You are on page 1of 79

Project Report

On

BLOOD DONOR SOCIETY DIGITISATION

Submitted in partial fulfillment of the requirements for the award of degree of

M.SC ( MASTER OF COMPUTER SCIENCE )

TO

Pt. Mohan Lal S.D. College For Women


Gurdaspur

                                 

Submitted To: Submitted By:

Mrs. Surkhab Shelly Simranpreet Kaur (20671831411)

Assistant Prof. Sandeep Kaur (20671831403)

Deptt. Of Computer Science

DEPARTMENT OF COMPUTER SCIENCE    


Pt. Mohan Lal S.D. College For Women , Gurdaspur
ACKNOWLEDGEMENT

With deep sense of gratitude We express my sincere thanks and obligation to our esteemed guide
Assistant Professor Mrs Surkhab Shelly. It is because of her able and mature guidance and co-
operation without which it would not have been possible for us to complete our project.
We would also like to thank Mrs. Poonam Seth, HOD, Dept. Of Computer Science, Pt. Mohan
Lal S.D. College For Women , Gurdaspur for providing the institute with an environment where
one can use her their intellect and creativity to develop something fruitful and also for allowing us
the opportunity to experience dynamic professional environment during our six months Training.
It is our pleasant duty to thank all the staff members of the Computer Science Department for their
time to time suggestions.
Finally, We would like to thank the almighty and our parents for their moral support and our friends
with whom We shared our day-to-day experience and received lots of suggestions that improved our
quality of work.

Simranpreet Kaur (20671831411)

Sandeep Kaur (20671831403)


CERTIFICATE OF APPROVAL

This is to certify that the project report entitled BLOOD DONOR SOCIETY DIGITISATION
submitted to Pt. Mohan Lal S.D. College For Women , Gurdaspur in partial fulfillment of
the requirement for the award of degree of Master Of Computer Science , is an authentic and
original work carried out by Simranpreet Kaur (20671831411) & Sandeep Kaur
(20671831403) under my guidance and supervision. The Department of Computer Science has
accepted the report as the fulfillment of the requirements for the degree of Master of Computer
Science. No part of their report has been submitted to any other College/University for the
reward of any Degree to the best of my knowledge.

Mrs. Poonam Seth

Asst. Prof.
 
(Project Supervisor)

Pt. Mohan Lal S.D. College For


Women

Gurdaspur
DECLARATION

We hereby declare that the project report on, “BLOOD DONOR SOCIETY
DIGITISATION”, which is being submitted in partial fulfillment of the Tr a i n i n g
P r o g r a m m e o f Master Of Computer Science t o Pt. Mohan Lal S.D. College For Women
, Gurdaspur, is the result of the work carried out by us, under the guidance of Assistant
Professor Mrs. Surkhab Shelly of Pt. Mohan Lal S.D. College For Women , Gurdaspur

Simranpreet Kaur (20671831411)

Sandeep Kaur (20671831403)


TABLE OF CONTENTS

 Introduction and Objectives of the Project


 Introduction about Project
 Objectives of the Project
 Advantage
 Drawbacks of the Current Manual System
 Establish the need of the new system
 Proposed System

 Technologies Used
 ASP.NET
 What is .NET?
 Web Services
 NET Framework
 ADO.NET
 Visual C#
 SQL Server 2008

 Hardware And Software Requirements
 Software Development Life Cycle(SDLC)
 Preliminary Investigation
 Defining a Problem
 Software Requirement Specification
 Feasibility Study
 Technical Feasibility
 Economical Feasibility
 Operational Feasibility
 Design
 System Design
 Detailed Design

 Modules Description

 Detail And Working of The Project


 Database Tables
 Data Flow Diagrams
 System Development
 Panel Screen Shots

 Testing
 Acceptance Testing

 System Testing
 Integration Testing
 Unit Testing

 Implementation

 Conclusion

 Bibliography

 
INTRODUCTION AND OBJECTIVES OF THE PROJECT

INTRODUCTION

The persons who like to donate blood registers in my site as well as he can modify
the details if necessary, giving the Login Id and Password. The persons in need of
blood searches for the persons having the same blood group and within the city. If
he found a donor in his city then he gets the total details of the donor, if he doesn’t
find any donor then he is given the contact numbers and addresses of the Life
Saving Contact Persons for major cities. If he doesn’t have any chance to contact
them then he will be provided with Mobile link Paging Services in order to get the
blood.

My Blood Donor Society Digitisation site is available to everyone easily. A


person who likes to donate blood gives his entire details i.e., fill in the registration
form and can create a username with a password by which he can modify his
details if at all there are any changes in his information given before.

My site also helps people who are in need of blood by giving the details of the
donors by searching, if at all there are no donors having the same group and with in
their own city they will be given the addresses with phone numbers of some
contact persons in major cities who represent a club or an organization with free of
cost. If at all the people find any difficulty in getting blood from the contact
persons we will give them a Mobile Link i.e., India’s Largest Paging Service
number through which they can give the message on every ones pagers with the
blood group and city they are living in, such that the donors who view the
messages in their pagers having the same blood group and the in the same city, he
contacts the person on phone who are in need of a blood .
The present project elucidates the following features.

 Registering the Donors


 Modification of Donor Information
 Searching a Donor
 Life Saving Contacts (in major cities)

DRAWBACKS OF EXISTING SYSTEM

 More man power.


 Time consuming.
 Consumes large volume of pare work.
 Needs manual calculations.
 No direct role for the higher officials.
 Damage of machines due to lack of attention.
To avoid all these limitations and make the working more accurately the system
needs to be computerized.

PROPOSED SYSTEM

The aim of proposed system is to develop a system of improved facilities. The


proposed system can overcome all the limitations of the existing system. The
system provides proper security and reduces the manual work. The existing system
has several disadvantages and many more difficulties to work well. The proposed
system tries to eliminate or reduce these difficulties up to some extent. The
proposed system will help the user to reduce the workload and mental conflict. The
proposed system helps the user to work user friendly and he can easily do his jobs
without time lagging.
Expected Advantages of Proposed System

The system is very simple in design and to implement. The system requires
very low system resources and the system will work in almost all configurations. It
has got following features

 Ensure data accuracy’s.


 Proper control of the higher officials.
 Reduce the damages of the machines.
 Minimize manual data entry.
 Minimum time needed for the various processing.
 Greater efficiency.
 Better service.
 User friendliness and interactive.
 Minimum time required.

ADVANTAGE

Key Features Are:


 System Connectivity

 No data duplication

 No Paper Work Required

 Time Efficient

 Cost Efficient

 Automatic data validation


 User friendly environment

 Data security and reliability

 Fast data insertion & retrieval

 Maintaining records of blood

 Crystal Report generation

DRAWBACKS OF CURRENT MANUAL- SYSTEM

 The current manual system has a lot of paper work

 To maintain the records of blood manually, is a Time-consuming job.

 With the increase in database, it will become a massive job to maintain the database.

 Requires large quantities of file cabinets, which are huge and require quite a bit of

space in the office, which can be used for storing records of previous claims.

 The retrieval of records of blood will be a tedious job.

 Lack of security for the records, anyone disarrange the records of your system.

ESTABLISH THE NEED OF NEW SYSTEM

1. Problem of Reliability: Current system is not reliable. It seems to vary in quality from one
month to the next. Sometimes it gives good output, but sometimes the output is worst.

2. Problem of Accuracy: There are too blood mistakes in reports.

3. Problem of timeliness: In the current system the reports and output produced is mostly late
and in most of the cases it is useless because it is not on time.

4. Problem of Validity: The output and reports mostly contains misleading information. The
donor information is sometimes not valid.
5. Problem of Economy: The current system is very costly. We have to spend lots of blood to
keep the system up and going, but still not get the desired results.

6. Problem of Capacity: The current system is suffering from problem of capacity also. The
staff for organization is very less and the workload is too much. Few peoples cannot handle
all the work.

PROPOSED SYSTEM

1. Details: The new proposed system stores and maintains all blood details.

2. Calculations: The new proposed system updates tables and other information
automatically and it is very fast and accurate.

3. Registers: There is no need of keeping and maintaining records and information


manually. It remembers each and every record and we can get any report at any time.

4. Speed: The new proposed system is very fast with 100% accuracy and saves time.

5. Manpower: The new proposed system needs less manpower. Less people can do the
large work.

6. Efficiency: The new proposed systems complete the work of blood people in less time.

7. Reduces redundancy: The most important benefit of this system is that it reduces
the redundancy of data within the data.

8. Easy statements: Month-end and day-end statement easily taken out without
getting headaches on browsing through the day end statements.
NEED

I have designed the given proposed system in the ASP.NET to automate the process of Blood
Donor Society Digitisation. This project is useful for the authorities who keep track of all the
system.
The following steps that give the detailed information of the need of proposed system are:
 Performance: During past several decades, the records are supposed to be manually
handled for all activities. The manual handling of the record is time consuming and
highly prone to error. To improve the performance of the system, the computerized
system is to be undertaken.

 Efficiency: The basic need of this website is efficiency. The website should be
efficient so that whenever a new user submits his/her details the website is updated
automatically. This record will be useful for other users instantly.

 Control: The complete control of the project is under the hands of authorized person
who has the password to access this project and illegal access is not supposed to deal
with. All the control is under the administrator and the other members have the rights
to just see the records not to change any transaction or entry.

 Security: Security is the blood criteria for the proposed system. Since illegal access
may corrupt the database. So security has to be given in this project.
TECHNOLOGIES USED

ASP.NET

What is .NET?
 A vision of how information technology will evolve
 A platform that supports the vision
 A business model of software as a service

1. A Vision.
 Web sites will be joined by Web services
 New smart devices will join the PC
 User interfaces will become more adaptable and donor
 Enabled by Web standards

2. A Platform.
 The .NET Framework
 Visual Studio.NET
 .NET Enterprise Servers
o Database, Messaging, Integration, Commerce, Proxy, Security
 Goal: make it incredibility easy to blood powerful Web applications and Web services

3. A business model.
 Software as a service
 Subscription-based services
 Application hosting

Interoperability: Web languages and protocols must be compatible with one another
independent of hardware and software.
Evolution: The Web must be able to accommodate future technologies. Encourages simplicity,
modularity and extensibility.

Decentralization: Facilitates Scalability and Robustness.

Web Services
 A programmable application component accessible via standard Web protocols
 The center of the .NET architecture
 Exposes functionality over the Web
 Blood on existing and emerging standards are HTTP, XML.

The .NET Framework


What is the .NET Framework?

 A set of technologies for developing and using components to create:


o Web Forms
o Web Services
o Windows Applications
 Supports the software lifecycle
o Development
o Debugging
o Deployment
o Maintenance
 Application Architectures
o The Different types of Applications may vary from single-tier desktop
applications (applications that follow the single-tier architecture) to multi-tier
applications (applications that follow the two-, three, or n-tier architecture)
o Single-tier architecture
 A single executable file handles all functions relating to the user, business,
and data service layers.
o Two-tier architecture
 Divides an application into the following two components:
 Client
 Server
o Three-tier architecture
 All the three service layers reside separately, either on the same machine
or on different machines.
o n-tier architecture
 Uses business objects for handling business rules and data access.
 Has multiple servers handling business services.

The .NET Initiative

 The introduction of the Internet and its rapid growth in the recent past has led to the
development of a number of new Technologies.
 One of the most important requirements of such applications is the ability to interchange
information across platforms and to benefit from the functionality provided by other
applications.
 In the current scenario, although applications serve organization-specific requirements,
they are not interoperable. Microsoft has introduced the .NET initiative with the intention
of bridging the gap in interoperability between applications.
 The .NET initiative offers a complete suite for developing and deploying applications,
which consists of the following:
o NET products: Microsoft has already introduced Visual Studio .NET, which is a
tool for developing NET applications by using programming languages such as
Visual Basic, C#, and Visual C++.
o NET services: Microsoft is coming up with its own set of Web services, known
as My Services. These services are based on the Microsoft Passport
Authentication service, the same service that is used in Hotmail.
Explanation of the .NET Framework
 Is a collection of services and classes?
 Exists as a layer between .NET applications and the underlying operating system.
 Encapsulates much of the functionality, such as debugging and security services.
 The following figure depicts the components of the .NET Framework:

The .NET Framework Base Classes or the .NET Class Framework

 Consists of a class library that works with any .NET language, such as Visual Basic .NET
and C#.
 Provides classes that can be used in the code to accomplish a range of common
programming tasks.
 Comprises
o Namespaces: Namespaces help you to create logical groups of related classes and
interfaces that can be used by any language targeting the .NET Framework.
o Assembly: An assembly is a single deployable unit that contains all the
information about the implementation of classes, structures, and interfaces.
 The Common Language Runtime
o Provides functionality such as exception handling, security, debugging, and
versioning support to any language that targets it.
o Can host a variety of languages and offer a common set of tools across these
languages, ensuring interoperability between the codes.

 Provides the following features:


o Automatic memory management
o Standard type system
o Language interoperability
o Platform independence
o Security management
o Type safety
Advantages of the .NET Framework

Some advantages of the .NET Framework are:


o Consistent programming model
o Multi-platform applications
o Multi-language integration
o Automatic resource management
o Ease of deployment

ADO.NET

 Is a model used by Visual Basic .NET applications to communicate with a database for
retrieving, accessing, and updating data?
 Uses a structured process flow to interact with a database.

ADO .NET Data Access


Most applications need data access at one point of time making it a crucial component when
working with applications. Data access is making the application interact with a database, where
all the data is stored. Different applications have different requirements for database access.
VB.NET uses ADO.NET (Active X Data Object) as it's data access and manipulation protocol,
which also enables us to work with data on the Internet. Let's take a look why ADO.NET came
into picture replacing ADO.

Evolution of ADO.NET

The first data access model, DAO (data access model) was created for local databases with the
blood-in Jet engine which had performance and functionality issues. Next came RDO (Remote
Data Object) and ADO (Active Data Object) which were designed for Client Server architectures
but soon ADO took over RDO. ADO was a good architecture but as the language changes so is
the technology within it. With ADO, all the data is contained in a record set object which had
problems when implemented on the network (Internet) and penetrating firewalls. ADO was a
connected data access which means that when a connection to the database is established the
connection remains open until the application is closed, which raises concerns about database

security and network traffic. And also as databases are becoming increasingly important and as
they are serving more people a connected data access model makes us think about its use. For
example, an application with connected data access may do well when connected to two clients,
the same may do poorly when connected to 10 and might be unusable when connected to 100 or
more. Also, open database connections use system resources to a maximum extent making the
system performance less effective.

Why ADO.NET?

To cope up with some of the problems mentioned above, ADO.NET came into existence.
ADO.NET addresses the above mentioned problems by maintaining a disconnected database
access model which means that when an application interacts with the database the connection is
opened to serve the request of the application and is closed as soon as the request is completed.
Likewise if a database is updated, the connection is opened long enough to complete the Update
operation and is closed. By keeping connections open for only a minimum period of time
ADO.NET conserves system resources and provides maximum security for databases and also
has less impact on system performance. Also, ADO.NET when interacting with database uses
XML by converting all the data into XML and using it for database related operations making
them more efficient.

Features of ADO.NET
 Disconnected data architecture — Applications connect to the database only while
retrieving and updating data.
 Data cached in datasets — ADO.NET is based on a disconnected data structure.
Therefore, the data is retrieved and stored in datasets.
 Data transfer in XML format — ADO.NET uses XML for transferring information from
a database into a dataset and from the dataset to another component.
 Interaction with the database is done through data commands.
ADO.NET Object Model
Key Components of the ADO.NET Model
 Data Provider
o Is used for connecting to a database, retrieving data, and storing the data.
 Is of two types:
o OLE DB data provider
o SQL Server data provider

Components of a Data Provider


 Connection
o Used to establish a connection with a data source
o Some commonly used properties and methods:
 ConnectionString property
 Open()method
 Close()method
 State property
 Data adapter
o Creates a dataset and updates the database.
o Handles data transfer between the database and the dataset through its properties
and methods.
o Displays the data through the process of table mapping.
o Are of two types:
 SqlDataAdapter
 OleDbDataAdapter

 Data command

o Is a SQL statement or a stored procedure that is used to retrieve, insert, delete, or


modify data from a data source?
o Is an object of the SQLCommand class?

 Data reader
o Is used to retrieve data from a data source in a read-only and forward-only mode.
o Stores a single row at a time in the memory.
o Commonly used methods:

 Read()
 Close()
 NextResult()

 Dataset

o Is a disconnected, cached set of records that are retrieved from a database.


o Is present as a Data Set class in the System. Data namespace.
o Has its own object model.

VISUAL C# (Language Used for coding)


Microsoft Visual C# is Microsoft's implementation of the C# specification, included in the
Microsoft Visual Studio suite of products. It is based on the ECMA/ISO specification of the C#
language, which Microsoft also created. While multiple implementations of the specification
exist, Visual C# is by far the one most commonly used. In most contexts, an unqualified
reference to “C#” is taken to blood “Visual C#.”
C# (pronounced "C-sharp") is an object-oriented programming language from Microsoft that
aims to combine the computing power of C++ with the programming ease of Visual Basic. C# is
based on C++ and contains features similar to those of Java.
C# is designed to work with Microsoft's .Net platform. Microsoft's aim is to facilitate the
exchange of information and services over the Web, and to enable developers to blood
highly portable applications. C# simplifies programming through its use of Extensible Markup
Language (XML) and Simple Object Access Protocol (SOAP) which allow access to a
programming object or method without requiring the programmer to write additional code for
each step. Because programmers can blood on existing code, rather than repeatedly duplicating
it, C# is expected to make it faster and less expensive to get new products and services to market.

SQL SERVER 2008


SQL Server is an SQL-compliant RDBMS. SQL-compliant means it use the ANSI (American
National Standard Institute) version of Structured Query Language or ‘SQL’. Structured Query
Language is a command that allow us to modify or retrieve information from the database.
Client server means that SQL Server is designed to store data in the central location (the server)
and deliver it on demand to numerous other locations (the client). SQL Server is also a
Relational Database Management System (RDBMS).

FEATURES OF SQL SERVER 2008:


 Information representation
 Unique definition of rows
 Systematic treatment of Null values
 Guaranteed access
 High level Update, Insert, and Delete

ENTERPRISE MANAGER
SQL Server Enterprise Manager is a graphical tool that allows easy configuration and
management of Microsoft SQL Server and SQL 2008program group.
SQL Server Enterprise Manager can also be used to:
 Manage logins, permission and users.
 Create a database
 Take blood-up of database and transaction logs.
 Manage tables

QUERY ANALYZER
The SQL Server Query Analyzer allows us to create adhoc queries and run them interactively.
We may also execute Transact-SQL statements stored in text file and view the result in result
plane or result grid. The Query Analyzer also has a color-coded editor to assist the user with
checking of syntax. It also has context sensitive help.
Queries are processed in two steps:
 Interpret- First the Queries are checked for syntax.
 Execute- Then the processing take place.
 SQL Stored Procedures
A precompiled collection of Transact-SQL statements stored under a name and processed as unit
.SQL SERVER supplies stored procedures for managing SQL SERVER and displaying
information about databases and users. SQL SERVER supplied stored procedures are called
System stored procedures. A stored procedure is a group of Transact-SQL statements compiled
into a single execution plan.

DATABASE
This tier of the architecture is mainly related to the database that is required in the project. The
database is used for storing data as a set of records and is used for performing Data Manipulation
upon this data stored. This is the job of the Database team within an organization. The database
tier design consists of the following elements:

 TABLES
The data in the database is stored in the form of tables where each column is the set of attributes
that describes data, and each row represents each record of data stored. We study the whole
project and find out what all tables will be required during the project, and then we develop the
tables and their attributes with a naming convention followed. Each unique attribute within each
table is set as the primary key.

 STORED PROCEDURES
In database we use stored procedures for each table defined in the tables section. These are
compiled objects and are used for achieving the advantages of reusability, better security and
performance. These are stored as well as executed in the database. We have defined 5 stored
procedures for each table for performing insert, update, delete, search and display operations on
the data of the database.
HARDWARE AND SOFTWARE REQUIREMENTS

HARDWARE REQUIREMENTS FOR SERVER:

 Processor 500MHz (minimum)

 RAM 4GB

 Hard Disk 1000 GB

HARDWARE REQUIREMENTS FOR CLIENT:

 Processor 4 (minimum)

 RAM 2GB

 Hard disk 500 GB

SOFTWARE REQUIREMENTS:

 . NET Framework 4

 Visual Studio 2010

 SQL Server 2008 R2

 Browser like Internet Explorer, Mozilla, Opera

OPERATING SYSTEM

 WINDOWS 8.1 or higher


SYSTEM DEVELOPMENT LIFE CYCLE
SDLC is an acronym for System Development Life Cycle, a methodology that consists of
development activities that have a prescribed order. Once a problem or opportunity for a new
system is recognized a request for developing a new system is forwarded for approval. If it is
approved, a study is carried out to ensure that the proposed system is feasible. If it is feasible,
then the system’s requirements are specified and are followed by phases of system analysis,
system design, system implementation, and post implementation. A recycling of development
may occur again following system evaluation if the system still requires modification or
redevelopment.
To understand system development we need to recognize that candidate system that has a life
cycle. System analysis and design are keyed to the system life cycle.
The stages of system development life cycle are:
 Preliminary investigation
 Determination of software requirement
 Design of software
 Development of software
 System testing
 System implementation, evaluation and maintenance

PRELIMINARY INVESTIGATION
System development, a process consisting of two major steps of system analysis and design, start
when management or sometimes system development personnel feel that a new system or an
improvement in the existing system is required. The system development life cycle is classically
thought of as the set of activities that analysts, designers and users carry out to develop and
implement an information system. The system development life cycle consists of the following
activities:

 Preliminary investigation
 Determination of system requirements
 Design of system
 Development of software
 System testing
 Implementation, evaluation, and maintenance
DEFINING A SYSTEM
A collection of components that work together to realize some objective forms a system.
Basically there are three major components in every system, namely input, processing and
output.
In a system the different components are connected with each other and they are
interdependent. For example, human body represents a complete natural system. We are also
bound by blood national systems such as political system, economic system, educational
system and so forth. The objective of the system demands that some output is produced as a
result of processing the suitable inputs.

SYSTEM REQUIREMENT SPECIFICATION

The System Requirement Specification & Development Life Cycle Analysis is a common
methodology for any Application development, whether it is a website project which may run on
a network or enterprise level or an standalone project which might be even Multi user. It marks
the phases or steps of information that will be used by the system to decide to acquire the
necessary resources required for it. A careful study is done of how the organization currently
handles the work and how the new system should work. Professionals develop a strategy for
designing a new system, which is then either blood or purchased. Once complete, the system can
be installed on the server, and after proper testing, the user begin to incorporate the new system
into their daily work.

The requirement analysis is the process of discovery and refinement. The hardware required,
software scope initially established during system engineering is refined in detail. Alternative
solution are analyzed and allocated to various elements. It is software engineering task that
bridges the gap between system level software allocation and design. Requirement analysis
enables the system engineering to specify software function and performance, indicates software
interface with other system.
FEASIBILITY STUDY

A feasibility study is a test of a system personal according to its workability, impact on


organization, ability to meet user needs, and effective use of resources. It focus on three major
questions:

1. What are the user’s needs and how does a system meet them?
2. What resources are available for given system? Is the problem worth solving?
3. What are the likely impacts of the system on the organization? How well does it fit within
the organization’s?

Each of these questions may be answered. They resolve around investigation and evaluation of
the problem, identification and description of candidate system, and final selection of the best
system.
To, solve all these problems a detail study of the present system is done. Finally it is seen that the
new system could be implemented as it takes less time comparatively to the existing system. So,
the needed system was feasible enough to be uploaded
A proper feasibility study for the project was carried out and it includes the following three types
of feasibility studies:

 Technical Feasibility
 Economical Feasibility
 Operational Feasibility

1. TECHNICAL FEASIBILITY
Technical Feasibility centers on the existing computer system (hardware, software etc.) and to
what extent it can support the proposed addition. For example, if the current computer is
operating at 80 percent capacity-an arbitrary ceiling-then running another application could
overload the system or requires additional hardware. This involves financial considerations to
accommodate technical enhancements. If the budget is a constraint, then the project is judged not
feasible.
2. ECONOMICAL FEASIBILITY
Economic analysis is the most frequently used method for evaluating the effectiveness of a
candidate system. More commonly known as cost/benefit analysis, the procedure is to determine
the benefits and savings that are expected from a candidate system and compare them with costs.
If benefits outweigh costs, then the decision is made to design and implement the system.
Otherwise, further justification or alterations in the proposed system will have to be made if it is
to have a chance of being approved. This is an ongoing effort that improves in accuracy at each
phase of the system life cycle.
In today’s world the two important factors that judge the success of an online project is the data
security and speed of data access

3. OPERATIONAL FEASIBILITY
People are inherently resistant to change, and computers have been known to facilitate change.
An estimate should be made of how strong a reaction the user staff is likely to have toward the
development of a computerized system.
This study gives us a very clear picture of the existing system as well as the proposed system.
Further with the help of this study one can clearly understand the difference between the two
systems clearly specifying the merits, which shall be attained from the proposed system.In most
cases, the introduction of new system requires special effort to educate, sell, and train the staff on
the new ways of conducting business.
SYSTEM ANALYSIS

A system analysis is a separation of a substance into parts for study and their implementation
and detailed examination. Before designing any system it is important that the nature of the
business and the way it currently operates are clearly understood. The detailed examination
provides the specific data required during designing in order to ensure that all the client's
requirements are fulfilled. The investigation or the study conducted during the analysis phase
is largely based on the feasibility study. Rather it would not be wrong to say that the analysis
and feasibility phases overlap. High-level analysis begins during the feasibility study. Though
analysis is represented as one phase of the system development life cycle (SDLC), this is not
true. Analysis begins with system initialization and continues until its maintenance. Even after
successful implementation of the system, analysis may play its role for periodic maintenance
and up gradation of the system.
One of the blood causes of project failures is inadequate understanding, and one of the blood
causes of inadequate understanding of the requirements is the poor planning of system
analysis.
Analysis requires us to recall the objectives of the project and consider following three
questions:

 What type of information is required?


 What are the constraints on the investigation?
 What are the potential problems that may make the task more difficult?

IMPORTANCE OF COMPUTERIZED ONLINE blood MANAGEMENT

There are several attributes in which the computer based information works. Broadly the
working of computer system is divided into two blood groups:

 Transaction System
 Decision Support System
Transaction System:

A transaction is a record of some well-defined single and usually small occurrence in a system.
Transactions are input into the computer to update the database files. It checks the entering data
for its accuracy. This means that numeric data appears in numeric field and character data in
character field. Once all the checks are made, transaction is used to update the database.
Transaction can be inputted in on-line mode or batch mode. In on-line mode, transactions are
entered and updated into the database almost instantaneously. In batch mode, transactions are
collected into batches, which may be held for a while and inputted later.

Decision Support System:

It assists the user to make analytical decision. It shows the various data in organized way called
analysis. This analysis helps in making decisions.

Computer system works out best with record maintenance. It will tell you which donor would get
how much pending/reports statements. It will also help to search the information about a
particular person by simply entering his telephone number. User can store information as per
requirement, which can be used for comparison with other reports.

PRINCIPLES OF SYSTEM ANALYSIS

Principles:

1. Understand the problem before you begin to create the analysis model.
2. Develop prototypes that enable a user to understand how human machine interaction will
occur.
3. Record the origin of and the reason for every requirement.
4. Use multiple views of requirements like building data, function and behavioral models.
5. Work to eliminate ambiguity.
SYSTEM DESIGN

The design of an information system produces the details that clearly describe-how a system will
need the requirement, identified during the system analysis. System specialist often refers to this
stage or logical design, in contrast to process of developing program software, which is referred
to as physical design. The system design describes the data to be input, calculated or stored,
individual data items and calculations procedures are written in detail designer’s select file
structure and storage devices. Designers are responsible for providing programmers with
complete and clearly outlined software specifications. Design is essentially the bridge between
requirement specification and the final solution for satisfying the requirement DESIGN PHASE.

The design document that we will develop during this phase is the blueprint of the software. It
describes how the solution to the problem is to be blood. Since solution to complex problems
isn’t usually found in the first try, iterations are most likely required. This is true for software
design as well. For this reason, any design strategy, design method, or design language must be
flexible and must easily accommodate changes due to iterations in the design. Any technique or
design needs to support and guide the partitioning process in such a way that the resulting sub-
problems are as independent as possible from each other and can be combined easily for the
solution to the overall problem. Sub-problem independence and easy combination of their
solutions reduces the complexity of the problem. This is the objective of the partitioning process.
Partitioning or decomposition during design involves three types of decisions: -

Define the boundaries along which to break;


Determine into how blood pieces to break; and
Identify the proper level of detail when design should stop and implementation should start.

Basic design principles that enable the software engineer to navigate the design process suggest a
set of principles for software design, which have been adapted and extended in the following list:

Free from thesuffer from "tunnel vision." A good designer should consider alternative
approaches, judging each based on the requirements of the problem, the resources available to do
the job.
The design should be traceable to the analysis model. Because a single element of the design
model often traces to multiple requirements, it is necessary to have a means for tracking how
requirements have been satisfied by the design model.

The design should not repeat the same thing. Systems are constructed using a set of design
patterns, blood of which have likely been encountered before. These patterns should always be
chosen as an alternative to reinvention. Time is short and resources are limited! Design time
should be invested in representing truly new ideas and integrating those patterns that already
exist.

The design should "minimize the intellectual distance" between the software and the problem as
it exists in the real world. That is, the structure of the software design should (whenever possible)
mimic the structure of the problem domain.

The design should exhibit uniformity and integration. A design is uniform if it appears that one
person developed the entire thing. Rules of style and format should be defined for a design team
before design work begins. A design is integrated if care is taken in defining interfaces between
design components.

The design activity begins when the requirements document for the software to be developed is
available. This may be the SRS for the complete system, as is the case if the waterfall model is
being followed or the requirements for the next "iteration" if the iterative enhancement is being
followed or the requirements for the prototype if the prototyping is being followed. While the
requirements specification activity is entirely in the problem domain, design is the first step in
moving from the problem domain toward the solution domain. Design is essentially the bridge
between requirements specification and the final solution for satisfying the requirements

The goal of design process is to produce a model or representation of a system on the basis of
which a system can be designed. The design process for software can be divided into 2 different
phases.
 System Design
 Detailed Design

SYSTEM DESIGN

At the first level focuses on deciding which module are needed for this system, the specification
of these modules, and how the modules should be interconnected so that combination of these
provides the desired output. That is what is called System Design. Modules are designed that

they have least interactions between them so that changes in one module can take place with a
negligible effect on other.

DETAILED DESIGN

The internal logic and working of each module described in system design is decided in this
phase. And the modules logic is described in a high level language. Data structure and
algorithmic design of each and every module is also defined in this phase.
MODULES DESCRIPTION

1. ADMIN

This module is very important from security point of view. Administrator has the power to add
blood, edit the information of the blood, store the feedback of the blood, prepare the crystal
reports of the student results.

2. MEMBER

This module is for the blood. The username and password assigned by the admin to the blood. user can
login with their username and password and can have access to home page, post the feedback, and see
their results .

Because the detailed design is an extension of system design, the system design controls the
major structural characteristics of the system. The system design has a major impact on the
testability and modifiability of a system, and it impacts its efficiency. Much of the design effort
for designing software is spent creating the system design.

A design can be object-oriented or function-oriented. In function-oriented design, the design


consists of module definitions, with each module supporting a functional abstraction. In object-
oriented design, the modules in the design represent data abstraction (these abstractions are
discussed in more detail later). In the function-oriented methods for design and describe one
particular methodology the structured design methodology in some detail. In a function- oriented
design approach, a system is viewed as a transformation function, transforming the inputs to the
desired outputs. The purpose of the design phase is to specify the components for this
transformation function, so that each component is also a transformation function. Hence, the
basic output of the system design phase, when a function oriented design approach is being
followed, is the definition of all the major data structures in the system, all the major modules of
the system, and how the modules interact with each other.
Once the designer is satisfied with the design he has produced, the design is to be precisely
specified in the form of a document. To specify the design, specification languages are used.
Producing the design specification is the ultimate objective of the design phase. The purpose of
this design document is quite different from that of the design notation. Whereas a design
represented using the design notation is largely to be used by the designer, a design specification
has to be so precise and complete that it can be used as a basis of further development by other

programmers. Generally, design specification uses textual structures, with design notation
helping in understanding.

DETAIL AND WORKING OF THE PROJECT

DATABASE TABLES

In a project database tables are the most important component. It is where the data is actually
stored. These tables are not shown to the user. The user has access to the data stored in these
tables through the forms made in the front-end tool by the programmer. In this project Oracle is
used as a backend tool. The database used in our project consists of the following tables:

1. Tbusr- to store login details of the administrator.

Field Name Type Constraints Description

User id Int Primary Key User id

User pwd Varchar (50) Not Null Password


2. Tbreg: To store details of the blood .

ID Name Age Address Contact No Blood No. Of unit


Group

101 Rajat Saini 24 Bajwa 87463632333 A+ 5


Colony

102 Harmandeep 25 Batala 9564732932 B 1


Kaur

103 Seema 22 Dinanagar 9674374730 O+ 4

104 Mandeep 27 Gurdaspur 9456436550 A 4


Singh

3.Tbfeedback: To store feedback

Name Mobile No Email comment

Reenu 9745632960 reenu12@gmail.com Good

Ramandeep 8956747398 raman34@gmail.co Good


m
Neha 9874354532 neha@yahoo.com Good
DATA FLOW DIAGRAM

A Data Flow Diagram (DFD) is a graphical representation of the "flow" of data through an
information system. A data flow diagram can also be used for the visualization of data
processing (structured design). It is common practice for a designer to draw a context-level DFD
first which shows the interaction between the system and outside entities. This context-level
DFD is then "exploded" to show more detail of the system being modeled.
Data flow diagrams were invented by Larry Constantine, the original developer of structured
design, based on Martin and Estrin's "data flow graph" model of computation. Data flow
diagrams (DFDs) are one of the three essential perspectives of Structured Systems Analysis and
Design Method SSADM. The sponsor of a project and the end users will need to be briefed and
consulted throughout all stages of a system's evolution. With a dataflow diagram, users are able
to visualize how the system will operate, what the system will accomplish, and how the system
will be implemented. The old system's dataflow diagrams can be drawn up and compared with
the new system's dataflow diagrams to draw comparisons to implement a more efficient system.
Dataflow diagrams can be used to provide the end user with a physical idea of where the data
they input ultimately has an effect upon the structure of the whole system from order to dispatch
to restock. How any system is developed can be determined through a dataflow diagram.

The dataflow diagram (DFD) was first developed by Larry Constantine as a way of expressing
system requirements in a graphical from. A DFD also known as a bubble chart has a purpose of
clarifying system requirement and identifying major transformation that will become the
program in the system design.

DFD Symbols

1. A SQUARE defines a source or destination of system data


2. An ARROW identifies dataflow or data in motion. It is pipeline through which information
flows.

3. A CIRCLE or a bubble represents a process transform in coming dataflow into outgoing


dataflow.

4. AN OPEN RECTANGLE is a data source or Data at rest.


Context Level Diagram For Blood Donor Society Digitisation

1.

Donor
Registration
5.

Login

Blood Donor Society


Digitisation 2.
4.
About Us
Contact Us

3.

Feedback
Context Level Diagram For Blood Donor Society Digitisation

2.

Search

Blood Donor Society


Digitisation
1. 3.
Admin Panel
Data Record Review
DATA FLOW DIAGRAMS

Context Level Diagram for modules of Online blood management

USER

user Administrator
Can get

Donor Add Data Record


Registration

About us Search Blood

Feedback &
complaints Review

Contact us
Show BLOOD
detail

Give
Prepare Crystal
Login Reports
Report Generation

'Crystal Reports' is a popular third party package that is included with ASP.NET, which allows
you to create reports for your application. The package consists of a designer - where you can
design and test the reports, Crystal Reports API calls and Crystal Report Viewer control. The
reports generated by the administrator are

 Menu Wise Result


TOOLS / PLATFORM, HARDWARE AND SOFTWARE REQUIREMENT
SPECIFICATION

 The project is based on The three tier architecture where the application is divided into three
logical constituents-
 User Services – Provide services such as user interface. (Asp.Net, C# application in
this case).
 Business services – Implement business rules
 Data Services – Provide handling and validation of data. (SQL-SERVER in this
case)

 Minimum Hardware requirements


Pentium IV Processor
60 GB hard Disk
512 MB RAM
Optional

Hardware (LAN, Switches, Routers etc)


Networking ((LAN & WAN, Different Components of networking)

 Minimum Software requirements


.Net is used for front end application (ASP.NET, C#, AJAX, JAVA-SCRIPT, J-QUERY and

CSS)
SCREEN SHOTS

1. Donor Registration

2. About Us
3. Feedback
4. Contact Us
5. Login Panel
6. Incorrect Login
7. Login
8. Data Record
9. Search
10. Review
CODING
Blood.aspx.cs

using System;
using System.Collections.Generic;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
public partial class blood : System.Web.UI.Page
{
SqlConnection con = new SqlConnection();
protected void Page_Load(object sender, EventArgs e)
{
con.ConnectionString =
ConfigurationManager.ConnectionStrings["cn"].ConnectionString;
if (con.State == ConnectionState.Closed)
{
con.Open();
}
}

protected void Button1_Click(object sender, EventArgs e)


{
SqlCommand cmd = new SqlCommand();
cmd.CommandText = "insert into blood values(@id,@name,@age,@add,@cn,@bg,@nou)";
cmd.Connection = con;
cmd.Parameters.Add("@id", SqlDbType.VarChar, 50).Value = id.Text;
cmd.Parameters.Add("@name", SqlDbType.VarChar, 50).Value = name.Text;
cmd.Parameters.Add("@age", SqlDbType.VarChar,50).Value = age.Text;
cmd.Parameters.Add("@add", SqlDbType.VarChar, 200).Value = address.Text;
cmd.Parameters.Add("@cn", SqlDbType.VarChar, 500).Value = cn.Text;
cmd.Parameters.Add("@bg", SqlDbType.VarChar, 200).Value = bg.Text;
cmd.Parameters.Add("@nou", SqlDbType.VarChar, 200).Value = nou.Text;

cmd.ExecuteNonQuery();
cmd.Dispose();
id.Text = "";
name.Text = "";
age.Text = "";
address.Text = "";
cn.Text = "";
bg.Text = "";
nou.Text = "";

}
protected void Button2_Click(object sender, EventArgs e)
{
id.Text = "";
name.Text = "";
age.Text = "";
address.Text = "";
cn.Text = "";
bg.Text = "";
nou.Text = "";
}
}

About Us.aspx.cs

using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;

public partial class aboutus : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{

}
}

Contact Us.aspx.cs

using System;
using System.Collections.Generic;
using System.Linq;
using System.Web;
using System.Web.UI;
using System.Web.UI.WebControls;

public partial class contactus : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{

}
}
Edit.aspx.cs

using System;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;

public partial class edit : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
if (Page.IsPostBack == false)
{
grdbind();
}
}
private void grdbind()
{
SqlDataAdapter adp = new SqlDataAdapter("select * from blood",
ConfigurationManager.ConnectionStrings["cn"].ConnectionString);
DataSet ds = new DataSet();
adp.Fill(ds);
GridView1.DataSource = ds;
GridView1.DataBind();

}
protected void GridView1_RowUpdating(object sender, GridViewUpdateEventArgs e)
{
String id, name, age,address,cn,bg,nou;
id = ((Label)(GridView1.Rows[e.RowIndex].FindControl("Label2"))).Text;
name = ((TextBox)(GridView1.Rows[e.RowIndex].FindControl("TextBox1"))).Text;
age = ((TextBox)(GridView1.Rows[e.RowIndex].FindControl("TextBox2"))).Text;
address = ((TextBox)(GridView1.Rows[e.RowIndex].FindControl("TextBox3"))).Text;
cn = ((TextBox)(GridView1.Rows[e.RowIndex].FindControl("TextBox4"))).Text;
bg = ((TextBox)(GridView1.Rows[e.RowIndex].FindControl("TextBox5"))).Text;
nou = ((TextBox)(GridView1.Rows[e.RowIndex].FindControl("TextBox6"))).Text;
SqlConnection con = new SqlConnection();
con.ConnectionString =
ConfigurationManager.ConnectionStrings["cn"].ConnectionString;
con.Open();
SqlCommand cmd = new SqlCommand();
cmd.CommandText = "update blood set
name=@name,age=@age,address=@address,cn=@cn,bg=@bg,nou=@nou where id=@id";
cmd.Connection = con;
cmd.Parameters.Add("@id", SqlDbType.VarChar, 50).Value = id;
cmd.Parameters.Add("@name", SqlDbType.VarChar, 50).Value = name;
cmd.Parameters.Add("@age", SqlDbType.Int).Value = age;
cmd.Parameters.Add("@address", SqlDbType.VarChar, 200).Value = address;
cmd.Parameters.Add("@cn", SqlDbType.VarChar, 500).Value = cn;
cmd.Parameters.Add("@bg", SqlDbType.VarChar, 50).Value = bg;
cmd.Parameters.Add("@nou", SqlDbType.VarChar, 50).Value = nou;
cmd.ExecuteNonQuery();
cmd.Dispose();
GridView1.EditIndex = -1;
grdbind();
}
protected void GridView1_SelectedIndexChanged(object sender, EventArgs e)
{

}
protected void GridView1_RowEditing(object sender, GridViewEditEventArgs e)
{
GridView1.EditIndex = e.NewEditIndex;
grdbind();
}
protected void GridView1_RowDeleting(object sender, GridViewDeleteEventArgs e)
{
string id;
id = ((Label)(GridView1.Rows[e.RowIndex].FindControl("Label1"))).Text;
SqlConnection con = new SqlConnection();
con.ConnectionString =
ConfigurationManager.ConnectionStrings["cn"].ConnectionString;
con.Open();
SqlCommand cmd = new SqlCommand();
cmd.CommandText = "delete from blood where id=@id";
cmd.Connection = con;

cmd.Parameters.Add("@id", SqlDbType.VarChar, 50).Value = id;


cmd.ExecuteNonQuery();
cmd.Dispose();
grdbind();
}
protected void GridView1_RowCancelingEdit(object sender, GridViewCancelEditEventArgs
e)
{
GridView1.EditIndex = -1;
grdbind();
}
}

Feedback.aspx.cs

using System;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;

public partial class feedback : System.Web.UI.Page


{
SqlConnection con = new SqlConnection();
protected void Page_Load(object sender, EventArgs e)
{
con.ConnectionString =
ConfigurationManager.ConnectionStrings["cn"].ConnectionString;
if (con.State == ConnectionState.Closed)
{
con.Open();
}
}
protected void TextBox4_TextChanged(object sender, EventArgs e)
{

}
protected void Button1_Click(object sender, EventArgs e)
{

}
protected void Button2_Click(object sender, EventArgs e)
{
SqlCommand cmd = new SqlCommand();
cmd.CommandText = "insert into feedback values(@name,@mno,@email,@comment)";
cmd.Connection = con;
cmd.Parameters.Add("@name", SqlDbType.VarChar, 50).Value = name.Text;
cmd.Parameters.Add("@mno", SqlDbType.VarChar, 200).Value = mno.Text;
cmd.Parameters.Add("@email", SqlDbType.VarChar, 50).Value = email.Text;
cmd.Parameters.Add("@comment", SqlDbType.VarChar, 50).Value = comment.Text;

cmd.ExecuteNonQuery();
cmd.Dispose();
name.Text = "";

mno.Text = "";
email.Text = "";
comment.Text = "";

}
protected void Button3_Click(object sender, EventArgs e)
{
name.Text = "";
mno.Text = "";
email.Text = "";
comment.Text = "";
}
}
Login.aspx.cs

using System;
using System.Data;
using System.Configuration;
using System.Collections;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
using System.Xml.Linq;

public partial class _Default : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{

}
protected void Button1_Click(object sender, EventArgs e)
{
if (TextBox1.Text == "admin" && TextBox2.Text == "admin")
{
Response.Redirect("edit.aspx");
}
else
{
Label3.Text = "Invaild user name password";
}
}
}
Review.aspx.cs

using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;

public partial class review : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
rep_bind();
}
private void rep_bind()
{
SqlDataAdapter adp = new SqlDataAdapter("select * from feedback",
ConfigurationManager.ConnectionStrings["cn"].ConnectionString);
DataSet ds = new DataSet();
adp.Fill(ds);
DataList1.DataSource = ds;
DataList1.DataBind();

}
}
Search.aspx.cs

using System;
using System.Collections.Generic;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;

public partial class search : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{

}
protected void Button1_Click(object sender, EventArgs e)
{
grdbind();
}
private void grdbind()
{

SqlDataAdapter adp = new SqlDataAdapter("select * from blood where bg='" +


TextBox1.Text + "'", ConfigurationManager.ConnectionStrings["cn"].ConnectionString);
DataSet ds = new DataSet();
adp.Fill(ds);
GridView1.DataSource = ds;
GridView1.DataBind();

}
}
TESTING PHASE

The basic goal of the software development process is to produce software that has no errors or
very few errors. In an effort to detect errors soon after they are introduced, each phase ends with
verification activity such as a review.
As testing is the last phase before the final software is delivered, it has the enormous
responsibility of detecting any type of error that may in the software. A software typically
undergoes changes even after it has been delivered. And to validate that a change has not
affected some old functionality of software regression testing is performed

LEVELS OF TESTING
The basic levels of testing are unit testing, integration testing and system and acceptance testing.
These different levels of testing attempt to detect different types of faults.

Figure: Table Of Level Of Testing

Client Needs Acceptance Testing


Requirements System Testing
Design Integration Testing
Code Unit Testing

ACCEPTANCE TESTING
Acceptance Testing is system testing performed by the donor to determine whether or not to
accept the delivery of the system.

SYSTEM TESTING
System tests are designed to validate fully developed system with a view to assuring that it meets
its requirements. There are essentially two kinds of system testing.
 Alpha Testing: Alpha Testing refers to the system testing that is carried out by the team
within the organization.
 Beta Testing: Beta Testing is the testing performed by the group of friendly donor.
INTEGRATION TESTING
During integration testing, different modules of a system are integrated using an integration plan.
The plan specifies the steps and the order in which the modules are combined to realize the full
system. After each integration step, the partially integrated system is tested. The primary
objective of the integration testing is to test the module interfaces. An important factor that
guides the integration plan is the module dependency graph. Various approaches to the
integration testing are given below:
 Top Down Approach
 Bottom Up Approach

Top Down Integration Testing: Top-down integration testing starts with the blood routine i.e.
the root module, and one or two sub module are added. After the top level skelton has been
tested, the subroutine of the skelton are immediately combined and tested. This type of testing
requires the use of program stubs to simulate the effect of lower-level routines that are called by
the routines under test. A disadvantage of this approach is if the sub-module is not ready than the
whole process slow down.
Bottom-Up Integration Testing:In bottom-up testing each subsystem is tested separately and
then the full system is tested. A subsystem might consist of blood modules which communicate
among each other through well defined interfaces. The primary purpose of the each subsystem is
to test the interfaces among various modules making up a subsystem. Both control and data
interfaces are tested.

UNIT TESTING
Unit testing is the testing of the different modules in the isolation. Testing a program consists of
providing the program, a set of test inputs and observing the working of the program. If the
program fails to behave as expected, then the condition under which a failure occur are noted for
debugged and corrected.
SYSTEM IMPLEMENTATION

As we know, creating software is one thing and the implementation of the created software is
another. The process of implementing software is much difficult as compared to the task of
creating the project. First we have to implement the software on a small scale for removing the
bugs and other errors in the project and after removing them we can implement the software on a
large scale.

Before we think in terms of implementing the Software on a large basis, we must consider the
Hardware requirements.
Whenever we develop software or project a certain hardware and software is being used by the
programmer for developing the project. The hardware and software to be used by the
programmer for developing the project should be such that it would result in the development of
a project, which would satisfy all the basic needs for which the project has been created by the
programmer. The Hardware should be such that cost constraints of the Client should also be
taken into account without affecting the performance.

HARDWARE EVALUATION FACTORS

When we evaluate computer hardware, we should first investigate specific physical and
performance characteristics for each hardware component to be acquired. These specific questions
must be answered concerning blood important factors. These hardware evaluationfactors questions
are summarized in the below figure.
Notice that there is much more to evaluating hardware than determining the fastest and cheapest
computing device. For e.g. the question of possible obsolescence must be addressed by making a
technology evaluation. The factor of ergonomics is also very important. Ergonomics is the science
and technology that tries to ensure that computer and other technologies are "user-friendly", that is
safe, comfortable and easy to use. Connectivity is another important evaluation factor, since so
blood computer systems are now interconnected within wide area or local area telecommunications
networks.
Hardware Evaluation Factors:-

1) Performance
2) Cost
3) Reliability
4) Availability
5) Compatibility
6) Modularity
7) Technology
8) Ergonomics
9) Connectivity
10) Environmental requirements
11) Software
12) Support

SOFTWARE EVALUATION FACTORS

Software can be evaluated according to blood factors similar to the hardware evaluation. Thus
the factors of performance, cost, reliability, compatibility, modularity, technology,
ergonomics, and support should be used to evaluate proposed software acquisitions. In
addition, however, the software evaluation factors are summarized in below figure. For e.g.
some software packages require too much memory capacity and are notoriously slow, hard to
use, or poorly documented. They are not a good selection for most end users, even if offered at
attractive prices.
\SOFTWARE EVALUATION FACTORS
1. EFFICIENCY: is the software a well-written system of computer instructions that
does not use much memory capacity or CPU time?
2. FLEXIBILITY: can it handle its processing assignments easily without major
modifications?
3. SECURITY: does it provide control procedures for errors, malfunctions and
improper use?
4. LANGUAGE: do our computer programmers and users write it in a programming
language that is used?
5. DOCUMENTATION: is the s/w well documented? Does it include helpful user
instructions?
6. HARDWARE: does existing hardware have the features required to best use this
software?
7. Other characteristics of hardware such as its performance, what about the cost, how
much is reliable and etc.

CONVERSION AND TRAINING

An important aspect of is to make sure that the new design is implemented to establish standards.
The term implementation has different meanings, ranging form the conversion of a basic
application to a complete replacement of a computer system. Implementation is used here to
blood the process of converting a new or revise system into an operational one. Conversion is
one aspect of implementation. Conversion means changing form one system to another. The
objective is to put the tested system into operation while holding costs, risks, and personnel
irritation to a minimum. It involves creating computer-compatible files, training the operation
staff, and installing terminal and hardware. A critical aspect of conversion is not disrupting the
functioning of the organization.

When a new system is used over and old, existing and running one, there are always
compatibility errors. These errors are caused because of the lack of equipment or personnel to
work the new system. Running any specified system at an organization does require some or
other hardware or, in this case, software requirement as well.
Conversion is one aspect of implementation review & software maintenance.

There are three types of implementation:


1. Implementation of a computer system to replace a manual system. The problems
encountered are converting files, training users, creating accurate files and verifying
printouts for integrity.
2. Implementation of a new computer system to replace an existing one. This is usually a
difficult conversion. If not properly planned there can be blood problems. Some large
computer systems have taken as long as year to convert.
3. Implementation of a modified application to replace an existing one, using the same
computer. This type of conversion is relatively easy to handle, provided there are no
major changes in the files.
SYSTEM MAINTENANCE

Once the website is launched, it enters the maintenance phase. All systems need maintenance.
Maintenance is required because there are often some residual errors remaining in the system
that must be removed as they are discovered. Maintenance involves understanding the effects of
the change, making the changes to both the code and the documents, testing the new parts and
retesting the old parts that were not changed. Maintenance is mainly of two types:
1. Corrective Maintenance
2. Adaptive Maintenance

CORRECTIVE MAINTENANCE
Almost all software that is developed has residual errors or bugs in them. blood of these surfaces
only after the system have been in operation, sometimes for a long time. These errors once
discovered need to be removed, leading to the software to be changed. This is called Corrective
Maintenance.

ADAPTIVE MAINTENANCE
Even without bugs, software frequently undergoes change. The software often must be upgraded
and enhanced to include more features and provide more services. This requires modification of
the software. This type of maintenance is known as the Adaptive Maintenance
CONCLUSION

No program or system design is perfect. Communication between the user and the designer is not
always complete or clear, and time is usually short. This results in errors. The number and nature
of errors in a new design depends on several factors:

 Communication between the user and the designer.


 Personal prejudice on the part of users in disclosing information.
 The programmer’s ability to generate code that reflects exactly the system specifications.
 The time frame for the design.

In the “Blood Donor Society Digitization”,I have tried my best to cover successfully and
accurately all the requirements of the project.
BIBLIOGRAPHY

 ASP.NET 4 in C# By Anshuman

 C# Development by Rob Miles

 Beginning SQL Server 2008 R2 for developers by Robin Dewson

 C# for Dummies by Stephen Randy Davis and Chuck Sphar

 Beginning with ASP.NET by Imar Spaanjaars

 Software Engineering By Roger S. Pressman

 ASP.NET Bible by Mridula Parihar

 SQL for Dummies By Allen G. Taylor

 The Complete Reference Visual Basic .NET by Jeffery R. Shapiro

You might also like