Professional Documents
Culture Documents
1) Human Resource :-
a. Maintain Employee Attendance
b. Approve / Reject Employee Leaves
c. Maintain Employee Records
d. Generate Employee Payslip
2) Account :-
a. Customer Payment
b. Vendor Payment
c. Cash Register
3) Purchase :-
a. Request for Quotation
b. Create Purchase Order
c. Purchase Invoice / Bill
d. Give Feedback
4) Store :-
a. Inward Material Detail
b. Maintain Stock
c. Outward Material Detail
d. Waste / Return Material Detail
5) Sales :-
a. Create Sales Quotation
b. Sales Order
c. Sales Invoice / Bill
d. Customer Feed
2. SYSTEM STUDY
2.1 INTRODUCTION
All activities associated with each life cycle phase must be performed, managed and
documented. Hence, we define system analysis as the performance, management,
documentation of the activities related to the life cycle phases of a computer-based business
system. In the study phase a detailed study of the project is made and clear picture of the
project is in mind. In the design phase the designing of the input, output and table designs are
made. Development phase is where the physical designing of the input-output screens and
coding of the system is done. System implementation actually implements the system by
making necessary testing.
No centralize system
Centralized database is not there by which you can access.
Not User Friendly
The existing system is not user friendly because the retrieval of data is
very slow and data is not maintained efficiently.
Difficulty in report generating
We require more calculations to generate the report so it is generated at the
end of the session.
Manual control
All calculations to generate report is done manually so there is greater
chance of errors.
Lots of paperwork
Existing system requires lot of paper work. Loss of even a single
Register/record led to difficult situation because all the papers are needed
to generate the reports.
Time consuming
Every work is done manually so we cannot generate report in the middle
of the session or as per the requirement because it is very time consuming.
3. PROBLEM ANALYSIS
1. Economic Feasibility
2. Behavioral Feasibility
3. Technical Feasibility
4. Operational Feasibility
5. Legal Feasibility
To be judged feasible, a proposal for the specific project must pass all these tests, otherwise it
is not considered as a feasible project. I gathered the details regarding the financial aspects
incorporated in the system to make it cost efficient.
There are a number of technical issues, which are generally raised during
the feasibility stage of the investigation. A study of function, performance and constraints
gave me the ability to achieve acceptable system. The software required for this system is:
Suppose for a moment that technical and economic resources are both
judged adequate. The systems analyst must still consider the operational feasibility of the
requested project. Operational feasibility is dependent on human resources available for the
project and involves projecting whether the system will operate and be used once it is
installed. If users are virtually wed to the present system, see no problems with it, and
generally are not involved in requesting a new system, resistance to implementing the new
system will be strong. Chances for it ever becoming operational are low.
1. within the organization: How the project is to be implemented? What are various
constraints? What is market strategy?
2. With respect to the customer: Weekly or timely meetings with the customer with
presentations on status reports. Customer feedback is also taken and further modifications
and developments are done. Project milestones and deliverables are also presented to the
customer. For a successful project the following steps can be followed:
4. REQUIREMENT ENGINEERING
4.1 INTRODUCTION
Requirement analysis involves studying the current system to find out how
it works and where improvements could be made. A clear idea about the existing system is a
must for making improvements where it is required. Proper planning and collection of data
serves the purpose. The popularity of this document is to describe all the requirements for the
popularity of the website for Enterprise Resource Planning System. This website gives all the
information for a person. In our busy life, we cannot go to each department or offices. This
problem will manage this site. It will help to avoid in correction and missing data.
HARDWARE REQUIREMENTS:
CPU - 1.8 GHz or faster processor
HARD DISK SPACE - Minimum 160GB
RAM - 2GB or more
Introduction to .NET
When .NET was announced in late 1999, Microsoft positioned the technology as a platform
for building and consuming Extensible Markup Language (XML) Web services. XML Web
Figure 1.1 presents a high-level overview of the .NET Framework and how XML
Web services are positioned.
Since the initial announcement of the .NET Framework, it's taken on many new and
different meanings to different people. To a developer, .NET means a great environment for
creating robust distributed applications. To an IT manager, .NET means simpler deployment
of applications to end users, tighter security, and simpler management. To a CTO or CIO,
.NET Framework
Now that you are familiar with the major goals of the .NET Framework, let's briefly
examine its architecture. As you can see in Figure 1-2, the .NET Framework sits on top of the
operating system, which can be a few different flavors of Windows and consists of a number
of components .NET is essentially a system application that runs on Windows.
Conceptually, the CLR and the JVM are similar in that they are both runtime infrastructures
that abstract the underlying platform differences. However, while the JVM officially supports
only the Java language, the CLR supports any language that can be represented in its
Common Intermediate Language (CIL). The JVM executes bytecode, so it can, in principle,
support many languages, too. Unlike Java's bytecode, though, CIL is never interpreted.
Another conceptual difference between the two infrastructures is that Java code runs on any
platform with a JVM, whereas .NET code runs only on platforms that support the CLR. In
April, 2003, the International Organization for Standardization and the International Electro
technical Committee (ISO/IEC) recognized a functional subset of the CLR, known as the
Common Language Interface (CLI), as an international standard. This development, initiated
by Microsoft and developed by ECMA International, a European standards organization,
opens the way for third parties to implement their own versions of the CLR on other
platforms, such as Linux or Mac OS X. For information on third-party and open source
projects working to implement the ISO/IEC CLI and C# specifications
The layer on top of the CLR is a set of framework base classes. This set of classes is
similar to the set of classes found in STL, MFC, ATL, or Java. These classes support
rudimentary input and output functionality, string manipulation, security management,
network communications, thread management, text management, reflection functionality,
collections functionality, as well as other functions.
On top of the framework base classes is a set of classes that extend the base classes to
support data management and XML manipulation. These classes, called ADO.NET, support
persistent data management—data that is stored on backend databases. Alongside the data
classes, the .NET Framework supports a number of classes to let you manipulate XML data
and perform XML searching and XML translations.
Classes in three different technologies (including web services, Web Forms, and
Windows Forms) extend the framework base classes and the data and XML classes. Web
services include a number of classes that support the development of lightweight distributed
components, which work even in the face of firewalls and NAT software. These components
support plug-and-play across the Internet, because web services employ standard HTTP and
SOAP.
Web Forms, the key technology behind ASP.NET, include a number of classes that
allow you to rapidly develop web Graphical User Interface (GUI) applications. If you're
currently developing web applications with Visual Interdev, you can think of Web Forms as a
facility that allows you to develop web GUIs using the same drag-and-drop approach as if
you were developing the GUIs in Visual Basic. Simply drag-and-drop controls onto your
Web Form, double-click on a control, and write the code to respond to the associated event.
Windows Forms support a set of classes that allow you to develop native Windows
GUI applications. You can think of these classes collectively as a much better version of the
MFC in C++ because they support easier and more powerful GUI development and provide a
common, consistent interface that can be used in all languages.
At the heart of the .NET Framework is the common language runtime. The common language
runtime is responsible for providing the execution environment that code written in a .NET
language runs under. The common language runtime can be compared to the Visual Basic 6
runtime, except that the common language runtime is designed to handle all .NET languages,
not just one, as the Visual Basic 6 runtime did for Visual Basic 6. The following list describes
some of the benefits the common language runtime gives you:
You might expect all those features, but this has never been possible using Microsoft
development tools. Figure 1.3 shows where the common language runtime fits into the .NET
Framework.
Note
Code written using a .NET language is known as managed code. Code that uses
anything but the common language runtime is known as unmanaged code. The common
language runtime provides a managed execution environment for .NET code, whereas the
individual runtimes of non-.NET languages provide an unmanaged execution environment.
When you compile your applications in .NET, you aren't creating anything in native
code. When you compile in .NET, you're converting your code—no matter what .NET
language you're using—into an assembly made up of an intermediate language called
Microsoft Intermediate Language (MSIL or just IL, for short). The IL contains all the
information about your application, including methods, properties, events, types, exceptions,
security objects, and so on, and it also includes metadata about what types in your code can
or cannot be exposed to other applications. This was called a type library in Visual Basic 6 or
an IDL (interface definition language) file in C++. In .NET, it's simply the metadata that the
IL contains about your assembly.
Note
The file format for the IL is known as PE (portable executable) format, which is a
standard format for processor-specific execution.
When a user or another component executes your code, a process occurs called just-
in-time (JIT) compilation, and it's at this point that the IL is converted into the specific
machine language of the processor it's executing on. This makes it very easy to port a .NET
application to any type of operating system on any type of processor because the IL is simply
waiting to be consumed by a JIT compiler.
Note
The first time an assembly is called in .NET, the JIT process occurs. Subsequent calls
don't re-JIT the IL; the previously JITted IL remains in cache and is used over and over
again. when you learn about Application Center Test, you also see how the warm-up time of
the JIT process can affect application performance.
runtime make sure that the IL is correct? Because the compiler for each language creates its
own IL, there must be a process that makes sure what's compiling won't corrupt the system.
The process that validates the IL is known as verification. Figure 1.5 demonstrates the
process the IL goes through before the code actually executes.
When code is JIT compiled, the common language runtime checks to make sure that the IL is
correct. The rules that the common language runtime uses for verification are set forth in the
Common Language Specification (CLS) and the Common Type System (CTS).
classes to access the resources of the operating system, database server, or file server. The
FCL is made up of a hierarchy of namespaces that expose classes, structures, interfaces,
enumerations, and delegates that give you access to these resources.
The namespaces are logically defined by functionality. For example, the System.Data
namespace contains all the functionality available to accessing databases. This namespace is
further broken down into System.Data.SqlClient, which exposes functionality specific to
SQL Server, and System.Data.OleDb, which exposes specific functionality for accessing
OLEDB data sources. The bounds of a namespace aren't necessarily defined by specific
assemblies within the FCL; rather, they're focused on functionality and logical grouping. In
total, there are more than 20,000 classes in the FCL, all logically grouped in a hierarchical
manner. Figure 1.8 shows where the FCL fits into the .NET Framework and the logical
grouping of namespace. The .NET Framework class library.
To use an FCL class in your application, you use the Imports statement in Visual
Basic .NET or the using statement in C#. When you reference a namespace in Visual
Basic .NET or C#, you also get the convenience of auto-complete and auto-list members
when you access the objects' types using Visual Studio .NET. This makes it very easy to
determine what types are available for each class in the namespace you're using. As you'll see
over the next several weeks, it's very easy to start coding in Visual Studio .NET.
To understand how the common language runtime manages code execution, you must
examine the structure of a .NET application. The primary unit of a .NET application is the
assembly. An assembly is a self-describing collection of code, resources, and metadata. The
assembly manifest contains information about what is contained within the assembly. The
assembly manifest provides:
Identity information, such as the assembly’s name and version number
A list of all types exposed by the assembly
A list of other assemblies required by the assembly
A list of code access security instructions, including permissions required by the
assembly and permissions to be denied the assembly
Each assembly has one and only one assembly manifest, and it contains all the description
information for the assembly. However, the assembly manifest can be contained in its own
file or within one of the assembly’s modules.
An assembly contains one or more modules. A module contains the code that makes up
your application or library, and it contains metadata that describes that code. When you
compile a project into an assembly, your code is converted from high-level code to IL.
Because all managed code is first converted to IL code, applications written in different
languages can easily interact. For example, one developer might write an application in
Visual C# that accesses a DLL in Visual Basic .NET. Both resources will be converted to IL
modules before being executed, thus avoiding any language-incompatibility issues.
Each module also contains a number of types. Types are templates that describe a set of
data encapsulation and functionality. There are two kinds of types: reference types (classes)
and value types (structures). These types are discussed in greater detail in Lesson 2 of this
chapter. Each type is described to the common language runtime in the assembly manifest. A
type can contain fields, properties, and methods, each of which should be related to a
common functionality. For example, you might have a class that represents a bank account. It
contains fields, properties, and methods related to the functions needed to implement a bank
account. A field represents storage of a particular type of data. One field might store the name
of an account holder, for example. Properties are similar to fields, but properties usually
provide some kind of validation when data is set or retrieved. You might have a property that
represents an account balance. When an attempt is made to change the value, the property can
check to see if the attempted change is greater than a predetermined limit. If the value is
greater than the limit, the property does not allow the change. Methods represent behavior,
such as actions taken on data stored within the class or changes to the user interface.
Continuing with the bank account example, you might have a Transfer method that transfers
a balance from a checking account to a savings account, or an Alert method that warns users
when their balances fall below a predetermined level.
When you compile a .NET application, it is not compiled to binary machine code; rather,
it is converted to IL. This is the form that your deployed application takes—one or more
assemblies consisting of executable files and DLL files in IL form. At least one of these
assemblies will contain an executable file that has been designated as the entry point for the
application.
When execution of your program begins, the first assembly is loaded into memory. At
this point, the common language runtime examines the assembly manifest and determines the
requirements to run the program. It examines security permissions requested by the assembly
and compares them with the system’s security policy. If the system’s security policy does not
allow the requested permissions, the application will not run. If the application passes the
system’s security policy, the common ¬language runtime executes the code. It creates a
process for the application to run in and begins application execution. When execution starts,
the first bit of code that needs to be executed is loaded into memory and compiled into native
binary code from IL by the common language runtime’s Just-In-Time (JIT) compiler. Once
compiled, the code is executed and stored in memory as native code. Thus, each portion of
code is compiled only once when an application executes. Whenever program execution
branches to code that has not yet run, the JIT compiler compiles it ahead of execution and
stores it in memory as binary code. This way, application performance is maximized because
only the parts of a program that are executed are compiled.
The .NET Framework base class library contains the base classes that provide many of the
services and objects you need when writing your applications. The class library is organized
into namespaces. A namespace is a logical grouping of types that perform related functions.
For example, the System.Windows.Forms namespace contains all the types that make up
Windows forms and the controls used in those forms.
Namespaces are logical groupings of related classes. The namespaces in the .NET
base class library are organized hierarchically. The root of the .NET Framework is the
System namespace. Other namespaces can be accessed with the period operator. A typical
namespace construction appears as follows:
System
System.Data
System. Data. SQLClient
The first example refers to the System namespace. The second refers to the
System.Data namespace. The third example refers to the System.Data.SQLClient namespace.
Table 1.1 introduces some of the more commonly used .NET base class namespaces.
The namespace names are self-descriptive by design. Straightforward names make the .NET
Framework easy to use and allow you to rapidly familiarize yourself with its contents.
Programming in the .NET Framework environment is done with objects. Objects are
programmatic constructs that represent packages of related data and functionality. Objects are
self-contained and expose specific functionality to the rest of the application environment
without detailing the inner workings of the object itself. Objects are created from a template
called a class. The .NET base class library provides a set of classes from which you can
create objects in your applications. You also can use the Microsoft Visual Studio
programming environment to create your own classes. This lesson introduces you to the
concepts associated with object-oriented programming.
Classes were discussed in Chapter 1 and represent user-defined reference types. Classes
can be thought of as blueprints for objects: they define all of the members of an object, define
the behavior of an object, and set initial values for data when appropriate. When a class is
instantiated, an in-memory instance of that class is created. This instance is called an object.
To review, a class is instantiated using the New (new) keyword as follows:
When an instance of a class is created, a copy of the instance data defined by that
class is created in memory and assigned to the reference variable. Individual instances of a
class are independent of one another and represent separate programmatic constructs. There
is generally no limit to how many copies of a single class can be instantiated at any time. To
use a real-world analogy, if a car is an object, the plans for the car are the class. The plans can
be used to make any number of cars, and changes to a single car do not, for the most part,
affect any other cars.
Objects are composed of members. Members are properties, fields, methods, and events,
and they represent the data and functionality that comprise the object. Fields and properties
represent data members of an object. Methods are actions the object can perform, and events
are notifications an object receives from or sends to other objects when activity happens in
the application.
To continue with the real-world example of a car, consider that a Car object has fields
and properties, such as Color, Make, Model, Age, GasLevel, and so on. These are the data
that describe the state of the object. A Car object might also expose several methods, such as
Accelerate, ShiftGears, or Turn. The methods represent behaviors the object can execute.
And events represent notifications. For example, a Car object might receive an
EngineOverheating event from its Engine object, or it might raise a Crash event when
interacting with a Tree object.
Object Models
Simple objects might consist of only a few properties, methods, and perhaps an event or
two. More complex objects might require numerous properties and methods and possibly
even subordinate objects. Objects can contain and expose other objects as members. For
example, the TextBox control exposes a Font property, which consists of a Font object.
Similarly, every instance of the Form class contains and exposes a Controls collection that
comprises all of the controls contained by the form. The object model defines the hierarchy of
contained objects that form the structure of an object.
Encapsulation
Objects should only interact with other objects through their public methods and
properties. Thus, objects should contain all of the data they require, as well as all of the
functionality that works with that data. The internal data of an object should never be exposed
in the interface; thus, fields rarely should be Public (public).
Returning to the Car example. If a Car object interacts with a Driver object, the Car
interface might consist of a GoForward method, a GoBackward method, and a Stop method.
This is all the information that the Driver needs to interact with the Car. The Car might
contain an Engine object, for example, but the Driver doesn’t need to know about the Engine
object—all the Driver cares about is that the methods can be called and that they return the
appropriate values. Thus, if one Engine object is exchanged for another, it makes no
difference to the Driver as long as the interface continues to function correctly.
Polymorphism
Interface Polymorphism
An interface is a contract for behavior. Essentially, it defines the members a class should
implement, but states nothing at all about the details of that implementation. An object can
implement many different interfaces, and many diverse classes can implement the same
interface. All objects implementing the same interface are capable of interacting with other
objects through that interface. For example, the Car object in the previous examples might
implement the IDrivable interface (by convention, interfaces usually begin with I), which
specifies the GoForward, GoBackward, and Halt methods.
Other classes, such as Truck, Forklift, or Boat might implement this interface and thus are
able to interact with the Driver object. The Driver object is unaware of which interface
implementation it is interacting with; it is only aware of the interface itself. Interface
polymorphism is discussed in detail in Lesson 3.
Inheritance Polymorphism
Inheritance allows you to incorporate the functionality of a previously defined class into a
new class and implement different members as needed. A class that inherits another class is
said to derive from that class, or to inherit from that class. A class can directly inherit from
only one class, which is called the base class. The new class has the same members as the
base class, and additional members can be added as needed. Additionally, the implementation
of base members can be changed in the new class by overriding the base class
implementation. Inherited classes retain all the characteristics of the base class and can
interact with other objects as though they were instances of the base class. For example, if the
Car class is the base class, a derived class might be SportsCar. The SportsCar class might be
the base class for another derived class, the ConvertibleSportsCar. Each newly derived class
might implement additional members, but the functionality defined in the original Car class is
retained. Inheritance polymorphism
FEATURES OF SQL-SERVER 2005
The OLAP Services feature available in SQL Server version 7.0 is now called SQL
Server 2005 Analysis Services. The term OLAP Services has been replaced with the term
Analysis Services. Analysis Services also includes a new data mining component. The
Repository component available in SQL Server version 7.0 is now called Microsoft SQL
Server 2005 Meta Data Services. References to the component now use the term Meta Data
Services. The term repository is used only in reference to the repository engine within Meta
Data Service
3. FORM
4. REPORT
5. MACRO
TABLE
A database is a collection of data about a specific topic.
VIEWS OF TABLE
We can work with a table in two types,
1. Design View
2. Datasheet View
Design View
To build or modify the structure of a table we work in the table design view. We can
specify what kind of data will be hold.
Datasheet View
To add, edit or analyses the data itself we work in tables datasheet view mode.
QUERY
A query is a question that has to be asked the data. Access gathers data that answers
the question from one or more table. The data that make up the answer is either dataset (if
you edit it) or a snapshot (it cannot be edited).Each time we run query, we get latest
information in the dataset. Access either displays the dataset or snapshot for us to view or
perform an action on it, such as deleting or updating.
FORMS
A form is used to view and edit information in the database record by record. A form
displays only the information we want to see in the way we want to see it. Forms use the
familiar controls such as textboxes and checkboxes. This makes viewing and entering data
easy.
Views of Form:
We can work with forms in several primarily there are two views,
They are,
1. Design View
2. Form View
Design View
To build or modify the structure of a form, we work in forms design view. We can add
control to the form that are bound to fields in a table or query, includes textboxes, option
buttons, graphs and pictures.
Form View
The form view which display the whole design of the form.
REPORT
A report is used to vies and print information from the database. The report can ground
records into many levels and compute totals and average by checking values from many
records at once. Also the report is attractive and distinctive because we have control over the
size and appearance of it.
MACRO
A macro is a set of actions. Each action in macros does something. Such as opening a form or
printing a report .We write macros to automate the common tasks the work easy and save the
time.
MODULE
Modules are units of code written in access basic language. We can write and use
module to automate and customize the database in very sophisticated ways.It is a personal
computer based RDBMS. This provides most of the features available in the high-end
RDBMS products like Oracle, Sybase, and Ingress etc.
5. MODELING
5.1 INTRODUCTION
We create models to obtain a better understanding of the actual entity to be
built. The model focuses on what the system must do and not on how it does it. The second
and third operational analysis principles require that we build modules of function and
behavior. The written word is a wonderful vehicle for communication, but it isn't
necessarily the best way to represent the requirements for computer software. Analysis
modeling uses a combination of text and diagrammatic forms to depict requirements for
data, function, and behavior in a way that is relatively easy to understand, and more
important, straightforward to review for correctness, completeness and consistency. This
section presents resources for conventional and object-oriented analysis (OOA) methods as
well as resources for UML. Analysis modeling is an extremely robust subject.
The actors are connected by lines to the use cases that they carry out. The use
cases are placed in a rectangle but the actors are not .This rectangle is a visual remainder of
the system boundaries and that the actors are outside the system.
REGISTER EMPLOYEES
REGISTER VENDORS
REGISTER CUSTOMER
ADMIN
SYSTEM MAINTAINANCE
LEAVE APPLICATION
MAINTAIN MONTHLY
EMPLOYEES ATTENDANCE
APPROVE / REJECT
EMPLOYEES LEAVE
MAINTAIN MONTHLY
EMPLOYEES RECORDS
CREATE EMPLOYEES
HR MANAGER / EMPLOYEE
PAY SLIP
LEAVE APPLICATION
CUSTOMER PAYMENTS
VENDOR PAYMENTS
EMPLOYEES SALARY
ACCOUNT
MANAGER / EMPLOYEE
LEAVE APPLICATION
PURCHASE ORDER
PURCHASE ENTRY
PURCHASE COMMENTS
MANAGER / EMPLOYEE
LEAVE APPLICATION
MAINTAIN STOCK
WASTE / RETURN
STORE MATERIAL DETAIL
MANAGER / EMPLOYEE
LEAVE APPLICATION
SALES ORDER
SALES ENTRY
COMMENTS
SALES
MANAGER / EMPLOYEE
LEAVE APPLICATION
associated with each instance of another entity. In general, we may speak of one-to-one, one-
to-many, or many-to-many relationships.
scrape_date
scrape_qty
rec_id
item_id
Bill_no rec_date
cust_id sales_date
rec_amount
rec_mode sales_bill_no
cheque_dd_no so_no
RECEIPT
vend_id ENTRY
bill_no
bank_name
PAYMENT
MAINTAIN
ACCOUNT
DPARTMENT
ONLINE ERP ENTRY sales_qty
so_date
so_no
ENTRY
pay_amount
ACCOUNT SYSTEM sales_amount cust_id
pay_id so_qty
salary_mode
pay_mode
cheque_dd_no EMPLOYEE ORDER
gross_amount
SALARY salary_id
pay_date
SALES tax_amount
cheque_no item_id net_amount
price
salary_date emp_id
salary_amount
month_year sales_date price
address
INVOICE sales_bill_no
cust_name
bill_no bill_amount
item_id so_no
po_id cust_id
sales_qty
ENTRY address amount
pur_date
item_name
item_units
PURCHASE
pur_id contact_no
received_qty
ADMIN emp_id
desig_id
pur_id
username
po_date
po_id pur_date VENDOR EMPLOYEE
req_date REGISTRATION REGISTRATION password
INVOICE bill_no bank_name
vend_id emp_name
item_name
ORDER net_amount vend_name CUSTOMER
req_qty vend_id
_id vend_name b_acc_no gender
received_qty REGISTRATION
address email_id
price tax_amount
billed_amount dob
gross_amount
cust_id cust_name
6. DESIGN
6.1 INTRODUCTION
System design sits at the technical kernel of the software engineering and is applied
regardless of the software process model that is used. Beginning once software requirements
have been analyzed and specified, software design is the first technical activity that is used to
build and verify the software. Each activity (designing, coding and testing) transforms
user interface is the link between the users and the employers. A well-designed user interface
makes it very easy for users to learn software. The user interface portion of software is
responsible for all interaction with the user. Development of good user interface usually takes a
significant portion of the total system development effort. GUI can be defined as a program
interface that takes advantages of the computer’s graphic capabilities to make the program
easier to use.
application use client/server architecture. The web application resides on a server and responds to
request from multiple clients over the Internet on the client side, a browser, such as Internet
Explorer, Netscape Navigator, hosts the Web application. The application’s user interface takes
the form of HTML pages that are interpreted and displayed by the client’s browser. On the server
side, the Web application runs under Microsoft Internet Information Services (IIS). IIS manages
the application, passes requests from clients to the application, and returns the application’s
(2) Provide computation or data processing capability that is appropriate for the Webapp’s
business domain,
(3) Provide sophisticated database query and access,
(4) Establish data interface with external cooperate system.
Table Name:leave_application
6.8. DIAGRAMS
The data flow diagram (DFD) is one of the most important tools used
by system analysts. Data flow diagrams are made up of a number of symbols, which
represent system components. Most data flow modeling methods use four kinds of symbols.
These symbols are used to represent four kinds of system components. Possesses, data stores,
data flows and external entities are the components. Circles in DFD represent a process. Data
flow is represented by a thin line in DFD and square or rectangle represents external entities.
Level-0
Level-1
LEVEL 1 FOR ADMIN
LOGIN
CHECK
1.0
ADMIN LOGIN
RETRIEVE
emp_detail
STATUS
ENTER
REGISTRATION
DETAIL
2.0
USER ID
REGISTRATION
AND
PASSWORD
HUMAN
SOURCE
SYSTEM
MAINTAIN 3.0 UPDATE
REPORT
MAINTAIN HUMAN department
RESOURCE _master
RETRIEVE
DEPARTMENT
ACCOUNT
SYSTEM
MAINTAIN
REPORT
4.0 UPDATE
PURCHASE
MAINTAIN department
SYSTEM ACCOUNT
RETRIEVE
_master
MAINTAIN DEPARTMENT
REPORT
STORE
SYSTEM 5.0
MAINTAIN UPDATE
MAINTAIN department
REPORT PURCHASE RETRIEVE _master
DEPARTMENT
SALES
SYSTEM
MAINTAIN
REPORT 6.0
UPDATE
MAINTAIN department
STORE _master
RETRIEVE
LEAVE DEPARTMENT
REQUEST
LEAVE
STATUS
7.0 UPDATE
LOGOUT MAINTAIN department
SALES RETRIEVE _master
DEPARTMENT
STATUS
INSERT
8.0 leave_
LEAVE application
STATUS
APPLICATION
9.0
LOGOUT
Level – 2
Registration LEVEL 2 FOR REGISTRATION
ENTER
EMPLOYEE DETAIL INSERT
2.1
REGISTRATION EMPLOYEE
RETRIEVE
emp_detail
SUCCESSFULLY REGISTRATION
REGISTATION
ENTER
VENDOR 2.2 INSERT
DETAIL
VENDOR emp_detail
SUCCESSFULLY
REGISTRATION RETRIEVE
REGISTRATION
ENTER
CUSTOMER 2.2 INSERT
DETAIL
CUSTOMER emp_detail
SUCCESSFULLY REGISTRATION RETRIEVE
REGISTRATION
SIGN IN REQUEST ID
3.1
HR MANAGER LOGIN
LOGIN
RETRIEVE ID
emp_detail
UPDATE
EMPLOYEE
LEAVES
3.3
UPDATE
APPROVE/
STATUS leave_
REJECT
EMPLOYEE RETRIEVE
application
LEAVES
UPDATE
RECORD
STATUS
3.4 UPDATE
MAINTAIN
MONTHLY EMPLOYEE
emp_detail
RECORDS RETRIEVE
RECORDS
PAY
DETAIL
LEAVE
REQUEST 3.5 INSERT
GENERATE
LEAVE
EMPLOYEE
emp_atte
STATUS
RETRIEVE
PAY SLIP
LOGOUT
STATUS
INSERT
3.6 leave_
LEAVE application
APPLICATION RETRIEVE
3.7
LOGOUT
Level – 2
Account Manager LEVEL 2 FOR ACCOUNT MANAGER
ACCOUNT SIGN IN
4.1
REQUEST ID
emp_detail
MANAGER LOGIN LOGIN RETRIEVE ID
ENTER
CUSTOMER
PAYMENT UPDATE
4.2
DETAIL receipt_entry
CUSTOMER
RETRIEVE
RECEIPT
PAYMENTS
ENTER
VENDOR
PAYMENT
DETAIL UPDATE
4.3
payment_entry
RECEIPT VENDOR RETRIEVE
PAYMENTS
ENTER
EMPLOYEE
SALARY
DETAIL
RECEIPT
4.4
UPDATE salary_entry
EMPLOYEE RETRIEVE
LEAVE SALARY
REQUEST
LEAVE
STATUS
4.5 INSERT
leave_
LOGOUT
LEAVE application
RETRIEVE
STATUS APPLICATION
4.6
LOGOUT
Level – 2
Purchase Manager LEVEL 2 FOR PURCHASE MANAGER
PURCHASE SIGN IN
5.1
REQUEST ID
emp_detail
MANAGER LOGIN LOGIN RETRIEVE ID
GIVE
ORDER
5.2 UPDATE
purchase_
PURCHASE
RETRIEVE order
STATUS
ORDER
INVOICE
DETAIL
5.3 UPDATE
INVOICE purchase_
PURCHASE
entry
INVOICE / BILL RETRIEVE
LEAVE
REQUEST
LEAVE
STATUS
5.4 UPDATE
leave_
LEAVE
application
APPLICATION RETRIEVE
COMMENTS
LOGOUT
STATUS 5.5
COMMENTS
5.6
LOGOUT
Level – 2
Purchase Manager LEVEL 2 FOR STORE MANAGER
STORE SIGN IN
6.1
REQUEST ID
emp_detail
MANAGER LOGIN LOGIN RETRIEVE ID
REQUEST
FOR
PURCHSE
6.2 REQUEST
MATERIAL purchase_
DETAIL INWARD
entry
MATERIAL RETRIEVE
STATUS DETAIL
CHECK
STOCK
REQUEST
INWARD STOCK
STATUS 6.3
RETRIVE INWARD MATERIAL DETAIL
MAINTAIN RETRIVE OUTWARD MATERIAL DETAIL
REQUEST STOCK
REQUEST
FOR SALES OUTWARD STOCK
MATERIAL
DETAIL
STATUS
6.4 REQUEST
ENTER
WASTE OUTWARD sales_entry
MATERIAL MATERIAL RETRIEVE
DETAIL
DETAIL
FINAL
STOCK
REQUEST
LEAVE
6.5 UPDATE
LEAVE WASTE / RETURN scrape_entry
STATUS MATERIAL RETRIEVE
DETAIL
LOGOUT
LEAVE
STATUS
6.6 INSERT
leave_
LEAVE application
RETRIEVE
APPLICATION
6.7
LOGOUT
Level – 2
Sales Manager LEVEL 2 FOR SALES MANAGER
SALES SIGN IN
7.1
REQUEST ID
emp_detail
MANAGER LOGIN LOGIN RETRIEVE ID
GIVE
ORDER
7.2 UPDATE
sales_
SALES
RETRIEVE order
STATUS
ORDER
INVOICE
DETAIL
7.3 UPDATE
INVOICE
SALES sales_ entry
INVOICE / BILL RETRIEVE
LEAVE
REQUEST
LEAVE
STATUS
7.4 UPDATE
leave_
LEAVE
application
APPLICATION RETRIEVE
COMMENTS
LOGOUT
STATUS 7.5
COMMENTS
7.6
LOGOUT
7. CODING
7.1 INTRODUCTION
The coding step is a process that transforms design into a programming
language. It translates a detail design representation of software into a programming language
realization. The translation process continues when a compiler accepts source code as input
and produces machine-dependent object code as output. Quality is an important goal during
coding. The quality of source code can be improved by the use of structured coding
techniques; good coding style and readable, consistent code format. During coding, some
coding standards are to be followed. This has two purposes; reducing the chance of making it
easier for some time to modify the code later on. Coding phase affects both testing and
maintenance profoundly. The Enterprise Resource Planning System uses PHP as the
programming language for coding.
8. TESTING
8.1 INTRODUCTION
The purpose of system testing is to identify and correct errors in the candidate
system. Testing is an important element of the software quality assurance and represents the
ultimate review of specification, design and coding. The increasing visibility of the software
as a system element and the costs associated with a software failure are motivated forces for
well planned, through testing.
During testing the system is used experimentally to ensure that the software
does not fail, i.e., it will run according to the specification and in the way the user expects.
Preparation of test data plays n vital role in the system testing. Different set of test data are
generated and the system under study is tested using that data. While testing using test data
errors are again uncovered and corrected using different testing techniques.
System testing was conducted in order to detect errors and for comparing then
the final system with the requirement specification report. That is, whether the system meets
requirements. During testing the software was executed with a set of test cases and the output
of the program for the test cases was evaluated to determine if the program is performing as it
was expected to.
The turn error is used to refer the difference between the actual output of the
software and the correct output. Fault is a condition that causes the software to fail to perform
its required function. Software reliability is defined as the required function.
Software reliability is defined as the probability that the software will not
undergo failure for a specified time under specified condition. Failure is the inability of a
system or a component to perform a required function according to its specification.
Different levels of testing were employed for software to make an error free, fault free and
reliable. Basically, in software testing four type of testing methods are adopted.
Navigation testing confirms that all internal and external links of Enterprise
Resource Planning System are working properly. There is no any broken link or orphan
page in application. Once the first layers of the Software have been examined, it is time to
perform simple tests to probe the quality of the global Software navigation. Good Software
will provide consistent, well-executed navigation and should provide alternative navigation
schemes, such as Software maps, indexes, and search engines. First, look to make sure that
placement of navigation is consistent from page to page. Subtle shifting may occur, so try
browsing the site extremely fast and notice whether the menu items bounce or jump position
slightly from page to page. Even this minor variation can break the perceived stability of a
site. Next, look to see how robust the navigation is and whether multiple forms of Software
navigation are supported. Numerous navigation execution questions should be asked during
this phase. The current location clearly indicated with labels or link path indicators. The
Software has text links at the bottoms of pages. Alternative text used for graphical navigation
buttons. The Software requires excessive scrolling.
Test cases
Project Title : ENTERPRISE RESOURCE PLANNING SYSTEM
Software Tool :
Test objective : To check whether the entered User name and Password are valid or invalid.
Test data : User name = admin and password = admin
Step Steps Data Expected results Actual
no: results
1 Enter User name and User name = Should display warning Login
press LOGIN Button admin message box "Please Enter failed
Password"
2 Enter Password and Password = Should display warning Login
press LOGIN Button admin message box "Please Enter failed
User name “
3 Enter User name and User = admin Should display warning Login
Password and press and Password = message box "Invalid User failed
LOGIN Button XYZ name or Password"
4 Enter User name and User = XYZ and Should display warning Login
Password and press Password = message box "Invalid User failed
LOGIN Button admin name or Password"
5 Enter User name and User = xyz and Should display warning Login
Password and press Password = xyz message box "Invalid User failed
LOGIN Button name or Password"
6 Enter User name and User = “ ” and Should display warning Login
Password and press Password = “ ” message box "Please Enter failed
LOGIN Button User name and Password“
7 Enter User name and User = admin Should navigate to admin Login
Password and press and password home page made
LOGIN Button =admin
9. IMPLEMENTATION
task of preparing for implementation is education of users, which should really have been
taken place much earlier in the project when they were being involved in the investigation
and the design.
Login.aspx.cs
using System;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;
ImageButton1.Attributes.Add("onmouseover", "this.src='buttons/submit1.png'");
ImageButton1.Attributes.Add("onmouseout", "this.src='buttons/submit.png'");
ImageButton2.Attributes.Add("onmouseover", "this.src='buttons/reset1.png'");
ImageButton2.Attributes.Add("onmouseout", "this.src='buttons/reset.png'");
}
}
protected void ImageButton1_Click(object sender, ImageClickEventArgs e)
{
str = txtuser.Text;
substr = str.Substring(0, 2);
qry = "select * from emp_detail where username='" + txtuser.Text + "' AND
password='" + txtpass.Text + "'";
conn.Open();
SqlCommand cmd = new SqlCommand(qry, conn);
SqlDataReader dr = cmd.ExecuteReader();
if (dr.Read() == true)
{
Session["emp_id"] = dr.GetValue(0).ToString();
Session["desig_id"] = dr.GetValue(1).ToString();
Session["username"] = dr.GetValue(2).ToString();
Session["emp_name"] = dr.GetValue(4).ToString();
Session["email_id"] = dr.GetValue(9).ToString();
Session["user_type"] = substr;
if (substr == "ad")
{
Response.Redirect("adminhome.aspx");
}
else if (substr == "hr")
{
Response.Redirect("hrhome.aspx");
}
Employee_pslip.aspx
<%@ Page Language="C#" MasterPageFile="~/AfterLogin.master"
AutoEventWireup="true" CodeFile="emp_pslip.aspx.cs" Inherits="emp_pslip" Title="Online
ERP System" %>
<div id="content">
<div class="post">
<br />
<br />
<br />
<asp:GridView ID="empslip123" runat="server" AutoGenerateColumns="False"
BackColor="#DEBA84" BorderColor="#DEBA84" BorderStyle="None"
BorderWidth="1px"
CellPadding="3" CellSpacing="2" DataKeyNames="emp_atte_id"
onselectedindexchanged="empslip123_SelectedIndexChanged">
</div>
</div>
</asp:Content>
Customer_rec.aspx
<%@ Page Language="C#" MasterPageFile="~/AfterLogin.master"
AutoEventWireup="true" CodeFile="cust_record.aspx.cs" Inherits="cust_record"
Title="Online ERP System" %>
<td>:</td>
<td>
<asp:TextBox ID="txtcont" MaxLength="10" runat="server"></asp:TextBox>
<asp:RequiredFieldValidator ID="cont123" ControlToValidate="txtcont"
Display="None" runat="server" ErrorMessage="Enter Contact
Number"></asp:RequiredFieldValidator>
<asp:ValidatorCalloutExtender ID="ValidatorCalloutExtender10"
TargetControlID="cont123" runat="server">
</asp:ValidatorCalloutExtender>
<asp:RegularExpressionValidator ID="cont1234" ControlToValidate="txtcont"
Display="None" runat="server" ErrorMessage="Enter Valid Contact Number"
ValidationExpression="^[0-9]{10}$"></asp:RegularExpressionValidator>
<asp:ValidatorCalloutExtender ID="ValidatorCalloutExtender11"
TargetControlID="cont1234" runat="server">
</asp:ValidatorCalloutExtender>
</td>
</tr>
</table>
<br />
<br />
<asp:ImageButton ID="btnmodify" Height="40" Width="90"
ImageUrl="~/buttons/modify.png"
onmouseover="this.src='buttons/modify1.png';"
onmouseout="this.src='buttons/modify.png';" runat="server"
onclick="btnmodify_Click"
/>
&n
bsp;
<asp:ImageButton ID="btndelete" Height="40" Width="90"
ImageUrl="~/buttons/delete.png"
onmouseover="this.src='buttons/delete1.png';"
onmouseout="this.src='buttons/delete.png';" runat="server"
onclick="btndelete_Click" OnClientClick="return confirm('Are you sure want to Delete?')"/>
<br />
<table>
<tr>
<td align="left">
<asp:TextBox ID="txtsearch" runat="server"></asp:TextBox>
</td>
<td>
<asp:ImageButton ID="btnsearch" Height="40" Width="90"
ImageUrl="~/buttons/search.png"
onmouseover="this.src='buttons/search1.png';"
onmouseout="this.src='buttons/search.png';" runat="server"
onclick="btnsearch_Click1" CausesValidation="False"/>
</td>
</tr>
</table>
<br />
<asp:GridView ID="cust_grid" runat="server" BackColor="#DEBA84"
BorderColor="#DEBA84" BorderStyle="None" BorderWidth="1px" CellPadding="3"
onselectedindexchanged="cust_grid_SelectedIndexChanged" CellSpacing="2"
AutoGenerateColumns="False" DataKeyNames="cust_id" >
<RowStyle BackColor="#FFF7E7" ForeColor="#8C4510" />
<Columns>
<asp:CommandField ShowSelectButton="True" />
<asp:BoundField DataField="cust_id" HeaderText="Cust ID" ReadOnly="True"
SortExpression="cust_id" />
<asp:BoundField DataField="cust_name" HeaderText="Cust Name"
SortExpression="cust_name" />
<asp:BoundField DataField="address" HeaderText="Address"
SortExpression="address" />
<asp:BoundField DataField="contact_no" HeaderText="Contact No"
SortExpression="contact_no" />
</Columns>
<FooterStyle BackColor="#F7DFB5" ForeColor="#8C4510" />
<PagerStyle ForeColor="#8C4510" HorizontalAlign="Center" />
<SelectedRowStyle BackColor="#738A9C" Font-Bold="True" ForeColor="White" />
<HeaderStyle BackColor="#A55129" Font-Bold="True" ForeColor="White" />
</asp:GridView>
<asp:SqlDataSource ID="SqlDataSource1"
runat="server"
ConnectionString="<%$ ConnectionStrings:ConnectionString %>"
SelectCommand="SELECT * FROM [cust_detail]"></asp:SqlDataSource>
</div>
</div>
</asp:Content>
12. 1 LIMITATION:-
A firewall is always required on System server to protect from network attacks.
Overall User acceptance is a huge concern and driving factor for the success of the
implementation.
After System establishment switching costs are very high.
Without the proper support and dedication of the Top Management, This can’t be
a productive outcome.
If proper training is not given to the end users, they can cause blunders.
Managers cannot create custom reports or queries without the help of the
Programmer; hence all such requirements need to be specified from the beginning.
13. CONCLUSION
Conclusion
Use of our system eliminates the tedious task of filling paperwork thus making the
business process more manageable and efficient all while reducing the time overhead &
increasing customer satisfaction.
Our system allows our clients to make informed & timely decisions thus giving them a
competitive edge over their counterparts.
14. APPENDIX
SCREEN LAYOUT
Login Page
Home Page
Invoice
15. BIBILOGRAPHY
Web References:
www.google.co.in
www.webbasederp.com
www.dolibarr.com
www.globerp.com
www.openerp.com
www.w3schools.com
www.wikipedia.com
www.aspnet.com
www.cooltext.com
www.grsites.com