amusing websites full report
#1

[attachment=2421]

AMUSING.COM
PROJECT REPORT
Submitted by ARUN.R KRISHNAN JAMES. J KUTTATHIL
ABSTRACT
'Amusing.com' introduces all the latest Technologies, Information & Entertainments.lt includes mailing ,chatting ,downloading music,ring tones etc. To bring out products and sevices in Synchronously with the changing time & we are constantly innoivating.
The new user can access the site only after registeration. Users can easily access the site by their userID and password. In the mailing module user can compose,send,delete,edit the mails.
Amusing.com provides all the feasible entertainments in the world. Site brings "Clarity to your Word".
LIST OF TABLES
Table
Page
8.2.1 LOGIN
23
8.2.2 NEW REGISTRATION
23
8.2.3 FEEDBACK
24
8.2.4 MAILING
24
8.2.5 CHATTING
24
Figure Page
8.3.1 CONTEXT LEVEL 0 DFD 24
8.3.2 USER LEVEL 1 DFD 24
8.3.3 USER LEVEL 2 DFD 24
8.3.4 USER LEVEL 3 DFD 25 12.1 2 TIER ARCHITECTURE 33
13.1 HOME PAGE 38
13.2 LOGIN FORM 35
13.3 REGISTRATION FORM 37
13.4 MAIN MENU 41
13.5 RING TONE 42
13.6 MAILING 43
13.7 COMPOSE FORM 44
13.8 INBOX 45
13.9 CHAT 46
13.10 FEEDBACK 47
TABLE OF CONTENTS
CHAPTER
1 2
2
2
3 3
3
3 4
5 6
TITLE PAGE NO.
ABSTRACT iv
LIST OF TABLE v
LIST OF FIGURES vi
OVERVIEW OF PROJECT 1
1.1 ABOUT THE PROJECT 1
TOOLS
2.1What is ASP .NET
2.1.1 NET Framework
2.1.2 New in ASP .NET
2.1.3 Language Support
2.1.4 ASP .NET Controls
2.2 Benefits of the .NET Framework 4 2.2.1 Elements of the .NET Framework 7
2.3 ADO.NET Basics 9 SQL SERVER 2000 11 SYSTEM STUDY
4.1 INTRODUCTION 17
4.1.1 Operational Feasibility 17
4.1.2 Technical Feasibility 18
SYSTEM ANALYSIS 19
SYSTEM DESIGN
6.1 FUNDAMENTAL DESIGN CONCEPTS 20
6.2 MODULARITY 20
6.3 DATA STRUCTURE 20
7 DATABASE DESIGN
7.1 NORMALIZATION 21
7.2 TABLES 23
73 DATAFLOW DIAGRAMS 25
8 CODING 28
9 SYSTEM IMPLEMENTATION
9.1 IMPLEMENTATION METHODS 29
9.2 IMPLEMENTATION PLAN 30
10 SYSTEM TESTING
10.1 TYPES OF TESTING 31
10.1.1 Unit Testing 31
10.1.2 Integration Testing 32
10.1.3 Validation Testing 32
10.1.4 Output Testing 33
10.1.5 User Acceptance Testing 33
11 SYSTEM SPECIFICATION
11.1 HARDWARE REQUIREMENTS 34
11.2 SOFTWARE REQUIREMENTS 35
11.3 TECHNOLOGY SPECIFICATION 36
12 FORMS 38
CONCLUSION 48
RESUME 49
REFERENCES 50
OVERVIEW OF PROJECT
1.1 ABOUT THE PROJECT
Amusing.com introduces all the latest Technologies, Information & Entertainments. Site brings "Clarity to your Word". To bring out products and sevices in Synchronously with the changing time & we are constantly innoivating.
In the Login page link a user have to login. Next page provides several links. The Home page contains several links such as News, Ring tones, wallpapers, movies, mailing, chatting.
An already registered user can simply type in -his\her valid username and password, and then click the "submit" button. But those visitors who are not registered have to go to the registration page before they login. In that page user have to enter First name, Last name, Address, Postal Code, City, Phone number, Username and password.
After registration user can sign in and do anything.Logout page link will help the user to logout from the site.
TOOLS
ASP.NET
2.1What is ASP .NET
ASP 3.0 is the latest version of ASP, but there will never be an ASP 4.0 version. ASP.NET is the next generation ASP, but it's not an upgraded version of ASP. ASP .NET is an entirely new paradigm for server-side ASP scripting.
ASP .NET is a part of the new .NET (dot net) Framework. Microsoft spent three years rewriting ASP .NET from the ground up, and ASP .NET is not fully backward compatible with ASP 3.0.You can read more about the differences between ASP and ASP .NET in the next chapter of this tutorial.
. NET Framework
The .NET Framework is the infrastructure for the new Microsoft .NET Platform. The .NET Framework is a common environment for building, deploying, and running Web applications and Web Services. The .NET Framework contains a common language runtime and common class libraries - like ADO .NET, ASP .NET and Windows Forms - to provide advanced standard services that can be integrated into a variety of computer systems.
The .NET Framework provides a feature-rich application environment, simplified development and easy integration between a numbers of different development languages. The .NET Framework is language neutral. Currently it supports C++, C#, Visual Basic, and JScript (The Microsoft version of JavaScript).
Microsoft's Visual Studio.NET is a common development environment for the new .NET Framework. ASP .NET has better language support, a large set of new controls and XML based components, and better user authentication. ASP .NET provides increased performance by running compiled code. ASP .NET code is not fully backward compatible with ASP.
New in ASP .NET
¦ Better language support
¦ Programmable controls
¦ Event-driven programming
¦ XML-based components
¦ User authentication, with accounts and roles
¦ Higher scalability
¦ Increased performance - Compiled code
¦ Easier configuration and deployment
¦ Not fully ASP compatible
Language Support
ASP .NET uses the new ADO NET.
ASP .NET supports full Visual Basic, not VBScript.
ASP .NET supports C# (C sharp) and C++.
ASP .NET supports JScript as before.
ASP .NET Controls
ASP .NET contains a large set of HTML controls. Almost all HTML elements on a page can be defined as ASP .NET control objects that can be controlled by scripts. ASP .NET also contains a new set of object oriented input controls, like programmable list boxes and validation controls. A new data grid control supports sorting, data paging, and everything you expect from a dataset control.
Event Aware Controls
All ASP .NET objects on a Web page can expose events that can be processed by ASP .NET code. Load, Click and Change events handled by code makes coding much simpler and much better organized.
ASP .NET Components
ASP .NET components are heavily based on XML. Like the new AD Rotator, that uses XML to store advertisement information and configuration.
User Authentication
ASP .NET supports forms-based user authentication, including cookie management and automatic redirecting of unauthorized logins.(You can still do your custom login page and custom user checking).
User Accounts and Roles
ASP .NET allows for user accounts and roles, to give each user (with a given role) access to different server code and executables.
High Scalability
Much has been done with ASP .NET to provide greater scalability. Server to server communication has been greatly enhanced, making it possible to scale an application over several servers. One example of this is the ability to run XML parsers, XSL transformations and even resource hungry session objects on other servers.
Compiled Code
The first request for an ASP .NET page on the server will compile the ASP .NET code and keep a cached copy in memory. The result of this is greatly increased performance.
Easy Configuration
Configuration of ASP .NET is done with plain text files. Configuration files can be uploaded or changed while the application is running. No need to restart the server. No more met abase or registry puzzle.
Easy Deployment
No more server restart to deploy or replace compiled code. ASP .NET simply redirects all new requests to the new code.
Compatibility
ASP .NET is not fully compatible with earlier versions of ASP, so most of the old ASP code will need some changes to run under ASP .NET. To overcome this problem, ASP .NET uses a new file extension ".aspx". This will make ASP .NET applications able to run side by side with standard ASP applications on the same server.
ASP .NET is easy to install. Just follow the instructions below.
What You Need A Windows Computer
ASP .NET is a Microsoft technology. To run ASP .NET you need a computer capable of running Windows.
Windows 2000 or XP
If you are serious about developing ASP .NET applications you should install Windows 2000 Professional or Windows XP Professional. In both cases, make sure you install the Internet Information Services (IIS) from the Add/Remove Windows components dialog.
Service Packs and Updates
Before ASP .NET can be installed on your computer, it is necessary to have all relevant service packs and security updates installed. The easiest way to do this is to activate your Windows Internet Update. When you access the Windows Update page, you will be instructed to install the latest service packs and all critical security updates. For Windows 2000, make sure you install Service Pack 2. I will also recommend that you install Internet Explorer 6.Read the note about connection speed and download time at the bottom of this page.
The .NET Software Development Kit
If you have the necessary bandwidth to download over 130 MB, you might consider downloading the full Microsoft .NET Software Development Kit (SDK). We fully recommend getting the SDK for learning more about .NET and for the documentation, samples, and tools included.
Connection Speed and Download Time
If you have a slow Internet connection, you might have problems downloading large files like the service packs, the SDK and the latest version of Internet Explorer. If download speed is a problem, our best suggestion is to get the latest files from someone else, from a colleague, from a friend, or from one of the CDs that comes with many popular computer magazines. Look for Windows 2000 Service Pack 2, Internet Explorer 6, and the Microsoft .NET Framework.
Connection Speed and Download Time
If you have a slow Internet connection, you might have problems downloading large files like the service packs, the SDK and the latest version of Internet Explorer. If download speed is a problem, our best suggestion is to get the latest files from someone else, from a colleague, from a friend, or from one of the CDs that comes with many popular computer magazines. Look for Windows 2000 Service Pack 2, Internet Explorer 6, and the Microsoft .NET Framework.
Benefits of the .NET Framework:
The .NET Framework offers a number of benefits to developers:
¢ A consistent programming model
¢ Direct support for security
¢ Simplified development efforts
¢ Easy application deployment and maintenance
Elements of the .NET Framework :
Common Language Runtime:
The common Language Runtime (Clr ) is a layer between an application and the operating system it executes on. The CLR simplifies an application's design and reduces the amount of code developers need to write because it provides a variety of execution services that include memory management Thread management, component lifetime management, and default error handling .The Key benefit of the CLR is that it transparently provides these execution services to all applications, regardless of what programming language they're written in and without any additional effort on the part of the developer.
The CLR is also responsible for compiling code just before it executes. Instead of producing a binary representation of your code, as traditional compilers do, .NET compilers produce a representation of your code in a language common to the .NET framework: Microsoft Intermediate Language (MSIL), often referred to as IL. When your code executes for the first time, The CLR invokes a special compiler called a just In Time (JIT)compiler , which transforms the IL into executable instructions that are specific to the type and model of your system's processor . Because all .NET languages have the same compiled representation, they all have similar performance characteristics. This means that a program written in Visual C++ .NET (C++ is the language of choice for developers who need the best possible performance a system can deliver.)
. NET Class Library:
To make the .NET Class Library easier to work with and understand, it's divided into namespaces. The root namespace of the .Net Class Library is called system, and it contains core classes and data types, such as Int32, Object, Array, and Console. Secondary namespaces reside within the system namespace.
Unifying components:
The unifying components, listed next, are the means by which you can access the services the .NET Framework provides:
¢ ASP.NET
¢ Windows Forms
¢ Visual Studio.NET
ASP.NET is a powerful programming framework for the development of enterprise class web applications.
ASP.NET, the next version of ASP, is a programming framework that is used to create enterprise-class web applications. The enterprise-class Web applications are accessible on a global basis, leading to efficient information management. However, the advantages that ASP.NET offers make it more than just the next version of ASP.
Unlike the ASP runtime, ASP.NET uses the common Language Runtime (CLR) provided by the .NET Framework. The CLR is the .NET runtime, which manages the execution of code. The CLR allows the objects, which are created in different languages, to interact with each other and hence removes the language barrier. CLR thus makes web application development more efficient.
Advantages are listed as follows,
¢ Improved performance
¢ Flexibility
¢ Configuration settings
¢ Security
ADO.NET Basics
Microsoft ADO.NET is the latest improvement after ADO. ADO.Net provides platform interoperability and scale data access. In the .NET framework, data is transmitted in the Extensible Markup Language (XML) format. There fore, any application that can read the XML format can process data. It is not necessary for the receiving component to be an ADO.Net component at all. The receiving component might be a Microsoft Visual Studio-based solution or any application running on any other platform.
ADO.Net is upgraded to offer several advantages over previous versions of ADO and over other data access components.
The ADO model uses the concept of recordsets, which are the ADO representation of tables and views from a database . Although these recordsets are very flexible to use and allow access to data even when disconnected from data sources, they suffer from a major drawback.
Key features offered by ADO .net,
¢ Interoperability
¢ Maintainability
¢ Programmability
¢ Performance
SQL SERVER 2000
SQL SERVER ENTERPRISE MANAGER
SQL Server Enterprise Manager is a graphical tool that allows for easy, enterprise-wide configuration and management SQL Server and SQL Server objects. SQL Server Enterprise Manager provides:
> A scheduling engine
> Administrator alert capability
> Drag-and-drop control operations across multiple servers
> A built-in replication management interface
You can also use SQL Server Enterprise Manager to:
> Manage logins, permissions, and users
> Create scripts
> Manage devices and databases
> Back up databases and transaction logs
> Manage tables, views, stored procedures, triggers, indexes,
rules, defaults, and user-defined data types
SQL Server Enterprise Manager is the primary administrative and powerful tool for system management and tuning .Exceptional scalability and reliability make SQL server 2000 the best choice for the enterprise. Microsoft Management Console (MMC) allows users to:
> Define group of servers running SQL Server
> Rich xml support
> High availability
> Configure all SQL Server options for each registered server
> Create and administer all SQL Server databases, objects, logins, users, and permissions in each registered server
> Define and execute all SQL Server administrative tasks on each registered server
> Design and test SQL statements, batches, and scripts interactive by invoking SQL Query Analyzer
ACCESSING AND CHANGING DATA
SQL Server Enterprise Manager includes a tool for designing queries interactively using a graphical user interface (GUI). These queries are used:
> In views
> In Data Transformation Services (DTS) Packages
> To display the data in Microsoft® SQL Server„¢ tables
REPLICATION
Replication is an important and powerful technology for distributing data and stored procedures across an enterprise. The replication technology SQL Server allows you to make copies of your data, move those copies to different locations, and synchronize the data automatically so that all copies have the same data values. Replication can be implemented between databases on the same server or different servers connected by LANs, WANs, or the Internet. The procedures in this section help you configure and maintain replication using SQL Server Enterprise Manager.
DATA TRANSFORMATION SERVICES
Data Transformation Services (DTS) provides the functionality to import, export, and transform data using COM, OLE DB, and Microsoft® ActiveX® Scripts. DTS enables you to build and manage data marts and data warehouses by providing:
An extensible transaction-oriented workflow engine that
allows execution of a complex series of operations
Powerful integrated heterogeneous data movement,
scrubbing, and movement
An industry standard method of sharing metadata and
data lineage information through Microsoft Repository.
This information model has been adopted by leading data
warehousing and database design vendors
> Package storage in Microsoft Repository, SQL Server, or COM-structured storage files. After a package has been saved, it can be scheduled for execution using SQL Server Agent
> Integration with Microsoft SQL Server OLAP Services
MANAGING SECURITY
To ensure that data and objects stored in Microsoft® SQL Server„¢ are accessed only by authorized users, security must be set up correctly. Understanding how to set up security correctly can help simplify ongoing management. Security elements that may have to be set up include authentication modes, logins, users, roles, granting, revoking, and denying permissions on Transact-SQL statements and objects, and data encryption.
DATABASES
A database in Microsoft® SQL Server„¢ consists of a collection of tables with data, and other objects, such as views, indexes, stored procedures, and triggers, that are defined to support the activities performed with the data. Before objects within the database can be created, you must create the database and understand how to change the settings and the configuration of the database. This includes tasks such as expanding or shrinking the database, or specifying the files used to create the database.
TABLES
Tables are database objects that contain all the data in a database. A table definition is a collection of columns in the same way a database is a collection of tables. Before data can be stored in a database, you must understand how to create, modify, and maintain the tables within your database. This includes tasks such as defining keys and adding or deleting columns from a table.
DATABASE DIAGRAMS
Database diagrams enable you to create, manage, and view database objects in a graphical format. Before objects within the database can be manipulated using database diagrams, you must understand how to: create a database diagram, add objects to it, work within a database diagram, and save a database diagram.
INDEXES
To create efficient indexes that improve the performance of your database application by increasing the speed of your queries, you need an understanding of how to create and maintain the indexes on the tables in your database.
VIEWS
By creating, modifying, and maintaining views, you can customize each user's perception of the database.
STORED PROCEDURES
By creating, modifying, and using stored procedures, you can simplify your business applications and improve application and database performance.
TRIGGERS
By understanding how to create, modify, and maintain triggers, you can use triggers to:
> Cascade changes through related tables in the database
> Disallow or roll back changes that violate referential integrity, thereby canceling the attempted data modification transaction
> Enforce restrictions that are more complex than those defined with check constraints
^ Find the difference between the state of a table before and after a data modification and take actions based on that difference
5.1 INTRODUCTION
All projects are feasible when given unlimited resources and infinite time. It is both necessary and prudent to evaluate the feasibility of a project at the earliest possible time. A feasible study is not warranted for system in which economic justification is observed, technical risk is low, few legal problems are expected and no reasonable alternative exists. An estimate is made of whether the identified user needs may be satisfied using our recent software and hardware technologies. The study will decide if the proposed system will be cost effective, from the business point of view and it can be developed in the existing budgetary constraints. The feasibility study should be relatively sharp ad quick. The gesture should inform the decision of whether to go ahead with a more detailed analysis.
Feasibility study may be documented as a separated report to higher officials of the top-level management and can be included as appendices to the system specification. Feasibility and risk analysis is detailed in many worries. If there is more project risk then the feasibility of producing the quality software is reduced. The study is done in three phases
> Operational Feasibility
> Technical Feasibility
5.1.1 Operational Feasibility
In the proposed System named Amusing.com the operational feasibility study is performed with the help of the users of the system and the management. The first challenge was whether the system meets the organizational requirement. This is checked by the system requirement collected from the users and the management and the
operational feasibility proved that the system is capable to meet its functional requirements.
During the operational feasibility study the proposed system, is checked whether it can run with universal standards.
All the business methods implemented in the system is selected according to increase the user acceptance. There was no difficulty in implemented the software and proposed system is so effective, user friendly, functionally reliable so that the users in the company will find that the new system reduces the hard steps.
5.1.2 Technical Feasibility
In the proposed system named Amusing.com the technical feasibility study is conducted by considering the risk related to developing the system, the resources available to develop the system and the availability of the technology to develop the system. The development risk considered the factors like whether the system can implement using existing technology and the design of the system can run on the real environment. The resource availability checks the availability of resources like time, human, hardware etc. The technology using to implement the system is selected according to the technical feasibility study. The technical feasibility study on the technology found that it can implement all the functional requirements of the proposed system. The technology selected according to accept the system globally and the development of the system according to the universal standards.
Technical feasibility study of Amusing.com covered the hardware as well as the software requirements. The scope was whether the work for the project is done with the current equipments and the existing software technology has to be examined in the feasibility study. The outcome was found to be positive.
Requirement analysis can be defined as a detailed study of various operations performed by a system and their relationship within and outside of the system. One aspect of the analysis is designing the boundaries of the system and determining whether or not a candidate system should other related systems. During analysis data are collected on the available files, decision points and transactions handled by the present system. The common tools used in the analysis phase are Data Flow Diagram, interviews and on site observations.
We can say Analysis as the process of taking known facts concerning a system, breaking these into their elements and establishing logical relationships between the laments, with objective of producing a specification of requirements. Analysis can be done in a disciplined way, using appropriate tools in all stages of the project. During fact-finding, the use of standard forms will help to ensure that nothing conflicts or is omitted. The tool of analysis consists of lists, structure charts, grid charts and flow charts. The steps in the analysis are:
¢ Defining system objectives and results.
¢ Trace back to the actions required for the achievement of objectives and results.
¢ Carry out instructions, which prompt the achievement of objectives and must be analyzed In relation to the decisions, which produce them.
¢ Confirm the notifications that have been carried out.
¢ The information based on the decisions can be analyzed into the data and procedures required to produce it.
At each step it is necessary to:
¢ Identify the relevant facts, and establish the relationship between them.
¢ Compare that set of facts with the sets at each adjoining steps and establish the relationship between the facts in these sets.
7.1 FUNDAMENTAL DESIGN CONCEPTS
A set of fundamental design concepts are evolved over the past decades, although the degree of interest in each concept has varied over the years, each has stood the test of time. Each one provides the software designer with a foundation from which more sophisticated design methods can be applied. Fundamental design concepts provide the necessary frame work for "getting it right".
7.2 MODULARITY
Modularity is the single attribute software that allows a program to be intellectually manageable. Software architecture embodies modularity, that is , software is divided into named and addressable component called modules that are integrated to satisfy problem requirements. We have divided our project into four modules. User, Mailing , Chatting , Entertainments.
7.3 DATA STRUCTURE
Data structure is a representation of logical relationship among individual elements of data. Because the structure of information will invariably affect the final procedural design, data structure is very important as the program structure to the representation of the software architecture. Data structure dictates the organization, methods of access, degree of associatively, and processing alternatives for information. The organization and complexity of a data structure are limited only by ingenuity of the designer. Scalar item array and Array list and Vectors are some of the representations of the data structure used in our project.
DATABASE DESIGN
The overall objective in the development of database technology has been to treat data as an organizational resource and as an integrated whole. DBMS allow data to be protected and organized separately from other resources. Database is an integrated collection of data. The most significant form of data as seen by the programmers is data as stored on the direct access storage devices. This is the difference between logical and physical data.
Database files are the key source of information into the system. It is the process of designing database files, which are the key source of information to the system. The files should be properly designed and planned for collection, accumulation, editing and retrieving the required information.
The organization of data in database aims to achieve three major
objectives:-
¢ Data integration.
¢ Data integrity.
¢ Data independence.
The proposed system stores the information relevant for processing in the MS SQL SERVER database. This database contains tables, where each table corresponds to one particular type of information. Each piece of information in table is called a field or column. A table also contains records, which is a set of fields. All records in a table have the same set of fields with different information. There are primary key fields that uniquely identify a record in a table. There are also fields that contain primary key from another table called foreign keys.
8.1 NORMALIZATION
Normalization is a technique of separating redundant fields and braking up a large table in to a smaller one. It is also used to avoid insertion, deletion and updating anomalies. All the tables have been normalized up to the third normal form. In short the rules for each of the three normal forms are as below.
First Normal Form
A relation is said to be in 1NF if all the underlying domain of attributes contain simple individual values.
Second Normal Form
The 2NF is based on the concept of full functional dependency. A relation said to be in 2NF if and only if it is in 1NF and every non-key attribute is fully functionally dependent on candidate key of the table.
Third Normal Form
The 3NF is based on the concept of transitive dependency. A relation in 2NF is said to be in 3NF if every non-key attribute is non-transitively.
LIST OF TABLES
Table 8.2.1 login
UserID Varchar
Password Varchar
Table 8.2.1 stores the login details of user Table 8.2.2 NewRegistration
Name Varchar
Email Varchar
Retypepassword Varchar
Address Varchar
PostalCode Integer
Country Varchar
Phone Integer
Gender Char
DateOfBirth Varchar
Table 8.2.1 stores the details of new Registration
Table 8.2.3 stores the Feedback details
Table 8.2.4 Mail
Froml Varchar
Tol Varchar
Subl Varchar
Messagel Varchar
Table 8.2.1 stores the Mailing details
Table 8.2.5 Chat
cno Int
sendmsg Varchar
Table 8.2.5 stores the Chatting details
8.3 DATA FLOW DIAGRAMS
Data Flow Diagram is the graphical description of the system's data and how the processes transform the data. Data Flow diagram depicts information flow, the information flow and the transforms that are applied as data move from the input to output. It is the starting point of the design phase that functionally decomposes the requirement specifications down to the lowest level of details. Thus a DFD describes what data flows (logical) rather than how they are processed.
Unlike detailed flowchart, Data Flow Diagrams do no supply detailed description of the modules but graphically describes a system's data and how the data interacts with the system. To construct a Data Flow Diagram, we use
> Arrows
> Circles
> Open End Box
> Squares
An arrow identifies the dataflow in motion. It is a pipeline through which information is flown like the rectangle in the flowchart. A circle stands for process that converts data into information. An open-ended box represents a data store, data at rest or a temporary repository of data. A square defines a source or destination of system data.
Rules for constructing a Data Flow Diagram
> Arrows should not cross each other.
> Squares, circles and files must bear names.
> Decomposed data flow squares and circles can have same names.
> Choose meaningful names for data flow
> Draw all data flows around the outside of the diagra
Fig 8.3.1 Context Level DFD
Online
Login
Fig 8.3.3 User Level DFD
Fig 8.3.4 User Level DFD
CODING
The goal of coding phase is to translate the design of the system in to code in a given programming language. For a given design, the aim in this phase is to implement the design in the best possible manner. Well-written code can reduce the resting and maintenance effort. During coding, the focus should on developing programs that are easy to read and understand and not simply on developing programs that are easy to write. Simplicity and clarity should be strived for during the code phase.
An important concept that helps the understandability of programs is structured programming. The program that should be organized as a sequence of statements and during execution the statements are executed in the sequence given in the program. There are many different criteria for judging of the program, execution time and required memory.
SYSTEM IMPLEMENTATION
Implementation includes all those activities that take place to convert from the old system to the new. The old system consists of manual operations, which is operated in a very different manner from the proposed new system. A proper implementation is essential to provide a reliable system to meet the requirements of the organizations. An improper installation may affect the success of the computerized system.
10.1 IMPLEMENTATION METHODS
There are several methods for handling the implementation and the consequent conversion from the old to the new computerized system.
The most secure method for conversion from the old system to the new system is to run the old and new system in parallel. In this approach, a person may operate in the manual older processing system as well as start operating the new computerized system. This method offers high security, because even if there is a flaw in the computerized system, we can depend upon the manual system. However, the cost for maintaining two systems in parallel is very high. This outweighs its benefits.
Another commonly method is a direct cut over from the existing manual system to the computerized system. The change may be with in a week or with in a day. There are no parallel activities. However, there is no remedy in case of a problem. This strategy requires careful planning. A working version of the system can also be implemented in one part of the organization and the personnel will be piloting the system and changes can be made as and when required. But this method is less preferable due to the loss of entirety of the system.
10.2 IMPLEMENTATION PLAN
The implementation plan includes a description of all the activities that must occur to implement the new system and to put it into operation. It identifies the personnel responsible for the activities and prepares a time chart for implementing the system.
The implementation plan consists of the following steps. o List all files required for implementation.
o Identify all data required to build new files during the implementation. o List all new documents and procedures that go into the new system.
The implementation plan should anticipate possible problems and must be able to deal with them. The usual problems may be missing documents; mixed data formats between current and files, errors in data translation, missing data etc.
CHAPTER 11
SYSTEM TESTING
Testing is the major quality measure employed during software development. After the coding phase, computer programs are available that can be executed for testing purposes. Testing not only has to uncover errors introduced during coding, but also locates errors committed during the previous phases. Thus the aim of testing is to uncover requirements, design or coding errors in the program.
11.1 TYPES OF TESTING
This is the phase where bug in the program was to be found and corrected. One of the goals during dynamic testing is to produce a test suite. This is applied to ensure that the modification of the program does not have any side effects. This type of testing is called regression testing. Testing generally removes all the residual bugs and improves the reliability of the program. The basic testing types are
> Unit testing
> Integration testing
> Validation testing
> Output testing
> User acceptance testing
11.1.1 Unit Testing
This is the first level of testing. In this different modules are tested against the specifications produced during the design of the modules. Unit testing is done for the verification of the code produced during the coding of the single module in an isolated environment. Unit testing first focuses on the modules independently of one another to locate errors.
After coding, each dialogue is tested and run individually. All unnecessary coding were removed and it was ensured that all the modules worked, as the programmer would expect. Logical errors found were corrected.
So, by working all the modules independently and verifying the outputs of each module in the presence of staff was conducted that the program was functioning as expected.
11.1.2 Integration Testing
Data can be lost access an interface, one module can have as adverse effect on another sub-functions when combined, may not produce the desired major functions. Integration testing is a systematic testing for constructing the program structure, while at the same time conducting test to uncover errors associated within the interface. The objectives are to take unit tested as a whole. Here correction is difficult because the vast expenses of the entire program complicate the isolation of causes. Thus in the integration testing step, all the errors uncovered are corrected for the next testing stages.
11.1.3 Validation Testing
This provides the final assurance that the software meets all the functional, behavioral and performance requirements. The software is completely assembled as a package. Validation succeeds when the software functions in a manner in which the user expects. Validation refers to the process of using software in a live environment in order to find errors. During the course of validating the system, failures may occur and sometimes the coding has to be changed according to the environment.
Once the application was free all the logical and interface errors, inputting dummy data ensured that the software developed satisfied all the requirements of the user.
11.1.4 Output Testing
After performing the validation testing, the next step is the output testing of the proposed system since no system could be useful if it does not produces the required output generated or considered into two ways; one is on screen and another is printed format.
The output format on the screen is found to be correct as the format was designed in the system design phase according to the user needs.
For the hard copy also the output comes out as the specified requirements by the user. Hence output testing does not result in any correction in the system.
11.1.5 User Acceptance Testing
User acceptance of a system is the key factor for the success of any system. The system under consideration is tested for user acceptance by constantly keeping in touch with the prospective system users at the time of developing and making changes whenever required.
Preparation of test data plays a vital role in the system testing. After preparing g the test data the system under study is tested using the test data. While testing the system by using the test data, errors are again uncovered and corrected and the corrections are also noted for the future.
CHAPTER 12
SYSTEM SPECIFICATION
12.1 HARDWARE REQUIREMENTS
PROCESSOR CLOCK SPEED SYSTEM BUS
RAM HDD
MONITOR KEY BOARD MOUSE FDD
PRINTER
PENTIUM III 500 MHZ 32 BIT 128 MB 1.2 GB
SVGA COLOR 108 KEYS
LOGITECH
1.44 MB
HP
12.2 SOFTWARE REQUIREMENTS
OPERATING SYSTEM
WINDOWS SERVER'00
WEB SERVER
I I S
ENVIRONMENT
MICROSOFT .NET
MICROSOFT NET FRAME WORK [.NET assemblies, XML,
Web Services, Windows Services, Web User Controls, ADO.NET ]
FRONT END
ASP NET
SERVER SIDE SCRIPTING :
C#.NET
CLIENT SIDE SCRIPTING :
JAVA SCRIPT
BACKEND
MICROSOFT SQL SERVER 2000
BROWSER
INTERNET EXPLORER 6.0
CONNECTION
TCP / IP
PROTOCOL
HTTP, SMTP, POP3.
12.3 TECHNOLOGY SPECIFICATION
Client-Server Architecture
Typical client-server systems are based on the 2-tiered architecture, whereby there is a clear separation between the data and the presentation/business logic. These are generally data driven, with the application existing entirely on the client machine while the database server is deployed somewhere in the organization.
2-Tier Architecture
In a traditional 2- Tiered application, the processing load is given to the client PC while the server simply acts as a traffic controller between the application and data. As a result, not only does the application performance suffer due to the limited resources of the PC, but the network traffic tends increase as well.
Client
Fig 12.1: 2 Tier Architecture
3 - Tier Architecture
In 3- Tier architecture an application is broken into three separate logical layers, each with a well - defined set of interfaces. The first tier is referred to as the presentation layer and typically consists of graphical user interface of some kind.
The middle tier, or business layer, consists of application or business layer and the third layer- the data layer contains the data that is needed for the application. The middle tier is basically the code that the user calls upon to retrieve the desired data. The presentation layer then receives the data and formats it for display. This separation of application logic from the user interface adds enormous flexibility to the design of application. The third tier contains the data that is needed for the application.
n- Tier Architecture
In an n - tier architecture the application logic is divided by function rather than physically. N - Tier architecture then breaks down like this:
> A user interface that handle the user's interaction with the application; this can be web browser running through a firewall, a heavier desktop application or even a wireless device
> Presentation logic that defines what the user interface displays and how a user's requests are handled- depending on what user interfaces are supported we need to have slightly different versions of the presentation logic to handle the client appropriately.
> Business logic that models the application's business rules, often through the interaction with the application's data.
> Interface services that provide additional functionality required by the application components, such as messaging, transactional support etc.
> The Data layer where the enterprise's data resides.
FORMS
Fig: 13.1 Home page
Fig: 13.2 Login Form
Using the above form you can login into the Amusing.com
Fig:13.2Registration form
Fig:13.3 Main Menu
Fig:13.4 Ring Tones
Fig:13.5 Mailing
Fig:13.6 Compose
Fig:13.7 Inbox
Fig:13.8 Chatt
Fig:13.9 Feedback
CONCLUSION
The project report entitled "AMUSING.COM" has come to its final stage. The system has been developed with much care that it is free of errors and at the same time it is efficient and less time consuming. The important thing is that the system is robust. Also provision is provided for future developments in the system. The entire system is secured. This online system will be approved and implemented soon.
RESUME
The developed system is flexible and changes can be made easily. The system is developed with an insight into the necessary modification that may be required in the future. Hence the system can be maintained successfully without much rework.
Our future plan is to provide an option to download games and softwares Upload different information such as music,games,softwares.
In our project we are plan to add video conferencing for our users. This is meant to increase the web site more interactive and become user friendly.
REFERENCE
TEXT BOOKS
DEVELOPING ASP.NET APPLICATION : DINO ESPOSITO
LEARNING ASP.NET : O'REILLY & ASSOCIATE
PRINCIPLE OF DATABASE : MARTIN
MANAGEMENT
PROGRAMMING WITH ASP.NET SOFTWARE ENGINEERING SQL SERVER
SYSTEM ANALYSIS AND DESIGN
: JACOB GEORGE
: ROGERS PRESSMAN
: JONATHAN GENNICK
AND TOM LUERS
: ELIAS M. AWAD
Reply
#2
Smile 
i want to make mailing application in my project but i feel little bit confused about receive mails and how to prepare inbox for it.
plz can u help me by giving code for above task or guide me for that.dnilam428[at]gmail.com" class="mycode_email
Reply
#3

to get information about the topic"amusing websites full report" refer the page link bellow

http://studentbank.in/report-amusing-web...6#pid60386
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: websites for music not, list of top 100 websites 2011, jewellery websites, list top 10 websites, university websites best, best websites, free chat room software for websites,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  SAMBA SERVER ADMINISTRATION full report project report tiger 3 4,718 17-01-2018, 05:40 PM
Last Post: AustinnuAke
  air ticket reservation system full report project report tiger 16 46,803 08-01-2018, 02:33 PM
Last Post: RaymondGom
  An Efficient Algorithm for Mining Frequent Patterns full report project topics 3 4,714 01-10-2016, 10:02 AM
Last Post: Guest
  online examination full report project report tiger 14 42,735 03-09-2016, 11:20 AM
Last Post: jaseela123d
  Employee Cubicle Management System full report computer science technology 4 5,080 07-04-2016, 11:37 AM
Last Post: dhanabhagya
  e-Post Office System full report computer science technology 27 25,744 30-03-2016, 02:56 PM
Last Post: dhanabhagya
  college website project full report project report tiger 28 67,020 29-11-2015, 02:37 PM
Last Post: Guest
  steganography full report project report tiger 31 33,550 07-07-2015, 02:57 PM
Last Post: seminar report asees
  ENQUIRY INFORMATION ON INSTITUTE full report seminar topics 1 2,202 10-11-2014, 09:15 PM
Last Post: Guest
  data mining full report project report tiger 25 171,036 07-10-2014, 09:10 PM
Last Post: ToPWA

Forum Jump: