This action might not be possible to undo. Are you sure you want to continue?
Marbaselios Institute of Technology, Anchal
University of Kerala
1.1 INTRODUCTION ABOUT THE PROJECT
The Internet Mail Server is a web based program developed in ASP.Net and C# with Database as SQL Server. The main objective of this project is to develop an application to send and retrieve electronic files to or from a person’s email address. It is designed to operate without any manual intervention during normal operation. They wait for a message to be sent to them and process it accordingly or collect messages from clients and redirect them. This consists of various intranet-mailing services for a training institute. The server must be running Microsoft Internet Information Server (IIS) that has the .net framework installed. Intranet Mail Server using assemblies has the following features; Easier way to send and receive mails. Messages displayed in a sorted way. Address Book, which is used to save recipient address.
Marbaselios Institute of Technology, Anchal
University of Kerala
Using SQL database as storage. Users can use folders to save messages. The entire project is divided into twelve modules; Registration This module will allow a user for creating a new account by filling and submitting the registration form. This module consists of information regarding the registration of new user and login into his mailbox. During registration a user is required to enter his id that he requires, password, a secret question and answer to this secret question. Personal information such as name, last name, date of birth, occupation is also to be furnished.
Marbaselios Institute of Technology, Anchal
University of Kerala Login After registering a user can login to his mailbox using his user id and password. This provides the facility for a user to send e-mail to another user by entering the details such as receiver’s e-mail address. programs or any other types of computer files. Incase if his user id and password is invalid then he is prompted to re-login again. Anchal 4 . Users can utilize a measure to share files between one another including word processing documents. subject and message. After viewing the messages users can delete and spam the messages. This module will display the email message received by the user in a conversation format with which he has the correspondence. You need a mailbox that resides on a mail server and is set up to handle your incoming mails. Marbaselios Institute of Technology. When the user enters his user id and password. Inbox This module is used to display the mails received by the user in a sorted manner. Compose This module will allow users to create new messages and the messages will be stored in the database. It also provides an option for sending attachments. Only valid users are allowed to carry other process whereas the invalid entry is rejected. The valid user can send and receive mails through the intranet. its validity is checked in the database.
Diary This module provides a provision for writing and storing the information and also allows to view it later. After viewing the users can delete the messages. All the messages deleted from the inbox will be stored in the trash folder and from this folder the user can delete the message from the database permanently. Anchal 5 . Trash This module indicates the email messages deleted from inbox. Marbaselios Institute of Technology.University of Kerala Address book This module will allow users to view the contacts in the address book. While composing the users can save the messages as draft and these messages are stored in the draft folder. It will also allow the users to add and delete individual contacts. Draft This module will allow the user to view the message that is saved as draft. this module helps the user to retrieve his password. The user is required to answer his id. the clue question and answer and his date of birth he entered while registered. Forgot password If the user forgot his password. Bulk This module will allow users to view the message that are spammed and will also allow the users to unspam and delete the messages. country.
1. Then he asked to enter the new password and the confirm password. For security reasons it is desirable to change password. he can do so by entering a new password. To ensure security first user is asked to enter the old password.2 ORGANIZATIONAL PROFILE INTRANET Marbaselios Institute of Technology.University of Kerala Settings This module will allow the user to change existing user password and to create new password. Anchal 6 . If the user wishes to change the password. When the user submits this form his password is automatically updates.
An increasing number of people in corporations use the Internet for communicating with the outside world. An intranet is built using the Internet’s TCP/IP protocols for communications. Creating an Intranet in which all the information and resources can be used seamlessly has many benefits. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an Intranet. for gathering information. Security systems separate an intranet from the Internet. Intranets can be used for anything that existing networks are used for and more. Dialing into an intranet in this way is much like connecting to the Internet. except that you’re connecting to a private network instead of to a public Internet provider. such as from home or while traveling. Now it is recognize that the components that worked so well on the Internet could be equally valuable internally and that is why Intranets are becoming so popular. TCP/IP protocols can be run on many hardware platforms and cabling schemes. and for doing business. Anchal 7 .University of Kerala 2. Intranets can co-exists with other local area networking technology. The ease of publishing information on Marbaselios Institute of Technology.1 ABOUT INTRANET An intranet is a private network with Internet technology used as the underlying architecture. TCP/IP based networks make it easy for people to access the network remotely. A company’s intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes. The Java Programming language can be used to access legacy databases as well.
Anchal 8 . It allows people to collaborate on projects. which allow only restricted access from the Internet. and to establish secure procedures for production work. People from inside an intranet can get at the larger Internet resources. Marbaselios Institute of Technology. An intranet is a private corporate or educational network that uses the Internet’s TCP/IP protocols for its underlying transport. to share information.University of Kerala the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. The protocols can run on a variety of network hardware. and can also co-exist with other network protocols such as IPX. Corporate databases with easy-to-build front-ends use the web and programming languages such as Java. like newsgroups. stimulated the Internet’s growth. and with which people can communicate with one another will continue to drive the building of intranets. The consequence of that growth stimulated and fueled the growth of intranets. Free server and client software and the multitude of services. Intranets allow people to work together more easily and more effectively. but those on the Internet cannot get into the intranet. to do videoconferencing. Software known as groupware is another important part of intranets. The ease with which information can be shared.
When e-mail formats differ. gateways are used to translate the data into the appropriate format for the recipient. Intranet e-mail uses the TCP/IP protocol. people can send messages to anyone else on the intranet and.University of Kerala 2.400 MHS (Message Handling Service) are the two most common protocols. SMTP is based on a client/server model in which someone uses a mail client to create mail and read mail. sound. The Simple Mail Transfer Protocol (SMTP) and X. or connected to a computer network that has a connection to the Internet. and executable files. Marbaselios Institute of Technology. to your e-mail messages. and then TCP reassembles the message on the receiving end so that it can be read. Many e-mail software packages do this automatically. such as an online service. Anchal 9 . such as pictures. The person who receives the attached binary file must decode the file with the same scheme that was used to encode the file. The TCP protocol breaks your messages into packets. Since the Internet can’t directly handle binary files in e-mail. Several standards have been developed that have been adopted by most e-mail companies today that allow the various products to communicate with each other. videos. while servers do the actual processing and delivery of the mail. the file must first be encoded in one of a variety of encoding schemes. to anyone connected to the Internet as well. The most time-honored and still the most popular means of communication using computers is e-mail. the IP protocol delivers the packets to the proper location. We can also attach binary files.2 E-MAILS Intranets allow people to work together better by allowing them to communicate better. Using e-mail.
2. SMTP works as follows. the Message Transfer System (MTS) on a server uses a Mail Transfer Agent (MTA) to examine the address of the person to which the mail is being sent. 2. The message often had to travel through a series of networks before it reaches the recipientnetworks that might use different e-mail formats. The MDA then delivers the mail to the intended recipient. it is sent by the MUA to a program running on a server called a Mail Transfer Agent Marbaselios Institute of Technology. When mail is sent. With in an intranet. the message is instead sent by the MTA through the Internet. After the message is completed. which is called a Mail User Agent or User Agent (MUA or UA). including PCs. When someone wants to create a mail message. 1. and UNIX workstations. If the person can be found on the intranet. to create a piece of electronic mail.1 E-MAIL DELIVERED WITHIN AN INTRANET The most common architecture underlying the use of intranet e-mail is the protocol called the Simple Mail Transfer protocol. 2. Macintoshes. SMTP uses client/server architecture. you use a mail client. they use a mail user agent or user agent (MUA or UA) . the mail is delivered to a Mail Delivery Agent (MDA). and can run on a variety of different computers. This MUA can be one of any number of e-mail programs.client software that runs on a computer. There are multiple kinds and different agents for different types of computers. Anchal 10 . When we send e-mail to someone on another or on the Internet.University of Kerala To create e-mail.
The MTA looks at the address of the intended recipient of the message. If the recipient is located on the Internet or another intranet. Some mail systems use another e-mail protocol called the Post Office Protocol (POP) in concert with SMTP. 3. the mail is delivered to a mailbox on a server. 4. pictures. Anchal 11 . email is not delivered directly to your computer. the file is sent over the Internet to the recipient. The files can be encoded using a variety if methods. the MTA sends the message to another server program on the intranet called a Mail Delivery agent (MDA). SMTP can only handle the e-mail transfer of plain ASCII text files. file it. and sends the mail to the inbox of the proper person. In order to send binary files such as spreadsheets. Some e-mail software will automatically encode binary files. someone logs on to the server using a password and a user name. and respond to it. The recipient of the mail can now use a mail user agent to read the mail. and word documents. Marbaselios Institute of Technology. To get he mail. and retrieves mail with their mail agent.University of Kerala (MTA). including Unencoding and Bse64. MDA looks at the address of the recipient. Instead. If the recipient of the message is on the intranet. With POP. they must first be converted into ASCII format by encoding them. 5.
University of Kerala 2. 4. Before the mail can be sent out across the Internet. The message may be required to also pass through a firewall on the receiving network. 2. 1. An e-mail message is created using SMTP. 3. Anchal 12 . The message leaves the intranet and is sent to an internet router. the mail transfer agent will sent the mail across the intranet via routers to the mail transfer agent on the receiving network. it first might have to pass through an intranet firewall (a computer that shields the intranet so that intruders cannot break into the network. The receiving network gets the e-mail message. If the address is found on another network. The firewall keeps track of messages and data going into and out of the intranet. The router examines the address and determines where the message should be sent. and then sends the message on the way. The intranet’s Mail Transfer Agent examines the address. As with all information sent across the Internet. A gateway there uses TCP to reconstruct the IP packets into a full message.2.2 E-MAIL DELIVERED AMONG INTRANETS A typical message might take the following steps when being delivered from an intranet to another network or intranet. Marbaselios Institute of Technology. The gateway then translates the message into the particular protocol the target network uses and sends it on its way. the message is broken up by the Internet’s TCP protocol into IP packets. It keeps a record of traffic so that any security breaches can be tracked down.
University of Kerala 5. Gateways can actually change data for connectivity. Anchal 13 . Marbaselios Institute of Technology. or uses the Post Office Protocol (POP) to deliver it to a mail server. E.: ASCII to EBCDIC. 6. For e- mail it may convert CompuServe protocol to SMTP.g. Gateways are also used to connect PC’s to IBM mainframes. The receiving network examines the e-mail address and sends the message to the specific mailbox where the message was intended to go.
Anchal 14 .University of Kerala SYSTEM STUDY Marbaselios Institute of Technology.
University of Kerala 3. Anchal 15 . It is extremely expensive software. it will not last longer. The following are the disadvantages of the existing system.1 EXISTING SYSTEM If a newly developed site has to provide email services. It uses file system for storing data. Users must take extreme measures in protecting their computers from outside hacker intrusion. Marbaselios Institute of Technology. It doesn’t have automatic deletion of messages. Program provides powerful reader interaction. mail server software is needed. Here comes the importance of a new cost free and userfriendly mail server software. Interface is 100% web-based and can be remotely controlled. Even though trial versions are available. Program automatically tracks when emails are opened. Advantages and Disadvantages of Existing System The following are the features of the existing system. Now the existing software is very costly. Moreover new commonly used email service providing sites are planning to discontinue this free service.
private mailboxes to all users on the network.2 PROPOSED SYSTEM The main objective of the proposed system is to introduce software capable of mail transferring. mailboxes and mailing lists. It can be used as an in-house In this mail server with no connection to the Internet. “Intranet Mail Server” is essentially a mail server using Internet mail protocol SMTP. It then can be programmed to configure unlimited internal mailboxes. configuration. It runs on single windows 2000. SOAP. components that facilitates integration by sharing data and functionality over the network through a platform independent protocols such as XML. It is developed using . which can be used to send and receive mail or document internally and world wide via internet. Anchal 16 . The proposed system can be easily installed on your computer network. and HTTP. It allows an unlimited number of users. It enables you to setup an in-house email system.University of Kerala 3. which does not have to be dedicated to the task. It requires only one external mailbox address with one domain name. used for building and running all kinds of software including web based applications and XML web services. Marbaselios Institute of Technology. it serves to hold and pass mail for local users. The real power of “Intranet Mail Server” is that it can be connected to a Internet Service Provider and pass mail to and from the large world.NET framework. Therefore can provide individual.
address book. bulk and folders. diary.3 PROBLEM DEFINITION AND DESCRIPTION Defining the problem: Develop a definitive statement of the problem to be solved including the description of the present situation problem constraints and a statement of goals to be achieved.University of Kerala 3. login. the software and the people system. The proposed system uses database for data and this provides more security. Marbaselios Institute of Technology. The problem statement should be phrased in customer’s terminology. Moreover the proposed system provides automatic deletion of the messages. The proposed system provides free service and it is user friendly. The intranet mail server is divided into twelve modules. The existing system uses file system for storing the values. forgot password. Anchal 17 . draft. They are registration. Identify the function to be provided by constraints on hardware system. Establish high-level acceptance criteria for system. inbox. Justify a computerized solution strategy for problem. Determine the system level goals and requirements for development process and work product. trash. The existing system is an expensive software and more over the users must take measures in protecting their computers from hackers intrusion. Moreover the proposed system uses the database access and user defined classes based on the object-oriented concept for making the application completely secured over the network. settings. compose.
Then the inbox module will allow the user to check the incoming messages. Anchal 18 . The folder module will allow users to create various folders. It will also provide provision for adding or deleting individual contacts. The messages which are deleted from the inbox are stored in the trash module. In this module. The draft module will allow us to see the messages which are drafted. The settings module will allow the users to change their password. users can unspam and delete the messages. The address book will allow users to view individual contacts. After viewing the messages the user can delete the messages or spam the messages. The user can login using his password and id. Marbaselios Institute of Technology.University of Kerala The registration module will allow a new user to create the mail id by filling and submitting the registration form. The compose module will allow the user for creating new messages and the user can save the messages as draft. The diary module will allow users for writing information and we can view it later. The bulk module will allow the users to view the messages that are spammed.
University of Kerala SYSTEM ANALYSIS Marbaselios Institute of Technology. Anchal 19 .
NET offers several important advantages over previous Web development models such as enhanced performance.University of Kerala 4. Programming with C# using .NET is a major component of Microsoft Visual Studio . SQL Server 2000 Marbaselios Institute of Technology. While choosing package we have to examine its of cost and its reliability.1 PACKAGE SELECTION Front End Back End : Microsoft ASP .NET suite. All .NET is called C#.NET 2003 with C# : Microsoft SQL Server 2000 According to system requirements package selection is important.NET is a new programming and operating framework introduced by Microsoft. The . C#. Microsoft . ASP.NET is a programming framework built on the common language runtime that can be used on a server to build powerful Web applications. world class tools support.NET C#.NET version of C# is a new improved version with more features and additions. The following effectiveness environments are chosen for “Intranet Mail Server”. ASP.NET ASP.NET library to develop applications and share common tools to execute applications. power and flexibility etc. Anchal 20 .NET.NET supported languages access a common .
Hardware support The ability to support a wide range of hardware was a major design goal for windows 2000. digital cameras. scanners. sound cards. including monitors.University of Kerala Microsoft SQL Server 2000 includes powerful features to support international operations and environments. This article is not limited to a list of features but also will explain how international/multilingual requirements can affect many aspects of a project. plug and play and ACPI. This article provides a complete overview of how to use these features in a global context. printers. DVD drives. Windows 2000 supports self-repairing applications. The central task of a database is obviously the storage of data. The operating system provides drives for many types of peripherals. Extensive multilingual features make SQL Server 2000 a compelling database product and applications platform. These Marbaselios Institute of Technology. Anchal 21 . CDRW (CD read/write) drives. and networks cards. Ease of use The operating system is designed so that users who need to perform a specific task can intuitively figure out how to accomplish that task. Following are some of the features that make windows 2000 easier to use: The installation process is simpler that the process for windows NT installation and requires less user input The user shell is more logically organized and offers more customization option Users can easily add hardware.
Anchal 22 . Marbaselios Institute of Technology.University of Kerala features reduce the possibility of system down time and when new hardware is installed.
The number of people required for the software project can be determined only after as estimate of development effort is made. Each resource is specified with four characteristics.2. The four software resource categories are. Both For organizational and relatively small project. 4. a single individual may perform all software engineering tasks. reusable resource and environmental resource. Description of resource Statement of availability Time when the resources will be required Duration of time that the resource will be applied.1 Human Resources The planner begins by evaluating the scope and selecting the skill required position for complete specialty development. are specified. consulting with the specialist as required. Anchal 23 .2 RESOURCES REQUIRED A development resource contains human resources.2.2.University of Kerala 4. 4. software components should be categorized for easy reference. standardized and validated for easy integration. Off-the-shelf components Full-experience components Partial-experience components New components Marbaselios Institute of Technology. Reusable software resources To be reused effectively.
1 Technical Feasibility Technical feasibility deals with the existing technology and software and hardware requirements of proposed system. The hardware provides a platform that supports the software required to produce the work products that are the outcome of good software engineering practice.University of Kerala 4. The proposed system must be evaluated from the technical point of view first and if this technically impact on the organization must be accessed.3 Environment Resources The environment supports the software project. impact on the organization. Technical feasibility Behavioral feasibility Economical feasibility Operational feasibility 4. Feasibility is the determination of whether or not a project is worth doing. ability to meet user’s needs and efficient use of resources. 4.2. It should be conducted completely and no fundamental errors of judgments are made.3 FEASIBILITY STUDY Feasibility study is a system proposal according to its workability. If compatible social and technical systems can be devised then the system must be tested for economic feasibility.3. Thus the tool is accessed for. Technical feasibility centers on the existing computers and to what extend it can support the proposed Marbaselios Institute of Technology. Generally feasibility studies are undertaken within right time constraints. Anchal 24 . often called the software engineering environment and incorporates hardware and software.
NET framework needs to be installed. Proposed system is economically feasible because it uses available resources rather than special additional resources. The interface designed is ambiguous. For report handling a printer will be required. increased profits and reduction. Considering the technical factors the company has the major servers to handle traffic. It requires a computer connected to a network. The . The proposed system provides latest hardware and software support. This is an ongoing effort that improves accuracy at each phase of the system life cycle. The RDBMS needs to be purchased as a package. Economic feasibility Economic feasibility is concerned with cost savings. Anchal 25 . more commonly known as cost/benefit analysis.3. Marbaselios Institute of Technology. Software development cost is much less. Hence it is behavior feasible. The proposed system provides latest software & hardware support.3.3. Behavioral feasibility The new tool doesn’t require any staff maintenance. 4.2. 4. Proposed system is economically feasible because it uses available resources rather than special additional resources. In order to develop the tool. Software development cost is much less. The procedure determines the benefits that are expected from the candidate system and compare them with costs involved. It does not needs any extra training. If the benefits outweigh the cost then the system is economically feasible. Economic feasibility is the most frequently used method for evaluating the effectiveness of the candidate system.University of Kerala addition.
Anchal 26 .University of Kerala 4. SYSTEM DESIGN Marbaselios Institute of Technology.3.4 Operational Feasibility The needs of user are fully satisfied.
From a project management point of view. The term “Design” is defined as ‘The process of applying various techniques and principles for the purpose of defining a process or a system in sufficient details to permit its physical realization’. Preliminary design is concerned with the transformation of requirements into data and software architecture. System design transforms a logical representation of what a given system is required to be in physical specification. high-end decisions are taken regarding the basic system architecture.1 INTRODUCTION TO SYSTEM DESIGN Design is important in the development phase for any engineered product or system. throughput of the system. software design is conducted in two steps. A good design is the key to effective system. response time. Marbaselios Institute of Technology. Anchal 27 . data structure and representation of software. Software design sits at the technical kernel of software engineering process and is applied regardless of the development paradigm that is used.University of Kerala 5. expandability etc were taken into account. Detailed design focuses on the refinement to the architectural representation that lead to detailed algorithm. Important design factors such as reliability. maintainability. Design is a creative process. In System design. The design process starts with the system requirement specification and converts it to physical reality during the development.
The Marbaselios Institute of Technology. and the relationship among them. Architectural design is aimed at trying to refine the conceptual view of the software product. facilitates changes and results in easier implementation by encouraging parallel development of different parts of the system. The primary objective is to develop a modular program structure and represent the control relationship between modules. Architectural design is the process of identifying these subsystems and establishing a framework for the subsystem controls and communication. It permits a system’s quality attributes such as performance or reliability. For the development of this software. The modular design reduces the complexity. This software was developed into separate named and addressable components that are integrated to satisfy the problem requirements. modules were identified. which comprises software elements. A good software structure design results in the development of a project working system.2 ARCHITECTURAL DESIGN Architectural design of a computing system is the structure of the system. Anchal 28 . Large systems can be decomposed into subsystems that provide some related set of services. Architectural design forms the back born for building successful software intensive system. the externally visible properties of those elements. In addition architectural design modules program structure and data flow through the program.University of Kerala 5. Architectural design defines the relationship between major structural elements of the program. The procedural design transforms structural elements of program architecture into a procedural description of software components.
The first level is the user interface (Presentation Logic).University of Kerala architectural design considers architecture as the most important functional requirement. The system is based on three-tier architecture . Presentation Logic Web Pages Web Pages Desktop Window Web Pages Business Logic Custom Component Custom Component Custom Component Data Logic Database Database Text/Binary Files 29 Marbaselios Institute of Technology. Anchal . The important feature about three-tier design is that information only travels from one level to an adjacent level. The second level is the business layer (business Logic) where the application-specific logic takes place. and receives and validates user inputs. which displays controls. The Third level is the data layer where the application information is stored in files or database. All the event handlers in the web form are in the first level. It contains logic about to retrieve and update data.
Process models are draw in the form of a set of DFD and these are later used to guide the creation of processing logic. Completeness checks ensure that all the fields in a record are present and read in the proper sequence. The DFD are central to the logical system specification. Each data stores should contain all the data elements that flow in and out. Marbaselios Institute of Technology.3 DATA FLOW DIAGRAM A Data Flow Diagram (DFD) is a graphical technique that depicts information flow and the transformations that are applied as data move from input to output. Data Flow Diagrams (DFD) are commonly used to get a pictorial representation of the various processes occurring within the system. In addition to batch controls. Consistency check refers to the relevance of one type of data or another.University of Kerala 5. Reasonable check evaluates the transaction against standard to determine whether it meets the test. This is how the term data processing originated. when the system is physically created. One such is the batch processing. The following are some advantages: Provide an overview of DFD and the transformation of data. Process modeling involves figuring out how data will flow within the system and what steps to perform on the data. several other programmed checks can use for testing the data. Several methods have been devised to control processing activities. Act as a god communication tool with users. Anchal 30 . which shows the minimum content of data stores.
Anchal 31 . data records are in Marbaselios Institute of Technology.University of Kerala Sequence check verifies that sequence prior to processing.
Data are stored in a data store by a process in the system. Marbaselios Institute of Technology. so it does not depend on hardware. Entities supplying data are know as source and those that consume data are called links. A DFD describes what data flow (logical) rather than how they are processed. Then the processes are decomposed into several elementary levels and are represented in the order of importance. Anchal 32 .University of Kerala COMPONENTS OF A DFD Here are different diagrammatic notations for drawing a DFD. Processes: Data Flows: Source or Sink: Data Stores: Bubbles or curved rectangles represents the processes and arrows indicate the dataflow. software. External entities are represented by rectangles and are outside the system such as users or customers with whom the system interacts. Context level DFD is draw first. Process name are further identified with number. They either supply or consume data. Each component in a DFD is labeled with a descriptive name. and data structure or file organization.
The DFD is easy to understand after a brief orientation. Anchal 33 .University of Kerala A DFD methodology is quite effective. especially when the required design is clear and the analyst need a notation language for communication. LEVEL 0 DFD Prospective Registration or Sign In User Intranet Mail Server Sign Out End User Marbaselios Institute of Technology.
Anchal 34 .University of Kerala LEVEL 1 DFD Forgot Password User Details Sign Up Sign In Registration Store Password User Login User Details DataBase Details Check Mail Store DataBase Mail Details Marbaselios Institute of Technology.
University of Kerala LEVEL 2 DFD DataBase DataBase Password Forgot Passwor d Registration User Details Sign Up Continue to Message Login User Sign In Compose DataBase Send Change DataBase Check Mail Password My Settings View Add Contact Spam Inbox Delete Bulk Trash Draft Save Addres s Book Marbaselios Institute of Technology. Anchal 35 .
University of Kerala DataBase Marbaselios Institute of Technology. Anchal 36 .
It comprises the developing specification and procedures for data preparation and those steps are necessary to put transaction data into usable form for processing data entry. The goal of designing input data is to make data entry as easy and it should be free from error as possible.1 Input design In input design. Anchal . avoiding extra steps and keeping the process simple. To control workflow To reduce redundancies in recurring data To increase clerical accuracy To allow easier checking of data The design of input focuses on controlling the amount of input required. The input design is the part of the overall system design that requires careful attention.4 I/O FORM DESIGN 5. A well designed input should serve four purposes. depreciation rates.University of Kerala 5. The collection of input data is the most expensive part of system.4. asset transfer and physical verification for various validations and checking. The error raising method is also included in the software. user-oriented inputs are converted to a computer based format. 37 Marbaselios Institute of Technology. The system needs the data regarding the asset items. controlling errors. Input design is the link between information system and user. which helps to raise error messages while wrong entry of input id done. The activity of putting data into the computer for processing can be achieved by inspecting the computer to read data from a written or printed document or it can occur by having people keying data directly into the system.
intelligible output design should improve the system’s relationship with the user and help in decision making. draft. Select methods for presenting information. Anchal 38 . bulk. reports. address book and sign out. Input forms for login which allow the users to login and new user registration form.4.University of Kerala The input design is actually the designing of the forms. Create documents. Efficient. they Identify the specific output that is needed to meet the information requirements. 5. or the formats that contain information produced by the system. Since the reports are directly referred by the manta for taking decisions and to draw conclusions they must be designed with almost care and the details in the reports must be simple. Depending on the nature and future use of output required. When analyst design computer output. descriptive and clear to the user.2 Output Design Output design is a process that involves designing necessary outputs in the forms of reports that should be given to the users according to the requirements. compose. The major forms included in Intranet Mail Server are. Designing computer output should proceed in an organized manner: the right output must be developed while ensuring that each output element is designed so that people will find the system easy to use. they can be Marbaselios Institute of Technology. Computer output is the most important and the direct source of information to the user. Input forms for inbox. trash.
Anchal 39 .University of Kerala displayed on the monitor for immediate need and for obtaining the hardcopy. Marbaselios Institute of Technology.
NET and SQL Server. quick.University of Kerala 5. Database design is recognized as a standard of management information system and is available virtually for every computer system. The coding depends on the logical and detailed design of the system in the system design phase. The phase ends in an operational model of the proposed system.5 DATABASE DESIGN A database is a collection of interrelated data stored with minimum redundancy to serve many users quickly and efficiently. 5. In database design several specific objectives are considered. The general theme behind a database is to integrate all the information. The general objective is to make information access easy. inexpensive. This phase deals with coding of the proposed system using the development tools.4. and flexible for the users.3 Code Design This is one of the operational phases in the system development life cycle. In “ Intranet Mail Server” the programming environment includes the tools provided by C# and ASP. Controlled redundancy Ease of learning and use Data independence More information at low cost Accuracy and integrity Recovery from failure Privacy and security Performance Marbaselios Institute of Technology. Anchal 40 .
So table designing is a most important part of backend designing. Usually the centralized data managing the software is called RDBMS. Steps are taken to avoid unnecessary replication of data and to achieve maximum data consistency and integrity. Identifying Keys Once we have drawn up the lists of possible tables and fields. Primary Keys A primary key (PK) consists of a field or a set of fields that uniquely identify each record in that table . Anchal 41 . DESIGN CONSIDERATION The system is analyzed to the requirements and possible tables and fields are identified. The appropriate data type is chosen for the effective storage and manipulation of information. Foreign Keys A foreign key (FK) comprises a field.University of Kerala A database is an integrated collection of data and provides centralized access to the data. the next step in the logic database is to identify and foreign Keys for each table. The main significant difference between RDBMS and other DBMS is the separation of data as seen by the program and data has stored in direct access to stores device. or multiple fields that link to the primary key of another table. 1.The “primary” field defines the primary key. For any database application data is stored in tables. This is the difference between logical and physical data. Another important Marbaselios Institute of Technology. 2.
deletion and updating anomalies. Each field has enough rooms to accommodate the data from domain. Anchal 42 . All the tables have been normalized up to the third normal form. Normalized data structures exhibit more desirable properties. which has maximum width. The properties of normalized data structures include the following. Normalization is body of rules addressing analysis and conversion of data structure into relation. Marbaselios Institute of Technology.University of Kerala matter about table designing is the field width.7 NORMALIZATION Normalization is a technique of separating redundant fields and breaking up large table into smaller one. 5. Consistency Minimal redundancy Maximum stability Normalization is used to avoid insertion.
University of Kerala 5. 5. A relation is said to be in Second Normal Form if and only if it is in first normal form and every non-key attribute is fully functionally dependent on candidate key of the table. Anchal 43 .2 Second Normal Form The Second Normal Form (2NF) is based on the concept of full functional dependency.7.7. They are drawn using rectangle. which represent entities.7. attributes and relationships respectively.1 First Normal Form A relation is said to be in First Normal Form (1NF) if all the underlying domain of attributes contain simple individual values.3 Third Normal form The Third Normal Form (3NF) is based on the concept of transitive dependency. ellipses and rhombus. Marbaselios Institute of Technology. 5. They depict the attributes between modules and data. 5.8 E-R DIAGRAM E-R diagram closely represents the relationship with entities. A relation in second normal form is said to be in third normal form if every non-key attribute is nontransitive.
Anchal 44 .I D UID Diary UID Save Dele te SendI D Rec ID Conten t Draft Date readfla g ID Subject SendI D Rec ID Conten t Bulk Date SendI D Rec ID Spa m Conten t Trash Date readfla g ID Subject readfla g ID Subject Marbaselios Institute of Technology.University of Kerala Folder Attach Path ReceiverID SendID SenderI D CC Content Send Date Subject Compose Read Flag ID Add Add Remdate e Conten t Name AddressBook Cont.
Marbaselios Institute of Technology. which is a database itself. documents the data. The data dictionary. is maintained in a dictionary. the Meta data.University of Kerala 5.9 DATA DICTIONARY Information pertaining to the structure and usage of data contained in the database. Anchal 45 . Each database user can consult the data dictionary to learn what each piece of data and the various synonyms of the fields mean.
Anchal 46 .University of Kerala CODING AND DEBUGGING Marbaselios Institute of Technology.
When the user enters his user id and password. its validity is checked in the database.University of Kerala 6. password. The login module will allow users to login in to his mailbox using his/her user id and password. occupation Marbaselios Institute of Technology. a secret question and answer to this secret question. During registration a user is required to enter his id that he requires.1 FUNCTIONAL DOCUMENTATIONS The main modules are: Registration Login Inbox Composes Address Book Draft Trash Bulk Diary Folder Forgot Password Settings The Registration module will allow a user for creating a new account by filling and submitting the registration form. last name. date of birth. Only valid users are allowed to carry other process whereas the invalid entry is rejected. is also to be furnished. Anchal 47 . This module consists of information regarding the registration of new user and login into his mailbox. The valid user can send Personal information such as name.
The compose module will allow users to create new messages and the messages will be stored in the database. All the messages deleted from the inbox will be stored in the trash folder and from this folder the user can delete the message from the database. It also provides an option for sending attachments. Marbaselios Institute of Technology. While composing the users can save the messages as draft and these messages are stored in the draft folder. This provides the facility for a user to send email to another user by entering the details such as receiver’s e-mail address. It will also allow the users to add and delete individual contacts.University of Kerala and receive mails through the intranet. After viewing the users can delete the messages. This module will display the email messages received by the user in a conversation format with which he has the correspondence. Anchal 48 . In case if his user id and password is invalid then he is prompted to re-login again. The trash module indicates the email messages deleted from inbox. Users can utilize a measure to share files between one another including word processing documents. subject and message. After viewing the messages users can delete and spam the messages. You need a mailbox that resides on a mail server and is set up to handle your incoming mails. The inbox module is used to display the mails received by the user in a sorted manner. The address book will allow users to view the contacts in the address book. programs or any other types of computer files. The draft module will allow the users to view the messages that are saved as draft.
he can do so by entering a new password. its biggest initiative since the launch of Windows in 1991. If the user wishes to change the password. Then he asked to enter the new password and the confirm password. independent of the platforms.1 Microsoft . 6. To ensure security first user is asked to enter the old password. Diary provides a provision for writing and storing the information and also allows viewing it later. For security reasons it is desirable to change password. The forgot password module helps the user to retrieve his password.NET is a revolutionary multi-language platform that knits various aspects of application development together with the Internet.University of Kerala The bulk will allow users to view the messages that are spammed and it will also allow the users to unspam and delete the messages. The user is required to answer his id. The settings will allow the user to change existing user password and to create new password. the clue question and answer and his date of birth he entered while registered. This module will display the email messages moved from inbox to user created folders.2 SPECIAL FEATURES OF LANGUAGE 6. PCs and devices seamlessly. All Marbaselios Institute of Technology.NET Microsoft released the .NET framework in February 2002. architecture and solutions.NET initiative is all about enabling data transfer between networks. country. Microsoft . The .2. The folder module is used to create various folders to keep the users inbox in a sorted way. Anchal 49 . When the user submits this form his password is automatically updated.
The framework is language neutral.3 Asp. which can be understood by the computer processor.like ADO. It is a platform for XML web services.NET delivers software as web services . It contains common class libraries. Java . deploying and running web services and web applications.2.NET will run in any browser on any platform 6. VB.NET framework is the infrastructure for the new Microsoft .NET is the next generation platform for building web applications and web services.net Marbaselios Institute of Technology.NET is a new internet and web based infrastructure .NET is a server centric computing model .NET is not a new operating system .NET programs are compiled to an intermediate language (IL) rather than to native code.NET and windows forms –to provide advanced standard services that can be integrated into standard services that can be integrated into computer systems.NET is Microsoft’s new internet and web strategy .NET etc. It helps the runtime and garbage collection keep track of memory that will be released back to the operating system when it is no longer needed. ASP. Microsoft’s . Currently it supports VC++.2 The .NET platform. MSIL must be converted to CPU– specific code by a just in time (JIT) compiler.University of Kerala . Areas of Microsoft .NET is a framework for universal services .NET framework The .2. C#.NET.NET. Anchal 50 . 6. It is a common environment for building.
• Power and flexibility Because ASP. messaging and data access solution are all seamlessly accessible from the web.NET is compiled common language runtime code running on the server.net offers several important advantages over previous web development models.NET framework class library. • Enhanced performance ASP.NET is also language independent. ASP. and caching services right out of the box.net is a programming framework built on the common language runtime that can be used on a server to built powerful web applications.University of Kerala Asp. WYSIWYG editing. just-n-time compilation. common language runtime interoperability Marbaselios Institute of Technology. Anchal 51 . so you can choose the language that best applies to your application or partition your application across many languages. The .NET framework. This amounts to dramatically better performance before you ever write a line of code.NET is based on the common language runtime.NET can take advantage of early binding. drag and drop server controls. • World-class tool support A rich toolbox and designer in the visual studio integrated development environment complement the ASP. Asp. Further. the power and flexibility of that entire platform is available to web application developers. native optimization. and automatic deployment are just a few of features this powerful tool provides. Unlike its interpreted predecessors. ASP.
NET. hierarchical configuration system. No server restart is required.. which simplifies applying settings to your server environment and web applications. from simple form submission and client authentication to deployment and stir configuration. Because configuration information is stored as plan text. ASP.University of Kerala guarantees that your existing investment in com-based development is preserved when migrating to ASP.NET framework applications as well. the common language runtime simplifies development.NET page framework allows you to build user interface that cleanly separate application logic from presentation code and to handle event in a simple visual basic –like forms. An ASP.net makes it easy to perform common tasks. Processing model additionally. Anchal 52 . even to deploy or replace running compiled code. • Security With built in windows authentication and pre-application configuration. Marbaselios Institute of Technology. you can assure that your applications are secure.g. This “zero local administration” philosophy extends to deploying ASP. • Simplicity Asp. new settings may be applied without the aid of local administration tools. • Manageability ASP.NET framework application is deployed to a server simply by copying the necessary files to the server.NET employees a text based. For e. with managed code services such as automatic reference counting and garbage collections.
NET platform currently offers built-in-support three languages: C#. Anchal 53 .NET applications. These exercise and code samples in this tutorial demonstrate how to use C#.University of Kerala LANGUAGE SUPPORT: The Microsoft . Visual Basic and Jscript. Marbaselios Institute of Technology. Visual Basic and Jscript to build .
Features of C#.NET suite.NET is a new framework introduced by All .NET version of C# is a new improved version with more features and additions. The users can use inheritance to define new forms based on existing forms designed by users are really classes.NET are inheritable. The . logic or system errors.NET Inheritance Inheritance is one of the most used techniques in an object-oriented language. and operating Microsoft . The properties and methods of the base classes are inherited and extended by the derived classes. programming Microsoft.University of Kerala 6. If a user 54 Marbaselios Institute of Technology.NET supported languages access a common .4 C# . Inheritance refers to the properties of a class being available to many other classes.NET is a major component of Microsoft Visual . The exceptions are anomalies that occur during the execution of program. By default all the classes created with C#. Exception Handling Exception handling is an in built mechanism in . Inheritance provides ability to use an existing class’s functionality via its derived (inherited) class.NET library to develop applications and share common tools to execute applications. Anchal .2. The .NET Framework contains lots of standard exceptions. They can be because of user.NET C#.NET framework to detect and handle run time errors.
Overloading C#. which terminates the program execution.e.NET run time environment provides a default mechanism. number and type of arguments. Anchal 55 . overridable by default but if a method in the base class is keyword the Overrides keyword marked with the overridable can be used in derived class to define new implementation of the inherited method. i. as method in the super class.University of Kerala (programmer0 do not provide a mechanism to handle these anomalies. Using this keyword. The . catch and finally to do exception handling. name. Overriding Overriding is the creation of a method in the subclass that has the same signature.NET provides three keywords try. hides the method of super class. C#. Constructors and Destructors Marbaselios Institute of Technology.NET supports method overloading using the overload keyword. This new method Derived classes inherit the All methods are not methods defined in their base class. Try encloses the statements that might throw an exception whereas catch handles an exception if one exists and finally can be used for doing any clean up process. you can declare same method names with different arguments.
destructors are methods that are used to free system resources when a class leaves scope or is set to nothing.University of Kerala The procedures that control initialization of new instances of a class are known as constructors. Conversely. Anchal 56 . Marbaselios Institute of Technology.
2. such as more hardware support and reduced cost of ownership. The use of active desktop. Sub New method will only run once when a class is created. Anchal 57 . Added support for the advanced configuration and power interface (ACPI). 6. Features from Windows NT 4 Windows NT workstation 4 is a foundation upon which windows 2000 is build.University of Kerala C#.NET supports constructors and destructors using the Sub New and Sub Dispose procedures. Features from Windows 98 Support for plug and play.5 Introduction to windows 2000 Windows 2000 integrates the best features of both windows 98 and Windows NT 4 operating systems and adds other features. which integrated the users browser and shell into a single integrated desktop. which allows the operating system to recognize and configure hardware without any user intervention. which is an external serial bus standard that allows a single USB port to support up to 127 devices. Added support for the universal serial bus (USB). USB supports hot-plug and plug and play technology. The following features that made Windows NT for a powerful operating system are included in Windows 2000: Marbaselios Institute of Technology. considered being the next generation of power management for plug and play technology.
University of Kerala An operating system with a high degree of reliability. 6. Local security that is built into the operating system. Features of SQL Server 2000 Microsoft SQL Server 2000 features include. Internet integration Scalability and availability Enterprise-level database features Data warehousing. Anchal 58 . which allows us to set local security for the file system. Windows 2000 is more robust and less likely to crash than windows9x operating systems. Support is also included for the NTFS file system. Windows 2000 requires that users be authenticated with a valid logon name and password before they can access the computer.6 Introduction to SQL Server 2000 Microsoft SQL Server 2000 is a set of components that work together to meet the data storage and analysis needs of the largest websites and enterprise data processing systems.2. DATABASE ARCHITECTURE Client Application Client Application Client Application SQL Server Marbaselios Institute of Technology.
msdb) and one or more user databases. with safe guards that prevent the problems. SQL Server 2000 also allocates the available resources effectively. Marbaselios Institute of Technology. among the multiple users. A database is also physically implemented as two or more files on disk. such as having multiple users trying to update the same piece of data at the same time. Anchal 59 . bandwidth and disk input/output. Large servers may have thousands of users connected to an instance of SQL Server 2000 at the same time. model tempdb. network. SQL Server 2000 as full protection for these environments. Advantages of SQL Server 2000 as a Database Server Microsoft SQL server 2000 is capable of supplying the database services needed by extremely large systems. Each instance of SQL server has four system databases (master. The data in a database is organized into logical components visible to users.University of Kerala Microsoft SQL Server 2000 data is stored in database. such as memory.
3 ALGORITHM Start Program New user will register. Move message to user created folder Step 1: Step 2: Step 3: Step 4: Step 5: Step 6: Choose Compose for the following options a. View messages that are saved as draft b. Delete message d.University of Kerala 6. Spam message c. Anchal 60 . Enter user name and password Valid user login. Sending message b. Viewing messages that are spammed b. Choose Inbox for the following options a. Delete message c. Save as draft Step 7: Choose Bulk for the following options a. Unspam message Step 8: Step 9: Choose Bulk empty for empting the bulk folder Choose Draft for the following options a. Delete message Marbaselios Institute of Technology. Viewing incoming message b.
Add contacts c. View individual contacts b. To view the messages deleted from inbox b. Anchal 61 . Delete message permanently Step 11: Step 12: Choose Folder to view messages in user sorted way. Marbaselios Institute of Technology. Choose SignOut for signing out. Delete contacts Step 13: Step 14: Step 15: Choose My Settings for changing password Choose Forgot Password for knowing password if user had forgotten the password. Address book for the following option a.University of Kerala Step 10: Choose Trash for the following options a.
Anchal 62 .University of Kerala TESTING Marbaselios Institute of Technology.
The system test in implementation should conform that all is correct and an opportunity to show the users that the system work as expected.1 TYPES OF TESTING DONE 7.1. The primary objective of testing is to derive a set of tests that has the highest likelihood for uncovering defects in the software. Testing is vital to the success of the system. Execute all loops at their boundaries and within their operational bounds. the It accounts the largest percentage of technical cycle validates the code against the effort in the software development process.University of Kerala 7. Testing phase in development functional specification. Using the white box testing methods. Marbaselios Institute of Technology. They are White Box Testing Black Box Testing White box is a test case design method that uses the control structure of the procedural design to derive test cases. Anchal 63 .1 System Testing System testing is the stage of implementation highly aimed at ensuring that the system works accurately and efficiently before the live operation commences. This testing should Exercise all logical decisions on their true and false sides. There are two categories of test case designing techniques. we derived test cases that guarantee that all independent paths within a module have been exercised at least once.
Testing progress by moving outward along the spiral to the integration testing where the focus is to design and construction of the software architecture.2 Unit Testing In unit testing each module of the project is individually tested.University of Kerala Exercise internal data structures to ensure their validity. the software or module to be tested is treated as a black box and the test case is decided based on specifications of the system or module. Anchal 64 . Unit testing begins at the vertex of spiral and concentrates on each unit of the software as implemented from the source code. Black box testing might be called testing in large. performance errors and initialization and termination errors. Unit testing focuses verification efforts and small unit Marbaselios Institute of Technology. errors in external database access. that will result in the execution of every instruction on the program or module. Test cases are developed. 7. Taking another turn out of the spiral. the performance of the program according to the specified requirements can be determined. The specification states what the program should do and how it should perform under various conditions used. Another strategy of the software testing may be envisaged by moving outward along the development spiral. we finally encounter validation testing. It tests the external behavior of the system. By examining the result. So this testing is also called black box testing. The test cases are developed for processing.1. In functional testing. interface errors. Black box testing is done to find incorrect or missing function.
Unit testing heavily make use of white box testing strategies exercising specific paths in a modules control structure to ensure complete coverage and maximum error detection. If the module receives input or The test cases needed for unit testing must exercise each condition and option. combination of inputs. In this testing of each module and the integration of the overall system is done. each dialog was tested and run individually.1. purpose. 7. The need for the integrated test is to find the overall system performance. specified requirements. For this the relationship between the modules is tested. Any logical errors found were corrected. each module is found to be working satisfactorily as regard to the expected output from the module. Anchal 65 . It is very easy to find error and debug the system. This is the first level of testing.3 Integration Testing Integrated testing is a systematic testing that can be done with sample data. Unit testing focuses on modules to locate errors. generates output test case are needed to test the range of values expected including valid and invalid data.University of Kerala of software design in the module. All the unnecessarily coded statements were removed and it was endured that all the functionalities worked as expected. In this testing step. test cases are developed for each condition or By examining the results it can be In this project the modules that are determined whether the program performs according to its Marbaselios Institute of Technology. In integration testing. After coding. There are some validation checks for the fields. This testing is carried out during the programming stage itself.
which are then tested. software is completely assembled as a package. Validation refers to the process of using the software in a live environment to find errors. Many test modules are combined into subsystems. but a single definition is that validation succeeds when the software functions in a manner that can be reasonably expected by the customer. Black box test case design techniques are the most prevalent during integration. The modified software is then subjected to phase two in the actual users site or live environment. During the course of validation system failure may occur and the software will be changed.4 Validation Testing After the culmination of black box testing. Integration testing is the systematic technique for constructing the program structure by condition tests to uncover error associated with the interfacing. 7.1. System validation checks the quality of the software in both simulated and live environments.University of Kerala specified in unit testing are testing are tested for their relationships. interfacing errors have been uncovered and corrected and final series of software validation tests begin. Validation testing can be defined as many. Anchal Integration test addressing the issues associated with the dual problems of 66 . Integration testing is a verification of the interface among system parts. First the software goes through a phase in which errors and failures based on simulated user requirements are verified and studies. verification and program construction. Rigorous integration is conducted to make the application free for any interface errors that may occur during transactions. Validation testing provides the Marbaselios Institute of Technology.
Source code clarification is enhanced by structural coding techniques. testing and modification. 7.2 TEST DATA AND RESULTS The primary goal of software implementation is the production of source code that is easy to read and understand. The developer guides the end user all the way while observing the reaction and feedback. In our implementation phase.1. by appropriate supporting documents. The result of the new system is compared with the old system and suppose the result is wrong the error must be debugged. Clarification of source code helps in easier debugging. As a result of this the software developer makes modification and then prepares for the release of the software product to entire customer base. by good coding style.6 Beta Testing Beta testing releases the produce to the end user.University of Kerala final assurance that the software meets all the functional. behavioral and performance requirements. 7. Marbaselios Institute of Technology. by good internal comments and by the features provided in the modern programming language. 7. source code contains both global and formal variables.5 Alpha Testing The developer in collaboration does alpha testing with the end user. He is at liberty to proceed as the requirements dictate. The user records all the problems that are encountered during beta testing and reports these to the developer at regular intervals. It contains predefined functions as well as the user defined functions.1. Anchal 67 .
The Any user can work in this package very easily. Message cannot be deleted Marbaselios Institute of Technology. Registration failed 9.University of Kerala After the acceptance of the system by the user.3 ERROR MESSAGES The error messages that appear in this project are: 1. Password mismatch 4. It does not require any intensive training for the user. Password cannot be changed 7. Intranet Mail Server has been made user friendly. Invalid details given 8. Anchal 68 . User login failed 5. 7. Invalid user id 2. the existing system must be replaced by this new system. Invalid password 3. Procedures and functions in the system are very simple that any one can understand and correspondingly act to the system with no difficulty. Message cannot be sent 6.
Anchal 69 .University of Kerala USER MANUAL Marbaselios Institute of Technology.
so it is used for building and running all kinds of including applications. software.2 : : : : : : : : : Pentium IV 1. Scroll mouse 108 Keys 500 MHZ 32 Bit SOFTWARE REQUIREMENTS : : : : : : : Windows 2000 Professional IIS Microsoft . It is designed to operate without any manual intervention during normal operation.NET 2003 ASP. Anchal 70 .NET SQL Server 2000 Internet Explorer 6. The application strongly supports MS.NET C#.2 GHz 128 MB 40 GB SVGA Color Monitor Ordinary. smart client framework.3 SYSTEM OVERVIEW The proposed system is developed for those who are working in an intranet environment for sending and receiving of secured mails. The Registration module will allow a user for creating a new account by filling and submitting the registration form. and XML Web services.NET Web-based applications. Marbaselios Institute of Technology.0 Operating System Web Server Environment Front End Tool Server Side Scripting Back End Browser 8.1 HARDWARE REQUIREMENTS Processor Processor Speed RAM Hard Disk Drive Monitor Mouse Keyboard Clock speed System Bus 8.University of Kerala 8.
The folder module is used to create various folders to keep the users inbox in a sorted way. The inbox module is used to display the mails received by the user in a sorted manner. It also provides an option for sending attachments. Anchal 71 . The draft module will allow the users to view the messages that are saved as draft. Marbaselios Institute of Technology. its validity is checked in the database. Bulk will allow users to view the messages that are spammed and it will also allow the users to unspam and delete the messages. The compose module will allow users to create new messages and the messages will be stored in the database.University of Kerala This module consists of formation regarding the registration of new user and login into his mailbox. Only valid users are allowed to carry other process whereas the invalid entry is rejected. The login module will allow users to login in to his mailbox using his/her user id and password. The address book will allow users to view the contacts in the address book. Trash module indicates the email messages deleted from inbox. When the user enters his user id and password. The forgot password helps the user to retrieve his password. This module will display the email messages received by the user in a conversation format with which he has the correspondence. It will also allow the users to add and delete individual contacts. Diary provides a provision for writing and storing the information and also allows to view it later.
A new user can create his account by filling and submitting the registration form. provision for saving the messages as draft. It provides provision for The User can view his incoming messages in the Also it provides The users can inbox and after viewing he can delete the messages. Anchal 72 . Only valid users are allowed to login. a user can utilize all the facilities available in the system. 8. It also provides facility for It will also allow users to add and delete individual contacts and provides provision for knowing password if user had forgotten it. sending mails.University of Kerala The settings will allow the user to change existing user password and to create new password. deleted messages are stored in the trash. creating folders and changing password.4 BEGINNER’S GUIDE A user can login by giving his id and password. spam and unspam the messages. After login using his id and password. Marbaselios Institute of Technology.
University of Kerala
SYSTEM IMPLEMENTATION Implementation is the process of converting a new or
revised system design into operation. It is the key stage in achieving successful new system because; usually it reveals a lot of up heal the use department. The process of putting the developed system in actual use is called system implementation. This includes all those activities that take place to convert from the old system. It must therefore be carefully planned and controlled. Apart from planning the two major tasks of preparing for implementation are education and training of users and testing of the system. Education of users should really take place much earlier in the project i.e. when they are involved in the investigation and design work. Training has be given to the staff regarding the new system. Once staff has been trained, the system can be tested. Implementation is the stage of the project where the theoretical design is turned into working system. Therefore it must be carefully planned and controlled. It can also be considered to be the most crucial stage in achieving a successful new system and giving the user confidence that the new system will work and be effective. Implementation is the final and important phase. It is the phase where theoretical design is turned into working system, which work for user in the most effective manner .It involves careful planning, investigation of the present system and the constraint successful involved, running user of training, system testing system. and The developed proposed
implementation process begins with
preparing a plan for the
implementation of the system. According to this plan, the activities are to be carried out discussion made regarding the
Marbaselios Institute of Technology, Anchal
University of Kerala
equipment and resources and the additional equipments has be acquired to implant the new system. The user tests the developed system and changes are made according o the needs. The testing phase involves the testing of a system using various kinds of data. This method also offers the greatest security since old system can take over if the errors are found or inability to handle certain type of transaction while using the new system. An elaborate testing of data is prepared and the system is tested using that data. while testing ,errors are noted and corrections are made .The users are trained to operate the developed system .Both hardware and software are made to run the developed system successfully in nature. The method of implementation and the scale to be adopted re found out initially. Next the system is tested properly and the users are trained in the new procedures. 8.6 SYSTEM MAINTENANCE The term ‘Software Maintenance’ is used to describe the software engineering activities that occur following delivery of a software product to the customer. The maintenance phase of the software life cycle is the time period in which software product performs useful work. Maintenance products, activities involve enhancement to new to software and adapting products environments
correcting problems. It is defined by describing four activities that are undertaken after a program is released for use. The four different maintenance and preventive maintenance or reengineering only about adapting existing system all maintenance work that spent to changed in their external
environment, making enhancements requested by the users,
Marbaselios Institute of Technology, Anchal
University of Kerala
and reengineering an application for future use. is relatively easy to see why it absorbs too much effort.
maintenance is considered to encompass all these activities, it Maintenance involves the software industry captive, typing up system resources. It means restoring something to its original condition. Maintenance involved a wide range of activities including correcting, coding and design errors, updating documentation and test data and upgrading user support. Maintenance is continued till the product is reengineered or deployed to another platform. Maintenance is also done based on fixing the problem reported, changing the interface with other or hardware enhancing the software. An organization that is making a commitment to a software system must be assured that the software system will continue to be available and that will be maintained to suit the changing requirements. System maintenance can be termed as an enigma of system development. It holds the software industry captive, toping up programming resources. Maintaining covers a wide range of activities including correcting codes and rectifying errors, updating documentation and test data upgrading user support. The software must be so flexible so that it can meet changing requirements and varying user needs. So the maintenance of the software becomes easy.
Marbaselios Institute of Technology, Anchal
University of Kerala CONCLUSION Marbaselios Institute of Technology. Anchal 76 .
This endeavor has proved extremely fruitful. This system has been found to work efficiently and effectively. The project on implementation provides facility for sending and retrieving of secured mails in an intranet environment. Anchal 77 . The project is developed as a web application. All the inputs given are validated properly. It is very much easy to understand. Viewing through the system development. The system is found to be 100% error free and ready for implementation. Another feature is that it is highly user friendly. The maintenance of the system is less when compared with the existing system. The system is more flexible and can be modified easily whenever needed. The system provides high security.University of Kerala CONCLUSION The system “Intranet Mail Server” developed for Turbo Plus meets all of their specification. As future scope. All the suggestions in the system proposal have been successfully completed and the final threshold of the application has been crossed. which makes the output more accurate. The project “Intranet Mail server” after being tested and was found to be achieving what is meant for. attachment facilities can be implemented and also it can be hosted in the World Wide Web. Also measures can be taken to enhance the security features. a brief idea can be as follows: Marbaselios Institute of Technology.
Anchal 78 .University of Kerala Comprehending the system Studying the existing system Building the solution Designing the solution Preparing the output formats Testing the system Achieving the required results Documenting the system. Marbaselios Institute of Technology.