aditya report e tutes new updated

Upload: rabendrasharma

Post on 01-Mar-2016

221 views

Category:

Documents


0 download

DESCRIPTION

superb

TRANSCRIPT

  • COMPANY PROFILE

    CHAPTER - 1

  • 2

    COMPANY PROFILE

    (THE COMPANIES ACT, 1956)

    (COMPANY LIMITED BY SHARES)

    M E M O R A N D U M OF A S S O C I A T I O N

    OF

    SWARNIM INFOSOFT PRIVATE LIMITED

    The Name of the Company is SWARNIM INFOSOFT PRIVATE LIMITED

    The Registered Office of the Company will be situated in C-41,Sector 2, Noida, Gautam Budh Nagar, Uttar Pradesh 201301.

    The objects for which the Company is established are:-

    THE MAIN OBJECTS TO BE PURSUED BY THE COMPANY ON ITS INCORPORATION ARE:-

    1. To carry on the business of providing, designing & engineering services to domestic & international market such as software design, product design, architectural design, security system design, acoustic system design, CAD design, 2D/3D rendering, media designs, off-shore engineering & design services, import & export of all types of software and hardware.

    2. To develop, produce, alter, acquire, buy, sell, import, export, lease, licence or otherwise deal in computer software, hardware and programs of all kind and nature and for all use including but not limited to computer aided engineering, software for micro processor based systems, manufacturing computer aided graphics, operation maintenance and service of all plants and equipments and software for banks and/or for special application and for any other purpose.

    3. To provide consultancy, technical manpower services, educational services, high end training in software, hardware, networking, ERP, electronics, VLSI, Embedded Systems, Internet Technologies etc, establishing training institutes, educational marketing, appointing franchise of all kinds of software & computer related activities in India and abroad. To carry on the business of formulating, developing, improving, designing, marketing, selling, franchise, exporting and licensing software and products of any description. To carry on the business of consultants, system integrators, network integrators, system developers, software developers, research on management, manpower exports in the field of hardware and software skills and other allied activities, Management and business solution consulting for other companies in the areas of defining strategy, vision, business restructuring, Management systems planning and implementation, Business process Modeling and mapping, analysis and solutions, Research and development for new products and technologies in the various areas of Information Technology, Internet and communication.

  • 3

    4. To provide internet or channel services such as web hosting, web designing, internet training and internet based solutions. To provide training and internet based solutions and to initiate, undertake, carry on, engage in, promote, assist, encourage, and conduct research, development, experiments, studies, project analysis, onshore & offshore projects, back office operations, examinations, surveys and tests of all kinds related to computers, electronic data processing equipments, electronic data processing equipments, software and hardware programs solution of all kinds, marketing of other software products and technologies licensed to the company by others.

    5. To carry on assembling, marketing, operating, altering, converting, processing importing, designing, buying, selling, exporting, installing, servicing, exchanging, or otherwise dealing in all types of computer software, hardware, data processing machines, peripherals, word-processing machines, calculators, computerized systems, telecommunication, network systems, transmission systems covering all media such as wireless, satellite and other computer based systems and instruments and their compounds, devices and spare parts. To carry on the business of maintenance, repair and reconditions of all types of software and hardware, computers, networks equipments.

    6. To carry on the business of processing of jobs for markets and management consultancy in the field of computer software, Hardware, Networking, Data Processing, back office operations, micro processor and VLSI design, micro processor based intelligent systems and in any other field.

    1.1 OUR VISION

    We shall define ourselves in the cutting edge technology in the coming era. We

    shall create honest working environment with see-through-glass planning.

    1.2 OUR MISSION

    To create opportunity for growth & self actualization to trainees and provide an

    environment of highly conducive works culture.

    WORK RELATED AREAS:

    1. Web Page designing and hosting 2. Internet and Intranet Solutions 3. Web based applications development 4. Client / Server Applications Development 5. Re-engineering 6. Research & Development in WAP and Web related conversing technologies 7. Corporate training 8. High-end User Training (Vocational)

  • 4

    Analysis of Proposed System

    And

    System requirements

    CHAPTER - 2

  • 5

    2.1-System Analysis:

    PROBLEMS IN EXITING SYSTEM

    In the current system the main problem of resolving the queries of trainees is taking time delay

    due to classes running in weekends or week days. If trainees have any problem regarding their

    classes, have to wait for resolving their problem in the next classes. This problem breaks the

    flow of study. Another problem is trainees only can communicate if they are at classes so its

    create communication gap between trainees.

    PROPOSED SYSTEM

    We have analysis on the problems in exiting and designed a much simpler system to resolve

    the problem.

    In this system trainee can submit their question online and can get the solution easily at any

    time. Trainees can create Group, join and communicate each other by sending message and

    resolve their problem online. Moderator can upload article and Trainees can download article.

    To achieve these objectives, Tech Mentro has planned to develop a web application named

    etutes.in. etutes.in shall have following functionality:

    Students can use etutes for training, submitting their questions, reading answers of posted queries, search topic and enhancing their skills.

    Online courses of various technologies shall be introduced by Tech Mentro using etutes.

    Online upload and download of article.

    Analysis is a detailed study of the various operations performed by a system and their relation

    within and outside the system. A key question is what must be done to solve the problem.

    One aspect of the analysis defining the boundaries of the system and determining whether or

    not a candidate system should consider other related system. During analysis data are collected

    on the available files decision points and transaction handled by the parent system. Some

    logical system models and tools are used in the analysis. Data flow diagrams, interviews,

    onsite observation and questionnaires are examples, the interviews commonly used in analysis.

    It requires special skill and sensitivity to the subject being interview bias in data collection and

    interpretation can be problem.

  • 6

    System Planning and the Initial Investigation:

    The most critical phase of managing system projects is planning to launch a system

    investigation, we need plan detailing the steps to be taken, the people to be questioned and they

    outcome expected. The initial investigation has the objective of determining whether the users

    request has potential merit. The major steps are defining user requirements. When the initial

    investigations completed. The user receives a proposal summarizing the finding the

    recommendation of the analyst.

    Information Gathering:

    A key part of feasibility analysis is gathering information about the present system. The analyst

    knows what information to gather, where to find it, how to collect it and what to make of it.

    The proper use of tools for gathering information is the key to successful analysis.

    The tools are the traditional interview, questionnaire, and on-site observation. We need to

    know, for example how to structure an interview, what makes up a questionnaire, and what to

    look for on-site observations. These tools when learned help analysis assess the effectiveness

    of the present system and provide the ground work for recommending a candidate system.

    H/W & S/W REQUIREMENT (RECOMMENDED) HARDWARE REQUIREMENT

    RAM 1GB

    PROCESSOR PENTIUM IV AND ABOVE

    HARD DISK 20GB

    KEYBOARD NORMAL(102/103 keys)

    MOUSE NORMAL

    SOFTWARE REQUIREMENT

    OPERATING SYSTEM WIINDOWS XP SP2

    WEB SERVER & IDE APACHE-TOMCAT 6.0,MYECLIPSE 8.0

    FRONT-END JAVA & JSP

    BACK-END ORACLE10G

    ADDITIONAL API APACHE-LUCENE

  • 7

    PLATEFORM (Technology/Tool Selection)

    FRONT-END

    Introduction to Java

    Java is a high-level, third-generation programming language like C, FORTRAN, Perl and many

    others. It is a platform for distributed computing a development and run-time environment that

    contains built-in support for the World Wide Web.

    History of Java

    Java development began at Sun Microsystems in 1991, the same year the World Wide Web was

    conceived. Javas creator, James Gosling did not design java for the Internet. His Objective was to

    create a common development environment for consumer electronic devices which was easily portable

    from one device to another. This effort evolved into a language, code named Oak and later renamed

    Java that retains much of the syntax and power of c++, but is simpler and more platform-independent.

    Java Features

    Some of the important features of Java are as follows:

    Simplicity

    Orientation

    Platform Independence

    Security

    High Performance

    Multi Threading

    Dynamic linking.

    Garbage Collection.

    One of the most important features of Java is platform independence, which makes it famous

    and suitable language for World Wide Web.

    Why Java is Platform Independent?

    Java is Platform Independent because of Java Virtual Machine (JVM).

    Java Virtual Machine (JVM)

    The client application or operating system must have a java byte-code interpreter to execute

    byte-code instructions. The interpreter is a part of a larger program called the JVM. The JVM interprets

    the byte code into native code and is available on platforms that support Java.

    When the user runs a Java program, it is up to the JVM to load, possibly verify, and then execute it. The

    JVM can perform this function from within a browser or any other container program or directly on top

    of the operating system.

  • 8

    When a browser invokes the JVM to run a Java program, the JVM does a number of things:

    It validates the requested byte-code, verifying that they pass various formatting and

    security checks.

    It allocates memory for the incoming java class files and guarantees that the security of

    JVM is not violated. This is known as the class loader module.

    It interprets the byte code instructions found in the class files to execute the program.

    Interaction of JSP Page with JDBC

    Application Server Machine

    Client Machine

    Browser

    with

    HTML

    DB Server Machine

    Here the browser using the web application is not required to support java at all. The JSP has

    full control over how many JDBC connections are made to the server. The client never makes direct

    JDBC connection to the server. This solution can work readily through a firewall, only standard HTTP

    is used between the web server and the client.

    As a bonus this solution sends itself to easily secured information simply by adding secured

    socket layer support to the web server. Because of this separation of the presentation from the business

    logic, which is separated from the database logic, this sort of system is often called three tiers of the

    system. Although the application server and database server can also running on the same server

    machine.

    Web server

    JSP Engine JDBC Driver

    RDBMS Server

  • 9

    There is still one minor problem with this scenario. Project personal accessing the JSP page

    containing the embedded JDBC code can easily and inadvertently modify the database access code and

    this may result in an erroneous application or even corrupted database. There are solution for this:

    Create java beans or java classes that encapsulate all the JDBC operations. This is significantly better

    solution. But instantiation, initialization and parameterization of the java class or the beans can still

    represent a significant amount of embedded java code within the JSP.

  • 10

    BACK-END

    ORACLE 10g

    Why we are using Oracle (RDBMS)?

    Some of the merits of using Oracle (RDBMS) are as under:

    Centralization of database.

    Client Server Technology.

    Security.

    Normalization of Data Base.

    Relationship.

    Transaction Processor.

    It gives some internet related features.

    Hence because of these features we are using Oracle as a back-end technology.

    Weather you are working on LAN projects or Distributed projects, there are two sides of it:-

    Front End

    Back End

    Front End remains on client side. Front end is made for end user who uses our application.

    Basically in front end, our input-output forms reside which takes the input from the client and gives

    output back to client.

    Backend remains on server side and has two components viz.

    Server side programs

    Data Base

    Database is the most important thing in this universe as database gives identity to a thing. It

    provides us with a repository where we can store ample amount of data, at one place. Without a

    database, existence of a thing is impossible.

    While working on a project first step is to design a database.

    What is a database?

    Data Base is a collection of tables and table is a collection of records in a tabular form i.e. in

    row and columns format.

    Data Base can be divided into two parts:-

    RDBMS

    DBMS

    We will be using RDBMS (Relational Database Management System) in our project i.e. oracle 10g.

  • 11

    Feasibility Study

    A feasibility study is conducted to select the best system that meets performance requirement.

    This entails an identification description, an evaluation of candidate system and the selection of best

    system for he job. The system required performance is defined by a statement of constraints, the

    identification of specific system objective and a description of outputs.

    The key consideration in feasibility analysis are :

    1. Economic Feasibility :

    2. Technical Feasibility :

    3. Operational Feasibility:

    Economical feasibility

    It looks at the financial aspects of the project. It determines whether the management has

    enough resources and budget to invest in the proposed system and the estimated time for the recovery

    of cost incurred. It also determines whether it is worth while to invest the money in the proposed

    project. Economic feasibility is determines by the means of cost benefit analysis.The proposed system

    is economically feasible because the cost involved in purchasing the hardware and the software are

    within approachable. The personal cost like salaries of employees hired are also nominal, because

    working in this system need not required a highly qualified professional. The operating-environment

    costs are marginal. The less time involved also helped in its economical feasibility. It was observed that

    the organization has already using computers for other purpose, so that there is no additional cost to be

    incurred for adding this system to its computers.

    The backend required for storing other details is also the same database that is Sql. The

    computers in the organization are highly sophisticated and dont needs extra components to load the

    software. Hence the organization can implement the new system without any additional expenditure.

    Hence, it is economically feasible.

    Software Cost :

    Apache Tomcat6.0 : Open Source

    MyEclipse : 20000/-

    Oracle : 15000/-

    J2EE Kit : Free

  • 12

    Manpower Cost :

    Technical Feasibility

    It is a measure of the practically of a specific technical solution and the availability of

    technical resources and expertise

    The proposed system uses Java as front-end and Oracle 10g as back-end tool.

    Oracle is a popular tool used to design and develop database objects such as table

    views, indexes.

    The above tools are readily available, easy to work with and widely used for

    developing commercial application.

    Hardware used in this project are- p4 processor 2.4GHz, 512 MB RAM, 40 GB

    hard disk. This hardware was already available on the existing computer system. The

    software like Oracle 10g, Weblogic Server, JDK, JSDK, J2EE and operating system

    WINDOWS-XP SP2 used were already installed On the existing computer system. So no

    additional hardware and software were required to purchase and it is technically feasible. The

    technical feasibility is in employing computers to the organization. The organization is

    Team cost : 25000/-

    System Cost : 40,000/-

    Total Cost : 100000/-

  • 13

    equipped with enough computers so that it is easier for updating. Hence the organization has

    not technical difficulty in adding this system.

    Tools Used :

    1) JDK 1.4

    2) J2EE Library

    3) MyEclipse 8.0

    4) Apache-Tomcat 6.0

    5) Oracle 10g.

    Duration of Project:-

    Operational Feasibility

    The system will be used if it is developed well then be resistance for users that

    undetermined

    No major training and new skills are required as it is based on DBMS model.

    It will help in the time saving and fast processing and dispersal of user request and applications.

    Time Duration

    For study 15 days

    Designing 20 days

    For development 90 days

    Testing 15 days

    Total time 140 days

  • 14

    New product will provide all the benefits of present system with better performance.

    Improved information, better management and collection of the reports.

    User support.

    User involvement in the building of present system is sought to keep in mind the user specific requirement and needs.

    User will have control over there own information. Important information such as pay-slip can be generated at the click of a button.

    Faster and systematic processing of user application approval, allocation of IDs, payments, etc. used had greater chances of error due to wrong information entered by

    mistake.

    Behavioral Feasibility

    People are inherent to change. In this type of feasibility check, we come to know if

    the newly developed system will be taken and accepted by the working force i.e. the people

    who will use it.

  • 15

    2.2- Software Analysis

    (A) USECASE DIAGRAMS:

    A use case diagram is a diagram that shows a set of use cases and actors and their

    relationships. A use case specifies the behavior of a system or a part of a system and is a

    description of a set of sequences of actions, including variants that a system performs to yield

    an observable result of value to an actor. As mentioned below the use case diagrams are

    usually specified along with the

    requirements analysis or can be used as an aid in the designing also at ten preliminary levels.

    Use Case Diagram (User)

  • 16

    Use Case Diagram (Admin/ Moderator)

  • 17

    (B) DATA DICTONARY

    This part of the Design consists the overall database schema or we can say that tables which consists

    various types of records. Table of a database consists attributes,entities,tupels for storing and

    manipulating records

    Some of the tables are s follows:

    ((11)) UserDetails: This table sshhaallll ssttoorree ggeenneerraall iinnffoorrmmaattiioonn ooff tthhee uusseerrss.. IItt ccoonnttaaiinnss ffoolllloowwiinngg ffiieellddss..

    Field name Data type Constraint/Description

    uusseerrIIdd NNuummbbeerr EEaacchh uusseerr hhaavvee uunniiqquuee uusseerriidd wwhhiicchh iiss aauuttoo ggeenneerraatteedd

    mmaaiillIIdd VVaarrcchhaarr22 EEaacchh uusseerr ccaann hhaavvee uunniiqquuee eemmaaiilleedd

    PPaasssswwoorrdd VVaarrcchhaarr22 EEaacchh uusseerr hhaavvee tthheeiirr oowwnn ppaasssswwoorrdd ttoo llooggiinn iinn ppoorrttaall

    ddiissppllaayyNNaammee VVaarrcchhaarr22 NNaammee ooff uusseerr wwhhiicchh iiss ddiissppllaayyeedd aafftteerr llooggiinn

    RRoollee VVaarrcchhaarr22 DDiiffffeerreenntt uusseerr hhaavvee ddiiffffeerreenntt aacccceessss rriigghhtt

    jjooiinniinnggDDaattee DDaattee RReeggiissttrraattiioonn ddaattee aanndd ttiimmee iiss ssttoorreedd iinn tthhiiss ffiieelldd

    ppoossttCCoouunntt NNuummbbeerr CCoouunntt ooff ppoossttss ssuubbmmiitttteedd bbyy tthhee uusseerr oonn aallll ffoorruummss

    rreeppllyyCCoouunntt NNuummbbeerr CCoouunntt ooff rreepplliieess ssuubbmmiitttteedd bbyy tthhee uusseerr oonn aallll ffoorruummss

    ggrroouuppssCCoouunntt NNuummbbeerr CCoouunntt ooff ggrroouuppss jjooiinneedd bbyy tthhee uusseerr

    ffoorruummssCCoouunntt NNuummbbeerr CCoouunntt ooff ffoorruummss jjooiinneedd bbyy tthhee uusseerr

  • 18

    ((22)) GroupDetails: Thhiiss ttaabbllee sshhaallll ssttoorree iinnffoorrmmaattiioonn ooff aallll uusseerr GGrroouuppss.. IItt ccoonnttaaiinnss ffoolllloowwiinngg ffiieellddss..

    Field name Data type Constraint/Description

    ggrroouuppIIdd NNuummbbeerr EEaacchh ggrroouupp ccoonnttaaiinn uunniiqquuee ggrroouuppiidd

    ggrroouuppNNaammee VVaarrcchhaarr22 NNaammee ooff tthhee ggrroouupp

    ggrroouuppOOwwnneerr NNuummbbeerr UUsseerr IIdd ooff tthhee ggrroouupp oowwnneerr

    mmeemmbbeerrCCoouunntt NNuummbbeerr CCoouunntt nnoo ooff mmeemmbbeerr iinn aa ggrroouupp

    DDeessccrriippttiioonn VVaarrcchhaarr22 DDeessccrriippttiioonn aabboouutt ggrroouupp

    ((33)) GroupUsers: Thhiiss ttaabbllee sshhaallll ssttoorree iinnffoorrmmaattiioonn ooff aallll tthhee mmeemmbbeerrss ooff aa GGrroouupp.. IItt ccoonnttaaiinnss

    ffoolllloowwiinngg ffiieellddss..

    Field name Data type Constraint/Description

    ggrroouuppIIdd NNuummbbeerr IItt ccoonnttaaiinn ggrroouupp iidd

    uusseerrIIdd NNuummbbeerr UUsseerr iidd wwhhoo jjooiinneedd tthhee ggrroouupp

    jjooiinniinnggDDaattee DDaattee DDaattee ooff jjooiinniinngg tthhee ggrroouupp

    ((44)) ForumDetails: Thhiiss ttaabbllee sshhaallll ssttoorree iinnffoorrmmaattiioonn ooff aallll tthhee ffoorruummss.. IItt ccoonnttaaiinnss ffoolllloowwiinngg ffiieellddss..

    Field name Data type Constraint/Description

    ffoorruummIIdd NNuummbbeerr EEaacchh ffoorruumm hhaavvee uunniiqquuee ffoorruumm iidd

    MMooddeerraattoorr NNuummbbeerr AAddmmiinn oorr mmooddeerraattoorr wwhhoo ssttaarrtteedd tthhee ffoorruumm

    ssttaarrttDDaattee DDaattee DDaattee ooff ssttaarrttiinngg tthhee ffoorruumm

    TTooppiicc VVaarrcchhaarr22 NNaammee ooff tthhee ffoorruumm

    ppoossttCCoouunntt NNuummbbeerr NNoo ooff ppoosstt ssuubbmmiitttteedd iinn tthhee ffoorruumm

    mmeemmbbeerrCCoouunntt NNuummbbeerr NNoo ooff mmeemmbbeerr ss jjooiinneedd iinn tthhee ffoorruumm

  • 19

    ((55)) ForumUsers: Thhiiss ttaabbllee sshhaallll ssttoorree iinnffoorrmmaattiioonn ooff aallll tthhee mmeemmbbeerrss ooff aa ffoorruumm.. IItt ccoonnttaaiinnss

    ffoolllloowwiinngg ffiieellddss..

    Field name Data type Constraint/Description

    ffoorruummIIdd NNuummbbeerr TThhiiss ffiieelldd ccoonnttaaiinn tthhee iidd ooff tthhee ffoorruumm

    uusseerrIIdd NNuummbbeerr UUsseerr iidd ooff tthhee jjooiinneedd mmeemmbbeerr ss ooff tthhee ffoorruumm

    jjooiinniinnggDDaattee DDaattee DDaattee ooff jjooiinniinngg tthhee ffoorruumm

    RRaannkk VVaarrcchhaarr22 mmooddeerraattoorr,, mmeemmbbeerr

    ppoossttCCoouunntt NNuummbbeerr CCoouunntt ooff ppoossttss ssuubbmmiitttteedd bbyy tthhee uusseerr oonn tthhiiss ffoorruumm

    rreeppllyyCCoouunntt NNuummbbeerr CCoouunntt ooff rreepplliieess ssuubbmmiitttteedd bbyy tthhee uusseerr oonn tthhiiss ffoorruumm

    ((66)) PostDetails: Thhiiss ttaabbllee sshhaallll ssttoorree iinnffoorrmmaattiioonn ppoosstt ooff uusseerrss oonn aa ffoorruumm.. IItt ccoonnttaaiinnss ffoolllloowwiinngg

    ffiieellddss..

    Field name Data type Constraint/Description

    PPoosstteedd NNuummbbeerr EEaacchh ssuubbmmiitttteedd ppoosstt hhaavvee uunniiqquuee iidd

    PPoosstteerr NNuummbbeerr IIdd ooff tthhee uusseerr wwhhoo ssuubbmmiitttteedd tthhee ppoosstt

    PPoossttddaattee DDaattee DDaattee ooff ppoossttiinngg

    CCoonntteennttss VVaarrcchhaarr22 CCoonntteenntt ooff tthhee ppoosstt

    vviieewwCCoouunntt NNuummbbeerr NNoo ooff ttiimmeess tthhee ppoosstt iiss vviieewweedd

    rreeppllyyCCoouunntt NNuummbbeerr NNoo ooff ttiimmeess rreeppllyy iiss sseenntt

    RRaattiinngg VVaarrcchhaarr22 RRaattiinngg ggiivveenn oonn tthhee bbaassiiss ooff vvootteess..

  • 20

    ((77)) ReplyDetails: Thhiiss ttaabbllee sshhaallll ssttoorree iinnffoorrmmaattiioonn rreepplliieess ooff aa ppoosstt oonn aa ffoorruumm.. IItt ccoonnttaaiinnss

    ffoolllloowwiinngg ffiieellddss..

    Field name Data type Constraint/Description

    rreeppllyyIIdd NNuummbbeerr EEaacchh rreeppllyy hhaavvee uunniiqquuee iidd

    ppoosstteedd NNuummbbeerr PPoosstt iidd ffoorr tthhee rreeppllyy iiss ssuubbmmiitttteedd

    rreeppllyyPPoosstteerr NNuummbbeerr IIdd ooff tthhee uusseerr wwhhoo ssuubbmmiitttteedd tthhee rreeppllyy

    rreeppllyyDDaattee DDaattee DDaattee wwhheenn rreeppllyy iiss ssuubbmmiitttteedd

    CCoonntteennttss VVaarrcchhaarr22 CCoonntteenntt ooff tthhee rreeppllyy

    vviieewwCCoouunntt NNuummbbeerr NNoo ooff ttiimmeess rreeppllyy iiss vviieewweedd

    RRaattiinngg VVaarrcchhaarr22 RRaattiinngg ggiivveenn ttoo tthhee rreeppllyy oonn tthhee bbaassiiss ooff vvootteess..

    (8) Message Table:- This table shall store information of message

    Field name Data type Constraint/Description

    Mid Number EEaacchh mmeessssaaggee hhaavvee uunniiqquuee iidd

    Toid Number IIdd ooff tthhee mmeessssaaggee RReecceeiivveerr

    Fromid Number IIdd ooff tthhee mmeessssaaggee SSeennddeerr

    Fromeid Varchar2(400) LLooggiinn iidd ooff tthhee SSeennddeerr

    Sub Varchar2(400) SSuubbjjeecctt

    Mess Varchar2(400) MMeessssaaggee

    (9)Article Table:- This table shall store the information of article.

    Field name Data type Constraint/Description

    AArrttiicclleeiidd NNuummbbeerr EEaacchh AArrttiiccllee HHaavvee uunniiqquuee iidd

    TTooppiicc VVaarrcchhaarr22((4400)) TThhiiss ffiieelldd ccoonnttaaiinn AArrttiiccllee TTooppiicc

    AArrttddaattee VVaarrcchhaarr22((4400)) TThhiiss ffiieelldd ccoonnttaaiinn tthhee ddaattee ooff ppoossttiinngg tthhee aarrttiiccllee

    AArrttppaatthh VVaarrcchhaarr22((4400)) TThhiiss ffiieelldd ccoonnttaaiinn tthhee ppaatthh ooff tthhee aarrttiiccllee ffiillee

  • 21

    (C) DATA FLOW DIAGRAM

    Context Level DFD of etutes.in

    etutes . in

    Register for course

    Read Tutorials

    Make Payments

    Receives

    Certificates

    Upload tutorials

    and Articles

    Post Answers

    View Reports

    Receive Payments

    Current Students

    Online Trainees Tech Mentro

    Manages Courses

    Submit Queries,

    Download tutorials

    Read Replies and

    Articles

  • 22

    1 Level DFD of etutes.in

    1.0

    Registration

    registers

    login storage

    Trainee

    Course info

    Course storage

    2.0

    ProfileManager

    login info

    Registration Info

    Trainees

    3.0 Tutor Tutorial storage

    tutorial details

    Trainee storage Trainee storage

    Registration

    Details login Details

    Registration Info

    role & login Details

    view/ download tutorials

    tutorials

    4.0 Content

    Manager Trainer

    Post storage

    Article storage

    Trainer

    articles

    Quentions, Replies

    Submit post,

    view Replies

    Post Articles and Replies

  • 23

    (D)ER-DIAGRAM

  • 24

    (E) Process Specification

  • 25

  • 26

  • 27

    Logical and Physical design of system

    CHAPTER - 3

  • 28

    (A) DATABASE DESIGN

    USER DETAILS TABLE Column Name Data Type Nullable Primary Key

    USER_ID NUMBER(5,0) No 1

    MAILID VARCHAR2(20) Yes -

    PASSWORD VARCHAR2(20) Yes -

    DISPLAYNAME VARCHAR2(20) Yes -

    ROLE VARCHAR2(20) Yes -

    JOININGDATE VARCHAR2(40) No -

    POSTCOUNT NUMBER(5,0) Yes -

    REPLYCOUNT NUMBER(5,0) Yes -

    GROUPSCOUNT NUMBER(5,0) Yes -

    FORUMSCOUNT NUMBER(5,0) Yes -

    FNAME VARCHAR2(20) Yes -

    GENDER VARCHAR2(20) Yes -

    MOBILENO NUMBER(15,0) Yes -

    ADDRESS VARCHAR2(50) Yes -

    CITY VARCHAR2(20) Yes -

    STATE VARCHAR2(20) Yes -

    PINCODE NUMBER(10,0) Yes -

    USER GROUPS TABLE Column Name Data Type Nullable Primary Key

    JOININGID NUMBER No 1

    GROUPID NUMBER Yes -

    USERID NUMBER Yes -

  • 29

    COURSEDETAILS TABLE Column Name Data Type Nullable

    Primary Key

    COURSEID NUMBER No 1

    COURSENAME VARCHAR2(40) Yes -

    DURATION VARCHAR2(40) Yes -

    CONTENTS VARCHAR2(4000) Yes -

    FEE NUMBER Yes -

    FORUMUSERS TABLE Column Name Data Type Nullable Primary Key

    FORUMID NUMBER No -

    MODERATOR NUMBER Yes -

    TOPIC VARCHAR2(100) Yes -

    POSTCOUNT NUMBER Yes -

    MEMBERCOUNT NUMBER Yes -

    FORUMUSERS TABLE Column Name Data Type Nullable Primary Key

    JOININGID NUMBER No -

    FORUMID NUMBER No -

    USERID NUMBER No -

    RANK VARCHAR2(20) Yes -

    POSTCOUNT NUMBER Yes -

    REPLYCOUNT NUMBER Yes -

    USERMESSAGE TABLE Column Name Data Type Nullable

    Primary Key

    MID NUMBER Yes -

    TOID NUMBER Yes -

    FROMID NUMBER Yes -

    FROMEID VARCHAR2(400) Yes -

    SUB VARCHAR2(400) Yes -

    MESS VARCHAR2(400) Yes -

  • 30

    GROUPDETAILS TABLE Column Name Data Type Nullable

    Primary Key

    GROUPID NUMBER No 1

    GROUPNAME VARCHAR2(30) Yes -

    GROUPOWNER NUMBER Yes -

    DESCRIPTION VARCHAR2(100) Yes -

    MEMBERCOUNT NUMBER Yes -

    PAYMENTSDETAIL TABLE Column Name Data Type Nullable

    Primary Key

    PAYMENTID NUMBER No 1

    CARDNO VARCHAR2(50) Yes -

    BANKNAME VARCHAR2(100) Yes -

    PAYMENTMODE VARCHAR2(40) Yes -

    POSTDETAILS TABLE

    Column Name Data Type Nullable Primary Key

    POSTID NUMBER No 1

    POSTERID NUMBER Yes -

    FORUMID NUMBER Yes -

    POSTDATE VARCHAR2(20) Yes -

    CONTENTS VARCHAR2(80) Yes -

    VIEWCOUNT NUMBER Yes -

    REPLYCOUNT NUMBER Yes -

    VOTECOUNT NUMBER Yes -

    PAYMENT TABLE Column Name Data Type Nullable Primary Key

    PAYMENTID NUMBER No 1

    PAYMENTDATE VARCHAR2(40) Yes -

    AMOUNT NUMBER Yes -

    USERID NUMBER Yes -

    COURSEID NUMBER Yes -

  • 31

    REPLYDETAILS TABLE Column Name Data Type Nullable Primary Key

    REPLYID NUMBER No 1

    REPLIERID NUMBER Yes -

    POSTID NUMBER Yes -

    FORUMID NUMBER Yes -

    REPLYDATE VARCHAR2(20) Yes -

    CONTENTS VARCHAR2(80) Yes -

    VIEWCOUNT NUMBER Yes -

    VOTECOUNT NUMBER Yes -

    Column Name Data Type Nullable Primary

    Key

    ARTID NUMBER No 1

    TOPIC VARCHAR2(400) Yes -

    ARTDATE VARCHAR2(400) Yes -

    ARTILEPATH VARCHAR2(400) Yes -

  • 32

    (B) LAYOUT DESIGN

  • 33

  • 34

    s

  • 35

  • 36

  • 37

  • 38

  • 39

  • 40

  • 41

  • 42

  • 43

  • 44

  • 45

  • 46

  • 47

    (C) RESPONSIBILITY DESIGN

    User Manager: This Module is responsible for collecting and storing user information in the system. It

    provides views to users for editing and viewing their profiles. On line trainees can register themselves

    for various online courses through this module.

    Article Manager: This module is responsible for overall management of articles posted by trainers on

    the website. It provides views for trainers to post edit and delete queries.

    Post Manager: One of the primary aims of etutes.in is to provide a convenient mechanism to trainees

    for interacting with the trainers. This module is responsible for this service. It provides views to trainees

    to submit their questions and view their answers. A trainee can keep his/her question private or it can be

    made public to be viewed by all users.

    Course Manager: This module is responsible for the management of online courses presented by Tech

    Mentro. Using this module, Tech Mentro can introduce an online course, edit details of existing

    courses, delete existing courses etc. This module provides views for the users to view the details of

    various courses. It is also used by the trainers to upload and manage tutorials and by the trainees to

    view and download them.

    Access Controller: etutes.in shall contains thousands of tutorials, articles, posts and replies. This

    module is responsible for the authorization of these resources so that they can be accessed, viewed and

    edited by the authorized users.

    Payment Handler: This module is responsible for the management of online payments received for

    online courses. It shall use API or services of some third party vendor for handling online payments.

  • 48

    System Testing and Implementation

    CHAPTER - 4

  • 49

    4.1 TEST CASE DESIGN

    4.1.1 WHITE BOX TESTING

    This is a unit testing method, where a unit will be taken at a time and tested thoroughly at a

    statement level to find the maximum possible errors.

    I tested step wise every piece of code, taking care that every statement in the code is executed

    at least once. The white box testing is also called Glass Box Testing.

    I have generated a list of test cases, sample data, which is used to check all possible

    combinations of execution paths through the code at every module level.

    White-box test focuses on the program control structure. Test cases are derived to ensure that all

    statement in the program control structure. Test cases are derived to ensure that all statement in the

    program control structure. Test cases are derived to ensure that all statement in the program has been

    executed at least once during testing and that all logical conditions have been exercised. Basis path

    testing, a white box technique, makes use of program graphs (or graph matrices) to derive the set of

    linearly independent test that will ensure coverage. Condition and data flow testing further exercising

    degrees of complexity.

    4.1.2 BLACK BOX TESTING

    This testing method considers a module as a single unit and checks the unit at interface and

    communication with other modules rather getting into details at statement level. Here the module will

    be treated as a block that will take some input and generate output. Output for a given set of input

    combinations are forwarded to other modules.

    Black-box test are designed to uncover errors functional requirement without regard to the

    internal workings of a program. Black-box testing techniques focus on the information domain of the

    software, deriving test cases by partitioning the input and output domain of a program in manner that

    provides through test coverage. The black-box test is used to demonstrate that software functions are

    operational, that input is properly produced, and that the integrity of external information are

    maintained. A black-box test examines some fundamental aspect of a system with little or no regard for

    the integral logical structure of the software.

    Graph based testing methods explore the relationship between and behavior of program objects.

    Equivalence partitioning divides the input classes of data are likely to exercise specific software

    function. Boundary values analysis probes the programs ability to handle data at the limits of

    acceptability.

  • 50

    4.2 TEST EXECUTION

    4.2.1 UNIT TESTING

    Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using

    the detailed design and the process specifications, testing is done to uncover errors within the boundary

    of the module. All modules must be successful in the unit test before the start of the integration testing

    begins.

    In this project each service can be thought of a module. There are so many modules like Login,

    HR Department, Interviewer Section, etc. Each module has been tested by giving different sets of

    inputs. When developing the module as well as finishing the development, the module works without

    any error. The inputs are validated when accepting them from the user.

    4.2.2 INTEGRATION TESTING

    After unit testing, we have to perform integration testing. The goal here is to see if modules can

    be integrated properly, the emphasis being on testing interfaces between modules. This testing activity

    can be considered as testing the design and hence the emphasis on testing module interactions.

    In this project the main system is formed by integrating all the modules. When integrating all

    the modules I have checked whether the integration effects working of any of the services by giving

    different combinations of inputs with which the two services run perfectly before Integration.

    4.3 VALIDATION TESTING

    User name Validation- Must Be Alphabets [a-z][A-Z], Must Not Be Empty.

    Mail Id- Email Id Must is in the form of [email protected], Must Not Be Empty.

    Mobile No- Must Be Numeric, Must Not Be Empty.

    Address- Must Not Be Empty.

    State- Must Not Be Empty.

    These above are the Validation Testing We Performed in the Application.

    Validation is Quality assurance process of establishing evidence that provides a high degree of

    assurance that a product, service, or system accomplishes its intended requirements. This often involves

    acceptance of fitness for purpose with end users and other product stakeholders.

    It is sometimes said that validation can be expressed by the query "Are you building the right

    thing?" and verification by "Are you building it right?" "Building the right thing" refers back to the

    user's needs, while "building it right" checks that the specifications be correctly implemented by the

    system. In some contexts, it is required to have written requirements for both as well as formal

    procedures or protocols for determining compliance.

  • 51

    4.4 SYSTEM TESTING

    Here the System testing involved is the most widely used testing process consisting of five

    stages as shown in the figure. In general, the sequence of testing activities is component testing,

    integration testing, and then user testing. However, as defects are discovered at any one stage, they

    require program modifications to correct them and this may require other stages in the testing process to

    be repeated.

    (Component testing) (Integration testing) (User testing)

    Testing is the process of detecting errors. Testing performs a very critical role for quality

    assurance and for ensuring the reliability of the software. The results of testing are used later on during

    maintenance also.

    Testing is vital to the success of the system. System testing makes a logical assumption that if the parts

    of the system are correct, the goal will be successfully achieved. In adequate testing or non-testing leads

    Unit testing

    Module

    testing

    Acceptance

    testing

    Sub-system

    testing

    System

    testing

  • 52

    to errors that may not appear until months or even years later (Remember the New York three day

    power failure due to a misplaced Break statement).

    This creates two problems:

    1. The time lag between the cause and the appearance of the problem.

    2. The time interval effect of the system errors on files and the records on the system.

    A small error can conceivably explode into a much larger problem. Effective testing early in the process

    translates directly into long term cost savings from a reduced number of errors.

    Another reason for system testing is its utility as a user oriented vehicle before implementation. The

    best program is worthless if it does not meet the user requirements.Thus in this phase we went to test

    the code we wrote. We needed to know if the code compiled with the design or not? Whether the code

    gave the desired outputs on given inputs? Whether it was ready to be installed on the users computer or

    some more modifications were needed?

    Through the web applications are characteristically different from there software counterparts but the

    basic approach for testing these web applications is quite similar. These basic steps of testing have been

    picked from software engineering practices.

    System Security

    System Testing

    System Engineering

    Validation Testing

    Integration Testing

    Design

    Validation testing

    Code

  • 53

    FUTURE SCOPE & CONCLUSION

    CHAPTER - 5

  • 54

    FUTURE SCOPE AND FURTHER ENHANCEMENT:

    Any product despite of its meticulous design and features needs enhancement with time. etutes.in being

    no exception needs active enhancement of features and functionality. Following features are proposed

    to be implemented in future to make the product more feature rich.

    Support of video streaming of classes.

    Mechanism of receiving user feedback of provided information.

    Facility of providing customized online courses.

    CONCLUSION

    Etutes.in is a fundamental part of the Software Engineering lifecycle process. Effective use of a

    Etutes.in will lead to a more structured approach, resulting in a higher quality product while also

    reducing development and support costs. Etutes.in most commonly used in the coding and testing

    phases of the software development process. However, Etutes.in can in fact be used for many other

    purposes such as general chatting with tutor of the company to sovle our problem where the focus is

    given on the online aspect rather than to go and study. Even in software development, Etutes.in are

    quite often not limited to simply join forum,create group but it is helpful to enlarge our skills

  • 55

    BIBLIOGRAPHY

    1. Java 2 Platform Enterprise Edition Shanon , Happer

    2. (Platform and Component Specification) Davidson

    3. The Complete Reference Java2 Herbtz Schildt

    4. Pure JSP By James Godwill

    5. Professional java server programming Subramanian Allamaraju

    J2EE 2.3 Edition & Cedric Buest

    6. E-Web Publishing & Scripting MAHE

    7. Software Engineering MAHE

    8. The Complete Reference (Oracle)

    INTERNET REFRENCES

    1. www.javaworld.com

    2. www.sun.java.com

    3. www.hscript.com

  • 56

    etutes.in

    PROJECT REPORT SUBMITTED TO

    RAJIV GANDHI PROUDYOGIKI VISHWA VIDALAYA

    BHOPAL (M.P)

    IN PARTIAL FULFILLMENT FOR THE AWARD OF DEGREE OF

    MASTER OF COMPUTER APPLICATIONS (MCA)

    2010

    By

    Aditya Kumar Richhariya MCA 6th SEM, Roll no. 0926CA071003

    Project guide Mr. Neeraj Kumar

    Undertaken At

    Swarnim Infosoft Pvt. Ltd. C-41, Sector-2, Near Nirulas Hotel , Noida (u.p.) 201301 Ph. 0120-4549462, 9891830644.

    DEPARTMENT OF COMPUTER APPLICATIONS

    Institute of Technology & Management-MCA, Gwalior (M.P.)

  • 57

    INSTITUTE OF TECHNOLOGY AND MANAGEMENTGWALIOR (M.P.) Department of Computer Science & Engineering

    Visit us at Website www.itmuniverse.org (Approved by AICTE and affiliated to Rajiv Gandhi Proudyogiki Vishwavidyalaya Bhopal)

    CERTIFICATE

    This is to certify that Aditya Kumar Richhariya, student of MCA Final Semester, January

    2010 June 2010 sessions of this institute has completed his final semester project entitled

    etutes.in.

    He has submitted a satisfactory project report for the award of degree of Master of Computer

    Applications (MCA) of R.G.P.V. Bhopal.

    Sanjay Jain

    Associate Professor & Head,

    Institute of Technology & Management-MCA, Gwalior

  • 58

    ACKNOWLEDGEMENT

    With profound gratitude I praise the God for his abundant blessing.

    I would like thank Mr. Sanjay Jain Head of Dept of M.C.A. for his guidance and support.

    At the outset we would like to express our deep sense of gratitude & thankful to

    Head of Department of MCA for granting permission & providing the necessary

    facilities for successful completion of the project.

    etutes.in

    I also thank to Mr. Neeraj Kumar for his valuable advice, suggestion and inspiration in the developing the project.

    I am grateful for the co-operation & valuable suggestions rendered

    by all the staff members of the Swarnim Infosoft Pvt. Ltd. C-41, Sector-2, Near

    Nirulas Hotel , Noida (u.p.).

    It gives us immense pleasure to express our sincere and deep regards for our

    respectable Project guide Mr. Neeraj Kumar, who gives us his able innovation guidance & encouragement at every stage of the project.

    We express deepest appreciation to all the staff of concerning department, who

    really provided us the required information for this project.

    We are thankful to all friends who always help us & encourage us to complete

    our project.

    Finally, Most Importantly I would like to give my heartfelt thanks to my Parents from where I learnt the importance of hard work, sincerity, and for their love and

    encouragement.

    Aditya Richhariya

    MCA Final Semester

    Roll No -0926CA071003

  • 59

    PREFACE

    Education and Training sector in India has witnessed a paradigm shift in recent past. Cities like

    Noida, Pune, Banglore, Hyderabad, Chennai etc have emerged as the hub of high end

    Education and Training. In these cities, apart from the big I.T. Companies such as HCL,

    Wipro, IBM; a lot of smaller and medium training companies have mushroomed and are

    providing training services in various domains. Tech Mentro is one of such training company

    that provides training services in Noida. Currently, Tech Mentro uses conventional methods of

    imparting training in classroom sessions and wants to use internet as a medium for providing

    training.

    Tech Mentro has two goals in mind:

    To provide round the clock educational support to its existing students.

    To use Internet as a medium for imparting training.

    .

    Number Description Alternatives (If available)

    1 PC with 10 GB hard-

    disk and 256 MB RAM

    Not Applicable

    Number Description Alternatives (If available)

    1 Windows 95/98/XP Linux

    2 Web Browser (IE6.0) Google Chrome,Mozilla

    3 Java 5.0

    4 Apache Tomcat 6.0 WebLogic8.1

    5 Oracle 10g MySql

  • 60

    INDEX

    Srno. Topic Page no Remark

    1. Chapter 1 Company Profile 1

    2. Chapter 2 Analysis of Proposed System and System requirements

    (i) Systems Analysis

    (ii) Software Analysis

    (a) Use Case Diagram

    (b) Data Dictionary

    (c) Data flow diagram

    (d) Entity relationship diagram

    (g) Process specification

    4

    5

    11

    15

    17

    21

    23

    24

    3. Chapter 3 Logical and Physical design of system (a) Data base design

    (b) Layout

    (d) Responsibility design

    27

    28

    32

    47

    4. Chapter 4 System Testing and Implementation (i) Test case design

    (a) Black Box Testing

    (b) White Box Testing

    (ii) Test execution (a) Unit Testing

    (b) Integration Testing

    (c) Validation Testing

    (d) System Testing

    48

    49

    49

    49

    50

    50

    50

    51

    52

    5. Chapter 5 Future Scope & Conclusion (a) Future Scope

    (b)Conclusion

    53

    54

    54

    6. Chapter 6 Bibliography 55

    1. To carry on the business of providing, designing & engineering services to domestic & international market such as software design, product design, architectural design, security system design, acoustic system design, CAD design, 2D/3D rendering, m...2. To develop, produce, alter, acquire, buy, sell, import, export, lease, licence or otherwise deal in computer software, hardware and programs of all kind and nature and for all use including but not limited to computer aided engineering, software fo...3. To provide consultancy, technical manpower services, educational services, high end training in software, hardware, networking, ERP, electronics, VLSI, Embedded Systems, Internet Technologies etc, establishing training institutes, educational mark...4. To provide internet or channel services such as web hosting, web designing, internet training and internet based solutions. To provide training and internet based solutions and to initiate, undertake, carry on, engage in, promote, assist, encourage...5. To carry on assembling, marketing, operating, altering, converting, processing importing, designing, buying, selling, exporting, installing, servicing, exchanging, or otherwise dealing in all types of computer software, hardware, data processing ma...6. To carry on the business of processing of jobs for markets and management consultancy in the field of computer software, Hardware, Networking, Data Processing, back office operations, micro processor and VLSI design, micro processor based intellige...Information Gathering:

    PROJECT REPORT SUBMITTED TOByDEPARTMENT OF COMPUTER APPLICATIONS

    CERTIFICATEAditya Richhariya