Mygo Informatics

Civil Registry

Mygo Informatics

Civil Registry

ABSTRACT

Civil Registry

Civil Registry is the online system or agency to help the Indian citizens to apply for there government records like passport, driving license, voter’s ID card, PAN card etc… And register certificates like birth, death, marriage etc. The primary objective of this web site is to give awareness about the government or legal documents and its registration details as well as to help to register or apply for those documents. This also acts as a consultancy agency to assist the public. The main purpose of the web site is to reduce the effort by candidate and save his time and avoid unwanted rushes at the government offices and assure a smooth working schedule at government offices. The project civil registry still requires more development of IT solutions and its applications to improve the issuance of copies of government certificates and legal documents. Civil registry term trying to get more affiliation to government offices and departments. Now civil registry team acting as agency to help the public

EXISTING SYSTEM
Existing system refers to the system that is being follow till now. Presently all the registrations are done manually. If a person wants to make registrations like birth, death, marriage etc he should directly contact the corresponding office. The main disadvantage is that there will be lot of

difficulties for the citizens. So, all these procedures will be a time consuming one.

Mygo Informatics

Civil Registry

PROPOSED SYSTEM
Civil Registry is aimed at developing a web-based system. In this system the person can register online and do many things. The details of all the things are made available to them through the website. This website provides online help for legal queries. This website helps all the users to view the registration.

 

 The user can post thread in the forum.  The system is user friendly.

1 Abstract 1.3 Functional Requirements .1 Problem Statements 2.4 Proposed System 3 4 Software and Hardware Requirements Literature Survey 4.Mygo Informatics Civil Registry INDEX S.3 Existing System 2 .1 Define the Problem 5.2 MSSQL Server 5 Software Requirement Analysis 5.1 Dot net Framework 4.3 Scope 2 System Analysis 2.2 Overview 1.2 Problem Identification 2.No 1 Contents Introduction 1.2 Scope of the Problem 5.

5 Life Cycle 6.1 DFD’s 5.4 Non Functional Requirements 6 Module Specifications 6.1 Description 6.Mygo Informatics 5.2 UML diagrams 5.4 Function of the Project 6.3 Database Design 8 9 10 11 12 Coding Testing Output Screens Conclusion Bibliography and References .2 Module Specification 6.6 Utilization Civil Registry 7 Software Design 5.3 Functionality of Modules 6.

1. marriage etc. driving license. Civil registry term trying to get more affiliation to government offices and departments.3 Scope: • The project civil registry still requires more development of IT solutions and its applications to improve the issuance of copies of government certificates and legal documents.Mygo Informatics Civil Registry INTRODCTION 1. This also acts as a consultancy agency The main purpose of the web site is to reduce the effort by candidate and save his time and avoid unwanted rushes at the government offices and assure a smooth working schedule at government offices. Now civil registry team acting as agency to help the public. voter’s ID card.2 Overview: The primary objective of this web site is to give awareness about the government or legal documents and its registration details as well as to help to register or apply for those documents. death. .1 Abstract: Civil Registry is the online system or agency to help the Indian citizens to apply for there government records like passport. PAN card etc… And register certificates like birth. 1.

Understanding the properties and requirements of a new system is more difficult and requires creative thinking and understanding of existing running system is also difficult. The first activity in the phase is studying the existing system and other is to understand the requirements and domain of the new system. but the first activity serves as a basis of giving the functional specifications and then successful design of the proposed system. the next step is to analyze the problem and understand its context. improper understanding of present system can lead diversion from solution. . Both the activities are equally important. 2. An estimate should be made of how strong a reaction the staffs are likely to have towards the development of an online computerized system because now this may lead to expulsion of some of the staffs from their jobs.1 PROBLEM STATEMENTS: Employees of the company are habitual of working with manual system and don’t have the knowledge of working in a computer application based environment that is used in their intranet and are generally resistant to make changes in their working attitude. People are inherently resistant to change and computers have been known to facilitate changes.SYSTEM ANALYSIS: INTRODUCTION: After analyzing the requirements of the task to be performed.Mygo Informatics Civil Registry 2 .

Improve-service-level benefits Proposed system improves the system’s performance because the current system is based on manual processing while the proposed system is based on computer processing. So the front end has been made user friendly for both the jobseekers and the employees. use of labors the cost also reduces. Improve-information-level benefits . The System will provide them automatic reporting and checks on entries while storing as well as entering. Because of the reduction in the use of paper. The less time involved also helped in its economical feasibility. The benefits of this project include four types: Cost – saving benefits This project reduces the administrative and operational cost. The operatingenvironment costs are marginal.Mygo Informatics Civil Registry So a system has to be chosen which will provide them much more facilities and less mental disturbance to check weather correct entry is entered and that too at its right place. The personal cost like salaries of employees hired are also nominal.2 Problem Identification: The proposed system is economically feasible because the cost involved in purchasing the hardware and the software are within approachable. because working in this system need not required a highly qualified professional. 2.

the user can contact the concerned officer. The concerned authorities must update the data regarding to the Government records and Register Certificates and send the same to customers. The authorities must collect the data from various departments and agencies. The system lacks coordination among the various departments.And register certificates through online. driving license etc.Mygo Informatics Civil Registry It provides better information in the stipulated space and time for decision-making. . Time-saving-benefits It saves lots of time and provides the same result in a far lesser period of time. 2.3 EXISTING SYSTEM: The present systems maintain the relevant data across files and ledgers. And sending feedback also provided. The user can brose the details and in case of any discrepancies.. The customer needs to approach the appropriate offices to for apply for government records and register certificates. The system provides facilities for users to apply for government records like passport.4 PROPOSED SYSTEM: The proposed system is a web based application which maintains a centralized repository of all related information. 2.

SOFTWARE AND HARDWRE REQUIRMENTS Software Requirements Developer Side Operating system: Database: Programming Language: Technology Development IDE: Client Side Operating System: .Net Asp.5 Windows XP SQLServer 2008 C#.Mygo Informatics Civil Registry 3.Net Framework: Any .Net Visual Studio 2008 Server Side Operating System: DBMS: Any SQL Server 2008 Hardware Requirements Developer Side .Net Framework 3.

4. As per the size of the required Database. 2 GB.Mygo Informatics Civil Registry Processor: RAM: Intel p4 or equivalent 512 MB Disk Space: 2 GB Client Side Processor: RAM: Intel p4 or equivalent 512 MB Disk Space: 1 GB Server Side Processor: RAM: Disk Space: Server Environment Capable Hardware. Literature Survey .

including user interface.NET Framework. who combine it with their own code to produce applications. Programs written for the . Also part of the . Principal design features Interoperability . The . The class library and the CLR together compose the . memory management.NET Framework is a software technology that is available with several Microsoft Windows operating systems. The CLR provides the appearance of an application virtual machine so that programmers need not consider the capabilities of the specific CPU that will execute the program. and network communications.Mygo Informatics Civil Registry 4. this runtime environment is known as the Common Language Runtime (CLR).NET Framework. The pre-coded solutions that form the framework's Base Class Library cover a large range of programming needs in a number of areas. and exception handling. It includes a large library of precoded solutions to common programming problems and a virtual machine that manages the execution of programs written specifically for the framework.NET Framework is a key Microsoft offering and is intended to be used by most new applications created for the Windows platform.NET Framework execute in a software environment that manages the program's runtime requirements. database connectivity. DOT NET FRAMEWORK The Microsoft . The CLR also provides other important services such as security. web application development. data access.1. cryptography. numeric algorithms. The class library is used by programmers.

security. graphic rendering. guaranteeing certain properties and behaviors in the areas of memory management.Runtime. Base Class Library The Base Class Library (BCL). Common Runtime Engine The Common Language Runtime (CLR) is the virtual machine component of the . .NET Framework. database interaction and XML document manipulation. All . is a library of functionality available to all languages using the . Access to COM components is provided in the System. including file reading and writing. access to other functionality is provided using the P/Invoke feature.NET environment. part of the Framework Class Library (FCL). and exception handling. Simplified Deployment Installation of computer software must be carefully managed to ensure that it does not interfere with previously installed software.EnterpriseServices namespaces of the framework.NET framework includes design features and tools that help address these requirements.Mygo Informatics Civil Registry Because interaction between new and older applications is commonly required. The BCL provides classes which encapsulate a number of common functions. the . The . and that it conforms to security requirements.NET programs execute under the supervision of the CLR.NET Framework provides means to access functionality that is implemented in programs that execute outside the .InteropServices and System.NET framework.

Portability The design of the . and the C++/CLI language to both ECMA and the ISO. Common Type System. that have been exploited by malicious software. the C# language. In addition. . Microsoft's commercial implementations of the framework cover Windows. and the Common Intermediate Language). making them available as open standards. Windows CE.Mygo Informatics Civil Registry Security The design is meant to address some of the vulnerabilities. Additionally. That is. a program written to use the framework should run without change on any type of system for which the framework is implemented. Microsoft submits the specifications for the Common Language Infrastructure (which includes the core class libraries. This makes it possible for third parties to create compatible implementations of the framework and its languages on other platforms.NET provides a common security model for all applications. and thus cross-platform compatible. such as buffer overflows. Architecture Visual overview of the Common Language Infrastructure (CLI) . and the Xbox 360.NET Framework allows it to theoretically be platform agnostic.

or CLI. assemblies are stored in the Portable Executable (PE) format. security. The purpose of the CLI is to provide a language-neutral platform for application development and execution. garbage collection. common on the Windows platform for all DLL and EXE files. culture. The public key token is a unique hash generated when the assembly is compiled. which has the metadata for the assembly. As mandated by specification.NET assemblies. The complete name of an assembly (not to be confused with the filename on disk) contains its simple text name. Microsoft's implementation of the CLI is called the Common Language Runtime or CLR. A private key can also be specified known only to the creator of the assembly and can be used for strong naming and to guarantee that the assembly is from the same author when a new version of the assembly is compiled (required to add an assembly to the Global Assembly Cache). version number. and interoperability. The assembly consists of one or more files. Metadata .NET framework lie within the Common Language Infrastructure. Assemblies The intermediate CIL code is housed in . including functions for exception handling. and public key token.Mygo Informatics Civil Registry Common Language Infrastructure The core aspects of the . thus two assemblies with the same public key token are guaranteed to be identical from the point of view of the framework. one of which must contain the manifest.

Typically the evidence is the source of the assembly (whether it is installed on the local machine or has been downloaded from the intranet or Internet). and is also used to implement the reflective programming capabilities of . and validation and verification. Metadata contains information about the assembly. Metadata is usually generated by language compilers but developers can create their own metadata through custom attributes. and whether the internal tables are correct.NET has its own security mechanism with two general features: Code Access Security (CAS). The verification mechanism checks to see if the code does anything that is 'unsafe'. Security . The CLR checks the metadata to ensure that the correct method is called.Mygo Informatics Civil Registry All CLI is self-describing through . Unsafe code will only be executed if the assembly has the 'skip verification' permission. Code Access Security is based on evidence that is associated with a specific assembly. When an assembly is loaded the CLR performs various tests. The algorithm used is quite conservative.NET Framework uses appdomains as a mechanism for isolating code running in a process. During validation the CLR checks that the assembly contains valid metadata and CIL. The demand causes the CLR to perform a call stack walk: every assembly of each method in the call stack is checked for the required permission. . Two such tests are validation and verification.NET Framework. Code Access Security uses evidence to determine the permissions granted to the code.NET metadata. Appdomains can be created and code loaded into or . Verification is not so exact. hence occasionally code that is 'safe' does not pass. if any assembly is not granted the permission a security exception is thrown. Other code can demand that calling code is granted a specified permission. which generally means code that is installed on the local machine.

it is not done by the CLR. The classes in mscorlib. This helps increase the fault tolerance of the application. and XML document manipulation. The class library is organized in a hierarchy of namespaces.dll and System.* namespaces.NET Compact Framework. .core. Appdomains can also be configured independently with different security privileges. Diagnostics System. This can help increase the security of the application by isolating potentially unsafe code. IO System. Class library Namespaces in the BCL System System.dll and some of the classes in System. It encapsulates a large number of common functions.Text.* or Microsoft.RegularExpressions Microsoft . graphic rendering.NET Framework includes a set of standard class libraries. has to split the application into sub domains.Mygo Informatics Civil Registry unloaded from them independent of other appdomains.dll are considered to be a part of the BCL. among others. such as file reading and writing. Microsoft Silver light and Mono. Most of the built in APIs are part of either System. The . The developer. CodeDom System. however. Collections System.NET Framework as well as its alternative implementations including .NET class libraries are available to all . The BCL classes are available in both .NET languages. The . as faults or crashes in one appdomain do not affect rest of the application. The Base Class Library (BCL) includes a small subset of the entire class library and is the core set of classes that serve as the basic API of the Common Language Runtime. Text System.NET Framework class library is divided into two parts: the Base Class Library and the Framework Class Library. Globalization System. database interaction. Resources System.

NET application has a set of roots.Mygo Informatics Civil Registry The Framework Class Library (FCL) is a superset of the BCL classes and refers to the entire class library that ships with . that enumerates all the unusable objects and reclaims the memory allocated to them. However. Memory management The . compacting.NET Garbage Collector (GC) is a non-deterministic. the GC runs are non-deterministic.NET Framework includes a garbage collector which runs periodically. The . Since it is not guaranteed when the conditions to reclaim memory are reached. To this end. The FCL is much larger in scope than standard libraries for languages like C++. and it cannot be reached or used.NET. As long as there exists a reference to an object. Windows Presentation Foundation. Each . These include references to static objects and objects defined as local variables or method . ASP. and comparable in scope to the standard libraries of Java. The GC runs only when a certain amount of memory has been used or there is enough pressure for memory on the system. When there is no reference to an object. Language Integrated Query. It includes an expanded set of libraries. . mark-and-sweep garbage collector. ADO.NET.NET Framework. which are pointers to objects on the managed heap (managed objects). instead it does the memory management itself.NET types (objects) is done contiguously from the managed heap. the object is considered to be in use by the CLR. Windows Communication Foundation among others. including Win Forms. it becomes garbage.NET Framework CLR frees the developer from the burden of managing memory (allocating and freeing up when done). a pool of memory managed by the CLR. on a separate thread from the application's thread. which might be either a direct reference to an object or via a graph of objects. it still holds on to the memory allocated to it. the memory allocated to instantiations of .

fewer objects need to be checked and compacted. Any reference to an object invalidated by moving the object is updated to reflect the new location by the GC. The . The objects that survive a garbage collection are tagged as Generation 1.NET Framework uses up to Generation 2 objects. it is considered free space. This is the mark phase. and then recursively walk them. it recursively enumerates all the objects reachable from the root objects and marks them as reachable. as older objects tend to have a larger lifetime than newer objects. The GC used by . by using memory to copy them over to the free space to make them contiguous again.0 were released. Thus. as well as objects referred to by CPU registers. and for each object referred to in the root. All objects not marked as reachable are garbage. it pauses the application. Since the memory held by garbage is not of any consequence. It uses . The application is resumed after the garbage collection is over. This helps increase the efficiency of garbage collection. Objects are assigned a generation. .NET Framework is actually generational. When the GC runs. newly created objects belong to Generation 0. this leaves chunks of free space between objects which were initially contiguous. By late 2000 the first beta versions of . However. Versions Microsoft started development on the . It then enumerates all the objects on the heap (which were initially allocated contiguously) using reflection. and the Generation 1 objects that survive another collection are Generation 2 objects.NET 1.NET metadata and reflection to discover the objects encapsulated by an object. by removing older (and thus more likely to survive a collection) objects from the scope of a collection run.Mygo Informatics Civil Registry parameters currently in scope. The objects are then compacted together.NET Framework in the late 1990s originally under the name of Next Generation Windows Services (NGWS). Higher generation objects are garbage collected less frequently than lower generation objects.

5.0 1.30 3. However.0. which allows your custom managed code to control the behavior of the server.0 1. Servers such as IIS and SQL Server can perform standard operations while your application logic executes through the managed code.1. The following illustration shows a basic network schema with managed code running in different server environments.42 3.50727.8 Release Date 2002-01-05 2003-04-01 2005-11-07 2006-11-06 2007-11-09 4.0 3. SERVER-SIDE MANAGED CODE ASP.0.5 Version Number 1.NET Framework to target Web-based applications.1 2.NET Framework stack.4322.573 2.0.4506.Mygo Informatics Civil Registry The . ASP.NET is the hosting environment that enables developers to use the . Version 1.NET is more than just a runtime host.3705.NET SERVER APPLICATION DEVELOPMENT Server-side applications in the managed world are implemented through runtime hosts. it is a complete architecture for developing Web sites and . Unmanaged applications host the common language runtime. This model provides you with all the features of the common language runtime and class library while gaining the performance and scalability of the host server.0 3.2 ASP.21022.

your code no longer needs to share the same file with your HTTP text (although it can continue to do so if you prefer). unlike Web-based applications. XML Web services are built on standards such as SOAP (a remote procedure-call protocol). The . and WSDL ( the Web Services Description Language).Mygo Informatics Civil Registry Internet-distributed objects using managed code. an important evolution in Web-based technology. unmanaged ASP pages are always scripted and interpreted. ASP. or even other XML Web services. Web Forms pages execute in native machine language because.NET pages are faster.NET Framework is built on these standards to promote interoperability with non-Microsoft solutions. In addition. . and easier to develop than unmanaged ASP pages because they interact with the runtime like any managed application. like any other managed application. they take full advantage of the runtime. and both have a collection of supporting classes in the .NET Framework.NET as the publishing mechanism for applications. XML (an extensible data format). If you have used earlier versions of ASP technology. Web-based applications.NET Framework. XML Web services components have no UI and are not targeted for browsers such as Internet Explorer and Netscape Navigator. As a result. For example.NET Framework also provides a collection of classes and tools to aid in development and consumption of XML Web services applications. you can develop Web Forms pages in any language that supports the . more functional. XML Web services technology is rapidly moving application development and deployment into the highly distributed environment of the Internet. you will immediately notice the improvements that ASP. The . XML Web services consist of reusable software components designed to be consumed by other applications. However. In contrast. server-side application components similar to common Web sites. Instead. are distributed. XML Web services.NET and Web Forms offers. such as traditional client applications. Both Web Forms and XML Web services use IIS and ASP.

NET ASP.NET Framework. If you develop and publish your own XML Web service. Finally.NET Framework SDK can query an XML Web service published on the Web.NET Framework provides a set of classes that conform to all the underlying communication standards. the Web Services Description Language tool and the other tools contained in the SDK facilitate your development efforts with the . like Web Forms pages in the managed environment. The ASP. ASP.NET is compiled common language runtime code running on the server. without concerning yourself with the communications infrastructure required by distributed software development.Mygo Informatics Civil Registry For example. and produce C# or Visual Basic source code that your application can use to become a client of the XML Web service.NET is a programming framework built on the common language runtime that can be used on a server to build powerful Web applications. . ASP. and XML. the . such as SOAP. native optimization. and caching services right out of the box. just-in-time compilation. This amounts to dramatically better performance before you ever write a line of code. ACTIVE SERVER PAGES. Although you can use the class library to consume XML Web services directly. World-Class Tool Support. the Web Services Description Language tool included with the . The source code can create classes derived from classes in the class library that handle all the underlying communication using SOAP and XML parsing.NET framework is complemented by a rich toolbox and designer in the Visual Studio integrated development environment.NET offers several important advantages over previous Web development models: Enhanced Performance. WSDL. your XML Web service will run with the speed of native machine language using the scalable communication of IIS. Using those classes enables you to focus on the logic of your service. parse its WSDL description. ASP.NET can take advantage of early binding. Unlike its interpreted predecessors.

NET employs a text-based. ASP. Because ASP. and Data Access solutions are all seamlessly accessible from the Web. The . new settings may be applied without the aid of local administration tools. the ASP. which simplifies applying settings to your server environment and Web applications.like forms processing model. No server restart is required. ASP.NET Framework class library. and automatic deployment are just a few of the features this powerful tool provides.Mygo Informatics Civil Registry WYSIWYG editing. ASP. hierarchical configuration system. An ASP. the power and flexibility of that entire platform is available to Web application developers. the common language runtime simplifies development. Scalability and Availability. ASP.NET Framework applications as well. with features specifically tailored to improve performance in clustered and . drag-and-drop server controls. Further. even to deploy or replace running compiled code. Additionally. with managed code services such as automatic reference counting and garbage collection. Power and Flexibility.NET is also language-independent.NET makes it easy to perform common tasks.NET.NET Framework application is deployed to a server simply by copying the necessary files to the server. For example. Visual Basic .NET has been designed with scalability in mind. so you can choose the language that best applies to your application or partition your application across many languages. This "zero local administration" philosophy extends to deploying ASP. from simple form submission and client authentication to deployment and site configuration. Messaging. Simplicity. common language runtime interoperability guarantees that your existing investment in COM-based development is preserved when migrating to ASP. Manageability.NET page framework allows you to build user interfaces that cleanly separate application logic from presentation code and to handle events in a simple. Because configuration information is stored as plain text.NET is based on the common language runtime.

With built in Windows authentication and per-application configuration. deadlocks). Security.NET provides syntax compatibility with existing pages). and Java Script. a new process can be created in its place. ASP. Visual Basic.NET delivers a well-factored architecture that allows developers to "plug-in" their code at the appropriate level. Implementing custom authentication or state services has never been easier.NET runtime with your own custom-written component. . In fact. 1.NET Web Forms page framework is a scalable common language runtime programming model that can be used on the server to dynamically generate Web pages.NET runtime. LANGUAGE SUPPORT The Microsoft . WHAT IS ASP. Customizability and Extensibility. In particular. you can be assured that your applications are secure. which helps keep your application constantly available to handle requests. so that if one misbehaves (leaks.NET Web Forms framework has been specifically designed to address a number of key deficiencies in the previous model. Intended as a logical evolution of ASP (ASP.NET WEB FORMS? The ASP. it provides: 2. the ASP. processes are closely monitored and managed by the ASP. it is possible to extend or replace any subcomponent of the ASP.Mygo Informatics Civil Registry multiprocessor environments.NET Platform currently offers built-in support for three languages: C#. The ability to create and use reusable UI controls that can encapsulate common functionality and thus reduce the amount of code that a page developer has to write. Further.

NET runtime parses and compiles the target file into a . the following sample demonstrates a simple HTML page that collects a user's name and category preference and then performs a form post back to the originating page when a button is clicked: ASP.aspx resources. the ASP.NET page can be created simply by taking an existing HTML file and changing its file name extension to .aspx (no modification of code is required).NET provides syntax compatibility with existing ASP pages. CODE-BEHIND WEB FORMS ASP.aspx file is compiled only the first time it is accessed.aspx file. This class can then be used to dynamically process incoming requests. When a browser client requests .NET Framework class. For example.NET Web Forms pages are text files with an .aspx file name extension. where the page code is physically declared within the originating . These code blocks execute in a top-down manner at page render time. An ASP. They can be deployed throughout an IIS virtual root directory tree. This includes support for <% %> code render blocks that can be intermixed with HTML content within an .aspx file. The first is the method shown in the preceding samples. (Note that the .NET supports two methods of authoring dynamic pages. the compiled type instance is then reused across multiple requests). The ability for developers to cleanly structure their page logic in an orderly fashion (not "spaghetti code"). An alternative approach--known as the .Mygo Informatics Civil Registry 3. The ability for development tools to provide strong WYSIWYG design support for pages (existing ASP code is opaque to tools). ASP.

. Intrinsic HTML one tags of are the handled controls by is one of the controls the in type the of System. 2.NET Web Forms provide an easy and powerful way to build dynamic ASP.Mygo Informatics Civil Registry code-behind method--enables the page code to be more cleanly separated from the HTML content into an entirely separate file. Server controls are declared within an .HtmlControls namespace.aspx file using custom tags or intrinsic HTML tags that contain a runat="server" attributes value.UI. script library or cookie requirements). ASP. INTRODUCTION TO ASP. Note also that no client-side script is required.NET page developers can use ASP. In addition to supporting standard HTML input controls.HtmlGenericControl. the following sample demonstrates how the <asp:adrotator> control can be used to dynamically display rotating ads on a page.UI. ASP.HtmlControls.NET enables developers to utilize richer custom controls on their pages. Server controls automatically maintain any client-entered values between round trips to the server.Web.NET server controls to program Web pages. 1. Any tag that doesn't explicitly map to assigned System.NET Web Forms pages can target any browser client (there are no Web UI. ASP.Web. For example. This control state is not stored on the server (it is instead stored within an <input type="hidden"> form field that is round-tripped between requests).NET SERVER CONTROLS In addition to (or instead of) using <% %> code blocks to program dynamic content.

such as the Connection and Command objects.NET server controls provide an easy way to encapsulate common ASP. 8. 4. ASP.that is separate and distinct from any data stores.3 C#.NET server controls can automatically project both uplevel and ASP. ADO. and XML in mind. 5.NET and previous data architectures is that there exists an object -.NET uses some ADO objects.NET validation controls provide an easy way to do declarative client ASP pages.NET is an evolution of the ADO data access model that directly addresses user requirements for developing scalable applications. and Data Adapter. Because of that.NET ADO.NET Web Forms pages provide syntax compatibility with existing ASP. 4.NET templates provide an easy way to customize the look and feel of ASP. the DataSet functions as a standalone entity. Data Reader. Developers can also use ASP. statelessness. and also introduces new objects.NET objects include the Dataset. 7. You can think of the DataSet as an always disconnected recordset that knows nothing about the source or destination of the data it contains. or server data validation. list server controls.Mygo Informatics Civil Registry 3.the DataSet -. It was designed specifically for the web with scalability. downlevel HTML. functionality. Key new ADO. controls built by third parties.NET OVERVIEW ADO. The important distinction between this evolved stage of ADO.NET ships with 45 built-in server controls. . 6.

OleDb and System. fill. relationships. Connection. It does this by having no 'knowledge' of the source of its data.NET Data Providers explaining what they are. In the remaining sections of this document. and hierarchical. No matter what the source of the data within the DataSet is. relational.Data. Now. which provides a bridge to retrieve and save data between a DataSet and its source data store. and how to program against them. columns. and so forth. In the past. based on operations performed while the DataSet held the data. While the DataSet has no knowledge of the source of its data.NET Data Providers (System.Mygo Informatics Civil Registry Inside a DataSet. it connects back to the database to update the data there. and by representing the data that it holds as collections and data types. data processing is turning to a message-based approach that revolves around chunks of information. A DataAdapter is the object that connects to the database to fill the DataSet. It accomplishes this by means of requests to the appropriate SQL commands made against the data store. The OLE DB and SQL Server . we'll walk through each part of the DataSet and the OLE DB/SQL Server . At the center of this approach is the DataAdapter. there are tables. in an effort to make multi-tiered apps more efficient. Then. views.Net Framework provide four basic objects: the Command. The XML-based DataSet object provides a consistent programming model that works with all models of data storage: flat. constraints. data processing has been primarily connection-based.Data. The role of the managed provider is to connect. the managed provider has detailed and specific information. DataReader and DataAdapter. . and persist the DataSet to and from data stores.SqlClient) that are part of the . it is manipulated through the same set of standard APIs exposed through the DataSet and its subordinate objects. much like in a database.

NET Data Provider is used to talk to any OLE DB provider (as it uses OLE DB underneath).OleDb).NET Data Provider (System. Connections. and some that are new. XML data and relational data. DataReaders.NET Data Provider (System.Data. These are written to talk directly to Microsoft SQL Server. DataSet. When dealing with connections to a database. Connections: Connections are used to 'talk to' databases. there are two different options: SQL Server . Commands: Commands contain the information that is submitted to a database. These objects are: 1.Data. 4. 5. Commands travel over connections and resultsets are returned in the form of streams which can be read by a DataReader object. or pushed into a DataSet object. The OLE DB . and are represented by provider-specific classes such as SqlCommand. DataAdapters. Commands. Remoting and programming against flat data. For storing. 2. 3. and are represented by providerspecific classes such as SqlConnection. For pushing data into a DataSet. For issuing SQL commands against a database. In these samples we will use the SQL Server .SqlClient) and OLE DB . and reconciling data against a database.NET Data Provider. For connection to and managing transactions against a database. For reading a forward-only stream of data records from a SQL Server data source. A command can be .Mygo Informatics Civil Registry The following sections will introduce you to some objects that have evolved.

Data coming from a database. This allows the developer to work with a programming model that is always consistent. For example. DataReaders: The Data Reader object is somewhat synonymous with a readonly/forward-only cursor over data. This DataSet is then used by a DataAdapter (or other objects) to update the original data source. and constraints. The DataSet object represents a cache of data. an XML file. regardless of where the source data resides. you might use the DataReader to show the results of a search list in a web page. The format of the returned DataReader object is different from a recordset. DATASETS AND DATAADAPTERS: DataSets The Dataset object is similar to the ADO Recordset object.Mygo Informatics Civil Registry a stored procedure call. but more powerful. it is important to remember that DataSet objects do not interact directly with databases. The GetChanges method of the DataSet object actually creates a second DatSet that contains only the changes to the data. The DataReader API supports flat as well as hierarchical data. or a statement that returns results. However. The example below shows how to issue an INSERT statement against the Northwind database. Then. You can also use input and output parameters. or user input can all be placed into DataSet objects. and return values as part of your command syntax. or other source data. A DataReader object is returned after executing a command against a database. an UPDATE statement. columns. from code. as changes are made to the DataSet they can be tracked and verified before updating the source data. relationships. . with database-like structures such as tables. though a DataSet can and does behave much like a database. and with one other important distinction: the DataSet is always disconnected.

XML schemas can be used to describe schemas interchanged via WebServices. . In fact. DATAADAPTERS (OLEDB/SQL) The DataAdapter object works as a bridge between the DataSet and the source data. 3. For ad-hoc scenarios.Mygo Informatics Civil Registry The DataSet has many XML characteristics. are provided for these scenarios. this run-time generation requires an extra round-trip to the server in order to gather required metadata. UPDATE. ADO. so explicitly providing the INSERT. a CommandBuilder object can generate these at run-time based upon a select statement. a DataSet with a schema can actually be compiled for type safety and statement completion. Using the provider-specific SqlDataAdapter (along with its associated SqlCommand and SqlConnection) can increase overall performance when working with a Microsoft SQL Server databases. Two new objects.NET is the next evolution of ADO for the .NET was created with n-Tier. including the use of stored procedures. For other OLE DB-supported databases. ADO.Net Framework. 4. statelessness and XML in the forefront. including the ability to produce and consume XML data and XML schemas. for updates. 2. ADO.NET can be used to get data from a stream. You can explicitly set these commands in order to control the statements used at runtime to resolve changes. the DataSet and DataAdapter. or to store data in a cache There is a lot more information about ADO.NET in the documentation. using the Update method calls the INSERT. The DataAdapter object uses commands to update the data source after changes have been made to the DataSet. and DELETE commands at design time will result in better run-time performance. UPDATE or DELETE command for each changed row. 1. However. you would use the OleDbDataAdapter object and its associated OleDbCommand and OleDbConnection objects. Using the Fill method of the DataAdapter calls the SELECT command.

update and extract information from their database. paradox. You don't need to first put data into a DataSet in order to insert. the fields relating to a particular person. If your business needs change over time. update. No two fields in a record can have the same field name. In SQL Server. SQL Server stores each data item in its own fields.4 SQL SERVER -2005 A database management. The Unique identifier is called the .Mygo Informatics Civil Registry 5. the analysis of your business needs identifies all the fields or attributes of interest. things and events. thing or event are bundled together to form a single complete unit of data. SQL SERVER TABLES SQL Server stores records relating to each other in a table. and deletes. you can use a DataSet to bind to the data. IMS. During an SQL Server Database design project. Remember. Data refers to the characteristics of people. SQL Server and SQL Server. or DBMS. Also. called a record (it can also be referred to as raw or an occurrence). or delete it. PRIMARY KEY Every table in SQL Server has a field or a combination of fields that uniquely identifies each record in the table. you can execute a command directly against the database in order to do inserts. you define any additional fields or change the definition of existing fields. Such database management systems include dBase. Different tables are created for the various groups of information. Related tables are grouped together to form a database. move through the data. Each record is made up of a number of fields. and navigate data relationships 4. updates. A database is a structured collection of data. These systems allow users to create. gives the user access to their data and helps them transform the data into information.

REFERENTIAL INTEGRITY Not only does SQL Server allow you to link multiple tables. FOREIGN KEY When a field is one table matches the primary key of another field is referred to as a foreign key.Mygo Informatics Civil Registry Primary Key. This is what makes SQL Server a relational database management system. This system hides certain details of how the data is stored and maintained. Matching an employee to the department in which they work is one example. locate and refer to one particular record in the database. DATA ABSTRACTION A major purpose of a database system is to provide users with an abstract view of the data. Conceptual Level: At this level of database abstraction all the attributed and what data are actually stored is described and entries and relationship among them. SQL Server makes it very easy to link the data in multiple tables. or RDBMS. It allows the user and the database system to identify. The primary key provides the means to distinguish one record from all other in a table. It stores data in two or more tables and enables you to define relationships between the table and enables you to define relationships between the tables. Physical level: This is the lowest level of abstraction at which one describes how the data are actually stored. it also maintains consistency between them. . RELATIONAL DATABASE Sometimes all the information of interest to a business operation can be stored in one table. Data abstraction is divided into three levels. Ensuring that the data among related tables is correctly matched is referred to as maintaining referential integrity. or simply the Key. A foreign key is a field or a group of fields in one table whose values match those of the primary key of another table.

continuous operation and support for every database. DISADVANTAGES OF DBMS A significant disadvantage of the DBMS system is cost. the hardware has to be upgraded to allow for the extensive programs and the workspace required for their execution and storage. From complex decision support systems (DSS) to the most rigorous online transaction processing (OLTP) application. While centralization reduces duplication. ADVANTAGES OF RDBMS • Redundancy can be avoided • Inconsistency can be eliminated • Data can be Shared • Standards can be enforced • Security restrictions ca be applied • Integrity can be maintained • Conflicting requirements can be balanced • Data independence can be achieved. FEATURES OF SQL SERVER (RDBMS) SQL SERVER is one of the leading database management systems (DBMS) because it is the only Database that meets the uncompromising requirements of today’s most demanding information systems.Mygo Informatics Civil Registry View level: This is the highest level of abstraction at which one describes only part of the database. distributed. In addition to the cost of purchasing of developing the software. even application that require simultaneous DSS and OLTP access to the same critical data. . SQL Server leads the industry in both performance and capability. the lack of duplication requires that the database be adequately backed up so that in case of failure the data can be recovered. and open DBMS that delivers unmatched performance. SQL SERVER is a truly portable.

SQL SERVER with transactions processing option offers two features which contribute to very high level of transaction processing throughput. DISTRIBUTED DATA SHARING SQL Server’s networking and distributed database capabilities to access data stored on remote server with the same ease as if the information was stored on a single local computer. Macintosh and dozens of proprietary platforms. This portability gives complete freedom to choose the database server platform that meets the system requirements. including UNIX. OPEN SYSTEMS SQL SERVER offers a leading implementation of industry –standard SQL. security or availability dictate. A single SQL statement can access data at multiple sites.Mygo Informatics Civil Registry SQL SERVER RDBMS is high performance fault tolerant DBMS which is specially designed for online transactions processing and for handling large database application. application. PORTABILITY SQL SERVER is fully portable to more than 80 distinct hardware and operating systems platforms. OS/2. SQL Server’s open architecture integrates SQL SERVER and non –SQL SERVER DBMS with industry’s most comprehensive collection of tools. . MSDOS. integrated computing resource. and third party software products SQL Server’s Open architecture provides transparent access to data from other relational database and even non-relational database. You can store data where system requirements such as performance. which are The row level lock manager ENTERPRISE WIDE DATA SHARING The unrivaled portability and connectivity of the SQL SERVER DBMS enables all the systems in the organization to be linked into a singular.

when written from memory to disk. NO I/O BOTTLENECKS SQL Server’s fast commit groups commit and deferred write technologies dramatically reduce disk I/O bottlenecks. modified blocks are written back to the database independently of the transaction commit. On high throughput systems. Since fast commits write all data necessary to the recovery to the log file.Mygo Informatics Civil Registry UNMATCHED PERFORMANCE The most advanced architecture in the industry allows the SQL SERVER DBMS to deliver unmatched performance. SQL Server employs full. but user waiting on one another for data access. SOPHISTICATED CONCURRENCY CONTROL Real World applications demand access to critical data. Data read by the transaction remains as shared memory so that other transactions may access that data without reading it again from disk. While some database write whole data block to disk at commit time.1 SCOPE OF THE PROJECT . one sequential writes typically group commit multiple transactions. SQL Server commits transactions with at most sequential log file on disk at commit time. unrestricted row-level locking and contention free queries to minimize and in many cases entirely eliminates contention wait times. With most database Systems application becomes “contention bound” – which performance is limited not by the CPU power or by disk I/O. SOFTWARE REQUIREMENT SPECIFICATION 5.

Site Explorer is designed for management of web sites from a remote location. which meets the SRS and solving all the requirements of the system? Demonstrating the system and installing the system at client's location after the acceptance testing is successful.Mygo Informatics Civil Registry The software. 5. FUNCTIONAL REQUIREMENTS Functional Requirements refer to very important system requirements in a software engineering process (or at micro level. It is meant for use by the developers and will be the basic during testing phase. Any changes made to the requirements in the future will have to go through formal change approval process.2. a sub part of requirement . Submitting the required user manual describing the system interfaces to work on it and also the documents of the system. DEVELOPERS RESPONSIBILITIES OVERVIEW: The developer is responsible for: Developing the system. Maintaining the system for a period of one year after installation. Conducting any user training that might be needed for using the system. Purpose: The main purpose for preparing this document is to give a general insight into the analysis and requirements of the existing system or situation and for determining the operating characteristics of the system. Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes the complete requirement of the system.

Examples of Functional Requirements Functional requirements should include functions performed by specific screens. defines the capabilities and functions that a System must be able to perform successfully. system design parameters and guidelines. Readers should understand the system. but no particular technical knowledge should be required to understand the document. outlines of work-flows performed by the system and other business or compliance requirements the system must meet. The Functional Requirement document (also called Functional Specifications or Functional Requirement Specifications). Functional Requirements are in contrast to other software design requirements referred to as Non-Functional Requirements which are primarily based on parameters of system performance.Mygo Informatics Civil Registry engineering) such as technical specifications. The key goal of determining “functional requirements” in a software product design and implementation is to capture the required behavior of a software system in terms of functionality and the technology implementation of the business processes. cost. data processing and calculation modules etc. software quality attributes. data manipulation. Functional Requirements should include:       Descriptions of data to be entered into the system Descriptions of operations performed by each screen Descriptions of work-flows performed by the system Descriptions of system reports or other outputs Who can enter the data into the system? How the system meets applicable regulatory requirements The functional specification is designed to be read by a general audience. Interface requirements . constraints in design/implementation etc. reliability and security.

3 Non Functional Requirements All the other requirements which do not form a part of the above specification are categorized as Non-Functional Requirements. all requirements outlined in the user requirement specification should be addressed in the functional requirements. 5. If a User Requirement Specification was written.Mygo Informatics Civil Registry       Field accepts numeric data entry Field only accepts dates before the current date Screen can print on-screen data to the printer Data must be entered before a request can approved Clicking the Approve Button moves the request to the Approval Workflow All personnel using the system will be trained according to internal training Business Requirements strategies Regulatory/Compliance Requirements       The database will have a functional audit trail The system will limit access to authorized users The spreadsheet can secure data with electronic signatures Member of the Data Entry group can enter requests but not approve or Members of the Managers group can enter or approve a request. . how the system does it is described in the Design Specification. but Security Requirements delete requests delete requests can delete requests The functional specification describes what the system must do. This is a functional requirement. A system may be required to present the user with a display of the number of records in a database. but not Members of the Administrators group cannot enter or approve requests.

the system architects must ensure that the system is capable of updating the displayed record count within an acceptably short interval of the number of records changing. If the number needs to be updated in real time.Mygo Informatics Civil Registry How up-to-date this number needs to be is a non-functional requirement. and carry-forward of customizations at next Failure Management Interoperability Maintainability Modifiability Open Source Operability Performance Platform compatibility Price Portability major version upgrade) . Other examples:                      Accessibility Availability Backup Certification Compliance Configuration Management Documentation Disaster Recovery Efficiency (resource consumption for given load) Effectiveness (resulting performance in relation to effort) Extensibility (adding features. Sufficient network bandwidth may also be a non-functional requirement of a system.

time. memory. Accessibility can be viewed as the "ability to access" and possible benefit of some system or entity. Availability is the degree to which a system. Stability Safety Supportability Testability Usability by target user community bandwidth etc. availability is the proportion of time a system is in a functioning condition. Expressed mathematically. vertical) Security Software. Fault Removal Efficacy) Recoverability Resilience Resource constraints (processor speed.. availability is 1 minus the unavailability.e. Accessibility is often used to focus on people with disabilities and their right of access to the system. . subsystem. i. when the mission is called for at an unknown. service. or equipment is operable and in a committable state at the start of a mission. Faults Discovered. standards etc. Faults Delivered. or environment is accessible by as many people as possible. tools. disk space. a random.) Accessibility is a general term used to describe the degree to which a product.g. network Response time Robustness Scalability (horizontal. device. Simply put.Mygo Informatics Civil Registry               Quality (e.

These additional copies are typically called "backups.e. Disaster recovery planning is a subset of a larger process known as business continuity planning and should include planning for resumption of applications. or organization. a standard or regulation. policies and procedures related to preparing for recovery or continuation of technology infrastructure critical to an organization after a natural or human-induced disaster. hardware. design. Documentation may refer to the process of providing evidence ("to document something") or to the communicable material used to provide such documentation (i. provided by some form of external review. data. system. communications (such as networking) and other IT infrastructure . education.Mygo Informatics Civil Registry A backup or the process of backing up refers to making copies of data so that these additional copies may be used to restore the original after a data loss event. and demonstrating adherence to." Certification refers to the confirmation of certain characteristics of an object. This confirmation is often. and operational information throughout its life. or assessment Compliance is the act of adhering to. Documentation may also (seldom) refer to tools aiming at identifying documents or to the field of study devoted to the study of documents and bibliographies Disaster recovery is the process. Configuration management (CM) is a field that focuses on establishing and maintaining consistency of a system's or product's performance and its functional and physical attributes with its requirements. but not always. a document).

Mygo Informatics Civil Registry Extensibility (sometimes confused with forward compatibility) is a system design principle where the implementation takes into consideration future growth. Extensions can be through the addition of new functionality or through modification of existing functionality. according to pre-defined operational requirements. The central theme is to provide for change while minimizing impact to existing system functions. In a computing systems environment with multiple systems this includes the ability of products. taking into account social. Open source describes practices in production and development that promote access to the end product's source materials—typically. Computer performance is characterized by the amount of useful work accomplished by a computer system compared to the time and resources used. their source code Operability is the ability to keep equipment. It is a systemic measure of the ability to extend a system and the level of effort required to implement the extension. Interoperability is a property referring to the ability of diverse systems and organizations to work together (inter-operate). systems and business processes to work together to accomplish a common task. a system or a whole industrial installation in a safe and reliable functioning condition. or alternatively in a broad sense. or cope with a changed environment. The term is often used in a technical systems engineering sense. and organizational factors that impact system to system performance. . political. Maintenance is the ease with which a software product can be modified in order to:     correct defects meet new requirements make future maintenance easier.

Mygo Informatics Civil Registry Depending on the context. When one is targeting several platforms with the same application. a specified interval under stated conditions. Portability is the software-code base feature to be able to reuse the existing code instead of creating new code when moving software from an environment to another. Quality has no specific meaning unless related to a specific function and/or object. The capacity of a device or system to perform as designed. Reliability may be defined in several ways:      The idea that something is fit for purpose with respect to time. conditional and somewhat subjective attribute. portability is the key issue for development cost reduction. The ability of a device or system to perform a required function under The probability that a functional unit will perform its required function for stated conditions for a specified period of time. . Quality is a perceptual. The resistance to failure of a device or system. service or asset Portability is one of the key concepts of high-level programming. Quality: The common element of the business definitions is that the quality of a product or service refers to the perception of the degree to which the product or service meets the customer's expectations. good computer performance may involve one or more of the following:       Short response time for a given piece of work High throughput (rate of processing work) Low utilization of computing resource(s) High availability of the computing system or application Fast (or highly compact) data compression and decompression High bandwidth / short data transmission time Price in economics and business is the result of an exchange and from that trade we assign a numerical monetary value to a good.

alteration or loss of functionality. A system or design may be said to be "robust" if it is capable of coping well with variations (sometimes unpredictable variations) in its operating environment with minimal damage.Mygo Informatics Civil Registry  The ability of something to "fail well" (fail without catastrophic consequences Resilience is the ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation. or changes in procedure or circumstance. scalability is a desirable property of a system. The concept of scalability applies to technology and business settings. In telecommunications and software engineering. Regardless of the setting. a network. Robustness is the quality of being able to withstand stresses. the system response time is the interval between the receipt of the end of transmission of an inquiry message and the beginning of the transmission of a response message to the station originating the inquiry. pressures.The ability for a business or technology to accept increased volume without impacting the system. . These services include:    o o o  supporting distributed processing supporting networked storage maintaining service of communication services such as video conferencing instant messaging online collaboration access to applications and data as needed Response time perceived by the end user is the interval between (a) The instant at which an operator at a terminal enters a request for a response from a computer and (b) The instant at which the first character of the response is received at a terminal. or a process. the base concept is consistent . In a data system. which indicates its ability to either handle growing amounts of work in a graceful manner or to be readily enlarged.

financial. . identify exceptions or faults. educational or other types or consequences of failure. and provide hardware or software maintenance in pursuit of solving a problem and restoring the product into service.it means much of the objects will be stable over time and will not need changes. occupational. reliability. and monitor products. configure. From an objective perspective. continuity. Security has to be compared and contrasted with other related concepts: Safety. it is a structure's actual (conceptual and never fully knowable) degree of resistance to harm. Stability . social. damage. The key difference between security and reliability is that security must take into account the actions of people attempting to cause destruction. It refers to the ability of technical support personnel to install. error. psychological. harm or any other event which could be considered non-desirable. emotional. and Usability)). loss. and criminals. Security as a state or condition is resistance to harm. debug or isolate faults to root cause analysis. accidents.Mygo Informatics Civil Registry Security is the degree of protection against danger. Serviceability. the condition of being protected against physical. spiritual. It can include protection of people or of possessions Supportability (also known as serviceability) is one of the aspects of RASU (Reliability. Safety is the state of being "safe". Incorporating serviceability facilitating features typically results in more efficient product maintenance and reduces operational costs and maintains business continuity. Availability. This can take the form of being protected from the event or from exposure to something that causes health or economical losses. political.

and (2) the practical feasibility of observing a reproducible series of such counter examples if they do exist. defeasibility. which means that counter examples to the hypothesis are logically possible. It maintains authentication in order to access the application. Administrator task is verified and sanction all requests from citizens like passport . In human-computer interaction and computer science. usability often refers to the elegance and clarity with which the interaction with a computer program or a web site is designed. In short it refers to the capability of an equipment or system to be tested Usability is a term used to denote the ease with which people can employ a particular tool or other human-made object in order to achieve a particular goal. Module Specifications This “Civil Registry” project involves 2 modules: Civil Registry is having mainly 2 modules. One is administrator and other one is citizens. involves two components: (1) the logical property that is variously described as contingency. or falsifiability. 6. a property applying to an empirical hypothesis.Mygo Informatics Civil Registry Testability.

death. He can check status of requests and post comments about website. birth registration. it is desirable in general to "mask" it or suppress type out. and. death. Voter’s ID etc… And register certificates like birth. completes the user's identification for access control. This command will normally be the first command transmitted by the user after the control connections are made (some servers may require this). for some sites. In Citizen’s module Indian citizens apply for there government records like passport. And he can view the feedbacks of website and send mails. Since password information is quite sensitive. Software Design: . electricity registration etc. ACCESS CONTROL FOR AUTHENTICATION DATA WHICH REQUIRE USER The following commands specify access control identifiers and they are typically used to authorize and authenticate the user (command codes are shown in parentheses) USER NAME (USER) • The user identification is that which is required by the server for access to its file system.. marriage etc. he can post comments about website. 7. marriage certificates etc.. pan card. Visitors can view all details of registration like birth.Mygo Informatics Civil Registry registration. PASSWORD (PASS) • This command must be immediately preceded by the user name command.

It is used to illustrate how data flows in a system.Process show what systems do. DATA FLOW DIAGRAMS It is one of the most important modeling tools used by system analysts. Design is the first step to moving from the problem domain towards the solution domain.  DATASTORE c): External Entity:. There are four kinds of symbols. data stores. These are used to represent four kinds of system components.Mygo Informatics Civil Registry The design phase begins with the requirements specification for the software to be developed.These are outside of the system but either supply input data into the system or use the system output.A component of a DFD that describes the repository of data in a system. DFD’s use a number of symbols to represent systems. It is the most critical factor effecting the quality of the software. Processes. . Each process has one or more data inputs and produces one or more data outputs. Circles in a DFD represent processes. à PROCESS b) Data Store:. Design is essentially the bridge between requirement specification and the final solution for satisfying the requirements. data flows and external entities Components of a DFD: a) Process:. It is represented in a box.

Graphically. UNIFIED MODELLING LANGUAGE Collaboration: Collaboration defines an interaction and is a society of roles and other elements that work together to provide some cooperative behavior that’s bigger than the sum of all the elements. usually including only its name as shown below. So we do not model them. Similarly stores are passive and can’t have data flows between themselves. Chain of Responsibilit y .  External Entity d) Data flow: It shows how data flows between process.  Data flow We have no control of flows between external entities. data stores and external entities. They model the passage of data in the system and are represented by lines joining system components.Mygo Informatics Civil Registry External entities that supply data into a system are sometimes called “sources” and the entities that use system data are sometimes called “sinks”. collaboration is rendered as an ellipse with dashed lines.

Association 3. Use Case is rendered as an ellipse with dashed lines. Dependency 2. Generalization 4. Place Order RELATIONSHIPS IN THE UML: There are four kinds of relationships in the UML: 1. usually including only its name as shown below.Mygo Informatics Civil Registry Chain Use Case: Use case is a description of a set of sequence of actions that a system performs that yields an observable result of value to particular things in a model. Realization USE CASES Use Case diagrams are one of the five diagrams in the UML for modeling the dynamic aspects of systems(activity diagrams. Graphically. Use Case diagrams are . state chart diagrams and collaboration diagrams are the four other kinds of diagrams in the UML for modeling the dynamic aspects of systems). sequence diagrams.

INTERACTION DIAGRAMS An Interaction diagram shows an interaction. A reactive object has a clear lifeline whose current behavior is affected by its past. STATE CHART DIAGRAMS A state chart diagram shows a state machine. ordered in increasing time. State chart diagrams are used to model the dynamic aspects of the system. or a class.Mygo Informatics Civil Registry central to modeling the behavior of the system. Each one shows a set of use cases and actors and relationships. a sub-system. consisting of a set of objects and their relationships. A reactive object is one whose behavior is best characterized by its response to events dispatched from outside its context. along the Yaxis. Graphically. They are used to model the dynamic aspects of as system. a sequence diagram is a table that shows objects arranged along the X-axis and messages. Interaction diagrams are used for modeling the dynamic aspects of the system. SEQUENCE DIAGRAMS: A sequence diagram is an interaction diagram that emphasizes the time ordering of the messages. . For the most part this involves modeling the behavior of the reactive objects. ACTIVITY DIAGRAM An Activity Diagram is essentially a flow chart showing flow of control from activity to activity. including the messages that may be dispatched among them.

A UML system is represented using five different views that describe the system from distinctly different perspective. which is as follows. depicting the interactions of collection between various structural elements described in the user model and structural model view. .Mygo Informatics Civil Registry 2. This view represents the system from the users perspective. Unified Modeling Language Diagrams (UML): 1. ii. This model view models the static structures. Behavioral Model View  It represents the dynamic of behavioral as parts of the system. Environmental Model View In this the structural and behavioral aspects of the environment in which the system is to be implemented are represented. 2. The unified modeling language allows the software engineer to express an analysis model using the modeling notation that is governed by a set of syntactic semantic and pragmatic rules. The analysis representation describes a usage scenario from the end-users perspective. Implementation Model View  In this the structural and behavioral as parts of the system are represented as they are to be built. Structural model view   In this model the data and functionality are arrived from inside the system. Each view is defined by a set of diagram. User Model View i.

Mygo Informatics

Civil Registry

UML is specifically constructed through two different domains they are 1. 2. UML Analysis modeling, which focuses on the user model and UML design modeling, which focuses on the behavioral modeling, structural model views of the system? implementation modeling and environmental model view. Paste Usecase Diagram Hear :

ENTITY-RELATIONSHIP Diagrams

PASTE DIAGRAMS HEAR

Sequence Diagrams:

PASTE DIAGRAMS HEAR

Elaboration Phase :
PASTE DIAGRAMS HEAR

Mygo Informatics

Civil Registry

Activity Diagram :
PASTE DIAGRAMS HEAR

Class Diagram :
PASTE DIAGRAMS HEAR

5.3 Database Design:

8. CODE
Login Page :

using using using using

System; System.Data; System.Configuration; System.Collections;

Mygo Informatics
using using using using using using using using System.Web; System.Web.Security; System.Web.UI; System.Web.UI.WebControls; System.Web.UI.WebControls.WebParts; System.Web.UI.HtmlControls; System.Web.Configuration; System.Data.SqlClient;

Civil Registry

public partial class Default2 : System.Web.UI.Page { SqlConnection con = new SqlConnection(WebConfigurationManager.ConnectionStrings["civilRegDB"].C onnectionString); SqlCommand cmd = new SqlCommand(); SqlDataReader dr; protected void Page_Load(object sender, EventArgs e) { con.Open(); cmd.Connection = con; } protected void bt_submit_Click(object sender, EventArgs e) { if (txtpassword.Text == "" || txtuser.Text == "") { lbl_msg.Text = "Missing Fields!"; lbl_msg.Visible = true; } else { cmd.CommandText = "select Status from login where UserName='" + txtuser.Text + "' and Password='" + txtpassword.Text + "'"; dr = cmd.ExecuteReader(); if (dr.Read()) { Session["user"] = txtuser.Text; if (dr["Status"].ToString() == "User") Response.Redirect("index.aspx"); else { Session["admin"] = txtuser.Text; Response.Redirect("admin2.aspx"); } } else { lbl_msg.Text = "Login Failed! Invalid User name or Password"; lbl_msg.Visible = true; } } } protected void bt_reset_Click(object sender, EventArgs e) {

if(dr. System. EventArgs e) { cmd.Page { SqlConnection con = new SqlConnection(WebConfigurationManager.Text = "".C onnectionString). EventArgs e) { con. System.Text = "". System.Configuration.Web. EventArgs e) { if (RadioButton1. System.Web.Configuration.Checked == true) { btn_submit. public partial class _Default : System.Data.UI.WebControls.ConnectionStrings["civilRegDB"]. System. } protected void Login1_Authenticate(object sender.HtmlControls. } protected void RadioButton1_CheckedChanged(object sender. SqlCommand cmd = new SqlCommand(). protected void Page_Load(object sender.Collections. int xx. System. System.UI. System.CommandText="select max(SNo) from rationcard". dr=cmd. cmd.Security. System. int x.Data.Web.UI. System.Web. SqlDataReader dr.Web.ExecuteReader().Web. } } protected void btn_submit_Click(object sender.Connection = con.Web. txtuser.Mygo Informatics txtpassword.Open().WebParts.SqlClient.WebControls.Web. System. AuthenticateEventArgs e) { } } Civil Registry Apply for Ration Card using using using using using using using using using using using using System.Enabled = true.UI.Read()) .UI.

Text + "'.Text + "'.'" + txt_lpgno.'" + txtrel2.ExecuteScalar()).'" + txtage2.Text + "'.'" + dp2.Text + "'.Text + "'.Text + "'.Open().'" + dp3.SelectedItem.Value + "'.'" + txtrel5.Text + "'.'" + txt_adult. } else { lblmsg.'" + txtrel1. } } } .Text + "'.SelectedItem.ExecuteNonQuery().Text == "" || txt_adult.CommandText = "insert into rationcard values(" + xx + ".SelectedItem.Value + "'.Text = "Registered Successfully".Value + "'. x = cmd.ExecuteNonQuery().'" + txt_minor.Close().Text + "'.'" + txtfull3.Text + "'.Text + "'.Text + "'. if (x > 0) { lblmsg.'Process')". lblmsg.Text + "'. Page. x = cmd.ToInt16(cmd.'" + txt_fathersname. con. xx=dr.Value + "'.'" + txtfull5.Text == "" || txt_prstaddr. xx=xx+1.Text + "'. if (txt_nameappln.Text == "" || txt_occptn.'" + txtage1.'" + txtrel3.Text + "'.Text + "'.GetInt32(0).'" + txt_nameappln.Text == "") { lblmsg. int i = Convert.Text + "')".'" + dp4.Text + "'.CommandText = "Select max(SNo) from rationcard".Text == "" || txt_minor.'" + txt_pertaddr.'" + dp1.Text + "'. con.'" + txtage5.Text == "" || txt_fathersname.Text + "'.'" + txt_elecno.Text + "'.'" + txtfull4.'" + txtfull1.'" + dp5.'" + txtage3.Text + "'.Text + "'.Visible = true.Text + "'.Text + "'.'" + txt_nameEmpl.'" + txtfull2.Text + "'.'" + txt_prstaddr.Value + "'.Visible = true.Close().SelectedItem. "<script> alert('Your Registration No:" + i + " ')</script>").Text = "Registeration Failed". cmd.'" + txtrel4.Visible = true. con.'" + txtage4.'" + txt_trano.CommandText = "insert into rationRelation values(" + xx + ".Text == "" || txt_nameEmpl. lblmsg.'" + txt_occptn.Text = "Missing Fields! Please fill all the mandatory Fields".Mygo Informatics { Civil Registry } dr.Text == "" || txt_pertaddr.RegisterStartupScript("aa".Close().SelectedItem. cmd. lblmsg. } else { cmd.

protected void Page_Load(object sender. System.Data. txt_prstaddr.Text = "".Text="". txt_pertaddr.Text = "".Web.Text = "".Web. txt_elecno. txtrel3. txtrel2.Text = "". txtrel1.Text="".Web.SqlClient. txtfull5. System.Text = "". System.Text = "".Text = "".UI.UI. txtage2.WebControls.UI.Conn ectionString). txt_minor.Collections.Web.HtmlControls. txt_nameEmpl. txtage5.Security.Text = "". txtfull4.Text = "". System.Web. EventArgs e) { lblmsg. System.WebParts. txtfull1. txtage3. public partial class Default2 : System.Text = "".Text="".ConnectionStrings["civilRegDB"].Visible = false. EventArgs e) { if (Session["admin"] == null) . System.Text = "".Data.Text = "".UI. txtfull2. txt_adult.Page { SqlConnection con = new SqlConnection(ConfigurationManager. System.Text = "".WebControls.Web.Configuration.Text = "". System.Text = "".Text = "". txt_trano.Text = "". Civil Registry } } Admin Voter Registration: using using using using using using using using using using using System. txt_lpgno.Text = "". txtrel5. txt_occptn.Text = "".Text = "".UI. System.Text = "". txt_nameappln.Text = "". txtfull3. txtrel4.Text = "". System. txtage4. txtage1.Web.Mygo Informatics protected void btnre_Click(object sender. txt_fathersname.

Rows[e.Rows[i].Mygo Informatics Civil Registry Response. con).Cells[1]. GridViewDeleteEventArgs e) { String old = GridView1.Rows[i]. "death"). There are several areas of testing involved in web applications.Tables["death"]. SqlDataSource1. SqlDataAdapter da = new SqlDataAdapter(sql. } } } } 9. function.Cells[1].Redirect("Login. da. i++) { c = (CheckBox)GridView1. String sql = "Update VoteReg set status='Sanctioned' where SNO=" + old + "".Count. for (int i = 0. GridView1.RowIndex]. } protected void GridView1_RowDeleting(object sender. The Web-app testing is a collection of related activities with a single goal: to uncover errors in web application content.Text. navigability. performance.Rows.DeleteCommand = sql. For the current web application. if (c.DataBind().Fill(ds.Checked) { String old = GridView1. EventArgs e) { CheckBox c.DataBind().Text. String sql = "Update VoteReg set status='Rejected' where SNO=" + old + "". GridView1.FindControl("ch1"). DataSet ds = new DataSet().aspx"). CONTENT TESTING . usability.DataSource = ds. GridView1. } protected void CheckBox1_CheckedChanged(object sender. I used some of them as follows. i < GridView1. TESTING Testing is the process of exercising software with the intent of finding errors. capacity and security.

While converting the user request into a database query While fetching dynamic content to the web pages. accessing the database using several queries etc. DATABASE TESTING Database testing is done to uncover the errors which occur as a consequence of fetching large equities of data from the database. Whether all the web pages are showing consistent content or not. The content includes the dynamic information about the companies. Communication between the web application and the remote database. Content testing of all web pages is evaluated for syntactic and semantic errors. . While testing all interfaces I have verified for errors as follows. I have tested the application for database errors in following areas. In this project. At syntactic level I have verified the content for spelling. extracting relevant data from the database. punctuation and any grammar mistakes of all pages which contain the content of the website. Whether the content is valid or not. USER INTERFACE TESTING All the interfaces that have been designed are reviewed whether they meet the customer requirement or not.Mygo Informatics Civil Registry Content testing attempts to uncover errors in content of the web application. stock values and flowchart details which is fetched from the database. The consistency of this information is thoroughly tested. Whether the format of the content is good and readable or not. this testing step also considers dynamic content derived from data maintained as a part of database system that has been integrated with the web application. At semantic level I have verified for the following aspects. In addition to examining static content for errors. While opening and closing the active connections to the database While presenting the raw data fetched from database in a formatted HTML output.

color.Mygo Informatics Civil Registry Errors related to specific interface mechanisms for example proper execution of all menu links that are provided in each web page Errors related to all semantics of navigation and web application functionally that is provided in each web page. INTERFACE MECHANISM TESTING When a user interacts with a web application. Errors in consistency related to different aspects of the interfaces like font style. Forms: Testing forms has been done at two different levels i. Errors in viewing the interfaces in different web browsers like Microsoft internet explorer.e. At minimum level I have tested for: • Whether labels been correctly defined for fields or not. at minimum level and at more targeted level. I have listed all the links in each form to test whether each link is connecting the appropriate page or not. screen background color etc. . Whether server is receiving all the information contained in the form and no data are lost in the transmission between client and server... Links: Each navigation link is tested to ensure that appropriate web page is linked or not. Testing done within theses mechanisms is the interface mechanism testing. the interaction occurs through one or more mechanisms which are called interface mechanisms. This testing is done in following areas. Whether appropriate default values are available when the user does not select any item in the selection box. Mozilla firefox etc. size.

Some methods of scripting will be performed in some particular browsers and in others not. USABILITY TESTS In this testing I have verified up to. forms. Tests are designed to determine the degree to which the web application interface makes users easy to work with. • Whether tab order among different controls is in required order or not. I have combined the forms testing with this client-side script testing. Client Side Scripting: Each and every function written in scripting has been tested by Black Box Testing.e.Mygo Informatics Civil Registry • Whether scripts that perform data validation from the client-side are working properly or not. users can interact with the system effectively. which level that. So I have also performed compatibility testing to ensure that the scripting functions will work properly in all browsers. Usability test has been performed on total web application. I have designed test case so that usability testing can be verified at different levels: Usability test has been performed on each and every individual interface i. because input for scripting is provided from forms. Usability test has been performed on total web page with related client side scripting functions. At more targeted level I have tested for: • Whether text fields have proper width to enter data. • Whether text fields are allowing string length more than specified length. .

The job of navigation testing is to ensure that the navigation mechanisms are functional. (ex: dead links. it should run on different environments like different computer architectures. operating systems. In essence of those we have tested by identifying different computing platform. which passed all the tests. DEPLOYMENT: The error-free project. Navigation links are thoroughly tested.Mygo Informatics Civil Registry COMPATIBILITY TESTS As this is a web application. browsers and network connection speeds. Different browsers produce slightly different result as we expected. improper links. Is the target page to a navigation link is correct or not. is now deployed at the client environment in this phase. erroneous links). the browsers that are available with me. To perform these testing strategies first we have prepared what are all the client side functions that encounter problems with different compatibilities. NAVIGATION TESTING Navigability is tested to ensure that all navigation syntax and semantics are exercised to uncover any navigation errors. and to validate that each Navigation Semantic Unit can be achieved by the appropriate user category. typical display devices. . Redirects are properly checked. in some cases this results may not be a problem but in some cases there will be serious errors. As different computing configurations can result in difference in client side scripting speeds and display resolution. operating system variance may cause web application processing issues. 8. the operating systems supported on the platform. Is the link caption meaningful or not. We have done the navigation testing in following areas.

voter’s id. . pan card etc… has become a huge task.Mygo Informatics Civil Registry 10. SCREEN SHOTS Paste Screens Hear: Conclusion Now a day’s manual process for the citizens to apply for their government records like passport. driving license.

The project could very well be enhanced further as per the requirements.Net Professional By Wrox Publications MSDN 2002 . reduce manual work in an efficient manner.S.Mygo Informatics Civil Registry The main object of the website is to reduce the effort by the candidate and save his time and avoid unwanted rushes at the government offices and assure a smooth working schedule at government offices. Pressman SQL FOR PROFESSIONALS By Jain VISUAL BASIC. reliable and effective way to apply for their government records. a quick.NET Black Book By Evangeleous Petereous ASP. Bibliography SOFTWARE ENGINEERING By Roger. convenient. The main features of this site includes flexibility.

Mygo Informatics Civil Registry By Microsoft .

Mygo Informatics Civil Registry .

Sign up to vote on this title
UsefulNot useful