You are on page 1of 72

ABSTRACT

This project is being designed to provide the information about the universities
in Andhra Pradesh. Andhra Pradesh is a state where there are more and more
opportunities to those people who wishes to join different courses of studies through
online. This site is being designed to provide that information to those people who
wish to register themselves in any of the universities through online. The new
education policy of Government of Andhra Pradesh provides with much more
opportunities by increasing the number of seats per course per college, which will
provide the much larger opportunities for the education lovers.

This application gives the information about educational opportunities


available in several universities and also the progress of the Information Technology.

Existing System:

The current system is semi-automated system.


 Manual system.
 No effective tool for organizing
 Not user friendly environment.

Proposed System:

The development of new system contains advanced features. This system


provides information about all courses available in several universities. By this system
we can apply for any course through online.
This system maintains the complete details about all the students who are applied for
different courses
 GUI for Admin to generate
 Time Saving

Modules:
Registration
Student

-1-
Admin

ACKNOWLEDGEMENT

I whole–heartedly thank the management of Bluevega Solutions Private


Limited for having given us an opportunity to do our project work on “Automatic
Callback” as a partial fulfillment award of the Bachelors degree in Computer
Science and Engineering.

I wish you to express gratitude to Mr. C Vinay Kumar and the professor
Mr. Vijay Kumar chairman and director of Nishitha College of engineering and
technology for providing us with the environment and mean to enrich our skills and
motivating us in our endeavors and helping us realize our full potential.

With profound gratitude, we express our heartiest thanks to


Miss. A Valli Kumari Project Guide and Miss. B Kiranmai Head of the department
of computer science for having spent his valuable time for providing guidance and
suggestions throughout the project.

Last but not least, we greatly acknowledge all the initiatives and dedicated
efforts of the team members for effectively carrying out the project activities in their
respective capabilities.

Rakesh
Karthik
Naresh

-2-
CONTENTS

1. INRODUCTION

1.1. Project Description ……………………… 6

2. LITERATURE OVERVIEW

2.1. Java Technology ………………………… 9

2.2. J2EE ………………………… 14

2.3. About Html ………………………… 18

2.4. MySQL ………………………… 20

3. REQUIREMENT ANAYSIS

3.1. Existing Systems ………………………… 23

3.2. Proposed System ………………………… 23

3.3. Feasibility Study ………………………… 24

3.4. Software & Hardware Requirements ........................................ 26

3.5. Module Description ………………………… 27

3.6. Non – Functional Requirements ………………………… 29

4. PROJECT DESIGN

4.1. Input Output Design ………………………... 31

4.2. Database Design ………………………... 33

4.3. Overall Project Architecture ………………………… 35

4.4. UML Diagrams ………………………… 36

4.4.1. Class Diagram ………………………… 36

4.4.2. Use Case Diagram ........................................ 37

4.4.3. Sequence Diagram ........................................ 38

-3-
5. IMPLEMENTATION ………………………… 40

6. PROJECT TESTING

6.1. Testing Objectives ………………………… 43

6.2. Testing Principles ………………………… 43

6.3. Types of Testing ........................................ 43

6.4. System Testing ........................................ 47

7. SCREEN SHOTS ………………………… 50

8. FUTURE ENHANCEMENT ………………………… 67

9. CONCLUSION ………………………… 69

REFERENCE ………………………… 71

-4-
INTRODUCTION

-5-
1. INTRODUCTION

1.1 Project Introduction

This project is being designed to provide the information about the universities
in Andhra Pradesh. Andhra Pradesh is a state where there are more and more
opportunities to those people who wishes to join different courses of studies through
online. This site is being designed to provide that information to those people who
wish to register themselves in any of the universities through online. The new
education policy of Government of Andhra Pradesh provides with much more
opportunities by increasing the number of seats per course per college, which will
provide the much larger opportunities for the education lovers.

This application gives the information about educational opportunities


available in several universities and also the progress of the Information Technology.

Existing System:

The current system is semi-automated system.


 Manual system.
 No effective tool for organizing
 Not user friendly environment.

Proposed System:

The development of new system contains advanced features. This system


provides information about all courses available in several universities. By this system
we can apply for any course through online.
This system maintains the complete details about all the students who are applied for
different courses
 GUI for Admin to generate
 Time Saving

-6-
Modules:
Registration
Student

Scope of the Project:

The scope of the proposed project is


 Study and analysis of the required data updates, look and feel, ease of use etc.
 Design of HTML pages, layout design etc.
 Implementation of the static and dynamic pages, validation etc
 Study of technical details for various authentications.
 Design and Implementation of use cases.
 Functional and performance testing.
 Study and collection of the data required
 Design and implementation of database schema.
 Functional and Performance of testing of the complete module
 Study of various process stages and their interdependencies.
 Listing of various test cases and validations.
 Verification and Validation of the complete project.

Modules

The project is divided into the following modules.


 Login Module
 Administration Module
 Scheduler Module

-7-
LITERATURE
OVERVIEW

-8-
2. LITERATURE OVERVIEW

2.1 Java Technology

Java started out as a bit of an accident. A team under Bill Joy was working at
Sun on a new programming language for embedded applications. Java was originally
expected to work in toasters and fridges, not on modern computers! The initial
prognosis for Java was not good and it was only the rise of the Internet which saved
Java from oblivion. Since then, neither the Net nor Sun nor Java has looked back and
all have grown from strength to strength.

World Wide Web is an open ended information retrieval system designed to


be used in the distributed environment. This system contains web pages that provide
both information and controls. We can navigate to a new web page in any direction.
This is made possible worth HTML java was meant to be used in distributed
environment such as internet. So java could be easily incorporated into the web
system and is capable of supporting animation graphics, games and other special
effect. The web has become more dynamic and interactive with support of java. We
can run a java program on remote machine over internet with the support of web.

Java Environment

Java environment includes a large number of tools which are part of the
system known as java development kit (JDK) and hundreds of classes, methods, and
interfaces grouped into packages forms part of java standard library (JSL).

Java Architecture

Java architecture provides a portable, robust, high performing environment for


development. Java provides portability by compiling the byte codes for the java
virtual machine which are then interpreted on each platform by the runtime
environment. Java also provides stringent compile and runtime checking and
automatic memory management in order to ensure solid code.

-9-
Java Virtual Machine

When we compile the code, java compiler creates machine code (byte code)
for a hypothetical machine called java virtual machine (jvm). The JVM will execute
the byte code and overcomes the issue of portability. The code is written and compile
for one machine and interpreted all other machines. This machine is called java virtual
machine.

Java Features

Simple because Java inherits the C/C++ syntax and many of the objected
oriented features of C++, most programmers have a little trouble in learning
Java. Some of the more confusing concepts from C++ are either left out of Java are
implemented in a cleaner, more approachable manner.

Secure because when we use a Java- compactable Web browser, you can
safely download applets with out fear of viral infection or malicious intent. Java
achieves this protection by confining a Java program to the Java execution
environment and not allowing it to access other parts of computer.

Portable because many types of computers are operating systems are in use
through out the world and many is connected to the internet .for programs to be
dynamically downloaded to all various types of plat forms connected to the internet,
some means of generating portable executable code is needed. Java’s solution to
these two problems is both elegant and efficient.

Object-Oriented because java manages to strike balance between the


pursuits “everything is an object” paradigm and the pragmatist’s “stay out of the way”
model. The object model Java id simple and easy to extend, while simple types, such
as integers, are kept as high performance non objects.

Robust means maximum fault tolerant capability. Java is Robust because it


handles problems like memory management and exceptional handling
exceptionally well. Java virtually eliminates the memory problems by allocating and

- 10 -
Deal locating it. Deal location is automatic since it provides garbage collector.
Exceptional conditions in traditional environments often arise in situations such as
‘division by zero’ or ‘file not found’. Java helps in this area by providing object
oriented exception handling.

Multi threaded because Java was designed to meet the real- world
requirement of creating interactive programs. To accomplish this, Java supports
multithreaded programming that allows you to write programs that do many things
simultaneously.

Architecture-Neutral because the problems like code longevity and


portability was solved. the main problems that the programmer’s face is that there
is no guarantee that if you write a program today ,it will run tomorrow –even on the
same machine .The Java designers made several hard decisions in the Java language
and the Java Virtual Machine in an attempt to alter this situation.

Interpreted and High Performance because Java enables the creation of


cross- platform by compiling into an intermediate representation called Java Byte
code. This code can be interpreted on any system that provides a Java Virtual
Machine.

Distributed because it handles TCP/IP protocols. In fact accessing a resource


using URL is not much different from accessing a file .Java allows intra- address-
space messaging by a package called Remote Method Invocation.

Dynamic because Java programs carry with them substantial amounts of


the run - time type in the information that is used verify and resolve access
objects at run time .this makes it possible to dynamically link code in a safe and
expedient manner.

- 11 -
The essential aspects included in object-oriented approach
 Identity.
 Classification.
 Polymorphism.
 Inheritance.

Identity

Identity means that data is qualified into desecrate distinguishable entities


called object and has its own inherent identity.

Classification

Classification means that object with same data structure and behavior are
grouped into a class. A class is an abstract that describes the properties important to
an application and ignores the rest. Each class describes a possibly infinite set of
individual objects. Objects contain an implicit reference to its own class it "knows
what kind of thing it is".

Polymorphism

Polymorphism means that the same operation may behave differently on


different class. An operation is an action or transformation that an object performs or
is subject to. A specific function in a class is called a METHOD. The language
automatically selects the correct method to implement an operation based on the name
of the operation and class the object operated on. New classes can be added without
changing executing code provided methods are provided for each applications
operation on the new classes.

Inheritance

Inheritance is a sharing attribute and operation among classes based on


hierarchical relationship. A class can be defined broadly and refined into successively
five sub classes. Each sub class incorporates or inherits at the properties of its super
class and adds its own unique properties.

- 12 -
Paradigm of Java

 Dynamic down loading applets(small application programs);


 Elimination of flatware phenomenon that is providing those features
of a product that user needs at a time. The remaining features of a product can
remain in the server.
 Changing economic model of the software
 Up-to-date software availability.

- 13 -
2.2 J2EE

Java Data Base Connectivity (JDBC)

Overview of New Features

The JDBC 1.0 API provided result sets that had the ability to scroll in a
forward directionally. Scrollable result sets allow for more flexibility in the
processing of results by providing both forward and backward movement through
their contents. In addition, Scrollable result sets allow for relative and absolute
positioning. For example, it’s possible to move to the fourth row in a scrollable result
set directly, or to move directly to the third row following the current row provided
the row exists. The JDBC API allows result sets to be directly updatable, as well.

Advanced Data Types

Increased support for storing persistent Java programming language objects


(Java objects). And a mapping for SQL99 data types such as binary large objects, and
structured Types, has been added to the JDBC API. An application may also
customize the map-ping of SQL99 structured types into Java programming language
classes.

JNDI for Naming Databases

The Java Naming and Directory Interface (JNDI) API can be used in addition
to a JDBC technology-based driver manager (JDBC driver manager) to obtain a
connection to a database. When an application uses the JNDI API, it specifies a
logical name that identifies a particular database instance and JDBC driver for
accessing that database. This has the advantage of making the application code
independent of a particular JDBC driver and JDBC technology URL.

- 14 -
SERVLETS:

Servlets are Java programming language objects that dynamically process


requests and construct responses. The Java Servlet API allows a software developer to
add dynamic content to a Web server using the Java platform. The generated content
is commonly HTML, but may be other data such as XML.

Servlets are the Java counterpart to non-Java dynamic Web content technologies such
as PHP, CGI and ASP.NET. Servlets can maintain state across many server
transactions by using HTTP cookies, session variables or URL rewriting.

The Servlets API, contained in the Java package hierarchy javax.servlet, defines
the expected interactions of a Web container and a servlet. A Web container is
essentially the component of a Web server that interacts with the servlets. The Web
container is responsible for managing the lifecycle of servlets, mapping a URL to a
particular servlet and ensuring that the URL requester has the correct access rights.

A Servlet is an object that receives a request and generates a response based on that
request. The basic servlet package defines Java objects to represent servlet requests
and responses, as well as objects to reflect the servlet's configuration parameters and
execution environment. The package javax.servlet.http defines HTTP-specific
subclasses of the generic servlet elements, including session management objects that
track multiple requests and responses between the Web server and a client. Servlets
may be packaged in a WAR file as a Web application.

- 15 -
Lifecycle of a Servlet:

The Servlet lifecycle consists of the following steps:

 The Servlet class is loaded by the container during start-up.

 The container calls the init() method. This method initializes the servlet and

must be called before the servlet can service any requests. In the entire life of a

servlet, the init() method is called only once.

 After initialization, the servlet can service client requests. Each request is

serviced in its own separate thread. The container calls the service() method

of the servlet for every request. The service() method determines the kind of

request being made and dispatches it to an appropriate method to handle the

request. The developer of the servlet must provide an implementation for these

methods. If a request for a method that is not implemented by the servlet is

made, the method of the parent class is called, typically resulting in an error

being returned to the requester.

 Finally, the container calls the destroy() method that takes the servlet out of

service. The destroy() method like init() is called only once in the

lifecycle of a Servlet.

- 16 -
Java Server Pages:
Java Server Pages (JSP) is a Java technology that allows software developers
to create dynamically generated web pages, with HTML, XML, or other document
types, in response to a Web client request. The technology allows Java code and
certain pre-defined actions to be embedded into static content.

The JSP syntax adds additional XML-like tags, called JSP actions, to be used to
invoke built-in functionality. Additionally, the technology allows for the creation of
JSP tag libraries that act as extensions to the standard HTML or XML tags. Tag
libraries provide a platform independent way of extending the capabilities of a Web
server.

Architecturally, JSP may be viewed as a high-level abstraction of Java servlets. Both


servlets and JSPs were originally developed at Sun Microsystems. Starting with
version 1.2 of the JSP specification, JavaServer Pages have been developed under the
Java Community Process. JSR 53 defines both the JSP 1.2 and Servlet 2.3
specifications and JSR 152 defines the JSP 2.0 specification. As of May 2006 the JSP
2.1 specification has been released under JSR 245 as part of Java EE 5.

JSPs are compiled into servlets by a JSP compiler. The compiler either generates a
servlet in Java code that is then compiled by the Java compiler, or it may compile the
servlet to byte code which is directly executable. JSPs can also be interpreted on-the-
fly, reducing the time taken to reload changes.

Regardless of whether the JSP compiler generates Java source code for a servlet or
emits the byte code directly, it is helpful to understand how the JSP compiler
transforms the page into a Java servlet.
JSP pages embed tags within a HTML or XML document that are evaluated by the
compiler. This can be done through the use of scripting tags similar to those used in
PHP or ASP.NET, or by importing a JSP Tag Library.

- 17 -
2.3 About HTML

HTML (hyper text markup language) is a language used to create hyper text
documents that have hyper links embedded in them. It consists of tags embedded in
the text of a document with HTML. We can build web pages or web documents. It is
basically a formatting language and not a programming language. The browser
reading the document interprets mark up tags to help format the document for
subsequent display to a reader. HTML is a language for describing structured
documents. HTML is a platform independent. WWW (World Wide Web) pages are
written using HTML. HTML tags control in part the representation of the WWW page
when view with web browser. The browser interprets HTML tags in the web
document and displays it. Different browsers show data differently. Examples of
browsers used to be web pages include:
 Mozilla Firefox
 Internet Explorer

Java Script

Java script is a general purpose, prototype based, object oriented scripting


language developed jointly by sun and Netscape and is meant for the WWW. It is
designed to be embedded in diverse applications and systems, without consuming
much memory. Java script borrows most of its syntax from java but also inherits from
AWK and PERL, with some indirect influence from self in its object prototype
system.

Java scripts dynamically typed that are programs do not declare variable types,
and the type of variable is unrestricted and can change at runtime. Source can be
generated at run time and evaluated against an arbitrary scope. Typical
implementations compile by translating source into a specified byte code format, to
check syntax and source consistency. Note that the availability to generate and
interpret programs at runtime implies the presence of a compiler at runtime.

- 18 -
Java script is a high level scripting language that does not depend on or expose
particular machine representations or operating system services. It provides automatic
storage management, typically using a garbage collector.

Features:

 Java script is embedded into HTML documents and is executed with in


them.
 Java script is browser dependent
 JavaScript is an interpreted language that can be interpreted by the
browser at run time.
 Java script is loosely typed language
 Java script is an object based language.
 Java script is an Event-Driven language and supports event handlers to
specify the functionality of a button.

Advantages:

 Java script can be used for client side application


 Java script provides means to contain multi-frame windows for
presentation of the web.
 Java script provides basic data validation before it is sent to the
server. E.g. : login and password checking or whether the values
entered are correct or whether all fields in a form are filled and reduced
network traffic
 It creates interactive forms and client side lookup tables.

- 19 -
2.4 MySQL

My SQL Server is an application used to create computer databases for the


server operating systems. It provides an environment used to generate databases that
can be accessed from workstations, the web, or other media such as a personal digital
assistant (PDA).

SQL SERVER TABLES:

SQL Server stores records relating to each other in a table. Different tables
are created for the various groups of information. Related tables are grouped together
to form a database.
 My SQL is a fully web-enabled database and has a strong support for XML
and HTTP which are two of the main infrastructure technologies for Java.
 My SQL some of the most important new My SQL features are direct access
to the database from a browser, query of relational data with results returned
as XML, as well as storage of XML in relational formats.

Primary Key:

Every table in My SQL has a field or a combination of fields that uniquely


identifies each record in the table. The Unique identifier is called the Primary Key, or
simply the Key. The primary key provides the means to distinguish one record from
all other in a table. It allows the user and the database system to identify, locate and
refer to one particular record in the database. This is used to achieve Integrity in the
database.

Relational Database:

Sometimes all the information of interest to a business operation can be stored


in one table. My SQL makes it very easy to link the data in multiple tables. Matching
an employee to the department in which they work is one example. This is what
makes My SQL a relational database management system, or RDBMS. It stores data
in two or more tables and enables you to define relationships between the tables.

- 20 -
Foreign Key:

When a field in one table refers the primary key of another table, this key is
identified as a foreign key. A foreign key is a field or a group of fields in one table
whose values match those of the primary key of another table. This is used to achieve
Referential Integrity in the database, i.e. consistency among various tables.

Referential Integrity: Ensuring that the data among related tables is correctly
matched is referred to as maintaining referential integrity.

Data Abstraction: A major purpose of a database system is to provide users with


an abstract view of the data. This system hides certain details of how the data is
stored and maintained. Data abstraction is divided into three levels.

Physical level: This is the lowest level of abstraction at which one describes how
the data are actually stored.

Conceptual Level: At this level of database abstraction all the attributes and
actual data that is stored and describes relationship among them.

View level: This is the highest level of abstraction at which one describes only part
of the database.

Features of My SQL:

My SQL is one of the leading database management systems (DBMS) because


it is the only Database that meets the uncompromising requirements of today’s most
demanding information systems. From complex decision support systems (DSS) to
the most rigorous online transaction processing (OLTP) application, even application
that require simultaneous DSS and OLTP access to the same critical data, My SQL
leads the industry in both performance and capability.
My SQL is a truly portable, distributed, and open DBMS that delivers
unmatched performance, continuous operation and support for every database. My

- 21 -
SQL is high performance fault tolerant DBMS which is specially designed for online
transactions processing and for handling large database application.

- 22 -
REQUIREMENT
ANALYSIS

- 23 -
3. REQUIREMENT ANALYSIS

3.1 Existing System

The existing trading system is a complete manual system which has many
issues like redundancy of entries, manipulation of entries and no specific level of
usage. Lack of security measurements for the entries.

Problems in the Existing System

 Lack of security for the entries


 Redundancy of data entries.
 Single person was appointed to work in all the departments and which needs
much time
 No specific level of data entry.

3.2 Proposed System

The proposed system is a computer based intranet application, which


overcomes the security issues provided to the data entered. Data redundancy,
accessing time of data retrieval, manipulation and updates are reduced.

The proposed system must:


 Data storage and retrieval is done using computer based applications
which is efficient and secure
 Duplication and data redundancy is reduced.
 Work is categorized based on department wise.
 Access levels are specified based on the hierarchy.

- 24 -
3.3 Feasibility Study:

Feasibility Study is a high level capsule version of the entire process intended
to answer a number of questions like: What is the problem? Is there any feasible
solution to the given problem? Is the problem even worth solving? Feasibility study
is conducted once the problem clearly understood. Feasibility study is necessary to
determine that the proposed system is Feasible by considering the technical,
Operational, Economical factors. By having a detailed feasibility study the
management will have a clear-cut view of the proposed system and it enables the
developers for easy accessing of the system being developed.
The following feasibilities are considered for the project in order to ensure that
the project is variable and it does not have any major obstructions. Feasibility study
encompasses the following things:
 Technical Feasibility
 Economical Feasibility
 Operational Feasibility

Technical Feasibility:

Technical Feasibility determines whether the organization has the technology


and skills necessary to carry out the project and how this should be obtained. The
system can be feasible because of the following grounds.
 All necessary technology exists to develop the system.
 The system is too flexible and it can be expanded further.
 The system can give guarantees of accuracy, ease of use, reliability and
the data security.
 The system can give instant response to inquiries.

This project is technically feasible because, all the technology needed for Trade
Processing system project is readily available.

Economical Feasibility:

- 25 -
Economical Feasibility determines whether the project goal can be within the
resource limits allocated to it or not. It refers to the benefits or outcomes we are
deriving from the system compared to the total cost we are spending for developing
the product. If the benefits are more or less the same as the older system then it is not
feasible to develop the product. It must determine whether it is worthwhile to carry
out the process with the entire project .Financial benefits must be equal or exceed the
costs. In this issue, we should consider:
 The cost to conduct a full system investigation.
 The cost of h/w and s/w for the class of application being considered.
 The development tool.
 The cost of maintenance etc.,

This project is economically feasible because the cost of development is very


minimal when compared to financial benefits of the application.

Operational Feasibility:

Operational Feasibility determines if the proposed system satisfied user


objectives can be fitted into the current system operation. It refers to the feasibility of
the system to be operational that is some system may work very well at design and
implementation but fails in the real time environment. It considers that the additional
modules added are isolated modules. The present system can be justified as
Operationally Feasible based on the following grounds.
 The methods of processing and presentation are completely accepted to the
clients since they can meet all user requirements.
 The clients have been involved in the planning and development of the
system.
 The proposed system will not cause any problem under any circumstances.

This project is operationally feasible because the time requirements and personnel
requirements are satisfied.

- 26 -
3.4 Hardware/Software Requirements

The configuration given below are the hardware and software handled for the
system development.

Hardware Specifications:

Processor : Pentium 1 GHz

Primary Memory (RAM) : 512 MB RAM or more

Secondary Memory (HDD) : 40GB

Software Specifications:

Technology : Java and J2EE


Web Technologies : Html, JavaScript, CSS
Web Server : Tomcat 5.5
Database : Mysql
JDK Version : JDK1.5

- 27 -
3.5 Module Description

This project mainly has four modules namely:


Registration
Student
Admin

Administration

In business, administration consists of the performance or management of business


operations and thus the making or implementing of major decisions. Administration can be
defined as the universal process of organizing people and resources efficiently so as to direct
activities toward common goals and objectives.
Administrator can serve as the title of the general manager or company secretary who
reports to a corporate board of directors.

Administrators, broadly speaking, engage in a common set of functions to


meet the organization's goals.
 Planning is deciding in advance what to do, how to do it, when to do it, and
who should do it. It maps the path from where the organization is to where it
wants to be. The planning function involves establishing goals and arranging
them in logical order. Administrators engage in both short-range and long-
range planning.

Login

In this login module the User will logged into University Online Admission to
maintain the Online Dairy i.e., the events of a User which will be present in future. By
this site any user can be informed about an event specified date, time and address to
him by remind to his mobile.

- 28 -
Schedule

In Schedule module it contains the details of user events which have saved
when he comes to have new programs in his real life to get remember he is
maintaining an online help to help him to attend the events at correct time.

This application enables the users to plan their work schedule, keep a track of
their calls and attend them only when they are free. The users enter the details of their
work such as status, start time, end time, category, message and action to be
performed, through the scheduler portal.

A web application which helps the user to schedule and organize his/her day
to day activity. The portal helps to maintain his status shown to all and available time
for call.

- 29 -
3.6 Non - Functional requirements

Non-functional requirements are requirements which specify criteria that can


be used to judge the operation of a system, rather than specific behaviors. Non-
functional requirements are often called qualities of a system.

Performance Requirements

Performance testing validates that the quality of the service parameters defined
at the requirements stage is met by the final product. In the cases of the Trade
Processing System the performance requirements include to handle the number of
stock and ensuring them that the data is real.

Safety & Reliability Requirements:

By incorporating a robust and proven My SQL into the system, reliable


performance and integrity of data is ensured. There must be a power backup for server
system.

Security Requirements:

Sensitive data is protected from unwanted access by using appropriate


technology and by implementing strict member access criteria.

Software Quality Requirements:

It is very easy to use. Backup mechanisms are considered for maintainability


of the software as well as database. As it is object oriented, reusability exists.

- 30 -
PROJECT DESIGN

- 31 -
- 32 -
4. PROJECT DESIGN

4.1 Input Output Design

Introduction

The most creative and challenging phase of the life cycle is system
design. The term design describes a final system and the process by which it is
developed. It refers to the technical specifications that will be applied in
implementations the candidate system. The design may be defined as “the process of
applying various techniques and principles for the purpose of defining a device, a
process or a system in sufficient details to permit its physical realization”.

The designer’s goal is how the output is to be produced and in what


format samples of the output and input are also presented. Second input data and
database files have to be designed to meet the requirements of the proposed output.
The processing phases are handled through the program Construction and Testing.
Finally, details related to justification of the system and an estimate of the impact of
the candidate system on the user and the organization are documented and evaluated
by management as a step toward implementation.

The importance of software design can be stated in a single word


“Quality”. Design provides us with representations of software that can be assessed
for quality. Design is the only way that we can accurately translate a customer’s
requirements into a finished software product or system without design we risk
building an unstable system, that might fail it small changes are made or may be
difficult to test, or one who’s quality can’t be tested. So it is an essential phase in the
development of a software product.

- 33 -
Application Design:

USERS:

The major functionality of this product is divided into three categories.


1. Administrator Functions.
2. Registered User Functions.

In this application each and every user must having their own User ID
and Password, using these User ID and Password only they can directly enter into
their corresponding Login forms.

After enter into their Login forms each user will interact with the
following functionalities.

But according to their responsibilities only they will use the above
functionalities.

1. Administrative User Functions

In this functionality the administrator will do his own responsibilities. After


providing of his user name and password only the administrator can enter into his
account and do his duties the administrator can create his own gang and view all the
existed gangs in the portal. The main aim of the administrator is to maintain the total
portal. He can able to sent messages to the users who are invited by the registered
users. He can able to cancel a gang if it effects the others privacy. Also he can able to
cancel a photo if it effects the others privacy.

2. Registered User Functions

In this function registered users can perform following tasks without login. He
can able to search for the friends but unable to add them to their friends list. He can
able to view the existing gangs but unable to join in a gang. If any situation he wants
to change the password then he can directly change the password on his own. He can
able to view or update his profile.

- 34 -
4.2 Database Design

Database Tables: The total number of database tables that were identified to build
the system.

The major part of the Database is categorized as

1. Transactional components:
The Transactional components are useful in recording the transactions
made by the system. Consignment bookings, material particulars, dealership requests
and feedbacks etc.

2. Data Dictionary components:


These components are used to store the major information like branch
details, employee details, deliveries, dispatches and receivers details etc.

3. General components:
These components are used to store the general information like login information etc.

Data Dictionary:

The logical characteristics of current systems data stores, including name,


description, aliases, contents, and organization. Identifies processes where the data
are used and where immediate access to information needed. Serves as the basis for
identifying database requirements during system design.

Uses of Data Dictionary

 To manage the detail in large systems


 To communicate a common meaning for all system elements
 To Document the features of the system
 To facilitate analysis of the details in order to evaluate characteristics and
determine where system changes should be made.
 To locate errors and omissions in the system

- 35 -
Database Tables

Schedule Table:

This table has field for Scheduling. It contains the user schedule details like
event, date of an event, time of an event and address.

Column Name Data Type


Userid varchar(20)
Event varchar(10)
date date
time time
address varchar(20)

Acbreg Table:

The table for the User Registration Details to the University Online Admission
with the specified details in Registration form. The table uses for the usage of Login
into the Web-site.

Column Name Data Type


frstname archar(10)
lastname varchar(10)
userid varchar(20)
pwd password
dob date
gender varchar(5)
address varchar(20)
district varchar(10)
state varchar(10)
country varchar(10)
pincode varchar(10)
cellnumber varchar(15)
emailed varachar(20)

- 36 -
4.3 OVERALL PROJECT ARCHITECTURE

Cust. Details
Stored
Schedule Database
Details SERVERS
ADMINISTRATOR Account Details Retrieved
Updation Details

- 37 -
4.4 UML Diagrams

This phase determines how the problem is to be solved. In short analysis gives
the understanding of what is to be done and design phase provides the idea of how the
system will meet the requirements. This process gives the programmers firm
understanding the requirements and guides them in the development of the system
with the help of UML diagrams and data dictionary. This information domain analysis
can be represented as a continuous flow that undergoes a series of transformations
(process) as it evolves from input-to-output. The UML diagram (Rational Rose) used
as a graphical tool to depict information flow.

4.3.1 Class Diagram:

Class diagrams to describe the structure of the system. Classes are abstraction
that specifies the common structure and behavior of a set of objects. Class diagrams
describe the system in terms of objects, classes, attributes, operations and their
associations

Class Diagram

Administrator
user name : char
pwd : char

login()
univ updates()
checks the student details()
logout()

Applicant
Registration user id : char
Name user pwd : char
Father Name
Gender Registration()
DOB Login()
Email-ID Select Course()
Submition()
Email-Id Validation() View Confirmation()
Login() Log out()

Database

- 38 -
4.3.2 Use Case Diagrams

This view of a system architecture encompasses the use cases (or the complex
modules) that describe the behaviour of the system as seen by its end users, analysts
and testers.
Hence we chose the following blocks to describe a Structural View of our model.

Use case – A description of a set of sequences of actions, including variants, that a


system performs that yields an observable result of value to an actor.

Actor – A coherent set of roles of users of use – case plays when interacting with the
use case.
Use case Diagram - That shows a set of use – cases and actors and their
relationships to address the static view of our model. Global Use Diagram:-

Registration

Login

Select Course

Admin
Degree
Applicant

PG

Others

View Applicant Details

- 39 -
This diagram completely represents the use cases, actors that are a part of
trade processing system and even the complete flow of the application.
4.3.3 Sequence Diagram

Sequence diagram depicts the interactions between class instances, in the form
of method calls and call returns shows a specific scenario of execution in the system
in terms of object instances. This diagram focuses on the time ordered messages
between objects that collaborate to accomplish some task.

Applicant Registration Login Admin Course Application Verify Applicant


Selection Form Details
Register

Registered Successfully

Login
Select a Course
Apply For a selected course

verifies the aplicant details

Verified Applicant Details

Sends Confirmation Mail

verify details

- 40 -
IMPLEMENTATION

- 41 -
5. IMPLEMENTATION

Implementation is the stage where the theoretical design is turned into a


working system. This is the most crucial stage in achieving a new successful system
and in viewing confidence on the new system for the users that it will work efficiently
and effectively. The system can be implemented only after through testing is done and
if it is found to work according to specification.
It involves careful planning, investigation of the current system and its
constraints on implementation, design of methods to achieve the change over and an
evaluation of change over methods apart from planning. Two major tasks of preparing
the implementation are
 Education and training of the users and
 Testing of the system
The implementation phase comprises of several activities. The required
hardware and software acquisition is carried out. The system may require some
software to be developed. For this, programs are written and tested. The user then
changes over to his new fully tested system and old system is discontinued.

Home Page

The main page is the page which has all modules included init. With the
project description has Information, Login and Registration.

Login Page

The main page is the page next to the login page which appears only if the
user login to the application. On the screen of main page, we have links that direct to
the modules namely Login, Registration, and Information.
Registration Page

This is the main page for the module Registration which deals with the new
user registration, displaying the success after entering all details.

- 42 -
Error Page

This is the main page to display the error messages while logging into an
account and while registering, changing the settings.

- 43 -
TESTING

- 44 -
6. TESTING

Once the source code has been generated the software must be tested to
uncover as many errors as possible before delivery to the customer. Software testing
is a critical element of software quality assurance and represents the ultimate review
of specification design and code generation.

6.1 Testing Objectives

 Testing is a process of executing a program with the intent of finding an error.


 A good test case is one that has a high probability of finding an as
undiscovered error.

 A successful test is one that uncovers an as yet undiscovered error.

6.2 Testing Principles

 All tests should be traceable to customer requirements.


 Tests should be planned large before testing begins.

 Testing should begin “In the Small” and progress towards “In the Large”.

 The Pareto principle applies to software testing. The pareto principle implies
that 80 percent of all errors uncovered during testing, will likely be traceable
to 20 percent of all program components.

 Exhaustive testing is not possible.

6.3 TYPES OF TESTING

The system can be tested in one of the following

1. White-Box Testing
2. Black-Box Testing

- 45 -
6.3.1 White-Box Testing

This is performed knowing the internal workings of a product. Tests are


conducted to ensure that “all gears mesh”, that is internal operation performs
according to specification and all internal components have been adequately
exercised. This can be done on close examination of procedural detail. Providing test
cases that exercise specific set of conditions and loops tests logical paths through the
software.

Using the White-Box Testing we can derive cases that

 Guarantee that all independent paths with in a module have exercised at least
once.
 Exercise all logic decisions on their true and false sides.

 Execute all loops at their boundaries and with their operational bounds

 Exercise internal data structures to ensure their validity.

6.3.2 Black-box Testing

Black- box testing methods focus on the functional requirements of the


software. That is black box testing enables the software engineer to derive sets of
inputs conditions that will fully exercise all functional requirements for a program.
Black box testing is not an alternative to white box testing.

Black box Testing attempts to find an error in the following categories

 Incorrect or missing functions


 Interface errors

 Errors in data structures or external database access

 Performance errors

- 46 -
 Initialization and termination errors.

- 47 -
Testing Process

Except for small computer, systems should not be tested as a single monolithic
unit. Large systems are built out of subsystems which are built out modules, which are
composed of procedures and functions. The testing process should therefore proceed
in stages where testing is carried out incrementally in conjunction with system
implementation. Software testing is a client element of software review of
specification, design and code generation. The goal of software testing is to design a
series of test cases that have a high like hood of finding errors.

The testing process may consist of different stages

1. Unit Testing

Individual components are tested to ensure that they operate correctly. Unit
testing treats components as stand-alone entity which does not need other components
during the testing process.

2. Integration Testing

It tests for the errors resulting from integration modules. One specific target
of integration testing is the interface: whether parameters match on both sides as to
type, permissible ranges and meaning. Analyst tries to find areas where modules have
been designed with different specifications. This is the top-level testing. In this all
modules tested separately would be put together and tested for producing the ultimate
result of the system. The main emphasis during this testing will be on the interface
between the modules. By applying various business rules generated as a part of test
cases, we where able to ease certain design level complexities.

3. System Testing

The main objective of the system testing is to find out the discrepancies
between the developed system and its original objective, current specifications and the

- 48 -
system documentation. It also verifies for the compatibility of the system with the
operational environment. The following system testing tasks are essential.

4. Stress Testing

This is performed to determine manner that demands resources in abnormal


quantity, frequency, or volume.

5. Procedure Testing:

It determines the clarity of the documentation operation and use of system.


Asking the user to do exactly what the manual requests to perform.

 Module Testing: A module is a collection of dependent components such


as an object or some looser collection of procedures and functions. A module
encapsulates related components so can test with out other systems.
 Sub-system Testing: This phase involves testing collections of modules
which have been integrated into sub-systems. Sub- systems may be
independently designed and implemented, and the most common problems
which arise in large software systems are sub-system interface mismatches.
The sub-system test process should concentrate on the detection of interface
errors by rigorously exercising those interfaces.

 System Testing: The sub-systems are integrated to make up the entire


system. Testing process is concerned with finding errors which normally
result from unanticipated interface between sub systems and components.

 Acceptance Testing: This is final stage in the testing process before the
system is accepted for operational use. It involves testing the system with data
supplied by the system prowler rather than simulated data developed as a part
of the testing process. Acceptance testing is sometimes called as Alpha
Testing.

 Alpha Testing: The alpha testing is conducted at the developer’s site by


customers. The software is used in a natural setting with the developer

- 49 -
“looking over the shoulder “of the user and recording errors and usage
problems. Alpha tests are conducted in a controlled environment.

 Beta Testing: The beta testing is conducted at one or more customer sites
by the end user of the software. Unlike, alpha testing the developer generally
is not present. Therefore, the betas test is a “live” application of the software
in an environment that cannot be controlled by the developer. The customer
records all the problems that are encountered during bets testing and reports
there to the developer at regular intervals. As result of problems reported
during bets, tests the software developer makes modifications and then
prepare for release of the software product to the entire customer here.

 Validation Testing: validation testing can be defined that validation


succeeds when the software functions in a manner that can be reasonably
expected by the customer. Reasonable expectations are defined in the
software. The specification contains a section called validation criteria.
Information contained in that section forms the basis for a validation testing
approach.

6.4 SYSTEM TESTING

System testing is designated to uncover weakness that was not detected in the
earlier tests. The total system is tested for recovery and fallback after various major
failures to ensure that no data are lost. An acceptance test is done to   validity and
reliability of the system. The philosophy behind the testing is to find error in project.

- 50 -
SCREEN SHOTS

- 51 -
7. SCREEN SHOTS

- 52 -
- 53 -
- 54 -
- 55 -
- 56 -
- 57 -
- 58 -
- 59 -
- 60 -
- 61 -
- 62 -
- 63 -
- 64 -
- 65 -
- 66 -
FUTURE
ENHANCEMENTS

- 67 -
8. FUTURE ENHANCEMENTS

 Globalizing the application by making it useful for many other products of this

variant.

 This application can be deployed over internet and intranet.

 Making this application a multi – user operable by categorizing according to

the departments.

 In addition to this application, Schedule module can be added.

 Multiple centralized databases can be managed for multiple users either over

internet or intranet.

- 68 -
CONCLUSION

- 69 -
9. Conclusion

This project has been able to successfully incorporate all the requirements as
specified by the user. Appropriate care must be taken during database design to
maintain database integrity and to avoid redundancy of data. Validation is done
instantaneously to avoid data inconsistency. The package was designed in such a way
that any further modifications needed can be done easily. The user is provided with a
friendly interface by hiding all technical complexities. The user can easily interact
with the package. It has been thoroughly tested and implemented.

The efficiency of any system designed to suit an organization depends


cooperation during the implementation stage and also flexibility of the system to
adopt itself to the organization.

“University Online Admission” has been developed to overcome the problems


with traditional systems.

- 70 -
REFERENCE

- 71 -
REFERENCE

Books

 Object Oriented System Development By Ali Bahrami McGraw-Hill

International Editions)

 Eclipse By Steven Kozy

 My SQL Server, A Complete Reference.

 Java Server Pages Black Book By Kogent DreamTech

 Java Server Pages HeadFirst

 Software Engineering by Rogers. Pressman

 Database Management System Concepts 4th edition By Silberschatz, Korth,

Sudarshan

Web Sites

 http://www.w3schools.com

 http://www.ebizgc.com

 http://www.cde.state.co.us

 http://lists.webjunction.org/libweb/

 http://libraryautomation.com/

 http://www.librarytechnology.org/

 http://marylaine.com

 http://www.inm.com/

- 72 -

You might also like