Sunteți pe pagina 1din 53

A

Project Report
On
“ONLINE ROOMMATE SEARCH”
(MINOR PROJECT)
Submitted in partial fulfillment of the requirement
For the award of the Degree of

Bachelor of Technology
IN
Computer Science

Submitted By
SAURAV GANGULY, (06ESBCS049)
HARISH KUMAR , (06ESBCS017)
B.Tech VII Sem(CSE)

January 2010
Sri Balaji College of Engineering & Technology
Benad Road Macheda, Jaipur (Raj.)-302013
(Rajasthan Technical University,Kota)

1
ACKNOWLEDGEMENT

The beatitude, bliss & euphoria that accompany the successful completion of any task would
be incomplete without the expression of the appreciation of simple virtues to the people who
made it possible. So, reverence, veneration and honors. I acknowledge all those whose
guidance and encouragement has made successful in winding up this. I owe a huge debt of
thanks to a large number of people without whom none of this would have been possible. I am
thankful to MRS. NEERAJ CHOUDHARY FACULTY(CSE) for being our mentor and for
valuable suggestions and enthusiastic interest during the entire process of the preparation of
Project.
Lastly, I extend my heartiest thanks to all those who have contributed in making this project a
success.

2
CERTIFICATE

This is to certify that the project entitled “ONLINE ROOMMATE SEARCH” is the
bonafide work carried out by SAURAV GANGULY student of B.Tech (CSE),
UNIVERSITY ROLL NO (06ESBCS049), of SRI BALAJI COLLEGE OF
ENGINEERING AND TECHNOLOGY, JAIPUR, is hereby accepted and approved as a
credible work, submitted in the partial fulfillment of the requirements of Degree of B.Tech.
(CSE) from RAJASTHAN TECHNICAL UNIVERSITY, KOTA.

Signature of the Coordinator:

Signature of the HOD:

Place:
Date:

3
ABSTRACT

INTRODUCTION

This project is basically deals with search a appropriate Roommate and Paying guest.with
addition to the knowledge of client personal information, professional information , its likes
and dislikes , habits etc. the client can hide some of the personal details as according to its
needs.

BRIEF DESCRIPTION

In this project we will make an online website which will deal with online searching of
appropriate roommate search for paying guest. In minor project we will derive few models
with different phases, to describe by different sets of attributes. Some of the page description
are:

 Client/user Registration/Login Page.


 Client/user Personal Information with Edit facility
 Search page
 Client/user requirements
 Advertisements of PG‟s and Roommates
 User request for Pg.

Thus are some basic requirements module, the whole set can be enlarge with including more
phases in it. In this project we worked on .NET platform, with C# for coding.

4
LIST OF FIGURES
S.NO. TITLE PAGE NO.

1. Entity relationship diagram 30

2. Dataflow Diagrams 31-34


2.1 0 level DFD
2.2 1-level DFD of Login page
2.3 1-level DFD of Registration page
2.4 1-level DFD of search page
3. Screenshots 36-42
3.1 Homepage
3.2 Search people
3.3 Registration page
3.4 Login page
3.5 About us
3.6 Help
3.7 Contact us
4 CodingShots 43-44
4.1 Master.aspx page
4.2 Master.cs page

5
CONTENTS

S.NO. TITLE PAGE NO.

1. Project Title 8

2. Introduction 9-13
2.1) Company Profile
3. METHODOLOGY USED 14-15
3.1) Requirement Analysis Phase

3.2 ) Design Phase

3.3) Development Phase

3.4) Coding Phase

3.5 ) Testing Phase

3.6 ) Implementation Phase

3.7 ) Post Implementation and Maintainence


4. Technology Used 16-22
4.1) Microsoft .Net Framework
4.2) ASP.NET
4.3) C#
4.4 ) SQL Server 2008
5. FEASIBILITY STUDY 23

6. Introduction To Project 24-25


6.1) Objective
6.2) Life Cycle
6.3 ) Scope
6.4) Limitations
7. System Design 26-33

6
7.1) Introduction
7.2) Steps
7.3) Database and attributes used
7.4) Entity Relationship Diagrams
7.5) Dataflow diagrams.

8 SCREENSHOTS 36-44

9 TESTING AND IMPLEMENTATIONS 45-49

10 MAINTAINENCE 50

11 CONCLUSION 51

12 BIBLOGRAPHY 52

7
1. PROJECT TITLE

“ONLINE ROOMMATE SEARCH”


„LIFE MAKE EASY‟

SUBMITTED TO: SUBMITTED BY:


MRS. NEERAJ CHOUDHARY SAURAV GANGULY (06ESBCS049)
HARISH KUMAR (06ESBCS017)

8
2. INTRODUCTION TO COMPANY

www.dzone.co.in

INTRODUCTION

DZone is a leading provider of information technology, consulting and outsourcing services.


Giving services to 100+ global corporate clients through a team of dedicated and highly skilled
set of programmers, we combine a unique onsite/offshore delivery model infused by a distinct
culture of customer satisfaction.

Here's an idea about DZone strength categorically


Promoters

Mr Hemant Sexena, graduated from Kota university, kota in 1991. He has a vast experience of
around 15 years in software analysis to development to delivery. Having worked in vast
variety of fields related to commercial, engineering and mobile applications, his innovations
and vision have been the key factor in the great success Intecons enjoys by way of the client
satisfaction and implementing some of the most difficult domain projects.

D ZONE SOFTWARES. is premier Software, Web Solution Services and Design Company
developing leading-edge solutions, products and designs for addressing the needs of businesses
.

D ZONE SOFTWARE. has an excellent and experience team of professionals from various
background and academics. We are perfectly poised to partner the client‟s business to new
levels of efficiency, profitability and growth. D ZONE SOFTWARE. offers a range of
solutions, ready-to-use packaged products, consultancy, development of customized solutions
for varied industries, human resource and training.

D ZONE SOFTWARE. with its strong technology, an effective design team and custom
product development expertise, promises to break into the top league of service providers to a
9
wide clientele. Its development center in Jaipur, India promises high quality and a competitive
cost advantage to its customers.

We provide unique end-to-end solutions to our clients in a variety of markets that really work
for them and help them to increase their work efficiency and reduce their costs. We lay
emphasis on designing customized software solutions, which are based on the present and
future business requirement of our clients. We analyze and evaluate business requirements for
our clients and design systems to help our clients in achieving their goals. Our capabilities span
both the technology and design domains. We develop and deliver products that enable our
customers to manage, secure and increase efficiency of their business.

We provide full-range service to Define, Design, Develop Deploy and support Web &
Software Application projects. Whether you have the full product specification or only the
business idea, we turn your project concept into reality. We analyze your project in order to
define goals and plan a detailed roadmap to reach those goals.
Our proven step-by-step methodology helps us maintain accurate development schedules and
documentation of development.

The company has created a niche in a very small time span and has developed solutions that
are flexible, efficient and scalable. People at D ZONE SOFTWARE work to provide its
customers with a single platform for all business solutions, develop and operate the
infrastructure and provide the client with maximum leverage to handle its day-today activities.

10
Strategy of Company

We operate as an integrated management system, combining quality, commercial and technical


disciplines into coherent approach.

 Understanding our customers needs and requirements


 Meeting or exceeding our customer‟s expectations
 Use of a practical mix of new and proven techniques and technologies
 Constant development of our staff and management expertise
 Our commitment of the continual improvement of our processes
 Propensity to innovate, creation and transparency
 Selectivity of product and producer
 Quest for excellence and perfection to offer the highest standards of service
 Exploration of the concealed energies and talents of our employee

Company performance

Expertise
All of our team members have several years of expertise developing customized, fully
integrated systems in a variety of industrial standards. D ZONE SOFTWARE Soft has a well-
managed staff to assist in meeting your needs.

Technically Advanced
Our Web development tools and products implement Object-Oriented design and
Programming. Further, we use the most modern development tools and technologies available
on the market today. We are staying on pace with the fast evolving Web development
capabilities.

Flexibility
We are custom-build to client specific requirements. We have proven to be able to react
quickly and to adjust to any changes or additions thrown at us during the course of a project.

11
Dedication
Our programmers are professionals in the truest sense of the word. When we have your
deadlines to meet we ensure the deadline is met. Our people put in whatever work is required,
whenever needed, to keep our clients happy.

Reasonable cost
India has low operating costs and low-cost labor, yet India is a world technological
superpower. Our location provides us with a rich pool of talent and low-cost environment for
operating, overhead and salaries. Therefore, we can pass on significant savings to you.
Ultimately, you'll get more for your software & web Development budget.

Expandability
For our clients' proprietary development projects, we tap a virtually unlimited supply of highly
skilled programmers and professionals.

Security
D ZONE SOFTWARE. is very concerned about the project confidentiality. We ensure that
full confidentiality of clients project is maintained while in development as well as after
completion of project.
Environments
Our areas of expertise include web solutions, client-server / distributed computing
architectures, web enabling of applications, developing Enterprise wide application (EWA),
Business Process re-engineering. These skills form the foundation of our ability to provide
complete enterprise solutions to our clients ranging from legacy system maintenance,
migration and new application development. We focus on providing complete Resource
Planning and Management solutions. We provide solutions on a wide array of platforms such
as Windows, Linux, PHP, ASP, ASP.NET, FLASH, XML, Photoshop and Macromedia Studio
MX.

The Team Profile

12
We have excellent team of skilled and experienced professionals, Engineers, Analysts and
consultants who are well qualified and experienced in their respective fields.
The team consists of qualified MCA, Industry Certified Engineers, BE, B.Tech and Post
Graduates who share their experience and expertise to make every project a confirmed success.

Our Approach & Strengths


One of the prime movers of any business of today is the provisioning of a reliable, scalable,
flexible communication infrastructure. The increasing automation and integration of
multifarious applications into the system also necessitates the need of a robust network
underpinning so that the organization can reap the benefits fast enough and sustain the edge
over its rivals. Enterprise communication needs with interests over large geographic spreads
have never been completely addressed by a single connectivity solution, and shall always
remain that way in the future. The Indian scene had two types of players in networking, one
owning the media and another owning the system/network integration skills.. Information
Technology has not always been able to address the needs of SME markets. The hurdle being
reasons like affordability, geographical reach, downtime and limited spread of quality IT
development centers locally.

13
3.) METHODLOGY USED IN WEBSITE DEVELOPMENT

The general methodology in developing a system is involved in different phases which


describe the system‟s life cycle model for developing software project. The concept includes
not only forward motion but also have the possibility to return that is cycle back to an activity
previously completed. This cycle back or feedback may occur as a result of the failure with the
system to meet a performance objective or as a result of changes in redefinition of System
activities. The basic WATERFALL MODEL is being used that is its stages. Like most
systems the life cycle of the computer based system also exhibits distinct phases. These are as
follows.

1. Requirement Analysis Phase


2. Design Phase
3. Development Phase
4. Coding Phase
5. Testing Phase
6. Implementation Phase
7. Post Implementation Phase

EXPLANATION OF DIFFERENT STAGES OF WATERFALL MODEL

REQUIREMENT ANALYSIS
This Phase includes the definition of the problem. In order to identify the problem: we have to
know information about the problem the purpose of the evaluation for the problem to be
known. We have to clearly know about the client‟s requirements and the objectives of the
project.

DESIGN
Software design is a process through which the requirements are translated into a
representation of an s/w. One of the software have been analyzed and specified, the s/w design
involves three technical activities: design, coding generation and testing. The design of the
system is in modular form i.e. the s/w is logically partitioned into components that perform
specific functions and sub functions. The Design Phase leads to modules those exhibit
independent functional characteristics .it even leads to interfaces that reduce the complexity of
the connections between modules and with that external environment. The design phase is for
main importance because in this activity decisions ultimately affects the success of software
implementation and maintains.

DEVELOPMENT
The development phase includes choosing of a suitable s/w to solve the particular problem
given the various facilities and the sophistication in the selected software gives a better
development of the problem.

14
CODING
The coding phase is for retranslating the design of the system produced during the design
phase into code in a given programming language. Which can be executed by a computer and
which performs the computation specified by the design?

TESTING
Testing is done in various ways such as testing the algorithm, programming code, sample data
debugging is one.

IMPLEMENTATION
After testing is over project is implemented by providing training to the users and providing
manuals so that they can be refreshed as and when needed

POST IMPLEMENTATION
If any problem occurs after the implemented they are removed from time to time so that so that
the users can work on the prepared system easily finally a satisfied user when all things are almost
right

15
4. MICROSOFT .NET FRAMEWORK 3.0
The Microsoft .NET Framework is a software framework that can be installed on computers
running Microsoft Windows operating systems. It includes a large library of coded solutions to
common programming problems and a virtual machine that manages the execution of
programs written specifically for the framework. The .NET Framework is a Microsoft offering
and is intended to be used by most new applications created for the Windows platform.

The framework's Base Class Library provides a large range of features including
user interface, dataaccess, databaseconnectivity,cryptography, web application development,
numeric algorithms, and network communications. The class library is used by programmers,
who combine it with their own code to produce applications.

Programs written for the .NET Framework execute in a software environment that manages the
program's runtime requirements. Also part of the .NET Framework, this runtime environment
is known as the Common Language Runtime (CLR). The CLR provides the appearance of
an application virtual machine so that programmers need not consider the capabilities of the
specific CPU that will execute the program. The CLR also provides other important services
such as security, memory management, and exception handling. The class library and the CLR
together constitute the .NET Framework.

Version 3.0 of the .NET Framework is included with Windows Server 2008, Windows Vista,
and Windows 7.

PRINCIPAL DESIGN FEATURES


INTEROPERABILITY:
Because interaction between new and older applications is commonly required, the .NET
Framework provides means to access functionality that is implemented in programs that
execute outside the .NET environment. Access to COM components is provided in the
System.Runtime.InteropServices and System.EnterpriseServices namespaces of the
framework; access to other functionality is provided using the P/Invoke feature.

COMMON RUNTIME ENGINE:

16
The Common Language Runtime (CLR) is the virtual machine component of the .NET
framework. All .NET programs execute under the supervision of the CLR, guaranteeing
certain properties and behaviours in the areas of memory management, security, and exception
handling.

LANGUAGE INDEPENDENCE:
The .NET Framework introduces a Common Type System, or CTS. The
CTS specification defines all possible data types and programming constructs supported by the
CLR and how they may or may not interact with each other. Because of this feature, the .NET
Framework supports the exchange of instances of types between programs written in any of the
.NET languages. This is discussed in more detail in Microsoft .NET Languages.

BASE CLASS LIBRARY


The Base Class Library (BCL), part of the Framework Class Library (FCL), is a library of
functionality available to all languages using the .NET Framework. The BCL provides classes
which encapsulate a number of common functions, including file reading and writing, graphic
rendering, database interaction and XML document manipulation.

SIMPLIFIED DEVELOPMENT
The .NET framework includes design features and tools that help manage the installation of
computer software to ensure that it does not interfere with previously installed software, and
that it conforms to security requirements.

SECURITY
The design is meant to address some of the vulnerabilities, such as buffer overflows, that have
been exploited by malicious software. Additionally, .NET provides a common security model
for all applications.

ASP.NET
To create dynamic web pages by using server side scripts, Microsoft has introduced ASP. The
.NET version of ASP is ASP.NET. AS.NET is a programming framework used to create
Enterprise class of efficient information management. ASP.NET allows you to build dynamic
web pages and tailors the HTML output to whatever browser you are using. It also comes with
a great set of reusable, predefined and ready to use control for your ASP.NET projects. These
reduce the amount the code you have to write, so you can be more productive while
programming. One of the most EYECATCHING things about the ASP.NET is the way you
can use any programming language based on the .NET framework, such as C#, Jscript.NET or
VB.NET to create your web application.

17
WHY ASP.NET?

Since 1995, Microsoft has been constantly working to shift its focus from Window
based platforms to the INTERNET. As a result, Microsoft introduced ASP ( Active Server
Pages) in November 1996. ASP offered the efficiency of ISAPI applications along with the
new level of simplicity that made it easy to understandable and use. However, ASP script
was an interpreted script and consisted unstructured code and was difficult to debug and
maintain.
As the web consists of many different technologies, software integration for web development
was complicated and required to understand many different technologies. Also, as applications
grew bigger in the size and became more complex, the number of lines f source code in ASP
applications increase the dramatically and was hard to maintain. Therefore, an architecture was
needed that would allow the development of a Web application in structured and consisted
way.

18
THE COMPONENTS OF ASP.NET APPLICATIONS

19
THE ARCHITECTURE OF ASP.NET APPLICATION

WORKING ON ASP.NET APPLICATION


We create an ASP.NET application by using the tools integrated with the Microsoft.NET
framework (2.0). After creation of an ASP.NET application the ASP.NET files need to be
stored on as IIS Server, which is the web Server for the Window Platform. An IIS Server
process the ASP.NET files from top to bottom and then executes the Script. Finally, the results
are sent to the web Browser that requested the ASP.NET file.

STEPS ARE :
1. A web browser sends a request for an ASP.NET file to a Web Server by using Uniform
Resource Locator (URL).
2 . The web Server, IIS, receives the request and retrieves the appropriate ASP.NET file from
the disk or Memory.
3. The Web Server forward the ASP.NET files to the ASP.NET Script Engine for processing.
4. The ASP.NET Script Engine reads the files from top to Bottom and executes any Server
side Script it encounters.
20
5 . The processed ASP.NET file is generated as an HTML document, and the ASP.NET Script
Engine sends the HTML page to the Web Server.
6 . The Web Server then sends the HTML page to the client.
7. The web Browser interprets the output and displays it.

A web server generates and sends only the HTML-OUTPUT to the client. As a result it helps
to hide the code of ASP.NET file from the user who access an ASP.NET Web pages.

These steps are also expressed by 3-Tier client Server Architecture. This architecture consists
of these three components: -
1. Web Browser (Netscape navigator, internet explorer,etc.)
2. Web Server (IIS)
3. Database Server.

The basic description of how this architecture works is as described below in the diagram:

CLIENT WEB BROWSER

WEB SERVER IIS APPLICATION SERVER

DATABASE SERVER

FEATURES OF ASP.NET SERVER


1. Complied code
2. Enriched Tool Support
3. Power and flexibility
4. Simplicity
5. Manageability
6. Security

21
C# (C SHARP) :
C# is fully Object Oriented Language like JAVA, and it is first component oriented language.
It has been designed to support the KEY feature of .NET framework; the new development
platform of Microsoft for building Component based Software Solutions. With the help of C#
language, developer can quickly implement applications and component‟s code is managed by
CLR. It becomes linear and safer.

APPLICATIONS OF C#
C# is a new language developed exclusively to suit the feature of .NET platform. It can be
used for a variety of applications that are supported by the .NET platform.
 Console Applications
 Window Applications
 Developing Windows controls
 Developing ASP.NET projects
 Creating web controls
 Providing Web services

MICROSOFT SQL SERVER 2008

Microsoft SQL Server 2008 is a relational database system that is scalable from single user
database running on a single user system such as Laptop to enterprise-wide networks and
global dotcom websites. SQL server 2008 is the eighth SQL Server release making a feature-
rich, mature and stable platform? SQL Server is a comprehensive, integrated, end-to-end data
solution that empowers people by providing a more secure, reliable and productive platform
for enterprise data applications. SQL Server 2008 also includes support for structured and
semi-structured data, including digital media formats for pictures, audio, video and other
multimedia data. The SQL Server data platform includes the following tools:
 Relational Database
 Replication Services
 Notification Services
 Integration Services
 Analysis Services
 Reporting Services
 Management Tools
 Development Tools
 Increase Productivity

22
5)FEASIBILITY STUDY

Feasibility Study is a test of the system according to its workability, impact of the
organization, ability to meet user needs and effective use of the resources.
We can test our system by different type of the feasibilities. There are 3 types of the
feasibilities which are discussed here. These are as follows:

Technical Feasibility

The proposed system is technically feasible, as the software required for developing it and the
software and hardware required for using it are easily available.

Operationally Feasibility

The proposed system is operationally feasible because it requires minimal knowledge of


working with computer for using it. The user can easily learn to use the system from the user
manual.

Since the system is partially manual and partially computerized. Therefore maintaining both
the resource become easy and feasible as compared to a fully manual system which it was
previously or a fully computerized system.

Economical Feasibility

In this we consider following costs:


1. The cost to conduct a full system investigation.
2. The cost of hardware and software for class of application being considered.
3. The benefit in the form of the reduced cost.
Our system has a lot of features at a minimum cost so it is feasible to implement and it will be
very much beneficial to the sellers in the reduced cost. It‟s software and hardware cost is also
low then the existing system.

23
6).INTRODUCTION TO THE PROJECT

SOFTWARE DEVELOPMENT LIFE CYCLE

Project Initiation and


Planning

Requirement Analysis

System Designing

Coding

Testing

Implementation

Maintenance

Project Delivery

24
PROJECT OBJECTIVE

 To get practical knowledge for preparation of websites in ASP.NET environment.


 To reduce the work efficiency to find appropriate roommate or paying guest.
 To do the publicity by transfer the contacts via RSS feed by mail portal such as yahoo,
gmail, facebook etc.
 To do more publicity by RSS feed.

PROJECT LIMITATION

 Cost: It is costly as one needs to satisfy software and hardware requirements


 Documentation: It is time consuming and requires expertise in creating good
documentation from view point of top administrators users
 Manuals: Various manuals are to be prepared such as user manuals, system manuals etc.
It needs time, human labor and are subject to change drastically as the technology
changes .

 Online Help: One needs to provide online help to various users so that all the features of the
software can be properly understood by the user
 Backup: The software requires the periodical backup, which is time consuming, requires
human labor, more resources such as Hard Disk etc.

PROJECT SCOPE
Roomate services are in high demand these days. With the world getting flatter by the day,
people have transcended physical boundaries to look for study and work options in places they
haven‟t visited before. Although a new place throws up its unique challenges, one is today well-
equipped to deal with them. The advent of the net has made this possible, with people finding it
increasingly easy to relocate to a new apartment and find a suitable roomate in no time at all.
Roomate services such as RoommateWire.com offer a marketplace where you can search for
potential roomates and also post a roomate requirement ad. Since these websites offer roomate
services regardless of the place, one finds it very convenient to search for roomates in any part
of the world. Roomate services on the internet offer different tools and features to make the
search experience highly rewarding. Sites like RoommateWire.com offer a private mailbox and
use a highly advanced search algorithm to make the search a lot more effective. With
comprehensive search options, this site makes sure that only results that meet your specific
requirements are displayed. In doing so, the time and effort taken to look for roomates is
significantly reduced. Before looking for a roomate, it is essential that one identifies personal
requirements, preferences and other such criteria for roomate selection. The last thing you want
is to end up with an inconsiderate roomate who finds it almost impossible to get along with you.
Roomate services like RoommateWire.com eliminate such problems by displaying criteria-
specific results. This helps you evaluate your options better.

25
7).SYSTEM DESIGN AND DEVELOPMENT

Introduction

System Design is a transition from a user-oriented document to a document oriented to


programmers or database personnel. It translates the system requirement into ways of operating
them and focuses on the detail implementation of the system.
The design of the proposed system has gone through logical and physical design with emphasis
on the following:-

 Preparing input/output specifications.


 Preparing security and control specification.
 Specifying the implementation plan.
 Preparing a logical design walkthrough before implementation.

Steps of Design Process

 Logical design (DFD)

In the DFD, the inputs (source), outputs (destination), Databases (data stores),
procedures (Data Flow) and boundaries of the system are described that needs the user
requirement. It specifies the user need at a level of detail that virtually determines the
information flow into and out of the system and the required data resources.
 Physical design (Database design)

This activity deals with the design of the physical database. A key is to determine how
the access paths are to be implemented. A physical path is derived from the logical path. The
relationships existing among the entities like one-to-one, one-to-many, many-to-many are
considered while designing the database. Relational structured database is used in this system.
 Program Design

In conjunction with database design is a decision on the programming language to be


used and the flowcharting, coding and debugging procedure prior to conversion.
In this application, ASP.Net is used as server side scripting while JavaScript and HTML
are used as client side scripting, which are supported by the browsers like Internet Explorer.
Visual Web Developer 2008 is used for coding.

 Database Design

The Database (collection of data) is at the core of any information system. The nature of
data stored in the database as well as the organization of the data has wide implications on the
performance of the system. A good database design should hold all the data, which may be
required by the users of the system, but at the same time, avoid any harmful or unnecessary
redundancy. The database should also be flexible so that any future change in requirements can
be incorporated with minimum changes.

26
The data in Online Roommate Site is organized in the form of 2-D relational tables.
Organization of data into tables allows easy categorization, retrieval and storage of data.
Different tables have been created for different type of information. The rules of normalization
have also been applied while designing the tables.

Since the system requirement is manipulation of data, some of the tables used are almost
static in nature and are already available with the standard data for the selection of the parameter
values. Other tables are used with bi-directional role of data i.e. for both input and output.

Once the input data is captured in the system, these may have to be preserved either for
a short or long period. These data will generally be stored in files or databases in logical
manner. The designer will have to advise the techniques of sorting and retrieving data from
these files. The system uses database, which is described as follows.

Detailed Design Specification

Complete design specification serves the following purposes:


It should be able to adequately serve as training material fir new project members, imparting
them enough information and understanding about the project implementation.
It should serve as “Objective Evidence” that the designers and/or implementers are following
through on their commitment to implement the functionality described in their requirements
specifications.

Design Consideration

General Constraints
1. The performance of the software shall also depend on the hardware configuration at the
implementation sites.
2. One of the major constraints is also the heavy volume of data to be entered for creation of
Master database. Online mutations and progress reporting cannot begin till the entire database is
initially created, validated and corrected.
3. Manual intervention cannot be fully avoided. Although the software will take care of many
aspects, the authentication and acceptance of responsibilities of the data entered still rests with
the RR section In-charge.

Design Constraints
It is imperative that the RAM and storage requirements are met. The server machines
must have minimum 256 MB RAM and 20 GB Hard disk. The client machines must have
minimum 128 MB RAM and 8 GB Hard disk.

27
Detailed System Design
Each subsection of this section will refer to or contain a detailed description of a system software
component. The discussion provided covers the following software component attributes:
 Purpose
 Input
 Processing
 Output
 Validation Checks
 Implied Requirements

DATABASE AND ATTRIBUTES USED

REGISTRATION PAGE
FIELD NAME TYPE REMARKS
Id(P.K.) Int Auto generate no.
userid Varchar(50) User id of user
password Varchar(50) password of User
Password confirm Varchar(50) Confirmation of user
Name Varchar(50) Name of user
Email address Varchar(50) Email address of user
Other detail Varchar(50) Detail explaination of user
country Varchar(50) Country of user
state Varchar(50) State of User

28
LOGIN PAGE

userid Varchar(50) User id of user


password Varchar(50) password of User

SEARCH

userid Varchar(50) User id of user


country Varchar(50) Country of user

29
Entity Relationship Diagram

id E Mail
Password

Password
Registr confirm
User User
fgbvb ation
State

Name
Country Other
detail
User
Login

User E Mail
fgbvb

Password
Name

E Mail
Search people People
City

Country
State

30
0-LEVEL DFD of website

Starting Database

Login

Home

Registra
tion

search

31
1-LEVEL DFD of login page

User id
Master Login
page form

Password

Central
Database

32
1-LEVEL DFD of Registration page

Master pages

User id

Password

Password
confirm

Name

Email

Country

State

Central
City database

33
1-LEVEL DFD of Search page

Master pages

User -id
Search

Country

State
City

Central
database
34
35
8)SCREEN SHOTS

HOME PAGE

Its a homepage of website in which we use the master page for maintain the uniqueness in
project.
Looking for roommate? Search all of the US for roommate with the best rooms absolutely free.
With our easy roommate finder system, find rooms or roommates that fit your needs.

36
SEARCH PEOPLE

This page is used to search the appropriate roommate according to its desired needs and provide
Best accommodation according to the user „s budget.

37
REGISTRATION PAGE

This is the registration page where user can register its detail to the database of the
website at the backend.

38
USER LOGIN PAGE

This is user login page where user can login into its account by entering its userid
And password.

39
ABOUT US

Detail about the webite .how it is helpful to the user for finding best roommate.

40
HELP

In this page of the website user can enter its query and can submit to us by which
in maintenance phase we can remove the problem of the user according to its
needs.

41
CONTACT US

In this page we have given the contact details of us so that user can directly
contact us for further assistance.

42
CODING PHASE

MASTER PAGE

43
MASTER . CS PAGE

44
9)TESTING AND IMPELMENTATIONS

What is testing?
Software testing is a critical element of the ultimate review of specification design and
coding. Testing of software leads to the uncovering of errors in the software functional and
performance requirements are met. Testing also provides a good indication of software
reliability and software quality as a whole. The result of different phases of testing are evaluated
and then compared with the expected results. If the errors are uncovered they are debugged and
corrected. A strategy approach to software testing has the generic characteristics:
 Testing begins at the module level and works “outwards” towards the integration of the
entire computer based system.
 Different testing techniques are appropriate at different points of time.
 Testing and debugging are different activities, but debugging must be accommodated in
the testing strate

GOALS AND OBJECTIVES

Our Objective is to design test processes that systematically uncover different classes of
errors and do so with minimum amount of time and effort Testing Principles

The basic principles that guide software testing are:

 All test cases should be traceable top customer requirements. The most severe defects
from the customer‟s point of view are those that cause the program to fail to meet its
requirements.
 Test case should be planned long before testing begins. Testing plan can begin as soon
as the requirement model is complete. Detailed definition of the test cases can begin as
soon as the design is solidified. Therefore the entire test can be planned before any code
has been generated.
 The Pareto principle applies to software testing. Stated simply the Pareto principle
implies that 80% of all errors uncovered during testing will likely to be traceable to 20%
of all program modules. The program of course is to isolate these suspect modules and to
thoroughly test them.
 Testing should begin “in the small” and progress towards “in the large”. The first test
planned and executed generally focus on the individual modules. As testing progresses

45
testing shifts focus in an attempt to find errors in integrating clusters of modules and
ultimately in the entire system.
 Exhaustive testing is not possible. The number of paths permutations for even a
moderately sized program is exceptionally large. For this reason it is impossible to
execute every combination of path during testing. It is possible however to ensure that
all conditions in the procedural design have been exercised

 To be most effective an independent third party should conduct testing. The third party
has the highest probability of finding the errors.

46
Test Case
Before the project is released, it has to have passed through a test cases suit, so that the
required functionality is met and previous functionality of the system is also not broken to do
this, there is existing test cases which checks for the previous functionality. New test cases are
prepared and added to this existing test suit to check for the added functionality. A pictorial
representation of this can be shown as follows.

New Test Case Software Output


Under
Existing Test Testing
Case

Comparator

Result of
Testing

Following types of testing are done on the System.

1. Unit Testing
The module interface is tested to ensure that information properly flows into and out of
the program unit under test. The unit testing is normally considered as an adjunct step to coding
step. Because modules are not a standalone program, drivers and/or stubs software must be
developed for each unit. A driver is nothing more than a “main program” that accepts test cases
data and passes it to the module. A stub serves to replace the modules that are subordinate to the
modules to be tested. A stub may do minimal data manipulation, prints verification of entry and
returns. Approaches used for Unit Testing were:
 Functional Test: Each part of the code was tested individually and the panels were
tested individually on all platforms to see if they are working properly.
 Performance Test: These determined the amount of execution time spent on various
parts of units and the resulting throughput, response time given by the module.
 Stress Test: A lot of test files were made to work at the same time in order to check how
much workloads can the unit bear.
47
2. Integration Testing

“If they all work individually, they should work when we put them together.” The problem
of course is “putting them together “. This can be done in two ways:
 Top down integration: Modules are integrated by moving downwards through the
control hierarchy, beginning with main control module are incorporated into the
structure in either a depth first or breadth first manner.
 Bottom up integration: It begins with construction and testing with atomic modules i.e.
modules at the lowest level of the program structure. Because modules are integrated
from the bottom up, processing required for the modules subordinate to a given level is
always available and the need of stubs is eliminated.

3. Validation Testing

Validation succeeds when software functions in a manner that can be reasonably expected
by the customer. It covers the following:-
 Validation test criteria: Performance, functional characteristics and uncovered
deviation from specification.
 Configuration review: Ensures that all the elements of software configuration have
been properly developed cataloged and have support for the maintenance phase of
software life cycle.
 Alpha Beta testing: Alpha test is conducted by developer‟s site by customer. Beta test
is conducted at one or more customer site by software end user.

Debugging
Debugging occurs as a consequence of successful testing i.e. when a test case uncovers an
error, debugging is the process that results in the removal of error. The poorly understood
mental process that connects a symptom to cause is debugging. This process will always have
one of the two outcomes:
 The cause will be found, corrected and then removed or
 The cause will not be found. In the latter case the person performing debugging may
suspect a cause, design a test case to help validate his suspicion, and then work towards
the correction of errors in the interactive fashion.

48
Scope of Future Enhancements

 Extra menu options can be added according to requirement.


 Help option can be added.
 Shortcut keys to menu option can be added.

There can be even some bugs, which we could not have covered. We please people to let
us know the bugs and enhancement required. We will be highly obliged by the people
who have made suggestion and helped us to know the uncovered bugs in the software.

As you are the user of this Software, you are our most important critic and commentator.
We value your opinion and want to know what we are doing right, what we could do
better and what areas you would like to see in this software and any other words of
wisdom you are willing to pass our way.

49
10)MAINTAINENCE

Categories

Corrective Maintenance
It means modifications made to the software to correct the defects. Defects can result from
design errors, logic errors, coding errors, data processing errors and system performance errors.

Adaptive Maintenance
It includes modifying the software to match changes in the ever-changing environment.
Environment refers to the totality of all conditions and influences which act from outside upon
the software. E.g. business rules, government policies, work patterns and software/hardware
operating platforms.

Perfective Maintenance
It means improving processing efficiency or performances, or restructuring the software to
improve changeability.

Process
The process of maintenance for given software can be divided into four stages as follows:

 Program understanding:
It consists of analyzing the program in order to understand it. The ease of understanding
the program is primarily affected by complexity and documentation of the program.
 Generate particular maintenance proposal:
The ease of generating the maintenance proposal is primarily affected by extensibility of
the program.
 Account for ripple effect:
If any change is made to any part of the system, it may affect the other parts also. Thus,
there is a kind of ripple effect from the location of modification to the other parts of the
software. The primary feature affecting the ripple effect is stability.

 Modified program testing:


The modified program is to be tested again and again to check that the software has
enhanced and reliability is validated.

50
11)Conclusion

This software will be used for “SEARCH OF APPROPRIATE ROOMMATE”. It will be used
as management tool for various activities in the Clear Edge Filtration. More precisely it will be
used to automate various functions in any Clear Edge Filtration branch in whole world. The
functions that will be covered by this software are maintaining user details, Report generation in
PDF as well as in Microsoft word. All the predefined project objectives have been achieved
with development of billing software such as:
To automate the Work order sheet activity of all the customers for various services.
To avoid maintenance of registers such as new entry, bill generation, bill payments,
modification etc.
For better management of receipt and revenue resources.
For use of various modules based on customer details.

The following objectives have been achieved with the development of billing software:

Generalized and comprehensive software package:


It is user friendly, easy to use, has good documentation
Integrated with multi-user capability:
It serves large user community, is compatible, flexible, can be upgraded as per the requirements.
Stored information has been indexed, thus, retrieval of information is fast.
Menu driven:
It has been designed with Visual Studio as front end, which serves as one of the best software for
creation of forms. All input/output screens have been put in their corresponding menus and sub-
menus. This menu-driven approach adds value to the software.
Modularized approach:
It has been developed using modular approach. Sub-modules are designed and integrated with main
module. Finally, these main modules are combined with the overall project, thus, eliminating bypass
of even a minor requirement of user.

Supporting utility:

It provides continuous support to users. Various software guides and directories have been attached
with the software. Reviews are being conducted periodically.
No software package can meet all requirements of a given RR section. Inevitably, some
compromises will be needed in workflows, inputs, outputs, report formats. Customization takes lots
of time, by doing that, other problems could arise.

51
12)Bibliography

1. Unleashed ASP .NET - Walther and Stephen

2. Professional ASP. NET 2.0 - Wrox Publications

3. Beginning ASP. NET 2.0 - Wrox Publications

4. Websites:-

 www.asp.net

 www.java2s.com

 www.codeproject.com

 www.dotnetspiders.com

52
53

S-ar putea să vă placă și