You are on page 1of 34

1.

INTRODUCTION

1.2 MODULE DESCRIPTION

ADMIN MODULE
Here Admin has to log in by using their unique user name and password. Admin are the
only authorized person to access user module for security purpose. So other user doesn’t get
rights to access this module.
 User Details
 Student Details
User Details:
In this module admin can see the all user details. Only admin view the users’ details in
admin module. Other user doesn’t get rights to access this module for security purpose.
Student Details:
In this module admin can see the all student details. Only admin view the student's details
in admin module. Other user doesn’t get rights to access this module for security purpose.

USER MODULE

1
Here User has to log in by using their unique user name and password. Users are the only
authorized person to access user module for security purpose. So other user doesn’t get rights to
access this module.
 Study Materials
 Video Materials
 Audio Materials
Study Materials:
In this module users can uploads to student tutorials and files for students. Only users can
update and delete the study materials details in user module. Other user doesn’t get rights to
access this module for security purpose.
Video Materials:
In this module users can uploads video files and classes. Only users can update and delete
the study materials details in user module. Other user doesn’t get rights to access this module for
security purpose.

STUDENT MODULE
Here Student has to log in by using their unique user name and password. Student is the
only authorized person to access student module for security purpose. So other user doesn’t get
rights to access this module.
 Register
 Log in
 Study Materials
 Video Materials
 Audio Materials
Register:
In this module students has to register their details forget the account. After Registration
they will be get the User name and password for every student.
Login:
Here Student has to log in by using their unique user name and password. Student is the
only authorized person to access student module for security purpose. So other user doesn’t
get rights to access this module.

2
Study Materials:
In this module student can view and download the tutorials and files. Only student's can
update and delete the study materials details in user module. Other user doesn’t get rights to
access this module for security purpose.
Video Materials:
In this module student can view and download the video files. Only student's can update
and delete the study materials details in user module. Other user doesn’t get rights to access this
module for security purpose.
Audio Materials:
In this module student can view and download the audio files. Only student's can update
and delete the study materials details in user module. Other user doesn’t get rights to access
this module for security purpose.

1.3 SYSTEM SPECIFICATION

1.3.1 HARDWARE SPECIFICATION

Processor : Intel core2

Memory : 128 MB RAM or More

Hard disk Requirement : Free 500MB on installation drive

Monitor Resolution : 800x600 resolutions or higher

Keyboard : 104 keys

1.3.2 SOFTWARE SPECIFICATION

Operating System : Windows7

Scripting Language : PHP

Database : MYSQL

3
ABOUT THE SOFTWARE

About PHP
PHP is a powerful server-side scripting language for creating dynamic and
interactive websites. PHP widely used; free and efficient alternative to competitors such as
Microsoft’s ASP.PHP is perfectly suited for Web development and can be embedded directly
into the HTML code. The PHP syntax is similar to pearl and C.
PHP is open source that it is readily available and absolutely free. Stability,
flexibility and speed are chief qualities that attract to choose PHP.PHP have multiple extensions
and is extremely scalable.
Server-side scripting
This server-side scripting is the most traditional and main target field for PHP.
Programmer needs three things to make this work. Programmer need to run the web server, with
a connected PHP installation. Programmer can access the PHP program output with a web
browser, viewing the PHO page through the server. All these can run on your home machine if
programmers are just experimenting with PHP programming.
Command line scripting

4
Programmer can make a PHP script to run it without any server or browser.
Programmers only need the PHP parser to use it this way. This type of usage is ideal for scripts
regularly executed using croon (on*nix or Linux) or Task Scheduler (on Windows). These
scripts can also be used for simple text processing tasks.
Features of PHP
 PHP runs on different platforms (Windows, Linux, UNIX, etc.)
 PHP is compatible with almost all servers used today.
 PHP is free to download from the official PHP resource: www.php.net.
About MYSQL
MYSQL is an open-source relational database management system (RDBMS) is
developed, distributed and supported by MYSQL AB. MYSQL is a popular choice of database
for use in web applications MYSQL can be scaled by deploying it on more powerful hardware,
such as a multi-processor server with gigabytes of memory. MYSQL is easy to use, yet
extremely powerful, secure, and scalable. And because of its small size and speed, it is the ideal
database solution for Web sites.
MYSQL is a database management system
A database is a structured collection of data. It may be anything from a simple shopping
list to a picture gallery or the vast amount of information in a corporation network. To add,
access and process data stored in a computer database we need a database management system
such as MYSQL server. Since computers are very good at handling large amount of data,
database management system plays a central role in computing.
MYSQL is a relational database management system
A relational database stores separate data in separate tables rather than putting all the data
in one big storeroom. This adds speed and flexibility. The SQL part of “MYSQL” stands for
“Structured Query Language”. SQL is the most common standardize language used to access
database and is defined by the ANSI/ISO SQL standard. The SQL standard has been evolving
since 1986 and several versions exist.
MYSQL software is open source
Open source means that it is possible for anyone to use modify the software. Anybody
can download the MYSQL software uses the GPL (GNU General Public License), to define what
we may and may not use do with the software.

5
MYSQL Server works in Client/ Server or embedded systems
The MYSQL database software is a client/server system that consists of a multi-threaded
SQL server that supports different backend, several different client programs and libraries,
administrative tools and a wide range of Application Programming Interface(APIs). A large
amount of contributed MYSQL software is available:
Modern day websites seem to be relying more and more on compel the Structured Query
Language is a very popular database language, and its standardization makes it easy to store,
update and access data. One of the most powerful SQL servers out there is called MYSQL and
surprisingly enough, it’s free.
Some of the features of MYSQL include: Handles large databases, in the area of
50,000,000+records. No memory leaks. Tested with a commercial memory leakage detector
(purify). A privilege and password system which is very flexible and secure, and which allows
host-based verification. Passwords are secure since all password traffic when connecting the
server is encrypted.

Features of MYSQL
Client/server Architecture: MYSQL is a client/server system. There is a database server
(MYSQL) and arbitrarily many clients (application programs), which communicate with the
server. The clients can run on the same computer as the server or on another computer.
SQL Compatibility: As before said SQL is a standardized language for querying and
updating data and for the administration of a database. Through the configuration setting sol-
mode we can make the MYSQL server behave for the most part compatibly with various
database systems.
Stored procedures: Stored procedures (SPs for short) are generally used to simplify
steps such as inserting or deleting a data record.
Triggers: Triggers are SQL commands that are automatically executed by the server in
certain database operations INSERT, UPDATE, and DELETE, MYSQL has supported triggers.
Replication: Replication allows the contents of a database to be copied (replicated) onto
a number of computers to increase protection against system and to improve the speed of
database queries.

6
Platform independence: MYSQL can be executed under a number of operating systems.
The most important are Apple Macintosh OS X, Linux, Microsoft Windows, and the Unix.
Speed: MYSQL is considered a very fast database program.

2. SYSTEM ANALYSIS

2.1 EXISTING SYSTEM


Existing system contain the many drawbacks. Existing system did not provide any
resource sharing in the college. When the student wants any files or video they are getting this
project. So student is buying the resource in the project.

2.1.1 DISADVANTAGE OF THE EXISTING SYSTEM


 Did not provide any resource sharing.
 Less secure.
 Waste of time for manual process.
 Lot of time search for a specific person’s files or video, audio and study details.

2.2 PROPOSED SYSTEM


This proposed system is used to make resource sharing details entered systematically.
Based on the user requirement the education resource sharing information’s are retrieved.

7
2.2.1 ADVANTAGES OF PROPOSED SYSTEM
 User Friendly.
 Processing time is less.
 Quick response.
 Secure system.
 Share the study, video and audio materials through this project.
 Document, PDF and PPT information passed through this project.

3. SYSTEM DESIGN

3.1 INPUT DESIGN


The data, which is input to a computer – based information system, must be correct. If
data is carelessly input and errors enter the system, it will lead to incorrect results whose
consequences will be expensive and embarrassing to the designer. In data processing, the data
entry operator often makes errors. This can be controlled by input design by using menu,
interactive dialogue, consistent format etc.
In this system the users are provided with user friendly pages to give the input and if the
user gives any wrong input validations are done and message boxes are provided in the necessary
places. The message specified in the message box is specified in a polite and in an informative
manner.
System is interactive dialogue, which simplifies the data entry or access, instead of
remembering what to enter. User can choose from a list of options and type it in the cursor
position. This will reduce the number of corrections while entering the data.

8
3.2 DATABASE DESIGN
The database design involves creation of tables that are represented in physical database
as stored files. They have their own existence. Each table constitute of rows and columns where
each row can be viewed as record that consists of related information and column can be viewed
as field of data of same type. The table is also designed with some position can have a null value.
The database design of project is designed in such a way values are kept without
redundancy and with normalized format. Refer the appendix for screen shots of database design.

3.3 OUTPUT DESIGN


The proposed system is a web oriented system and hence it does not provide any reports.
The output results are viewed in the web pages itself. Outputs from the computer system are
required primarily to communicate the result of processing to users. They are also used to
override a permanent copy of the results for later consultation.
The output reports and input documents should be documented in terms of data content
and approximate layout; it is not necessary to define the methods of presentation. It is possible to
work back for the output data items are derived by calculations or by logical deduction.
Presentation the data processed by a computer – based information system in an attractive
and usable form is very important. Very often, the success and acceptance of a system depends
on good output presentation. It is thus essential for a system analyst to understand how to design
output presentation. With advances in computer technology, many new output devices are being
introduced in the market.

9
4. SYSTEM TESTING AND IMPLEMENTATION

4.1 SYSTEM TESTING


System testing is critical aspect of software quality assurance and represents the ultimate
Review of specification, design and coding. Testing is a process of executing a program with the
intent of finding an error. A good testing case is that has the probability of finding as yet
undiscovered error. The purpose of the system testing is to identify and correct bugs in the
developed system. Nothing is complete without testing. Testing is vital to the success of the
system.
Testing objectives include
 Testing is a process of executing a program with the intent of finding an error.
 A good test case is one that has a high probability of finding an as yet
undiscovered error.
 A successful test is one that uncovers an as yet undiscovered error.

10
Testing should systematically uncover different classes of errors in a minimum amount of
time and with a minimum amount of effort. A secondary benefit of testing is that it demonstrates
that the software appears to be working as stated in the specifications.
4.1.1 Unit Testing
Unit testing is the basic level of testing where individual components are tested to ensure
that they operate correctly. In a properly designed system, each component should have a
precise specification, and test cases must be defined to check that the component meets its
specification. Unit testing considers each component to be a stand-alone entity, which does not
require other system components to be present during the testing process. The modules purchase,
sales are individually unit tested using the above approach.
4.1.2 Integration Testing
Data can be lost across an interface, one module can have an adverse effect on another
sub function, when combined, may not produce the desired major function. Integration testing is
a systematic technique for constructing the program structure while at the same time conducting
tests to uncover errors associated with the interface. All the modules are combined in the testing
step. Then the entire program is as a whole.
Different integrated test plans like top down integration and bottom up integration are
tested and different errors found in the system are corrected using them. Finally, all the
combined modules are performed well.
4.1.3 Validation Testing
Software validation is achieved through a series of test that demonstrates the conformity
and requirements. Thus the proposed system under consideration has to be tested by validation
and found to be working satisfactorily. For example in customer enters phone number field
should contain number otherwise it produces an error message similarly in all the forms the
fields are validated.
4.1.5 White Box Testing
White box testing, sometimes called glass-box testing is a test case design method that
uses the control structure of the procedural design to derive test cases. Using white box testing
methods, the software engineer can derive test cases.
1. Guarantee that all independent paths within a module have exercised at least once.
2. Exercise all logical decisions on their true and false sides.

11
3. Execute all loops at their boundaries and within their operational bounds.
4. Exercise internal data structures to ensure their validity.
4.1.6 Black Box Testing
Black box testing, also called behavioral testing, focuses on the functional requirements
of the software. That is, black box testing enables the software engineer to derive sets of input
conditions that will fully exercise all functional requirements for a program. Black box testing is
not an alternative to white box techniques. Rather it is a complementary approach that is likely to
uncover a different class of errors than white box methods. Black box testing attempts to find
errors in the following categories.

4.2 SYSTEM IMPLEMENTATION


A project in general is implemented after navigating the computer life cycle method of
the project. Various life cycle process such as requirement analysis, design phase, verification,
testing and finally followed by the implementation phase results in a successful project
management. The project which is basically a web based application has been successfully
implemented after passing various life cycle process mentioned above.
Security and authentication is maintained in both user level as well as the management
level. The data is stored in. is highly reliable and simpler to use, the user level security is
managed with the help of password options and sessions, which finally ensures that all the
transactions are made securely.
The applications validations are made, taken into account of the entry levels available in
various modules. Possible restrictions like number formatting, date formatting and confirmations
for both save and update options ensure the correct data to be fed into the database. Thus all the
aspects are charted out and the complete project study is practically implemented successfully for
the end users.

12
4.3 SYSTEM MAINTENANCE
Maintenance is actually implementation of the review plan as important as it is
programmers and analyst is to perform or identify with him or herself with the maintenance.
There are psychologically personality and professional reasons for this. Analyst and
programmers spend fair more time maintaining programmer then they do writing them
Maintenances account for 50-80% of total system development. Maintenance is expensive.
.NET Framework began as proprietary software, although the firm worked to standardize
the software stack almost immediately, even before its first release. Despite the standardization
efforts, developers, mainly those in the free and open-source software communities, expressed
their unease with the selected terms and the prospects of any free and open-source
implementation, especially regarding software patents. Since then, Microsoft has changed .NET
development to more closely follow a contemporary model of a community-developed software
project, including issuing an update to its patent promising to address the concerns.

5. CONCLUSION AND FUTURE ENHANCEMENT

5.1 CONCLUSION
The application works according to the restrictions provided in their respective browsers.
The application satisfies both the company and Customer by eliminating more input. The speed
of the transactions become more enough now.
The Website creation is the web designing project created for displaying the details about
the web portal using the coding languages like Html & Css for designing. The interface are so
designed and channeled the customer can never make any mistake while using the application,
till the time either they save or cancel the current operation all other operations are blocked.

5.2 FUTURE ENHANCEMENT

13
Further enhancements can be made to the application, so that the application functions very
interactive and useful to existing application. The application satisfies both the company and
Customer by eliminating more input. The speed of the transactions become more enough now.
This project has been successfully developed and interpreted and system was developed
according to the customer requirements. The system produces accurate results and it also reduces
a lot of overheads, which the manual system faced. The information requirements may still
increase in the near future. Any further enhancement can easily accompanied with the existing
module without alteration. In future, instructor details modules can also be included.

6. BIBLIOGRAPHY
BOOK REFERENCES

1) Jesus Castagnetto, Sascha Schumann, “Professional Php Programming”, Addison wisely


Publication, Fifth Edition.
2) Jay Greenspan, Brad Bulgar, “Mysql/Php Database Applications”, Tata McGraw-Hill
Publishing Company, Third Edition.
3) William Stallings, “Cryptography And Network Security”, Tata McGraw-Hill Publishing
Company, Third Edition.
4) Bruce Schneier, “Applied Cryptography”, Pearson Education, Second Edition.
5) Rogers Pressman, “Software Engineering and Applications”, Galgotie Publication, Sixth
Edition.

14
REFERENCES WEBSITE

1. www.onlinetutorial.com
2. www.cryptography.com
3. www.tenders.com
4. www.computerhope.com/starthtm.htm
5. www.webdesign.about.com/od/webdesignbasics/u/webdesignbasics.htm
6. www.w3schools.com/php/php_mysql_intro.asp

APPENDIX
A. DATA FLOW DIAGRAM
Level 0

Student education
Admin resource sharing Student

15
Level 1

Admin Username Login


Staff details staff_db
Password

Student
stud_db
details

Study study_db
material

Video
16 video_db
material
Audio
audio_db
material

Level 2

Staff Registration Login

View
Student stud_db

Share Study study_db


material

Video video_db
material
17
Audio video_db
material

B. ENTITY RELATIONSHIP DIAGRAM

name subject

id uname

Admin Staff details


Manage

pwd mob
stymat

id vid/audi

Material Maintai
Vie
n
w
desc type name mater
18
id dowld

Student
C. TABLE DESIGN
Table name : staff registration

Primary key : id

Field name Data type Width Description


id int 10 Staff registration identification
name varchar 25 Staff name
subject varchar 30 Subject
mobno varchar 10 Mobile number
pwd Varchar 15 Password
mail Varchar 15 Mail id

Table name : student registration

19
Primary key : id

Field name Data type Width Description


id int 10 Student registration identification
name varchar 25 Student name
mobno varchar 10 Mobile number
pwd Varchar 15 Password
mail varchar 15 Mail id

Table name : Material

Primary key : id

Field name Data type Width Description


id int 10 Material identification
name varchar 15 File name
video varchar 25 Video files
audio varchar 25 Audio files
type varchar 20 File type
desc varchar 15 Description

20
HOME PAGE

Staff registers

21
Staff login

Upload Study Materials

22
Upload video

Upload audio

23
Student register

24
Student login

Student view file

25
View audio

26
Admin login page

Manage staff

27
Manage staff

28
Coding

<?php
ob_start();
session_start();
include_once "database/dbconnect.php"; ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN"
"http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<link rel="stylesheet" type="text/css" href="stylesheet/mystyle.css" />
<link rel="stylesheet" type="text/css" href="stylesheet/menu.css" />
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>EDUCATION RESOURCE SHARING</title>
</head>

<body>
<div id="total">
<img src="images/banner.jpg" width="895" height="157" style="animation-
direction:alternate;" />
<table width="100%" border="0">
<tr>
<td ><strong></strong></td>
</tr>
</table>
<table width="100%" border="0">
<tr>
<td>
<div id='cssmenu'>

29
<ul>
<li><a href='index.php'><span>Home</span></a></li>
<li><a href='about.php'><span>About Us</span></a></li>
<li><a href='services.php'><span>Services</span></a></li>
<li ><a href='courses.php'><span>Courses</span></a></li>
<li ><a href='staff.php'><span>Staff</span></a></li>
<li class='current'><a href='student.php'><span>Student</span></a></li>
</ul>
</div>

</td>
</tr>
</table>
<table width="100%" border="0" cellpadding="0" cellspacing="0">
<tr>
<td colspan="3"><p align="center">&nbsp;</p>
<table width="50%" border="0" cellpadding="5" align="center" style="background-
color:#000000; color:#FFFFFF">
<form action="register.php" method="post" enctype="multipart/form-data"
name="admindes"
onsubmit="return validation(this)">
<tr>
<td colspan="2" align="center"><img src="images/registration_icon.gif" alt=""
width="164" height="131" style="margin-right:-60px;" /></td>
</tr>
<tr>
<td align="right">Name :</td>
<td><label for="username"></label>

30
<input type="text" name="names" id="names" /></td>
</tr>
<tr>
<td width="48%" align="right">Mobile No:</td>
<td width="51%"><label for="username"></label>
<input type="text" name="mobno" id="mobno" /></td>
</tr>
<tr>
<td width="48%" align="right">Email :</td>
<td width="51%"><label for="username"></label>
<input type="text" name="email" id="email" /></td>
</tr>
<tr>
<td width="48%" align="right">Username :</td>
<td width="51%"><label for="username"></label>
<input type="text" name="username" id="username" /></td>
</tr>
<tr>
<td align="right">Password :</td>
<td><label for="username2"></label>
<input type="password" name="password" id="password" /></td>
</tr>
<tr>
<td colspan="3">&nbsp;</td>
</tr>
<tr>
<td colspan="3" align="center"><input type="submit" name="submit" id="submit"
value="Register"

31
style="background-color:#00CCFF; width:90px;" /></td>
</tr>
<tr>
<td colspan="3" align="center">&nbsp;</td>
</tr>
</form>
</table>
<p align="center">&nbsp;</p></td>
</tr>
<tr>
<td colspan="3"><hr /></td>
</tr>
<tr>
<td width="51%"><p align="center"><strong>Time Managements Tips to Get Success in
Online Learning</strong></p>
<br />
<p align="center" style="text-align:justify">Are you an online student and want to learn
ways to stay top of your online classes. Online degree programs give students the flexibility to
take their classes anytime, anywhere. In order to staying on top of your online education,
discipline, commitment, and organization are required. These are the basic traits that any online
student must possess in order to get succeed. Online learning involves a dedicated time of
independent study and in order to stand out in an online learning course it is very important to
incorporate various time management practices into the day. Below are mentioned some of the
best time management tips that can help you stay competitive in the online learning. </p></td>
<td width="3%"><p style="border-left: 1px solid rgb(102,102,102); margin-left:15px;
height:270px;"></p></td>
<td width="46%"><p align="center"><img src="images/clocks.png" alt="" width="366"
height="280" /></p></td>
</tr>
<tr>
<td colspan="3"><hr /></td>

32
</tr>

</table>

</div>
</body>
</html>
<script type="text/javascript">

document.getElementById('names').focus();

function validation() {

var frm = document.admindes;

if(frm.names.value =="") { alert("Please Enter the Name."); frm.names.focus(); return


false }
if(frm.mobno.value =="") { alert("Please Enter the Mobile No.");
frm.mobno.focus(); return false }
if(frm.email.value =="") { alert("Please Enter the Email.");
frm.email.focus(); return false }
if(frm.username.value =="") { alert("Please Enter the Username.");
frm.username.focus(); return false }
if(frm.password.value =="") { alert("Please Enter the Password."); frm.password.focus();
return false }

33
return true;
}

</script>

<?php

if(isset($_REQUEST['submit'])){

$sql="Insert into register(reg_name,reg_mobno,reg_email,reg_uname,reg_pword)


values('".$_REQUEST['names']."','".$_REQUEST['mobno']."','".$_REQUEST['email']."',
'".$_REQUEST['username']."','".$_REQUEST['password']."')";

//echo $sql;
//exit;

mysql_query($sql);

echo '<script type="text/javascript">alert("Registered Successfully");</script>';

echo '<meta http-equiv="refresh" content="0,url=student.php">';

}
?>

34

You might also like