You are on page 1of 78

University of Kerala

INTRODUCTION

Marbaselios Institute of Technology, Anchal

University of Kerala

1.1 INTRODUCTION ABOUT THE PROJECT


The Internet Mail Server is a web based program developed in ASP.Net and C# with Database as SQL Server. The main objective of this project is to develop an application to send and retrieve electronic files to or from a persons email address. It is designed to operate without any manual intervention during normal operation. They wait for a message to be sent to them and process it accordingly or collect messages from clients and redirect them. This consists of various intranet-mailing services for a training institute. The server must be running Microsoft Internet Information Server (IIS) that has the .net framework installed. Intranet Mail Server using assemblies has the following features; Easier way to send and receive mails. Messages displayed in a sorted way. Address Book, which is used to save recipient address.

Marbaselios Institute of Technology, Anchal

University of Kerala

Using SQL database as storage. Users can use folders to save messages. The entire project is divided into twelve modules; Registration This module will allow a user for creating a new account by filling and submitting the registration form. This module consists of information regarding the registration of new user and login into his mailbox. During registration a user is required to enter his id that he requires, password, a secret question and answer to this secret question. Personal information such as name, last name, date of birth, occupation is also to be furnished.

Marbaselios Institute of Technology, Anchal

University of Kerala

Login After registering a user can login to his mailbox using his user id and password. When the user enters his user id and password, its validity is checked in the database. Only valid users are allowed to carry other process whereas the invalid entry is rejected. The valid user can send and receive mails through the intranet. Incase if his user id and password is invalid then he is prompted to re-login again. Inbox This module is used to display the mails received by the user in a sorted manner. This module will display the email message received by the user in a conversation format with which he has the correspondence. You need a mailbox that resides on a mail server and is set up to handle your incoming mails. After viewing the messages users can delete and spam the messages. Compose This module will allow users to create new messages and the messages will be stored in the database. It also provides an option for sending attachments. Users can utilize a measure to share files between one another including word processing documents, programs or any other types of computer files. This provides the facility for a user to send e-mail to another user by entering the details such as receivers e-mail address, subject and message.

Marbaselios Institute of Technology, Anchal

University of Kerala

Address book This module will allow users to view the contacts in the address book. It will also allow the users to add and delete individual contacts. Draft This module will allow the user to view the message that is saved as draft. While composing the users can save the messages as draft and these messages are stored in the draft folder. After viewing the users can delete the messages. Trash This module indicates the email messages deleted from inbox. All the messages deleted from the inbox will be stored in the trash folder and from this folder the user can delete the message from the database permanently. Bulk This module will allow users to view the message that are spammed and will also allow the users to unspam and delete the messages. Diary This module provides a provision for writing and storing the information and also allows to view it later. Forgot password If the user forgot his password, this module helps the user to retrieve his password. The user is required to answer his id, country, the clue question and answer and his date of birth he entered while registered.
Marbaselios Institute of Technology, Anchal

University of Kerala

Settings This module will allow the user to change existing user password and to create new password. If the user wishes to change the password, he can do so by entering a new password. To ensure security first user is asked to enter the old password. Then he asked to enter the new password and the confirm password. When the user submits this form his password is automatically updates. For security reasons it is desirable to change password.

1.2 ORGANIZATIONAL PROFILE

INTRANET

Marbaselios Institute of Technology, Anchal

University of Kerala

2.1 ABOUT INTRANET An intranet is a private network with Internet technology used as the underlying architecture. An intranet is built using the Internets TCP/IP protocols for communications. TCP/IP protocols can be run on many hardware platforms and cabling schemes. Intranets can co-exists with other local area networking technology. Common Gateway Interface (CGI) scripting is often used to access legacy databases from an Intranet. The Java Programming language can be used to access legacy databases as well. An increasing number of people in corporations use the Internet for communicating with the outside world, for gathering information, and for doing business. Now it is recognize that the components that worked so well on the Internet could be equally valuable internally and that is why Intranets are becoming so popular. Creating an Intranet in which all the information and resources can be used seamlessly has many benefits. TCP/IP based networks make it easy for people to access the network remotely, such as from home or while traveling. Dialing into an intranet in this way is much like connecting to the Internet, except that youre connecting to a private network instead of to a public Internet provider. Security systems separate an intranet from the Internet. A companys intranet is protected by firewalls-hardware and software combinations that allow only certain people to access the intranet for specific purposes. Intranets can be used for anything that existing networks are used for and more. The ease of publishing information on
Marbaselios Institute of Technology, Anchal

University of Kerala

the World Wide Web has made them popular places for posting corporate information such as company news or company procedures. Corporate databases with easy-to-build front-ends use the web and programming languages such as Java. Intranets allow people to work together more easily and more effectively. Software known as groupware is another important part of intranets. It allows people to collaborate on projects, to share information, to do videoconferencing, and to establish secure procedures for production work. Free server and client software and the multitude of services, like newsgroups, stimulated the Internets growth. The consequence of that growth stimulated and fueled the growth of intranets. The ease with which information can be shared, and with which people can communicate with one another will continue to drive the building of intranets. An intranet is a private corporate or educational network that uses the Internets TCP/IP protocols for its underlying transport. The protocols can run on a variety of network hardware, and can also co-exist with other network protocols such as IPX. People from inside an intranet can get at the larger Internet resources, but those on the Internet cannot get into the intranet, which allow only restricted access from the Internet.

Marbaselios Institute of Technology, Anchal

University of Kerala

2.2 E-MAILS Intranets allow people to work together better by allowing them to communicate better. The most time-honored and still the most popular means of communication using computers is e-mail. Using e-mail, people can send messages to anyone else on the intranet and, to anyone connected to the Internet as well, or connected to a computer network that has a connection to the Internet, such as an online service. Intranet e-mail uses the TCP/IP protocol. The TCP protocol breaks your messages into packets, the IP protocol delivers the packets to the proper location, and then TCP reassembles the message on the receiving end so that it can be read. We can also attach binary files, such as pictures, videos, sound, and executable files, to your e-mail messages. Since the Internet cant directly handle binary files in e-mail, the file must first be encoded in one of a variety of encoding schemes. The person who receives the attached binary file must decode the file with the same scheme that was used to encode the file. Many e-mail software packages do this automatically. When e-mail formats differ, gateways are used to translate the data into the appropriate format for the recipient. Several standards have been developed that have been adopted by most e-mail companies today that allow the various products to communicate with each other. The Simple Mail Transfer Protocol (SMTP) and X.400 MHS (Message Handling Service) are the two most common protocols. SMTP is based on a client/server model in which someone uses a mail client to create mail and read mail, while servers do the actual processing and delivery of the mail.

Marbaselios Institute of Technology, Anchal

University of Kerala

To create e-mail, you use a mail client, which is called a Mail User Agent or User Agent (MUA or UA). There are multiple kinds and different agents for different types of computers. When mail is sent, the Message Transfer System (MTS) on a server uses a Mail Transfer Agent (MTA) to examine the address of the person to which the mail is being sent. If the person can be found on the intranet, the mail is delivered to a Mail Delivery Agent (MDA). The MDA then delivers the mail to the intended recipient. When we send e-mail to someone on another or on the Internet, the message is instead sent by the MTA through the Internet. The message often had to travel through a series of networks before it reaches the recipientnetworks that might use different e-mail formats. 2.2.1 E-MAIL DELIVERED WITHIN AN INTRANET The most common architecture underlying the use of intranet e-mail is the protocol called the Simple Mail Transfer protocol. With in an intranet, SMTP works as follows; 1. SMTP uses client/server architecture. When someone

wants to create a mail message, they use a mail user agent or user agent (MUA or UA) - client software that runs on a computer, to create a piece of electronic mail. This MUA can be one of any number of e-mail programs, and can run on a variety of different computers, including PCs, Macintoshes, and UNIX workstations. 2. After the message is completed, it is sent by the MUA to a

program running on a server called a Mail Transfer Agent


Marbaselios Institute of Technology, Anchal

10

University of Kerala

(MTA). The MTA looks at the address of the intended recipient of the message. If the recipient of the message is on the intranet, the MTA sends the message to another server program on the intranet called a Mail Delivery agent (MDA). If the recipient is located on the Internet or another intranet, the file is sent over the Internet to the recipient. MDA looks at the address of the recipient, and sends the mail to the inbox of the proper person. 3. Some mail systems use another e-mail protocol called the

Post Office Protocol (POP) in concert with SMTP. With POP, email is not delivered directly to your computer. Instead, the mail is delivered to a mailbox on a server. To get he mail, someone logs on to the server using a password and a user name, and retrieves mail with their mail agent. 4. The recipient of the mail can now use a mail user agent to

read the mail, file it, and respond to it. 5. SMTP can only handle the e-mail transfer of plain ASCII

text files. In order to send binary files such as spreadsheets, pictures, and word documents, they must first be converted into ASCII format by encoding them. The files can be encoded using a variety if methods, including Unencoding and Bse64. Some e-mail software will automatically encode binary files.

Marbaselios Institute of Technology, Anchal

11

University of Kerala

2.2.2

E-MAIL DELIVERED AMONG INTRANETS

A typical message might take the following steps when being delivered from an intranet to another network or intranet. 1. An e-mail message is created using SMTP. As with all

information sent across the Internet, the message is broken up by the Internets TCP protocol into IP packets. The intranets Mail Transfer Agent examines the address. If the address is found on another network, the mail transfer agent will sent the mail across the intranet via routers to the mail transfer agent on the receiving network. 2. Before the mail can be sent out across the Internet, it first might have to pass through an intranet firewall (a computer that shields the intranet so that intruders cannot break into the network. The firewall keeps track of messages and data going into and out of the intranet. It keeps a record of traffic so that any security breaches can be tracked down. 3. The message leaves the intranet and is sent to an internet

router. The router examines the address and determines where the message should be sent, and then sends the message on the way. 4. The receiving network gets the e-mail message. A gateway

there uses TCP to reconstruct the IP packets into a full message. The gateway then translates the message into the particular protocol the target network uses and sends it on its way. The message may be required to also pass through a firewall on the receiving network.
Marbaselios Institute of Technology, Anchal

12

University of Kerala

5.

The receiving network examines the e-mail address and

sends the message to the specific mailbox where the message was intended to go, or uses the Post Office Protocol (POP) to deliver it to a mail server. 6. Gateways can actually change data for connectivity. For e-

mail it may convert CompuServe protocol to SMTP. Gateways are also used to connect PCs to IBM mainframes. E.g.: ASCII to EBCDIC.

Marbaselios Institute of Technology, Anchal

13

University of Kerala

SYSTEM STUDY

Marbaselios Institute of Technology, Anchal

14

University of Kerala

3.1 EXISTING SYSTEM If a newly developed site has to provide email services, mail server software is needed. Now the existing software is very costly. Even though trial versions are available, it will not last longer. Moreover new commonly used email service providing sites are planning to discontinue this free service. Here comes the importance of a new cost free and userfriendly mail server software. Advantages and Disadvantages of Existing System The following are the features of the existing system; Program automatically tracks when emails are opened. Program provides powerful reader interaction. Interface is 100% web-based and can be remotely controlled. The following are the disadvantages of the existing system. It doesnt have automatic deletion of messages. Users must take extreme measures in protecting their computers from outside hacker intrusion. It uses file system for storing data. It is extremely expensive software.

Marbaselios Institute of Technology, Anchal

15

University of Kerala

3.2 PROPOSED SYSTEM The main objective of the proposed system is to introduce software capable of mail transferring. It is developed using .NET framework, used for building and running all kinds of software including web based applications and XML web services, components that facilitates integration by sharing data and functionality over the network through a platform independent protocols such as XML, SOAP, and HTTP. The proposed system can be easily installed on your computer network. It enables you to setup an in-house email system, which can be used to send and receive mail or document internally and world wide via internet. It runs on single windows 2000, which does not have to be dedicated to the task. It requires only one external mailbox address with one domain name. It then can be programmed to configure unlimited internal mailboxes. Therefore can provide individual, private mailboxes to all users on the network. Intranet Mail Server is essentially a mail server using Internet mail protocol SMTP. It can be used as an in-house In this mail server with no connection to the Internet.

configuration, it serves to hold and pass mail for local users. The real power of Intranet Mail Server is that it can be connected to a Internet Service Provider and pass mail to and from the large world. It allows an unlimited number of users, mailboxes and mailing lists.

Marbaselios Institute of Technology, Anchal

16

University of Kerala

3.3 PROBLEM DEFINITION AND DESCRIPTION Defining the problem: Develop a definitive statement of the problem to be solved including the description of the present situation problem constraints and a statement of goals to be achieved. The problem statement should be phrased in customers terminology. Justify a computerized solution strategy for problem. Identify the function to be provided by constraints on hardware system, the software and the people system. Determine the system level goals and requirements for development process and work product. Establish high-level acceptance criteria for system. The existing system is an expensive software and more over the users must take measures in protecting their computers from hackers intrusion. The proposed system provides free service and it is user friendly. Moreover the proposed system uses the database access and user defined classes based on the object-oriented concept for making the application completely secured over the network. The existing system uses file system for storing the values. The proposed system uses database for data and this provides more security. Moreover the proposed system provides automatic deletion of the messages. The intranet mail server is divided into twelve modules. They are registration, login, inbox, compose, address book, draft, trash, diary, forgot password, settings, bulk and folders.

Marbaselios Institute of Technology, Anchal

17

University of Kerala

The registration module will allow a new user to create the mail id by filling and submitting the registration form. The user can login using his password and id. Then the inbox module will allow the user to check the incoming messages. After viewing the messages the user can delete the messages or spam the messages. The compose module will allow the user for creating new messages and the user can save the messages as draft. The address book will allow users to view individual contacts. It will also provide provision for adding or deleting individual contacts. The draft module will allow us to see the messages which are drafted. The messages which are deleted from the inbox are stored in the trash module. The diary module will allow users for writing information and we can view it later. The settings module will allow the users to change their password. The bulk module will allow the users to view the messages that are spammed. In this module, users can unspam and delete the messages. The folder module will allow users to create various folders.

Marbaselios Institute of Technology, Anchal

18

University of Kerala

SYSTEM ANALYSIS

Marbaselios Institute of Technology, Anchal

19

University of Kerala

4.1 PACKAGE SELECTION Front End Back End : Microsoft ASP .NET 2003 with C# : Microsoft SQL Server 2000

According to system requirements package selection is important. While choosing package we have to examine its of cost and its reliability. The following effectiveness

environments are chosen for Intranet Mail Server. ASP.NET ASP.NET is a programming framework built on the common language runtime that can be used on a server to build powerful Web applications. ASP.NET offers several important advantages over previous Web development models such as enhanced performance, world class tools support, power and flexibility etc.

C#.NET C#.NET is a major component of Microsoft Visual Studio .NET suite. The .NET version of C# is a new improved version with more features and additions. Microsoft .NET is a new programming and operating framework introduced by Microsoft. All .NET supported

languages access a common .NET library to develop applications and share common tools to execute applications. Programming with C# using .NET is called C#.NET. SQL Server 2000

Marbaselios Institute of Technology, Anchal

20

University of Kerala

Microsoft SQL Server 2000 includes powerful features to support international operations and environments. Extensive multilingual features make SQL Server 2000 a compelling database product and applications platform. This article provides a complete overview of how to use these features in a global context. This article is not limited to a list of features but also will explain how international/multilingual requirements can affect many aspects of a project. The central task of a database is obviously the storage of data. Hardware support The ability to support a wide range of hardware was a major design goal for windows 2000. The operating system provides drives for many types of peripherals, including monitors, sound cards, digital cameras, printers, scanners, DVD drives, CDRW (CD read/write) drives, and networks cards. Ease of use The operating system is designed so that users who need to perform a specific task can intuitively figure out how to accomplish that task. Following are some of the features that make windows 2000 easier to use: The installation process is simpler that the process for windows NT installation and requires less user input The user shell is more logically organized and offers more customization option Users can easily add hardware. Windows 2000 supports self-repairing applications, plug and play and ACPI. These

Marbaselios Institute of Technology, Anchal

21

University of Kerala

features reduce the possibility of system down time and when new hardware is installed.

Marbaselios Institute of Technology, Anchal

22

University of Kerala

4.2 RESOURCES REQUIRED A development resource contains human resources, reusable resource and environmental resource. Each resource is specified with four characteristics; Description of resource Statement of availability Time when the resources will be required Duration of time that the resource will be applied. 4.2.1 Human Resources The planner begins by evaluating the scope and selecting the skill required position for complete specialty development. are specified. Both For organizational and

relatively small project, a single individual may perform all software engineering tasks, consulting with the specialist as required. The number of people required for the software project can be determined only after as estimate of development effort is made. 4.2.2. Reusable software resources To be reused effectively, software components should be categorized for easy reference, standardized and validated for easy integration. The four software resource categories are; Off-the-shelf components Full-experience components Partial-experience components New components

Marbaselios Institute of Technology, Anchal

23

University of Kerala

4.2.3 Environment Resources The environment supports the software project, often called the software engineering environment and incorporates hardware and software. The hardware provides a platform that supports the software required to produce the work products that are the outcome of good software engineering practice. 4.3 FEASIBILITY STUDY Feasibility study is a system proposal according to its workability, impact on the organization, ability to meet users needs and efficient use of resources. Feasibility is the determination of whether or not a project is worth doing. The proposed system must be evaluated from the technical point of view first and if this technically impact on the organization must be accessed. Generally feasibility studies are undertaken within right time constraints. It should be conducted completely and no fundamental errors of judgments are made. If compatible social and technical systems can be devised then the system must be tested for economic feasibility. Thus the tool is accessed for, Technical feasibility Behavioral feasibility Economical feasibility Operational feasibility 4.3.1 Technical Feasibility Technical feasibility deals with the existing technology and software and hardware requirements of proposed system. Technical feasibility centers on the existing computers and to what extend it can support the proposed

Marbaselios Institute of Technology, Anchal

24

University of Kerala

addition. The proposed system provides latest hardware and software support. Considering the technical factors the company has the major servers to handle traffic. In order to develop the tool, It requires a computer connected to a network. For report handling a printer will be required. The RDBMS needs to be purchased as a package. The .NET framework needs to be installed. The proposed system provides latest software & hardware support. 4.3.2. Behavioral feasibility The new tool doesnt require any staff maintenance. It does not needs any extra training. The interface designed is ambiguous. Hence it is behavior feasible. 4.3.3. Economic feasibility Economic feasibility is concerned with cost savings, increased profits and reduction. This is an ongoing effort that improves accuracy at each phase of the system life cycle. Proposed system is economically feasible because it uses available resources rather than special additional resources. Software development cost is much less. Economic feasibility is the most frequently used method for evaluating the effectiveness of the candidate system, more commonly known as cost/benefit analysis. The procedure determines the benefits that are expected from the candidate system and compare them with costs involved. If the benefits outweigh the cost then the system is economically feasible. Proposed system is economically feasible because it uses available resources rather than special additional resources. Software development cost is much less.

Marbaselios Institute of Technology, Anchal

25

University of Kerala

4.3.4

Operational Feasibility

The needs of user are fully satisfied.

SYSTEM DESIGN

Marbaselios Institute of Technology, Anchal

26

University of Kerala

5.1 INTRODUCTION TO SYSTEM DESIGN Design is important in the development phase for any engineered product or system. Design is a creative process. A good design is the key to effective system. The term Design is defined as The process of applying various techniques and principles for the purpose of defining a process or a system in sufficient details to permit its physical realization. Software design sits at the technical kernel of software engineering process and is applied regardless of the development paradigm that is used. From a project management point of view, software design is conducted in two steps. Preliminary design is concerned with the transformation of requirements into data and software architecture. Detailed design focuses on the refinement to the architectural representation that lead to detailed algorithm, data structure and representation of software. In System design, high-end decisions are taken regarding the basic system architecture. System design transforms a logical representation of what a given system is required to be in physical specification. The design process starts with the system requirement specification and converts it to physical reality during the development. Important design factors such as reliability, response time, throughput of the system, maintainability, expandability etc were taken into account.

Marbaselios Institute of Technology, Anchal

27

University of Kerala

5.2 ARCHITECTURAL DESIGN Architectural design of a computing system is the structure of the system, which comprises software elements, the externally visible properties of those elements, and the relationship among them. Architectural design defines the relationship between major structural elements of the program. Large systems can be decomposed into subsystems that provide some related set of services. Architectural design is the process of identifying these subsystems and establishing a framework for the subsystem controls and communication. The primary objective is to develop a modular program structure and represent the control relationship between modules. In addition architectural design modules program structure and data flow through the program. Architectural design is aimed at trying to refine the conceptual view of the software product. It permits a systems quality attributes such as performance or reliability. Architectural design forms the back born for building successful software intensive system. A good software structure design results in the development of a project working system. For the development of this software, modules were identified. This software was developed into separate named and addressable components that are integrated to satisfy the problem requirements. The modular design reduces the complexity, facilitates changes and results in easier implementation by encouraging parallel development of different parts of the system. The procedural design transforms structural elements of program architecture into a procedural description of software components. The

Marbaselios Institute of Technology, Anchal

28

University of Kerala

architectural

design

considers

architecture

as

the

most

important functional requirement. The system is based on three-tier architecture .The first level is the user interface (Presentation Logic), which displays controls, and receives and validates user inputs. All the event handlers in the web form are in the first level. The second level is the business layer (business Logic) where the application-specific logic takes place. The Third level is the data layer where the application information is stored in files or database. It contains logic about to retrieve and update data. The important feature about three-tier design is that information only travels from one level to an adjacent level.

Presentation Logic

Web Pages Web Pages

Desktop Window

Web Pages

Business Logic
Custom Component Custom Component Custom Component

Data Logic
Database Database

Text/Binary Files 29

Marbaselios Institute of Technology, Anchal

University of Kerala

5.3 DATA FLOW DIAGRAM A Data Flow Diagram (DFD) is a graphical technique that depicts information flow and the transformations that are applied as data move from input to output. Data Flow Diagrams (DFD) are commonly used to get a pictorial representation of the various processes occurring within the system, which shows the minimum content of data stores. Each data stores should contain all the data elements that flow in and out. Process modeling involves figuring out how data will flow within the system and what steps to perform on the data. This is how the term data processing originated. Process models are draw in the form of a set of DFD and these are later used to guide the creation of processing logic, when the system is physically created. The DFD are central to the logical system specification. The following are some advantages: Provide an overview of DFD and the transformation of data. Act as a god communication tool with users. Several methods have been devised to control processing activities. One such is the batch processing. In addition to batch controls, several other programmed checks can use for testing the data. Completeness checks ensure that all the fields in a record are present and read in the proper sequence. Consistency check refers to the relevance of one type of data or another. Reasonable check evaluates the transaction against standard to determine whether it meets the test.

Marbaselios Institute of Technology, Anchal

30

University of Kerala

Sequence check verifies that sequence prior to processing.

data

records

are

in

Marbaselios Institute of Technology, Anchal

31

University of Kerala

COMPONENTS OF A DFD Here are different diagrammatic notations for drawing a DFD.

Processes:

Data Flows:

Source or Sink:

Data Stores: Bubbles or curved rectangles represents the processes and arrows indicate the dataflow. External entities are represented by rectangles and are outside the system such as users or customers with whom the system interacts. They either supply or consume data. Entities supplying data are know as source and those that consume data are called links. Data are stored in a data store by a process in the system. Each component in a DFD is labeled with a descriptive name. Process name are further identified with number. Context level DFD is draw first. Then the processes are decomposed into several elementary levels and are represented in the order of importance. A DFD describes what data flow (logical) rather than how they are processed, so it does not depend on hardware, software, and data structure or file organization.

Marbaselios Institute of Technology, Anchal

32

University of Kerala

A DFD methodology is quite effective; especially when the required design is clear and the analyst need a notation language for communication. The DFD is easy to understand after a brief orientation.

LEVEL 0 DFD
Prospective Registration or Sign In User Intranet Mail Server Sign Out End User

Marbaselios Institute of Technology, Anchal

33

University of Kerala

LEVEL 1 DFD

Forgot Password

User Details Sign Up Sign In

Registration Store

Password

User

Login

User Details

DataBase

Details Check Mail Store DataBase

Mail Details

Marbaselios Institute of Technology, Anchal

34

University of Kerala

LEVEL 2 DFD
DataBase DataBase

Password

Forgot Passwor d

Registration

User Details Sign Up

Continue to Message Login

User

Sign In

Compose DataBase Send Change

DataBase

Check Mail Password

My Settings

View Add Contact Spam Inbox Delete Bulk Trash Draft Save Addres s Book

Marbaselios Institute of Technology, Anchal

35

University of Kerala

DataBase

Marbaselios Institute of Technology, Anchal

36

University of Kerala

5.4 I/O FORM DESIGN 5.4.1 Input design In input design, user-oriented inputs are converted to a computer based format. The goal of designing input data is to make data entry as easy and it should be free from error as possible. Input design is the link between information system and user. The activity of putting data into the computer for processing can be achieved by inspecting the computer to read data from a written or printed document or it can occur by having people keying data directly into the system. A well designed input should serve four purposes. To control workflow To reduce redundancies in recurring data To increase clerical accuracy To allow easier checking of data The design of input focuses on controlling the amount of input required, controlling errors, avoiding extra steps and keeping the process simple. It comprises the developing specification and procedures for data preparation and those steps are necessary to put transaction data into usable form for processing data entry. The error raising method is also included in the software, which helps to raise error messages while wrong entry of input id done. The collection of input data is the most expensive part of system. The system needs the data regarding the asset items, depreciation rates, asset transfer and physical verification for various validations and checking. The input design is the part of the overall system design that requires careful attention.
37

Marbaselios Institute of Technology, Anchal

University of Kerala

The input design is actually the designing of the forms. The major forms included in Intranet Mail Server are; Input forms for login which allow the users to login and new user registration form. Input forms for inbox, compose, draft, trash, bulk, address book and sign out. 5.4.2 Output Design Output design is a process that involves designing necessary outputs in the forms of reports that should be given to the users according to the requirements. Computer output is the most important and the direct source of information to the user. Designing computer output should proceed in an organized manner: the right output must be developed while ensuring that each output element is designed so that people will find the system easy to use. Efficient, intelligible output design should improve the systems relationship with the user and help in decision making. When analyst design computer output, they Identify the specific output that is needed to meet the information requirements. Select methods for presenting information. Create documents, reports, or the formats that contain information produced by the system. Since the reports are directly referred by the manta for taking decisions and to draw conclusions they must be designed with almost care and the details in the reports must be simple, descriptive and clear to the user. Depending on the nature and future use of output required, they can be

Marbaselios Institute of Technology, Anchal

38

University of Kerala

displayed on the monitor for immediate need and for obtaining the hardcopy.

Marbaselios Institute of Technology, Anchal

39

University of Kerala

5.4.3 Code Design This is one of the operational phases in the system development life cycle. This phase deals with coding of the proposed system using the development tools. In Intranet Mail Server the programming environment includes the tools provided by C# and ASP.NET and SQL Server. The coding depends on the logical and detailed design of the system in the system design phase. The phase ends in an operational model of the proposed system. 5.5 DATABASE DESIGN A database is a collection of interrelated data stored with minimum redundancy to serve many users quickly and efficiently. The general objective is to make information access easy, quick, inexpensive, and flexible for the users. The general theme behind a database is to integrate all the information. Database design is recognized as a standard of management information system and is available virtually for every computer system. In database design several specific objectives are considered; Controlled redundancy Ease of learning and use Data independence More information at low cost Accuracy and integrity Recovery from failure Privacy and security Performance

Marbaselios Institute of Technology, Anchal

40

University of Kerala

A database is an integrated collection of data and provides centralized access to the data. Usually the centralized data managing the software is called RDBMS. The main significant difference between RDBMS and other DBMS is the separation of data as seen by the program and data has stored in direct access to stores device. This is the difference between logical and physical data. DESIGN CONSIDERATION The system is analyzed to the requirements and possible tables and fields are identified. Identifying Keys Once we have drawn up the lists of possible tables and fields, the next step in the logic database is to identify and foreign Keys for each table. 1. Primary Keys A primary key (PK) consists of a field or a set of fields that uniquely identify each record in that table .The primary field defines the primary key. 2. Foreign Keys A foreign key (FK) comprises a field, or multiple fields that link to the primary key of another table. For any database application data is stored in tables. So table designing is a most important part of backend designing. Steps are taken to avoid unnecessary replication of data and to achieve maximum data consistency and integrity. The appropriate data type is chosen for the effective storage and manipulation of information. Another important
Marbaselios Institute of Technology, Anchal

41

University of Kerala

matter about table designing is the field width. Each field has enough rooms to accommodate the data from domain, which has maximum width. 5.7 NORMALIZATION Normalization is a technique of separating redundant fields and breaking up large table into smaller one. Normalized data structures exhibit more desirable properties. Normalization is body of rules addressing analysis and conversion of data structure into relation. The properties of normalized data structures include the following; Consistency Minimal redundancy Maximum stability Normalization is used to avoid insertion, deletion and updating anomalies. All the tables have been normalized up to the third normal form.

Marbaselios Institute of Technology, Anchal

42

University of Kerala

5.7.1 First Normal Form A relation is said to be in First Normal Form (1NF) if all the underlying domain of attributes contain simple individual values.

5.7.2 Second Normal Form The Second Normal Form (2NF) is based on the concept of full functional dependency. A relation is said to be in Second Normal Form if and only if it is in first normal form and every non-key attribute is fully functionally dependent on candidate key of the table.

5.7.3 Third Normal form The Third Normal Form (3NF) is based on the concept of transitive dependency. A relation in second normal form is said to be in third normal form if every non-key attribute is nontransitive. 5.8 E-R DIAGRAM E-R diagram closely represents the relationship with entities. They depict the attributes between modules and data. They are drawn using rectangle, ellipses and rhombus, which represent entities, attributes and relationships respectively.

Marbaselios Institute of Technology, Anchal

43

University of Kerala

Folder Attach Path ReceiverID SendID SenderI D CC

Content Send Date Subject Compose Read Flag ID

Add

Add Remdate e Conten t

Name AddressBook Cont.I D UID Diary UID

Save

Dele te

SendI D Rec ID Conten t Draft

Date readfla g ID Subject SendI D Rec ID Conten t Bulk Date

SendI D Rec ID Spa m Conten t Trash

Date readfla g ID Subject

readfla g ID

Subject

Marbaselios Institute of Technology, Anchal

44

University of Kerala

5.9 DATA DICTIONARY Information pertaining to the structure and usage of data contained in the database, the Meta data, is maintained in a dictionary. The data dictionary, which is a database itself, documents the data. Each database user can consult the data dictionary to learn what each piece of data and the various synonyms of the fields mean.

Marbaselios Institute of Technology, Anchal

45

University of Kerala

CODING AND DEBUGGING

Marbaselios Institute of Technology, Anchal

46

University of Kerala

6.1 FUNCTIONAL DOCUMENTATIONS The main modules are: Registration Login Inbox Composes Address Book Draft Trash Bulk Diary Folder Forgot Password Settings The Registration module will allow a user for creating a new account by filling and submitting the registration form. This module consists of information regarding the registration of new user and login into his mailbox. During registration a user is required to enter his id that he requires, password, a secret question and answer to this secret question. is also to be furnished. The login module will allow users to login in to his mailbox using his/her user id and password. When the user enters his user id and password, its validity is checked in the database. Only valid users are allowed to carry other process whereas the invalid entry is rejected. The valid user can send Personal information such as name, last name, date of birth, occupation

Marbaselios Institute of Technology, Anchal

47

University of Kerala

and receive mails through the intranet. In case if his user id and password is invalid then he is prompted to re-login again. The inbox module is used to display the mails received by the user in a sorted manner. This module will display the email messages received by the user in a conversation format with which he has the correspondence. You need a mailbox that resides on a mail server and is set up to handle your incoming mails. After viewing the messages users can delete and spam the messages. The compose module will allow users to create new messages and the messages will be stored in the database. It also provides an option for sending attachments. Users can utilize a measure to share files between one another including word processing documents, programs or any other types of computer files. This provides the facility for a user to send email to another user by entering the details such as receivers e-mail address, subject and message. The address book will allow users to view the contacts in the address book. It will also allow the users to add and delete individual contacts. The draft module will allow the users to view the messages that are saved as draft. While composing the users can save the messages as draft and these messages are stored in the draft folder. After viewing the users can delete the messages. The trash module indicates the email messages deleted from inbox. All the messages deleted from the inbox will be stored in the trash folder and from this folder the user can delete the message from the database.

Marbaselios Institute of Technology, Anchal

48

University of Kerala

The bulk will allow users to view the messages that are spammed and it will also allow the users to unspam and delete the messages. The folder module is used to create various folders to keep the users inbox in a sorted way. This module will display the email messages moved from inbox to user created folders. Diary provides a provision for writing and storing the information and also allows viewing it later. The forgot password module helps the user to retrieve his password. The user is required to answer his id, country, the clue question and answer and his date of birth he entered while registered. The settings will allow the user to change existing user password and to create new password. If the user wishes to change the password, he can do so by entering a new password. To ensure security first user is asked to enter the old password. Then he asked to enter the new password and the confirm password. When the user submits this form his password is automatically updated. For security reasons it is desirable to change password. 6.2 SPECIAL FEATURES OF LANGUAGE 6.2.1 Microsoft .NET Microsoft released the .NET framework in February 2002, its biggest initiative since the launch of Windows in 1991. Microsoft .NET is a revolutionary multi-language platform that knits various aspects of application development together with the Internet. The .NET initiative is all about enabling data transfer between networks, PCs and devices seamlessly, independent of the platforms, architecture and solutions. All
Marbaselios Institute of Technology, Anchal

49

University of Kerala

.NET programs are compiled to an intermediate language (IL) rather than to native code, which can be understood by the computer processor. MSIL must be converted to CPU specific code by a just in time (JIT) compiler. It helps the runtime and garbage collection keep track of memory that will be released back to the operating system when it is no longer needed. Microsofts .NET is the next generation platform for building web applications and web services. It is a platform for XML web services. Areas of Microsoft .NET is Microsofts new internet and web strategy .NET is not a new operating system .NET is a new internet and web based infrastructure .NET delivers software as web services .NET is a framework for universal services .NET is a server centric computing model .NET will run in any browser on any platform 6.2.2 The .NET framework The .NET framework is the infrastructure for the new Microsoft .NET platform. It is a common environment for building, deploying and running web services and web applications. It contains common class libraries- like ADO.NET, ASP.NET and windows forms to provide advanced standard services that can be integrated into standard services that can be integrated into computer systems. The framework is language neutral. Currently it supports VC++, C#, VB.NET, Java .NET etc. 6.2.3 Asp.net

Marbaselios Institute of Technology, Anchal

50

University of Kerala

Asp.net is a programming framework built on the common language runtime that can be used on a server to built powerful web applications. Asp.net offers several important advantages over previous web development models. Enhanced performance ASP.NET is compiled common language runtime code running on the server. Unlike its interpreted predecessors, ASP.NET can take advantage of early binding, just-n-time compilation, native optimization, and caching services right out of the box. This amounts to dramatically better performance before you ever write a line of code. World-class tool support A rich toolbox and designer in the visual studio integrated development environment complement the ASP.NET framework. WYSIWYG editing, drag and drop server controls, and automatic deployment are just a few of features this powerful tool provides. Power and flexibility Because ASP.NET is based on the common language runtime, the power and flexibility of that entire platform is available to web application developers. The .NET framework class library, messaging and data access solution are all seamlessly accessible from the web. ASP.NET is also language independent, so you can choose the language that best applies to your application or partition your application across many languages. Further, common language runtime interoperability

Marbaselios Institute of Technology, Anchal

51

University of Kerala

guarantees that your existing

investment in com-based

development is preserved when migrating to ASP.NET. Simplicity Asp.net makes it easy to perform common tasks, from simple form submission and client authentication to deployment and stir configuration. For e.g., ASP.NET page framework allows you to build user interface that cleanly separate application logic from presentation code and to handle event in a simple visual basic like forms. Processing model additionally, the common language runtime simplifies development, with managed code services such as automatic reference counting and garbage collections. Manageability ASP.NET employees a text based, hierarchical configuration system, which simplifies applying settings to your server environment and web applications. Because configuration information is stored as plan text, new settings may be applied without the aid of local administration tools. This zero local administration philosophy extends to deploying ASP.NET framework applications as well. An ASP.NET framework application is deployed to a server simply by copying the necessary files to the server. No server restart is required, even to deploy or replace running compiled code. Security With built in windows authentication and pre-application configuration, you can assure that your applications are secure.

Marbaselios Institute of Technology, Anchal

52

University of Kerala

LANGUAGE SUPPORT: The Microsoft .NET platform currently offers built-in-support three languages: C#, Visual Basic and Jscript. These exercise and code samples in this tutorial demonstrate how to use C#, Visual Basic and Jscript to build .NET applications.

Marbaselios Institute of Technology, Anchal

53

University of Kerala

6.2.4 C# .NET C#.NET is a major component of Microsoft Visual .NET suite. The .NET version of C# is a new improved version with more features and additions. programming Microsoft. and operating Microsoft .NET is a new framework introduced by

All .NET supported languages access a common

.NET library to develop applications and share common tools to execute applications. Features of C#.NET Inheritance Inheritance is one of the most used techniques in an object-oriented language. Inheritance provides ability to use an existing classs functionality via its derived (inherited) class. Inheritance refers to the properties of a class being available to many other classes. The properties and methods of the base classes are inherited and extended by the derived classes. By default all the classes created with C#.NET are

inheritable. The users can use inheritance to define new forms based on existing forms designed by users are really classes.

Exception Handling Exception handling is an in built mechanism in .NET framework to detect and handle run time errors. The .NET

Framework contains lots of standard exceptions. The exceptions are anomalies that occur during the execution of program. They can be because of user, logic or system errors. If a user
54

Marbaselios Institute of Technology, Anchal

University of Kerala

(programmer0 do not provide a mechanism to handle these anomalies. The .NET run time environment provides a default mechanism, which terminates the program execution. C#.NET provides three keywords try, catch and finally to do exception handling. Try encloses the statements that might

throw an exception whereas catch handles an exception if one exists and finally can be used for doing any clean up process.

Overloading C#.NET supports method overloading using the overload keyword. Using this keyword, you can declare same method names with different arguments.

Overriding Overriding is the creation of a method in the subclass that has the same signature, i.e. name, number and type of arguments, as method in the super class. hides the method of super class. This new method

Derived classes inherit the All methods are not

methods defined in their base class. overridable

by default but if a method in the base class is keyword the Overrides keyword

marked with the overridable

can be used in derived class to define new implementation of the inherited method.

Constructors and Destructors

Marbaselios Institute of Technology, Anchal

55

University of Kerala

The procedures that control initialization of new instances of a class are known as constructors. Conversely, destructors are methods that are used to free system resources when a class leaves scope or is set to nothing.

Marbaselios Institute of Technology, Anchal

56

University of Kerala

C#.NET supports constructors and destructors using the Sub New and Sub Dispose procedures. Sub New method will only run once when a class is created. 6.2.5 Introduction to windows 2000 Windows 2000 integrates the best features of both windows 98 and Windows NT 4 operating systems and adds other features, such as more hardware support and reduced cost of ownership. Features from Windows 98 Support for plug and play, which allows the operating system to recognize and configure hardware without any user intervention. Added support for the advanced configuration and power interface (ACPI), considered being the next generation of power management for plug and play technology. Added support for the universal serial bus (USB), which is an external serial bus standard that allows a single USB port to support up to 127 devices. USB supports hot-plug and plug and play technology. The use of active desktop, which integrated the users browser and shell into a single integrated desktop. Features from Windows NT 4 Windows NT workstation 4 is a foundation upon which windows 2000 is build. The following features that made Windows NT for a powerful operating system are included in Windows 2000:

Marbaselios Institute of Technology, Anchal

57

University of Kerala

An operating system with a high degree of reliability. Windows 2000 is more robust and less likely to crash than windows9x operating systems. Local security that is built into the operating system. Windows 2000 requires that users be authenticated with a valid logon name and password before they can access the computer. Support is also included for the NTFS file system, which allows us to set local security for the file system. 6.2.6 Introduction to SQL Server 2000 Microsoft SQL Server 2000 is a set of components that work together to meet the data storage and analysis needs of the largest websites and enterprise data processing systems. Features of SQL Server 2000 Microsoft SQL Server 2000 features include; Internet integration Scalability and availability Enterprise-level database features Data warehousing. DATABASE ARCHITECTURE
Client Application Client Application Client Application

SQL Server

Marbaselios Institute of Technology, Anchal

58

University of Kerala

Microsoft SQL Server 2000 data is stored in database. The data in a database is organized into logical components visible to users. A database is also physically implemented as two or more files on disk. Each instance of SQL server has four system databases (master, model tempdb, msdb) and one or more user databases. Advantages of SQL Server 2000 as a Database Server Microsoft SQL server 2000 is capable of supplying the database services needed by extremely large systems. Large servers may have thousands of users connected to an instance of SQL Server 2000 at the same time. SQL Server 2000 as full protection for these environments, with safe guards that prevent the problems, such as having multiple users trying to update the same piece of data at the same time. SQL Server 2000 also allocates the available resources effectively, such as memory, network, bandwidth and disk input/output, among the multiple users.

Marbaselios Institute of Technology, Anchal

59

University of Kerala

6.3

ALGORITHM Start Program New user will register. Enter user name and password Valid user login. Choose Inbox for the following options a. Viewing incoming message b. Spam message c. Delete message d. Move message to user created folder

Step 1: Step 2: Step 3: Step 4: Step 5:

Step 6:

Choose Compose for the following options a. Sending message b. Save as draft

Step 7:

Choose Bulk for the following options a. Viewing messages that are spammed b. Delete message c. Unspam message

Step 8: Step 9:

Choose Bulk empty for empting the bulk folder Choose Draft for the following options a. View messages that are saved as draft b. Delete message

Marbaselios Institute of Technology, Anchal

60

University of Kerala

Step 10:

Choose Trash for the following options a. To view the messages deleted from inbox b. Delete message permanently

Step 11: Step 12:

Choose Folder to view messages in user sorted way. Address book for the following option a. View individual contacts b. Add contacts c. Delete contacts

Step 13: Step 14: Step 15:

Choose My Settings for changing password Choose Forgot Password for knowing password if user had forgotten the password. Choose SignOut for signing out.

Marbaselios Institute of Technology, Anchal

61

University of Kerala

TESTING

Marbaselios Institute of Technology, Anchal

62

University of Kerala

7.1 TYPES OF TESTING DONE 7.1.1 System Testing System testing is the stage of implementation highly aimed at ensuring that the system works accurately and efficiently before the live operation commences. Testing is vital to the success of the system. The primary objective of testing is to derive a set of tests that has the highest likelihood for uncovering defects in the software. The system test in implementation should conform that all is correct and an opportunity to show the users that the system work as expected. the It accounts the largest percentage of technical cycle validates the code against the effort in the software development process. Testing phase in development functional specification. There are two categories of test case designing techniques. They are White Box Testing Black Box Testing White box is a test case design method that uses the control structure of the procedural design to derive test cases. Using the white box testing methods, we derived test cases that guarantee that all independent paths within a module have been exercised at least once. This testing should Exercise all logical decisions on their true and false sides. Execute all loops at their boundaries and within their operational bounds.

Marbaselios Institute of Technology, Anchal

63

University of Kerala

Exercise internal data structures to ensure their validity. Black box testing might be called testing in large. In functional testing, the software or module to be tested is treated as a black box and the test case is decided based on specifications of the system or module. So this testing is also called black box testing. It tests the external behavior of the system. Black box testing is done to find incorrect or missing function, interface errors, errors in external database access, performance errors and initialization and termination errors. The specification states what the program should do and how it should perform under various conditions used. The test cases are developed for processing. By examining the result, the performance of the program according to the specified requirements can be determined. Test cases are developed, that will result in the execution of every instruction on the program or module. Another strategy of the software testing may be envisaged by moving outward along the development spiral. Unit testing begins at the vertex of spiral and concentrates on each unit of the software as implemented from the source code. Testing progress by moving outward along the spiral to the integration testing where the focus is to design and construction of the software architecture. Taking another turn out of the spiral, we finally encounter validation testing. 7.1.2 Unit Testing

In unit testing each module of the project is individually tested. Unit testing focuses verification efforts and small unit

Marbaselios Institute of Technology, Anchal

64

University of Kerala

of software design in the module.

This is the first level of

testing. In this testing of each module and the integration of the overall system is done. This testing is carried out during the programming stage itself. In this testing step, each module is found to be working satisfactorily as regard to the expected output from the module. There are some validation checks for the fields. It is very easy to find error and debug the system. Unit testing heavily make use of white box testing strategies exercising specific paths in a modules control structure to ensure complete coverage and maximum error detection. Unit testing focuses on modules to locate errors. If the module receives input or The test cases needed for unit testing must exercise each condition and option. generates output test case are needed to test the range of values expected including valid and invalid data. After coding, each dialog was tested and run individually. All the unnecessarily coded statements were removed and it was endured that all the functionalities worked as expected. Any logical errors found were corrected. 7.1.3 Integration Testing Integrated testing is a systematic testing that can be done with sample data. The need for the integrated test is to find the overall system performance. In integration testing, For this the relationship between the modules is tested. combination of inputs. specified requirements.

purpose, test cases are developed for each condition or By examining the results it can be In this project the modules that are determined whether the program performs according to its

Marbaselios Institute of Technology, Anchal

65

University of Kerala

specified in unit testing are testing are tested for their relationships. Black box test case design techniques are the most prevalent during integration. Integration testing is the systematic technique for constructing the program structure by condition tests to uncover error associated with the interfacing. Many test modules are combined into subsystems, which are then tested. Rigorous integration is conducted to make the application free for any interface errors that may occur during transactions. Integration testing is a verification of the interface among system parts. verification and program construction. 7.1.4 Validation Testing After the culmination of black box testing, software is completely assembled as a package, interfacing errors have been uncovered and corrected and final series of software validation tests begin. Validation testing can be defined as many, but a single definition is that validation succeeds when the software functions in a manner that can be reasonably expected by the customer. Validation refers to the process of using the software in a live environment to find errors. During the course of validation system failure may occur and the software will be changed. System validation checks the quality of the software in both simulated and live environments. First the software goes through a phase in which errors and failures based on simulated user requirements are verified and studies. The modified software is then subjected to phase two in the actual users site or live environment. Validation testing provides the
Marbaselios Institute of Technology, Anchal

Integration test

addressing the issues associated with the dual problems of

66

University of Kerala

final assurance that the software meets all the functional, behavioral and performance requirements. 7.1.5 Alpha Testing The developer in collaboration does alpha testing with the end user. The developer guides the end user all the way while observing the reaction and feedback. 7.1.6 Beta Testing Beta testing releases the produce to the end user. He is at liberty to proceed as the requirements dictate. The user records all the problems that are encountered during beta testing and reports these to the developer at regular intervals. As a result of this the software developer makes modification and then prepares for the release of the software product to entire customer base. 7.2 TEST DATA AND RESULTS The primary goal of software implementation is the production of source code that is easy to read and understand. Clarification of source code helps in easier debugging, testing and modification. Source code clarification is enhanced by structural coding techniques, by good coding style, by appropriate supporting documents, by good internal comments and by the features provided in the modern programming language. In our implementation phase, source code contains both global and formal variables. It contains predefined functions as well as the user defined functions. The result of the new system is compared with the old system and suppose the result is wrong the error must be debugged.
Marbaselios Institute of Technology, Anchal

67

University of Kerala

After the acceptance of the system by the user, the existing system must be replaced by this new system. Intranet Mail Server has been made user friendly. The Any user

can work in this package very easily. It does not require any intensive training for the user. Procedures and functions in the system are very simple that any one can understand and correspondingly act to the system with no difficulty. 7.3 ERROR MESSAGES The error messages that appear in this project are: 1. Invalid user id 2. Invalid password 3. Password mismatch 4. User login failed 5. Message cannot be sent 6. Password cannot be changed 7. Invalid details given 8. Registration failed 9. Message cannot be deleted

Marbaselios Institute of Technology, Anchal

68

University of Kerala

USER MANUAL

Marbaselios Institute of Technology, Anchal

69

University of Kerala

8.1 HARDWARE REQUIREMENTS Processor Processor Speed RAM Hard Disk Drive Monitor Mouse Keyboard Clock speed System Bus 8.2 : : : : : : : : : Pentium IV 1.2 GHz 128 MB 40 GB SVGA Color Monitor Ordinary, Scroll mouse 108 Keys 500 MHZ 32 Bit

SOFTWARE REQUIREMENTS : : : : : : : Windows 2000 Professional IIS Microsoft .NET 2003 ASP.NET C#.NET SQL Server 2000 Internet Explorer 6.0

Operating System Web Server Environment Front End Tool Server Side Scripting Back End Browser 8.3 SYSTEM OVERVIEW

The proposed system is developed for those who are working in an intranet environment for sending and receiving of secured mails. software, The application strongly supports MS.NET Web-based applications, smart client framework, so it is used for building and running all kinds of including applications, and XML Web services. It is designed to operate without any manual intervention during normal operation. The Registration module will allow a user for creating a new account by filling and submitting the registration form.

Marbaselios Institute of Technology, Anchal

70

University of Kerala

This module consists of formation regarding the registration of new user and login into his mailbox. The login module will allow users to login in to his mailbox using his/her user id and password. When the user enters his user id and password, its validity is checked in the database. Only valid users are allowed to carry other process whereas the invalid entry is rejected. The inbox module is used to display the mails received by the user in a sorted manner. This module will display the email messages received by the user in a conversation format with which he has the correspondence. The compose module will allow users to create new messages and the messages will be stored in the database. It also provides an option for sending attachments. The address book will allow users to view the contacts in the address book. It will also allow the users to add and delete individual contacts. The draft module will allow the users to view the messages that are saved as draft. Trash module indicates the email messages deleted from inbox. Bulk will allow users to view the messages that are spammed and it will also allow the users to unspam and delete the messages. The folder module is used to create various folders to keep the users inbox in a sorted way. Diary provides a provision for writing and storing the information and also allows to view it later. The forgot password helps the user to retrieve his password.

Marbaselios Institute of Technology, Anchal

71

University of Kerala

The settings will allow the user to change existing user password and to create new password. 8.4 BEGINNERS GUIDE A user can login by giving his id and password. Only valid users are allowed to login. A new user can create his account by filling and submitting the registration form. After login using his id and password, a user can utilize all the facilities available in the system. sending mails. It provides provision for The User can view his incoming messages in the Also it provides The users can

inbox and after viewing he can delete the messages. deleted messages are stored in the trash. provision for saving the messages as draft. creating folders and changing password.

spam and unspam the messages. It also provides facility for It will also allow users to add and delete individual contacts and provides provision for knowing password if user had forgotten it.

Marbaselios Institute of Technology, Anchal

72

University of Kerala

8.5

SYSTEM IMPLEMENTATION Implementation is the process of converting a new or

revised system design into operation. It is the key stage in achieving successful new system because; usually it reveals a lot of up heal the use department. The process of putting the developed system in actual use is called system implementation. This includes all those activities that take place to convert from the old system. It must therefore be carefully planned and controlled. Apart from planning the two major tasks of preparing for implementation are education and training of users and testing of the system. Education of users should really take place much earlier in the project i.e. when they are involved in the investigation and design work. Training has be given to the staff regarding the new system. Once staff has been trained, the system can be tested. Implementation is the stage of the project where the theoretical design is turned into working system. Therefore it must be carefully planned and controlled. It can also be considered to be the most crucial stage in achieving a successful new system and giving the user confidence that the new system will work and be effective. Implementation is the final and important phase. It is the phase where theoretical design is turned into working system, which work for user in the most effective manner .It involves careful planning, investigation of the present system and the constraint successful involved, running user of training, system testing system. and The developed proposed

implementation process begins with

preparing a plan for the

implementation of the system. According to this plan, the activities are to be carried out discussion made regarding the
Marbaselios Institute of Technology, Anchal

73

University of Kerala

equipment and resources and the additional equipments has be acquired to implant the new system. The user tests the developed system and changes are made according o the needs. The testing phase involves the testing of a system using various kinds of data. This method also offers the greatest security since old system can take over if the errors are found or inability to handle certain type of transaction while using the new system. An elaborate testing of data is prepared and the system is tested using that data. while testing ,errors are noted and corrections are made .The users are trained to operate the developed system .Both hardware and software are made to run the developed system successfully in nature. The method of implementation and the scale to be adopted re found out initially. Next the system is tested properly and the users are trained in the new procedures. 8.6 SYSTEM MAINTENANCE The term Software Maintenance is used to describe the software engineering activities that occur following delivery of a software product to the customer. The maintenance phase of the software life cycle is the time period in which software product performs useful work. Maintenance products, activities involve enhancement to new to software and adapting products environments

correcting problems. It is defined by describing four activities that are undertaken after a program is released for use. The four different maintenance and preventive maintenance or reengineering only about adapting existing system all maintenance work that spent to changed in their external

environment, making enhancements requested by the users,


Marbaselios Institute of Technology, Anchal

74

University of Kerala

and reengineering an application for future use. is relatively easy to see why it absorbs too much effort.

When

maintenance is considered to encompass all these activities, it Maintenance involves the software industry captive, typing up system resources. It means restoring something to its original condition. Maintenance involved a wide range of activities including correcting, coding and design errors, updating documentation and test data and upgrading user support. Maintenance is continued till the product is reengineered or deployed to another platform. Maintenance is also done based on fixing the problem reported, changing the interface with other or hardware enhancing the software. An organization that is making a commitment to a software system must be assured that the software system will continue to be available and that will be maintained to suit the changing requirements. System maintenance can be termed as an enigma of system development. It holds the software industry captive, toping up programming resources. Maintaining covers a wide range of activities including correcting codes and rectifying errors, updating documentation and test data upgrading user support. The software must be so flexible so that it can meet changing requirements and varying user needs. So the maintenance of the software becomes easy.

Marbaselios Institute of Technology, Anchal

75

University of Kerala

CONCLUSION

Marbaselios Institute of Technology, Anchal

76

University of Kerala

CONCLUSION The system Intranet Mail Server developed for Turbo Plus meets all of their specification. All the inputs given are validated properly, which makes the output more accurate. The system is more flexible and can be modified easily whenever needed. It is very much easy to understand. This endeavor has proved extremely fruitful. As future scope, attachment facilities can be

implemented and also it can be hosted in the World Wide Web. Also measures can be taken to enhance the security features. This system has been found to work efficiently and effectively. Another feature is that it is highly user friendly. The project Intranet Mail server after being tested and was found to be achieving what is meant for. The system is found to be 100% error free and ready for implementation. The system provides high security. The maintenance of the system is less when compared with the existing system. The project on implementation provides facility for sending and retrieving of secured mails in an intranet environment. The project is developed as a web application. All the

suggestions in the system proposal have been successfully completed and the final threshold of the application has been crossed.

Viewing through the system development, a brief idea can be as follows:


Marbaselios Institute of Technology, Anchal

77

University of Kerala

Comprehending the system Studying the existing system Building the solution Designing the solution Preparing the output formats Testing the system Achieving the required results Documenting the system.

Marbaselios Institute of Technology, Anchal

78