You are on page 1of 90

Project report On Online Shopping Website

At As a Partial Fulfillment of the degree of ³Masters in Computer Application´ For the year 2010-11

Table of Content
Sr. No.
1 2 3 4

Certificate Acknowledge Project Profile Organization Profile

Page No.
002 006 007 010

Part ± I Online Shopping Website
5 CH ± 1 Introduction 1. Project Summary 2. Purpose 3. Scope CH ± 2 Project Management 1. Project Planning and Scheduling 2. Risk Management CH ± 3 System Analysis 1. Study of Current System 2. feasibility Study 3. System Requirements 4. Requirements Validation CH ± 4 Technology Used CH ± 4 System Design 1. Design Approach 2. UML Diagrams 3. Class Diagram 4. Data Dictionary CH ± 5 Implementation Detail 1. Program/Module Specification 2. Implementation Result CH ± 6 Testing 1. Testing 2. Testing Plan 3. Testing Method 4. Test Cases CH ± 7 User Manual 014 016 016


017 019


022 025 023 026 028 046 056 066 067

8 9


071 074


075 077 077 081 086



It gives me great pleasure in placing in the hands of my esteemed Faculties this individual report which, we believe, will go through the documentation of the project work done by me. The objective of this report is to provide both a conceptual understanding of the system as well as working guide. Surely no other technology as Information Technology is proven as the driving force of the Nation. I.T. not only decides the present but also the future. The need for website development today is a competence in a G.U.I based front-end tool as far as the database programming is concerned. A typical scenario today involves an application consisting of a visual front end for presenting data options to the enterprise users, and a connection to a database for piping data to controls such as text boxes, tables, and list boxes. These applications typically feature reporting functions to provide documentation to teachers and administrative. As a student of MCA when we acquire all the theoretical knowledge, it is both necessary and advisable to acquaint the students with the real situation through, well-planned project in relevant fields. Using all the theoretical knowledge and applying into the real application the student learns to develop efficient real world application at the time of project training. So, the project training is very important for the student for self-development and self-confident. Also student learns organizational structure, rules and regulations and management in a real sense, which helps student to get discipline in life. Aimed for providing the reader with easier and in-depth knowledge of all the basic as well as important aspects related to the systems having the functionality's of their respective fields in form of report. The report contains the literature of almost all the things, which I have gone through from the point of view of any system development life cycle. Moreover I have found DBMS/RDBMS to be the most exciting environment to work with, especially when the G.U.I Tool like Visual studio ( 3.5 with C#. A Master of Computer Applications (MCA) is a three year full time course. It covers various topics associated with the area of computer science. In the fourth semester students have to develop a project. During a project on ³Online Shopping (Readymade Garments)´ for ³Shree Jaysukhalal Vadher Institute of Management Studies, Jamnagar´. An effort has been made to exhaustively deal with every part of the website developed and at the appropriate position, so that a user can easily maintain the Record and all the information.


This project work has been the most practical and exciting part of my learning experience. We are deeply thankful to Mr. Pavan Jain for providing us the project information from HCL CDC PVT. who was a constant source of inspiration not only during this project. Proper organization of concept and analysis of the system is due to keen interest and helping hand of my teachers and colleagues. No Portal is created entirely by an individual. We are sincere thanks to Mr. spent in pursuing our MCA degree at our college. Shyama Bhattacharya. We are also greatly thankful to the entire HCL Career Development Centre Members and our college faculty who have helped us in completion of this project directly or indirectly.(Head of Department). We are thankful to Mr. we was studying in all these two years. which would be an asset for me for my future carrier. Our most sincere thanks to our Project Guide Mr. encouraging and motivating us throughout the Project.(Training & Placement Officer) who are moldings our thoughts and vision towards all the subjects. ----------. but also in the last two years. INTRODUCTION OF COMPANY . -------. Many people have helped to create this website and each of their contribution has been valuable. LTD. for his kind cooperation and who has always been guiding.

Laptops. 1. Customer Satisfaction holds top priority. Ltd is a fast growing Information Technology company. Mr. what we now know as.3rd Floor.1. We pay a great deal of attention to our customer¶s needs and what is good for them. Scanners. Modular Furniture Repairs Maintenance and Services Annual Maintenance Contracts Computer Stationery ± CD and Floppy media. Near Nehru Bridge. Printers.LTD.HCL CDC Pvt. We make it work for them. All in ones Networking ± Consulting ± All types of LAN/WAN cabling including site preparation Site Preparation. Ashram Road. at HCL CDC PVT. Work stations Peripherals ± Modems. Servers.Ltd. Cartridges y Authorized OF IBM / Lenovo Compaq-HP Wipro . 1.1. Pawan Jain µShalin Building¶. Ahmedabad-380 015 079-26565103/4/9 info@hclcdc.2 TECHNICAL SKILS y Computer Hardware Computers ± Desktop PCs. fast. For us. Printer. a reliable. It is the key factor for transforming the world into. cost-effective and top of the line sales and services of computer becomes y y Phone :Email :- ³INFORMATION TECHNOLGY´ has emerged as a bubbling and a progressive field since the last decade. making the sharing of knowledge and information just a click away. playing its part in transforming the way the world does business. When it comes to computing. We offer the best and the most appropriate solutions to our clients and customers. ³A Global Village´. Computers and Information Technology is soon to be a part-and-parcel of our daily lives.1 Company Profile y y y Name : Contact Person :Address :HCL CDC Pvt.

Novell. Linux.` software and networking in various co-operative banks. billing financial accounting. UNIX. as per customer requirements. Customized software solutions for office automation.HCL ACER y Computer Software Standard software packages and products like Microsoft. We have also handled the maintenance of computer hardware. Adobe. Customized software solutions for Income Tax Dept. Customized software solutions for Central Excise (Service Tax Division) as per their requirements. signature verification. etc. Macromedia. Chennai. y Maintenance We have been handling the maintenance of Computers of CCIT Ahmedabad Charge including Bangalore. etc. Training ± We provide corporate training at various places thereby helping our customers to learn the know-how of different software programs. Web hosting. inventory. Rajkot and Baroda since the last 5 years. Web Designing and Web enabled applications. We are providing Facility Management Services (On Site Hardware/Software Engineer) for daily Support y Miscellaneous Data Entry ± We provide man-power to perform data entry operations at various places including Excise Dept. consulting and maintenance of web sites. for their different requirements. .

Keeping in view of the potential for webbased shopping process. Shopping cart. The administrator functional areas include the Category Master. place order. The given problem statement for the project has been completely analyzed and the objectives have been set for the project. Product Master. User Login. The function include the product Catalog. . Sub Category Master. The ³gkstools. the online shopping system for the web has been designed to perform all possible important functions. Special Offers.Project Profile Online Shopping Site: (Website) This material for the report of ³online Shopping (´ gives a detailed idea about analysis and design of the project. customer services and other facilities for the web´ is an E-Commerce application. Customer Login And Registration. User Master.

Introduction Project Management System Analysis System Design Implementation Details Testing Screen Shots . 3. 6. 4. 5.Online Shopping Website 1. 2. 7.

Creating the Code Strategy for Business Logic and designing Structure of this Website. And it will also give the facility to print out this bill or report. Product Price. Product image. Product ID. and other important detail about the Product. o In this site the customer is also show your cart by clicking on the view cart. o Finally the Customer is checkout then it will generate the Bill report for the user in which it displays all the information about the Purchase. Scope 1.1. In the view cart the customer is show the product ID.1 PROJECT SUMMARY y y Also the concept of Business-to-Business and business-to-customer to find out the target people for the specific product.  In the cart Detail is stored the Detail about the product like Category ID. Product Shipping Charge. Then the customer will click on the check out then it must be the registered will us. delete the product in the cart. o In the shopping Cart the Any Customer can add. . And it will check out. o If any customers have any kind of inquiry then it will send the inquiry to the owner. ± INTRODUCTION 1. For this I have designed the inquiry page in this page the customer is write its inquiry and press the submit. Project Summary 2. Purpose 3. o In this site the cart is maintain with the help of two table like Cart Master and Cart Detail:  In the cart master is store the customer detail. And customer also Change the number of quantity of the product in the cart. For this customer registration facility is available. Then the customer is press the submit then the customer query is directly Emailed to the Owner mail address. Product Price and Shipping Charge and quantity of product. Total amount and shipping charge information. Subcategory ID . The customer is also increase or decrease the quantity.

Entire Website is fully dynamically. The entire product. All the product is categorized with the category ID and Subcategory ID.  In the Category Entry the Owner is Enter or stored the Value of different types of Product Category. add. Product Entry.  User entry is used to handle the control panel of the website. etc. and previous button. It will Change any product in Control Panel. shipping charge.  In the subcategory Entry the owner is Enter or store the value of different types of Subcategory in different Category wise.  In the Product Entry the Owner is Stored the all the information about the product like Product ID. If the user is registered or authorized with us then and then it will allow to login the control panel and change the any product.  In the Control panel all the pages have a facility to navigate the record with the help of first. Price. User Entry. Special Offer Entry. And it will also provide the facility to directly find the any record. Image. last. next. or delete the product on the website. Product Name. Subcategory Entry. He can not need to call any other to change. Menu is display dynamically.y y All the Products Details of this site is authorized by the Owner. It is useful for owner.  In the Special Offer Entry is used for any kind of special offer available in the product. . for the Product image we create the upload image with the help of this the owner itself upload the product image and it will display on the website. It¶s description. o The entire website is updated through the control panel of this website. Which product is stored in the Special Offer entry it Display on the Home page of the website. In the Control Panel of this website have different pages like Category entry.

2 Provide administrator module for database handling. 1.3 SCOPE The trend in the organization in to use E-Commerce as path towards global market. Many organizations provide online shopping. Online shopping website provides these kinds of basic components that can be reused and can tailor to the requirement of the organization.2 PURPOSE The objective of the system is t provide generic trading system that contains the basic functionality of any Business to customer and business to business online shopping website. The basic functionality remains common for this kind of shopping so it is very beneficial to develop reusable pieces of software solution that can provide this basic functionality.1 Provide online Product selling 1.2.2. 1. The provides the reusable software components that can be used by any client for rapid application development and encouraging reuse of pre-developed system pieces rather than building from scratch.3 Other 1. . This kind of component based Application development provides rapid application development of complex system. Component based development also provides better scalability and maintainability.1.2.

2.2.1 Project Planning and Scheduling 2.1 Project Development Approach This project is given to me by company to fulfill the client¶s requirement.2.1 Project Development Approach 2.2 Project Planning 2. .1.3 Risk Planning 2.Project management 2.1 Risk Identification 2.1. Our client wants to develop the website that can provide facility to their customer to buy the product online.3 Schedule Representation 2. Now-a-days EBusiness and online Shopping is very growing industry.2 Risk Management 2. Like this various other features can be executed with the minimum efforts and accordingly database design has been setup for this website.2 .2 Risk Analysis 2. So everybody wants that his business is becomes global and worldwide.1 Project Planning and Scheduling 2. The user can also show the full description about the product and also it is place order. For the website an extra-ordinary and attractive look is very much necessary for attract the new customer and second thing is very goof functionalities. The user can easily find the product through the category and subcategory wise.1. .1. and pay the bill online.

This strategy is often referred to as process model or a software engineering paradigm. A process model for software engineering chosen based on the nature of the project and application. Then the whole project is divided in to modules and according to that modules the development work has been done. software engineer or a team of engineers must incorporate a development strategy that encompasses the process. the method and tools to be used.2 Project Planning ³Software Project scheduling is an activity that distributes estimated efforts across the planned duration by allocating the efforts to specific software engineering tasks. and the controls and deliverables are required.Software process model To solve actual problems in industry setting. Also the requirements are examined from different aspects of the developments requirements. 2.´ For this project. we have collected the project requirements from client. The DDs are designed according to the requirements.1. For each module.3 Schedule representation . 2. methods and tools layers and generic phases. the designs have been developed and then it is implemented.1.

If in the software the wrong user is authorized by mistake then he may do changes that cause the system in dangerous mode. or assessing. Risks are about events that. when triggered.  Mapping out the following: the scope of the exercise.2 Risk Analysis: Once risks have been identified. The relative probability of a disaster occurring should be determined.2. risk and developing strategies to manage it. they must then be assessed as to their potential severity of loss and to the probability of occurrence. reducing the negative effect of the risk. 2. Here by the first risk can occur because of the less of communication with all branches of Apollo for .1 Risk Identification: After establishing the context. Step in the risk management process establishing the context involves  Planning the remainder of the process. Traditional risk management focuses on risks stemming from physical or legal causes (e. accidents. the goals of the business recovery planning are to ensure the safety of customers. risk identification can start with the source of problems. Financial risk management.  Defining a framework for the process and an agenda for the Identification. cause problems.2 Risk Management: Risk management is the process of measuring. 2. In ideal risk management.2.2. In this project there can be following risks: The order risk is associated with the software. There can be risk of natural threats. employees and other personal during the following a disaster. Hence. focuses on risk that can be managed using traded financial instruments. Strategies include transferring the risk to another party avoiding the risk. and risk with lower probability of occurrence and lower loss are handled later. a prioritization process is followed whereby the risks with lower probability of occurring are handled first.  Developing an analysis of risk involved in the process.g. the next step in the process of managing risk is to identify potential risks. death and lawsuits). natural disaster or fires. Regardless of the type of threat. on the other hand. possible threats that could arise inside and outside the organization need to be assessed. Regardless of the prevention techniques employed. or with the problem itself. the identity and objectives of stakeholders and the basis upon which risks will be evaluated. and accepting some or all of the consequences of a particular risk.

Once the potential areas of high exposure to the organization are identify. archival systems.g. internal fire. external fire etc. and ventilation. The attitude of senior management toward security and prevention should permeate the entire organization. For example. and that branch needs some additional functionality of the software. If by mistake any person threat Administrator password then he can change the data in software and can leak information. internal flooding. fire detection and extinguishing system.A.S. It includes special requirement for building construction. 2. . Procedural prevention begins with assigning responsibility for overall security of the organization to an individual with adequate competence and authority to meet the challenges. vault storage area(s). additional preventative measures can be considered for implementation. Special considerations include: computer area. records protection. management¶s support of disaster planning can focus attention on good security and prevention techniques and better prepare the organization for unwelcome and unwanted. Disaster prevention techniques include two categories  Procedural prevention  Physical prevention Procedural prevention relates to activities performed on a day-to-day. the company may not have interacted with the branch of Apollo in U.3 Disaster Prevention: Because a goal of business recovery planning is to ensure the safety of personnel and assets during the following a disaster. relating to security and recovery. a critical aspect of the risk analysis process is to identify the preparedness and preventive measures in place at any point in time. Same thing occurs if the wrong user is authorized. heating. air conditioning. Physical prevention and preparedness for disaster beings when a site is constructed.requirement fulfillment. External flooding. Therefore. The software may be in problem by natural threat e. electrical supply and UPS system. Disaster prevention and preparedness begins at the top of organization. as well as fire protection for various equipment components. or annual basis. emergency procedures.2. The objective of procedural prevention is to define activities necessary to prevent various types of disasters and ensure that these activities are performed regularly. month-tomonth.

Some of them may involve tread-offs that are not acceptable to the organization or a person making the risk management decisions. By developing in iteration.4 Risk Planning: Once risks have been identified and assessed. not entering a business to avoid the risk of loss also avoid the possibility of earning profits. sometimes as little as one week is allocated to an iteration. but avoiding risk also means losing out on the potential gain that accepting (retaining) the risk may have allowed.2.6 Risk reduction: Involves methods that reduce the severity of the loss. software project can limit effort wasted to a single iteration. but the cost may be prohibitive as a strategy.2. Hal on fire suppression systems may mitigate that risk.5 Risk avoidance: Includes not performing an activity that could carry risk. Modern software development methodologies reduce risk by developing and delivering software incrementally. 2. This method may cause a greater loss by water damage and therefore may not be suitable. Avoidance may seem the answer to all risk. An example would be not buying a property or business in order to not take on the liability that comes with it.2. all techniques to manage the risk fall into one or more of these four major categories: y Tolerate (retention) y Treat (mitigation) y Terminate (elimination) y Transfer (buying insure) Ideal use of these strategies may not be possible.2. spearheaded by the extreme programming community. A current trend in software development. 2. is to reduce the size of iteration to the smallest size possible. Another would be not flying in order to not to take the risk that the airplanes was to be hijacked. . any problems encountered in earlier phases meant costly rework and often jeopardized the whole project. Early methodologies suffered from the fact that they only delivered software in the final phase of development. Examples include sprinklers designed to put out a fire to reduce the risk of loss by fire.

 To provide facility for if product not found then give detail of this product to admin.2 Objective A key objective of this system is that it consolidates the data in one central location. Customer has to pay somewhat more also. visa card etc. Drawback of current system Since the ordering of the products is done offline currently it is time consuming.3 Current Scenario Currently the system is static so the customer can just see the product online but they can¶t order it. 1. . 1.  To shopping via Internet and online.  Customer can also pay for the purchased Product.  Customer can see all the items which available in the shop.  It is save the time of the customer. Customer has to do it manually and payment is also manually done. The selected products are displayed in a tabular format and the user can order their products online through credit card Payment. . The online order management system will provide such a facility for ordering any product so that he can easily get the product and also can inquiry online. So we are trying to make it dynamic and we will replace the current ordering system to the latest technology.4 Proposed solution The system will be made such that the customer can order the product online and payment of that can also be done online through credit card.System Analysis 1. Admin best try for provide that product.3 . This will enable easy management of all information and ensure data integrity across the entire breadth of the system. And it is also very useful to customers because it saves their time and money.  Customer has no need to gone for a shopping in outside the home. The main objective of the project is to create a system that allows users to order the product based on name of that product. So the new system will save time and money of the customer. And get the full detail information about the particular product.

1 Scope 1. I am able to complete the project within specified time. ease of access. The system can also produce its required output. a feasibility study determines whether the ideas make sense. A feasibility study is designed to provide an over view of the primary issues related to a business idea.  The system should provide the facility for inquiry if the customer has any query. Feasibility study provides a lot of information necessary for the business plan.  The system should provide facility for online payment.  This system should provide facility to register online for online ordering. reliability. regardless of the number or locations of the users. Economical Feasibility: . as well as they need MS access to store the data related to products and customers. and data security. 1. The purpose is to identify any ³make or break´ issues that would prevent your business from being successful in the market place. This system can be easily supported by the hardware and software requirements of any system.2 Feasibility Study A feasibility study is carried out to select the best system that meets performance requirements. The proposed system must provide adequate responses to inquires.1. For example a good market is necessary in order to determine the project¶s feasibility. and for more of their work related activity. Technical Feasibility The system will be hosted on the internet so company need internet connection in that organization.1.  This System should be able to generate customer related report. This information provides the basis for the market section of the business plan. There must be technical guarantees of accuracy.5 Preliminary Analysis  Due to Internet access customers uses Internet more and more for their shopping needs.Net Framework must be installed at application server. System can be accessed by any platform no concern with open source community or Microsoft Technology. They also save time and money by doing so. only thing needed is that . In other words.1.

It needs the server which can run this system which is already company has. can run easily without any maintenance at this point of time. The development cost of the project is not much higher. Behavioral Feasibility: Proposed system will behave according to the requirement made or not. Time consuming processes are possible to run on this environment or not it is also important. The hardware requirement of the system is at least a PC for an administrator to handle the site from admin panel. then it might need some changes in handling of the application and might require some optimization so that application runs faster and retrieves data faster. the benefits obtain from the system has to be related against the cost incurred to actually develop the system because the software which are used here is already owned by the company. accessibility of information. Operational feasibility has been considered from the user¶s point of view.Economical feasibility addresses to the following issues: software resource requirement of the proposed system is . For declaring that the system is economically feasible. It provides easy user interface.0 and MS Access that are already owned by the organization and do not require additional Investment. the database might need some clean up after some period of time. This application once deployed. After the inclusion of database in future. 1. Responses time of the system must be noticed because it is a web based system whether it takes too much time to response or give quick response or response in the specific period of time this consideration is most important. If the database size becomes large. client acceptance and efficient solutions to the queries of the user.NET Framework 2. Operational Feasibility: The proposed system will meet the operational requirements like system Performance. user can operate this application easily.6 System Requirements Hardware Configuration: . If user has some basic knowledge of Internet.

1) To provide the facility to register a new customer. Server Configuration: Standard Pentium series processor.  Client Configuration: Any computer system with normal speed. Internet Connectivity Software Requirements:  Server Software: Visual Studio . Flash. . 2) Retrieval of the stored data according to the user needs. 3) Delete of stored information of outdated products which are out of market and customer needs.0+. HDD storage capacity of 360GB with 5400 rpm or more. System Requirement Study: The requirements can be classified as below.0) Windows 2000 or higher OS.0+. Minimum 4 MB RAM. Functional Requirements:  DATABASE FUNCTION 1) Inserting the product and customer information. IE 6.Net 2005 (Frame work 2.Fire fox 2.  Client Software: VGA or higher resolution monitor.  SYSTEM FUNCTIONS Main features of the system are as follows. 1) Functional requirements. 2) Non-functional requirements. 4) Updating the stored information according to the changes in products change and customer information.

add product. 4) To provide facility to customer to see account.2) To provide the facility to customer to add product to cart. There is wide use of images low range of RAM is little inconvenient to make it faster. and also to provide the facility to calculate total price. edit credit card detail. voting card. 6) To provide the facility to customer for the inquiry of product. 3) To provide the facility to conform order and shipping.. For example for running the system not any extra hardware is required. Social security number. 5) To provide facility to administrator to add customer.  In credit card validation. edit bill info. Constraints:  Payment through e-check/DD needs gateway services as of high cost.  Portability The system must be platform independent. network independent. PAN card etc.  The Customer must have some ID like passport. and hardware independent. add category. edit account. To get result very fast and appropriate it needs to have high speed of RAM. remove product from cart. edit credit card info. all the visa card. Non Functional Requirements:  Efficiency The system must provide easy and fast access without consuming time and resources. The system should be available whenever user demanding for the service.  Reliability User should never be surprised by the behavior of the system and it should also provide meaningful feedback when occur and provide context sensitive user help facility so that user can recover from the errors.  The user has to agree with the policies of the retailer. edit ship info. master card and American express card provided primary level validation but secondary level validation is of high cost. View daily order. change password. 4 .Technology Used .

 Introduction to . and mobile applications.NET is a complete set of development tools for building ASP Web applications.NET Enterprise Servers .NET. desktop applications. these languages leverage the functionality of the .NET Framework Windows The Internal Web Service . which allows them to share tools and facilitates in the creation of mixedlanguage solutions.NET Framework.NET.NET Visual Studio . and Visual C# . XML Web services.NET Foundation Web Services Third-Party Web Services . which provides access to key technologies that simplify the development of ASP Web applications and XML Web services. Clients Applications Web Form Web Service . Visual C++ . Visual Basic .NET all use the same integrated development environment (IDE). In addition.

while also enforcing strict type safety and other forms of code accuracy that promote security and robustness. ASP. You can think of the runtime as an agent that manages code at execution time.NET hosts the runtime to provide a scalable. the concept of code management is a fundamental principle of the runtime. In fact.NET works directly with the runtime to enable ASP. while code that does not target the runtime is known as unmanaged code. such as Web Forms and XML Web services. thereby creating a software environment that can exploit both managed and unmanaged features. and remoting. To provide a code-execution environment that promotes safe execution of code.NET.NET applications and XML Web services.NET Framework. To provide a code-execution environment that minimizes software deployment and versioning conflicts.NET Framework can be hosted by unmanaged components that load the common language runtime into their processes and initiate the execution of managed code. including code created by an unknown or semi-trusted third party. or executed remotely.NET Framework has two main components: the common language runtime and the . executed locally but Internet-distributed. providing core services such as memory management. To make the developer experience consistent across widely varying types of applications. Code that targets the runtime is known as managed code. server-side environment for managed code. such as Windows-based applications and Web-based applications. but also supports the development of third-party runtime hosts.The . The . The .NET Framework is designed to fulfill the following objectives: y y y y y y To provide a consistent object-oriented programming environment whether object code is stored and executed locally. thread management. To provide a code-execution environment that eliminates the performance problems of scripted or interpreted environments.NET Framework can integrate with any other code. To build all communication on industry standards to ensure that code based on the .NET Framework. The common language runtime is the foundation of the . The class library.NET Framework is an integral Windows component that supports building and running the next generation of applications and XML Web services. both of which are discussed later in this topic. the other main component of the . is a comprehensive. The . ASP. For example. object-oriented collection of reusable types that you can use to develop applications ranging from traditional command-line or graphical user interface (GUI) applications to applications based on the latest innovations provided by ASP. The . .NET Framework class library.NET Framework not only provides several runtime hosts.

Using Internet Explorer to host the runtime enables you to embed managed components or Windows Forms controls in HTML documents. The following illustration shows the relationship of the common language runtime and the class library to your applications and to the overall system.NET Framework in greater detail.Internet Explorer is an example of an unmanaged application that hosts the runtime (in the form of a MIME type extension).NET Framework in context The following sections describe the main components and features of the . . The illustration also shows how managed code operates within a larger architecture. Hosting the runtime in this way makes managed mobile code (similar to Microsoft® ActiveX® controls) possible. but with significant improvements that only managed code can offer. . such as semitrusted execution and isolated file storage.

For example. For example. managed code is never interpreted. or local computer). managed components are awarded varying degrees of trust. file system. The various Microsoft and third-party language compilers generate managed code that conforms to the CTS. Language compilers that target the . For example. Interoperability between managed and unmanaged code enables developers to continue to use necessary COM components and DLLs. The runtime also accelerates developer productivity. Any compiler vendor who chooses to target the runtime can do so. depending on a number of factors that include their origin (such as the Internet. code execution. This automatic memory management resolves the two most common application errors. while strictly enforcing type fidelity and type safety. and components written in other languages by other developers. Although the common language runtime provides many standard runtime services. releasing them when they are no longer being used. enterprise network.NET Framework make the features of the .Features of the Common Language Runtime (CLR) The common language runtime manages memory. yet take full advantage of the runtime. and other system services. or other sensitive functions. The runtime also enforces code robustness by implementing a strict type-and-codeverification infrastructure called the common type system (CTS). compilation. but cannot access their personal data. thread execution. even if it is being used in the same active application. While the runtime is designed for the software of the future. it also supports software of today and yesterday. A feature . In addition. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally feature rich. This means that a managed component might or might not be able to perform file-access operations. This means that managed code can consume other managed types and instances. With regards to security. The CTS ensures that all managed code is self-describing. greatly easing the migration process for existing applications. code safety verification. or network. memory leaks and invalid memory references. the class library. the managed environment of the runtime eliminates many common software issues. registry-access operations. The runtime enforces code access security. programmers can write applications in their development language of choice. These features are intrinsic to the managed code that runs on the common language runtime.NET Framework available to existing code written in that language. the runtime automatically handles object layout and manages references to objects. users can trust that an executable embedded in a Web page can play an animation on screen or sing a song. The runtime is designed to enhance performance.

NetLanguage VB 2005 Compiler (vbc. while still enjoying the superior performance of the industry's best enterprise servers that support runtime hosting. Compilation Process of . the runtime can be hosted by high-performance. This infrastructure enables you to use managed code to write your business logic. such as Microsoft® SQL ServerŒ and Internet Information Services (IIS).called just-in-time (JIT) compiling enables all managed code to run in the native machine language of the system on which it is executing.Net Technology Source Code in VB 2005 Source Code in C# Source Code in Another .NET .exe) C# Compiler (csc. server-side applications.exe) Appropriate Compiler DLL or EXE file in IL (intermediate language code) JIT (just-in-time compiler) Native Machine Code Execute Figure 2 Language Compilation in . the memory manager removes the possibilities of fragmented memory and increases memory locality-of-reference to further increase performance. Finally. Meanwhile.

third-party components can integrate seamlessly with classes in the . In addition. and file access. or placed in an ADO. Windows services. executing commands. Your collection classes will blend seamlessly with the classes in the .NET Framework data providers for connecting to a database. Data-sharing consumer applications can use ADO.NET applications.NET ADO. Accessing data with ADO. providing types from which your own managed code can derive functionality. but also reduces the time associated with learning new features of the . Windows GUI applications (Windows Forms). including tasks such as string management.NET Framework to develop the following types of applications and services: y y y y y Console applications.NET Framework Class Library The . you can use the Web Forms classes.NET Framework. the Windows Forms classes are a comprehensive set of reusable types that vastly simplify Windows GUI development. For example.NET Framework types enable you to accomplish a range of common programming tasks.NET cleanly factors data access from data manipulation into discrete components that can be used separately or in tandem.NET Framework class library is a collection of reusable types that tightly integrate with the common language runtime.NET to connect to these data sources and retrieve. For example. and update data.NET Framework types easy to use.. The . If you write an ASP.NET Framework collection classes implement a set of interfaces that you can use to develop your own collection classes.NET Dataset object in order to be exposed to the user in an ad-hoc manner. data collection. the .NET Framework.NET Web Form application. The class library is object oriented. In addition to these common tasks. the . manipulate. ASP. Those results are either processed directly.NET Framework. This not only makes the . you can use the .NET includes . ADO. As you would expect from an object-oriented class library. the class library includes types that support a variety of specialized development scenarios. XML Web services.NET provides consistent access to data sources such as Microsoft SQL Server. For example. database connectivity. as well as data sources exposed through OLE DB and XML. and retrieving results. ADO. combined with data from multiple sources. or remote between tiers.

NET that accomplish this: the Dataset. The ADO. You can write .NET Framework Data Provider for SQL Server and the . and DataAdapter objects.NET Framework data provider. ADO.NET Framework ships with two .NET architecture . and are integrated with the XML classes found in System. The DataAdapter uses Command objects to execute SQL commands at the data source to both load the DataSet with data. ADO.NET Dataset object can also be used independently of a .NET Framework data providers: the . run stored procedures. as well as primary key.Data.NET architecture.dll. whose components is explicitly designed for data manipulation and fast. The . and send or retrieve parameter information. When compiling code that uses the System.Data namespace.dll and System.NET Dataset is the core component of the disconnected architecture of ADO. The Connection object provides connectivity to a data source.NET Components The ADO. DataReader.NET components have been designed to factor data access from data manipulation. forward-only. modify data.dll.NET Framework data providers for any data source. Command. As a result it can be used with multiple and differing data sources.dll. and reconcile changes made to the data in the DataSet back to the data source. The other core element of the ADO.NET Framework data provider to manage data local to the application or sourced from XML.NET Framework Data Provider for OLE DB.Data. The Dataset is explicitly designed for data access independent of any data source.ADO. foreign key. The DataReader provides a highperformance stream of data from the data source. used with XML data. There are two central components of ADO.NET provides functionality to developers writing managed code similar to the functionality provided to native COM developers by ADO. The Dataset contains a collection of one or more DataTable objects made up of rows and columns of data.Xml. and relation information about the data in the DataTable objects. read-only access to data. Finally. the DataAdapter provides the bridge between the DataSet object and the data source.NET classes are found in System. or used to manage data local to the application. The Command object enables access to database commands to return data. reference both System. The following diagram illustrates the components of ADO.NET architecture is the .Xml. constraint. which is a set of components including the Connection.ADO.NET Framework data provider. The ADO. and the .NET.

A platform invoke call to an unmanaged DLL function When platform invoke calls an unmanaged function. Loads the DLL into memory. Locates the address of the function in memory and pushes its arguments onto the stack. marshaling data as required.  Why we Use C#. Locates the DLL containing the function. 2. The following illustration shows this process. it performs the following sequence of actions: 1.Net: .Platform Invoke (Windows API) Platform invoke relies on metadata to locate exported functions and marshal their arguments at run time. 3.

 Features of C#. methods. A member¶s new implementation can call the original implementation in the parent class by preceding the member name with My Base. using and enhanced version of the Try«Catch«Finally syntax supported by other languages such as c++.  Overriding Properties and Methods: The overrides keyword allows derived objects to override characteristics inherited from Parent objects.Net which is very useful for making Client/server application. .Net:  Inheritance: C Sharp . It gives more facility like disconnected database structure with classes like Data Adapter. Structured exception handling makes it easy to create and maintain programs with robust comprehensive error handlers. It also provides the Crystal Report support to make report this is the advantage of C#. protected blocks of code and filters.Net supports structured exception handling. constructors.Net.Net is disconnected database structure. Data connection.  Overloading: Overloading is the ability to define properties.  The most important feature of C#. versatile procedure. It supports Client/Server Architecture. All classes created with Visual Basic . Structured exception handling combines a modern control structure with exceptions. you can use inheritance to define new forms based on existing ones. destructors.Net is object oriented language which is providing facility of Inheritance. or procedures that have the same name but use different data types. That features is very much useful in our application and it also give speed and accuracy to the client/server model.Net supports inheritance by allowing you to define classes that serve as the basis for derived classes.  Exception Handling: C Sharp . C#.Net also provides Database Objects like ADO. They can also override inherited methods with new implementations. Overridden members have the same arguments as the members inherited form the base class. multithreading etc. while giving the appearance of a single. In our application reports are very important part with graphical representation.Net are inheritable by default. Overloaded procedures allow you to provide as many implementations as necessary to handle different kinds of data. but different Implementations. C#. Derived classes inherit and can extend the properties and methods of the base class. Because the forms you design are really classes.  C#.Net provides many data types which are giving flexibility in programming.

Shared class methods can be used without first creating and object form a class. In C Sharp .  Multithreading: C Sharp . For example.  Namespaces: Namespaces prevent naming conflicts by organizing classes. By causing complicated tasks to run on threads that are separate from your user inter face. The char data type is and unsigned 16-bit quantity used to store Unicode characters.Net allows you to write applications that can perform multiple tasks independently. references point to assemblies instead of type libraries. C Sharp .  Assemblies: Assemblies replace and extend the capabilities of type libraries by.Net supports constructors and destructors using the sub new and sub finalize procedures. Arithmetic shifts are not circulars. destructors are methods that free system resources when a class leaves scope or is set to nothing. you can use an attribute to specify which methods in a class should be exposed when the class is used as a XML Web service. which means the . An assembly can contain one or more namespaces.  Interfaces: Interfaces describe the properties and methods of classes. do not provide implementations.Net. interfaces.Net now supports arithmetic left and right shift operations on integral data types.  Data Types: C Sharp . Conversely. describing all the required files for a particular component or application.  Attributes: Attributes enable you to provide additional information about program elements. and methods into hierarchies. procedures. while the implements statement lets you write code that puts the items described in the interface into practice.Net Framework System. It is equivalent to the .  References: References allow you to use objects defined in other assemblies. and fields that are shared by all instances of a class. A task that has the potential of holding up other tasks can execute on a separate thread. The interface statement allows you to declare interfaces. multithreading makes your applications more responsive to user input. Constructors and Destructors: Constructors are procedures that control initialization of new instances of a class. but unlike classes. Shared data members are useful when multiple by objects need to use information that is common to all.Net introduces three new data types.  Bit Shift Operators: C Sharp . a process known as multithreading. Char data type.  Shared Members: Shared members are properties.

The SQL Server2005 Express Edition programming model is integrated with the Windows DNA architecture for developing Web applications. quality.0. and ease-of-use of Microsoft SQL Server version 7.  Internet Integration The SQL Server 2005 Express Edition database engine includes integrated XML support. and ecommerce applications. Analysis Services also includes a new data mining component Microsoft SQL Server 2005 Express Edition is a set of components that work together to meet the data storage and analysis needs of the largest Web sites and enterprise data processing systems. SQL Server 2005 Express Edition .bits shifted off one end of the result are not reintroduced at the other and.  Scalability and Availability The same database engine can be used across platforms ranging from laptop computers running Microsoft Windows 98 through large. The OLAP Services feature available in SQL Server version 7. data warehousing. availability. MS SQL SERVER 2005 Express Edition  Overview Microsoft SQL Server 2005 Express Edition extends the performance.0 is now called SQL Server 2005 Express Edition Analysis Services. The topics in SQL Server Architecture describe how the various components work together to manage data effectively. and security features required to operate as the data storage component of the largest Web sites. It also has the scalability. and SQL Server 2005 Express Edition supports features such as English Query and the Microsoft Search Service to incorporate user-friendly queries and powerful search capabilities in Web applications. reliability. The corresponding assignment operators are provided as well. Microsoft SQL Server 2005 Express Edition includes several new features that make it an excellent database platform for large-scale online transactional processing (OLTP). The term OLAP Services has been replaced with the term Analysis Services. multiprocessor servers running Microsoft Windows 2000 Data Center Edition.

supports features such as federated servers, indexed views, and large memory support that allow it to scale to the performance levels required by the largest Web sites.  Enterprise-Level Database Features The SQL Server 2005 Express Edition relational database engine supports the features required to support demanding data processing environments. The database engine protects data integrity while minimizing the overhead of managing thousands of users concurrently modifying the database. SQL Server 2005 Express Edition includes a set of administrative and development tools that improve upon the process of installing, deploying, managing, and using SQL Server across several sites. SQL Server 2000 also supports a standards-based programming model integrated with the Windows DNA, making the use of SQL Server databases.  Data warehousing SQL Server 2005 Express Edition includes tools for extracting and analyzing summary data for online analytical processing. SQL Server also includes tools for visually designing databases and analyzing data using English-based questions.  Database Architecture Microsoft SQL Server 2005 Express Edition data is stored in databases. The data in a database is organized into the logical components visible to users. A database is also physically implemented as two or more files on disk. By using a database, it is possible to work primarily with the logical components such as tables, views, procedures, and users. The physical implementation of files is largely transparent. Typically, only the database administrator needs to work with the physical implementation. Each instance of SQL Server has four system databases (master, model, tempdb, and msdb) and one or more user databases. Some organizations have only one user database, containing all the data for their organization. Some organizations have different databases for each group in their organization, and sometimes a database used by a single application. It is not necessary to run multiple copies of the SQL Server database engine to allow multiple users to access the databases on a server. An instance of the SQL Server Standard or Enterprise Edition is capable of handling thousands of users working in multiple databases at the same time.

When connecting to an instance of SQL Server, the connection is associated with a particular database on the server. This database is called the current database. The user is usually connected to a database defined as the default database by the system administrator, although its uses connection options in the database APIs to specify another database. SQL Server 2005 Express Edition allows detaching databases from an instance of SQL Server, then reattaching them to another instance, or even attaching the database back to the same instance. If there is SQL Server database file, it is possible to attach that database file with a specific database name.  Relational Database components: The database component of Microsoft SQL Server 2005 Express Edition is a Structured Query Language (SQL)±based, scalable, relational database with integrated Extensible Markup Language (XML) support for Internet applications. Each of the following terms describes a fundamental part of the architecture of the SQL Server2005 Express Edition database component:  Database A database is similar to a data file in that it is a storage place for data. Like a data file, a database does not present information directly to a user; the user runs an application that accesses data from the database and presents it to the user in an understandable format. Database systems are more powerful than data files in that data is more highly organized. In a well-designed database, there are no duplicate pieces of data that the user or application must update at the same time. Related pieces of data are grouped together in a single structure or record, and relationships can be defined between these structures and records.  Relational Database Although there are different ways to organize data in a database, relational databases are one of the most effective. Relational database systems are an application of mathematical set theory to the problem of effectively organizing data. In a relational database, data is collected into tables (called relations in relational theory).

 Scalable SQL Server 2005 Express Edition supports having a wide range of users access it at the same time. An instance of SQL Server 2005 Express Edition includes the files that make up a set of databases and a copy of the DBMS software. Applications running on separate computers use a SQL Server 2005 Express Edition communications component to transmit commands over a network to the SQL Server 2005 Express Edition instance. When an application connects to an instance of SQL Server 2005 Express Edition, it can reference any of the databases in that instance that the user is authorized to access. The communication component also allows communication between an instance of SQL Server 2005 Express Edition and an application running on the same computer.  Structured Query Language To work with data in a database, the user have to use a set of commands and statements (language) defined by the DBMS software. Several different languages can be used with relational databases; the most common is SQL. The American National Standards Institute (ANSI) and the International Standards Organization (ISO) define software standards.  Extensible Markup Language XML is the emerging Internet standard for data. XML is a set of tags that can be used to define the structure of a hypertext document. XML documents can be easily processed by the Hypertext Markup Language, which is the most important language for displaying Web pages.  Database Design Considerations Designing a database requires an understanding of both the business functions you want to model and the database concepts and features used to represent those business functions. It is important to accurately design a database to model the business because it can be time consuming to change the design of a database significantly once implemented. A well-designed database also performs better. Database Architecture Microsoft® SQL ServerŒ 2005 Express Edition data is stored in databases. The data in a database is organized into the logical components visible to users. A database is also physically implemented as two or more files on disk.

When using a database, you work primarily with the logical components such as tables, views, procedures, and users. The physical implementation of files is largely transparent. Typically, only the database administrator needs to work with the physical implementation. Each instance of SQL Server has four system databases (master, model, tempdb, and msdb) and one or more user databases. Some organizations have only one user database, containing all the data for their organization. Some organizations have different databases for each group in their organization, and sometimes a database used by a single application. For example, an organization could have one database for sales, one for payroll, one for a document management application, and so on. Sometimes an application uses only one database; other applications may access several databases. It is not necessary to run multiple copies of the SQL Server database engine to allow multiple users to access the databases on a server. An instance of the SQL Server Standard or Enterprise Edition is capable of handling thousands of users working in multiple databases at the same time. Each instance of SQL Server makes all databases in the instance available to all users that connect to the instance, subject to the defined security permissions. When connecting to an instance of SQL Server, your connection is associated with a particular database on the server. This database is called the current database. You are usually connected to a database defined as your default database by the system administrator, although you can use connection options in the database APIs to specify another database. You can switch from one database to another using either the Transact-SQL USE database_name statement, or an API function that changes your current database context. SQL Server 2000 allows you to detach databases from an instance of SQL Server, then reattach them to another instance, or even attach the database back to the same instance. If you have a SQL Server database file, you can tell SQL Server when you connect to attach that database file with a specific database name.

MS Visio 2003
Microsoft Visio is a Graphical tool used for the Flow chart, DFD and ER. It contains all the shapes for the Flow chart, DFD, ER etc. that a user can drag and drop onto the drawing page to create a drawing, without having to draw anything manually. Shapes can have online Help to assist a user in using them correctly. The following visual solutions are included:



y y


y y y

y y

Block Diagram Includes the Basic, Block, and Block with Perspective templates. These are useful for showing all types of relationships and hierarchies and provide the basic arsenal of information graphics tools. Brainstorming Includes the new Brainstorming diagram that allows you to capture, arrange, and expand ideas generated by a group or yourself. These diagrams display hierarchical relationships and allow exportation to Word for a more linear view, or to an Extensible Markup Language (XML) file for reuse elsewhere. Business Process The new Business Process category provides a collection of templates you can use for specific business process documentation efforts, including Six Sigma, SAP, and International Organization for Standardization (ISO). Building Plan Provides a quick way to design accurate, to-scale office and furniture layouts. Charts and Graph Formerly Forms and Charts. Includes templates for designing business forms; creating quick pie, line, and bar charts and graphs; and creating marketing diagrams. Flowchart Includes templates for creating audit diagrams, basic flowcharts, cause and effect diagrams, cross-functional flowcharts, mind mapping diagrams, total quality management (TQM) charts, and workflow diagrams. Map Includes templates for creating simple street maps and attractive 3-D maps. Network Includes shapes designed to resemble common network topology and devices. Useful for planning and documenting small to medium-sized networks. Organization Chart Includes intelligent shapes that ³know´ their position in an organization, so that reporting structures stay in place. You can even use the Organization Chart Wizard to automatically build a chart from a spreadsheet or database without having to draw a thing. Project Schedule Includes templates for creating PERT charts, Gantt charts, timelines, and calendars, so you can keep your projects on track. Building Plan Includes templates for creating plan-view drawings of corporate offices and industrial manufacturing facilities. Designed for space planners and building engineers, this solution lets you create floor plans, home plans, plant layouts, reflected ceiling plans, site plans, and the building services schematics that support them.

wiring closets. Software Includes templates for major object-oriented software notations. and telecommunications structures. With the Database Model Diagram template.y y y y y y y Database Includes templates for communicating database designs using multiple notations intended for database professionals. and logic diagrams. including the full Unified Modeling Language (UML) 1. Novell Directory Services (NDS). server rooms. Process Engineering Includes templates for assembling detailed piping and instrumentation diagrams (P&IDs) and process flow diagrams (PFDs) used by many chemical and industrial engineers.2 notation. you can create diagrams of Microsoft Active Directory. wide area networks. wiring diagrams. Web Diagram Includes templates for automatically mapping Web sites and conceptual shapes for planning new designs . and more. In addition. logical diagrams and for designing local area networks (LANs). you can diagram data flows. In addition. Windows user interfaces. Electrical Engineering Includes a variety of templates used by electrical engineers for creating electrical and electronic schematics. you can even reverse engineer and get support for leading client/server and desktop databases. COM and OLE objects. and other LDAP-based directory structures. Mechanical Engineering Includes templates for diagramming fluid power control systems and hydraulic or pneumatic circuits as well as part and assembly drawings. Network Includes further templates for creating high-level.

System Design Use Case Diagrams: Use Case Diagram for Login User Account Use Case: .5. .

User Account Use Case Diagram «uses» Administrator Account Use Case: «uses» «uses» .

2 Use Case Description: .3.

System fails to validate the information 1. System creates a User account with above details. 3. Data Captured: 2a. 2. 4. Common Details: 1. The Account is Create Successfully. User enters specified details. 2. Phone No: Customer¶s contact number. Email Id: Email Id of the customer to which mail can be sent whenever required. Scenario : 2. 5. User None. System rejects the user's request by displaying an appropriate error message in case of Invalid input. User Name: User name with which the new account is created. The user may retry entering the system create account page or may cancel. User goes to the Account creation page and creates account over there. 4. 5. 3. System validates the information.Create Account Use Case Description: Create Account : Description: To create an account so that the customer can order the products online using system. Login Id: Login Id using which a customer can access his account and also use the other functionalities of the system. Actor(s) : Pre-Condition : Post-Condition : Main Success 1. Create Account details A. Exceptional Flow(s) : 3a. 1. None Alternate Flow(s): External None . System displays success message. Address: Address to which shipping can be done whenever customer does the order.

Customer enters specified details. System validates the information. Customer ID: Valid Customer ID to access the account. 2. Password: Password from the Customer so that he can access to his account also can update his account. 3. Customer will be provided it¶s new password and also the status of his account.System Dependencies: Open Issue(s): None Non-Functional None Requirement(s): Manage Account Use Case Description: Manage Account Description: A customer can check his account status. 4. 4. 2. Scenario : 3. B. System Updates account with the new details. He can also change his password. The Customer goes to the manage account page in the system. Data Captured: 2a. Customer Customer is registered with this system. 5. Customer Name: Specifies the name to be used to create the account with this name. System displays success message. Customer account details. Actor(s) : Pre-Condition : Post-Condition : 1 The Account is updated successfully. 6. Customer Address: Address of the Customer Where the . Main Success 2. Common Details : 1.

Mobile No: To Contact the customer. 2.shipping of the products can be done. 5. None Alternate Flow(s): External System Dependencies: Open Issue(s): None None Non-Functional None Requirement(s): Example usage: Manage Shopping Cart Use Case Description: . Exceptional Flow(s) : 3a. System fails to validate the information 1. The Customer may retry entering the system again. System rejects the customer's request by displaying an appropriate error message in case of Invalid input.

Product Id: The Id of the product which the customer want to add or remove from the cart. The shopping cart is updated successfully. Data Captured: Common Details : 1.Manage Shopping Cart Description: A customer can add or remove the products he want to order from the shopping cart. Customer will be provided his shopping detail and payment information also . Product Quantity: The Number of one particular product he want to order. The Customer goes to the product page in the system. 2. Main Success 1. 4. 4. System displays the success message. 2. Actor(s) : Pre-Condition : Post-Condition : 1. 2. Product Name: The name of the Product to be sold. Scenario : 3. Product Price: The Price of the product to be sold. Exceptional Flow(s) : Alternate Flow(s): None External System None Dependencies: Open Issue(s): Non-Functional Requirement(s): None None Payment Use Case Description: . Customer add or removes product from that page. Customer Customer is registered with this system. 3. System updates the shopping cart with new products. 3. Select Shipping Charge.

System fails to validate the information a. The Customer goes to the product page in the system. System rejects the customer's request by displaying an appropriate error message in case of insufficient balance in his account. Scenario : 3. System displays success message. Customer Customer is registered with this system. None Alternate Flow(s): External System Dependencies: Open Issue(s): Non-Functional Requirement(s): None None None Manage Products Use Case Description: . Main Success 1. Customer payment details. Customer will be provided a message of conformation of payment. Exceptional Flow(s) : 3a. System validates the information.Payment : Description: Actor(s) : Pre-Condition : Post-Condition : A customer do the payment for the products he ordered. Data Captured: 2a. 4. System takes the payment and deducts that much amount from the credit card account. 2. The payment will be done from his credit card successfully. 2. Customer enters specified details. Common Details : Customer credit card Number: Valid credit card number to do the payment from that account. 1. 5.

System validates the information. Product Image: Image of the new product. 5. Product ID: Product ID of the product to be added or removed. Administrator enters specified details. 2. System rejects the Administrator's request by displaying an appropriate error message in case of Invalid input. The Administrator may retry entering the system again. 4. 2. 3. 1. System displays success message. Product Name: Name of the new Product. Data Captured: 2a. System Updates the page with the new details. Product details. A. 3. The Administrator goes to the update products page in the system. 3a. 2. Alternate Flow(s): None Exceptional Flow(s) : External System None Dependencies: Open Issue(s): Non-Functional Requirement(s): None None Register Order and Manage Shipping Use Case Description: . The product page will be updated successfully. System fails to validate the information 1. Actor(s) : Pre-Condition : Post-Condition: Main Scenario : Success 1. Common Details : 1. 4.Manage Products Description: A administrator can add new products or remove old products from the site. Product Price: Price of the new product. Administrator Administrator is logged in with this system.

1. Product ID: Product ID of the product to be ordered. Order details from customer. Common Details : 1. The Administrator may retry entering the system again. 3. System rejects the Administrator's request by displaying an appropriate error message in case of any system failure. Administrator Administrator is logged in with this system. The Order will be taken successfully. b. Customer Id: Id using which the customer registered with the system. Product Name: Name of the Product. 3. 6. 4. 5. Customer Email Id: Email id of the customer to contact him through mail. 2. Administrator uspdates the customer account with the new details. System displays success message. 2a. Administrator takes specified details. 5. Alternate Flow(s): None Actor(s) : Pre-Condition : Post-Condition: Main Scenario : Success Data Captured: Exceptional Flow(s) : External System None Dependencies: Open Issue(s): None 4. Customer Address: Address of the customer to which the shipping can be done.3 Activity Diagram: .Register Order and Manage Shipping: Description: A administrator can register the order made by the customer from the site. 3a. System fails to validate the information a. 4. Administrator validates the information. The Administrator goes to the Order detail page in the system. 2.

Activity Diagram For Ordering Process: Activity Diagram For Payment Process: .

4.4 Sequence Diagram .

Sequence Diagram For Customer Registration: Sequence Diagram For Order & Payment Process: .

Manage Category Sequence Diagram .

dm Manage Subcategory Sequence Diagram .

 Manage Products Sequence Diagram .

4.5 Collaboration Diagram .

Collaboration Diagram For Customer Registration: Collaboration Diagram For Order & Payment: Onlin C u tom r 1 5 S .

4.6 State Chart Diagram .

State Chart Diagram For Order Process: 4.7 Class Diagram: .

Data Dictionary .

Store the date of category is created. Contact No. Store the name of person who is modify this category. State of the Administrator / User. of the Administrator / User. City of the Administrator / User.Table Name : User_Mst (User Master) Field Name UserId Password User Name User Address City State Country Contact No. Store the Date of Category is modified. Table Name : Category_Mst (Category Master) . Email Address Created By Created Date Modify By Modify Date Data Type Varchar(50) Varchar(50) Varchar(100) Varchar(max) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Varchar(50) Datetime Varchar(50) Datetime Constraints Primary Key Not Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Description Unique User Id (it User for Login to Control Panel) Used for login password Name of the user / Administrator Address of the Administrator / User. Store the name of person who is created this category. Email of the Administrator / User. Country of the Administrator / User.

This table is used to store the different type of category detail. Table Name : Product_Mst (Product Master) Field Name Category Id Product Code Product Name Product Price Product Image Path Show in Home Created By Created Date Modify BY Data type int int Varchar(100) Decimal(18. Name of the Category Description about the Category Store the name of person who is created this category. Store the date of category is created. Store the Date of Category is modified. Store the name of person who is modify this category.2) Varchar(max) Varchar(10) Varchar(50) datetime Varchar(50) Constraints Reference to Category Master Not Null Allow Null Not Null Allow Null Allow Null Allow Null Allow Null Allow Null Description Category Identity no. This category is used to categorize the product. Store the date of category is created. Store the name of person who is modify this category. Field Name Category Id Category Name Category Description Created By Created Date Modify By Modify Date Data Type int Varchar(100) Varchar(100) Varchar(50) datetime Varchar(50) datetime Constraints Primary Key Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Description Category Identity no. Product Identity No (Auto Generated). Name of the product Price of the Product Image path of the Product Image If offer is available in that particular Product Store the name of person who is created this category. .

of the Customer Fax No. Store the name of person who is modify this category.0) Decimal(20. Country name when the customer is live.Modify Date datetime Allow Null Store the Date of Category is modified. Store the Date of Category is modified. Store the date of category is created. Table Name : Customer_Mst (Customer Master) Field Name Customer ID Customer Name Customer Address Customer City Customer State Customer Country Customer Ph No Customer Mobile No Customer Fax Customer Email Customer Login Id Customer Password Created By Created Date Modify BY Modify Date Data type Decimal(10.0) Varchar(100) Varchar(50) Varchar(50) Varchar(50) datetime Varchar(50) datetime Constraints Not Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Primary Key Not Null Allow Null Allow Null Allow Null Allow Null Description Unique Indentity No of every Customer (Auto Increment) Name of the customer Address of the customer City Name of the Customer State name of the Customer is live. of the Customer Email Id of the Customer Login Id for the Customer Login Login Password of the Customer Store the name of person who is created this category.0) Decimal (20.0) Varchar(100) Varchar(100) Varchar(50) Varchar(50) Varchar(100) Decimal(20. Phone no. Table Name : Product_Image_Detail . of the Customer Mobile No.

Store the date of Page is created. This Page is used to categorize the product. Store the name of person who is modify this page.Field Name Image Id Category Id Product Id Product Image Product_ImageCP Data type int int int Varchar(max) Varchar(max) Constraints Not Null Reference to Category Master Not Null Allow Null Allow Null Description Category Identity no. Image of the Product Image Image of Product_ImageCP Table Name : Page_Mst (Page Master) This table is used to store the different type of Page detail. Store the Date of page is modified. Card Date . Field Name Page Id Page Name Page Description Created By Created Date Modify By Modify Date Data Type int Varchar(100) Varchar(max) Varchar(50) datetime Varchar(50) datetime Constraints Not Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Description Page Identity no. Name of the Page Description about the Page Store the name of person who is created this Page. Table Name : Cart_Mst Field Name Card Id Card Date Data type Int datetime Constraints PK Allow Null Description Card Identity no. Product Identity No (Auto Generated).

Store the name of person who is created this cart. Store the date of Cart is created.Customer Id Cart Total Amount Cart Additional Charge Cart Shipping Charge Cart Remark Created By Created Date Modify BY Modify Date Varchar(50) Decimal(18.2) Decimal(18. Table Name : Cart_Detail Field Name Id Cart Id Product Category Id Product Id Product Name Product Image Product Qty Product Price Data type int int int int Varchar(100) Varchar(max) Varchar(50) Decimal(18. Store the Date of Cart is modified.2) Not Null Allow Null Allow Null Allow Null Not Null Constraints Not Null Reference to Category Master Category Identity no. Product category identity no. Remarks of the Cart. Price of the Product Description . Image of the Product Image Quantity of the Product.2) Varchar(100) Varchar(50) datetime Varchar(50) datetime Not Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Allow Null Customer Identity No Total Amount Of Cart Others Additional Cart Charges Shipping Charge of the Cart. Product Identity No (Auto Generated). Store the name of person who is modify this cart.2) Decimal(18. Name of the Product.

Implementation Result 1. quantity per product & overall bill amount that has to pay by the customer. It Provides customer to select & purchase the products. shipping charge per product. It Provides adding & removing products from the shopping cart and also provide the facilities to increase or decrease the no. their prices per product. Program / Modules Specification 2. of quantity in the shopping cart. It contains the name of products.6. . It contains the all products that are purchased by the customer at a same time. . It also gives the brief description of products. If provides navigation facilities to customer.  Shopping Cart This module provides customers to carry their overall shopping.Implementation Details 1. Program / Module Specification These are the different Modules of our System y y y y y y y y y y Administrator Module Customer Service Customer Inquiry to Mail Special Offers Home Page Products Catalogue Shopping Cart Select Shipping Charge Sign Up Sign In  Product Catalogue This module represents or contains the wide range of Products and enhancements.

2. 4. In PayPal customer has three type of functionality like  Customer Login : This Page the customer forces to enter their subscriber Id related to our System.  Payments : If each information regarding to the payment type are valid then any then customer can successfully get the order No.  Sign In The function of this module is to provide the log in facility to user by assepting User ID & Password. 3. If customer is successfully submitting information then customer can get Customer Login ID for PayPal through which customer can put orders & get other facilities. It provides following Information & facilities: 1. It will take the information of customer & if the all information is valid then & then customer can be able to submit his/her information.  Registration Process : In the registration process is provide the facilities to membership in PayPal. If customer does not have register with the PayPal then customer has to go for the registration process. If customer has valid Customer Id then & then customer can able to put their order successfully. Shipping Information Policy Information Contact Us Sending Inquiry directly to System administrator. & get order placed confirmation otherwise order will be rejected.  Sign Up The function of this module is to provide new login Id to the User The User requires filling some necessary information or the registration process.  Special Offers . Check Out When the customer completes his/her shopping he/she will go for checkout This module we directly connected with the PayPal.  Customer Services : This module is managing the communication process between end user & system administrator. Due to that customer must be subscribed with the PayPal.

update or delete the Product category. For which the administrator can create new user in user entry form. update & delete the category. Live help can be supported. The valid administrator has a power to give another person to change or manage the control panel and entire system. Searching facilities of the product in the website. Implementation result With the help of above analysis and design we have implemented the project and tried out our best to fulfill the most of the general requirement. In the control panel the administrator add. The administrator is Manage all the site very successfully. Sub category and product information and also upload the product image and store the detail in the database table. Future Enhancement y y y y The Page User level security in the control panel. It contain administrator login page. Is maintain by the administrator and display in the home page. subcategory and directly to the name wise search of the product. The customer can go through product catalogues very easily. 7.Testing . Whenever he/she can try to add the product into the cart then system will ask to select the shipping information customer will select shipping information the it will display appropriate Message.This modules is provides the information of the any special offer can given by the system administrator.  Administrator : This module can help administrator to manage the system. The administrator can maintain the order information very easily from the paypal. She/he can add the selected Product into his shopping cart and increase or decrease the quantity and can also remove the selected product from the cart. Auction can be supported. If administrator is valid then administrator can manipulate the data in the system. He/ She can send the inquiry to the administrator through the inquiry page. The administrator part Control panel is working perfectly. In Inquiry When the customer send the inquiry will send mail to the administrator mail address. In the categoroy wise. In the system will display special offers in the home page of the website. . The customer can easily create the login through registration process and log into his account. IT also called the Control Panel. Only authorized person can see the particular page. He / She can check out by placing order for the product present in the cart. In the control panel the administrator can add. It deals with database of the system. Product sub category and Product.

which usually comes in after the basic design of the program has been completed. .1 Software Inspection Analyze and check system representation such as the requirements document. design diagram and the program source code.´ Software Testing has a duel function. Developer resorted Alpha testing. which ensure that software conforms to its specification and meets the need of the software customer. The project scientist will look over the program and give suggestion and ideas to improve or to correct the design. 5. more pervasive and more troublesome in software than with other technologies. There is bound to be a number of bugs after a program have been created. Thus software testing is used for validation and verification. it is used to establish the presence of defects in program and it is used to help judge whether or not the program is usable in practice. They also reports and give ideas to get rid of around any major problems.y y y y Testing Testing Plan Testing Method Test cases Testing ³Errors are more common. They may be applied at all stages of the process.

2 Test Plan The Testing Process: .Unit Testing Module Testing Sub-system Testing System Testing Acceptance Testing Figure Testing Process 5.

Requirements Tractability: As most interested portion is weather the system is meeting its requirements or not. Statistical Testing: Statistical Testing is used to test the program¶s performance and reliability and to check how it works under operational conditions. Testing Schedule: Developer is tested each procedure back-to-back so that errors and omissions can be found as early as possible. plotting. and Requirement Engineering. Implementation. first of all put the mouse curser on a specific point and note down the elevation. or not. and likewise. Strictly stick to your requirement specifications. Therefore. Developer checked the output of certain combination of input. it is quite obvious to repair them at early stage of the system. Once the system has been developed fully developer tested it on other machines. then at particular height bearing areas will be separated out from the other regions of the map by other color. Unreachable code. .Developer tests the software process activities such as Design. then after put that height value into the text box for the query processing. query system. This portion is very interesting. Tested Items: Our tested items are like image reading. 5. give you the path to get desirable result from the system. So analysis is the most process of any process. Tests are designed to reflect the actual user inputs and there frequency. design errors are very costly to repair one system has been started to operate. which differs in configuration. which gives desirable result. The stages involved in the static analysis for the systems are follows.  Control flow analysis 1. and distance between any two selected points on the image. Because.3 Testing Methods Software testing involves executing an implementation of the software with the test data and examining the output of the software and its operational behavior to check that it is performing as required. color-shedders. for that testing should be planned so that all requirements are individually tested.

Declared variables.  Data use analysis 1. Black-Box Testing: In Black-Box Testing or Functional Testing.e. Output Interface .  Program¶s non-volatile memory out of Bound. 2. Therefore the source code is not needed.  Uncalled function and procedures. these testing aims to test a program¶s behavior against it specification without making any reference to the internal structure of the program or the algorithms used. These consistencies are usually due to the program faults or defect. The program just gets a certain input and its functionality is examined by observing the output. Defect Testing: Defect Testing is intended to find inconsistencies between a program and its specification. Input Interface 2. i. In another words. 3.  Interface Analysis  Parameter type mismatches. Variables declared but never used. Unconditional branches into loops.  Non-uses of the result of function. Processing 3. so even purchased modules can be tested. Variable used before initialization. This can be done in the following way: 1. Developer is concerned about the output of the module and the software. Variables assigned twice but never used between assignments.2. Possible array bound violations.  Storage management faults  Images not stored in resources.  Parameter number mismatches. 5. weather the software gives dropper output as per the requirement or not. 4.

Structural Testing: Developer has done path testing to exercise every independent execution path through a component or program. which has been determined before the test. which is collected by a second interface. It may include. Condition Testing: Condition testing is a test case design method that exercises the logical conditions contained in a program module. Here code is inspected to see what it does. This integration process involves building the system and testing the resultant system for problems that arise from component interactions. test are designed to exercise the code. The structure of our program is also checked. If every independent path is executed then all statements in the component must have been executed at least once. The tester can analyze the code and use the knowledge about the stricter of a component to derive the test data.  Boolean variable error  String Index out of Bound error . Then the program does its job and generates a certain output. driver. Integration Testing : After our individual modules developer tested out developer go to the integrated to create a complete system. Code is testing uses code scripts.The tested program gets certain inputs. White-Box Testing: White box testing is used as an important primary testing approach. These tests Developer performed as module level as Developer as system level. Developer has applied top down strategy to validate high level components of a system before design and implementations have been completed. If the condition is incorrect. This result is then compared to the expected output. Performance Testing: Performance testing is designed to test the run time performance of the system within the context of the system. our department process started with high level components and developer worked down the component hierarchy. then as least one part of the condition is incorrect. etc which are employed to directly interface with the drive the code. Because. Individual modules Developers tested for required performance.

Therefore Developer checked for the o Interface misuse o Interface misunderstanding Developer examined the code to be tested and explicitly list each call to an external component.  All required fields aren¶t left blank. which are often larger than single function. Equivalence Partitioning .4 Test Cases I have used test case based on equivalence partitioning in our project. Here following activities have taken placed. standards tests for GUIs have been performed. whether it invokes the corresponding functionality properly. In the system.  The position and related labels for all controls checked.  Whether the non-editable text control is disabling and it was also verified that it doesn¶t exceed the maximum length.  Validations for all inputs done.  Testing individual object classes.  Whether the system prompts the user with appropriate message as and when invalid information is entered. 5.  Pull down controls was verified for proper functionality.  Testing cluster of objects. Object Testing: Object testing is to test object as individual components.  Each menu functions tested.     Null Pointer Assignment Input Output Connection Exceptions Images or Map Unloaded errors Parsing (conversion) errors Arithmetic expression error Interface Testing : Interface testing is integral part of Integration testing.  All menu functions and sub functions verified for correctness.  Testing object-oriented system.  Testing the individual operations associated with object. which are as follows.

Purpose: The purpose of the test cases is to test the various input and see the output produce any error or not. These test cases are below:  Test software with sequence that has only single value. we cannot prevent occurrence of errors because. if user does not call methods properly and does not input appropriate parameters. middle. These decrease the chance that program with defect will accidently produce a correct output because of some accidental characteristic of the input. In our system. Deriving equivalence partitioning from the system specification there are various testing cases that can also be used. It is tested with different types of value like single value multiple value and see it can generate expected output. Error Detection and Correction: . we are unable to avoid errors. Derive test so that the first.Valid input System Valid output Equivalence partitioning shown an ellipse input equivalence partitioning is set of data where all of the set member should processed in an equivalent way. Output equivalence partitions are program output that has common characteristics so can be considered as a distinct class. Error Avoidance : Error avoidance is impossible in any system. Using the program specification of user documentation may identify the equivalence partitioning and by the tester using experience to product which classes of input value are likely to detect error. and last element of the sequence are accessed this approach reveals problems at partition boundaries. There are different test cases according to the system. as it points to prevention of errors from occurring in system. Reliability Of The System: There are three approaches to reliability of the system.  Different sequence of different size in different tests.

Furthermore. There are two level of reliability: o First Level o Second Level o First Level: During the project development. if invalid image is given then system will prompt error and it will not shutdown. it just gets transmitted from you to your customer. a test is being conducted. but enables system to keep running through degraded system. but is it possible that because of errors it may not work efficiently.Error detection corresponds to reorganization of errors when they are encountered. Finally there¶s only one amazing statement that means everything in itself«. we can say that system is reliable. However. Error Tolerance : Error Tolerance refers to reorganize of errors when they occur. it is user¶s responsibility to take appropriate action. whenever the user tries to open any other file instead of image file. Message box shown to users are in well understood forms. in that case. if user does not add image file. system does not support correction of errors. a chance of system failure is almost zero. For example. Our system is meeting right requirement and thus it is reliable at first level. Moreover. so system is meeting second level reliability too. We also use try catch structure to prompt errors. o Second Level: During the testing phase of system. every time your customer uses the software.´ . it does not produce unexpected output unless and until the user make some mistake. System prompt varicose error message like file does not exist. This is necessary to satisfy the reliability at first level. we performed a thorough and effective determination of system requirements. Hence. ³Testing never ends. developer use message boxes to prompt errors to users. that layer is not displayed nor activated and any further operations are not done. In the system. In system will never shutdown automatically due to errors.

1) Total is display properly according to quantity. Output Actual Output Pass/Fail? Test Case Number Name Description Test Used Expected Output Money transferred properly from buyer account to seller account. credit card number. Actual Output Test Case 2 Number Valid Credit card Transaction Name Description This test case will check weather money transferred properly from buyer account to seller account. This test case will check quantity entered in the quantity textbox according to total price is right or not. Pass Actual Output Pass/Fail? . Expected 2) Transaction Fail. expiry date. Input Data 2) Valid ID but wrong Password. 2) Total display is wrong.Test Case 1 Number Valid User Test Name Description This test case will check weather User ID and Password is valid or not. 1) Total is display properly according to quantity. Data Quantity and total price column of cart_mst table. Input Data Valid Credit card type. System Allow login. 1) System allow login Expected 2) System Prompts error that user is not valid. 3) Wrong ID and Wrong Password. Output 3) System Prompts error that user is not valid. If not then it will not allow the user to operate the system. 1) Valid ID and Password which is already defined. Pass 3 Calculate total in cart. 1) Money transferred from buyer account to seller account.

Input Data Filled Inquiry form by User. 1) Shows message like field must not be blank or invalid email id. And ID is entered properly or not. Input Data 1) Forgot password mail is received. Expected 2) Inquiry is not received by admin. Pass Test Case 5 Number Forgot password is send by mail. 2) Message of success. Shows message like field must not be blank or invalid email id. Name Description This test case will check inquiry send by user is properly sent to admin or not. Pass 6 ID and Blank field validation.Test Case 4 Number Inquiry from user is received or not. Fill the various field of the form. Output Actual Output Pass/Fail? Inquiry Properly received by admin. Filled forgot password form. Pass . This test will check weather all the fields in the form are filling or not. so to check mail receive or not. Output Actual Output Pass/Fail? Test Case Number Name Description Input Data Expected Output Actual Output Pass/Fail? Forgot password mail is received. 1) Inquiry properly received by admin. Expected 2) Forgot password mail is not received. Name Description This test will check if some one forgot password then his/her password is send by mail to his email id.

. ± Screen Shots Admin Part 1.7. Login Page(Admin) In this page user(admin) can login in the site.

3. . Main Page Admin can be handle the all functionality in this page. Change Password : User Can be change the password & set New Password.2.

4.edit. delete the pages. Page Entry: In this page the User Can be Add . User Entry: In this page the User Can also create new user. 5. .

7. . Category Entry : In this Page the User Can be add. update. edit the product in the Category Master. delete. Product Entry: Admin can add. or delete the category.6.

Customer Part 8. The Customer can login with this page. Home Page: This is Home page. .

. Product Details : Customer can see all the items which available in the shop. And get the full detail information about the particular product.9.


10. . Customer register: In this page the customer can be registered in the shopping cart.

. And customer also Change the number of quantity of the product in the cart.11. delete the product in the cart. Add Cart: In this page the customer who is login can be bye the product online. 12. View Cart : In the shopping Cart the logined Customer can add.

Inquiry Form : Any customers have any kind of inquiry then it will send the inquiry to the owner. 14. .13. Check out: The customer will click on the check out then it must be the registered will us.

.15. Contact Us: In this page give the information about this shopping palace. 16. About Us: In this page gives information about us .

designing CSS. we learn about the session. We have creating a this Site as per the requirement of company HCL Info systems Pvt. file uploading. y BIBLIOGRAPHY . photo uploading and how to work with the Data Base.y CONCLUSION We have working from the last 4 months on Online Shopping Website. Ltd. o For Complexity and The Best Search .