You are on page 1of 68

Chapter 1

Company’s Profile
The National Informatics Centre (NIC), in Haryana, has setup ICT infrastructure, computing
power, Networking & Communication facilities at State Capital Chandigarh (covering
Haryana Civil Secretariat, Haryana New Secretariat, High Court, Chief Minister's Office, 30
Bays Building, Haryana Vidhan Sabha, Advocate General Office, Finance Department and
Haryana Raj Bhawan and managing the infrastructure at Secretariat for Information
Technology (SIT) Haryana), and all districts of Haryana. NIC is actively functioning in
Haryana since August 1988 and has been instrumental in bringing ICT culture & awareness
in Government of Haryana across the state.
NIC has established SAN based Data Centre with 10 TB storage capacities at HCS. All
dynamic web contents of Intranet/web enabled applications and official e-mail accounts are
hosted

on

this

data

Centre.

More

than

5500

official

e-mail

accounts

on

http://haryana.gov.in/ e-mail server. All districts are connected over NICNET WAN with
MLL & VSATs. NIC actively assisted Haryana government in implementation of State Wide
Area Network (SWAN) project as per guidelines of DIT GOI. Haryana SWAN was
inaugurated as Ist SWAN of India on 5th Feb., 2008. The Video Conferencing facility has
been established at State HQ. & 20 Districts in Haryana. Horizontal Connectivity to offices
l;ike Posts Department has been provided at all districts and a MAN has been set at
Chandigarh, connecting major office complexes of Haryana Govt. NIC has been providing
Technical consultancy and ICT advisory services to State e-Governance society, State Level
IT Steering Committee (IT-PRISM), State Technical Committee (STC), IT Task Force and
District IT Societies in respective districts. NIC-HRSC ICT professionals are functioning as
sector coordinators for various departments/organizations for providing ICT services.
The State and Central Government has been giving emphasis on conceptualization and
implementation of Mission Mode e-Governance Projects of National e-Governance Plan
(NeGP), where-in State IT Department facilitate the line departments/organizations and NICHRSC provide advisory & Consultancy services on technical aspects. A well-defined system
for the systematic approval of the departmental IT action plans is in place. In Haryana, till
date more than 100 IT Plans/Projects have been approved by IT-PRISM, and the NIC-HRSC
has been involved in 100% project proposals (more than 50 projects prepared solely and 10
jointly with state PSU. All projects were technically evaluated as technical experts to STC/ITPRISM). A number of policies like State's IT Policy, web policy, ROW Policy, e-Mail Policy,
1

IT-Plans preparation guidelines, Contractual Manpower hiring policy etc. are in place in
Haryana. Most of the approved projects are at various stages of development &
implementation and a significant progress has already been achieved on a number of projects.
More than 25,000 employees have been trained under Capacity Building initiatives.
1. Treasuries: OTIS: On-Line Treasuries Information System implemented at 100% treasuries
& Sub treasuries (103 sites). OTIS received Microsoft e-Governance award 2006.
2. Property Registration: HARIS: Haryana Registration Information System implemented in
all Tehsils and Sub-Tehsils covering 100% locations. An increase of up to 40% recorded in
revenue collection after implementation of HARIS.
3. Land Records: HALRIS: Haryana Land Records Information System is being implemented
for all districts. The ROR (Nakal) services are being provided from Tehsils and the ROR data
of most of the Tehsils have been made available on Internet. HARIS has been dynamically
integrated with HALRIS. The project received “Silver Icon Award” & a “Bronze Icon Award”
at 8th & 9h national e-governance conferences in Feb. 2005 & Feb., 2006.
4. Commercial Taxes: VATMaCS: Value Added Tax Monitoring, Assessment & Collection
System being implemented at all 21 DETCs offices. The VATMaCS received “Golden Icon
Award” at 8th national e-governance conference in Feb, 2005.
5. Education: Successfully implemented On-Line Off-Campus Counseling project for
Haryana Engineering Admissions as First state in India. The project received Gold Icon
Award at 11th National e-Governance Conference in Feb., 2008 and the project also received
CSI-Nihilant e-Governance Excellence Award of “Excellent Project” in December 2008.
Functions of School Education Board automated. The project BOSE (Board Of School
Education) Haryana - Administrative Re-engineering of processes, publishing of results of
students of Middle, Matric and Plus two exams alongwith issuing of provisional certificates
received “Golden Icon Award” at 8th national e-governance conference in Feb, 2005. The
project RTB: Results Through Binocular – In depth on-line analysis of results of BOSE
received a “Bronze Icon Award” at 9h national e-governance conference during Feb, 2006.
The BOSE project also received Skoch e-Governance Excellence Award in March 2008.
6. Health: Suite of software packages under e-Health.Net project of Health Department
implemented at CMO level. The project Health Care System & e-Health.net received “Silver
Icon

Award”

at

8th

national

e-governance

conference

during

Feb,

2005.

7. Social Welfare: HaPPIS: Haryana Pensions Processing & Information System for more
than 12 lacs pensioners. The project received “Silver Award” during 6th national eGovernance Conference on 24/10/2002.
2

8. Food & Civil Supplies: e-Food.Net: Web Enabled Food Procurement & Storage
Monitoring System, at all districts. he e.Food.Net project received "Merit Citation Award” at
7th national e-governance conference on 13/11/2003.
9. e-DISHA Common Service Centers: One District level e-DISHA Center (DleDC)
established at each districts. The pilot project at Kaithal received CSI-Nihilent e-Governance
best project “runners-up” award on 14/06/2004. Assisted GoHr in rolling out 100% rural
CSCs (e-DISHA Ekal Sewa Kendras) on PPP model as per GOI guidelines, as first state in
country.
10. State Portal: www.haryana.gov.in Single window web based delivery of information and
State Government services at the State level. The portal received “Merit Citation Award”
award

at

7th

national

e-governance

conference

hennai

on

13/11/2003.

11. Municipalities: HACIS: House Tax Assessment & Collection Information System
implemented for all 68 municipalities The database has more than 10 lacs properties records.
The Tax collection was increased from Rs. 3.3 Crore to Rs. 50 Crore just in one year.
12. Road Transport: Driving License Issuance System and Vehicle Registration System
including Sarthi & Vahan are being implemented at more than 40 SDM offices. The complete
automation of Roadways depots; pilot at Chandigarh Depot completed. Being replicated in all
other depots now.
13. Agriculture: Agriculture Marketing Network project implemented at all Mandies.
Comprehensive IT plan and Web Site of Agriculture department, DACNET project for ICAR
institutes. Mustered Procurement Management System at Rohtak received “Silver Icon
Award” under special sector category at 11th National e-Governance Conference in Feb.,
2008
14. Police: Police Network established. A suite of 09 software packages developed &
implemented. The Dynamic Web Portal with citizen services. CIPA implemented at all major
police stations.
15. Employment Exchanges: Employment Exchange Registration Information System
(Registration, Vacancy Booking & Submission) implemented at district exchanges. Web
portal

for

Job

seekers.

Central

web

enabled

system

at

pilot

site.

16. E-District: Established LAN, IT training lab and District level e-DISHA Centers in each
district mini secretariat & implemented Revenue Courts System, Arm Licenses, Certificates
Issuing etc.

3

places Haryana ahead of states like Andhra Pradesh. Pensions: Employees dynamic web Portal for Accountant General Haryana for GPF information & pensions have more than 15 million records for 3. e-Courts: ISHiCo at High Court and SOCJIS (Workflow based Justice Delivery & Judicial Information System) for Sub Ordinate Courts developed and implemented at High Court and pilot districts Ambala. Smart Card based Ration Cards & e-PDS. e-District. CefMaTIS: Centralized File Movement and Tracking Information System & other packages being implemented. DISNIC-Plan Ph-II. 4 . Loan & Advances Monitoring System. Capacity Building etc. organizing field visits and demonstration of e-Governance practices significantly helped Haryana to achieve:  Received India Tech foundation 2nd runners up award – 2003 for the most progressive states of India in e-Governance  CSI-Nihilent e-governance excellence Winner’s award – 2004 for best e-Governed State (Young Category) government of Haryana. Finance: e-Finance. SDC. AgRIS. Gujarat.0 Lakh employees. SSDG. e-Office/e-Administration: Suite of 06 G2G Packages has been Standardized across the state. 19. Patiala and Panchkula judicial court complexes.Net: Workflow based State Annual Budget Preparation & Release Monitoring System over LAN and Interactive Website. Overall Performance ranking of e-Governance Projects : Extensive information compilation. Maharastra etc.17. India Portal. The ICT infrastructure being created at all subordinate court complexes under e-Court project. documentation. 20. Centrally sponsored projects. 18. Haryana High offices e-Governance projects and State sector specific e-Governance projects. Special Projects: NIC-HRSC has been actively involved in development & implementation of special projects like Government e-Procurements System. IntraGov-Haryana Portal with Integrated e-Office Suite.  Status of leader in e-Governance readiness index of country. ranking at 4th position in India 4th Rank in Dataquest-IDC e-Governance Survey 2008 for “best e-Governed State of India”. Karnatka. in a Network environment. 22.  Telecom India Excellence Winner’s Award 2007 for Best e-governed State in eGovernance at International Conference. Central MMPs and actively involved in consultancy and advisory services to state Govt on DIT GoI funded MMPs like SWAN. Goa. interactions with Jury Panels & Survey Teams. 21. State Portal.

1 PROFILE MANAGEMENT: This module maintain the profile of a user like name. status etc. friend’s list organization and various other application to enhance the overall look and feel of the website. groups. However. it is most popular online. dislikes. and high schools.It's the way the 21st century communicates now. like. Although social networking is possible in person. universities. This is because unlike most high schools. 5 . colleges. hobbies. and other connected information/knowledge entities. organizations. Social network is the mapping and measuring of relationships and flows between people. Social networking is the grouping of individuals into specific groups. Profiles and Friends lists are two key features on social network sites. The nodes in the network are the people and groups while the links show relationships or flows between the nodes. especially in the workplace. 'Comments'. 'The Wall'). Social network provides both a visual and a mathematical analysis of human relationships. Social Networking Website project itself is a huge project comprising various features like profile updating. These comments are displayed prominently and visible for anyone who has access to that profile. in this project I am basically working on two essential feature or module ( PROFILE MANAGEMENT & FRIENDS ORGANIZATION ). computers. or workplaces. 2. URLs. The third is a public commenting feature ('Testimonials'.2 FRIENDS ORGANIZATION: This module maintains the friend list. handles request and sends request to the other user. 2. This feature allows individuals to comment on their Friends' profiles. like small rural communities or a neighborhood subdivision.Chapter 2 Profile of Problem Assigned Social Networking . the internet is filled with millions of individuals who are looking to meet other people.

Early adopters. a number of community tools began supporting various combinations of profiles and publicly articulated Friends. Fitzpatrick. when the Swedish web community 6 . LiveJournal listed one-directional connections on user pages. 2007)—on LiveJournal. list their Friends and. personal communication.Weinreich. it failed to become a sustainable business and. July 11.shortly after its launch in 1999. and dating profiles— users could identify Friends on their personal profiles without seeking approval for those connections . personal communication. and most users were not interested in meeting strangers. but users could not create profiles or list Friends until years later. Each of these features existed in some form before SixDegrees.com allowed people to affiliate with their high school or college and surf the network for others who were also affiliated. independent of these other sites (see Kim & Yun. SixDegrees promoted itself as a tool to help people connect with and send messages to others. Classmates. professional. the first recognizable social network site launched in 1997. From 1997 to 2001. beginning in 1998. LiveJournal’s creator suspects that he fashioned these Friends after instant messaging buddy lists (B. The Korean virtual worlds site Cyworld was started in 1999 and added SNS features in 2001. Likewise. Looking back. AsianAvenue. SixDegrees was the first to combine these features. BlackPlanet. June 15.com explained that there was little to do after accepting Friend requests. SixDegrees. 2007). AIM and ICQ buddy lists supported lists of Friends. although those Friends were not visible to others. the service closed.com allowed users to create profiles. people mark others as Friends to follow their journals and manage privacy settings. in 2000. most did not have extended networks of friends who were online. While SixDegrees attracted millions of users.Chapter 3 Study of Existing Systems According to the definition above. its founder believes that SixDegrees was simply ahead of its time (A. this issue). Likewise. Profiles existed on most major dating sites and many community sites. surf the Friends lists. While people were already flocking to the Internet. and MiGente allowed users to create personal. of course.

the cultures that emerge around SNSs are varied. or nationality.LunarStorm refashioned ias an SNS in 2000.existing social networks. there are hundreds of SNSs. such as mobile connectivity. sexual. while others attract people based on common language or shared racial. but others help strangers connect based on shared interests. and photo/ video-sharing.1 Problem Statement : Social networking sites are not only for you to communicate or interact with other people globally but. Sites also vary in the extent to which they incorporate new information and communication tools. it contained Friends lists. this is also one effective way for business promotion. personal communication. 2007) Chapter 4 SYSTEM REQUIREMENTS 4.1 Product Definition : We define friendster network sites as web-based services that allow individuals to construct a public or semi-public profile within a bounded system. and view and traverse their list of connections and those made by others within the system. Most sites support the maintenance of pre. 4. Cyworld and Hi5 have attracted millions of users. political views. represents a huge pool of information from day to day living.1. Skog. While their key technological features are fairly consistent. 7 . As of this writing. Since their introduction. many of whom have integrated these sites into their daily practices. with various technological affordances. or activities. articulate a list of other users with whom they share a connection. blogging. social network sites (SNSs) such as MySpace. It isn't just a social media site used to socialize with your friends but also. Some sites cater to diverse audiences. guestbooks.based identities. The nature and nomenclature of these connections may vary from site to site. religious. A lot of business minded people these days are now doing business online and use these social networking sites to respond to customer queries. and diary pages (D. September 24. supporting a wide range of interests and practices. Facebook.

though in a broader sense.  Account Object Each user who wants to use the site must create an account. platform. activities. backgrounds. When any other model object such as a page is pulled from the server. notes. or site that focuses on facilitating the building of social networks or social relations among people who. 4. The account’s information has four purposes: hold the login information. There is no need for multiple functions or a function that takes a large number of parameters. and interests within their individual networks.A social networking service is an online service. It essentially act as a link between all of the information such as accounts. pages. the Account class would be very large and difficult to work with. such as e-mail and instant messaging. and hold privacy information with such a large amount of information to keep track of.  Account Details Object An Account Details object is a helper class created whenever a new Account object is created. This is the head class that all other objects use to determine what a user does and when the user did it. Therefore to ease the load. A social network service consists of a representation of each user (often a profile). Online community services are sometimes considered as a social network service. Most social network services are web-based and provide means for users to interact over the Internet.1. If that temporary copy is changed in any way. events. his/her social links. account details. for example. social network service usually means an individual-centered service whereas online community services are group-centered. etc to our database. Social networking sites allow users to share ideas. The object contains all the information that shows up in the user’s profile. a temporary copy is made. and a variety of additional services. hold profile information. the Account class was broken up into three different classes. activities. hold friend information. or real-life connections. share interests.2 Functions Provided:  Server Object The Server class acts as a wrapper for all server functions for our social networking site. The user can edit 8 .

The only difference is that the Wall Post objects are viewable to all friends of the user. When a user checks his or her inbox. Each object is a ”working-copy” of an object in the Server.  Wall Post Object A Wall Post object works very similar to a Message object. such as who can view his/her media or custom pages. an entry of its creation is added to the news feed database. Event Object. If a user adds a wall post to his or her own account. The database is queried for an account that has the search term contained in the full name. Link Object.this by modifying his/her profile. After it is confirmed that the friend is located in the database. a list of messages that were sent to the user will be shown in descending order of when they were received. This object contains all the privacy settings that a user has. Another difference is that a Wall Post object can hold comments. In our Social Networking site. any media files with the search terms in the 9 . Note Object and Page Object These objects contain unique information for a particular type of action a user performs. the Message object adds its information to the database.  Privacy Settings Object A Privacy Settings object is the other helper class created whenever a new Account object is created.  Message Object A Message object is created when a user composes a new message to be sent to a friend. their status will change to the new wall post. However. Users can type in the name of a friend in the search bar at the top of their home page. This class is called any time a user visits a profile or content created by another user. making friends is a fairly straightforward process. All of these contain a reference to the account that owns them. Overall.  Friends The most important feature is being able to add and remove friends. Anytime one of these objects is created on the Server.  Chat Session Object. it does not directly interact with the other model classes. this class has no other purpose but to be a helper class to its account object. only the view.

On every page there is a JQuery function that queries the server for any new chat requests once a second. The purpose behind the password confirmation is to ensure that the user didn’t accidentally mistype when creating a password. and social networking is no exception to this. When a user clicks on a friend name to begin a chat. any pages with the search terms in the titles. For example. notes. the friend receiving the chat will get a notification that a new chat session has started. To change privacy levels. By default. and closed. The chat feature is a little more complex than others as it requires a combination of JavaScript and JQuery to work. To start a chat session. the user can click on the options tab on the top menu bar. The current features with privacy levels are media share.  Privacy Options Privacy is very important feature for some people. By contrast.description. he/she will appear in the chat tab as an available friend to chat with.  Chatting One of the advantages of having friends is the ability to have live communications with them via chat. Also. This includes the email. a chat request is sent to the database. so the client can 10 . account wall. he/she must create an account before using any of the site features. A feature with a friends only privacy level is fairly self explanatory. When a friend is online. simply click on the name of the friend which will begin a new chat session. It needs to be JQuery.  Account Creation When a user accesses the site for the first time. User A could search for User B in the search bar. and password confirmation. The little bar at the bottom will change from chat disabled to chatting with friend name as seen in the figure below. password. and any notes with the search terms in the title. The first section deals with the login information and is required for the user to fill out. any links with the search terms in the titles. Then the two friends can chat with each other until one or both log out. The account creation process is broken into three sections. A feature with an open privacy level is public and may be viewed by anyone. al privacy levels are set to open when a new account is created. friends only. a feature with a closed privacy level is completely private and can only be viewed by the account owner. user pages. and the overall profile privacy. Our system provides three levels of privacy: open.

 Messaging Unlike with chatting. At the same time. if a user is throwing a birthday party. notifying the receiver of the new chat that is starting or a new pending chat if the user is in another chat. The receiver account is validated. He then fills out the form as shown in the figure below with the email of the recipient. Retrieving messages sent to the user is a simple method of querying the server for any messages that have been sent to the user.request for the server to run a check and return any relevant information. the message body. the page would never load completely. and the message content. The message body is retrieved from a user submitted form. he/she could create an event an invite friends he/she wants to attend or simply make it a 11 . and the receiver account is retrieved from the recipient email address. users can send a message to any other user. it is a lot of the client asking the server to send over any changes that exist. Overall. and the date it was sent. First a message object is constructed that takes in the to and from accounts. to alert the server that it needs to update the chat session with a new message. Any matches are returned to the inbox of the user as shown in the figure below. and this is done by checking the receiver id of each message against the account id of the user. the message title. he/she simply goes to the message center tab and clicks compose message. another JQuery function is running to ask the server once a second if the chat session has been updated. social networking sites are a great place to alert your friends of important upcoming events. Messaging is implemented by storing a record of the message in the server. When a user send a message. If it was pure PHP. to ensure the sender didn’t try to send a message to a non-existent receiver.[3] If there is a new chat request. The JavaScript portion of JQuery allows the client to ask the server to do more processing after the page has been loaded. The new message will then be in User B’s inbox in the message center.  Events In addition to messaging your friends. For user A to send a message to user B. For example. the new message is stored in the server. another JQuery function is called. the from account is retrieved from the user session. because the page cannot finish loading until the server is done all preprocessing. a pop under is generated. Finally.

If the extension is in 12 .[1] That extension is then checked against an array of allowed extensions. and wav. That new event is then sent to the server. Through PHP all information about these temporary files can be accessed through the $ FILES variable. he/she can click on the edit link next to the event where a similar form to creating an event will be displayed with all the fields populated with the current event information. He/she can then view the new event by clicking on the Events tab and clicking on the new event. and pdf. the user will be brought to the standard confirmation page. video.. The inner workings of this uploading process are surprisingly simple.  Media Uploading As people use their friendster networking account. to share with their friends. Once the form data is submitted. the file is sent to the server and stored in a temporary location. audio extensions mp3.public for anyone. gif. and bitmap. The media upload section will be located at the media tab. The process of creating an event is as simple as filling out a form which looks like this. If the user wishes to edit some information about the event. which creates a database query and stores the fields of the event object into equivalent fields of the event database table. These allowed extensions cover popular image extensions such as png. rtf. only certain file extensions are supported. In order to prevent users from uploading potentially malicious files such as executables. Storing the event is a fairly straightforward process. The temporary location is stored in that variable and can be used to pull the file name and file extension. doc. Retrieving events is also a fairly straightforward process. a new Event object is created storing the Account that created the event as well as all the information sent along with the form. jpg. A MySQL query is called to pull the contents of the event into an array. since the HTTP server takes care of requesting the file from the client automatically. wma. After filling out the form. they will want to be able to upload funny or interesting images. and that array is used to instantiate a new working copy of the event in an Event object. where users are able to specify a file to upload as well as provide a short description of the file to be uploaded. and some document files including txt. video extensions wmv and avi. etc. After the user clicks upload. music.

it is left in the temporary folder where it will be automatically deleted by the server once the php script completes 13 . the file is then moved to a permanent location in the media folder under a subfolder for the user’s account. If the extension is not on the list.the list.

this class has no other purpose but to be a helper class to its account object.4.4 Solution Strategy  Account Details An Account Details object is a helper class created whenever a new Account object is created.3 Processing Environment: H/W&S/W Hardware Requirements Processor : Intel Pentium IV 2.0 GHz and above RAM : 512 MB and above Hard disk : 80GB and above Monitor : CRT or LCD monitor Keyboard : Normal or Multimedia Mouse : Compatible mouse Front End : LAMP Language : PHP Back End : PHP MyAdmin Operation System : Windows XP or above Browser : Any latest browser Software Requirements 4. The user can edit 14 .  Account Details An Account Details object is a helper class created whenever a new Account object is created.1. The object contains all the information that shows up in the user’s profile. The user can edit this by modifying his/her profile.1. The object contains all the information that shows up in the user’s profile. Overall.

When any other model object such as a page is pulled from the server. There is no need for multiple functions or a function that takes a large number of parameters. ability to meet their user needs and effective use of resources. output. effort and the time that spend on it. notes. programs and procedures. It essentially act as a link between all of the information such as accounts. of running the system once it has been designed. The reason behind local copies is that all the necessary information for the object is sent over in one easy-to-use package. which is the impact on the organization.1 Technical feasibility: The system must be evaluated from the technical point of view first. account details.  Server The Server class acts as a wrapper for all server functions for our social networking site. If that temporary copy is changed in any way. The following are its features: 4. The new version must be sent to the server in order to update the permanent copy. Then the update to the database can be done all at once by sending back that single object. this class has no other purpose but to be a helper class to its account object. Having identified an outline system. required method developing the system.this by modifying his/her profile. Economic and Operational feasibilities. pages. Overall. Technical issues raised during the investigation are:  Does the existing technology sufficient for the 15 . Thus when a new application is proposed it normally goes through a feasibility study before it is approved for development. etc to our database.2 Feasibility Analysis Feasibility study is made to see if the project on completion will serve the purpose of the organization for the amount of work.Feasibility study lets the developer foresee the future of the project and the usefulness. the investigation must go on to suggest the type of equipment. A feasibility study of a system proposal is according to its workability.2. The assessment of this feasibility must be based on an outline design of the system requirement in the terms of input.The document provide the feasibility of the project that is being designed and lists various areas that were considered very carefully during the feasibility study of this project such as Technical. 4. a temporary copy is made.

modules is completed in January . Criteria to ensure that effort is concentrated on project. 4.Since the system is developed as part of project work.3. which will give best. Also all the resources are already available. Advertisement. due to the fact that never version of same software supports older versions. 16 . is the cost it would require.1 Development Schedule Module 1:Profile. return at the earliest. So there are minimal constraints involved with this project. The cost of the hardware and software.3 Project Plan 4. there is no manual cost to spend for the proposed system. which affect the development of a new system. Through the technology may become obsolete after some period of time. that the project is technically very much feasible.3 Behavioural feasibility: This includes the following questions: Is there sufficient support for the users? Will the proposed system cause harm? The project would be beneficial because it satisfies the objectives when developed and installed. Linux.2. One of the factors. Discussion .Events.Febraury. The project is developed within latest technology. 4. The benefits in the form of reduced costs or fewer costly errors . 4. We as Analysts have identified the existing computer systems (hardware & software)of the concerned department and have determined whether these technical resources are sufficient for the proposed system or not. it give an indication of the system is economically possible for development. The hardware and software requirements are: IDE: Net beans.2. All behavioral aspects are considered carefully and conclude that the project is behaviorally feasible. Friends . the system may still be used. My eclipse .Groups . We have found out thus.2 Economic feasibility: The developing system must be justified by cost and benefit.suggested one? Can the system expand if developed? The project should be developed such that the necessary functions and performance are achieved within the constraints. The system has been developed using Java the project is technically feasible for development.Operating system: Any as Windows.Blogs. The following are some of the important financial questions asked during preliminary investigation:  The costs conduct a full system investigation.

Privacy Option.2 Programming language and Development Tools:  Language: PHP PHP is a scripting language designed to fill the gap between SSI (Server Side Includes) and Perl. or run a powerful website such as Wikipedia or Wikibooks. Its popularity derives from its C-like syntax. Several compilers have been developed which decouple the PHP language from the interpreter. Note Object and Page Object. remotely control hardware. intended for the web environment. Module 3: Integration of all the modules is completed by 15 may 4. The PHP language was originally implemented as an interpreter. PHP 6 is currently under development. static analysis. This enables developers to create powerful applications which can publish a blog. Advantages of compilation include better execution speed. and improved interoperability with code written in other languages.Module 2: Chat Session Object. PHP code is interpreted by a web server with a PHP processor module. Media Uploading is completed in March. PHP is currently divided into two major versions: PHP 4 and PHP 5. Of course. Its principal application is the implementation of web pages having dynamic content. April.3. 17 . The word "Preprocessor" means that PHP makes changes before the HTML page is created. you need a database application such as MySQL. although PHP 4 is deprecated and is no longer developed or supplied with critical bug fixes. "PHP" is an acronym that stands for "PHP: HypertextPreprocessor". which generates the resulting web page: PHP commands can be embedded directly into an HTML source document rather than calling an external file to process data. Link Object. PHP has gained quite a following in recent times. It has also evolved to include a interface capability and can be used in standalone graphical applications. PHP was designed by RasmusLerdorf to display his resume online and to collect data from his visitors. and its simplicity. PHP allows a static webpage to become dynamic. and this is still the most popular implementation. Account creation. and it is one of the frontrunners in the Open Source software movement. Event Object. to accomplish something such as this.

Maria DB and Drizzle. Excel. SQL. PHP is a fundamentally Internet-aware system with modules built in for accessing File Transfer Protocol (FTP) servers. columns.) can be performed via the user interface. indexes. embedded SQL libraries such as embedded PostgreSQL.PHP includes free and open source libraries with the core build. PDF (via the TCPDF library). relations. many database servers.Open Document Text and Spreadsheet. Frequently used operations (managing databases. ISO/IEC 26300 . like displaying BLOB-data as image or download-link 18 . tables. LaTeX and others 5 Administering multiple servers 6 Creating PDF graphics of the database layout 7 Creating complex queries using Query-by-Example (QBE) 8 Searching globally in a database or a subset of it 9 Transforming stored data into any format using a set of predefined functions. intended to handle the administration of MySQL over the Web.  Back End: PHP MyAdmin PHPMyAdmin is a free software tool written in PHP. and others. Microsoft SQL Server and SQLite. Many functions familiar to C programmers such as those in the studio family are available in the standard PHP build. etc. Features provided by the program include: 1 Web interface 2 MySQL database management 3 Import data from CSV and SQL 4 Export data to various formats: CSV. Word. while you still have the ability to directly execute any SQL statement. XML. PhpMyAdmin supports a wide range of operations on MySQL. MySQL. LDAP servers. permissions. users.

Much of MySQL's appeal originates in its relative simplicity and ease of use. Apache. 19 . or breaking down a database into smaller chunks called shards which can be spread across a number of distributed server clusters. MySQL can be scaled by deploying it on more powerful hardware. though further configuration is often required to adjust security and optimization settings. It is still most commonly used in small to medium scale single-server deployments. such as a multi-processor server with gigabytes of memory. MySQL. A typical high-end configuration can include a powerful master database which handles data write operations and is replicated to multiple slaves that handle all read operations. There are however limits to how far performance can scale on a single server ('scaling up'). MySQL can be built and installed manually from source code. but this can be tedious so it is more commonly installed from a binary package unless special customizations are required. multi-server MySQL ('scaling out') deployments are required to provide improved performance and reliability. it has gradually evolved to support higher-scale needs as well. so on larger scales. In the medium range. On most Linux distributions the packagemanagementsystem can download and install MySQL with minimal effort." Free-software-open source projects that require a full-featured database management system often use MySQL. Though MySQL began as a low-end alternative to more powerful proprietary databases. and is a central component of the widely used LAMP open source web application software stack (and other 'AMP' stacks).MySQL MySQL is a popular choice of database for use in web applications. Further improvements in performance can be achieved by caching the results from database queries in memory using memcached. Perl/PHP/Python. either as a component in a LAMP-based web application or as a standalone database server. which is enabled by an ecosystem of open source tools such as phpMyAdmin. LAMP is an acronym for "Linux. The master server synchronizes continually with its slaves so in the event of failure a slave can be promoted to become the new master. minimizing downtime.

20 .

then whenever X is changed Y must be explicitly recalculated. One benefit of dataflow is that it can reduce the amount of coupling-related code in a program. Dataflow is also sometimes referred to as reactive programming. many (if not most) visual programming languages have been based on the idea of dataflow. 21 . In particular. then when any of those cells is updated the first cell's value is automatically recalculated. without dataflow. For example. The data-centric perspective characteristic of data flow programming promotes high-level functional style of specifications. For example. or to make a robot turn in response to a change in light level. It's possible for one change to initiate a whole sequence of changes. if a variable Y depends on a variable X. with spreadsheets perhaps the most widespread embodiment of dataflow. as done in spreadsheets. Dataflow embodies these principles. in a spreadsheet you can specify a cell formula which depends on other cells. and so on. There have been a few programming languages created specifically to support dataflow. thereby eliminating the coupling from X to Y. For example. The dataflow technique is not restricted to recalculating numeric values. This means that the update operation must be explicitly contained in the program and eventually checking must be added to avoid cyclical dependencies. Distributed dataflows have also been proposed as a programming abstraction that captures the dynamics of distributed multi-protocols. This means that Y is coupled to X.Chapter 5 System Requirement Specification 5. dataflow can be used to redraw a picture in response to mouse movements. Dataflow improves this situation by making the recalculation of Y automatic.1 Data Flow Specifications Dataflow is a software architecture based on the idea that changing the value of a variable should automatically force recalculation of the values of variables which depend on its value. if one cell depends on another cell which depends on yet another cell. and simplifies formal reasoning about system components. Dataflow makes implicit a significant amount of computation that must be expressed explicitly in other programming paradigms.

22 . the user will be given various links (such as search users.Data flow diagrams model the flow of data into. search boards. After successfully logging on. and be able to select options from there. and out of an information system: • show the processes that change or transform data • show the movement of data between processes • represent a system as a network of processes which transform data flowing between them The user screen flow shows what a user of the community will see. view mail. or go back to their home. through.). etc.

and gender.Chapter 6 Functional and Performance Specification 6. This includes the email. This is the head class that all other objects use to determine what a user does and when the user did it. the Account class would be very large and difficult to work with. There is the actual account class which keeps track of login information and friend information. he/she must create an account before using any of the site features. The only time the Account class needs to be updated is when the user changes his/her username and/or password. Profile information wasoutsourced to the Account Details class. The first section deals with the login information and is required for the user to fill out. location. The second section deals with information about who you are such as name. Most of these fields are optional except for your name and gender. The account creation process is broken into three sections. Unlike the other two sections. the Account class was broken up into three different classes. The account’s information has four purposes: hold the login information.1 Functional Specifications  Account Creation functionality When a user accesses the site for the first time. Therefore to ease the load. such as interests and activities.  Account Object functionality Each user who wants to use the site must create an account. hold profile information. and the user is brought back to the login page. and privacy settings are added to the server. and password confirmation. account details. a new account. and hold privacy information with such a large amount of information to keep track of. It wouldn’t be much of a social network if everyone was named anonymous. and privacy settings were outsourced to the Privacy Settings class. Once the user clicks create account. It also holds the other two classes within it. 23 . The final section deals with information about the users likes and dislikes. All other settings are handled by the Account Details and Privacy Settings classes. The purpose behind the password confirmation is to ensure that the user didn’t accidentally mistype when creating a password. password. hold friend information. this section is completely optional.

pages. Account Details functionality An Account Details object is a helper class created whenever a new Account object is created.  Privacy Settings functionality A Privacy Settings object is the other helper class created whenever a new Account object is created.  Message functionality A Message object is created when a user composes a new message to be sent to a friend. notes. the Message object adds its information to the database. this class has no other purpose but to be a helper class to its account object. a temporary copy is made. Overall. When a user checks his or her inbox. The reason behind local copies is that all the necessary information for the object is sent over in one easy-to-use package. There is no need for multiple functions or a function that takes a large number of parameters. such as who can view his/her media or custom pages.  Server functionality The Server class acts as a wrapper for all server functions for our social networking site. However. The new version must be sent to the server in order to update the permanent copy. This class is called any time a user visits a profile or content created by another user. a list of messages that were sent to the user will be shown in descending order of when they were received. After it is confirmed that the friend is located in the database. It essentially act as a link between all of the information such as accounts. When any other model object such as a page is pulled from the server. 24 . The object contains all the information that shows up in the user’s profile. The user can edit this by modifying his/her profile. only the view. etc to our database. account details. If that temporary copy is changed in any way. This object contains all the privacy settings that a user has. it does not directly interact with the other model classes. Then the update to the database can be done all at once by sending back that single object.

any links with the search termsin the titles. Finally. By contrast. A feature with a friends only privacy level is fairly self explanatory. and social networking is no exception to this. friends only.  Friends functionality The most important feature is being able to add and remove friends. Also. Wall Post functionality A Wall Post object works very similar to a Message object. and closed. In our Social Networking site. The database is queried for an account that has the search term contained in the full name. a feature with a closed privacy level is completely private and can only be viewed by the account owner. A feature with an open privacy level is public and may be viewed by anyone. letting it sit there indefinitely.  Privacy functionality Privacy is very important feature for some people. Clicking on it will send an alert to User B that User A wants to be a friend. and the overall profile privacy. Being friends has its advantages. user pages. notes. The current features with privacy levels are media share. 25 . For example. Users can type in the name of a friend in the search bar at the top of their home page. account wall. friends can view any part of a profile that is marked as friends only. To change privacy levels. any pages with the search terms in the titles. After clicking on User B’s profile. where he/she can either accept it or ignore it. If user B accepts the request. User A will be added to User B’s friends list and vice versa. Our system provides three levels of privacy: open. for a user to view his/her friends and incoming friend requests. the user can click on the options tab on the top menu bar. Another difference is that a Wall Post object can hold comments. User A could search for User B in the search bar. al privacy levels are set to open when a new account is created. The friend request will now be in the friends list of User B. he/she just clicks on the friends tab which brings up a frame. any media files with the search terms in the description. only friends can chat to each other. User A will see a button that says Send Friend Request. By default. If a user adds a wall post to his or her own account. The only difference is that the Wall Post objects are viewable to all friends of the user. and any notes with the search terms in the title. For example. their status will change to the new wall post. making friends is a fairly straightforward process.

Also. so the client can request for the server to run a check and return any relevant information. At the same time. When a user clicks on a friend name to begin a chat. On every page there is a JQuery function that queries the server for any new chat requests once a second. and that queries the database to set the record for that privacy settings object to the new values. the profile owner is pulled from the database. because the page cannot finish loading until the server is done all preprocessing. another JQuery function is running to ask the server once a second if the chat session has been updated. notifying the receiver of the new chat that is starting or a new pending chat if the user is in another chat. Then the two friends can chat with each other until one or both log out. 26 . a chat request is sent to the database. a pop under is generated. When a user visits another profile. When a friend is online. That working copy is then passed into the update method of the server. When a user send a message. It needs to be JQuery. the Privacy Settings object in the account is updated with new privacy settings. The chat feature is a little more complex than others as it requires a combination of JavaScript and JQuery to work. Overall.[3] If there is a new chat request. If it was pure PHP. In the function the privacy settings object is pulled from the viewer profile and the page type determines which privacy setting is pulled from the object  Chatting functionality One of the advantages of having friends is the ability to have live communications with them via chat. simply click on the name of the friend which will begin a new chat session. another JQuery function is called. The little bar at the bottom will change from chat disabled to chatting with friend name as seen in the figure below. The JavaScript portion of JQuery allows the client to ask the server to do more processing after the page has been loaded. A function called can view page() is and is passed the profile owner. To start a chat session.The implementation of privacy is a fairly straightforward process. he/she will appear in the chat tab as an available friend to chat with. When the user makes changes to the privacy level. it is a lot of the client asking the server to send over any changes that exist. to alert the server that it needs to update the chat session with a new message. the page would never load completely. the friend receiving the chat will get a notification that a new chat session has started. the viewer profile and the page type.

he/she can click on the edit link next to the event where a similar form to creating an event will be displayed with all the fields populated with the current event information. the message title. The new message will then be in User B’s inbox in the message center. Retrieving messages sent to the user is a simple method of querying the server for any messages that have been sent to the user. users can send a message to any other user.  Events functionality In addition to messaging your friends. He/she can then view the new event by clicking on the Events tab and clicking on the new event. and this is done by checking the receiver id of each message against the account id of the user. First a message object is constructed that takes in the to and from accounts. Messaging functionality Unlike with chatting. to ensure the sender didn’t try to send a message to a non-existent receiver. and the date it was sent. the new message is stored in the server. the user will be brought to the standard confirmation page. and the receiver account is retrieved from the recipient email address. a new Event object is created storing the Account that created the event as well as all the information sent along with the form. Storing the event is a fairly straightforward process. He then fills out the form as shown in the figure below with the email of the recipient. The receiver account is validated. the message body. The message body is retrieved from a user submitted form. Messaging is implemented by storing a record of the message in the server. he/she could create an event an invite friends he/she wants to attend or simply make it a public for anyone. Any matches are returned to the inbox of the user as shown in the figure below. social networking sites are a great place to alert your friends of important upcoming events. Once the form data is submitted. After filling out the form. If the user wishes to edit some information about the event. which creates 27 . he/she simply goes to the message center tab and clicks compose message. That new event is then sent to the server. if a user is throwing a birthday party. Finally. For user A to send a message to user B. The process of creating an event is as simple as filling out a form which looks like this. the from account is retrieved from the user session. For example. and the message content.

The inner workings of this uploading process are surprisingly simple. it is left in the temporary folder where it will be automatically deleted by the server once the php script completes. Retrieving events is also a fairly straightforward process. Wall The wall is a place where the account owner can express his current feeling or thoughts with a wall status. they will want to be able to upload funny or interesting images. If the extension is in the list. to share with their friends. and are stored similarly but are used for different purposes. doc. After the user clicks upload. All are created using similar methods. audio extensions mp3. The media upload section will be located at the media tab.  Other functionality All the other features. Other users can add their thoughts by creating wall posts that show up below 28 . In order to prevent users from uploading potentially malicious files such as executables. and bitmap. the file is then moved to a permanent location in the media folder under a subfolder for the user’s account. gif. only certain file extensions are supported. such as the wall pages.  Media Uploading functionality As people use their friendster networking account. the file is sent to the server and stored in a temporary location. video extensions wmv and avi. and pdf. since the HTTP server takes care of requesting the file from the client automatically. etc. and some document files including txt. rtf. where users are able to specify a file to upload as well as provide a short description of the file to be uploaded. music. The temporary location is stored in that variable and can be used to pull the file name and file extension. Through PHP all information about these temporary files can be accessed through the $ FILES variable. If the extension is not on the list. and notes are fairly similar. 1. wma. jpg. Their main purpose is to add additional places to have places for additional content.a database query and stores the fields of the event object into equivalent fields of the event database table. and wav. These allowed extensions cover popular image extensions such as png. video. A MySQL query is called to pull the contents of the event into an array. and that array is used to instantiate a new working copy of the event in an Event object.[1] That extension is then checked against an array of allowed extensions..

 Password recovery system is also provided in case of forgetting the password.  The database used here is robust. It is basically a way for many users to communicate publicly or simply leave their thoughts about each other. because if any user logout from any session then nobody will be able to access his profile without knowing his confidential password.  This application can be accessed from any type of platform. 29 .  There is no case of redundancy in the database so it will not take extra memory space. So users will have to wait for the output very short time. reliable & fast. This application is secure for every kind of its users.the status.  24 X 7 availability  Better component design to get better performance at peak time.2. Non-Functional Specification  Secure access of confidential data by user name and password. 6.  Username & password are sent to the users via email after registration.

After successfully logging on.Chapter 7 Application Design 7.). view mail. and be able to select options from there.1 Detailed Data Flow Diagrams Data flow diagrams model the flow of data into. 30 . through. etc. search boards. the user will be given various links (such as search users. and out of an information system: • show the processes that change or transform data • show the movement of data between processes • represent a system as a network of processes which transform data flowing between them The user screen flow shows what a user of the community will see. or go back to their home.

validating a hardware design. A use case is a methodology used in system analysis to identify.2 Use case diagrams. testing and debugging a software product under development. the term "system" refers to something being developed or operated. and customer relations. A use case diagram contains four components. Use case diagrams are employed in UML (Unified Modeling Language). a standard notation for the modeling of real-world objects and systems. clarify. which defines the system of interest in relation to the world around it. A use case diagram is a graphic depiction of the interactions among the elements of a system. For example. 31 . In this context. creating an online help reference. The boundary. such as a mail-order product sales and service Web site. catalog updating. System objectives can include planning overall requirements. or performing a consumer-service-oriented task.1 Client Screen Flow 7. use cases in a product sales environment would include item ordering. payment processing. and organize system requirements.Figure 7.

 The actors. which are the specific roles played by the actors within and around the system.  The use cases.2 Login/Registration  Home Page 32 Get password email .   The relationships between and among the actors and the use cases. usually individuals involved with the system defined according to their roles. Login/Registration <<include>> Regester for login Get email to confirm registration <<include>> Login Validate user User <<include>> Request for forgetted passward <<include>> Fig 7.

Fig 7.3 homepage  Wall Page 33 .

4 Wall page  Blog Page Add/ Modify/ Delete Post to blog Add/ Delete comment on blog post User Fig 7.5 Blog page  Profile Page 34 .Delete message from own wall User Reply to Message Fig 7.

6 Profile page  Search Friend Page Get List of Searched Friend Add friend User Write message on friends wall Delete own message from friendrs wall Fig 7.Add/ Modify/ delete profile info User Fig 7.7 Search friend page 35 .

 Friend List Page View Profile Info Write message on friends wall Delete own message from friendrs wall User Delete friends Add/ Delete comment on blog post Fig 7.8 Friend List Page  Photo Page Add/ Delete photo User Fig 7.9 Photo page 36 .

respectively. UUuUUUUUU USER Response received ADMIN Login Views Personal detail Response received Send Invitation Views Mail Message Detail Entered new data or existing data update Fig 7.3 Context Diagram The highest level data flow diagram is the context diagram. also called a fundamental system model or context diagram represents the entire software element as a single bubble with input and output data indicated by incoming and outgoing arrows.10 0 level DFD 37 .7. 0 Level DFD:A level 0 DFD. • The context diagram shows the interaction of the system with its environment in terms of data flows • The context diagram defines the boundary of the system (the scope of the system) • Only the data flows which leave the system and the data flows which come from outside the system are shown.

Fig 7. It provides a requirements and flow of data from 1 bubble to another.11 1 level DFD 38 detailed view of .1 Level DFD: This level of DFD provide more detailed structure.

For example. It may also be non-tangible such as an event. entities are represented by tables and attributes by columns. Attributes: Attributes are units that describe the characteristics or properties of entities. It was developed to facilitate database design by allowing specification of an enterprise schema. example. The entity relationship diagram of mailing system is drawn on the next page: 39 . It is based on a perception of a real world that consists of a collection of basic objects. entities are represented in rectangles. or attributes. An entity may be a tangible object such as a student. They are drawn in elliptical shapes along with the entity rectangles. the goods entity may have attributes like code and price. Entity: An entity is an object that has its existence in the real world. An Entity Set: It is a set of entities of the same type that share the same properties. if we say that a customer buys goods. The set of all persons who are customers at a given bank. a job title or a customer account. a place or a part. Diagrammatically. a customer entity might have numerous attributes such as code. called entities. which represent the overall logical structure of a database. name and addresses.4 ENTITY RELATIONSHIP DIAGRAM The entity relationship model is a high level data model.7. Similarly. In a database. It includes all those “things” about which data is collected. and of relationship among these objects. For example. can be defined as the entity set customer. it means customer and goods are entities.

ENTITY RELATIONSHIP DIAGRAM 40 .

Fig 7.12 ERD 41 .

which can then be used to create a database. it can be thought of the logical design of the relation of the base data structures used to store the data. Need to generate a design in a data definition language. A database is a collection of rows and columns in which rows indicates the tuple and column indicates the domain of table. but also the forms and queries used as part of the overall database application within the database management system (DBMS). However. not just the base data structure. A fully attributed data model contains detailed attributes for each entity. This logical data model contains all the needed logical and physical design choices and physical storage parameters. and most correctly. Principally. In the relational model these are the classes and named relationships. Fig 7.7.13 List of tables 42 . the term database design could also be used to apply to overall process of designing. Database design is the process of producing a detailed data model of a database.5 Database Data base is used to store the relevant information of the individuals. The term database design can be used to describe many different parts of the design of an overall database system.

4 Indexes Keyname Type Unique Packed Column Cardinality Collation Null Comment PRIMARY BTREE Yes No day_id 31 Table 3.5 Friends Column Type Null Default member_id int(11) No datetime No datetime Comments 43 A No .1 Comment Column Type Null Default comment_i int(11) d No comment No Text Comments date_create varchar(50 No d ) member_id varchar(30 No ) Table 3.3 Day Colum Type n Null Default day_id int(11) No Day int(2) No Comments Table 3.3 Data Dictionary Table 3.7.2 Indexes Keyname Type Unique Packed Column PRIMARY BTREE Yes No Cardinality Collation Null Comment comment_id 12 A No Table 3.

7 Indexes Keyname Type Unique Packed Column Cardinality Collation Null Comment PRIMARY BTREE Yes No like_id 0 Table 3.6 Likes Column Type Null Default like_id int(11) No remarks Text No Comments remarksb varchar(30 No y ) Table 3.Status varchar(11 No ) friends_wit int(11) h No Table 3.8 Members Column Type member_id int(11) Null Default Comments No UserName varchar(10) No Password varchar(80) No FirstName varchar(30) No LastName varchar(30) No Address varchar(200 No ) ContactNo varchar(14) No Url varchar(100 No ) 44 A No .

Birthdate varchar(20) No Gender varchar(6) No DateAdded varchar(45) No profImage varchar(200 No ) Curcity varchar(50) No hometown varchar(50) Yes NULL Interested varchar(30) Yes NULL language varchar(30) Yes NULL College varchar(100 Yes ) NULL highschool varchar(200 Yes ) NULL experience varchar(200 Yes s ) NULL Arts Text Yes NULL aboutme Text Yes NULL Month varchar(20) Yes NULL Day varchar(2) Yes NULL Year varchar(4) Yes NULL Stats varchar(30) Yes NULL Table 3.9 Indexes Keyname Type Unique Packed Column PRIMARY BTREE Yes No Cardinality Collation Null Comment member_id 13 45 A No .

Table 3.13 Indexes Keyname Type Unique Packed Column Cardinality Collation Null Comment PRIMARY BTREE Yes No month_id 12 46 A No .12 Month Column Type Null Default month_i int(11) d No Month Comments varchar(15 No ) Table 3.11 Indexes Keyname Type Unique Packed Column PRIMARY BTREE Yes No Cardinality Collation Null Comment message_id 0 A No Table 3.10 Messages Column Type Null Default message_i int(11) d Comments No receiver varchar(40) No recipient varchar(40) No datetime datetime content varchar(100 No ) Status varchar(6) No No Table 3.

Table 3.14 Photos Column Type Null Default photo_id int(11) No location varchar(200 No ) member_i int(11) d Comments No Table 3.15 Post comment Column Type Null Default comment_id int(11) No content Text No Comments commentedb varchar(30) No y Pic varchar(100 No ) Id int(40) No date_created varchar(50) No 47 .

All testing is to be conducted in accordance to the test conditions specified earlier. design and coding. System testing is the process of checking whether the developed system is working according to the objective and requirement. This will ensure that the test coverage meets the requirements and that testing is done in a systematic manner. The selection of test cases is done vide 48 . Test case design focuses on a set of techniques for the creation of test because that meet overall testing objective. When a system is developed it is hoped that it performs properly. manual procedures. computer operations and controls. The thorough testing of the system before release of the software needs to be done vide the various test cases and modes so that the software becomes devoid of bugs and uses minimum space requirements as well as minimum time to perform. The process of analyzing the software item to detect the differences between existing or required condition and evaluate the features of the software items. The scope of system testing should include both manual and computerized operations. The main purpose of testing an information system is to find the errors and correct them.1 System Testing System testing is a critical element of quality assurance and represents the ultimate review of analysis.Chapter 8 TESTING 8. System testing is comprehensive evaluation of the programs. The test cases were selected beforehand with expected results defined and actual results recorded for comparison.

software is tested both on a stand-alone mode as well after integrating all the modules in the system vide deferent available testing methods/norms. Although test cases are a design by considering the cyclomatic complexity. 8. At the integration level.“White Box Testing” technique to check the internal programming logic and efficiency and vide ”Black Box Testing” technique to check software requirement fulfillment with intension of finding maximum number of errors with minimum effort and time. conditional test. There are various standards existing in the software industry the engineered end product strives to achieve viz. These s t a n d a r d s a r e a c h i e v e d o n l y w h e n t h e c o n c e r n e d s o f t w a r e f u l f i l s t h e t e s t s a s p e r t h e respective testing norms predefined in them vide the various test cases and parameters using the CASE topologies.2 TEST DATA IMPLEMENTATION AND THEIR RESULT The quality and standardization of the software / application package depends truly on the various predefined testing norms and on the performances of the software over those norms. ISO 9002 SEI CMM Level5 etc. Generally. The following Flow Graph methodology was used while testing the software: 49 . still the software code is not in its optional form. the software will be passing to the third party tests which would further enhance the software optimality and efficiency. as all other possible alternative parts in the software are not considered.

fig 8.1 Flow graph 50 .

51 .

nested and unstructured loops were tested thoroughly. Pointer error. 8. concatenated loops. 4. 2. 52 .3 TEST CHARACTERS : test should be neither too simple nor too complex. While performing Loop Testing simple loops. 3.  BLACK BOX TESTING: The method of Black Box Testing is used by the software engineer to derive the required results of the test cases: 1. While performing Condition T e s t i n g D o m a i n T e s t i n g methodology was selected.Black Box Testing alludes to test that are conducted at the software interf ace. Errors in data in binary format.A Black Box Test examines some fundamental aspect of a system with little regard for the internal logic structure of the software. Black box testing was performed to find errors in the following categories:      Incorrect or missing functions Graphics error.Here each circle represents one or more non branching procedural language or source code statements in Flow Graph. Error in data in integer format. File error.Important data structure can be probed for validity.A limited number of important logical paths can be selected and exercised.

Performance error  WHITE BOX TESTING: 53 .   Memory access error. Variable error .

54

In White Box Testing efforts were made to handle the following:• Number of input parameters equal to number of arguments.
•Parameters and arguments attributes match.
• Number of arguments transmitted is called modules equal to
a t t r i b u t e s o f parameters..
•U n i t s y s t e m o f a r g u m e n t t r a n s m i t t e d i s c a l l e d m o d u l e s e q u a l u n i t
s y s t e m o f parameter.
• Number of attributes and order of arguments to build in functions correct.
•Any references to parameters not associated to build in functions correct.
•Input only arguments altered.
•Global variable definition consistent across module.
•Files attributes correct.
•Format specifications matches I/O specification.
•Files opened before use.
•File closed while working is going on.
•I/O errors handled.
•Any textual errors in output information.

UNIT TESTING:

The unit testing is performed to test the validity of the individual units. This is done in the
coding phase with the interactive testing. Thus it itself constitutes a majority of functionality
test for each logical unit.

INTEGRITY TESTING:
55

When

all

the

development

of

all

the

units

or

modules

is

c o m p l e t e d a n d integrated the integrity test phase is started. In this phase the interface
between t h e m o d u l e s a r e t e s t e d . T h i s p h a s e b a s i c a l l y v e r i f i e s w h e t h e r
i n t e r m o d u l e exchange of information and events are as per required system behavior.

56

57 .

Firstly. a properly detailed test pland e m o n s t r a t e s t h a t t h e p r o g r a m s p e c i f i c a t i o n s a r e u n d e r s t o o d c o m p l e t e l y. VALIDATIONTESTING : T es t s w e r e p e r f o r m e d t o f i n d c o n f o r m i t y w i t h t h e r e q u i r e m e n t s . 8. There are two goals in preparing test plans. Secondly. the test plan is used during program testing to prove the correctness of the program. The software was alpha-tested.4 TEST CASES Login: Sl Input Values Test case Conditional being checked Result 1 Email Empty Please Enter valid Username Successfu l 3 Email Already Login ID should be unique Exists or not Successfu l 4 Password Empty Successfu l 5 Password If wrong Enter Password Password 6 Password Length No Please Enter valid Password Successfu l Length should be less than or equal Successfu to 10 character l Registration: Sl No Input Values Test case Conditional being checked 58 Result . P l a n s and p r o c e d u r e s were designed to ensure that all functional r e q u i r e m e n t s a r e satisfied.

Successfu l 4 Password Empty Enter valid Password. Successfu l 5 Password Length Minimum required 6 Confirm Password Empty Password and confirmation Successfu password must be same l 7 Date Birth Of Select Enter valid Username and Successfu Password.1. First Name Empty It must not be empty Successfu l 2 Last Name Empty Last Name must not be empty Successfu l 3 Email Empty Enter valid Email ID. l 8 characters Successfu l Edit Profile: Sl Test case Conditional being checked Result No Input Values 1. First Name Null First Name must not be empty Successfu l 2 Last Name Empty Last Name must not be empty Successfu l 3 City Empty City must not be empty Successfu l 4 State Empty state must not be empty Successfu l 5 Pin code Empty PIN code must not be empty Successfu l 6 Country SELECT Please select country Successfu l 7 High School Empty High School must not be Successfu empty l 8 College SELECT Please select college 59 Successfu .

l 9 Course Empty Course must not be empty Successfu l Photos: Sl Input Values Test case Conditional being checked Result 1. Image Title Null Image title must not be empty Successfu l 2 Add Image BROWSE Please browse image Successfu l 3 Delete Image Select Please select image to delete Successfu l No Chapter 9 SCREENSHOTS 60 .

Fig 9.1.2 Login page 61 .registration page fig 9.

Fig 9.3 Homepage Fig 9.4 Profile page 62 .

6 Post page 63 .Fig 9.5 Friends page Fig 9.

7 Friend's request page ADMIN PANAL SNAPSHOTS Fig 9.8 Admin login page 64 .Fig 9.

9 Admin homepage Fig 9.10 view admin page 65 .Fig 9.

Fig9.11 Admin profile page Chapter 10 CONCLUSION 66 .

As in case of any system development process where there are a number of short comings.com/2013-06-23/india/40146190_1. there have been some shortcomings in the development of this system also.indiatimes.2014 . “Social networking sites effect” 14 <http://articles.While developing the system a conscious effort has been made to create and develop a software package. techniques and resources – that would generate a proper system for ONLINE SOCIAL NETWORKING. I also couldn't implement the scrap book and the selling item page for now but we still have two months of internship left in the company so defiantly we will do it in coming months. While making the system. an eye has been kept on making it as user-friendly. There are some of the areas of improvement which couldn’t be implemented due to time constraints.html> 67 Jan. As such one may hope that the system will be acceptable to any user and will adequately meet his/her needs. making use of available tools. Chapter 11 Bibliography [1] Prof Mishra.timesofindia. One such feature was online chat where members can chat with his friends through this website.

com/2010/07/223-SNSs-in-india-the-make-of-finding-a-dream/ >. The Washington Post.medianama.21 Feb. The Washington Post.pdf> [3] Indira Jain Social networking trends New Delhi: The Times Of India [4] Matas.2014.”Popularity of SNSs among Indian Non-IT Students”. pg.12Jan.org/wiki/SNSs_website>. 2014 < http://ijeit. H2 [5] ”Building a Career Path”. Jan. <http://www.[2] UpenderSingh . 1993. [7] 02 Feb.com/vol%202/Issue%207/IJEIT1412201301_32. Alina. Nov. F05 [6] 16 Jan 2014. 7. 1998. 19. 29 Feb. <http://en. 68 .2014. “SNSs becomes an on-line opportunity for employers and students”.28 Jan.wikipedia.2014.2014. pg.