs. It will be used as management tool for various activities in the Clear Edge Filtration. Modularized approach: It has been developed using modular approach. report formats. by doing that. other problems could arise. To avoid maintenance of registers such as new entry. thus. which serves as one of the best software for creation of forms. eliminating bypass of even a minor requirement of user. thus. Customization takes lots of time. The functions that will be covered by this software are maintaining user details. Various software guides and directories have been attached with the software. modification etc. 51 . bill generation. Finally. some compromises will be needed in workflows. these main modules are combined with the overall project. This menu-driven approach adds value to the software. Sub-modules are designed and integrated with main module. flexible.

com 52 . 3.0 Websites:- - Walther and Stephen Wrox Publications Wrox Publications  www. 2.dotnetspiders.codeproject. 4.java2s. NET 2. NET 2.net  www.com  www.12)Bibliography 1.NET Professional ASP.0 Beginning ASP.asp. Unleashed ASP .com  www.

53 .

Sign up to vote on this title
UsefulNot useful