Online Advertising Agency
Online Advertising Agency
Online Advertising Agency
Abstract
The project entitled “Online Advertising Agency” the main aim of the project is to
provide live advertisements with the users selected images and content. Users are allowed
to give their company info and navigation links to make available on the main website
home page that is linked over the Internet. Though which we can increase the number of
users to catching the domain for their transaction. The main theme is to provide
advertisement in form of text, images, story, animations, Banners and all for the kids as
well as for the company’s. Customers can choose the media types for the advertisements
to be registered.
Television
Newspaper
Magazines
Radio
Banner
The process of making the advertisement is little because we are going to provide
the execution environment for the end users to select the available templates in which the
users can easily create their advertisement based on the Media Types (News Paper,
monitoring which helps the website management to control the amount of space need for
the each users for the purpose of story animations and distributed advertisements
generation. In User level uploading service for the story files, each user is allowed to
Language Used
Television
this sort have been used to sell every product imaginable over the
campaigns.
Newspaper
Radio
The system study phase studies the requirements of the existing system
"Online Advertising” is one of the collective information. There had more
precious and rare things, which are collected from various sources that will be
saved in database.
Measurement problems
Audience characteristics
Potential for deception
Costs,
Limited production quality,
Poor reach and lack of Intrusiveness.
CLIENT/SERVER ENVIRONMENT:
What is Client/Server?
Installation requirements
When installing web development to a hard drive other than ordinary PC,
one need to have at least 65-70MB free space on a drive to precede installation,
regardless of how much space is on installation drive.
WINDOWS2000 PLATFORM:
The Web server accepts the request and sends the HTML to the Client browser
that requests it. Web browser and web server communicate through a common protocol
(HTTP). The examples for web server are IIS (Internet Information Services), PWS
(Personal Web Server).
IIS-APPLICATION SERVER:
Its software, which makes the connectivity between client and server
communication and this software enable to run the asp pages on the client side browsers.
This software is responsible for routing the request to server and provides the services to
the client.
Generate dynamic web pages. An active server page can display different content
to different user or display different content at different times of the day.
Process the contents of HTML forms. We can use an active server page to retrieve
and respond to the data entered into an HTML form.
Can create database-driven web pages. An active server page can insert new data
or retrieve existing data from a database such a Microsoft SQL Server, Microsoft
Access.
Active server pages include several built-in objects and installable ActiveX
components.
Objects:
ASP Objects:
Active server pages include several built-in objects. The following explain detail
how to use each of the built-in objects. Built-in objects of ASP are
Application Object
Request object
Response object
Server object
Session object
Object context object
Application objects:
The application object is used to store and retrieve information that can be shared
among all users of an application. For Example, we can use the Application Object to
pass information between users of your web site.
Response objects:
The response object is used to send information back to a browser. We can use the
response object to send output from our scripts to a browser.
Server objects:
The server object enables us to use various utility functions on the server object
to control the length of time a script executes before it times out. We can also use the
server object to create instance of other objects.
Session objects:
The session object can be used to store and retrieve information about particular
user’s sessions. We can use the session object to store information that persists over the
course of a visit by a user to our web site.
The object context object is used to control Active server page Transactions. The
transactions are managed by the Microsoft transaction server (MTS).
The built in objects differ from normal objects. We don’t need to create an instance
of a built in object before we can use it in a script. The methods, collections and
properties of a built in objects are automatically accessible throughout a web site
application.
ASP Components:
Active server page components can be used to extend the power of our scripts
components differ from the built-in-objects because there are typically used for more
specialized tasks. The following list provides a brief overview of some of the components
bundled with active server pages.
Ad rotator component
Browser capabilities component
Content linking component
Counters component
Content rotator component
Collaborations data objects
ActiveX Data objects
SGML is also a Meta language for formally describing document markup system.
Infect HTML uses SGML to define a language that describes a WWW hyper document’s
structure and inter connectivity.
Following the rigors of SGML, TBL bore HTML to the world in 1990. Since then,
many of us have it to be easy to use but sometimes quite limiting. These limiting factors
are being addressed but the World Wide Web Consortium (aka W3c) at MIT. But HTML
had to start somewhere, and its success argues that it didn’t start out too badly.
MS SQL Server is a powerful database management system and the user can create
applications that require little or no programming. It supports GUI features and an entire
programming language, Visual Studio Application which can be used to develop richer and
more developed application.
There are quite a few reasons, the first being that SQL is a feature rich program
that can handle any database related task you have. You can create places to store your
data build tools that make it easy to read and modify your database contents, and ask
questions of your data. SQL is a relational database, a database that stores information
about related objects. In MS SQL that database means a collection of tables that hold data.
It collectively stores all the other related objects such as queries, forms and reports that
are used to implement function effectively.
The MS SQL database can act as a back end database for .NET as a front end, MS
SQL supports the user with its powerful database management functions. A beginner can
create his/her own database very simply by some mouse clicks. Another good reason to
use SQL as backend tool is that it is a component of the overwhelmingly popular
Microsoft office software suite.
MS SQL however is a relational database, which means that you can define
relationships among the data it contains. Relational database, are superior to flat file
databases because you can store discrete information.
Reports:
Reports are paper copies of dynasets. We can also print reports to disk, if we like.
Access helps us to create the reports. There are even wizards for complex printouts.
Properties:
Properties are the specification we assigned to parts of our database design. We can
define properties for fields, forms, controls and most other access objects.
For developing the software and hardware requirements needed the less
cost of developing the software package takes five months duration.
I. Setup cost:
This includes the cost of putting the system into place. These consists mainly
of the cost of any new hardware and ancillary equipment but will also include cost of
file conversion, recruitment and staff training.
II. Operational cost:
III.Development cost
Development cost includes salaries and other employment costs of the staff
involved in the development project and all associated costs
Direct benefits
Accessable indirect benefits
Intangible benefits
Direct benefits:
These accure directly from the operation of the proposed system. These could
for example: include reduction in salary bills through introduction of a new,
computerized system.
These are generally longer term or benefit that are considered very difficult to
quatify. Enhanced job interest can lead to reduced staff turn over and hence lower
recruitment
Logical design reviews the present physical system, prepares input and output
specifications, makes edit security and control specifications
Physical design maps out the details of the physical system, plans, system
implementation, device a test and implementation plan.
5.2. DESIGN PROCESS
5.2.1.INPUT DESIGN
This application is being developed in a user-friendly manner. The forms are being
designed in such a way that during the processing the cursor is placed in the position
where the data must be entered. An option of selecting an appropriate input from the
values of validation is made for each of the data entered. Concerning clients comfort the
project is designed with perfect validation on each field and to display error messages
with appropriate suggestions.
Help managers are also provided whenever user entry to a new field he/she can
understand what is to be entered. Whenever user enter a error data error manager
displayed user can move to next field only after entering a correct data
5.3.2.OUTPUT DESIGN
The output form of the system is either by screen or by hard copies. Output design
aims at communicating the results of the processing of the users. The reports are
generated to suit the needs of the users .The reports have to be generated with appropriate
levels. In our project outputs are generated by asp as html pages. As its web application
output is designed in a very user-friendly which will be through screen most of the time.
5.3.2. CODE DESIGN
The main purpose of code design is to simplify the coding and to achieve better
performance and quality with free of errors. The coding is prepared in such a way that the
internal procedures are more meaningful validation manager is displayed for each
column. The coding of the variables is done in such a way that one other than person who
developed the packages can understand its purpose.
To reduce the server load, the project is designed in a way that most of the
Validation of fields is done as client side validation, which will be more effective.
The database design involves creation of tables that are represented in physical
database as stored files. They have their own existence. Each table constitute of rows and
columns where each row can be viewed as record that consists of related information and
column can be viewed as field of data of same type. The table is also designed with some
position can have a null value.
The database design of project is designed in such a way values are kept
without redundancy and with normalized format. Refer the appendix for screen shots of
Database Design
5.3. DEVELOPMENT APPROACH
The importance of new system is that it is user friendly and a better interface with
user’s working on it. It can overcome the problems of manual system and the security
problem.
Top down approach of software development is the incremental approach to the
construction of program structure. Modules are integrated by moving through the control
hierarchy, beginning with the main control module. Modules subordinate to the main
control modules are incorporate into the structure in either a depth first or breadth first
manner.
System testing is the state of implementation, which is aimed at ensuring that the
system works accurately and efficiently as expect before live operation, commences. It
certifies that the whole set of programs hang together System testing requires a test plan,
that consists of several key activities and steps for run program, string, system and user
acceptance testing. The implementation of newly design package is important in adopting
a successful new system
Unit testing
Unit testing is testing changes made in a existing or new program this test is
carried out during the programming and each module is found to be working
satisfactorily. For example in the registration form after entering all the fields we click
the submit button. When submit button is clicked ,all the data in form are validated. Only
after validation entries will be added to the database.
Unit testing comprises the set of tests performed by an individual prior to
integration of the unit into large system. The situation is illustrated in as follows
The four categories of test that a programmer will typically perform on a program unit
Functional test
Performance test
Stress Test
Structure test
Functional test involve exercising the code with nominal input values for
which the expected results are known as well as boundary values and special values.
OUTPUT TESTING
Asking the user about the format required by them tests the output generated
by the system under consideration .It can be done in two ways, One on screen and other
on printer format. The output format on the screen is found to be correct as the format
designed n system test.
SYSTEM TESTING
In the system testing the whole system is tested for interface between
each modules and program units are tested and recorded. This testing is
done with sample data . The securities, communication between interfaces are
tested
System testing is actually a series of different tests whose primary
purpose is to fully exercise the computer based system although each test
has a different purpose all work to verify that all system elements properly
integrated and perform allocate function.
ACCEPTANCE TESTING
VALIDATION TESTING
TESTING RESULTS
All the tests should be traceable to customer requirements the focus of testing will
shift progressively from programs Exhaustive testing is not possible To be more effective
testing should be which has probability of finding errors
The following are the attributes of good test
1. A good test has a probability of finding a errors
2. A good test should be “best of breeds”
3. A good test to neither simple nor too complex
6.2 QUALITY ASSURANCE
Correctness: The extent to which the program meets the system specifications and user
objectives
Reliablility: The degree to which the system performs its intended functions overtime
Efficiency: The amount of computer resources required by a program to perform a
function
Usability: The effort required learning and operating a system
Maintainability: To use with which program errors are located and corrected
Testability: The effort required a testing a program to ensure its correct performance
Portability: To ease of transporting a program from hardware configuration to
another
Accuracy: The required position in input editing computation and output
Risk identification is the systematic attempt to specify threats to the project plan
(estimates the schedule resource overloading etc.). By identifying know and predictable
risk the first step is to avoiding them. When possible and controlling them when
necessary there are two types of risks
Generic Risk
Product specific risk
Generic risks are potential threats to every software project. Only those with a
clear understanding of technology can identify product specific risk The people and the
environment that is specific to the project at a hand and to identify the product specific
risk and the project the plan and the software statement of scope are examined and
answer to the following question is developed.
What special characteristics of this product may threaten the
project plan one method for identifying risk is to create a risk item and checklists. The
checklist can be used for risk identification and focus on some subset to know and
predictable risk in the following sub categories.
Product risk
Risk associated with overall size of software to built or
modified
Business imparts
Risk associated with constraints imposed with
management
Customer characteristics
Risk associated with sophisticated of the customer and developers ability to communicate
with the customer in a timely manner.
Project Risks
It identify a potential budgetary, schedule, personnel like staffing, organizing,
resource, customer requirement, problems and their impact on a software project
Technical risks
Technical risks identify potential design implementation interface, verification,
and maintenance problems.
Any system developed should be secured & protected against possible hazards.
Security measures are provided to prevent unauthorized access to database at various
levels. Password protection & simple procedures to change the unauthorized access are
provided to the users.
The user will have to enter the user name and password and if it is validated he
can participate in auction. Otherwise if he/she is a new user he should get registered and
then he can place an order
When he/she registered they should provide authentication through jpg files (like
ration card Xerox, voter identity card Xerox). A multi layer security architecture
comprising firewalls filtering routers encryption & digital certification must be assured in
this project in real time that order details are protected from unauthorized access.
Implementation is the stage in the project where the theoretical design is turned
into a working system. The most crucial stage is achieving a successful new system and
giving a user confidence in that the new system will work efficiently and effectively in
the implementation stage. The stage consist of
The implementation phase is less creative than system design. A system design
may be dropped at any time prior to implementation, although it becomes more difficult
when it goes to the design phase. The final report of the implementation phase includes
procedural flowcharts, record layouts, and a workable plan for implementing the
candidate system design into a operational design.
6.3.2 USER TRAINING
It is designed to prepare the users for testing & converting the system. There is
several ways to trail the users they are:
1) User manual
2) Help screens
3) Training demonstrations.
1) User manual:
The summary of important functions about the system & software can be
provided as a document to the user. User training is designed to prepare the user for
testing and convening a system
The summary of important functions about the system and the software can be
provided as a document to the user
1. Open http page
2. Type the file name with URL index .asp in the address bar
3. Index. ASP is opened existing user the type the username
and password
4. Click the submit button
2) Help screens:
3) Training demonstration:
1) Documentation tools:
Document production & desktop publishing tool support nearly ever aspect
of software developers. Most software development organizations spend a substantial
amount of time developing documents, and in many cases the documentation process
itself is quite inefficient. It is not use unusual for a software development effort on
documentation. For this reason, Documentation tools provide an important opportunity to
improve productivity.
2) Document restructuring:
Creating document is far too timed consuming. If the system work’s, we’ll live
with what we have. In some cases, this is the correct approach. It is not possible to
recreate document for hundreds of computer programs.
Documentation must be updated, but we have limited resources. It may not
be necessary to fully redocument an application. Rather, those portions of the system that
are currently undergoing change are fully documented.
The system is business critical and must be fully redocumented. Even in this
case, an intelligent approach is to pare documentation to an essential minimum.
Perfective maintenance:
Preventive maintenance:
Changes made to the system to avoid future problems. Any changes can be
made in the future and our project can adopt the changes.
CONCLUSION
One greater advantage of hosting web is to make the resource to know all
and to become familiar which paves a way for development of organization as
well as for profit. While hosting the software it should be attractive, user-friendly,
and easier to access.
Some special features of this project are
enhancements
S
Nothing will be useful until it is update & enhanced timely just like IT field. In
such a way that this software can have more future enhancement such as
etc
Virtual reality for the products can be achieved with the development
of technology
organization
BIBLIOGRAPHY
WEBSITES
www.asptutorial.com
www.pscode.com
www.w3schools.com
www.hotscripts.com
www.freesoft.in
BOOKS:
1) Software engineering
By
Roger S.Pressman
Fifth Edition,
Mc.Graw Hill International Edition 2001