Student Help Desk
Student Help Desk
Student Help Desk
A PROJECT REPORT ON
Done By
1
CERTIFICATE
External
ACKNOWLEDGEMENT
2
At every outset I express my gratitude to almighty lord for showering his
grace and blessings upon me to complete this project.
Although our name appears on the cover of this book, many people had
contributed in some form or the other form to this project Development. I
could not have done this project without the assistance or support of each of
the following and I thank you all for the same.
I wish to place on my record my deep sense of gratitude to my project
guide, Mr. ******, ***** Software Solutions, for his constant
motivation and valuable help through the project work. Express my
gratitude to Mr. ******, Director of ******* Institute of Management
& Computer Sciences for his valuable suggestions and advices throughout
the ***** course. I also extend my thanks to other Faculties for their
Cooperation during my Course.
Finally I would like to thank my friends for their cooperation to complete this
project.
*******Your
Name*********
3
ABSTRACT
ABSTRACT
Project Description
4
This Project is basically aimed in providing latest technologies & trends to
the College sector service, so that college can store there student’s records
like details of student , attendance & semester marks which can be viewed
by the student & there parents also when they login into this site. Student’s
can maintain online forum’s to share their views and questions. This site also
has facility of placement cell where percentages of students can be find by
seeing those Percentages college authority can display students list in notice
board
User friendly:
This project provides very simple and modified features, which are very
easy to view and operate. This project is designed and organized in a very
simplified manner to hold the details of students and also to maintain
online forums.
Security:
Username/Password authentication
5
TABLE OF CONTENTS
Table of Contents
1. INTRODUCTION
1.1 ORGANIZATION PROFILE
1.2 INTRODUCTION TO PROJECT
1.3 PROBLEMS IN EXISTING SYSTEM
1.4 SOLUTION TO THESE PROBLEMS
2. SYSTEM ANALYSIS
6
2.1 INTRODUCTION
2.2 ANALYSIS MODEL
2.3 STUDY OF THE SYSTEM
2.4 PROPOSED SYSTEM
2.5 SYSTEM MODULES AND H/W-S/W REQUIREMENTS
2.6 INPUT AND OUTPUT DESIGN
3. FEASIBILITY REPORT
3.1 TECHNICAL FEASIBILITY
3.2 OPERATIONAL FEASIBILITY
3.3 ECONOMICAL FEASIBILTY
4. SOFTWARE REQUIREMENT SPECIFICATIONS
4.1 SCOPE OF THE PROJECT
4.2 FUNCTIONAL REQUIREMENTS
4.3 NON-FUNCTIONAL REQUIREMENTS
5. SELECTED SOFTWARE
5.1 INTRODUCTION TO .NET FRAME WORK
5.2 ASP.NET
5.3 C#.NET / VB.NET
5.4 SQL SERVER
6. SYSTEM DESIGN
6.1 INTRODUCTION
6.2 NORMALIZATION
6.3 E-R DIAGRAMS
6.4 DATA DICTIONARY
6.5 DATA FLOW DIAGRAMS
6.6 UML DIAGRAMS
7. OUTPUT SCREENS
8. SYSTEM TESTING
8.1 INTRODUCTION
7
8.2 STRATEGIC APPROACH OF SOFTWARE TESTING
8.3 UNIT TESTING
8.4 SYSTEM TESTING
9. SYSTEM SECURITY
9.1 INTRODUCTION
9.2 SECURITY IN SOFTWARE
10. CONCLUSION
11. BIBLIOGRAPHY
8
INTRODUCTION
1. INTRODUCTION
1. Background:
Client of this project is a college .College Authority wants to
maintain a website for helping students and also wants to maintain
information about student’s attendance, marks , registration details and also
9
wants to percentages of final year students for placements in different
companies
.1.2 Objectives:
The main objective of this project is to design a website for any
Specific College to keep track the information about the students and also
to maintain a online forum which helps student.
1.3.1 Purpose:
Once the Administrator sign’s into the site. He can add course,
branches, semester and subject details. He can also maintain Student Marks
details, Attendance. Admin can get final year students percentages in
placement cell. Admin maintains groups.
1.3.3 Applicability:
1.4. Achievements:
This project gives me an opportunity of
improving my Designing, coding, analyzing and testing skills
10
SYSTEM ANALYSIS
11
2.1 INTRODUCTION
After analyzing the requirements of the task to be performed, the next
step is to analyze the problem and understand its context. The first activity
in the phase is studying the existing system and other is to understand the
requirements and domain of the new system. Both the activities are equally
important, but the first activity serves as a basis of giving the functional
specifications and then successful design of the proposed system.
Understanding the properties and requirements of a new system is more
difficult and requires creative thinking and understanding of existing running
system is also difficult, improper understanding of present system can lead
diversion from solution.
2.2 ANALYSIS MODEL
SDLC METHDOLOGIES
This document play a vital role in the development of life cycle (SDLC)
as it describes the complete requirement of the system. It means for use by
developers and will be the basic during testing phase. Any changes made to
the requirements in the future will have to go through formal change
approval process.
SPIRAL MODEL was defined by Barry Boehm in his 1988 article, “A spiral
Model of Software Development and Enhancement. This model was not the
first model to discuss iterative development, but it was the first model to
explain why the iteration models.
As originally envisioned, the iterations were typically 6 months to 2 years
long. Each phase starts with a design goal and ends with a client reviewing
the progress thus far. Analysis and engineering efforts are applied at each
phase of the project, with an eye toward the end goal of the project.
The steps for Spiral Model can be generalized as follows:
The new system requirements are defined in as much details as
possible. This usually involves interviewing a number of users
representing all the external or internal users and other aspects of
the existing system.
12
A preliminary design is created for the new system.
A first prototype of the new system is constructed from the
preliminary design. This is usually a scaled-down system, and
represents an approximation of the characteristics of the final
product.
A second prototype is evolved by a fourfold procedure:
1. Evaluating the first prototype in terms of its strengths,
weakness, and risks.
2. Defining the requirements of the second prototype.
3. Planning an designing the second prototype.
4. Constructing and testing the second prototype.
At the customer option, the entire project can be aborted if the risk
is deemed too great. Risk factors might involved development cost
overruns, operating-cost miscalculation, or any other factor that
could, in the customer’s judgment, result in a less-than-satisfactory
final product.
The existing prototype is evaluated in the same manner as was the
previous prototype, and if necessary, another prototype is
developed from it according to the fourfold procedure outlined
above.
The preceding steps are iterated until the customer is satisfied that
the refined prototype represents the final product desired.
The final system is constructed, based on the refined prototype.
The final system is thoroughly evaluated and tested. Routine
maintenance is carried on a continuing basis to prevent large scale
failures and to minimize down time.
13
Fig 1.0-Spiral Model
14
2. The operational or generic user interface
The administrative user interface concentrates on the consistent
information that is practically, part of the organizational activities and which
needs proper authentication for the data collection. The interfaces help the
administrations with all the transactional states like Data insertion, Data
deletion and Data updating along with the extensive data search capabilities.
The operational or generic user interface helps the users upon the
system in transactions through the existing data and required services. The
operational user interface also helps the ordinary users in managing their
own information helps the ordinary users in managing their own information
in a customized manner as per the assisted flexibilities
15
we need an extra circuitry element in the tag to calculate the Hamming
distance of two 16-bit numbers. Hamming distance calculators are often
seen in error-correcting hardware’s. We believe the new tag can be
implemented easily.
2.5 NUMBER OF MODULES
2. Editing
3. Viewing
4. Deleting
5. Authentication
1. Registration:-
2. Editing:-
In this Module the administrator can view all the Employees and
other Administrators or he can view the details by typing the Employee id.
4. Deleting:-
16
In this module the administrator can search the Employees
details and by typing the RFID and Employee Id and he can delete the
particular Employee Details.
5. Authentication:-
17
The major inputs and outputs and major functions of the system are
follows:
Inputs:
Admin enter his user id and password for login.
User enters his user id and password for login.
User Create new folder for personnel usage.
Admin enter user id or date for track the user login information
New user gives his completed personnel, address and phone details for
registration.
Admin gives different kind of user information for search the user data.
User gives his user id, hint question, answer for getting the forgotten
password.
Administrator giving information to generate various kinds of reports.
Outputs:
Admin can have his own home page.
Users enter their own home page.
The user defined folders can store in the centralized database.
Admin will get the login information of a particular user.
The new user’s data will be stored in the centralized database.
Admin get the search details of different criteria.
User can get his forgot password.
Different kind of reports is generated by administrator.
18
FEASIBILITY REPORT
19
Preliminary investigation examine project feasibility, the likelihood the
system will be useful to the organization. The main objective of the
feasibility study is to test the Technical, Operational and Economical
feasibility for adding new modules and debugging old running system. All
system is feasible if they are unlimited resources and infinite time. There are
aspects in the feasibility study portion of the preliminary investigation:
Technical Feasibility
Operational Feasibility
Economical Feasibility
20
Will the proposed system provide adequate response to inquiries,
regardless of the number or location of users?
Can the system be upgraded if developed?
Are there technical guarantees of accuracy, reliability, ease of access
and data security?
Earlier no system existed to cater to the needs of ‘Secure
Infrastructure Implementation System’. The current system developed is
technically feasible. It is a web based user interface for audit workflow at
NIC-CSD. Thus it provides an easy access to the users. The database’s
purpose is to create, establish and maintain a workflow among various
entities in order to facilitate all concerned users in their various capacities or
roles. Permission to the users would be granted based on the roles specified.
Therefore, it provides the technical guarantee of accuracy, reliability
and security. The software and hard requirements for the development of
this project are not many and are already available in-house at NIC or are
available as free as open source. The work for the project is done with the
current equipment and existing software technology. Necessary bandwidth
exists for providing a fast feedback to the users irrespective of the number
of users using the system.
3.2. OPERATIONAL FEASIBILITY
Proposed projects are beneficial only if they can be turned out into
information system. That will meet the organization’s operating
requirements. Operational feasibility aspects of the project are to be taken
as an important part of the project implementation. Some of the important
issues raised are to test the operational feasibility of a project includes the
following: -
Is there sufficient support for the management from the users?
Will the system be used and work properly if it is being developed and
implemented?
21
Will there be any resistance from the user that will undermine the
possible application benefits?
22
SOFTWARE REQUIREMENT SPECIFICATION
23
4.1 SCOPE OF THE PROJECT
The software, Site Explorer is designed for management of web sites
from a remote location.
Purpose: The main purpose for preparing this document is to give a general
insight into the analysis and requirements of the existing system or situation
and for determining the operating characteristics of the system.
Scope: This Document plays a vital role in the development life cycle
(SDLC) and it describes the complete requirement of the system. It is meant
for use by the developers and will be the basic during testing phase. Any
changes made to the requirements in the future will have to go through
formal change approval process.
DEVELOPERS RESPONSIBILITIES OVERVIEW:
The developer is responsible for:
Developing the system, which meets the SRS and solving all the
requirements of the system?
Demonstrating the system and installing the system at client's location
after the acceptance testing is successful.
Submitting the required user manual describing the system interfaces
to work on it and also the documents of the system.
Conducting any user training that might be needed for using the
system.
Maintaining the system for a period of one year after installation.
24
primarily based on parameters of system performance, software quality
attributes, reliability and security, cost, constraints in design/implementation
etc.
25
Examples of Functional Requirements
Interface requirements
Business Requirements
Regulatory/Compliance Requirements
Security Requirements
Member of the Data Entry group can enter requests but not approve or
delete requests
Members of the Managers group can enter or approve a request, but
26
not delete requests
Members of the Administrators group cannot enter or approve
requests, but can delete requests
The functional specification describes what the system must do; how the
system does it is described in the Design Specification.
A system may be required to present the user with a display of the number
of records in a database. This is a functional requirement.
Other examples:
Accessibility
Availability
Backup
27
Certification
Compliance
Configuration Management
Documentation
Disaster Recovery
Efficiency (resource consumption for given load)
Effectiveness (resulting performance in relation to effort)
Extensibility (adding features, and carry-forward of customizations at
next major version upgrade)
Failure Management
Interoperability
Maintainability
Modifiability
Open Source
Operability
Performance
Platform compatibility
Price
Portability
Quality (e.g. Faults Discovered, Faults Delivered, Fault Removal
Efficacy)
Recoverability
Resilience
Resource constraints (processor speed, memory, disk space, network
bandwidth etc.)
Response time
Robustness
Scalability (horizontal, vertical)
Security
28
Software, tools, standards etc.
Stability
Safety
Supportability
Testability
Usability by target user community
29
functional and physical attributes with its requirements, design, and
operational information throughout its life.
Documentation may refer to the process of providing evidence ("to
document something") or to the communicable material used to provide
such documentation (i.e. a document). Documentation may also (seldom)
refer to tools aiming at identifying documents or to the field of study
devoted to the study of documents and bibliographies
30
Maintenance is the ease with which a software product can be modified in
order to:
correct defects
meet new requirements
make future maintenance easier, or
cope with a changed environment;
31
High bandwidth / short data transmission time
Price in economics and business is the result of an exchange and from that
trade we assign a numerical monetary value to a good, service or asset
Quality: The common element of the business definitions is that the quality
of a product or service refers to the perception of the degree to which the
product or service meets the customer's expectations. Quality has no
specific meaning unless related to a specific function and/or object. Quality
is a perceptual, conditional and somewhat subjective attribute.
The idea that something is fit for purpose with respect to time;
The capacity of a device or system to perform as designed;
The resistance to failure of a device or system;
The ability of a device or system to perform a required function under
stated conditions for a specified period of time;
The probability that a functional unit will perform its required function
for a specified interval under stated conditions.
The ability of something to "fail well" (fail without catastrophic
consequences
32
These services include:
In a data system, the system response time is the interval between the
receipt of the end of transmission of an inquiry message and the beginning
of the transmission of a response message to the station originating the
inquiry.
33
business or technology to accept increased volume without impacting the
system.
34
a problem and restoring the product into service. Incorporating serviceability
facilitating features typically results in more efficient product maintenance
and reduces operational costs and maintains business continuity.
Usability is a term used to denote the ease with which people can employ a
particular tool or other human-made object in order to achieve a particular
goal. In human-computer interaction and computer science, usability often
refers to the elegance and clarity with which the interaction with a computer
program or a web site is designed.
35
SELECTED SOFTWARE
Microsoft.NET Framework
36
To provide a consistent object-oriented programming environment
whether object code is stored and executed locally, executed locally
but Internet-distributed, or executed remotely.
The .NET Framework has two main components: the common language
runtime and the .NET Framework class library. The common language
runtime is the foundation of the .NET Framework. You can think of the
runtime as an agent that manages code at execution time, providing core
services such as memory management, thread management, and remoting,
while also enforcing strict type safety and other forms of code accuracy that
ensure security and robustness. In fact, the concept of code management is
a fundamental principle of the runtime. Code that targets the runtime is
known as managed code, while code that does not target the runtime is
known as unmanaged code. The class library, the other main component of
the .NET Framework, is a comprehensive, object-oriented collection of
reusable types that you can use to develop applications ranging from
37
traditional command-line or graphical user interface (GUI) applications to
applications based on the latest innovations provided by ASP.NET, such as
Web Forms and XML Web services.
38
These features are intrinsic to the managed code that runs on the common
language runtime.
The runtime enforces code access security. For example, users can trust that
an executable embedded in a Web page can play an animation on screen or
sing a song, but cannot access their personal data, file system, or network.
The security features of the runtime thus enable legitimate Internet-
deployed software to be exceptionally feature rich.
Generate managed code that conforms to the CTS. This means that
managed code can consume other managed types and instances, while
strictly enforcing type fidelity and type safety.
39
The runtime also accelerates developer productivity. For example,
programmers can write applications in their development language of choice,
yet take full advantage of the runtime, the class library, and components
written in other languages by other developers. Any compiler vendor who
chooses to target the runtime can do so. Language compilers that target
the .NET Framework make the features of the .NET Framework available to
existing code written in that language, greatly easing the migration process
for existing applications.
While the runtime is designed for the software of the future, it also supports
software of today and yesterday. Interoperability between managed and
unmanaged code enables developers to continue to use necessary COM
components and DLLs.
40
functionality. This not only makes the .NET Framework types easy to use,
but also reduces the time associated with learning new
Console applications.
ASP.NET applications.
Windows services.
41
Client Application Development
The Windows Forms classes contained in the .NET Framework are designed
to be used for GUI development. You can easily create command windows,
buttons, menus, toolbars, and other screen elements with the flexibility
necessary to accommodate shifting business needs.
For example, the .NET Framework provides simple properties to adjust visual
attributes associated with forms. In some cases the underlying operating
system does not support changing these attributes directly, and in these
42
cases the .NET Framework automatically recreates the forms. This is one of
many ways in which the .NET Framework integrates the developer interface,
making coding simpler and more consistent.
ASP.Net
Server Application Development
The following illustration shows a basic network schema with managed code
running in different server environments. Servers such as IIS and MS Access
can perform standard operations while your application logic executes
through the managed code.
ASP.NET is the hosting environment that enables developers to use the .NET
Framework to target Web-based applications. However, ASP.NET is more
than just a runtime host; it is a complete architecture for developing Web
43
sites and Internet-distributed objects using managed code. Both Web Forms
and XML Web services use IIS and ASP.NET as the publishing mechanism for
applications, and both have a collection of supporting classes in the .NET
Framework.
If you have used earlier versions of ASP technology, you will immediately
notice the improvements that ASP.NET and Web Forms offers. For example,
you can develop Web Forms pages in any language that supports the .NET
Framework. In addition, your code no longer needs to share the same file
with your HTTP text (although it can continue to do so if you prefer). Web
Forms pages execute in native machine language because, like any other
managed application, they take full advantage of the runtime. In contrast,
unmanaged ASP pages are always scripted and interpreted. ASP.NET pages
are faster, more functional, and easier to develop than unmanaged ASP
pages because they interact with the runtime like any managed application.
The .NET Framework also provides a collection of classes and tools to aid in
development and consumption of XML Web services applications. XML Web
services are built on standards such as SOAP (a remote procedure-call
protocol), XML (an extensible data format), and WSDL ( the Web Services
44
Description Language). The .NET Framework is built on these standards to
promote interoperability with non-Microsoft solutions.
For example, the Web Services Description Language tool included with
the .NET Framework SDK can query an XML Web service published on the
Web, parse its WSDL description, and produce C# or Visual Basic source
code that your application can use to become a client of the XML Web
service. The source code can create classes derived from classes in the class
library that handle all the underlying communication using SOAP and XML
parsing. Although you can use the class library to consume XML Web
services directly, the Web Services Description Language tool and the other
tools contained in the SDK facilitate your development efforts with the .NET
Framework.
If you develop and publish your own XML Web service, the .NET Framework
provides a set of classes that conform to all the underlying communication
standards, such as SOAP, WSDL, and XML. Using those classes enables you
to focus on the logic of your service, without concerning yourself with the
communications infrastructure required by distributed software
development.
Finally, like Web Forms pages in the managed environment, your XML Web
service will run with the speed of native machine language using the scalable
communication of IIS.
45
Enhanced Performance. ASP.NET is compiled common
language runtime code running on the server. Unlike its interpreted
predecessors, ASP.NET can take advantage of early binding, just-in-time
compilation, native optimization, and caching services right out of the box.
This amounts to dramatically better performance before you ever write a line
of code.
46
with managed code services such as automatic reference counting and
garbage collection.
47
Language Support
The Microsoft .NET Platform currently offers built-in support for three
languages: C#, Visual Basic, and JScript.
What is ASP.NET Web Forms?
ASP.NET Web Forms pages are text files with an .aspx file name
extension. They can be deployed throughout an IIS virtual root directory
tree. When a browser client requests .aspx resources, the ASP.NET runtime
parses and compiles the target file into a .NET Framework class. This class
can then be used to dynamically process incoming requests. (Note that
the .aspx file is compiled only the first time it is accessed; the compiled type
instance is then reused across multiple requests).
48
An ASP.NET page can be created simply by taking an existing HTML
file and changing its file name extension to .aspx (no modification of code is
required). For example, the following sample demonstrates a simple HTML
page that collects a user's name and category preference and then performs
a form postback to the originating page when a button is clicked:
In addition to (or instead of) using <% %> code blocks to program
dynamic content, ASP.NET page developers can use ASP.NET server controls
to program Web pages. Server controls are declared within an .aspx file
using custom tags or intrinsic HTML tags that contain a runat="server"
attribute value. Intrinsic HTML tags are handled by one of the controls in the
System.Web.UI.HtmlControls namespace. Any tag that doesn't explicitly
map to one of the controls is assigned the type of
System.Web.UI.HtmlControls.HtmlGenericControl.
49
that is round-tripped between requests). Note also that no client-side script
is required.
2. ASP.NET Web Forms pages can target any browser client (there
are no script library or cookie requirements).
50
1. T-SQL (Transaction SQL) enhancements
T-SQL is the native set-based RDBMS programming language offering high-
performance data access. It now incorporates many new features including
error handling via the TRY and CATCH paradigm, Common Table Expressions
(CTE), which return a record set in a statement, and the ability to shift
columns to rows and vice versa with the PIVOT and UNPIVOT commands.
3. Service Broker
The Service Broker handles messaging between a sender and receiver in a
loosely coupled manner. A message is sent, processed and responded to,
completing the transaction. This greatly expands the capabilities of data-
driven applications to meet workflow or custom business needs.
4. Data encryption
SQL Server 2000 had no documented or publicly supported functions to
encrypt data in a table natively. Organizations had to rely on third-party
products to address this need. SQL Server 2005 has native capabilities to
support encryption of data stored in user-defined databases.
5. SMTP mail
Sending mail directly from SQL Server 2000 is possible, but challenging.
With SQL Server 2005, Microsoft incorporates SMTP mail to improve the
native mail capabilities. Say "see-ya" to Outlook on SQL Server!
51
6. HTTP endpoints
you can easily create HTTP endpoints via a simple T-SQL statement exposing
an object that can be accessed over the Internet. This allows a simple object
to be called across the Internet for the needed data.
52
REQUIREMENTS
AND
ANALYSIS
This project is mainly built for College Services. The college authority wants
to computerized there data such as student marks,attendance.college also
53
wants to maintain online forum where college authority will create group
and students can join in to those groups. College authority also wants to
maintain the percentages of the final year students for placing the students
in different companies according to there percentages.
3.2 Scheduling:
Pert chart:
Program Evaluation Review Technique, PERT can be both a cost and a time
management system. PERT is organized by events and activities or tasks.
PERT has several advantages over bar charts and is likely to be used with
more complex projects. One advantage of PERT is that it is scheduling device
that also shows graphically which tasks must be completed before others are
begun.
.
PERT CHART
INTEGRATION
AND TESTING
ANALYSIS
CODING
FINISH
WRITE
MANUAL
54
Gantt chart (Bar Chart):
A Bar Chart is perhaps the simplest form of formal project management.
The bar chart is also known as Gantt chart. It is used almost exclusively for
scheduling purposes and therefore controls only the time of projects. Gantt
Charts are a project control technique that can be used for several
purposes, including scheduling, budgeting and resource planning. A Gantt
chart is a Bar Chart, with each bar representing an activity. The bars are
drawn against a time line. The length of each bar is proportional to the
length of time planned for the activity.
GANTT CHART
JAN 25,09 FEB 15,09 MAR 12,09 APR 01,09 APR 24,09
START
ANALYSIS
I /O DESIGN
CODING
WRITE MANUAL
INTEGRATION
AND
TESTING
SLACK TIME, i.e., the LATEST TIME by which a task must be finished
White part of the bar shows the length of time each task is estimated to take
55
3.3 HARDWARE & SOFTWARE SPECIFICATIONS
HARDWARE REQUIREMENTS:
Processor : Pentium-IV
HDD : 20 GB
SOFTWARE REQUIREMENTS:
(sp2)
56
SYSTEM DESIGN
Conceptual Models:
57
An entity relationship diagram is a graphical representation of an
organization’s data storage
Requirements. Entity relationship diagrams are abstractions of the real world
which simplify the problem to be solved while retaining its essential features.
Entities:
58
An entity in A is associated with any number of entities in B. An entity
in B is associated with at the most one entity in A.
Ex: Relationship between department and faculty.
k
or
Department W in Faculty
s-
Many-to-one: 1 M
M 1
ac
Course Te es Instructor
h
Many-to-many:
M M
ug
Course Ta - Faculty
ht
by
E-R Diagram:
59
Features of ER-Diagram:
Entity
Relationship
Identifying relationship
Weak entity
60
Password
User Name
Student name
Hallticketn
o
1
M
Admin Student
Registe
rs
1
1
M
Maintai
ns
Views
Details
M
Courses
Course Id
UML Diagrams
61
Use Case Diagram
Displays the relationship among actors and use cases. A use case is a set of
scenarios that describing an interaction between a user and a system. A use
case diagram displays the relationship among actors and use cases. The two
main components of a use case diagram are use cases and actors.
62
Register Student
Course
Semester
Subject
Admin
Attendance Student
Marks
Login
Group Login
Messages to
registered Group
Add Branch
Status of Member in a
group
63
Class Diagrams:
64
Sequence diagrams
65
Sequence diagrams show a detailed flow for a specific use case or even just
part of a specific use case. They are almost self explanatory; they show the
calls between the different objects in their sequence and can show, at a
detailed level, different calls to different objects.
Objects - oblong boxes at the top or actors, named or just shown as
belonging to a class from or to which messages are sent to other objects.
Messages - solid lines for calls and dotted lines to data returns, showing the
messages that are send between objects. This includes the order of the
messages which is from top of the diagram to the bottom.
Object lifelines - dotted vertical lines showing the lifetime of the objects
Activation - the vertical oblong boxes on the object lifelines showing the
thread of control in a synchronous system.
66
1. Administrator
:Login
LoginForm
Form : Home : Course Details : Course Details
Type url
On Submit ()
View ()
Manage ()
Logout
Logout ()
67
Admin : Branch Details : Semester Details : Subject Details
Manage ()
Manage ()
Logout ()
Insert ()
Logout ()
Insert ()
Logout ()
68
: Student : Update Student
Admin Registration Details : View Details
insert ()
Manage ()
Logout ()
View all
students
Logout ()
69
: Marks
Admin : Update Marks : Insert Attendance : Placement
Cell
Insert()
Manage ()
Logout ()
Insert()
Logout ()
View
Percentages
Logout
70
Admin : Create Group : Update Group : View Group : Delete Group
Insert a
new group
()
Update
existing group
()
Logout ()
Logout ()
Delete group
Logout()
71
Student:
:Login Form
Login Form : Home : Student Info : Marks
Type url
On Submit ()
View ()
Manage()
logout
Logout ()
72
State Chart Diagrams
States represent situations during the life of an object. You can easily
illustrate a state in Smart Draw by using a rectangle with rounded corners.
Transition
Initial State
Final State
73
An arrow pointing to a filled circle nested inside another circle represents the
object's final state.
Change Password:
74
For Login:
Validating
Redirection to
Next page
Activity Diagrams:
Activity diagrams are typically used for business process modeling. They
consist of:
75
Initial node.
Activities
The starting point of the diagram is the initial node, and the activity final
node is the ending. An activity diagram can have zero or more activity final
nodes. In between activities are represented by rounded rectangles.
A swimlane is a way to group activities performed by the same actor on an
activity diagram or to group activities in a single thread.
Initial Activity:
This shows the starting point or first activity of the flow. Denoted by a
solid circle. This is similar to the notation used for Initial State.
Activity:
Signal:
76
When an activity sends or receives a message, that activity is
called a signal. Signals are of two types: Input signal (Message receiving
activity) shown by a concave polygon and Output signal (Message sending
activity) shown by a convex polygon.
Concurrent Activities:
The end of the Activity diagram is shown by a bull's eye symbol, also
called as a final activity.
Activity Diagram
77
Administrator User
Open
Site
Click login form
[valid]
Placement Student
cell Details
Student
View
Add Edit
78
User
Administrator
Group
[not valid]
Logout
79
Collaboration Diagram:
For Admin:
For Student:
80
6.5. DATA DICTONARY
After carefully understanding the requirements of the client the the
entire data storage requirements are divided into tables. The below tables
are normalized to avoid any anomalies during the course of data entry.
TABLE OF FIGURES
2.Course
81
3.Branch
4. Semester
5. Subject
82
6. Type Master
7. Login Info
8. StudentInfo
83
9. Student Marks
10. StudentAttendence
84
11. Group Info
85
13. Member Message
86
DATA FLOW DIAGRAM:
87
Larry Constantine first developed the DFD as a way of expressing
system requirements in a graphical from, this lead to the modular design.
A DFD is also known as a “bubble Chart” has the purpose of clarifying
system requirements and identifying major transformations that will become
programs in system design. So it is the starting point of the design to the
lowest level of detail. A DFD consists of a series of bubbles joined by data
flows in the system.
DFD SYMBOLS:
In the DFD, there are four symbols
1. A square defines a source(originator) or destination of system data
2. An arrow identifies data flow. It is the pipeline through which the
information flows
3. A circle or a bubble represents a process that transforms incoming data
flow into outgoing data flows.
4. An open rectangle is a data store, data at rest or a temporary repository
of data
Process that transforms data flow.
Data flow
Data Store
88
CONSTRUCTING A DFD:
Several rules of thumb are used in drawing DFD’s:
1. Process should be named and numbered for an easy reference. Each
name should be representative of the process.
2. The direction of flow is from top to bottom and from left to right. Data
traditionally flow from source to the destination although they may flow
back to the source. One way to indicate this is to draw long flow line
back to a source. An alternative way is to repeat the source symbol as a
destination. Since it is used more than once in the DFD it is marked with
a short diagonal.
3. When a process is exploded into lower level details, they are numbered.
4. The names of data stores and destinations are written in capital letters.
Process and dataflow names have the first letter of each work capitalized
A DFD typically shows the minimum contents of data store. Each data
store should contain all the data elements that flow in and out.
Questionnaires should contain all the data elements that flow in and out.
Missing interfaces redundancies and like is then accounted for often
through interviews.
SAILENT FEATURES OF DFD’s
1. The DFD shows flow of data, not of control loops and decision are
controlled considerations do not appear on a DFD.
2. The DFD does not indicate the time factor involved in any process
whether the dataflows take place daily, weekly, monthly or yearly.
3. The sequence of events is not brought out on the DFD.
Context Level Diagram
89
Admin
Admin
Student Help
Desk
Student
Student
Create Group
Insert Marks View Marks
View Attendance
Insert Attendance View
Account Details
View Attendance View all
groups
0.0
View Student
Online
Student Student
Admin Community
Create User
Change Password
Forgot Password View Group
Course Details
Branch Details
Semester Details
Subject Details
Register Student
90
Admin Module
Dfd for Login Process
Admin Form
User name
1.0 Verified & 1. 1
Admin
& Password Validation of Valid User Home Page
Password
Try again
studentAttendance
Student
attendance Course
Subject
91
Adminlogininfo
Semester
Branch
Branch Details
Group info
92
Student Module
Dfd Level for Student login
Hallticketno no
1.0 Verified &
Student 1. 1
& Password Validation of Valid User
Password Redirect to
next page
Try again
Student
Student info
2.0 Account Details
Redirection
LoginChange
Info
Password Group
Marks Details
93
Group Info
Student Marks
Student
Member Message
3.0 Messages
Group
Member Message
Members
Group Info
Register Group
94
Flow Chart
A flow chart is defined as a pictorial representation describing a process
being studied or even used to plan stages of a project. Flow charts tend to
provide people with a common language or reference point when dealing
with a project or process.
A flowchart is one of the seven basic tools of quality control, which also
includes the histogram, Pareto chart, check sheet, control chart, cause-and-
effect diagram, and scatter diagram (see Quality Management Glossary).
They are commonly used in business/economic presentations to help the
audience visualize the content better, or to find flaws in the process.
Start/End
The terminator symbol marks the starting or ending point of the system. It
usually contains the word "Start" or "End."
Action or Process
A box can represent a single step ("add two cups of flour"), or and entire
sub-process ("make bread") within a larger process.
Document
A printed document or report.
95
Flow chart for Login Screen
START
Enter User
And Password
Verify from
Database
Allow Permission as
Per access
STOP
96
SYSTEM DESIGN
97
4.1 Basic Modules
98
In this Module Admin can insert Courses which he wants to Maintain in his
college and also admin has Permission to update name of the course.
Branch Details
In this module admin will insert branches according to courses.
Semester Details
This Module maintains the details about the semester in a Particular
course.Admin has permission to update the name of the semester
Subject Details
This Module maintains the details about the subjects belonging to a
particular semester.Admin has a Permission to change the name of the
subjects.
Student Registration
In this Module admin registers the student details who will be joining in the
college
Student Attendance
In this module admin maintains attendance of student Day wise for every
subject for which classes are held.
Student Marks
This module maintains the details about the marks of the student semester
wise and also the type of the exam for which they are appearing .here type
of the exam may be Internal I, Internal II or External.
Student Update Marks
In this Module admin can update marks of the students According to type of
the type of the exam written by the Student.
Student Details Update
In this Module admin can update details of the students
99
Create Group
In this module can create a group. Group can be created on a Basic category
Update Group
Here Admin can update his group.admin can change the name of his group
name also description of group
Delete Group
In this module admin has permission to delete a group
View Group
In this module admin can view the members in each group. Here admin
changes the status of the member in the group .Initially when the member
registers into a group his status will be pending admin changes as
approved.Admin can also Change the status of the messages which are
posted
by the student.
Placement Cell
In this module admin will find percentages of final year student’s .seeing
those percentages he can pick some of the students and place them in the
notice board
Student Module
Student Module Contains sub modules
Student Information
In this Module Student can view his details when he login into the
system .he/she can view his marks details and attendance details.
Group Display
When the student log in to system. He will find a hyperlink Called group if
the student is already registered then and If he is approved student then he
will be able to see all the approved messages of that group. if the student is
100
not registered in any of the group then he will get search screen Where he
can find a group and can join in to the group
OUTPUT SCREENS
101
Output Screens:
Home Page:
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
IMPLEMENTATION
AND
SYSTEM
TESTING
Course Details:
using System;
using System.Data;
124
using System.Configuration;
using System.Collections;
using System.Web;
using System.Web.Security;
using System.Web.UI;
using System.Web.UI.WebControls;
using System.Web.UI.WebControls.WebParts;
using System.Web.UI.HtmlControls;
DataSet ds = helpdeskclass.GetCourse();
if (ds.Tables[0].Rows.Count > 0)
{
lblcourse.Visible = false;
for (int i = 0; i < ds.Tables[0].Rows.Count; i++)
{
coursename = ds.Tables[0].Rows[i]["CourseName"].ToString();
if (coursename == txtCourse.Text)
{
lblcourse.Visible = false;
c1 = coursename;
lblc.Visible = true;
txtCourse.Focus();
}//ifcoursename
}//for
}//ifds.tables[0]
125
if (c1 != txtCourse.Text)
{
CourseStatus = "Available";
b = helpdeskclass.insertcourse(txtCourse.Text,CourseStatus);
if (b)
lblcourse.Visible = true;
lblc.Visible = false;
txtCourse.Text = String.Empty;
FillGrid();
}//if
}
126
CourseStatus = ddl.SelectedItem.ToString();
b = helpdeskclass.updatecourse(CourseId, CourseStatus);
if (b)
{
gvCourseDetails.EditIndex = -1;
FillGrid();
}
}
}
INTRODUCTION
Software testing is a critical element of software quality assurance and
represents the ultimate review of specification, design and coding. In fact,
testing is the one step in the software engineering process that could be
viewed as destructive rather than constructive.
127
performance, constraints and validation criteria for software are established.
Moving inward along the spiral, we come to design and finally to coding. To
develop computer software we spiral in along streamlines that decrease the
level of abstraction on each turn.
A strategy for software testing may also be viewed in the context of
the spiral. Unit testing begins at the vertex of the spiral and concentrates on
each unit of the software as implemented in source code. Testing progress
by moving outward along the spiral to integration testing, where the focus is
on the design and the construction of the software architecture. Talking
another turn on outward on the spiral we encounter validation testing where
requirements established as part of software requirements analysis are
validated against the software that has been constructed. Finally we arrive
at system testing, where the software and other system elements are tested
as a whole.
UNIT TESTING
MODULE TESTING
Component Testing
SUB-SYSTEM TESING
SYSTEM TESTING
Integration Testing
128
ACCEPTANCE TESTING
User Testing
8.3. UNIT TESTING
3. CONDITIONAL TESTING
129
In this part of the testing each of the conditions were tested to both true and
false aspects. And all the resulting paths were tested. So that each path that
may be generate on particular condition is traced to uncover any possible
errors.
4. DATA FLOW TESTING
This type of testing selects the path of the program according to the location
of definition and use of variables. This kind of testing was used only when
some local variable were declared. The definition-use chain method was
used in this type of testing. These were particularly useful in nested
statements.
5. LOOP TESTING
In this type of testing all the loops are tested to all the limits possible.
The following exercise was adopted for all loops:
All the loops were tested at their limits, just above them and just below
them.
All the loops were skipped at least once.
For nested loops test the inner most loop first and then work outwards.
For concatenated loops the values of dependent loops were set with the
help of connected loop.
Unstructured loops were resolved into nested loops or concatenated loops
and tested as above.
Each unit has been separately tested by the development team itself
and all the input have been validated.
8.4 INTEGRATION TESTING
Testing is done for each module. After testing all the modules, the
modules are integrated and testing of the final system is done with the test
data, specially designed to show that the system will operate successfully in
all its aspects conditions. Thus the system testing is a confirmation that all is
correct and an opportunity to show the user that the system works.
130
via appropriate parameter and data inputs. Simulated usage of shared data
areas and inter-process communication is tested and individual subsystems
are exercised through their input interface.
131
SYSTEM SECURITY
9.1 INTRODUCTION
132
CLIENT SIDE VALIDATION
Various client side validations are used to ensure on the client side
that only valid data is entered. Client side validation saves server time and
load to handle invalid data. Some checks imposed are:
VBScript in used to ensure those required fields are filled with suitable
data only. Maximum lengths of the fields of the forms are appropriately
defined.
Forms cannot be submitted without filling up the mandatory data so that
manual mistakes of submitting empty fields that are mandatory can be
sorted out at the client side to save the server time and load.
Tab-indexes are set according to the need and taking into account the
ease of user while working with the system.
Various Access Control Mechanisms have been built so that one user may
not agitate upon another. Access permissions to various types of users
are controlled according to the organizational structure. Only permitted
users can log on to the system and can have access according to their
category. User- name, passwords and permissions are controlled o the
server side.
133
CONCLUSIONS
134
6. CONCLUSION
The project titled as STUDENT HELP DESK was deeply studied and
analyzed to design the code and implement with various testing methods
was done under the guidance of the experienced project guide. The solution
developed is free from all the bugs and executable with all different modules
to the utmost satisfaction of the client. All the current requirements and
possibilities have been taken care during the project time. We feel that the
solution provided now will suit to all the needs of various clients in the same
industry but also we don’t rule the possibilities of further upgrading of this
solution with the new and advance technologies and further additional
requirements of the clients.
FUTURE ENHANCEMENTS
135
BIBLIOGRAPHY
6.2 BIBLIOGRAPHY
SOFTWARE ENGINEERING
By Roger.S. Pressman
ASP.Net Professional
By Wrox Publications
MSDN 2002
136
By Microsoft
137