Documente Academic
Documente Profesional
Documente Cultură
Project
Management
Chapt
er 1
Abstr
act
Chapt
er 2
Project
Synopsis
The entire project has been developed keeping in view of the distributed client
server computing technology, in mind. The specification have been normalized
up to 3NF to eliminate all the anomalies that may arise due to the database
transaction that are executed by the general users and the organizational
administration. The user interfaces are browser specific to give distributed
accessibility for the overall system. The internal database has been selected as
MS-SQL server 200.The basic constructs of tablespaces, clusters and indexes
have been exploited to provide higher consistency and reliability for the data
storage. The MS-SQL server 200 was a choice as it provides the constructs of
high-level reliability and security. The total front end was dominated using the
ASP.Net technologies. At all proper levels high care was taken to check that
the system manages the data consistency with proper business rules or
validations. The database connectivity was planned using the latest SQL
Connection technology provided by Microsoft Corporation. The authentication
and authorization was crosschecked at all the relevant stages. The user level
accessibility has been restricted into two zones namely. The administrative
zone and the normal user zone.
Manual Process
First Phase
A software
contract is
signed
The process of
development
starts
in
connection to
each
professionals
responsibility
The details of
the client and
the
software
deliverablesdata
are mained as
history
in
respective
registers spread
sheets.
The
s/w
professionals
are
assigned
through
their responsibilities
and are put onto the
allocated work.
The
specification
collection
in
charge
is
recognized and
his credentials
are stored.
A
team
of
s/w
professionals
is
identified
for
the
purpose
and
their
specifications
are
recorded.
Second Phase
The
developer
needs some
library
information
Proceed with
the
development
process in an
integrated
approach.
He
needs
to
collect
the
information
of
available
libraries
If found to be proper
then
copy
the
libraries
into
his
required areas.
Cross
verify
the
standards as per
the requirements
and flexible.
2. The contract signed clients details are readily available at any
or element design can be found out very easily and very quickly.
8. The application at peak stages can make the Bug tracking and
Chapt
er 3
Fe a s i b i l
ity
Report
Technical Descriptions
Databases: The total number of databases has been identified as 22
entities.
The
major
part
of
the
databases
is
categorized
as
The operational or generic user interface helps the users upon the
system in transactions through the existing data and required services.
The operational user interface also helps the ordinary users in managing
their own information helps the ordinary users in managing their own
information in a customized manner as per the assisted flexibilities.
Number of Modules
Information
Module:
This
module
handles
the
used
by
the
organization
in
their
project
The module also serves to build on online help like system for the
sake of user convenience and serves as a reference material to
the developers as well as users.
6.Employees performance management module: This module
maintains the specific time levels taken by the employer in
completing his tasks in turn serving the project analysis team to
get the history of employees response towards an assigned task.
The information from this module can be used as a cross referential
check to know the rating levels of the employee as designated
within the company.
7.Report designing module: This module practically manges the
descriptive reports that are necessary within the organization as
per the requirements of the information format at different levels of
designations or departments.
Chapter 4
Analysis
Report
SRS
Document:
of
my
Bachelors
Degree
Masters
Degree
from
general
document
was
provided
by
the
industry
as
system
as
stated
by
my
project
leader
the
actual
of
interviews
and
questionnaires.
The
collected
overall
documents
for
this
project
use
the
recognized
Feature
Reliability
C o n c u r r e n c y, s c a l a b i l i t y, a n d r e l i a b i l i t y a r e
improved with simplified data structures and
algorithms. Run-time checks of critical data
structures make the database much more robust,
minimizing the need for consistency checks.
Scalability
Ease of Use
Feature
D a t a Typ e
Sizes
Databases
and Files
Dynamic
Memory
Dynamic
Row- Level
Locking
Dynamic
Space
Management
Evolution
Large
Memory
Support
Unicode
Unix
systems
in
1983.These
new
formats
scale
from
low-end
to
high-end
systems,
improving
p e r f o r m a n c e a n d m a n a g e a b i l i t y.
Benefits
There are many benefits of the new on-disk layout, including:
Utilities
for
backup
and
restore,
checking, and bulk data loading.
consistency
Description
Primary
data file
Secondary
data files
These files are optional and can hold all data and
objects that are not on the primary data file. Some
databases may not have any secondary data files,
while others have multiple secondary data files.
Log files
These
files
hold
all
of
the
transaction
log
information used to recover the database. Every
database has at least one log file.
Filegroups
A database now consists of one or more data files and one or
more log files. The data files can be grouped together into
u s e r - d e f i n e d f i l e g r o u p s . Tab l e s a n d i n d e x e s c a n t h e n b e
mapped to different filegroups to control data placement on
physical
disks.
Filegroups
are
a
convenient
unit
of
a d m i n i s t r a t i o n , g r e a t l y i m p r o v i n g f l e x i b i l i t y. S Q L S e r v e r 7 . 0
will allow you to back up a different portion of the database
each night on a rotating schedule by choosing which filegroups
to back up. Filegroups work well for sophisticated users who
know where they want to place indexes and tables. SQL Server
7.0 can work quite effectively without filegroups.
Log files are never a part of a filegroup. Log space is managed
separately from data space.
Using Files and Filegroups
Using files and filegroups improves database performance by
allowing a database to be created across multiple disks,
multiple disk controllers, or redundant array of inexpensive
disks (RAID) systems. For example, if your computer has four
disks, you can create a database that comprises three data
files and one log file, with one file on each disk. As data is
accessed, four read/write heads can simultaneously access the
data
in
parallel,
which
speeds
up
database
o p e r a t i o n s . A d d i t i o n a l l y, f i l e s a n d f i l e g r o u p s a l l o w b e t t e r d a t a
placement because a table can be created in a specific
filegroup. This improves performance because all I/O for a
specific table can be directed at a specific disk. For example, a
heavily used table can be placed on one file in one filegroup
and located on one disk. The other less heavily accessed tables
in the database can be placed on other files in another
filegroup, located on a second disk.
Space Management
There are many improvements in the allocations of space and
the management of space within files. The data structures that
keep track of page-to-object relationships were redesigned.
Instead of linked lists of pages, bitmaps are used because they
are cleaner and simpler and facilitate parallel scans. Now each
f i l e i s m o r e a u t o n o m o u s ; i t h a s m o r e d a t a a b o u t i t s e l f, w i t h i n
itself. This works well for copying or mailing database files.
SQL Server now has a much more efficient system for tracking
table space. The changes enable
c o n f i g u r e d t o g r o w a u t o m a t i c a l l y, b u t o n l y t o a p r e d e f i n e d
maximum size. This prevents disk drives from running out of
space.
Allowing files to grow automatically can cause fragmentation of
those files if a large number of files share the same disk.
Therefore, it is recommended that files or filegroups be
created on as many different local physical disks as available.
Place objects that compete heavily for space in different
filegroups.
Contains
Data
Index
Index entries
Log
Tex t / I m a g e
Tex t , n t e x t , a n d i m a g e d a t a
Global
Map
Index
Map
c o n s i s t e n c y. I n S Q L
NT does I/O in 512possible for a page
if there is a power
when the first 512of the 8 KB of I/O.
There are several ways to deal with this. One way is to use
battery-backed cached I/O devices that guarantee all-ornothing I/O. If you have one of these systems, torn page
d e t e c t i o n i s u n n e c e s s a r y.
In SQL Server 7.0, you can enable torn page detection for a
particular database by turning on a database option.
Locking Enhancements
Row-Level Locking
SQL Server 6.5 introduced a limited version of row locking on
inserts. SQL Server 7.0 now supports full row-level locking for
b o t h d a t a r o w s a n d i n d e x e n t r i e s . Tra n s a c t i o n s c a n u p d a t e
i n d i v i d u a l r e c o r d s w i t h o u t l o c k i n g e n t i r e p a g e s . M a n y O LTP
a p p l i c a t i o n s c a n e x p e r i e n c e i n c r e a s e d c o n c u r r e n c y, e s p e c i a l l y
when applications append rows to tables and indexes.
Dynamic Locking
SQL Server 7.0 has a superior locking mechanism that is
u n i q u e i n t h e d a t a b a s e i n d u s t r y. A t r u n t i m e , t h e s t o r a g e
engine dynamically cooperates with the query processor to
choose
the
lowest-cost
locking
s t r a t e g y, b a s e d
on
the
c h a r a c t e r i s t i c s o f t h e s c h e m a a n d q u e r y.
Dynamic locking has the following advantages:
Lock Modes
SQL Server locks resources using different lock modes that
determine how the resources can be accessed by concurrent
transactions.
SQL Server uses several resource lock modes:
Lock mode
Description
Shared
Update
Used
on
resources
that
can
be
updated.
Prevents a common form of deadlock that
occurs when multiple sessions are reading,
locking, and then potentially updating resources
l a t e r.
Exclusive
Intent
U s e d t o e s t a b l i s h a l o c k h i e r a r c h y.
Schema
Table Indexes
A SQL Server index is a structure associated with a table that
speeds retrieval of the rows in the table. An index contains
keys built from one or more columns in the table. These keys
are stored in a structure that allows SQL Server to quickly and
efficiently find the row or rows associated with the key values.
This structure is called a heap. The two types of SQL Server
indexes are clustered and nonclustered indexes
Clustered Indexes
A clustered index is one in which the order of the values in the
index is the same as the order of the data stored in the table.
The clustered index contains a hierarchical tree. When
searching for data based on a clustered index value, SQL
Server quickly isolates the page with the specified value and
then searches the page for the record or records with the
specified value. The lowest level, or leaf node, of the index
tree is the page that contains the data.
Nonclustered Indexes
A nonclustered index is analogous to an index in a textbook.
T h e d a t a i s s t o r e d i n o n e p l a c e ; t h e i n d e x i s s t o r e d i n a n o t h e r,
with pointers to the storage location of the indexed items in
the data. The lowest level, or leaf node, of a nonclustered
i n d e x i s t h e R o w I d e n t i f i e r o f t h e i n d e x e n t r y, w h i c h g i v e s S Q L
Server the location of the actual data row. The Row Identifier
can have one of two forms. If the table has a clustered index,
t h e i d e n t i f i e r o f t h e r o w i s t h e c l u s t e r e d i n d e x k e y. I f t h e t a b l e
is a heap, the Row Identifier is the actual location of the data
row, indicated with a page number and offset on the page.
Therefore, a nonclustered index, in comparison with a
clustered index, has an extra level between the index structure
and the data itself.
When SQL Server searches for data based on a nonclustered
index, it searches the index for the specified value to obtain
the location of the rows of data and then retrieves the data
from their storage locations. This makes nonclustered indexes
the optimal choice for exact-match queries.
Some books contain multiple indexes. Since nonclustered
indexes frequently store clustered index keys as their pointers
Normalization
Normalization is the concept of analyzing the inherent or
normal
relationships
between
the
various
elements
of
Third
normal
form:
Involves
removing
the
transitive
effective
data
storage
can
be
achieved
select, update, and delete. SQL *plus 3.3 can be accessed only
by giving the valid username and password. This is one of the
security features imposed by oracle to restrict unauthorized
data accessed. SQL allows provides commands for creating new
users, granting privileges etc.
All such features of SQL*plus make it a power data access tool
especially for oracle products.
MS.NET
Overview of the .NET Framework
The
.NET
Framework
is
new
computing
platform
that
of
the
Internet.
The
.NET
Framework
is
To p r o v i d e a c o n s i s t e n t o b j e c t - o r i e n t e d p r o g r a m m i n g
environment
executed
whether
l o c a l l y,
object
executed
code
is
locally
stored
but
and
Internet-
d i s t r i b u t e d , o r e x e c u t e d r e m o t e l y.
To
provide
minimizes
code-execution
software
deployment
environment
and
that
versioning
conflicts.
To
provide
code-execution
environment
that
To
provide
code-execution
environment
that
To m a k e t h e d e v e l o p e r e x p e r i e n c e c o n s i s t e n t a c r o s s
widely
varying
Windows-based
applications.
types
of
applications,
applications
and
such
as
W eb - b a s e d
To b u i l d a l l c o m m u n i c a t i o n o n i n d u s t r y s t a n d a r d s t o
ensure that code based on the .NET Framework can
integrate with any other code.
language
runtime
is
the
foundation
of
the
.NET
F r a m e w o r k . You c a n t h i n k o f t h e r u n t i m e a s a n a g e n t t h a t
manages code at execution time, providing core services such
as memory management, thread management, and remoting,
while also enforcing strict type safety and other forms of code
accuracy
that
ensure
security
and
robustness.
In
fact,
the
of
applications
graphical
reusable
types
that
ranging
from
traditional
user
interface
(GUI)
you
can
use
to
develop
command-line
applications
to
or
applications
b a s e d o n t h e l a t e s t i n n o v a t i o n s p r o v i d e d b y A S P.N E T, s u c h a s
Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components
that load the common language runtime into their processes
and initiate the execution of managed code, thereby creating a
software
environment
that
can
exploit
both
managed
and
environment
for
managed
code.
A S P.N E T
works
d i r e c t l y w i t h t h e r u n t i m e t o e n a b l e W eb F o r m s a p p l i c a t i o n s a n d
X M L W eb s e r v i c e s , b o t h o f w h i c h a r e d i s c u s s e d l a t e r i n t h i s
topic.
Internet Explorer is an example of an unmanaged application
that hosts the runtime (in the form of a MIME type extension).
Using Internet Explorer to host the runtime enables you to
embed
HTML
managed
components
documents.
managed
Hosting
mobile
code
or
the
Windows
runtime
(similar
to
in
Forms
controls
this
way
Microsoft
in
makes
ActiveX
code
execution,
code
safety
verification,
to
the
managed
language runtime.
With
regards
to
s e c u r i t y,
managed
components
are
that
include
their
origin
(such
as
the
Internet,
access
their
security
personal
features
of
data,
the
file
system,
runtime
thus
or
network.
enable
The
legitimate
runtime
implementing
also
a
enforces
strict
code
type-
robustness
and
by
code-verification
Microsoft
and
managed
code
generate
third-party
that
language
conforms
to
compilers
the
CTS.
This
addition,
the
managed
environment
of
the
runtime
to
being
objects,
used.
releasing
This
them
automatic
when
memory
they
are
no
management
programmers
can
write
applications
in
their
runtime
language,
greatly
existing applications.
easing
the
migration
process
for
between
developers
to
managed
continue
and
to
unmanaged
code
necessary
COM
use
runtime
Although
the
standard
is
designed
common
runtime
A
enables
managed
all
feature
enhance
language
services,
interpreted.
to
called
code
to
runtime
managed
in
provides
code
just-in-time
run
performance.
the
is
(JIT)
many
never
compiling
native
machine
memory
fragmented
manager
memory
and
removes
the
increases
possibilities
memory
of
locality-of-
best
enterprise
servers
that
support
runtime
hosting.
Common Type System
The common type system defines how types are declared,
used, and managed in the runtime, and is also an important
part of the runtime's support for cross-language integration.
The common type system performs the following functions:
Establishes
integration,
type
execution.
framework
s a f e t y,
that
and
enables
high
cross-language
performance
code
Provides
an
object-oriented
model
that
supports
the
rules
that
that
languages
objects
written
must
in
follow,
different
which
helps
languages
can
i n t e r a c t w i t h e a c h o t h e r.
I n T h i s S e c t i o n C o m m o n Typ e S y s t e m O v e r v i e w
Describes
concepts
and
defines
terms
relating
to
the
events,
properties,
and
fields,
concepts
nested
such
as
types,
methods,
member
and
overloading,
the
characteristics
of
common
language
runtime
Delegates
Describes
the
delegate
object,
which
alternative to unmanaged function pointers.
is
Arrays
Describes common language runtime array types.
the
managed
Interfaces
Describes characteristics of interfaces and the restrictions on
interfaces imposed by the common language runtime.
Pointers
Describes
managed
pointers,
unmanaged function pointers.
unmanaged
pointers,
and
Related Sections
. NET Framework Class Library
Provides a reference to the classes, interfaces, and value types
included in the Microsoft .NET Framework SDK.
Common Language Runtime
Describes
the
execution
of
run-time
code
environment
and
provides
that
application
manages
the
development
services.
Cross-Language Interoperability
The common language runtime provides built-in support for
language
guarantee
language
i n t e r o p e r a b i l i t y.
that
can
H o w e v e r,
developers
use
code
you
using
write.
this
support
another
To e n s u r e
does
not
programming
that
you
can
rules
for
using
them
called
the
Common
Language
CLS
plays
in
enabling
guaranteed
cross-language
i n t e r o p e r a b i l i t y. C L S f e a t u r e s a n d r u l e s a r e i d e n t i f i e d a n d C L S
compliance is discussed.
In This Section
Language Interoperability
Describes built-in support for cross-language interoperability
and introduces the Common Language Specification.
the
need
for
set
of
features
common
to
all
the
common
language
runtime's
mechanism
for
that
tightly
integrate
with
the
common
language
also
features
reduces
of
the
the
.NET
time
associated
Framework.
In
with
learning
addition,
new
third-party
set
of
interfaces
that
you
can
use
to
develop
your
own
c o l l e c t i o n c l a s s e s . You r c o l l e c t i o n c l a s s e s w i l l b l e n d s e a m l e s s l y
with the classes in the .NET Framework.
As
you
would
expect
from
an
object-oriented
class
l i b r a r y,
programming
tasks,
including
tasks
such
as
string
m a n a g e m e n t , d a t a c o l l e c t i o n , d a t a b a s e c o n n e c t i v i t y, a n d f i l e
access. In addition to these common tasks, the class library
includes
types
that
support
variety
of
specialized
Console applications.
ASP.NET applications.
Windows services.
of
reusable
types
that
vastly
simplify
Windows
GUI
d e v e l o p m e n t . I f y o u w r i t e a n A S P.N E T W e b F o r m a p p l i c a t i o n ,
you can use the Web Forms classes.
Client Application Development
Client
applications
application
in
are
the
closest
Windows-based
to
traditional
programming.
These
style
are
of
the
environment
that
drastically
simplifies
the
attributes
d i r e c t l y,
and
in
these
cases
the
.NET
ways
developer
in
which
interface,
the
.NET
making
Framework
coding
integrates
simpler
and
the
more
consistent.
Unlike ActiveX controls, Windows Forms controls have semit r u s t e d a c c e s s t o a u s e r ' s c o m p u t e r. T h i s m e a n s t h a t b i n a r y o r
natively executing code can access some of the resources on
the
user's
access)
system
without
(such
being
as
able
GUI
to
elements
access
or
and
limited
compromise
file
other
r e s o u r c e s . B e c a u s e o f c o d e a c c e s s s e c u r i t y, m a n y a p p l i c a t i o n s
that once needed to be installed on a user's system can now be
safely
deployed
implement
the
through
features
d e p l o y e d l i k e a W eb p a g e .
the
of
Web.
local
You r
applications
application
while
can
being
obtain
the
benefits
provided
by
the
common
language
Framework.
functions:
An
assembly
performs
the
following
intermediate
language
(MSIL)
code
in
portable
a version
b o u n d a r y. T h e
assembly is
the
smallest
specify
for
any
dependent
assemblies.
For
more
i n f o r m a t i o n a b o u t v e r s i o n i n g , s e e A s s e m b l y Ve r s i o n i n g
It forms a deployment unit. When an application starts, only
the
assemblies
that
the
application
initially
calls
must
be
containing
utility
classes,
can
be
retrieved
on
to
disk
before
execution.
You
can
save
dynamic
are
several
ways
to
create
assemblies.
You
can
use
d e v e l o p m e n t t o o l s , s u c h a s V i s u a l S t u d i o . N E T, t h a t y o u h a v e
u s e d i n t h e p a s t t o c r e a t e . d l l o r . e x e f i l e s . You c a n u s e t o o l s
provided in the .NET Framework SDK to create assemblies with
m o d u l e s c r e a t e d i n o t h e r d e v e l o p m e n t e n v i r o n m e n t s . You c a n
also use common language runtime APIs, such as Reflection.
Emit, to create dynamic assemblies.
Server Application Development
Server-side applications in the managed world are implemented
through
runtime
hosts.
Unmanaged
applications
host
the
code
Servers
such
running
as
IIS
in
and
different
SQL
Server
server
can
environments.
perform
standard
the
.NET
Framework
to
target
W eb - b a s e d
applications.
H o w e v e r, A S P.N E T i s m o r e t h a n j u s t a r u n t i m e h o s t ; i t i s a
c o m p l e t e a r c h i t e c t u r e f o r d e v e l o p i n g We b s i t e s a n d I n t e r n e t d i s t r i b u t e d o b j e c t s u s i n g m a n a g e d c o d e . B o t h We b F o r m s a n d
XML
W eb
services
mechanism
for
use
IIS
and
applications,
A S P.N E T
and
both
as
have
the
a
publishing
collection
of
W eb
services,
an
important
evolution
in
W eb - b a s e d
t e c h n o l o g y, a r e d i s t r i b u t e d , s e r v e r - s i d e a p p l i c a t i o n c o m p o n e n t s
similar
to
common
W eb
sites.
H o w e v e r,
unlike
We b - b a s e d
targeted
Netscape
reusable
for
browsers
N a v i g a t o r.
software
such
Instead,
XML
components
as
Internet
Web
designed
Explorer
services
to
be
and
consist
of
consumed
by
o t h e r a p p l i c a t i o n s , s u c h a s t r a d i t i o n a l c l i e n t a p p l i c a t i o n s , W eb based
result,
applications,
XML
application
W eb
or
even
services
development
and
other
XML
technology
Web
is
deployment
services.
rapidly
into
the
As
moving
highly
in
any
language
that
supports
the
.NET
Framework.
In
addition, your code no longer needs to share the same file with
your
HTTP
text
(although
it
can
continue
to
do
so
if
you
to
aid
in
development
and
consumption
of
XML
Web
s e r v i c e s a p p l i c a t i o n s . X M L We b s e r v i c e s a r e b u i l t o n s t a n d a r d s
such
as
SOAP
extensible
(a
data
remote
procedure-call
format),
and
WSDL
protocol),
(the
Web
XML
(an
Services
to
promote
interoperability
with
non-Microsoft
solutions.
For
example,
the
W eb
Services
Description
Language
tool
i n c l u d e d w i t h t h e . N E T F r a m e w o r k S D K c a n q u e r y a n X M L W eb
s e r v i c e p u b l i s h e d o n t h e W eb , p a r s e i t s W S D L d e s c r i p t i o n , a n d
produce C# or Visual Basic source code that your application
can use to become a client of the XML Web service. The source
code
can
library
create
that
classes
handle
all
derived
the
from
underlying
classes
in
the
class
communication
using
SOAP and XML parsing. Although you can use the class library
to
consume
XML
Web
services
d i r e c t l y,
the
W eb
Services
facilitate
Framework.
your
development
efforts
with
the
.NET
I f you develop and publish your own XML Web service, the .NET
Framework provides a set of classes that conform to all the
u n d e r l y i n g c o m m u n i c a t i o n s t a n d a r d s , s u c h a s S O A P, W S D L , a n d
XML. Using those classes enables you to focus on the logic of
your
service,
without
concerning
yourself
with
the
XML
Web
service
will
run
with
the
speed
of
native
.NET
Framework.
This
section
provides
conceptual
the
ADO.NET
architecture
and
how
to
use
the
sources
including
Microsoft
SQL
S e r v e r,
OLE
DB
data
using
.NET
Objects
in
Other
Application
Domains
Remoting
Describes the various communications methods available in the
.NET Framework for remote communications.
how
to
create
events
that
are
raised
on
reoccurring intervals.
Developing Components
Provides
an
overview
of
component
programming
and
the
set
of
managed
types
in
the
how
you
can
use
attributes
to
customize
metadata.
Generating
and
Compiling
Source
Code
Dynamically
in
Multiple Languages
Explains
the
.NET
Framework
SDK
mechanism
called
the
including
stacks,
queues,
lists,
arrays,
and
structs.
Handling and Raising Events
Provides
an
overview
of
the
event
model
in
the
.NET
Framework.
Handling and Throwing Exceptions
Describes error handling provided by the .NET Framework
and the fundamentals of handling exceptions.
into
process,
creates
the
application
domain
how
to
create
applications
using
Windows
of
system
management
services
built
in
to
the
to
build
complex
messaging
into
your
Processing Transactions
Discusses the .NET Framework support for
transactions.
Programming Essentials for Garbage Collection
Discusses how the garbage collector manages memory and
h o w y o u c a n p r o g r a m t o u s e m e m o r y m o r e e f f i c i e n t l y.
how
to
create
and
work
with
assemblies
and
application domains.
Securing Applications
D e s c r i b e s . N E T F r a m e w o r k c o d e a c c e s s s e c u r i t y, r o l e - b a s e d
s e c u r i t y, s e c u r i t y p o l i c y, a n d s e c u r i t y t o o l s .
Serializing Objects
Discusses XML serialization.
Creating System Monitoring Components
Discusses how to use performance counters and event logs
with your application.
Threading
Explains the runtime support for threading and
program using various synchronization techniques.
how
to
how
you
can
perform
synchronous
and
how
to
configure
and
register
serviced
Discusses
how
to
create
and
optimize
A S P.N E T
Web
applications.
Creating Windows Forms Applications
Describes
how
to
create
Windows
Forms
and
Windows
controls applications.
Building Console Applications
Discusses how to create console-based .NET applications.
Introduction to ASP.NET
A S P.N E T
is
more
than
the
next
version
of
Active
Server
P a g e s ( A S P ) ; i t i s a u n i f i e d W eb d e v e l o p m e n t p l a t f o r m t h a t
provides
the
services
necessary
for
developers
to
build
e n t e r p r i s e - c l a s s W eb a p p l i c a t i o n s . W h i l e A S P.N E T i s l a r g e l y
syntax
compatible
programming
with
model
and
scalable,
and
stable
augment
your
existing
A S P,
it
also
provides
infrastructure
applications.
ASP
for
You
more
can
applications
feel
by
new
secure,
free
to
incrementally
a d d i n g A S P.N E T f u n c t i o n a l i t y t o t h e m .
A S P.N E T i s a c o m p i l e d , . N E T-b a s e d e n v i r o n m e n t ; y o u c a n
author
applications
including
Visual
in
Basic
any
.NET
. N E T,
compatible
C#,
and
language,
JScript
. N E T.
A d d i t i o n a l l y, t h e e n t i r e . N E T F r a m e w o r k i s a v a i l a b l e t o a n y
A S P.N E T
application.
Developers
can
easily
access
the
language
runtime
environment,
type
s a f e t y,
has
been
HTML
designed
editors
and
to
work
other
seamlessly
programming
with
tools,
i n c l u d i n g M i c r o s o f t V i s u a l S t u d i o . N E T. N o t o n l y d o e s t h i s
m a k e W eb d e v e l o p m e n t e a s i e r, b u t i t a l s o p r o v i d e s a l l t h e
b e n e f i t s t h a t t h e s e t o o l s h a v e t o o f f e r, i n c l u d i n g a G U I t h a t
developers can use to drop server controls onto a Web page
and fully integrated debugging support.
Developers can choose from the following two features when
creating
an
A S P.N E T
application,
W eb
Forms
and
Web
schemes,
cache
frequently
used
data,
or
building
these
pages, you
can
use
A S P.N E T
W eb
components,
Form
out
simplifying
of
the
reusable
code
of
built-in
a
page.
or
custom
For
more
firewalls.
particular
XML
component
Web
services
are
technology
or
not
tied
to
object-calling
you
have
ASP
development
skills,
the
new
A S P.N E T
p r o g r a m m i n g m o d e l w i l l s e e m v e r y f a m i l i a r t o y o u . H o w e v e r,
t h e A S P.N E T
A S P,
making
it
more
structured
and
object-oriented.
U n f o r t u n a t e l y t h i s m e a n s t h a t A S P.N E T i s n o t f u l l y b a c k w a r d
compatible; almost all existing ASP pages will have to be
m o d i f i e d t o s o m e e x t e n t i n o r d e r t o r u n u n d e r A S P.N E T. I n
addition,
existing
major
ASP
changes
pages
to
Visual
Basic
with
Visual
written
.NET
mean
Basic
that
Scripting
E d i t i o n t y p i c a l l y w i l l n o t p o r t d i r e c t l y t o A S P.N E T. I n m o s t
cases, though, the necessary changes will involve only a few
lines of code. For more information, see Migrating from ASP
t o A S P.N E T
A c c e s s i n g d a t a b a s e s f r o m A S P.N E T a p p l i c a t i o n s i s a n o f t e n used
technique
for
displaying
data
to
Web
site
visitors.
A S P.N E T m a k e s i t e a s i e r t h a n e v e r t o a c c e s s d a t a b a s e s f o r
this purpose. It also allows you to manage the database
from your code. For more information, see Accessing Data
w i t h A S P.N E T
A S P.N E T
provides
simple
model
that
enables
W eb
allows
you
to
include
custom
events
that
takes
advantage
of
performance
enhancements
it
has
been
performance
improvements
designed
over
to
ASP
offer
and
significant
other
W eb
d e v e l o p m e n t p l a t f o r m s . A l l A S P.N E T c o d e i s c o m p i l e d , r a t h e r
than interpreted, which allows early binding, strong typing,
and just-in-time (JIT) compilation to native code, to name
o n l y a f e w o f i t s b e n e f i t s . A S P.N E T i s a l s o e a s i l y f a c t o r a b l e ,
meaning
that
developers
module,
for
instance)
can
that
remove
are
modules
not
(a
relevant
session
to
the
application
extensive
they
are
caching
developing.
services
A S P.N E T
(both
also
built-in
provides
services
and
c a c h i n g A P I s ) . A S P.N E T a l s o s h i p s w i t h p e r f o r m a n c e c o u n t e r s
that developers and system administrators can monitor to
test
new
applications
applications.
For
more
and
gather
metrics
information,
see
on
existing
A S P.N E T
Caching
F e a t u r e s a n d A S P.N E T O p t i m i z a t i o n
Writing custom debug statements to your Web page can help
immensely
in
troubleshooting
your
application's
code.
H o w e v e r, i t c a n c a u s e e m b a r r a s s m e n t i f i t i s n o t r e m o v e d .
The problem is that removing the debug statements from
your pages when your application is ready to be ported to a
production
server
can
require
significant
effort.
A S P.N E T
o f f e r s t h e Tra c e C o n t e x t c l a s s , w h i c h a l l o w s y o u t o w r i t e
custom
debug
statements
to
your
pages
as
you
develop
them. They appear only when you have enabled tracing for a
page or entire application. Enabling tracing also appends
d e t a i l s a b o u t a r e q u e s t t o t h e p a g e , o r, i f y o u s o s p e c i f y, t o
a custom trace viewer that is stored in the root directory of
y o u r a p p l i c a t i o n . F o r m o r e i n f o r m a t i o n , s e e A S P.N E T Tra c e
The
.NET
authorization
Framework
and
and
A S P.N E T
authentication
provide
schemes
default
for
W eb
a p p l i c a t i o n s . You c a n e a s i l y r e m o v e , a d d t o , o r r e p l a c e t h e s e
schemes, depending upon the needs of your application. For
m o r e i n f o r m a t i o n , s e e A S P.N E T W e b A p p l i c a t i o n S e c u r i t y
A S P.N E T
configuration
settings
are
stored
in
X M L- b a s e d
extend
the
configuration
scheme
to
suit
your
requirements.
For
more
information,
see
A S P.N E T
Configuration
Building Applications
The
.NET
Framework
applications
Windows
and
Forms
enables
services,
powerful
including
applications,
and
new
A S P.N E T
Windows
Web-based
applications,
services.
This
section contains instructive overviews and detailed, step-bystep procedures for creating applications.
This section
also
includes information
on
using the
.NET
for
authoring
custom
components
and
controls.
Creating ASP.NET Web Applications
Provides the information you need to develop enterprisec l a s s W e b a p p l i c a t i o n s w i t h A S P.N E T.
Creating Windows Forms Applications
Introduces
Windows
Forms,
the
new
object-oriented
creating,
installing,
starting,
and
stopping
the
.NET
Framework's
rich
design-time
how
to
test
and
profile
.NET
Framework
applications.
Deploying Applications
Shows how to use the .NET Framework and the common
language
runtime
to
create
self-described,
self-contained
applications.
Configuring Applications
Explains
how
developers
and
administrators
can
apply
environment
must
be
configured
to
enable
of
source
code
that
generate
the
most
frequently
If
Visual
Studio
.NET
is
not
installed,
you
can
common
language
runtime
Debugger
( D b g C L R . e x e ) , w h i c h i s a W i n d o w s d e b u g g e r.
The
.NET
Framework
namespace
System.
Diagnostics
i n c l u d e s t h e Tra c e a n d D e b u g c l a s s e s f o r t r a c i n g e x e c u t i o n
flow, and the Process, Event Log, and Performance Counter
classes
for
debugger
profiling
can
be
code.
used
to
The
Cordbg.exe
debug
managed
command-line
code
from
the
c o m m a n d - l i n e i n t e r p r e t e r. D b g C L R . e x e i s a d e b u g g e r w i t h
the familiar Windows interface for debugging managed code.
It is located in the Microsoft.NET/FrameworkSDK/GuiDebug
f o l d e r.
Enabling JIT-attach Debugging
S h o w s h o w t o c o n f i g u r e t h e r e g i s t r y t o J I T-a t t a c h a d e b u g
engine to a .NET Framework application.
how
to
set
environment
variables
to
tie
.NET
F r a m e w o r k a p p l i c a t i o n t o a p r o f i l e r.
Introduction to ASP.NET Server Controls
When you create Web Forms pages, you can use these types
of controls:
HTML server controls
y o u t o t e s t a u s e r ' s i n p u t . You a t t a c h a v a l i d a t i o n c o n t r o l t o
an input control to test what the user enters for that input
control.
Val i d a t i o n
controls
are
provided
to
allow
you
to
controls
Controls
that
you
create
as
W eb
Forms
p a g e s . You c a n e m b e d W eb F o r m s u s e r c o n t r o l s i n o t h e r W e b
Forms
pages,
which
is
an
easy
way
to
create
menus,
server
controls
are
HTML
elements
containing
of
the
attributes
corresponding
are
exposed
elements.
in
HTML
For
example,
server
HTML
controls
as
properties.
Any HTML element on a page can be converted to an HTML
server control. Conversion is a simple process involving just
a
few
attributes.
converted
to
As
control
minimum,
by
the
an
addition
HTML
of
element
the
is
attribute
during
parsing
that
it
should
create
an
instance
of
the
page
controls
framework
for
the
provides
HTML
predefined
elements
most
HTML
server
commonly
used
table,
HTML
controls
server
generic
control,
image,
and
and
share
in
so
the
on.
basic
addition,
These
predefined
properties
each
control
of
the
typically
into
HTML
server
controls
are
automatically
m a i n t a i n e d w h e n t h e p a g e i s s e n t b a c k t o t h e b r o w s e r.
Interaction
that
control.
with
user
has
validation
entered
controls
you
appropriate
can
easily
information
verify
into
for
HTML
4.0
styles
if
the
Web
Forms
page
is
of
custom
attributes.
You
can
add
any
will
change
f u n c t i o n a l i t y. T h i s
in
read
them
and
render
allows
them
you
to
without
add
any
browser-
HTML
server
controls
(except
one-to-one
mapping
to
browser
detection.
The
controls
can
detect
control (such
as a
Chapt
er 5
Design
Docume
nt
Design Document
ER-Diagram,
which
not
only
specifics
the
ER-Diagrams
The
entity
Relationship
Diagram
(ERD)
depicts
the
Data object
Relationships
Attributes
The
unified
modeling
language
allows
the
software
describe
the
system
from
distinctly
different
analysis
representation
describes
usage
6. Internal Administration.
General Employee:
information which is very private to him and personal to him. He has only
privileges of accessing the existing data, but cannot alter the data.
Employee
Information
Employee
General
Employee
Performa
nce
Employee
Rating
Employee
Skill set
Project Leaders: These are the actors who are responsible for a particular
project at the Module level. They can access information related to the project
information, with specific to the Module requirements.
Role
Information
Module
Information
Project
Information
Project Leaders
Components
Information
Elements
Informatio
n
Project Managers: These are the actors who take the overall responsibility
upon the entire project. They have the accessibility to check the verification
standards upon the projects being developed.
Package
Information
Module
Information
Project Managers
Project
Informatio
n
Component
s
Informatio
n
Elements
Informatio
n
Employee
Performance
Programmers or Developers: They are the actors who actually put their
effort only upon the programming aspects of the components and elements.
They are also associated with the documentation preparation for any specific
project that is being scheduled.
Module
Information
Package
Information
Components
Information
Elements
Information
Programmers
Documenta
tion
informatio
n
Internal Administration: They are actions that actually master mind the
entire
application
and
its
transaction
process.
They
take
the
overall
responsibility of managing the master information, and the cross checks the
consistency and reliability of information.
Branch
Registration
Department
registration
Designation
Registration
Employee
Registration
Programmers
Project
Registration
Module
Registration
Components
Registration
Elements
Registration
Client
Registration
Client Projects
Registration
Request for
Existing Roles
Request for
Existing Modules
Select The
Required
Module ID
Select
required
package ID
Select The
Required
Component ID
Query
Analyzer
Query
Analyzer
Query
Analyzer
Display
Display
Display
Programmer
Request for
Components
Information
Select The
Required
Element ID
Select The
Required
Document
ID
Query
Analyzer
Query
Analyzer
Display
Display
Raise request
for
new
Branch
Registration
Generate
Branch ID
Generate
Department
ID
Internal
Administrator
Raise Request
for Employee
Registration
Generate
Designation
ID
Generate
Employee ID
Generate
Project Id
Igenerate
the D
Generate
Generate
Module Id
Elements Id
Beanch ID
Collect
the
relevant
Data
Collect
the
required
Data
Collect
the
required
Data
Anociate to
proper
Department
And
Designation
Collect the
Required
Fields
Validate
Stno
Stno
Validate
Validate
Validate
Validate
CollectCollect
the
the
Required
Required
fields fields
validate
validate
stno
Stno
Stno
Stno
Department
Project Leader
Request for
Existing Roles
Request for
Existing Modules
Select The
Module ID
Request for
Components
Information
Select The
Project ID
Select The
Component ID
Select The
Element ID
Query
Analyzer
Query
Analyzer
Query
Analyzer
Display
Display
Query
Analyzer
Query
Analyzer
Collect
the
required
stno
Display
stno
stno
stno
Display
Display
stno
Facts Collaboration
Fac t s ta ble
Pr o jec t m a st er
Pr o jec t _c o nt r a ct _da t e: da t e
Mo dule m a st er
Co m po nent m a st er
I nser t ()
Updat e ()
Co m po nent _na m e: va rc ha r 2
Delet e ()
Sea r c h ()
Va lida t e_m o dule_id ()
Va lida t e_ro le_id ()
Va lida t e_m o d_inc hg_id ()
Ro le M a st er
Ro le_I D: num ber
Ro le_na m e: va rc ha r 2
Ro le_desc : va r c har 2
I nser t (), updat e ()
Delet e (), sea r c h ()
Em plo yee Ma st er
Elem ent M a st er
Em plo yee_na m e: va r c ha r 2
Em plo yee_DOB:da t e
Depa r t m ent M a st er
Depa r t m ent _I D: num ber
Depa r t m ent _na m e: var c ha r 2
Designa t io n_I D:num ber
I nser t (), upda t e ()
Delet e (), sea r c h ()
Designa t io n M a st er
Designa t io n_I D: num ber
Designa t io n na m e: var c ha r 2
I nser t (), upda t e ()
Delet e (), sea r c h ()
Do c um ent t ype M a st er
do c _I D: num ber
pr o _id:num ber
Do c _t ype_na m e:va r c ha r 2
Do c _t ype_desc :va r c ha r 2
Pr o jec t M a st er
do c um _st a t us:va r c ha r 2
Pr o jec t _c o nt r a ct _da t e:
da t e
Em plo yee Ma st er
Em plo yee_na m e: va r c ha r 2
Em plo yee_DOB:da t e
Ro le M a st er
Ro le_I D: num ber
Ro le_na m e: va rc ha r 2
Ro le_desc : va r c har 2
I nser t (), updat e ()
Delet e (), sea r c h ()
2
2
So ft war e A ssignm ent Ma st er
So ft war e A ssign_I D: num ber
Designa t io n Ma st er
Depa r t m ent M a st er
Depa r t m ent _I D: num ber
Depa r t m ent _na m e: var c ha r 2
Designa t io n_I D: num ber
I nser t (), upda t e ()
Delet e (), sea r c h ()
Component Master
Sub_comp_id:number
Compo_name:varcahr2
Compo_desc:varchar2
Comp_id:number
Compo_des_time:varchar2
Compo_inchg_id:number
Role_id:number
-Insert(),-Delete()
-Update(),-Select()
-Validate-Component-ID ()
-Validate-Role-ID()
-Validate-In charge-ID()
Ro le M a st er
Ro le_I D: num ber
Ro le_na m e: va r c ha r 2
Ro le_desc : var c ha r 2
I nser t (), upda t e ()
Delet e (), sea r c h ()
Em plo yee M a st er
Depa r t m ent M a st er
Em plo yee_DOB:da t e
Designa t io n M a st er
Designa t io n _I D: num ber
Designa t io n _na m e: var c ha r 2
I nser t (), upda t e ()
Delet e (), sea r c h ()
Sequence Diagram
Module
Register
Modules
Master
Module
Registration Role
Master
Screen
Module
Registration
Screen
Employee
Master
Module
Master
Screen
Request for
Registration
new Module
Generate
Module
Id
Select
Role ID ()
Validate
Drug id
()
Select
Module
Uncharge
d ID()
Validate
EmpID()
Validate
SubModu
le ID()
Connect ()
Module
Register
Project Project
Registr
ation Registratio
Screen n Screen
Empl
oyee
Maste
r
Project
S/w
Assignm
Registrati
ent
on Screen Master
Screen
Project
Role
Registrati Master
on
Master
Request for
Registration
new Module
Genera
te
Project
Id
Select
MGR
ID () Validat
e
Drug
id ()
Select
S/w
Assign
ID()
Validat
e
S/w
Assign
ID()
Select
Role
ID()
Validate
Role ID
()
Commit
()
Chapt
er 6
Coding
definition
and
calling
techniques
that
PDL
syntax
should
include
constructs
for
subprogram
conditions
constructs,
repetition
constructs
and
I/O constructs.
PDL
can
and/or
be
extended
concurrent
to
include
processing
keywords
interrupt
for
multitasking
handling,
interposes
Chapt
er 7
Te s t i n g
&
Debuggi
ng
Strategi
es
Testing
Testing is the process of detecting errors. Testing performs a very critical role
for quality assurance and for ensuring the reliability of software. The results of
testing are used later on during maintenance also.
Psychology of Testing
The aim of testing is often to demonstrate that a program works by showing
that it has no errors. The basic purpose of testing phase is to detect the errors
that may be present in the program. Hence one should not start testing with
the intent of showing that a program works, but the intent should be to show
that a program doesnt work. Testing is the process of executing a program
with the intent of finding errors.
Testing Objectives
The main objective of testing is to uncover a host of errors,
systematically and with minimum effort and time. Stating formally, we
can say,
Testing is a process of executing a program with the intent of
finding an error.
A successful test is one that uncovers an as yet undiscovered
error.
A good test case is one that has a high probability of finding
error, if it exists.
The tests are inadequate to detect possibly present errors.
The software more or less confirms to the quality and reliable
standards.
Levels of Testing
In order to uncover the errors present in different phases we have the
concept of levels of testing. The basic levels of testing are as shown
below
Acceptance
Testing
Client Needs
System Testing
Requirements
Design
Integration Testing
Unit Testing
Code
System Testing
The philosophy behind testing is to find errors. Test cases are devised with this
in mind. A strategy employed for system testing is code testing.
Code Testing:
This strategy examines the logic of the program. To follow this method we
developed some test data that resulted in executing every instruction in the
program and module i.e. every path is tested. Systems are not designed as
entire nor are they tested as single systems. To ensure that the coding is
perfect two types of testing is performed or for that matter is performed or
that matter is performed or for that matter is performed on all systems.
Types Of Testing
Unit Testing
Link Testing
Unit Testing
Unit testing focuses verification effort on the smallest unit of software i.e. the
module. Using the detailed design and the process specifications testing is
done to uncover errors within the boundary of the module. All modules must
be successful in the unit test before the start of the integration testing begins.
In this project each service can be thought of a module. There are so many
modules like Login, HWAdmin, MasterAdmin, Normal User, and PManager.
Giving different sets of inputs has tested each module. When developing the
module as well as finishing the development so that each module works
without any error. The inputs are validated when accepting from the user.
In this application developer tests the programs up as system. Software units
in a system are the modules and routines that are assembled and integrated
to form a specific function. Unit testing is first done on modules, independent
of one another to locate errors. This enables to detect errors. Through this
errors resulting from interaction between modules initially avoided.
Link Testing
Link testing does not test software but rather the integration of each module
in system. The primary concern is the compatibility of each module. The
Programmer tests where modules are designed with different parameters,
length, type etc.
Integration Testing
After the unit testing we have to perform integration testing. The goal here is
to see if modules can be integrated proprerly, the emphasis being on testing
interfaces between modules. This testing activity can be considered as testing
the design and hence the emphasis on testing module interactions.
In this project integrating all the modules forms the main system. When
integrating all the modules I have checked whether the integration effects
working of any of the services by giving different combinations of inputs with
which the two services run perfectly before Integration.
System Testing
Here the entire software system is tested. The reference document for this
process is the requirements document, and the goal os to see if software
meets its requirements.
Here entire ATM has been tested against requirements of project and it is
checked whether all requirements of project have been satisfied or not.
Acceptance Testing
Acceptance Test is performed with realistic data of the client to demonstrate
that
I have generated a list of test cases, sample data. which is used to check all
possible combinations of execution paths through the code at every module
level.
Chapt
er 8
User
Manual
Installation
Using core java and components like JSP and EJB needs
proper
deployment
as
per
general
specifications
Admin Login:
Homepage:
Update Client :
Project Creation:
Department:
View Designation :
Employee Registration :
View Employee :
Project Manager:
PROFILE
Projects :
Project Status :
Assign Project :
Status:
ChangePassword:
Module:
Project Status
Developer Home:
CangePassword:
ModuleStatus:
Chapte
r9
Conclusions
&
Recommenda
tions
Bibliography:
References for the Project Development Were Taken From the
following Books and Web Sites .
SQL Server
Mastering SQL Server 2000 by Gunderloy,Jorden BPB Publications
Beginning SQL Server 2000 by Thearon Willis wrox publications