Chapter - 1: Ashray - Online Child Abuse 09E21A0538,545,553&563
Chapter - 1: Ashray - Online Child Abuse 09E21A0538,545,553&563
Chapter - 1: Ashray - Online Child Abuse 09E21A0538,545,553&563
09E21A0538,545,553&563.
Chapter 1
INTRODUCTION
1.1 INTRODUCTION TO PROJECT
09E21A0538,545,553&563.
09E21A0538,545,553&563.
Chapter - 2
SYSTEM ANALYSIS
2.1 INTRODUCTION
After analyzing the requirements of the task to be performed, the next
step is to analyze the problem and understand its context. The first activity in
the phase is studying the existing system and other is to understand the
requirements and domain of the new system. Both the activities are equally
important, but the first activity serves as a basis of giving the functional
specifications and then successful design of the proposed system.
Understanding the properties and requirements of a new system is more
difficult and requires creative thinking and understanding of existing running
system is also difficult, improper understanding of present system can lead
diversion from solution.
2.2 ANALYSIS MODEL
SDLC METHDOLOGIES
This document play a vital role in the development of life cycle
(SDLC) as it describes the complete requirement of the system. It means for
use by developers and will be the basic during testing phase. Any changes
made to the requirements in the future will have to go through formal change
approval process.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
development lifecycles, however, are too slow and rigid to meet the business
demands of todays economy. A new methodology must be implemented, one
that allows organizations to build software applications faster, better, and
cheaper. RAD enables such development.
The availability of powerful CASE software makes it possible for
developers to create systems much faster than ever before. These new
integrated CASE toolsets are breaking out of the bubble of traditional software
development thought. They take application development beyond generation
coding, just as generation, many years ago, surpassed textual coding. These
tools enable a developer to drag-and-drop previously generated code, saving
that developer the time and effort of individually hand-coding the text of the
application. CASE tools also enable a developer to implement Rapid
Application Development irrespective of their programming language or
platform. CASEMakers Totem 5.0 brings Rapid Application Development to
those coding in COBOL, a traditional, yet far from defunct, programming
language.
Stanley Marcus of Neiman Marcus said, There are only two things of
importance. One is the customer, and the other is the product. If you take care
of customers, they come back. If you take care of the product, it doesnt come
back. Its just that simple. And its just that difficult. Rapid Application
Development, in addition to providing a more quality product in less time, also
ensures greater customer satisfaction. By reducing the elapsed time between
User Design and Cutover, RAD increases the likelihood that the system will
be satisfactory to the users, whose demands are met much quicker than ever
before. The RAD process also directly integrates the end-users in the
development of the application. Iterative prototyping mandates that the
development teams concentrate on delivering a series of fully functional
prototypes to designated user experts. Each prototype is tested by those users
and returned to the development team for reworking, at which point the cycle
repeats. The series of prototypes thus evolves into the final product, giving the
users the opportunity to fine-tune the requirements and review the resulting
software implementation.
09E21A0538,545,553&563.
Application
Development
has
four
essential
aspects:
2.2.4 METHODOLOGY
The challenges facing software development organizations can be
summarized as more, better, and faster. The RAD development path attacks
these challenges headon by providing a means for developing systems faster,
while reducing cost and increasing quality. Fundamentals of the RAD
methodology thus include:
Combine the best available techniques and specifying the sequence of
task that will make those techniques most effective.
Using evolutionary prototypes that eventually transformed into the
final product
Using workshops, instead of interviews, to gather requirements and
review design
Selecting a set of CASE tools to support modeling, prototyping, and
code reusability, as well as automating many of the combinations of
technique
6
09E21A0538,545,553&563.
09E21A0538,545,553&563.
application system.
2.2.5 PEOPLE
The success of Rapid Application Development is contingent upon the
involvement of people with the right skills and talents. Excellent tools are
essential to fast application development, but they do not, by themselves,
guarantee success. Fast development relies equally heavily on the people
involved. These people must thus be carefully selected, highly trained, and
highly motivated. They must be able to use the tools and work together in
close-knit teams. Rapid development usually allows each person involved to
play several different roles, so a RAD project mandates a great degree of
cooperative effort among a relatively small group of people.
Each stage of a rapid development project includes activities that need
to move fast. As a result, it is critical that management initiates the project
quickly, cutting through any political delays or red tape. At the Requirements
Planning and User Design stages, key end users must be available to
participate in workshops. While the system is being constructed, the
Construction Team, which uses the CASE toolset to accomplish detailed
design and code generation, must be poised to move quickly. At the end of the
development cycle, the Cutover Team, which handles training and cutover,
must also be ready to move quickly.
The key players in a Rapid Application Development project include:
Sponsor
A high-level user executive who funds the system and is dedicated to
both the value of the new system and to achieving results quickly.
User Coordinator
A user appointed by the Sponsor to oversee the project from the user
perspective.
Requirements Planning Team
A team of high-level users who participate in the Joint Requirements
Planning workshop.
User Design Team
A team of users who participate in the design workshop. This team
should be comprised of both high-level users from the Planning Team and
8
09E21A0538,545,553&563.
2.2.6 MANAGEMENT
Achieving high-speed development is a complex process. Systems will
not be developed and deployed rapidly if bureaucracy and political obstacles
stand in the way or if users are not appropriately involved. Management must
be totally committed to RAD in order to manage the change in culture. They
must be prepared to motivate both users and IT staff, select and manage SWAT
teams, and demonstrate through the use of performance measurements that
RAD does mean speed, quality, and productivity. Good management and
dedication to the ideals of Rapid Application Development are thus essential
to faster system building.
To successfully introduce rapid development, management must pay
careful attention to human motivation. Managers should target those
professionals whom they deem as Early Adapters. Early Adapters are those
people who see the value of a new methodology and lead the way in making it
practical to use. These employees are enthusiastic about the new methodology
and they want to make it work well in their environment. Similarly, managers
must be aware of the type of motivation that is most effective for each
9
09E21A0538,545,553&563.
09E21A0538,545,553&563.
Conclusion of Management:
Michael Hammer writes, Radical surgery is needed in IS processes.
One of the first ideas that will have to go is the whole notion of traditional
11
09E21A0538,545,553&563.
09E21A0538,545,553&563.
2.5
NUMBER OF MODULE
09E21A0538,545,553&563.
1. Administrator module
2. user module
3. Social Activists (NGOs) module
4. Investigation Agencies(Police)module,
5. Reports module.
Administrators
The Admin will build a complete picture of the suspect by computing a
correlation matrix on the basis of similarities in the related incidents. The
Admin will be able to categorize the reports on the basis of nature and severity
of abuse.
Social Activists ( NGOs):
A regular news letter shall be sent to the registered users(NGOs).
Facilitates appropriate communication between affected people and NGOs
through forums.
Investigation Agencies(Police):
The investigating agencies will be able to build conclusive picture of
the suspect on the basis of reports and statistics provided by the Admin. Secure
Registration and profile management for Police
Eye witnesses & Affected People:
Eye witnesses/Affected People shall be able to report incidents, which
may not be conclusive in themselves ,but when viewed holistically, shows a
picture of imminent danger.
Anonymous Users & Reports:
This site provides support(educative) and resources to the concern on
taking preventive actions. Registration Confirmation, Reports regarding about
incidents, Area wise report about the crime, Newsletter review statistics.
2.6 INPUT AND OUTPUT
The major inputs and outputs and major functions of the system are
follows:
Inputs:
09E21A0538,545,553&563.
Admin enter user id or date for track the user login information
New user gives his completed personnel, address and phone details for
registration.
Admin gives different kind of user information for search the user data.
User gives his user id, hint question, answer for getting the forgotten
password.
Outputs:
Chapter - 3
LITERATURE SURVEY REPORT
Preliminary investigation examine project feasibility, the likelihood the
15
09E21A0538,545,553&563.
system will be useful to the organization. The main objective of the feasibility
study is to test the Technical, Operational and Economical feasibility for
adding new modules and debugging old running system. All system is feasible
if they are unlimited resources and infinite time. There are aspects in the
feasibility study portion of the preliminary investigation:
technical guarantee of accuracy, reliability and security. The software and hard
requirements for the development of this project are not many and are already
available in-house at NIC or are available as free as open source. The work for
the project is done with the current equipment and existing software
technology. Necessary bandwidth exists for providing a fast feedback to the
16
09E21A0538,545,553&563.
Will the system be used and work properly if it is being developed and
implemented?
Will there be any resistance from the user that will undermine the
09E21A0538,545,553&563.
Chapter - 4
SOFTWARE REQUIREMENT SPECIFICATION
18
09E21A0538,545,553&563.
Developing the system, which meets the SRS and solving all the
Conducting any user training that might be needed for using the
system.
09E21A0538,545,553&563.
20
09E21A0538,545,553&563.
Member of the Data Entry group can enter requests but not approve or
delete requests
The functional specification describes what the system must do; how
the system does it is described in the Design Specification.
21
09E21A0538,545,553&563.
Other examples:
Accessibility
Availability
Backup
Certification
Compliance
Configuration Management
Documentation
Disaster Recovery
09E21A0538,545,553&563.
Failure Management
Interoperability
Maintainability
Modifiability
Open Source
Operability
Performance
Platform compatibility
Price
Portability
Recoverability
Resilience
Response time
Robustness
Security
Stability
Safety
Supportability
Testability
23
09E21A0538,545,553&563.
Chapter - 5
SELECTED SOFTWARE
5.1
24
09E21A0538,545,553&563.
5.1.1 Interoperability
Because interaction between new and older applications is
commonly required, the .NET Framework provides means to access
functionality that is implemented in programs that execute outside
the .NET environment. Access to COM components is provided in the
System.Runtime.InteropServices
and
System.EnterpriseServices
25
09E21A0538,545,553&563.
5.1.5 Security
The design is meant to address some of the vulnerabilities, such
as buffer overflows, that have been exploited by malicious software.
Additionally, .NET provides a common security model for all
applications.
5.1.6 Portability
The design of the .NET Framework allows it to theoretically be
platform agnostic, and thus cross-platform compatible. That is, a
program written to use the framework should run without change on
any type of system for which the framework is implemented.
Microsoft's commercial implementations of the framework cover
Windows, Windows CE, and the Xbox 360. In addition, Microsoft
submits the specifications for the Common Language Infrastructure
(which includes the core class libraries, Common Type System, and the
Common Intermediate Language), the C# language, and the C++/CLI
language to both ECMA and the ISO, making them available as open
standards. This makes it possible for third parties to create compatible
implementations of the framework and its languages on other
platforms.
26
09E21A0538,545,553&563.
Architecture
09E21A0538,545,553&563.
be confused with the filename on disk) contains its simple text name, version
number, culture, and public key token. The public key token is a unique hash
generated when the assembly is compiled, thus two assemblies with the same
public key token are guaranteed to be identical from the point of view of the
framework. A private key can also be specified known only to the creator of
the assembly and can be used for strong naming and to guarantee that the
assembly is from the same author when a new version of the assembly is
compiled (required to add an assembly to the Global Assembly Cache).
5.1.9 Metadata
All CLI is self-describing through .NET metadata. The CLR checks the
metadata to ensure that the correct method is called. Metadata is usually
generated by language compilers but developers can create their own metadata
through custom attributes. Metadata contains information about the assembly,
and is also used to implement the reflective programming capabilities of .NET
Framework.
5.1.10 Security
.NET has its own security mechanism with two general features: Code
Access Security (CAS), and validation and verification. Code Access Security
is based on evidence that is associated with a specific assembly. Typically the
evidence is the source of the assembly (whether it is installed on the local
machine or has been downloaded from the intranet or Internet). Code Access
Security uses evidence to determine the permissions granted to the code. Other
code can demand that calling code is granted a specified permission. The
demand causes the CLR to perform a call stack walk: every assembly of each
method in the call stack is checked for the required permission; if any
assembly is not granted the permission a security exception is thrown.
When an assembly is loaded the CLR performs various tests. Two such
28
09E21A0538,545,553&563.
tests are validation and verification. During validation the CLR checks that the
assembly contains valid metadata and CIL, and whether the internal tables are
correct. Verification is not so exact. The verification mechanism checks to see
if the code does anything that is 'unsafe'. The algorithm used is quite
conservative; hence occasionally code that is 'safe' does not pass. Unsafe code
will only be executed if the assembly has the 'skip verification' permission,
which generally means code that is installed on the local machine..NET
Framework uses appdomains as a mechanism for isolating code running in a
process. Appdomains can be created and code loaded into or unloaded from
them independent of other appdomains. This helps increase the fault tolerance
of the application, as faults or crashes in one appdomain do not affect rest of
the application. Appdomains can also be configured independently with
different security privileges. This can help increase the security of the
application by isolating potentially unsafe code. The developer, however, has
to split the application into sub domains; it is not done by the CL
Namespaces in the BCL
System
System. CodeDom
System. Collections
System. Diagnostics
System. Globalization
System. IO
System. Resources
System. Text
System.Text.RegularExpressions
Fig 5.2 Class Library
09E21A0538,545,553&563.
The Base Class Library (BCL) includes a small subset of the entire
class library and is the core set of classes that serve as the basic API of the
Common Language Runtime. The classes in mscorlib.dll and some of the
classes in System.dll and System.core.dll are considered to be a part of the
BCL. The BCL classes are available in both .NET Framework as well as its
alternative implementations including .NET Compact Framework, Microsoft
Silver light and Mono.
30
09E21A0538,545,553&563.
31
09E21A0538,545,553&563.
5.1.12 Versions
Microsoft started development on the .NET Framework in the late 1990s
originally under the name of Next Generation Windows Services (NGWS). By
late 2000 the first beta versions of .NET 1.0 were released.
Version
1.0
1.1
2.0
3.0
3.5
Version Number
1.0.3705.0
1.1.4322.573
2.0.50727.42
3.0.4506.30
3.5.21022.8
Release Date
2002-01-05
2003-04-01
2005-11-07
2006-11-06
2007-11-09
5.2 ASP.NET
32
09E21A0538,545,553&563.
09E21A0538,545,553&563.
immediately notice the improvements that ASP.NET and Web Forms offers.
For example, you can develop Web Forms pages in any language that supports
the .NET Framework. In addition, your code no longer needs to share the same
file with your HTTP text (although it can continue to do so if you prefer). Web
Forms pages execute in native machine language because, like any other
managed application, they take full advantage of the runtime. In contrast,
unmanaged ASP pages are always scripted and interpreted. ASP.NET pages
are faster, more functional, and easier to develop than unmanaged ASP pages
because they interact with the runtime like any managed application.
The .NET Framework also provides a collection of classes and tools to
aid in development and consumption of XML Web services applications. XML
Web services are built on standards such as SOAP (a remote procedure-call
protocol), XML (an extensible data format), and WSDL ( the Web Services
Description Language). The .NET Framework is built on these standards to
promote interoperability with non-Microsoft solutions.
For example, the Web Services Description Language tool included
with the .NET Framework SDK can query an XML Web service published on
the Web, parse its WSDL description, and produce C# or Visual Basic source
code that your application can use to become a client of the XML Web service.
The source code can create classes derived from classes in the class library
that handle all the underlying communication using SOAP and XML parsing.
Although you can use the class library to consume XML Web services directly,
the Web Services Description Language tool and the other tools contained in
the SDK facilitate your development efforts with the .NET Framework.
If you develop and publish your own XML Web service, the .NET
Framework provides a set of classes that conform to all the underlying
communication standards, such as SOAP, WSDL, and XML. Using those
classes enables you to focus on the logic of your service, without concerning
yourself with the communications infrastructure required by distributed
software development.
Finally, like Web Forms pages in the managed environment, your XML
Web service will run with the speed of native machine language using the
scalable communication of IIS.
34
09E21A0538,545,553&563.
World-Class
Tool
Support.
The
ASP.NET
framework
is
Manageability.
ASP.NET
09E21A0538,545,553&563.
employs
text-based,
hierarchical
09E21A0538,545,553&563.
The ability to create and use reusable UI controls that can encapsulate
common functionality and thus reduce the amount of code that a page
developer has to write.
37
09E21A0538,545,553&563.
09E21A0538,545,553&563.
5.2
C#.NET
09E21A0538,545,553&563.
on operations performed while the DataSet held the data. In the past, data
processing has been primarily connection-based. Now, in an effort to make
multi-tiered apps more efficient, data processing is turning to a message-based
approach that revolves around chunks of information. At the center of this
approach is the DataAdapter, which provides a bridge to retrieve and save data
between a DataSet and its source data store. It accomplishes this by means of
requests to the appropriate SQL commands made against the data store.
The XML-based DataSet object provides a consistent programming
model that works with all models of data storage: flat, relational, and
hierarchical. It does this by having no 'knowledge' of the source of its data,
and by representing the data that it holds as collections and data types. No
matter what the source of the data within the DataSet is, it is manipulated
through the same set of standard APIs exposed through the DataSet and its
subordinate objects.
While the DataSet has no knowledge of the source of its data, the
managed provider has detailed and specific information. The role of the
managed provider is to connect, fill, and persist the DataSet to and from data
stores.
The
OLE
DB
and
SQL
Server
.NET
Data
Providers
database.
09E21A0538,545,553&563.
Data Set. For storing, Remoting and programming against flat data,
Data Adapters. For pushing data into a DataSet, and reconciling data
against a database.
When dealing with connections to a database, there are two different
options: SQL Server .NET Data Provider (System.Data.SqlClient) and OLE
DB .NET Data Provider (System.Data.OleDb). In these samples we will use
the SQL Server .NET Data Provider. These are written to talk directly to
Microsoft SQL Server. The OLE DB .NET Data Provider is used to talk to any
OLE DB provider (as it uses OLE DB underneath).
5.3.2 Connections:
Connections are used to 'talk to' databases, and are represented by
provider-specific classes such as SqlConnection. Commands travel over
connections and resultsets are returned in the form of streams which can be
read by a DataReader object, or pushed into a DataSet object.
5.3.3 Commands:
Commands contain the information that is submitted to a database, and
are represented by provider-specific classes such as SqlCommand. A
command can be a stored procedure call, an UPDATE statement, or a
statement that returns results. You can also use input and output parameters,
and return values as part of your command syntax. The example below shows
how to issue an INSERT statement against the Northwind database.
5.3.4 Data Readers:
The Data Reader object is somewhat synonymous with a readonly/forward-only cursor over data. The DataReader API supports flat as well
as hierarchical data. A DataReader object is returned after executing a
command against a database. The format of the returned DataReader object is
different from a recordset. For example, you might use the DataReader to
show the results of a search list in a web page.
41
09E21A0538,545,553&563.
09E21A0538,545,553&563.
INSERT, UPDATE or DELETE command for each changed row. You can
explicitly set these commands in order to control the statements used at
runtime to resolve changes, including the use of stored procedures. For ad-hoc
scenarios, a CommandBuilder object can generate these at run-time based
upon a select statement. However, this run-time generation requires an extra
round-trip to the server in order to gather required metadata, so explicitly
providing the INSERT, UPDATE, and DELETE commands at design time will
result in better run-time performance.
1. ADO.NET is the next evolution of ADO for the .Net Framework.
2. ADO.NET was created with n-Tier, statelessness and XML in the
forefront. Two new objects, the DataSet and DataAdapter, are provided for
these scenarios.
3. ADO.NET can be used to get data from a stream, or to store data in a
cache for updates.
4. There is a lot more information about ADO.NET in the documentation.
5. Remember, you can execute a command directly against the database
in order to do inserts, updates, and deletes. You don't need to first put data
into a DataSet in order to insert, update, or delete it.
Also, you can use a DataSet to bind to the data, move through the data, and
navigate data relationships
5.4 SQL SERVER -2005
A database management, or DBMS, gives the user access to their data
and helps them transform the data into information. Such database
management systems include dBase, paradox, IMS, SQL Server and SQL
Server. These systems allow users to create, update and extract information
from their database.
A database is a structured collection of data.
characteristics of people, things and events. SQL Server stores each data item
in its own fields. In SQL Server, the fields relating to a particular person,
thing or event are bundled together to form a single complete unit of data,
called a record (it can also be referred to as raw or an occurrence). Each
record is made up of a number of fields. No two fields in a record can have
the same field name.
43
09E21A0538,545,553&563.
09E21A0538,545,553&563.
.
5.4.7 DISADVANTAGES OF DBMS
A significant disadvantage of the DBMS system is cost. In addition to
the cost of purchasing of developing the software, the hardware has to be
upgraded to allow for the extensive programs and the workspace required for
their execution and storage. While centralization reduces duplication, the lack
of duplication requires that the database be adequately backed up so that in
case of failure the data can be recovered.
5.4.8 FEATURES OF SQL SERVER (RDBMS)
SQL SERVER is one of the leading database management systems
(DBMS) because it is the only Database that meets the uncompromising
45
09E21A0538,545,553&563.
09E21A0538,545,553&563.
was stored on a single local computer. A single SQL statement can access data
at multiple sites. You can store data where system requirements such as
performance, security or availability dictate.
5.4.9.3 UNMATCHED PERFORMANCE
The most advanced architecture in the industry allows the SQL
SERVER DBMS to deliver unmatched performance.
5.4.9.4 SOPHISTICATED CONCURRENCY CONTROL
Real World applications demand access to critical data. With most
database Systems application becomes contention bound which
performance is limited not by the CPU power or by disk I/O, but user waiting
on one another for data access. SQL Server employs full, unrestricted rowlevel locking and contention free queries to minimize and in many cases
entirely eliminates contention wait times.
5.4.9.5 NO I/O BOTTLENECKS
SQL Servers fast commit groups commit and deferred write
technologies dramatically reduce disk I/O bottlenecks. While some database
write whole data block to disk at commit time, SQL Server commits
transactions with at most sequential log file on disk at commit time, On high
throughput systems, one sequential writes typically group commit multiple
transactions. Data read by the transaction remains as shared memory so that
other transactions may access that data without reading it again from disk.
Since fast commits write all data necessary to the recovery to the log file,
modified blocks are written back to the database independently of the
transaction commit, when written from memory to disk.
47
09E21A0538,545,553&563.
Chapter -6
SYSTEM DESIGN
6.1. INTRODUCTION
Software design sits at the technical kernel of the software engineering
process and is applied regardless of the development paradigm and area of
application. Design is the first step in the development phase for any
engineered product or system. The designers goal is to produce a model or
representation of an entity that will later be built. Beginning, once system
requirement have been specified and analyzed, system design is the first of the
three technical activities -design, code and test that is required to build and
verify software.
The importance can be stated with a single word Quality. Design is
the place where quality is fostered in software development. Design provides
us with representations of software that can assess for quality. Design is the
only way that we can accurately translate a customers view into a finished
software product or system. Software design serves as a foundation for all the
software engineering steps that follow. Without a strong design we risk
building an unstable system one that will be difficult to test, one whose
quality cannot be assessed until the last stage.
During design, progressive refinement of data structure, program
structure, and procedural details are developed reviewed and documented.
System design can be viewed from either technical or project management
perspective. From the technical point of view, design is comprised of four
activities architectural design, data structure design, interface design and
procedural design.
6.2 NORMALIZATION
It is a process of converting a relation to a standard form. The process
is used to handle the problems that can arise due to data redundancy i.e.
repetition of data in the database, maintain data integrity as well as handling
48
09E21A0538,545,553&563.
09E21A0538,545,553&563.
Data object
Relationships
Attributes
The primary purpose of the ERD is to represent data objects and their
relationships.
E-R Diagram:
50
09E21A0538,545,553&563.
51
09E21A0538,545,553&563.
Tables
52
09E21A0538,545,553&563.
53
09E21A0538,545,553&563.
54
09E21A0538,545,553&563.
information flows
55
09E21A0538,545,553&563.
09E21A0538,545,553&563.
Questionnaires should contain all the data elements that flow in and
out. Missing interfaces redundancies and like is then accounted for often
through interviews.
6.5.3 SAILENT FEATURES OF DFDS
1. The DFD shows flow of data, not of control loops and decision are
controlled considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process
whether the dataflow take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
6.5.4TYPES OF DATA FLOW DIAGRAMS
1. Current Physical
2. Current Logical
3. New Logical
4. New Physical
6.5.4.1 CURRENT PHYSICAL:
In Current Physical DFD process label include the name of people or
their positions or the names of computer systems that might provide some of
the overall system-processing label includes an identification of the
technology used to process the data. Similarly data flows and data stores are
often labels with the names of the actual physical media on which data are
stored such as file folders, computer files, business forms or computer tapes.
6.5.4.2 CURRENT LOGICAL:
The physical aspects at the system are removed as much as possible so
that the current system is reduced to its essence to the data and the processors
that transforms them regardless of actual physical form.
6.5.4.3 NEW LOGICAL:
This is exactly like a current logical model if the user were completely
happy with the user were completely with the functionality of the system but
had problems with how it was implemented typically through the new logical
model will differ from current logical model while having additional
functions, absolute function removal and inefficient flows recognized.
57
09E21A0538,545,553&563.
09E21A0538,545,553&563.
other data flow returns the original data into the beginning process.
4) A Data flow to a data store means update (delete or change).
5) A data Flow from a data store means retrieve or use.
A data flow has a noun phrase label more than one data flow noun phrase can
appear on a single arrow as long as all of the flows on the same arrow move
together as one package.
Data Flow Diagrams
59
09E21A0538,545,553&563.
Login DFD
Registration
start
Enter
Enter
uname
uname &
&
pwd
pwd
Open
Open
admin
admin
login
login
form
form
in fail
Valida
tion
in success
Admin
Admin
home
home
page
page
60
09E21A0538,545,553&563.
61
09E21A0538,545,553&563.
09E21A0538,545,553&563.
users point of view. Use cases are used during requirements elicitation and
analysis to represent the functionality of the system. Use cases focus on the
behavior of the system from external point of view.
Actors are external entities that interact with the system. Examples of
actors include users like administrator, bank customer etc., or another
system like central database.
Use case Model
READS NEWS
LETTER
USER
READ
STORI ES
63
09E21A0538,545,553&563.
LOGIN
VERIFIES NEWSLETTER
NGO
NGO/POLICE APPROVAL
ADMIN
ACCEPTS/REJECTS
LOGOUT
64
Police
09E21A0538,545,553&563.
REGISTRATION
LOGIN
CHECKS INBOX
RESPONDS
TO COMPLAINT
POLICE
NGO
GENERATES NEWS
LETTER
CHECKS
STATUS
LOGOUT
65
2.
09E21A0538,545,553&563.
SEQUENCE DIAGRAM:
news letter
stories
Actor
back to user
forward/reject the
complaints
inbox
ngo/police approval
Actor
validation
uname &
password
check inbox
forward or reject the complaint
news letters
approval
logout
09E21A0538,545,553&563.
login
inbox
logout
Actor
check username
validation
& password
check inbox
post the news letters
logout when the session completed
back to home
Login
Inbox
Actor
user name & password
3.
Activity Diagram:
67
Logout
Anonymous user
09E21A0538,545,553&563.
NGO|police
ONLINE CHILD
ABUSE
Admin
Posts the complaint
Login
vaidation
validation
Forwards/rejects
the complaints
login
logout
Approves news letter
Fig 6.14 Active Diagram for Online child abuse data base
4.
Collaborationdiagram:
68
09E21A0538,545,553&563.
1.sends complaint
Admin
Anonymous user
2.Forwards
2.Forwards
3.Sends news
letter
Police
NGO
5.
Component diagram:
6.
Deployment diagram:
69
09E21A0538,545,553&563.
Database
Client
Network
Server
Chapter 7
Output SCREENS
70
09E21A0538,545,553&563.
71
09E21A0538,545,553&563.
72
09E21A0538,545,553&563.
73
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
82
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
09E21A0538,545,553&563.
Chapter 8
SYSTEM TESTING
93
8.1
09E21A0538,545,553&563.
INTRODUCTION
Software testing is a critical element of software quality assurance and
validated against the software that has been constructed. Finally we arrive at
system testing, where the software and system elements are tested as a whole.
SYSTEM
TESTING
Integration Testing
94
User Testing
ACCEPTANCE
TESTING
09E21A0538,545,553&563.
All logical decisions have been exercised on their true and false sides
All loops are executed at their boundaries and within their operational
bounds
All internal data structures have been exercised to assure their validity.
To follow the concept of white box testing we have tested each
95
09E21A0538,545,553&563.
form .
we have created independently to verify that Data flow is correct, All
conditions are exercised to check their validity, All loops are executed on their
boundaries.
8.3.2. BASIC PATH TESTING
Established technique of flow graph with Cyclomatic complexity was
used to derive test cases for all the functions. The main steps in deriving test
cases were:
Use the design of the code and draw correspondent flow graph.
Determine the Cyclomatic complexity of resultant flow graph, using
formula:
V(G)=E-N+2 or
V(G)=P+1 or
V(G)=Number Of Regions
Where V(G) is Cyclomatic complexity,
E is the number of edges,
N is the number of flow graph nodes,
P is the number of predicate nodes.
Determine the basis of set of linearly independent paths.
09E21A0538,545,553&563.
In this type of testing all the loops are tested to all the limits possible. The
following exercise was adopted for all loops:
All the loops were tested at their limits, just above them and just below
them.
All the loops were skipped at least once.
For nested loops test the inner most loop first and then work outwards.
For concatenated loops the values of dependent loops were set with the
help of connected loop.
Unstructured loops were resolved into nested loops or concatenated loops
and tested as above.Each unit has been separately tested by the development
team itself and all the input have been validated.
8.4 INTEGRATION TESTING
Testing is done for each module. After testing all the modules, the
modules are integrated and testing of the final system is done with the test
data, specially designed to show that the system will operate successfully in all
its aspects conditions. Thus the system testing is a confirmation that all is
correct and an opportunity to show the user that the system works.
The purpose of integration testing is to verify functional, performance
and reliability requirements placed on major design items. These "design
items", i.e. assemblages (or groups of units), are exercised through their
interfaces using black box testing, success and error cases being simulated via
appropriate parameter and data inputs. Simulated usage of shared data areas
and inter-process communication is tested and individual subsystems are
exercised through their input interface.
Test cases are constructed to test that all components within
assemblages interact correctly, for example across procedure calls or process
activations, and this is done after testing individual modules, i.e. unit testing.
The overall idea is a "building block" approach, in which verified
assemblages are added to a verified base which is then used to support the
integration testing of further assemblages.
Chapter - 9
97
09E21A0538,545,553&563.
SYSTEM SECURITY
9.1 INTRODUCTION
The protection of computer based resources that includes hardware,
software, data, procedures and people against unauthorized use or natural
Disaster is known as System Security.
System Security can be divided into four related issues:
Security
Integrity
Privacy
Confidentiality
98
09E21A0538,545,553&563.
VBScript in used to ensure those required fields are filled with suitable
data only. Maximum lengths of the fields of the forms are appropriately
defined.
Tab-indexes are set according to the need and taking into account the ease
of user while working with the system.
Server side constraint has been imposed to check for the validity of
primary key and foreign key. A primary key value cannot be duplicated.
Any attempt to duplicate the primary value results into a message
intimating the user about those values through the forms using foreign key
can be updated only of the existing foreign key values.
99
09E21A0538,545,553&563.
Various Access Control Mechanisms have been built so that one user may
not agitate upon another. Access permissions to various types of users are
controlled according to the organizational structure. Only permitted users
can log on to the system and can have access according to their category.
User- name, passwords and permissions are controlled o the server side.
100
09E21A0538,545,553&563.
Chapter - 10
CONCLUSION
Preventing child abuse is not simply a matter of parents doing a better
job, but rather it is about creating a context in which doing better is easier.
Enlightened public policy and the replication of high-quality publicly
supported interventions are only part of what is needed to successfully
combat child abuse. It remains important to remind the public that child
abuse and neglect are serious threats to a childs healthy development and
that overt violence toward children and a persistent lack of attention to their
care and supervision are unacceptable. Individuals have the ability to accept
personal responsibility for reducing acts of child abuse and neglect by
providing support to each other and offering protection to all children within
their family and their community.
Benefits:
The current system develops an efficient portal which can be used by
abused children's and there well-wishers.
Through this website we could abort the ongoing issues.
101
09E21A0538,545,553&563.
Chapter - 11
BIBLIOGRAPHY
FOR SQL
www.msdn.microsoft.com
FOR ASP.NET
Asp.Net 3.5 Unleashed
www.msdn.microsoft.com/net/quickstart/aspplus/defaul
t.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx
102