You are on page 1of 78

1.

INTRODUCTION
1.1 ABOUT THE PROJECT
Developing a virtual classroom system to promote a greater count of students to splurge into
the field of Education. It integrates the benefits of a physical classroom with the convenience of a
‘no-physical-bar’ virtual learning environment, minus the commuting hazards and expenses. It will
usher in the immense flexibility and sophistication in the existing learning platform structures, with
the perfect blend of synchronous and asynchronous interaction. It provides a means of collaborative
learning for the students.
The educational methodology utilized for the concept of the Virtual Classroom (a classroom
in an electronic space) reflects asynchronous group communications and collaborative approaches to
education and training. The student is an active part of a learning group but proceeds to learn and
understand on an individual basis independent of the speed of other learners in the group.
The Virtual Classroom is a teaching and learning environment located within a computer-
mediated communication system. The objectives of a Virtual Classroom are to improve access to
advanced educational experiences by allowing students and instructors to participate in remote
learning communities using personal computers at home or at work; and to improve the quality and
effectiveness of education by using the computer to support a collaborative learning process. By
collaborative learning is meant a learning process that emphasizes group or cooperative efforts among
faculty and students, active participation and interaction on the part of both students and instructors,
and new knowledge that emerges from an active dialog among those who are sharing ideas and
information.
The Virtual Class Room system is a web based project. This project is aimed to develop
online learning courses. Developing a virtual classroom system to promote a greater count of students
to splurge into the field of Education. It integrates the benefits of a physical classroom with the
convenience of a ‘no-physical-bar’ virtual learning environment, minus the commuting hazards and
expenses. It will usher in the immense flexibility and sophistication in the existing learning platform
structures, with the perfect blend of synchronous and asynchronous interaction. It provides a means
of collaborative learning for the students.
2. SYSTEM ANALYSIS

2.1 FEASIBILTY STUDY


A feasibility analysis usually involves a thorough assessment of the operational (need),
financial and technical aspects of a proposal. Feasibility study is the test of the system proposal made
to identify whether the user needs may be satisfied using the current software and hardware
technologies, whether the system will be cost effective from a business point of view and whether it
can be developed with the given budgetary constraints. A feasibility study should be relatively cheap
and done at the earliest possible time. Depending on the study, the decision is made whether to go
ahead with a more detailed analysis.
When a new project is proposed, it normally goes through feasibility assessment. Feasibility
study is carried out to determine whether the proposed system is possible to develop with available
resources and what should be the cost consideration. Facts considered in the feasibility analysis were.
 Technical Feasibility
 Economic Feasibility
 Behavioral Feasibility

Technical Feasibility
Technical Feasibility deals with the hardware as well as software requirements. Technology is
not a constraint to type system development. To find out whether the necessary technology, the
proposed equipments have the capacity to hold the data, which is used in the project, should be
checked to carry out this technical feasibility.
The technical feasibility issues usually raised during the feasibility stage of investigation
includes these
 This software is running in windows 7 Operating System, which can be easily installed.
 The hardware required is Pentium based server.
 The system can be expanded.
Economical Feasibility
This feasibility study present tangible and intangible benefits from the prefect by comparing
the development and operational cost. The technique of cost benefit analysis is often used as a basis
for assessing economic feasibility. This system needs some more initial investment than the existing
system, but it can be justifiable that it will improve quality of service.
Thus feasibility study should center along the following points:
 Improvement resulting over the existing method in terms of accuracy, timeliness.
 Cost comparison
 Estimate on the life expectancy of the hardware
 Overall objective
Our project is economically feasible. It does not require much cost to be involved in the overall
process. The overall objectives are in easing out the requirement processes.

Behavioral/ Operational Feasibility


This analysis involves how it will work when it is installed and the assessment of political and
managerial environment in which it is implemented. People are inherently resistant to change and
computers have been known to facilitate change. The new proposed system is very much useful to the
useful to the users and there for it will accept broad audience from around the world.
2.2 EXISTING SYSTEM
In the existing system, the user hast to attend the classes in regular time only, once delivered
course cannot be repeated. Flexibility of multiple courses learning is not possible in the system. In
addition, the user has to copy important notes. If any exams are conducting, he has to attend the
exams. The course should be finished in time. Maintaining the data relating students and course not
in secured manner. This system maintains the data in the form of excel sheets and devices.

2.3 PROPOSED SYSTEM

The development of this new system contains the following activities, which try to automate
the entire process keeping in the view of database integration approach.
User Friendliness is provided in the application with various controls provided by system Rich
User Interface.
It can be accessed over the Internet.
The user information files can be stored in centralized database which can be maintained by
the system.
This can give the good security for user information because data is not in client machine.
Authentication is provided for this application only registered members can access.
As the virtual classroom is one that aims to give the student an experience equal to or better
than the sort they would find in a traditional classroom, there are obviously many advantages of the
virtual classroom to the student, as well as the teacher (or instructor) and the associated educational
institution.
3. SYSTEM ENVIRONMENT

3.1 HARDWARE REQUIREMENTS

The hardware used for the development of the project is:


Processor : Intel Core i3

RAM capacity : 4 GB

Hard disk drive : 1TB

Keyboard : Multi Media

Mouse : Optical

Monitor : 17” Color

3.2 SOFTWARE REQUIREMENTS

The software used for the development of the project is:


Operating System : Windows

Front end used : ASP .Net

Back end used : SQL Server


3.3 SOFTWARE SPECIFICATION

FRONT END

This Project work has completed in ASP. NET with vb as front end and SQL Server as back
end. Microsoft .NET is software that connects information, people, systems and devices. It spans
clients, servers and developer tools and consists of:
 The .NET Framework programming model that enables developers to build Web-
based applications which expose their functionality programmatically over a network
using standard protocols such as SOAP and HTTP.
 Developer tools such as Microsoft Visual Studio .NET, which provide a rapid
application integrated development environment for programming with the .NET
Framework.
 A set of servers including Microsoft Windows 2000, Microsoft SQL, Server and
Microsoft BizTalk Server that integrates, runs, operates and manages XML Web
services and applications.
 Client software such as Windows XP, Windows CE and Microsoft Office XP, 7 that
help developers deliver a deep and compelling user experience across a family of
devices and existing products.
The .NET Framework is the programming model of the .NET environment for building,
deploying and running Web- based applications, smart client applications and XML Web services. It
manages much of the plumbing, enabling developers to focus on writing the business logic code for
their applications. The .NET Framework includes the common language runtime and class libraries.

OVERVIEW OF THE LANGUAGE USED


MICROSOFT VISUAL STUDIO
Microsoft Visual Studio is Microsoft’s flagship software development product for
computer programmers. It centers on an integrated distribution environment which has programmers
create stand alone, and web services that run on any platforms supported by Microsoft’s .Net
Framework (for all versions after 6). Supported platforms include Microsoft windows, servers and
workstations, Pocket PC, Smart Phones and World Wide Web browsers not the Java Virtual Machine
that all other java tools target.
VISUAL STUDIO 2010
The most important language added in this version was the introduction of generics, which
are similar in many aspects to C++ templates. This potentially increases the number of bugs caught at
compile- time instead of run- time by encouraging the use of strict type checking in areas where it
was not possible before, C++ also got a similar upgrade with the addition of C++/CLI which is slated
to replace the use of Managed C++. Other new features of Visual Studio 2010 include the
“Development Designer” which allows application designs to be validated before deployments, an
improved environment for web publishing when combined with ASP.NET 2.0 and load testing to see
application performance under various sorts of user loads. Visual Studio 2010 also added extensive
64- bit support. While the development environment itself only available as a 32- bit application,
visual C++ 2010 supports compiling for (x64AMD64 and EM64T) as well as IA- 64 (Itanium). The
platforms SDK include 64- bit and 64-bit versions of the libraries.
NET FRAMEWORK SDK
The .NET framework is an integral windows component that supports building and
running the next generation of applications and XML web services. The key component of the .NET
frame work are the common language run time and the . NET frame work class library, which
includes ADO.NET, ASP.NET and windows forms. The .NET framework provides a managed
execution environment simplified development and deployment and integration with a wide variety
of programming languages.
This framework is made up of the following parts:
 The common language runtime(CLR)

 The base class libraries.

 Object oriented internet development with ASP.NET

 Rich client user interface using windows forms

 RAD for the internet using web forms


OVERVIEW OF THE .NET FRAME WORK

The .NET framework is a new computing platform that simplifies application


development in the highly distributed environment of the internet. The .NET framework is designed
to fulfill following objectives:
 To provide a consistent object oriented programming environment whether object
code is stored and executed locally but internet- distributed or executed remotely.

 To provide a code execution environment that minimizes software deployment and


versioning conflicts.

 To provide a code execution environment that guarantees safe execution of code,


including code created by an unknown or semi trusted third party.

 To provide a code execution environment that eliminates the performance problem of


scripted or interpreted environments.

 To make the developer experience consistent across widely types of application, such
as windows based applications and web based applications.

 To build all communication on industry standards to ensure that code based on


the .NET framework can integrate with any other code.

The .NET framework has two main components: the common language runtime and
the .Net framework class library. The common language runtime is the foundation of the .NET
framework. You can think of the runtime as an agent that manages code at execution time and
remoting while also enforcing strict type safely and other forms of code accuracy that ensure security
and robustness in fact the concept of code management is a fundamental principle of the runtime.
Code that targets the runtime is known as managed code, while code that does not target
the runtime is known as un managed code. The class library, the other main component of the .NET
frameworks is a comprehensive, object-oriented collection reusable types that you can use to develop
applications ranging from traditional command line or graphical user interface (FGUI) applications to
application base d on the latest innovations provided by ASP.NET, such as web forms and XML web
services.
The .NET framework can be hosted by unmanaged component that load the common
language runtime into their processes and initiate the execution of managed code. ASP.NET works
directly with the runtime to enable ASP.NET application and XML web services, both of which are
discussed later in this topic, Internet explorer is an example of unmanaged application that hosts the
runtime (in the form of a MIME type extension). Using internet explorer to the host runtime enables
you to embed managed components or windows forms controls in HTML documents. Hosting the
runtime in this way makes mobile code 9similar to Microsoft Active X controls) possible, but with
significant improvement that only managed code can offer, such as semi-trusted execution and secure
isolated file storage.
The following illustration shows the relationship of the common language runtime and the
class library to your application and to the overall system. The illustration also shows how managed
code operated with in a larger architecture.
We can use the .NET framework to develop the following types of application and services:
 Console applications
 Window GUI application (Windows Forms) ASP.NET applications
 XML Web services
 Windows services

COMMON LANGUAGE RUNTIME (CLR)


The common language runtime (CLR) is responsible for runt-time services such as language
integration; security enforcement; and memory, process and thread management. In addition, it has a
roll at development time when features such as life cycle management strong type naming, cross-
language exception handling, dynamic binding and so on, reduce the amount of code that a developer
must write to turn the business logic the reusable component. The runtime can be hosted by high
performance, server-side applications, such a s Microsoft Internet Information Services (IIS) for
building web applications with ASP.NE and the next release of Microsoft SQL Server. This
infrastructure enables you to use code “managed “ by the .NET framework to write your business
logic, while still enjoying the superior performance of the industry’s best enterprises servers that
support runtime hosting.
ASP.NET
ASP.NET is a set of Microsoft.NET framework technologies used for building web
applications and XML Web services. ASP.NET page execute on the server and generate markup
such as HTML, WML or XML that is sent to a desktop or mobile browser. ASP.NET pages use a
compiled, event-driven programming model that improves performance and enables the separation of
application logic and user interface. Both ASP.NET pages and ASP.NET web services files contain
server-side (as opposed to client side logic) written in Visual basic .NET, C#.NET or any .NET
compatible language, Web applications and XML Web Services take advantage of the features of the
common language runtime, such as type safety, inheritance, language, interoperability, versioning,
and integrated security.
IIS
Microsoft Internet Information S4ervices (IIS; formerly called Server is a set of Internet-
based services for servers using Microsoft Windows. It is the world’s second most popular web
server in terms of overall websites. As of September 2007 it served 34.94% of all websites and
36.63% of all active websites according to Net craft. The servers currently include FTP, SMTP,
NNTOP, and HTTP/HTTPS.
ADO.NET
ADO.NET provides consistent access to data sources such a Microsoft SQL Server and XML,
as well as to data sources exposed through OLE DB and ODBC. Data sharing consumer applications
can use ADO.NET to connect to these data sources and retrieve, manipulate and update the data that
they contain.
ADO.NET separates data access from data manipulation into discrete components that can be
used separately or in tandem. ADO.NET includes .NET Frame work data providers for connecting to
a database, executing commands and retrieving results. Those results are either processed directly,
placed in and ADO.NET Dataset objects in order to be exposed to the used in an ad hoc manner,
combined with data from multiple sources or remote between tiers. The ADO.NET Dataset object
can also be used independently of a .NET Framework data provider to manage data local to the
application or sourced from XML.
The ADO.NET classes are found in System.Data.dll and are integrated with the XML classes
found in System.Xml.dll. When compiling code that uses the System. Data, namespace reference
both System.Data.dll and System.Xml.dll.
ADO.NET provided functionality to developers writing managed code similar to the
functionality provided to native component object model (COM) developers by ActiveX Data
Objects (ADO).
ADO.NET COMPONENTS
There are two components of ADO.NET that you can use to access and manipulate data:
 .NET Framework data providers.
 The DataSet

NET FRAMEWORK DATA PROVIDERS


The .NET Framework Data providers are components that have been explicitly designed for
data manipulation and fast, forward-only, read-only access to data. The connection object provides
connectivity to a data source. The command object enables access to database commands to return
data, modify data, run stored procedures and send or retrieve parameter information. The Data
Adapter provides a high-performance stream of data from the data source. Finally, the Data Adapter
provides the bridge between the Data Set object and the data source. The Data Adapter uses
command object to execute SQL commands at the data source to both load the Data Set with data and
reconcile changes made to the data in the Data Set back to the data source.
THE DATASET
The ADO.NET Data Set is explicitly designed for data access independent of any data source.
As a result, it can be used with multiple and differing data sources used with XML data or used to
manage data local to the application. The Data Set contains a collection n of one or more Data Table
objects made up to rows and columns of data as well as primary key, foreign key, constraint and
relation information about the data in the Data Table objects.
BENEFITS OF ADO.NET
ADO.NET offers several advantages over previous versions of ADO and over other data
access components. These benefits fall into the following categories:
1. Interoperability
2. Maintainability
3. Programmability
4. Salability

BACK END
MS SQL SERVER

DATABASE

Database is an organized list of data (information) that can be queried to find information
quickly and easily based chosen reference point. Such a last name of security number. In database
terminology, the columns are called fields and the rows are called records. The kind of organization
in a database is called a table.

SQL SERVER

.SQL Server is a RDBMS that you can store and manipulate large amount of information. A
relational database is a database, which consists of tables of that related information that are linked
together on key fields.
The tools of SQL Server are user friendly and provide a powerful development environment,
making it equally appropriate for novices and MIS professionals. For example we can access quickly
and easily create a database of mailing list information that we can merge with other document.
SQL Server commands are related to Oracle, So that the oracle users can easily operate the SQL
Server, One of the main advantage is it can easily execute set of queries at a time..

MAIN ELEMENTS OF SQL SERVER

SQL Server is an Object Oriented program. Objects are modules, which is used to provide
information and programs, which any of user can directly apply to create application. Each Object has
properties that defines how the looks and perform. It has the following Objects.
 Tables
 Queries
 Forms & Reports
 Modules
TABLES

Tables are primary building blocks of SQL SERVER database. All data is stored in tables. Every
table in the database focus on one subject. We can combine specific fields from multiple tables into
one data sheet. The datasheet that a query written is called a record set.
QUERIES

Queries are used to perform some operation for retrieve the data from the table and to store

the data to the table.

FORMS

Forms are used to access and maintain the database.

RELATIONSHIPS

Relationship is mainly used to join the two databases. Join is an object, which has three forms

that are (inner join, simple join, and outer join)

Fundamental Design Concepts


A set of fundamental design concepts are evolved over the past three decades, although the

degree of interest in each concept has varied over the years, each has stood the test of time. Each one

provides the software designer with a foundation from which more sophisticated design methods can

be applied. Fundamental design concepts provide the necessary framework for “getting it right”.

Abstraction
Abstraction permits one to concentrate on a problem at some level of generalization without regard
to irrelevant low level details, use of abstraction also permits one to work with concepts and terms
that are familiar in the problem environment without having to transform them to an unfamiliar
structure. Two types of abstraction are there, one is procedural abstraction and data abstraction. A
procedural abstraction is a named sequence of instructions that has a specific and limited function. A
data abstraction is a named collection of data that describes a data object.
Modularity
Modularity is the single attribute software that allows a program to be intellectually manageable.
Software architecture embodies modularity, that is, software is divided into named and addressable
components, called modules that are integrated to satisfy problem requirements.
Software Architecture
Software Architecture alludes to “the overall structure of the software and the ways in which that
structure provides conceptual integrity for a system”. Control hierarchy also called program
structure”, represents the organization of control. The tree structure used to represent the control
hierarchy.
Structural Partitioning
The program structure should be partitioned both horizontally and vertically. Horizontal
partitioning defines separate branches of the modular hierarchy for each major program function,
Vertical partitioning called factoring, suggest that control and work should be distributes top-down in
the program architecture. Top level modules should perform control functions and do actual
processing work. Modules reside low in the architecture should be the workers, performing all input,
computational and output tasks.
Data Structure

Data Structure is a representation of logical relationship among individual elements of data.


Because the structure of information will invariably affects the final procedural design, data structure
is very important as the program structure to the representation of the software architecture. Data
structure dictates the organization, methods of access, degree of associatively, and processing
alternatives for information. The organization and complexity of a data structure are limited only by
the ingenuity of the designer. Scalar item array and linked list are some of the representations of the
data structure.
Software Procedure
Program structure defines control hierarchy without regard to the sequence of processing and
decisions. Software procedure focuses on the processing details of each module individually.
Procedure must provide a precise specification of processing, including sequence of events, exact,
decision points, repetitive operations and even data organization /structure. Information hiding
suggests that modules be “characterized by design decisions that hide from all others.” In other
words, modules should be specified and designed so that information contained within module is
inaccessible to other module.
4. SYSTEM DESIGN
4.1 INPUT DESIGN
In the input design, user-oriented inputs are converted into a computer based system format. It
also includes determining the record media, method of input, speed of capture and entry on to the
screen. Online data entry accepts commands and data through a keyboard. The major approach to
input design is the menu and the prompt design. In each alternative, the user’s options are predefined.
The data flow diagram indicates logical data flow, data stores, source and destination. Input data are
collected and organized into a group of similar data. Once identified input media are selected for
processing.
In this software, importance is given to develop Graphical User Interface (GUI), which is an
important factor in developing efficient and user-friendly software. For inputting user data, attractive
forms are designed. User can also select desired options from the menu, which provides all possible
facilities.
Also, the important input format is designed in such a way that accidental errors are avoided.
The user has to input only just the minimum data required, which also helps in avoiding the errors
that the users may make. Accurate designing of the input format is very important in developing
efficient software. The goal or input design is to make entry as easy, logical and free from errors.
 Admin enter his user id and password for login.

 User enters his user id and password for login.

 User Create new folder for personnel usage.

 Admin enter user id or date for track the user login information

 New user gives his completed personnel, address and phone details for registration.

 Admin gives different kind of user information for search the user data.

 User gives his user id, hint question, answer for getting the forgotten password.

 Administrator giving information to generate various kind of reports.


4.2 OUTPUT DESIGN
In the output design, the emphasis is on producing a hard copy of the information requested or
displaying the output on the CRT screen in a predetermined format. Two of the most output media
today are printers and the screen. Most users now access their reports from a hard copy or screen
display. Computer’s output is the most important and direct source of information to the user,
efficient, logical, output design should improve the systems relations with the user and help in
decision-making.
As the outputs are the most important source of information to the user, better design should
improve the system’s relation and should help in decision-making. The output device’s capability,
print capability, print capability, response time requirements etc should also be considered form
design elaborates the way output is presented and layout available for capturing information. It is
very helpful to produce the clear, accurate and speedy information for end users.
 Admin can have his own home page.

 Users enter their own home page.

 The user defined folders can store in the centralized database.

 Admin will get the login information of a particular user.

 The new user’s data will be stored in the centralized database.

 Admin get the search details of different criteria.

 User can get his forgot password.

 Different kind of reports is generated by administrator.


E-R Diagrams

 The relation upon the system is structure through a conceptual ER-Diagram, which not only
specifics the existential entities but also the standard relations through which the system exists and the
cardinalities that are necessary for the system state to continue.

 The entity Relationship Diagram (ERD) depicts the relationship between the data objects. The ERD is the
notation that is used to conduct the date modeling activity the attributes of each data object noted is the
ERD can be described resign a data object descriptions.

 The set of primary components that are identified by the ERD are

 Data object
 Relationships
 Attributes
 Various types of indicators.
The primary purpose of the ERD is to represent data objects and their relationships.
4.3 DATABASE DESIGN
Database design is the process of producing a detailed data model of a database. logical data
model contains all the needed logical and physical design choices and physical storage parameters
needed a design in a Definition Language, Which can then be used to create a database. A fully
attributed data model contains detailed attributes for each entity.

4.4 DATA FLOW DIAGRAM


A Data Flow Diagram (DFD) is a diagram that describes the flow of data and the processes
that change data throughout a system. It’s a structured analysis and design tool that can be used for
flowcharting in place of or in association with information. Oriented and process oriented system
flowcharts. When analysts prepare the Data Flow Diagram, they specify the user needs at a level of
detail that virtually determines the information flow into and out of the system and the required data
resources. This network is constructed by using a set of symbols that do not imply physical
implementations. The Data Flow Diagram reviews the current physical system, prepares input and
output specification, specifies the implementation plan etc.
Four basic symbols are used to construct data flow diagrams. They are symbols that represent
data source, data flows, and data transformations and data storage. The points at which data are
transformed are represented by enclosed figures, usually circles, which are called nodes.
DATA FLOW DIAGRAM SYMBOLS:-

- Source or Destination of data

- Data Flow

- Process

- Storage

DFD Diagrams:
Context 0th Level Diagram:

Login DFD Diagram:


Admin Details Data Flow:
1st level DFD:
2nd Level DFD
Faculty Details Data Flow
1st level DFD

2nd Level DFD for Course lectures


2nd level DFD
Student Details Data Flow
1st level DFD
2nd Level DFD
DATA DICTIONARY

After carefully understanding the requirements of the client the entire data storage
requirements are divided into tables. The below tables are normalized to avoid any anomalies during
the course of data entry.
Tables Design:
UML DIAGRAMS
Use Case Diagrams :
Over View Use Case Diagram :
Admin Use Diagram:

Faculty Use Case Diagram:


Activity Diagrams:
Registration Diagram:
Login Activity Diagram:
Admin Activity Diagram:
Faculty Activity Diagram:
Student Activity Diagram:
Admin Login Sequence Diagram
A Lo BL:C DAL: Da
d 1 : gin ls_L SqlH ta
mAdmi Pa 2 : ogin elper ba
inn ge Valid () 3 : () se
Login ateUs Execut 4 :
er() eNonQ Execut
uery()
5: eComa
6: Return nd()
Response QueryR
ForValida esult()
teUser()

Sequence Diagram For Faculty Acceptance


Fa frmR BL:cl DAL:cl Da
cu1 : egist s_St s_Sql tab
ltyGet ratio
2: uden Helpe as
e
Registn insertFat 3 : r
raion cultyDa Execute 4 :
ta () NonQue Execute
ry 6(): Comma
Resp nd()
7: onse
Response ()
for
InsertFacult
yData()
Sequence Diagram for Student Login
St Lo BL:cl DAL: Da
ud 1 : gin s_St SqlH ta
en StudePa 2 : uden elpe ba
t nt ge GetUser
ts 3 : r se
Login LoginCh Execute 4 :
eck() Comma
5: Execut
nd()
Resp eComm
6: and()
Show onse
Resul ()
t()

Adding new course by admin


A frm BL(C DL( Da
d Add ls_c SqlH ta
m1: Cour2 : ours elpe ba
in Add se AddC e) 3 : r) se
Cour
ours Execute4 :
se Execut
e() NonQu
5:
ery () eNonQ
6: Resp uery()
Show onse
Resul ()
t()
Student Course registration
St Cours B D Da
ud 1 : eRegi L A ta
en Course
stratio
2: L ba
t Registn InsertCours 3: se
er eAndStudeExecute4 :
ntData ()NonqueExecut
5 : eNonq
ry ()
Respuery()
6:
onse
Show
()
Resul
t()

DataA
4: cessLa 6:
ExecuteC yer Returns
ommand( value()
Dat 5:
) 3 : Busine
aba Command
ExecuteC ss
se Response(
ommand Object
) 7:
Respons
Ad 2:
1: eData()
mi Validat
n GetAdmi eUser()
Logi
nHome()
nPa
ge
5 : Response()
Database DataLogic
6 : Response()

4 : ExecuteCommand()

3 : ExecuteNonQuery()

BusinessLogic
2 : : insertFacultyData ()

1 : GetRegistraion() 7 : Response()
Faculty
Registration

Database

4 : ExecuteCommand()

DataLogic

3 : GetUserLoginCheck()

BusinessLogic

2 : ValidateData()

LoginPage

1 : MakeRequest()

5 : Response()

Student
Database DL(SqlHelper)
4 : ExecuteNonQuery()

3 : AddCourse()

BL(Cls_course)
5 : Response()
2 : ValidateData()

1 : lnkAddCourse() frmAddCourse
Admin

DAL
Database 4 : ExecuteNonquery()

3 : InsertCourseAndStudentData()

BL

2 : RegisterCourse()

1 : GetAllCourses() CourseRegistration
5 : Response() Student
SYSTEM SPECIFICATION
5.1 MODULES

In the flexibility of the uses the interface has been developed a graphics concept in mind,
associated through a browser interface. The GUI’S at the top level have been categorized as
 Administrative user interface
 The operational or generic user interface
The administrative user interface concentrates on the consistent information that is practically,
part of the organizational activities and which needs proper authentication for the data collection. The
interfaces help the administrations with all the transactional states like Data insertion, Data deletion
and Data updating along with the extensive data search capabilities.
The operational or generic user interface helps the users upon the system in transactions
through the existing data and required services. The operational user interface also helps the ordinary
users in managing their own information helps the ordinary users in managing their own information
in a customized manner as per the assisted flexibilities
NUMBER OF MODULES
The system after careful analysis has been identified to be presented with the following
modules:
Administrators /Managers
Faculties
Students
Web Registration
Virtual Training
Exam Conducting
Search
Reports
Authentication
WEB REGISTRATION
The system has a process of registration. Every student need to submit his complete
details in the form of registration. Whenever a student registration completed automatically student
can get a user id and password. By using that user id and password student can log into the system.
If registration process is completed successfully an email remainder is generated and sends to the
citizen.
ADMINISTRATORS
Administrator is treated as a super user in this system. He can have all the privileges
to do anything in this system. Admin can prepare course curriculum, along with course content by
the help of the faculties. He can collect the course videos and stored into in the centralized database.
Another tasks done by the administrator is he can generates reports, log files, backup,
and recovery of data any time.
FACULTY
Faculties can take lectures, uploads assignments, announcements, evaluate answer
sheets and also upload lectures, and other discussions in various formats as in the form of videos and
power point presentations.
STUDENTS
Students can choose courses, attend lectures, take exams, and view their attendance
records, progress reports as per their convenience through this system only.
One student can register multiple courses. Take their classes on the schedule time or
later their convenience. By using the system interface student learn the courses properly and attend
the exams as an online mode. Results will be announced through online only.
VIRTUAL TRAINING
Asynchronous communication in the form of emails, discussion boards that enable
communication to occur at “convenient-times” that suit student schedules and are not accessed at
simultaneous or prearranged times.
EXAM CONDUCTING
When ever a student is completed his course, an exam should be conducted, students
need to attend the exam properly. It’s an online exam. The results will be announced later after the
papers are evaluated by the faculties.
REPORTS
Different kind of reports is generated by the system.
 Student Progress report Request.
 Faculty performance report.
 Time based and request attendance reports for the students.

AUTHENTICATION
Authentication is the process the where it provides security for application.The system
checks credentials whether the user is valid or not. If the user is valid system allows for authorization.
Otherwise system will throw back and gives message.
6. SYSTEM IMPLEMENTATION

Implementation is the stage of the project when the theoretical design is turned into a working
system. Implementation means converting a new or revised system design into an operational
condition. In this project Bug Tracking maintains NPR Arts and Science College, Dindigul,
implementation includes all these activities that the place to convert the new system.
The purpose of test plan is preparing it helps us to think through the efforts needed to validate
the acceptability of a software product. It will help people outside the test group to understand the
why and how of product validation and regulated environments, we have to have a written test plan.
The general testing process includes the creation of a test plan .We want a document that describes
the objectives, scope, approach and focus of the software testing effort. It includes test cases,
conditions, the test environment, a list of related tasks, pass/fail criteria, and risk assessment. One of
the outputs for creating a test strategy is an approved and signed off test plan document. The software
testing methodology a three step process and one of the steps is the creation of a test plan. We want
an opportunity to review the test plan with the project team. Test plans should be documented, so that
they are repeatable.
The purpose of training is to ensure that all the personal who are associate with the system
should possess the basic knowledge and skills. The end user must know in detail what their rules will
be how they can use the system and what the system will or will not do before the initialization of the
training the programmer materials are prepared for the users with description. The users are instructed
first, how to operate the system. User training also instructs individuals in trouble shooting system
determining whether problem arise due to any system failure or software failure or something that
they had one in using the system. The system will be implemented as soon as possible.

48
7. SYSTEM TESTING

Software testing is an important element of software quality assurance and represents the
ultimate review of specification, design and coding. It increasing visibility of software as a system
element and the costs associates with a software failure are motivating forces for all well planned
through testing .The system is tested with giving wrong information. Cascade deletion and, the
software developer checks updating. Testing and debugging are different activities, but debugging
must be accommodated in any testing strategy.

TYPES OF TESTING

UNIT TESTING
Unit testing is the important and major part of the project. So errors can be rectified easily in
each module and program clarity can be increased. In this project, the entire system is divided into
several modules and is developed individually. Hence, unit testing is conducted to individual
modules.

INTEGRATION TESTING
Integration testing is the systematic technique for constructing the program structure while
conducting tests to uncover errors associated with integrating. After the unit test, each module is
gradually integrated to form one final system. All the modules when unit tested will work properly
but after integrating the data can cause error one module can have an inadvertent, adverse effect on
another; sub functions when combined may not produce the desired major function; global data
structures can cause problems, etc. In this project the integration testing is performed by combing
login, civil registration and status modules are generated the report.

49
PERFORMANCE TESTING
A type of Physical test covering a wide range of engineering or functional evaluations where a
material, product, or system is not specified by detailed material or component specifications: rather,
emphasis is on the final measurable performance characteristics. Testing can be a qualitative or
quantitative procedure.

ACCEPTANCE TESTING

The User Acceptance testing focuses mainly on the functionality thereby validating the
fitness-for-use of the system by the business user. The users and application managers perform the
user acceptance test.

Test Results
All the test cases mentioned above passed successfully. No defects encountered.

50
8. CONCLUSION

It has been a great pleasure for me to work on this exciting and challenging project. This
project proved good for me as it provided practical knowledge of not only programming in ASP.NET
and C#.NET web based application and no some extent Windows Application and SQL Server, but
also about all handling procedure related with “Virtual Class Room”. It also provides knowledge
about the latest technology used in developing web enabled application and client server technology
that will be great demand in future. This will provide better opportunities and guidance in future in
developing projects independently.

BENEFITS:

The project is identified by the merits of the system offered to the user. The merits of this
project are as follows: -

 It’s a web-enabled project.


 This project offers user to enter the data through simple and interactive forms. This is very helpful
for the client to enter the desired information through so much simplicity.
 The user is mainly more concerned about the validity of the data, whatever he is entering. There
are checks on every stages of any new creation, data entry or updation so that the user cannot
enter the invalid data, which can create problems at later date.
 Sometimes the user finds in the later stages of using project that he needs to update some of the
information that he entered earlier. There are options for him by which he can update the records.
Moreover there is restriction for his that he cannot change the primary data field. This keeps the
validity of the data to longer extent.
 User is provided the option of monitoring the records he entered earlier. He can see the desired
records with the variety of options provided by him.
 From every part of the project the user is provided with the links through framing so that he can
go from one option of the project to other as per the requirement. This is bound to be simple and
very friendly as per the user is concerned. That is, we can sat that the project is user friendly
which is one of the primary concerns of any good project.

51
 Data storage and retrieval will become faster and easier to maintain because data is stored in a
systematic manner and in a single database.
 Decision making process would be greatly enhanced because of faster processing of information
since data collection from information available on computer takes much less time then manual
system.
 Allocating of sample results becomes much faster because at a time the user can see the records of
last years.
 Easier and faster data transfer through latest technology associated with the computer and
communication.
 Through these features it will increase the efficiency, accuracy and transparency,

LIMITATIONS:

 The size of the database increases day-by-day, increasing the load on the database back up and
data maintenance activity.
 Training for simple computer operations is necessary for the users working on the system.
 Data storage and retrieval will become faster and easier to maintain because data is stored in a
systematic manner and in a single database.
 Decision making process would be greatly enhanced because of faster processing of information
since data collection from information available on computer takes much less time then manual
system.
 Allocating of sample results becomes much faster because at a time the user can see the records of
last years.
 Easier and faster data transfer through latest technology associated with the computer and
communication.
 Through these features it will increase the efficiency, accuracy and transparency,

52
9. FUTURE ENHANCEMENT

 This System being web-based and an undertaking of Cyber Security Division, needs to be
thoroughly tested to find out any security gaps.

 A console for the data center may be made available to allow the personnel to monitor on the
sites, which were cleared for hosting during a particular period.

 Moreover, it is just a beginning; further, the system may be utilized in various other types of
auditing operation viz. Network auditing or similar process/workflow based applications.

53
10.BIBILIOGRAPHY

Reference Books

 Eilas awared “SYSTEM ANALYSIS DESIGN” and Tata Mcgraw hill publication sixth
edition, 2003

 S. Ramachandran ”COMPUTER AIDED DESIGN” Airwalk publications, third edition,


2003

 Richard Fairley ”SOFTWARE ENGINEERING ” concepts, Tata Mcgraw hill publication,


second, 1997

 DISTRIBUTED.NET PROGRAMMING IN C#.NET by Torm Barnaby

 PROFESSIONAL C#.NET, second edition by Fred Barwell et all

 THE .NET LANGUAES: A QUICK TRANSLATION guide by Brian Bischof

Reference Websites

 www.asp.net

 www.microsoft.com

 www.codeproject.com

 www.c-sharpcorner.com

 www.programmersheaven.com

 www.w3schools.com

54
11. APPENDIX
SCREENSHOTS

55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
SAMPLE CODE

using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;
using System.Data.SqlClient;

public partial class frmAllCoursesVideoDemos : System.Web.UI.Page


{
static int id;
DataSet ds;
protected void Page_Load(object sender, EventArgs e)
{
try
{

}
catch (Exception ex)
{

}
}

protected void GridShowDetails_RowCommand(object sender, GridViewCommandEventArgs e)


{
try
{
id = Convert.ToInt32(e.CommandArgument);

if (e.CommandName == "video")
{

70
datalistvideo.DataSource =
Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
datalistvideo.DataBind();
}
else if (e.CommandName == "Audio")
{
datalistvideo.DataSource =
Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
datalistvideo.DataBind();
}
else if (e.CommandName == "Assignment")
{
ds = Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
if (ds.Tables[0].Rows.Count != 0)
{

byte[] FileContent = (byte[])ds.Tables[0].Rows[0][14];


string FileName = (string)ds.Tables[0].Rows[0][13];
string[] fileSplit = FileName.Split('.');
int Loc = fileSplit.Length;
string FileExtention = "." + fileSplit[Loc - 1].ToUpper();

int i = 0;
if (FileExtention == ".DOC" || FileExtention == ".DOCX")
{
Response.ContentType = "application/vnd.ms-word";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
if (i == 1)
{
Response.Charset = "";
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.BinaryWrite(FileContent);
Response.End();
}
else
lblMsg.Text = "Problom in downloading the file..";

}
}
else if (e.CommandName == "Document")
{
ds = Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
if (ds.Tables[0].Rows.Count != 0)
71
{

byte[] FileContent = (byte[])ds.Tables[0].Rows[0][12];


string FileName = (string)ds.Tables[0].Rows[0][11];
string[] fileSplit = FileName.Split('.');
int Loc = fileSplit.Length;
string FileExtention = "." + fileSplit[Loc - 1].ToUpper();

int i = 0;
if (FileExtention == ".DOC" || FileExtention == ".DOCX")
{
Response.ContentType = "application/vnd.ms-word";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
if (i == 1)
{
Response.Charset = "";
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.BinaryWrite(FileContent);
Response.End();
}
else
lblMsg.Text = "Problom in downloading the file..";
}

}
else if (e.CommandName == "PowerPoint")
{
ds = Cls_NewsLetterMaster.showLectureMasterDetailsDownloading(id);
if (ds.Tables[0].Rows.Count != 0)
{

byte[] FileContent = (byte[])ds.Tables[0].Rows[0][10];


string FileName = (string)ds.Tables[0].Rows[0][9];
string[] fileSplit = FileName.Split('.');
int Loc = fileSplit.Length;
string FileExtention = "." + fileSplit[Loc - 1].ToUpper();

int i = 0;

if (FileExtention == ".PPT")
{
Response.ContentType = "application/mspowerpoint";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
72
i = 1;
}
if (i == 1)
{
Response.Charset = "";
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.BinaryWrite(FileContent);
Response.End();
}
else
lblMsg.Text = "Problom in downloading the file..";
}
}

catch (Exception ex)


{

lblMsg.Text = ex.Message;
}
}

}
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;

public partial class frmCoursesAvailable : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
if (!IsPostBack)
{

73
}
}
protected void grdCourseDetails_RowCommand(object sender,
GridViewCommandEventArgs e)
{
try
{
int CourseId = Convert.ToInt32(e.CommandArgument);
clsCourses objCour=new clsCourses ();
DataSet ds = objCour.GetCoursesDetailsByCourseId(CourseId);
byte[] FileContent = (byte[])ds.Tables[0].Rows[0][5];
string FileName = (string)ds.Tables[0].Rows[0][4];
string[] fileSplit = FileName.Split('.');
int Loc = fileSplit.Length;
string FileExtention = "." + fileSplit[Loc - 1].ToUpper();

int i = 0;
if (FileExtention == ".DOC" || FileExtention == ".DOCX")
{
Response.ContentType = "application/vnd.ms-word";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
else if (FileExtention == ".XL" || FileExtention == ".XLS" || FileExtention ==
".XLSX")
{
Response.ContentType = "application/vnd.ms-excel";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
else if (FileExtention == ".PDF")
{
Response.ContentType = "application/pdf";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
else if (FileExtention == ".TXT")
{
Response.ContentType = "application/octet-stream";
Response.AddHeader("content-disposition", "inline;filename=" + FileName);
i = 1;
}
if (i == 1)
{
Response.Charset = "";
74
Response.Cache.SetCacheability(HttpCacheability.NoCache);
Response.BinaryWrite(FileContent);
Response.End();
}
else
lblMsg.Text = "Problom in downloading the file..";
}
catch (Exception ex)
{
lblMsg.Text = "Problom in downloading the file.." + ex.Message;
}
}
}
using System;
using System.Collections;
using System.Configuration;
using System.Data;
using System.Linq;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.HtmlControls;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Xml.Linq;

public partial class frmStudentRegistration : System.Web.UI.Page


{
protected void Page_Load(object sender, EventArgs e)
{
lblMsg.Text = "";
}
static int Studid;
protected void btnSubmit_Click(object sender, EventArgs e)
{
try
{
clsStudents objStd = new clsStudents();
objStd.FName = txtFname .Text;
objStd.MName = txtMName .Text;
objStd.LName = txtLname .Text;
objStd.DOB = txtDOB .Text;
objStd.Address = txtAddress.Text;
objStd.EmailId = txtEmailid.Text;
objStd.PhoneNo = txtPhoneNo.Text;
75
objStd.ImageFile = Convert.ToString(Session["FileName"]);
objStd.ImageContent = (byte[])Session["Photo"];
objStd.UserName = txtUserName.Text;
objStd.Pwd = txtPassword.Text;
objStd.CourseId = Convert.ToInt32(ddlCourseId.SelectedValue);
string strMsg;

int i=objStd.InsertStudentDetails(out strMsg,out Studid);


if (i > 1)
{
ClearData();
lblMsg.Text = strMsg;
BrowseImage1.LoadDefaultImage();
btnSubmit.Enabled = false;
btnFees.Enabled = true;
}
else
lblMsg.Text = strMsg;
}
catch (Exception ex)
{
lblMsg.Text = ex.Message;
}
}

void ClearData()
{
try
{
txtAddress.Text = "";
txtDOB .Text = "";
txtEmailid.Text = "";
txtFname .Text = "";
txtMName.Text = "";
txtLname .Text = "";
txtLname .Text = "";
txtPassword.Text = "";
txtPhoneNo.Text = "";
txtUserName.Text = "";
BrowseImage1.LoadDefaultImage();
if (ddlCourseId.SelectedIndex != 0)
ddlCourseId.SelectedIndex = 0;
}
catch (Exception ex)
{
76
lblMsg.Text = ex.Message;
}
}

protected void btnClearAll_Click(object sender, EventArgs e)


{
ClearData();
}

protected void ddlCourseId_DataBound(object sender, EventArgs e)


{
if (!IsPostBack)
{
ddlCourseId.Items.Insert(0, "--Select One--");
}
}
protected void btnFees_Click(object sender, EventArgs e)
{
try
{
btnSubmit.Enabled = true;
Response.Redirect("frmStudentCoursefees.aspx?id=" + Studid);

}
catch (Exception ex)
{

lblMsg.Text = ex.Message;
}
}
}
using System;
using System.Collections;
using System.ComponentModel;
using System.Data;
using System.Drawing;
using System.Web;
using System.Web.SessionState;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.HtmlControls;

namespace SuperJockey
{
/// <summary>
77
/// Summary description for TheChatScreenWin.
/// </summary>
public partial class TheChatScreenWin : System.Web.UI.Page
{
protected void Page_Load(object sender, System.EventArgs e)
{
string sDealer="1";

Response.Write( "<meta http-equiv=\"Refresh\"content=\"4\">" );


Response.Write(Chat.GetAllMessages(sDealer));
}
#region Web Form Designer generated code

override protected void OnInit(EventArgs e)


{
//
// CODEGEN: This call is required by the ASP.NET Web Form
Designer.
//
InitializeComponent();
base.OnInit(e);
}

/// <summary>
/// Required method for Designer support - do not modify
/// the contents of this method with the code editor.
/// </summary>
private void InitializeComponent()
{

}
#endregion
}
}

78

You might also like