You are on page 1of 94

CONTENTS

Abstract
1. Introduction
1.1 Existing System
1.2 Proposed System
1.3 Hardware and Software Requirements
1.4 Feasibility Study
2. Requirements Specification Document
2.1 Introduction
2.2 Functional Requirements
2.3 Non-Functional Requirements
3. Architecture & Technologies
3.1 Introduction
3.2 Project Plan
3.3 System Analysis
3.4 Client / Presentation tier
3.5 Technologies
3.6 Modules:
3.6.1 Adminstrator Module
3.6.2 User Module
3.6.3 Test Module
4. Design
4.1 DataBase Design Phase
4.2 Coding Phase
4.3 ScreenShots Phase

5. Testing
6. Conclusion
7. Bibliography

1
ABSTRACT

Web application intends to provide a well-established web-based Social


Network system between a job seeker and a recruiter. This documents a
networking system scope, functionalities, requirements and feasibility. This
project aims to develop a website which provides a Communication among
peoples on network, which works quite similar to Social Media Site. This
website also provides the features of writing and posting a post or any
event all at one place. The main idea behind it is to share the job related
details posted by placement officer via adding a post which can be read by
all the student as well as faculty using the website. This web application can
be handled by the admin and manage student as well as faculty.

The following points are implemented in proposed system:

– Students can register and login into the system once their registration is

approved by the admin.


– Once the student logged in into the system, he/she can write and post an

articles on various topic of his/her choice. Also he/she chat with the other
students.
– Students can also upload images with their post.

– All students can view News Feed posted by individual student.

– All the student registration will be approved/rejected by the admin as well

as, all the post will be kept pending until admin approves/rejects each and
every post.
– Admin Login has full authority on system, he/she can add/delete Faculty.
2
– Placement officer can create a list of students by specifying the

department and criteria. List will include Basic Details, Marks and Backlogs.
– Officer can add post and it will be sent for approval to admin.
– Staff can view student profiles and also can post event who’s details will be

sent via SMS to students.

Advantages

 Builds a strong communication between the students and the


placement officer.
 Acts as a student Connectivity Platform
 Students and Placement Officer post are first sent to admin for
approval. It keeps the system stable by not posting any spam or
miscellaneous content on the web.
 Students can only see placement related post which is posted by
placement officer

Disadvantages

 May produce inaccurate results if the data is not feed properly.


 Requires an active internet connection.

3
INTRODUCTION

This project aims to develop a website which provides a Communication


among peoples on network, which works quite similar to Social Media Site.
This website also provides the features of writing and posting a post or any
event all at one place. The main idea behind it is to share the job related
details posted by placement officer via adding a post which can be read by
all the student as well as faculty using the website. This web application can
be handled by the admin and manage student as well as faculty. Student
once logged in appears online else appears offline. Students may also post
their status online and may check each other’s status message. There will
also be a separate section for up-to-date information about the things
happening in the College. This can also be used for placements related
information for the final year students.

4
1.1.INTRODUCTION TO THE PROJECT

We know about the increasing use of social networking sites, people use various social
media platforms depending on their requirements and interest. Social media is a dynamic
platform that can be used in so many ways to share news, knowledge, entertainment etc.

In this project a social media platform for college campus has been created where everyone
associated with the college campus such as students, staff members can socialize with each
other and share their knowledge about academics, projects, placements and all other
activities. going on in the campus.

It will promote teaching and learning through a more dynamic platform without causing any

threat to privacy. They'll be only allowed to view the details which are relevant to them from
academic or professional point of view. They'll be able to view the research conducted by
teachers, their department and subjects etc.

Students can register and login into the system once their registration is approved by the
admin. Once the student logged in into the system, he/she can write and post an articles on
various topic of his/her choice. Also he/she chat with the other students. Students can also
upload images with their post. All students can view News Feed posted by individual student.

All the student registration will he approved/rejected by the admin as well as, all the post
will be kept pending until admin approves/rejects each and every post.

1.1.1.SCOPE

The faculties can upload study materials through online. The students can view uploaded
study materials by faculties.
The faculties can send assignment request and the students can upload assignments.
In the question answer section, the students can post any queries to faculties and faculties
can post answers.
5
The administrator or faculty can publish time table and result.
Admin has full authority of the website to manage students, discussion forum, faculties, quiz
question answers, chat features, course, time table and result system.

The core function of campus social network system are to support online communication,
sharing and collaboration in learning, teaching and research activities of campus users.
Knowledge sharing and knowledge creation are closely related with and continuously
influenced by each other. Because college social network system provides direct support to
knowledge sharing and indirect support The core function of campus social network system
is to facilitate and encourage knowledge sharing and knowledge creation on campus.
Specifically, the core functions to knowledge creation.

Campus members such as students, faculty members are among the most active users of
Internet services, especially emerging services including social networking services. As this
social networking site is confined to the college campus activities, it will increase the
likelihood of usage by the faculty members. This is the major advantage of this project as it
will promote the students and faculty alike to strengthen their educational communications
and collaborations.

1.1.2.EXISTING SYSTEM

A social networking site restricted to college and the students enrolled


there, College Networking Site provides a platform via which students can
share information between them. No matter where students are located –
in what country or part of the world, with this application college students
can get connected for meaningful educational purposed. The existing
system has no online social connectivity among the students of Campus.
Also, They Are Unable to Express their Talents and There is no scope of
Improvement in their Hidden Talents. Also there is no proper Circulation
of news regarding the Events or Whatever
Programs Conducted in College. Even though Being in the Same College,
There is no Unity among Students. It’s Really not a Good Thing.

6
7
.

8
news regarding the Events or Whatever Programs Conducted in College.
Even though Being in the Same College, There is no Unity among Students.
It’s Really not a Good Thing.

In order to use the college networking site, students must be college


students and they must create an account. Account creation for others is
restricted. Students can send friend requests to each other, and after that
they can send messages. They can also find old friends of the college to
know about their academic experience, ask them to share materials or It
can also be used to share materials, notes, files among friends or In as a
group and stay connected. It also Acts like a Youth Connect Platform. And
also useful as a placement news platform. With the Help of this, we can also
Pass Notifications and Important Circulars. Each Member Should Have to
Register so that they can create an Id and password which helps in accessing
Their account

9
Hardware and Software Requirements :
Hardware and software specifications :

SOFTWARE REQUIREMENTS :

OPERATING SYSTEM : WINDOWS XP or Above

DATA BASE : MYSQL

PROGRAMMING LANGUAGE : PHP

SERVER : APACHE SERVER

HARDWARE REQUIREMENTS :

PROCESSOR : P-III or Above

RAM : 2.0 GB

HARD DISK : 250 GB

10
2.1 FEASIBILITY STUDY:

Feasibility study is an important phase in the software development


process. It enables the developer to have an assessment of the product
being developed It refers to the feasibility study of the product in terms of
outcomes of the product, operational use and technical support required
for implementing it.

Feasibility study should be performed on the basis of various criteria and


parameters. The various feasibility studies are:

 Economic Feasibility
 Operational Feasibility
 Technical Feasibility

Economic Feasibility:
It refers to the benefits or outcomes we are deriving from the product
compared to the total cost we are spending for developing the product. If
the benefits are more or less the same as the older system, then it is not
feasible to develop the product.
In the present system, the development of the new product greatly
enhances the accuracy of the system and cuts short the delay in the
processing of application.

The errors can be greatly reduced and at the same time providing a great
11
level of security. Here we don’t need any additional equipment except
memory of required capacity. No need for spending money on client for
maintenance because the database used is web enabled database.

Operational Feasibility:
It refers to the feasibility of the product to be operational. Some products
may work very well at design and implementation but may fail in the real
time environment. It includes the study of additional human resource
required and their technical expertise.

In the present system, all the operations can be performed easily


compared to existing system and supports for the backlog data. Hence
there is need for additional analysis. It was found that the additional
modules added are isolated modules as far as the operational is concerned,
so the Developed system is operationally feasible.

Technical Feasibility:
It refers to whether the software that is available in the market fully
supports the present application. It studies the pros and cons of using
particular software for the development and its feasibility. It also studies
the additional training needed to be given to the people to make the
application work. In the present system, the user interface is user friendly
and does not require much expertise and training. It just needs a mouse
click to do any sort of application.

12
In the present system, the user interface is user friendly and does not
require much expertise and training. It just needs a mouse click to do any
sort of application. The software that is used for developing is server pages
fully is highly suitable for the present application since the users require
fast access to the web pages and with a high degree of security. This is
achieved through integration of web server and database server in the
same environment.

Implementation plan:

The main plan for the system developed is to upgrading existing


system to the proposed system. There are mainly 4 methods of upgrading
the existing system to proposed system. They are

 Parallel Run System


 Direct Cut-Over System
 Pilot System
 Phase-in Method

Parallel Run System: It is the most secure method of converting from an


existing to new system. In this approach both the systems run in parallel
for a specific period of time. During that period if any serious problems
were identified while using the new system, the new system is dropped and
the older system is taken at the start point again.

13
Direct Cut - Over Method: In this approach a working version of the
system is implemented in one part of the organization such as single work
area or department. When the system is deemed complete it is installed
through out the organization either all at once (direct cut-over) or gradually
(phase-in).

Phase-in Method: In this method a part of the system is first


implemented and over time other remaining parts are implemented.

Implementation plan used: The workflow Management system is


developed on the basis of “Parallel Run Method” because we upgraded the
system, which is already in use to fulfill the requirements of the client. The
system already in use is treated as the old system and the new system is
developed on the basis of the old system and maintained the standards
processed by the older system. The upgraded system is working well and is
implemented on the client successfully.

14
Project Plan :

It was decided to use good Software


engineering principals in the development of the system since the company
had quite a big client network & was aiming to provide staffing for the
clients or to develop the internal projects of the companies & expand their
operations in the near future.
So the following Project Plan was drawn up:

1. The Analysts will interact with the current manual system users to get
the Requirements. As a part of this the Requirements Specification
Document will be created.

2. The requirements Specifications document will contain the Analysis &


Design of the system & UML will be used as the modeling language to
express the Analysis & Design of the System. According to Grady Booch et
al, in The Unified Modeling Language User Guide [UML-1998], “The Unified
Modeling Language (UML) is a graphical language for visualizing, specifying,
constructing, and documenting the artifacts of a software- intensive
system. The UML gives you a standard way to write a system's blueprints,
covering conceptual things, such as business processes and system
functions, as well as concrete things, such as classes written in a specific
programming language, database schemas, and reusable software
components”.

3. The Analysis, Design, Implementation & testing of the System itself will
be broadly based on the Rational Unified Software Development process.
According to Ivar Jacobson et al, in The Unified Software Development
Process (The Addison-Wesley Object Technology Series) [USDP-2000], the
Unified Software Development Process contains Inception, Elaboration,
Construction & Transition as the main Phases, which contain further cycles
& iterations.
15
This process will be followed to produce an incremental cycle, which will
deliver milestones like the Requirements Specification Document etc., at
the end of each of the iterations, Phases or cycles.

4. The Architecture & Technologies will be decided as a part of the Analysis


of the requirements.

5. Once the Design is ready the Implementation & Testing strategy of the
system will commence. Each will be independent of the other. The
implementation of the system itself will be broken down into sub-systems
following the Software Engineering principles for the development of
robust software.

6. Once the implementation is ready, the System testing will take place. If
the system is judged to be stable then Acceptance testing by the Users will
take place & once the Users are satisfied the System will be rolled out to
the Users & they will be trained on how to use it for an initial period.

The following chapters contain an account of how the Technology &


architecture for the system were chosen.

16
2. Requirements Specification Document

3.1 Introduction
According to Roger Pressman in Software Engineering: A Practitioner's
Approach (McGraw-Hill Publications) [SEPA–1997], the requirement
specification document is produced at the end of Analysis of the system.
This document is a very comprehensive document & contains all the User
requirements & Analysis diagrams. The Requirements are broadly divided
into two groups:
1. Functional requirements
3.Non-functional requirements
3.2 Functional Requirements
The main purpose of functional requirements within the requirement
specification document is to define all the activities or operations that take
place in the system. These are derived through interactions with the users
of the system. Since the Requirements Specification is a comprehensive
document & contains a lot of data, it has been broken down into different
Chapters in this report. The depiction of the Design of the System in UML is
presented in a separate chapter. The Data Dictionary is presented in the
Appendix of the system. Functional requirements define the capabilities
and functions that a system must be able to perform successfully. The
Functional Requirements of the College Social Network Project Include:

1.User Registration and profile management:

 User should be able to create accounts with personal details.

 Profiles should allow customization and display relevant information.

Input: User-provided details (name, email, etc.)

Process: Validate information, create user profiles, and implement secure.

Output: Registered and authenticated user accounts.

Data storage: User data stored in the user table.


17
2.Friendship and connection Features:

 User should be able to send and accept friend requests.


 Provide options for users to follow each other.

Input: User search, friend requests.

Process: Enable users to find and send friend requests manage connections.

Output: Established connections, notifications.

Data Storage: Friendship status stored in the friendship table.

3. Posting and sharing content:

 User should be able to create and share posts (texts, images links)
 Implement options for liking, commenting and sharing posts.

Input: User-generated content (text, images, etc.)

Process: Validate and format posts allow users to share multimedia content.

Output: Published posts visible to connections.

Data storage: Post content stored in the post table.

4.Groups and communities:

 Enable users to create and join groups based on interests or affilliations.


 Group discussion and event planning within these communities.

Input: User participation, topic selection.

Process: Create forums/groups manage discussions and moderate content.

18
Output: Engaged users in forums/groups, organized discussions.

Data storage: Membership status stored in group of membership table.

5.Notifications:
 Notify users of friend requests, messages and relevant activities.
 Allow users to customize notification preference.

Input: Events triggering notifications (friend requests, messages, etc )

Process: Identify events ,send timely notifications to users.

Output: Users informed about relevant activities.

Data storage: Notification details stored in the notification table.

6.Messaging System:

 Implement a private messaging system for direct communication between


users.
 Support for group chats or messaging within communities.

Input: User-initiated messages.

Process: Facilitate private and group messaging.

Output: Sent and receiving messaging.

Data storage: Message stored in the message table.

19
3.1 Non-Functional Requirements
The non-functional requirements consist of

1. Analysis, Design & Data requirements (Use-case diagrams, textual


analysis, sequence diagrams, data dictionary etc.)
2. Constraints.
3. Guidelines.
4. Validation Criteria.

3.3.1 Analysis, Design & Data requirements

The use case diagrams, textual analysis and sequence diagrams & data
dictionary fall into this category. Since each category above is of
considerable importance, they have been dealt in separate chapters. An
outline is only included here.

The Analysis & Design phases of the system yield Use Case diagrams,
textual analysis, Sequence Diagrams, Class diagrams & Data Dictionary.
Data dictionary consists of process statements showing how data is flowing
from starting point to end point.

3.3.2 Constraints

These are the requirements that are not directly related to the functionality
of the system. These should be considered as mandatory when the system
is developed. The following Constraints were arrived at for the system:

1. The system should be available over the intranet so that the Users like
the candidates can use the system from their system which was assigned to
him.

2. For gaining entry into the system the users should be registered and
should be able use login & passwords for gaining access to the system.
20
3. The users should be able to change their passwords for increased security.

4. The system should conform to the requirement specified and final


deliverables of the project before some date.

5. The system should be easy to understand and organized in a structured


way. The users should also receive feedback about any errors that occur.

6. There should be no limitation about the hardware platform that is to be


used to run the system.

7. Data integrity should be maintained if an error occurs or the whole


system comes down.

8. A user should to be registered in the system once in 6 months only.

9. A user can take-up the next level test once he clears previous level.

3.3.3 Guidelines
We have discussed mandatory requirements in the previous section. The
requirements in this section should be taken as suggestions & they should
be thought of as recommendations to further enhance the usability of the
system.

1. The system should display a menu for users to choose from.

2. The system should display users’ requests in a reasonable time.

3. Services of the system should be available 24 hours a day.

4. The system should be designed in such a way that it is easy to enhance it


with more functionality. It should be scalable & easily maintainable.

3.3.4 Validation Criteria

The Validation Criteria are dealt separately in the Chapter dealing with the
Test Strategy & Test cases.

21
3.DESIGN

3.1. System Design:

Design of software involves conceiving, planning out and specifying the


externally observable characteristics of the software product. We have data
design, architectural design and user interface design in the design process.
These are explained in the following section. The goal of design process is
to provide a blue print for implementation, testing and maintenance
activities.

The primary activity during data design is to select logical representations


of data objects identified during requirement analysis and software
analysis. A data dictionary explicitly represents the relationships among
data objects and constraints on the elements of the data structure. A data
dictionary should be established and used to define both data and program
design.

Design process is in between the analysis and implementation


process. The following design diagrams (Data Flow Diagrams and E-R
Diagrams) make it easy to understand and implement

The design process for software system has two levels.

1. System Design or Top Level Design.

22
2. Detailed Design or Logical Design.

23
3.1.1.INTRODUCTION TO UML DAIGRAMS

Unified Modeling Language (UML) diagrams provide a visual representation of the structure
and behavior of a system. For a college social network, these diagrams serve as a powerful
tool to illustrate various aspects of the system. Let's break down the introduction for
different UML diagrams

3.1.2.UML DAIGRAMS

A college social network could be represented using various UML diagrams. Here
are a few that might be relevant.These UML diagrams collectively provide a
comprehensive overview of the college social network system, capturing its
functionality, structure, and dynamic behavior. They serve as invaluable tools for
understanding, designing, and communicating the system's architecture and
functionality.

3.1.2.1.SCENARIOS

These scenarios cover various interactions users might have within a college
social network, showcasing the platform's functionality and its role in facilitating
communication, events, and community engagement.

3.1.2.2.USE CASE DAIGRAMS

A use case diagram illustrates interactions between users, admins, and


guests, along with the key functionalities each category can perform in the
college social network.

24
25
3.1.2.3.CLASS DAIGRAM

These classes represent the major entities in a college social network, and their
relationships would be depicted with appropriate associations, such as "User"
being associated with "Profile," "Post," "Friendship," etc.

26
3.1.2.4. SEQUENCE DIAGRAM

A state diagram is a visual representation of the process that happens in


operating a machine within a limited amount of time .This is a type of UML
diagram that is frequently used in the engineering .The main use of the diagram
is to visualize the performance of an object when it undergoes operation.

27
3.1.2.5. ACTIVITY DIAGRAM

This diagram outlines key activities in a college social network, such as user
authentication, profile management, social interactions (posting, commenting,
liking), searching for users, friend requests, and logging out. Keep in mind that
this is a high-level overview, and the actual implementation may involve more
detailed steps and interactions.

28
4. Architecture & Technologies

4.1. Introduction

General Methodology in Developing Software Project

The general methodology in developing a system in involved in


different phases, which describe the system’s life cycle model for
developing software project. The concept includes not only forward motion
but also have the possibility to return that is cycle back to an activity
previously completed. This cycle back or feedback may occur as a result of
the failure with the system to meet a performance objective or as a result
of changes in redefinition of system activities. Like most systems that life
cycle of the computer-based system also exhibits distinct phases.
Those are :

Requirement Analysis Phase


Design Phase
Development Phase
Coding Phase
Testing Phase

29
2. Requirement Analysis Phase:
This phase includes the identification of the problem, in order to identify
the problem; we have to know information about the problem, the purpose
of the evaluation for problem to be known. We have to clearly know about
the client’s requirements and the objectives of the project.

3. Design Phase:
Software design is a process through which the requirements are translated
into a representation of software. One of the software requirements have
been analyzed and specified, the software design involves three technical
activities: design, coding generation and testing. The design of the system is
in modular form i.e. the software is logically partitioned into components
that perform specific functions and sub functions. The design phase leads to

modules that exhibit independent functional characteristics. It even leads

to interfaces that reduce the complexity of the connections


between modules and with the external environment. The design
phase is of main importance because in this activity, decisions
ultimately affect the success of software implementation and
maintenance.

4. Development Phase:
The development phase includes choosing of suitable software to solve the
particular problem given. The various facilities and the sophistication in the
selected software give a better development of the problem.

30
5. Coding Phase:

The coding phase is for translating the design of the system-produced


during the design phase into code in a given programming language, which
can be executed by a computer and which performs the computation
specified by the design.

6. Testing Phase:

Testing is done in various ways such as testing the algorithm, programming


code; sample data debugging is also one of following the above testing.
Testing is done to check whether the Completed Project is working well or
not. Any errors in the program will be modified or rectified to produce a
perfect output.

31
Requirement Specification:

Here, the focus is on specifying what has been found giving analysis
such as representation, specification languages and tools, and checking the
specification are addressed during this activity.

The Requirement phase terminates with the production of the


validate SRS document. Producing the SRS document is the basic goal of
this phase.

The purpose of the Software Requirement Specification is to reduce


the communication gap between the clients and the developers. Software
Requirement Specification is the medium through which the client and user
needs are accurately specified. It forms the basis of software development.
A good SRS should satisfy all the parties involved in the system.

Purpose:
The purpose of this document is to describe all external requirements
or client provisioning. It also describes the interfaces for the system.

Scope:
This document is the only one that describes the requirements of the
system. It is meant for the use by the developers, and will also use by the
basis for validating the final delivered system. Any changes made to the
requirements in the future will have to go through a formal change
approval process. The developer is responsible for asking for clarifications,
where necessary, and will not make any alternations without the
permission of the client.

32
System Design:

Design of software involves conceiving, planning out and specifying the


externally observable characteristics of the software product. We have data
design, architectural design and user interface design in the design process.
These are explained in the following section. The goal of design process is
to provide a blue print for implementation, testing and maintenance
activities.

The primary activity during data design is to select logical representations


of data objects identified during requirement analysis and software
analysis. A data dictionary explicitly represents the relationships among
data objects and constraints on the elements of the data structure. A data
dictionary should be established and used to define both data and program
design.

Design process is in between the analysis and implementation


process. The following design diagrams (Data Flow Diagrams and E-R
Diagrams) make it easy to understand and implement

The design process for software system has two levels.

1. System Design or Top Level Design.


2. Detailed Design or Logical Design.

33
System Design or Top Level Design:

In the system design the focus is on deciding which modules are


needed for the system, the specification of these modules and how these
modules should be interconnected.

Detailed Design or Logical Design:

In detailed design the interconnection of the modules or how the


specifications of the modules can be satisfied is decided. Some properties
for a software system design are

 Verifiability.
 Completeness.
 Consistency.
 Trace ability.
 Simplicity/Understandability.

34
We will try to adhere to the requirements specified in the URS
documents in order to develop the required application. We have used
Waterfall model as a development model.

Fig. 2.1 WaterFall Model

4.2. Project Plan


Areas, which would be considered during the planning and analysis, would be:

35
 Ensure that the information flow is process driven.
 Reduce the manual efforts to the maximum extent for all activities.
 Ensure validation at each and every level.
 Act as an effective tool in decision support.
 Provide user friendly system.

Fig. 2.2 Project Planning and Management Approach

36
SYSTEM ANALYSIS :

Analysis is the detailed study of the various operations performed


by the system and their relationships within and outside of the system. A
key question is: what must be done to solve the problem? One aspect of
analysis is defining the boundaries of the system and determining whether
or not candidate system should consider other related systems. During
analysis, data are collected on the available files, decision points, and
transactions handled by the present system.

System Requirement Specification

What is SRS?

Software Requirement Specification (SRS) is the starting point of the


software developing activity. AS system grew more complex it became
evident that the goal of the entire system cannot be easily comprehended.
Hence the need for requirement phase arose. The software project is
initiated by the client needs. The SRS is the means of translating the ideas
of the minds of the clients (the input) into a formal document (the output
of the requirement phase).

The SRS phase consists of two basic activities:

1) Problem/Requirement Analysis: The process is order and more


nebulous of the two, deals with understanding the problem, the
goal and constraints.

2) Requirement Specification: Here, the focus is on specifying what


has been found giving analysis such as representation,
specification languages and tools, and checking the specifications
are addressed during this activity

37
The Requirement phase terminates with the production of the validate SRS
document. Producing the SRS document is the basic goal of this phase.

Role of SRS:

The purpose of the Software Requirement Specification is to reduce


the communication gap between the clients and the developers. Software
Requirement Specification is the medium through which the client and the
user needs are accurately specified. It forms the basis of the software
development. A good SRS should satisfy all the parties involved in the
system.

4.4. CLIENT SERVER MODEL

When an architect designs a building, he has a vision of the finished


product and produces a result based on that vision. Client – server, on
the other hand, is more like Darwinian model of evolution of a living
species. No one has a vision of the finished products; rather, day-today
events and gradual changes affect it over time in reaction to those
events.

In the beginning, application were fairly simple, reading input


transaction in a ‘batch’, processing them against a data store, and the
output was paper. Record retrieval was usually a set of subroutines
embedded in the updating program.

Common functions gradually migrated from the application to the


operating system. Database processing was one of the first major
functions to be removed from application control. Much of the time
database functions in the application included retrieval, replacement and

38
insertion. Since it was function had to be introduced database
administration. This new function was separated from the application
code and involved defining the structure of the database, value ranges
backup, rollback, and so forth.

Advantages of Client – Server Model:

 The hardware and software can be placed where it will do the most
good.

 In Client – Server model PCs, the power can be spread across the
client and the server.

 On client side, an Active X object is used to present data

 By having the client side it can do more work

 The client software supplies the interface (Such as windowed


program) and the knowledge of how to pass the request to the
server and the format of the data for the user when it’s returned
from the server. The server’s job is to manipulate the data
according to the user’s request.

39
4.5 TECHNOLOGIES :

World Wide Web – Web Technologies:

The World Wide Web is an open ended information system where


the information can be retrieved and is designed to use in the Internet’s
distributed environment. It contains Web pages that provide information
and controls. The World Wide Web initially started as a text only medium
but now ranges of features are added like graphics, sounds, animation
and video. A large portion of internet is organized as the world wide web.
A Web application is defined as multi –tier application based on the
internet standards, using a web browser as client. The rule making body
of the web is W3C. W3C stands for World Wide Web Consortium. W3C
puts together specifications for Web standards. The most essential Web
standards are HTML, CSS and XML. The latest HTML standard is XHTML
1.0.

Hyper Text Transfer Protocol:

The standard web transfer protocol is HTTP. Each interaction


consists of one ASCII request, followed by one RFC 822 MIME – like
response. Although the use of TCP for the transport connection is very
common, it is not formally required by the standard. HTTP is constantly
evolving. Several versions are in use and others are under development.

Three – Tier Architecture:

A web application follows a 3 – tier model. The first tier consists of


presentation layer, the second tier consists of the application layer and
the third tier provides the data. A web application will collect the data
from the client and sends the request to the web server.

40
TCP/IP Protocol:

The most basic internet standard is the TCP/IP protocol. This


protocol defines the rules for establishing connections between
computers, that is between client and server hardware.

41
In a web application the first tier includes the web browser and the web
server. The relevant script let program runs and gets the data (second and
the third tier) and sends the data to the Web server. The web server
sends the data back to the client (first tier).

Apache Web Server:

Apache was originally based on the code and ideas found in the
most popular HTTP server of the time. NCSA httpd1.3 (early 1995). It has
since evolved into a far superior system which can rival( and probably
surpass) almost any other UNIX based HTTP server in terms of
functionality, efficiency and speed. Since it began, it has been completely
rewritten and includes many features. Apache is, as of January 1997, the
most popular WWW server on the Internet, according to the Net craft
Survey.

Why Apache?
To address the concerns of a group of WWW providers and part
time http programmers that http didn’t as they wanted it to behave.
Apache is an entirely volunteer effort, completely funded by its members,
not by commercial sales. Apache has been show to be substantially faster
than many other free servers.

Hypertext Markup Language (HTML):


HTML is a collection of platform independent styles used to create a
web document. Html can be used to display any type of document on the
host computer, which can be geographically at different location. It is a
versatile language and can be used on any platform or desktop being
platform independent, HTML indicates the manner in which the
document to be read by the interpreter.

42
This can be done with the set of HTML elements and tags which
mark up the document and inform the browser, such as Internet Explorer,
about the action to be taken when a certain element or tag is specified.

HTML Elements and Tags:

A web page is made up of elements, each of which is defined by an


HTML code or a tag. A tag is always enclosed in angle brackets, and most
tags come in pairs, with an opening and closing tag. The closing tag is the
same as the opening tag, but starts with forward slash.

Structure Of HTML:

HTML elements perform a defined task. HTML uses two types of


elements.
They are
 Empty Tags.
 Container Tags.

These tags differ because of what they represent. Empty tags


represent formatting constriants such as line breaks and horizontal rules.
Container tags define a section of text, formats and dot all of the selected
text. A container tag has both a beginning and an ending.

43
HTML Layout:

An HTML document consists of text, which comprises the content


of the document and tags, which, defines the structure, and appearance
of the document. The structure of an HTML document is simple.
<HTML> tag enclosing the document header and body Here’s an example.
<HEAD>
<TITLE>The title of HTML Document</TITLE>
</HEAD>
<BODY>
This is where the actual HTML document Text lies, which is displayed
in the browser.
</BODY>
</HTML>

Dynamic Hypertext Markup Language (DHTML):

With the explosion of interest in the World Wide Web, Hypertext


Markup Language (HTML) has assumed a prominent place in the
computer world. HTML has evolved to meet the increasing demand for
eye-catching and mind-catching web sites. Until recently, however the
evolutionary process mostly involved new and improved tags and
attributes. The end products, static web pages that often required
repeated time- consuming round trips between client and server
machines, clearly showed a new direction was in order. Dynamic HTML is
that new direction. It combines HTML with Cascading Style Sheets and
scripting languages.

44
Java Script:

JavaScript is a scripting language that was created by Netscape. It


was originally called LiveScript. Despite the similarities in name and
syntax, JavaScript is not related to the Java programming language.
JavaScript is supported by a wide range of Web browsers,
including both Microsoft® Internet Explorer and Netscape Navigator. The
Internet Explorer 3.0 supports JavaScript directly through a scripting
engine in the file jscript.dll.

Perhaps the best-known scripting language prior to the introduction


of VBScript was JavaScript. It is used to create interactive web applications
supported by the Netscape browser. JavaScript offers many of the same
advantages as VBScript. JavaScript is simple to use, lightweight, and
dynamic. Developers can easily embed code functionality for interactive
applications inside a web page.

SYNTAX:

<SCRIPT LANGUAGE="JavaScript">
var rtn=false;
function
push_me() {
alert ("Hello,
World!"); return true;
}
</SCRIPT>

45
My SQL

According to the Mysql Corporation website, in the Products category


where Mysql is listed “Whether users are creating a database for personal
use, departmental use or for an entire organization, oracle offers an easy-
to-use database for managing and sharing data. Oracle brings not only the
traditional broad range of easy data management tools but also adds
increased integration with the Web for easier sharing of data across a
variety of platforms and user levels and additional ease-of-use
enhancements to assist with personal productivity”.

My SQL is a relational Database, which forms part of the Office Suite of


products from My SQL Corporation. Though it can be used only for small
applications, this RDBMS was chosen for the implementation because it
has a very user friendly Graphical User Interface. The tables can be
created in the design view or through a Wizard. It is easy to create
integrity constraints & foreign keys through the GUI .

If the Database is to be changed, then all that is required is to change


the Thin Driver jar file. For example, in Tomcat 5.0 server, a new
connection can be created by changing the name in Bean class. So it is
very easy to connect to a Database.

Access provides all the features of an RDBMS. So it can be used for


development of any application, which requires the relational Database
features. It is also easy to import into or export data from Oracle. It
supports SQL & can be connected from Java through thin driver.

46
4.6 Modules:

4.6.1 Administrator Module:


This module allows administrator to manage different
videos that upload by the users. It allows him to add, modify and delete the
videos

4.6.2 User Module:

It allows the candidate to register for the website and


generate the ID and password. It allows the user login into this application
and see the videos. He can view all the videos upload by the admin. He can
add videos as Favorites.

4.6.3 Registration:
This module allows the users to register for the website. It
allows the Users select an option for add favourities with in the stipulated
time and continues generating the videos.

47
5. Design :

5.0 Context flow diagram:

The environment in which the software used is depicted in this


picture. The CFD shows the external entity action on the software is shown
here in CFD as a single process.

Student information
Student

Add Colleges
Profile
Campus Add courses
Result Networkin
g

Subjects
College
Exam Results

48
5.0.1 Top level DFD:

Top level DFD shows the functional component in the software package.
each component shown in the top level DFD is described in the subsections
of 2.3

Campus
Networking Database

Members

Contact
Home Account Sign in Profile
s

49
5.0.2.1 Functional component 1:

Student Profile :

Input- Student adds profile information and education details


.
Process- System checks previous student account and
educational details
Output- Student can view education detail and profile details.

Add /Edit
Student Education
Logs Details

Student Education
account DataBase

Updates
Profile Profile Database

50
5.0.2.2 Functional component 2: Tutorials
Input- Student uploads education articles, tutorials, images, videos ..etc.
Process- System uploads education articles, tutorials, images, videos to
database
Output- Student can view uploaded education Articles, tutorials, images,
Videos, etc..

Student Educatio
n Details
Edit Add

Uploads Tutorials

Updates Images/
videos

Tutorials
Database

Uploads
database

51
5.3.3 Functional component : Admin

Input- Admin can upload and share video tutorials, question, papers,
books..etc.
Process- System uploads education tutorials, question papers, books to
database.
Output- Student can view uploaded tutorials,question papers, books,etc

Admin

Uploads

Tutoria
ls

Add/Edit Add/Edit

Video Questi
Tutori on Books

Video Question Book

52
5.1 DataBase Design

Database name: College_Networking :

Table name :- college

Field Type Null Description

collegeid bigint(10) No Id of the college

collegename varchar(50) No Name of the college

collegelocation varchar(50) No Location of the college

Table name:- image

Field Type Null Description

imgid bigint(8) No Image Id

imagname varchar(20) No Name of the image

imgcategory varchar(20) No Image category

description varchar(50) No Image description

uploadimage varchar(25) No Path of the image

53
Table name:- pracdemo

Field Type Null Description

videoid bigint(8) No Video Id

videoname varchar(25) No Name of the video

videosection varchar(25) No Section of the video

videosubject varchar(25) No Video subject

uploadvideo varchar(25) No Path of the video

description varchar(50) No Brief description of the video

Table name:- questionanswer

Field Type Null Description

qid bigint(8) No Question Id

question varchar(50) No Question

answer varchar(70) No Correct answer

option1 varchar(70) No Option 1

option2 varchar(70) No Option 2

option3 varchar(70) No Option 3

option4 varchar(70) No Option 4

visible varchar(25) No If value of visible is true then user can answer for this
question otherwise not.

54
Table name:- questionpaper

Field Type Null Description

paperid bigint(8) No Question Paper Id

Papername varchar(25) No Question paper name

subject varchar(20) No Subject name

section varchar(20) No Student Section name

description varchar(50) No Brief description of Question paper

upload varchar(50) No Path of the file

uploadtext text No Uploaded text file

Table name:- studentaccount

Field Type Null Description

id bigint(8) No Student Account Id

firstname varchar(25) No Student First name

lastname varchar(25) No Student Last name

email varchar(30) No Student Email Id

password varchar(30) No Password

confirmpassword varchar(30) No Confirmation password

iam varchar(10) No Gender

dob Date No Date of Birth

55
Entity Relationship Diagram (ERD)

The Entity Relationship Diagram depicts the


various relationships among entities, considering each object as an
entity. Entity is represented as ellipse and relationship is represented as
decision or diamond box. It depicts the relationship between data
objects.

Entity:- The thing, which we want to store information. Entity is a


elementary basic building block of storing information about business
process. An entity represents an object defined within information
systems about which you want to store information.

Attributes: - Descriptor of the entity. Attributes are elementary pieces


of information attached to an entity.

Relationship: A relationship is a named connection or association


-
between entities or used to relate two or more entities with some
common attributes.

Types of Relationships:

 One to One

 One to many

 Many to one

56
ER (Entity-Relationship Diagram) and Database design

The database for our system and its design using ER diagrams is shown in
the figure bellow.
Some of the conventions while designing the E-R Diagram are shown below.

Symbol Convention

Entity

Relationship

Attribute

KeyAttribute

57
Coding:

<?php
include("header.ph
p");
include("mysql.php
");
$result = $con->query("SELECT * FROM profile ORDER BY
RAND()"); if(isset($_SESSION["logid"]))
{
header("Location: profile.php");
}
$i=0;
while($row = mysqli_fetch_array($result))
{
$img[$i] = $row["image"];
$uid[$i] = $row["userid"];
$i++;
}

?>
<script language="javascript">
function
reg()
{ ml =
document.registration.email.valu
e; pos1 = ml.indexOf("@")
pos = ml.indexOf("
") pos2 = (pos1+1)
server = ml.substring(pos2);
server_pos =
server.lastIndexOf(".")
reqtype = server.substring(server_pos+1) type_end =
reqtype.substring(reqtype.length-1)

58
if(document.registration.fname.value=="")
{
alert("Please enter first
name");
document.registration.fname.f
ocus();
document.registration.fname.s
elect(); return false;
}
else if(document.registration.lname.value=="")
{
alert("Please enter last
name");
document.registration.lname.f
ocus();

document.registration.lname.select();
return false;
}
else if(ml == "")
{
document.registration.email.focus();
document.registration.email.select();
alert("Email cannot be blank");
return false;
}

else if(ml.indexOf("@")==-1)
{
document.registration.email.focus();
document.registration.email.select();
alert("The Email Address must contain '@' sign");
return false;
}
else if(pos1<1)
{
59
document.registration.email.focus();
document.registration.email.select(); alert("Email address
cannot start with '@' sign"); return false;
}
else if(ml.indexOf(".")==-1)
{
document.registration.email.focus();
document.registration.email.select();
alert("The Email Address must contain '.' sign"); return false;
}
else if(pos!=-1)
{
document.registration.email.focus();
document.registration.email.select();
alert("The Email Address cannot contain spaces"); return
false;
}
else if(server.indexOf("@")!=-1)
{
document.registration.email.focus();
document.registration.email.select();
alert("A valid Email must contain only one '@' sign"); return
false;
}
else if(server.indexOf(".")==0)

60
{
document.registration.email.f
ocus();
document.registration.email.s
elect();
alert("There should some text between '@' and
'.' sign"); return false;
}
else if(reqtype=="")
{
document.registration.email.f
ocus();
document.registration.email.s
elect();
alert("Email Id should end with character(like
.com,.net,.org)"); return false;
}
else if(type_end.toUpperCase()<"A" || type_end.toUpperCase()>"Z")
{
document.registration.email.f
ocus();
document.registration.email.s
elect();
alert("Email Id should not end with number or
symbol"); return false;
}

else if(document.registration.pass.value=="")
{
alert("Please enter
password");
document.registration.pass.f
ocus();
document.registration.pass.s
elect(); return false;
}
else if(document.registration.pass.value.length<8)
{
alert("The minimum length of the password is 8
61
characters..."); document.registration.pass.focus();
document.registration.pass.select();
return false;
}
else if(document.registration.pass.value !=
document.registration.cpass.value)
{
alert("Password and confirm password is not
matching");
document.registration.cpass.value="";
document.registration.cpass.focus();
document.registration.pass.select();
return false;
}
else if(document.registration.Date.value=="DD")
{
alert("Please select
Date");
document.registration.Date.f
ocus(); return false;

62
}
else if(document.registration.month.value=="Month")
{
alert("Please select
Month");
document.registration.month.f
ocus(); return false;
}
else if(document.registration.Year.value=="Year")
{
alert("Please select
Year");
document.registration.Year.fo
cus(); return false;
}

else
{
return true;
}
}

</script>

<?php
include("mysql.ph
p");
$result1 = $con->query("SELECT * FROM college");

if(isset($_POST["button2"]))
{
$datee="$_POST[Year]-$_POST[month]-$_POST[Date]";
$sql="INSERT INTO stuacc
(firstname,lastname,email,password,confirmpasswor
d,iam,dob) VALUES
('$_POST[fname]','$_POST[lname]','$_POST[email]','$_POST[pass]','$_POST[cpass]','
$
_POST[gen]','$datee')";

63
if (!$con->query($sql))
{
die('Error: ' . mysqli_error());
}
else
{
$_SESSION["res"] = "User Registered Successfully...";
header("Location: login.php");
}
}
?>

<center>
<div class=container>

64
<!-- head -->
<?php include("head.php"); ?>

<!-- navigation menu -->


<?php include("menu.php"); ?>

<div style="padding: 10px; text-align: left;">


<!-- body content -->
<table cellpadding=10 width=100%>
<tr>
<td width="70%">
<img src="images/pic.png" width="518" height="137"
border="0" alt="">
<h2>Meet New Friends </h2>

<table width=100%>

<tr valign=top align=center>


<td><a href=""><img src="<?php echo $img[0] ; ?>"
width="100" height="150" border="0" alt=""></a><br></td>
<td><a href=""><img src="<?php echo $img[1] ; ?>"
width="100" height="150" border="0" alt=""></a><br></td>
<td><a href=""><img src="<?php echo $img[2] ; ?>"
width="100" height="150" border="0" alt=""></a><br></td>
<td><a href=""><img src="<?php echo $img[3] ; ?>"
width="100" height="150" border="0" alt=""></a><br></td>

</tr>
</table>

<h2>About Us</h2>
The Campus networking website is an online community
designed to make your Campus life more active and stimulating. The
Campus network can help you maintain existing relationships with college
students and share pictures and messages, and establish new ones by
reaching out to people you've never met before, and also using this site
user can share Knowledge's, education related books, question/answer,
etc. </td>
65
<td width="30%" valign="top"><img src="images/imaa.png"
width="100%" height="199"><br>
<h2>Register Free</h2>
<table width="208" border="0" cellpadding="5" cellspacing="0">
<form id="registration" name="registration" method="post"
action="index.php" onSubmit="return reg()">
<tr>
<td width="59">First Name</td>
<td width="91"><input name="fname" type="text" id="fname"
value="" size="20"></td>
</tr>
<tr>

66
<td>Last Name</td>
<td><input name="lname" type="text" id="lname"
size="20"> value=""
</td>
</tr>
<tr>
<td>Email</td>
<td><input name="email" type="text" id="email"
size="20"> value=""
</td>
</tr>
<tr>
<td>Password</td>
size="20"> <td><input name="pass" type="Password" id="pass"
</td>
</tr>
<tr>
<td>Confirm</td>
<td><input name="cpass" type="Password" id="cpass"
size="20">
</td> </tr>
<tr>
<td>I am</td>
<td><label>
<input name="gen" type="radio" value="Male"

67
checked="checked" />
Male</label>
<input type="radio" name="gen" value="Female" />
Female</td>
</tr>
<tr>
<td colspan="2">DOB&nbsp;&nbsp;&nbsp;
<select name="Date" >
<option>DD</option>

<?php
for($i=1; $i<= 31; $i++)
{
echo "<option value='$i'>$i</option>";
}
?>
</select>
<select name="month">
<option>Month</option>
<option value="01">Jan</option>
<option value="02">Feb</option>
<option value="03">Mar</option>
<option value="04">Apr</option>
<option value="05">May</option>
<option value="06">Jun</option>
<option value="07">Jul</option>
<option value="08">Aug</option>
<option value="09">Sep</option>
<option value="10">Oct</option>
<option value="11">Nov</option>
<option value="12">Dec</option>
</select>
<select name="Year">
68
<option value="Year">Year</option>
<?ph
p for($i=1975; $i< 2011;
$i++)
{
echo "<option value='$i'>$i</option>";
}
?>
</select></td>
</tr>
<tr>
<td><input class=button type="submit" name="button2"
value="Register"></td
>
</tr>

</form>
</table>
</td>
</tr>

69
</table>

</div>

<?php include("footer.php"); ?>

<?php
include("header.php");
include_once("mysql.p
hp");
if(isset($_SESSION["logid"]))
{
header("Location: profile.php");
}
if(isset($_POST["logiin"]))
{

$logres = $con->query("SELECT * FROM stuacc


WHERE email='$_POST[username]' AND
password='$_POST[pass]' ");

if($logres->fetch_assoc() == 1)
{
$_SESSION["logid"] =
$_POST["username"];
header("Location: profile.php");
}

else
{
$_SESSION["logfa"] = "Invalid username or password";
}
}

?>

<center>
70
<div class=container>

<!-- head -->


<?php include("loghead.php"); ?>

<!-- navigation menu -->


<?php include("menu.php"); ?>

<div style="padding: 10px; text-align: left;">


<!-- body content -->
<table cellpadding=10 width=100%>
<tr>
<td height=400 valign=top>
<form method="post" action="login.php">
<table width="100%" border="1">
<tr>
<th height="25" colspan="2" align="center"
scope="col"><font size="3" color="#996600">Login Page
<?php
if(isset($_SESSION["res"
]))
{
echo "<br>";
echo
$_SESSION["res"];
}
elseif(isset($_SESSION["logfa"]))
{
echo "<br>";
echo $_SESSION["logfa"];

}
else
{
echo "<br>";
echo "Please Enter User Name And Password";
}

?></font></th> </tr>
71
Id</strong> <td height="44"><strong>&nbsp;&nbsp; Email
</td>
<td><strong>&nbsp;&nbsp;<input type="text"
name="username" size="30" value="">
</strong></td>
</tr>
<tr>
<td height="48"><strong>&nbsp;&nbsp; Password</strong></td>
<td><strong>&nbsp;&nbsp;<input name="pass"
type="password" id="pass" value="" size="30">
</strong></td>
</tr>
<tr>
<td height="23" colspan="2"
align="center"><strong><a href="forgot1.php">Forgot
Password</a></strong></td>
</tr>
<tr>
<td height="60" colspan="2" align="center">
<input name="logiin" type="submit" id="logiin" value="Click Here to
Login">
</td>
</tr
>
</tabl
e>
</form>
</td>
</tr>
</table>

</div>

72
<?php include("footer.php"); ?>
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0
Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-
transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>main page</title>
</head>

<body><center>
<table width="768" height="494" border="2">
<tr>
<td width="185" rowspan="6"><img src="imagesCALAZIBU.jpg" alt=""
width="69" height="36" /></td>
<td width="216" rowspan="6"><p>Welcome,</p>
<p>Answers:</p>
<p>Number of visitors:</p></td>
<td height="55" colspan="3">My friends</td>

73
</tr>
<tr>
<td height="128" colspan="2"><p>&nbsp;</p>
<p><img src="imagesCALAZIBU.jpg" alt="" width="57" height="36" /></p>
<p>&nbsp;</p></td>
<td width="125"><img src="imagesCALAZIBU.jpg" alt="" width="60" height="38"
/></td>
</tr>
<tr>
<td colspan="2"><img src="imagesCALAZIBU.jpg" alt="" width="29" height="28"
/></td>
<td width="125"><img src="imagesCALAZIBU.jpg" alt="" width="66" height="51"
/></td>
</tr>
<tr>
<td colspan="2"><img src="imagesCALAZIBU.jpg" alt="" width="57" height="48"
/></td>
<td width="125"><img src="imagesCALAZIBU.jpg" alt="" width="55" height="44"
/></td>
</tr>
<tr>
<td colspan="2">View all</td>
<td width="125">Manage</td>
</tr>
<tr>
<td colspan="3">Colleges</td>
</tr>
<tr>
<td rowspan="2"><p>Profile edit</p>
<p>Messages</p>
<p>Answers</p></td>
<td><p>Friend Request</p>
<p><img src="imagesCALAZIBU.jpg" alt="" width="50" height="30" /></p>
<form id="form1" name="form1" method="post" action="">
<input type="submit" name="button" id="button" value="Yes" />
<input type="submit" name="button2" id="button2" value="No" />
</form>

74
<p>&nbsp;</p></td>
<td width="100"><img src="imagesCALAZIBU.jpg" alt="" width="51"
height="25"
/></td>
<td width="118"><img src="imagesCALAZIBU.jpg" alt="" width="20"
height="23"
/></td>
<td><img src="imagesCALAZIBU.jpg" alt="" width="47" height="29" /></td>
</tr>
<tr>
<td height="56">Latest News:-</td>
<td colspan="3">View all</td>
</tr>

75
</table>
<p>&nbsp;</p>
</center>
</body>
</html>

<script
language="javascript">
function demo()
{
if(document.practical.vname.value=="")
{
alert("Please enter video
name");
document.practical.vname.fo
cus();
document.practical.vname.se
lect(); return false;
}

else if(document.practical.vcat.value=="")
{
alert("Please enter video
category");
document.practical.vcat.focus
();
document.practical.vcat.select
(); return false;
}
else if(document.practical.uploadv.value=="")
{
alert("Please upload video");
document.practical.uploadv.fo
cus();
document.practical.uploadv.se
lect(); return false;
}

76
else if(document.practical.discription.value=="")
{
alert("Please enter
discriptionn");
document.practical.discription.f
ocus();
} document.practical.discription.s
else elect(); return false;

} {
return true;
}
</script>
<?php
include("mysql.php");
if(isset($_POST["button
"]))

77
{
$sql="INSERT INTO pracdemo
(videoname,videocategory,uploadvideo,description) VALUES
('$_POST[vname]','$_POST[vcat]',
'$_POST[vlink]','$_POST[discriptio
n]')"; if (!$con->query($sql))
{
die('Error: ' . mysql_error());
}
else
{
echo "video uploaded Successfully";
}

}
$con->query("DELETE FROM pracdemo WHERE videoid='$_GET[prac]'");
$resrec = $con->query("SELECT * FROM pracdemo");
?>
<?php
include("mysql.ph
p");
$filename="";

$result = $con->query("SELECT * FROM img");


?>

78
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0
Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-
transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>practical demonstration</title>
</head>

<body><center>
<h2> Practical Demonstration</h2>
<form id="practical" name="practical" method="post"
action="practical.php" onSubmit="return demo()">
<table width="100%" height="283" border="2">
<tr>
<td width="102" height="26">Video Name:</td>
<td width="282">
<label for="vname"></label>
<input name="vname" type="text" id="vname" size="40" />
</td>
</tr>
<tr>
<td height="26"><p>Video Category</p></td>
<td><input name="vcat" type="text" id="vcat" size="40" /></td>
</tr>
<tr>
<td height="76">Upload Link</td>
<td><textarea name="vlink" cols="45" rows="5"></textarea></td>
</tr>
<tr>
<td height="76">Description</td>
<td>
<label for="discription">
<textarea name="discription" cols="45" rows="5"></textarea>
</label></td>
79
</tr>
<tr>
<td height="41" colspan="2" align="center"><input type="submit"
name="button" id="button" value="Upload video" /></td>
</tr>
</table></form>

<br>
<table width="535" border="1"align="center">
<?php
while($row = $resrec->fetch_array())
{
?>
<tr>
<th width="37%" scope="col"><strong>Video Name</strong></th>
<th width="31%"
scope="col">&nbsp;<?php echo
$row["videoname"];
?></th>
<th width="32%" scope="col"><a href='practical.php?prac=<?php echo
$row['videoid']; ?>'>Delete</a></th>
</tr>
<tr>
<th colspan="3" scope="col">
<?php
echo $row["uploadvideo"];
?></th>
</tr>
<?php
}
?>
</table>

</center>
</body>
</html>

80
5.2 ScreenShots:

81
82
83
6. TESTING :

Software testing is a critical element of the software quality assurance


and represents the ultimate review of specification, design and coding.
Testing is the exposure of the system to trial input to see whether it
produces correct output.

Testing Phases:
Software testing phases include the following:

 Test activities are determined and test data selected.


 The test is conducted and test results are compared with the
expected results.
 There are various types of testing:

Unit Testing:
Unit testing is essentially for the verification of the code produced during
the coding phase and the goal is test the internal logic of the
module/program. Int the Generic code project, the unit testing is done
during coding phase of data entry forms whether the functions are
working properly or not. In this phase all the drivers are tested they are
rightly connected or not.

Integration Testing:
All the tested modules are combined into subsystems, which are then
tested. The goal is to see if the modules are properly integrated, and the
emphasis being on the testing interfaces between the modules. The
generic code integration testing is done mainly on table creation module
and insertion module.

System Testing:
It is mainly used if the software meets its requirements. The reference
document for this process is the requirement document.

84
Acceptance Testing:
It is performed with realistic data of the client to demonstrate that the
software is working satisfactorily.

Testing Methods:

Testing is a process of executing a program to find out


errors. If testing is conducted successfully, it will uncover all the errors in
the software. Any testing can be done basing on two ways:

White Box Testing:


It is a test case design method that uses the control structures of the
procedural design to derive the test cases. Using this testing a software
engineer can derive the following test cases: Exercise all the logical
decisions on either true or false sides. Execute all loops at their boundaries
and within their operational boundaries.
Exercise the internal data structures to assure their validity.

Black Box Testing :

It is a test case design method used on the functional requirements of the


software. It will help a software engineer to derive sets of input conditions
that will exercise all the functional requirements of the program.

Black box Testing attempts to find errors in the following categories:

 Incorrect or missing functions


 Interface errors
 Errors in data structures
 Performance errors
 Initialization and termination errors

85
By Black box testing we derive a set of test cases that satisfy the following
criteria:

 Test cases that reduce by a count that is greater than one, the
number of additional test cases that must be designed to achieve
reasonable testing.
 Test cases that tell us something about the presence or absence of
classes of errors rather than errors associated only with a specific
test at hand.

TEST APPROACH:

Testing can be done in two ways:

 Bottom up approach
 Top down approach

Bottom up approach:
Testing can be performed starting from smallest and lowest level modules
and proceeding one at a time. For each module in bottom up testing a
short program executes the module and provides the needed data so that
the module is asked to perform the way it will when embedded with in the
larger system. When bottom level modules are tested attention turns to
those on the next level that use the lower level ones they are tested
individually and then linked with the previously examined lower level
modules.

Top down approach:


This type of testing starts from upper level modules, since the detailed
activities usually performed in the lower level routines are not provided
stubs are written. A stub is a module shell called by upper level module
and that when reached properly will return a message to the calling
module indicating that proper interaction occurred. No attempt is made to
verify the correctness of the lower level module.

86
Login:

Sl No Input Values Test case Conditional being checked Result


1 Email Empty Please Enter valid Username Successful

3 Email Already Login ID should be unique Successfu


Exists or l
not

4 Password Empty Please Enter valid Password Successful

5 Password If wrong Enter Password Successful


Password
6 Password Length Length should be less than or equal Successful
to 10 character

Registration:

Sl Input Values Test case Conditional being checked Result


No

1. First Name Empty It must not be empty Successful

2 Last Name Empty Last Name mustnotbeempty Successful

3 Email Empty Enter valid Email ID. Successful

4 Password Empty Enter valid Password. Successful

5 Password Length Minimum 8 characters Successful


required
6 Confirm Empty Password and confirmation Successful
Password password must be same
7 Date Of Select Enter valid Username and Successful
Birth Password.

87
Edit Profile:

Sl Input Values Test case Conditional being checked Result


No

1. First Name Null First Name mustnotbeempty Successful

2 Last Name Empty Last Name mustnot be empty Successful

3 City Empty City must not be empty Successful

4 State Empty state must not be empty Successful

5 Pin code Empty PIN code must not be empty Successful

6 Country SELECT Please select country Successful

7 High School Empty High School must not be Successful


empty
8 College SELECT Please select college Successful

9 Course Empty Course must not be empty Successful

Scrap:

Sl Input Values Test case Conditional being checked Result


No

1. To Address Null Please select To address Successful

2 Subject Null Subject must not be empty Successful

3 Message Null Please enter message in text Successful

88
Question and Answers:

Sl Input Values Test case Conditional being checked Result


No

1. Question null Please add Question. Successful

2 Options null Please Enter Options. Successful

3 Answer Select Please Select valid answer Successful

Photos:

Sl Input Test case Conditional being checked Result


No Values

1. Image Title Null Image title must not be empty Successful

2 Add Image BROWSE Please browse image Successful

3 Delete Select Please select image todelete Successful


Image

89
Videos:

Sl no. Input Values Test case Conditional being checked Result

1. Video Title Null Video title must not be empty Successful

2 Add Video BROWSE Please browse video Successful

3 Delete Select Please select video to delete Successful


Video

Articles:

Sl Input Values Test case Conditional being checked Result


No

1. Article Title Empty Please enter Title for article Successfu l

2 Subject Empty Please enter Subjectname for Successfu l

Name article Successfu l

3 Section Empty Please enter section Successfu l

4 Article Empty Please add articles Successfu l

90
Tutorials:

Sl Input Values Test case Conditional being checked Result


No

1. Subject Empty Please enter Subject name Successful


Name
2 Section Empty Please enter section Successful

3 Description Empty Please enterDescription Successful

4 Upload BROWSE Please upload documents Successful


Tutorials
5 Tutorials Empty Please add tutorials orupload Successful
tutorials
6 Practical Empty Please enter Practical Subject Name Successful
Subject
Name

7 Section Empty Please enter section Successful

8 Description Empty Please enterDescription Successful

9 Upload BROWSE Please upload Video Tutorials Successful


Video
Tutorial

10 Download Select Please select tutorials to Successful


Tutorial download

91
Conclusion

With this college networking website application you can connect with
friends, find old friends, share pictures and messages, and reach out to
new people registered into the application you’ve never met before. There
may be rooms for enhancements and improvements in this project, so
students are recommended to work on that to make this application a

better one. While developing the system a conscious effort has been made
to create and develop a software package, making use of available tools,
techniques and resources – that would generate a proper system for
COLLEGE SOCIAL NETWORKING. While making the system, an eye has been
kept on making it as user-friendly.

As such one may hope that the system will be acceptable to any user and
will adequately meet his/her needs. By creating this website for college, it is
aimed to strengthen the communication among users and make campus
life more lively and exciting by combining academics and cultural activities.
This social media platform will become an asset for the campus and can be
used for various productive purposes.

92
This social networking site can be further expanded to all the Colleges in
the city whereby all Students and faculties would be able to connect and
share their knowledge with each other. Also efforts can be taken to
incorporate links to various journals which students and teachers can use to
publish their papers and also get an access to other research papers. An
android application can be developed as well which would enable users to
access this social media through their mobile devices.

93
Bibliography

[1] Prof Mishra. ― Social networking sites effect 14 Jan.2014


http://articles.timesofindia.indiatimes.com/2013-06-
23/india/40146190_1.html

[2] Building a Career Path , The Washington Post, Jan. 19, 1998, pg. F05

[3] 02 Feb.2014.21 Feb.2014. .


http://www.medianama.com/2010/07/223-SNSs-in-india-the-make-of-
finding-a-dream/

[4] http://www.javazoom.net/jzservlets/uploadbean/uploadbean.html

[5] Indira Jain Social networking trends New Delhi: The Times Of India.

Books:

 System Analysis and Design – James A.Senn

 Database System Design – ElmasreeKorth

 Modern Database Management – McFadden, Hoffer, Prescott

 Software Engineering Concepts – Robert Pressman

94

You might also like