You are on page 1of 117

STUDENT TRAINEE

MANAGEMENT SYSTEM
Developed For

National Informatics Centre


New Delhi

A PROJECT REPORT SUBMITTED


IN PARTIAL – FULFILMENT OF THE REQUIREMENT
FOR THE AWARD OF THE DEGREE
OF
MASTER OF COMPUTER APPLICATION

BY

SUMIT PARIAHR
(04/MCA/30)

COMPUTER SCIENCE ENGINEERING & MCA DEPARTMENT


KUMAON ENGINEERING COLLEGE, DWARAHAT 263653,
UTTARAKHAND

JUNE 2007
2
3

GOVERNMENT OF INDIA
MINISTRY OF COMMUNICATIONS &
INFORMATION TECHNOLOGY
DEPARTMENT OF INFORMATION TECHNOLOGY

National Informatics Centre


This is to certify that SUMIT PARIHAR ID.N0 9506 a student Of Master Of
Computer Application (MCA) from KUMAON ENGINEERING COLLEGE
DWARAHAT,UTTARAKHAND is doing his full-semester project training at
TRAINING Division, NIC, New Delhi, from.

The project work entitled ” Design and Development of Student Trainee


Management System” embodies the original work done by Sumit Parihar
during his above full semester project training period.

Rajendra Prasad(Scientist C) Dr. S.C.Gupta


Project Guide/HOD Head, Training
Division
4

CERTIFICATE

This is to certify that the Project report entitled STUDENT TRAINEE


MANAGEMENT SYSTEM submitted by SUMIT PARIHAR, to
the Computer Science Engineering Department, Kumaon
Engineering College, Dwarahat, for the award of degree of MCA, is
a bonafide project work carried out by him.

This project work has been carried out under the supervision of ______ in the
________________ organization. This work is original and has not
been submitted, in part or full, to any other University or Institution
for the award of any other degree.

Student Supervisor
5

DECLARATIONS

I, Sumit Parihar hereby declare that the project entitled “Design and Development
of Student Trainee Management System” which have to be submitted in the
partial fulfillment of the requirements for the awards of Master Of Computer
Application in the Kumaun University Nainital, is an own record carried out by me
under the supervision of my teacher DR Rajiv Aggarwaal HOD (Comp .Sc). The
matter embodied in this project has not been submitted so far for the award of any
degree.

(Sumit Pairhar)

Signature
6

Acknowledgements

I deem it is my proud privilege to express my sincere regards and gratitude to ‘NIC


Training Division’ for providing this valuable opportunity to pursue
the training at their place. Training at NIC is real
implementation of knowledge & practical experience.
I feel privileged to offer my sincere thanks and deep sense of gratitude to Dr
S.C.Gupta, Head Training Division at Training Division, NIC, for
expressing their confidence in me by letting me work on a project of
this magnitude and using latest technologies and providing their
support, help & encouragement in implementing this project.
I am grateful for the co-operation & valuable suggestions rendered by Mr Rajendra
Prasad and all the staff members of the National Informatics Centre,
New Delhi and my team members.

Sumit Parihar
7

Preface

This project is intended to computerize and provide information about the current
status of the Trainees. This is exclusive and live s/w that gives
various facilities to the user i.e. the user can fill his form online. The
project is divided into various sections that present a clear picture of
the system. Simplicity is more Importance while designing. All
possible aspects of the system are taken into consideration. User
friendliness is aimed in this project. The project is developed in one
source platform, using JSP, Hibernate and SQLServer 2005.

Java is a general-purpose class based, object oriented programming language. It is


Designed to be the simple enough that many programmers can achieve fluency in
the language. The main Advantages of Java is its platform
independent property. This made Java a powerful tool as it can adapt
to any change in environment.In discussing Java, it is important to
distinguish between the Java programming language, The Java
Virtual Machine (JVM), and the Java platform. The Java
programming language is the language in which Java application
(applets, servlets etc.) are written

Java Server Pages, also known as JSPs are simple but powerful technology used to
generate dynamic HTML on severs side. They are a direct extension
of Java Sevlets and provide a way to separate content generation
from content presentation. The JSP engine is just another Servlet that
is mapped to the extension *.jsp.

Hibernate is a free, open source Java package that makes it easy to work with
relational databases. Hibernate makes it seem as if your database
contains plain Java objects like you use every day, without having to
worry about how to get them out of (or back into) mysterious
database tables. It liberates you to focus on the objects and features
of your application, without having to worry about how to store them
or find them later

SQL Server 2005 introduces an integrated suite of management tools and


management application programming interfaces (APIs) to provide
ease of use, manageability, and support for operating large-scale SQL
Server deployments.
8

ABSTRACT

Project Title: Student Trainee Management System.


System

Abstract:The project entitled “ STUDENT TRAINEE MANAGEMENT


SYSTEM” is a web based application software for online registration of student
willing to do full semester project work at NIC. This Trainees Management System
is also for maintaining the record of students at Training Division and to generate
the various reports acquired by the other departments of NIC .It consist of four
modules as given below

• Data Entry
• Data Processing
• MIS
• Reports

The Data Entry module contains seven forms namely new Student Information
Entry form, HOD detail form, institute detail form, student detail form, HOD
requirement form, stipend sanction form, software details form, monthly stipend
entry form. With the help of this module we can register new trainee, modify, delete
and view existing records.

Data Processing module contain two form namely Student Selection and Selection
According HOD. In this module we basically process the data entered with the help
of data entry module.

MIS Module contains only one form .In this module we get the list of total no of
students who get selected in NIC for training. It provides name, batch, joining, and
selection information of all the trainees who applied in NIC.

Report module deals with report generation. It consist of forms for the generation
of various reports like student report, HOD report, stipend report, institute report,
9

miscellaneous report including monthly stipend report of a batch, complete student


stipend report, eligible candidates report etc. This Module is Under Construction.
10

Components assigned:

The components assigned include the enhancement of the existing modules and to
make an interface for generating the reports. The enhancement of the existing
module contains the layout design of web form with addition of Graphical user
interfaces. In enhancement module various changes have to be included as given
below:

• Authentication Form
• Applicant’s Interfaces Form
• Manipulation Interface Form
• Searching Interface Form

The Report Module contains the various forms for the generation of reports, as
given below:

• Student Reports
• Institute Reports
• HOD Reports
• Miscellaneous Reports

Tools & Technologies used :

• JDK 1.5
• Servlet
• Java Server Pages (JSP)-2.0
• Hibernate 3.1
• Tomcat –5.0.28
• MS SQL Server2005
• Microsoft SQL Server 2005 Driver for Hibernate
• iReport Generator

Keywords:
SERVLET, JAVA BEANS, JSP,POJO, MANAGEMNET SYSTEM,
11
CONTENTS
Page no

Chapter 1: Company Profile ……………………………………………………….


11
1.1 About NIC

Chapter 2: Introduction to project…………………………………………………


22
2.1 Brief description
2.2 Objectives
2.3 System Study
2.3.1 Existing System with Limitation
2.3.2 Proposed System with Objectives
2.4 System Feasibility
2.4.1 Technical Feasibility
2.4.2 Operational Feasibility
2.4.3 Economical Feasibility

Chapter 3: Component
Assigned…………………………………………………… 29
3.1 Modules Assigned
3.2 Report Design
3.3 Designing Reports

Chapter 4: Technology Environment..


…………………………………………….. 33
4.1 Hardware Software Requirement Specification
13

4.1.1 Development Desktop Requirement


4.1.2 Client Requirement
4.1.3 Server Requirement

Chapter 5: System Requirement and Specification


………………………………. 36
5.1 Introduction
5.2 Requirements specifications
5.3 Technical Architecture
5.4 Design Specifications
5.4.1 System Flow charts
5.4.2 Data Flow Diagrams
5.4.3 ER Diagram

Chapter 6: System Design…………………………………………………………..


62
6.1 Introduction
6.2 Project Module Design
6.3 Database Design
6.4 Screen Design & Shots

Chapter 7: System Security


………………………………………………………….92
7.1 Introduction
7.2 Project Security

Chapter 8: System Testing and


Implementation…………………………………….96
8.1 Introduction
8.2 Test Cases

13
14

Chapter 9: Project
Legacy…………………………………………………………..100
Chapter 10: Discussion
………………………………………………………………102
10.1 Conclusions

Chapter 11:
References……………………………………………………………….105

14
15

1 Company Profile
.

15
16

Company Profile

National Informatics Centre (NIC) of the Department of Information


Technology is providing network backbone and e-Governance support
to Central Government, State Governments, UT Administrations,
Districts and other Government bodies. It offers a wide range of ICT
services including Nationwide Communication Network for
decentralized planning, improvement in Government services and
wider transparency of national and local Governments. NIC assists in
implementing Information Technology Projects, in close collaboration
with Central and State Governments, in the areas of (a) Centrally
sponsored schemes and Central sector schemes, (b) State sector and
State sponsored projects, and (c) District Administration sponsored
projects. NIC endeavors to ensure that the latest technology in all
areas of IT is available to its users.

Genesis

The Electronics Commission and the DOE put forward a proposal to


UNDP for assistance to set up a National Computer Centre in Delhi
for building up national databases, developing the methodologies for
utilizing these, and for defining the various options and paths in
decision- making at the national level. A UNDP team visited Delhi in
March 1975 to study the proposal. The UNDP agreed to fund the
National Informatics Centre to the extent of US $4.4 million for the
purchase of a large computer system (costing approximately US $3.3
million), other hardware, training, the services of experts, etc.

The 1976-’77 Annual Report of the DOE noted:


‘In view of this, action has been taken to proceed with the preliminary
work relating to the National Informatics Centre so that when UNDP
financial assistance becomes available and the major hardware is
commissioned (in 1978 on the basis of current information), the

16
17

Centre can get on with its work on an expeditious basis. NIC is a plan
project administered by the Information, Planning and Analysis Group
(IPAG) of the Electronics Commission in its initial stages’.

Objective

The long-term objective of the National Informatics Centre, as


approved by the Planning Commission, Ministry of Finance and the
Electronics Commission, is ‘to establish the feasibility of a system for
the provision of detailed information to government ministries and
agencies to assist them in making decisions relating to the country’s
economic and social development planning and program
implementation’. (Annual Report of the Department of Electronics,
Government of India, 1977-’78, p172.)
NIC was set up with the objective to promote economic, social,
scientific and technological activities, and also for macro-economic
adjustment program of the Government, through the applications of
IT.

Mandate

As laid down in the Annual Reports of DOE 1976-'77 and 1977- '78,
NIC was given the mandate to

• Provide this informatics service to various user agencies in


Government
• Play a promotional role in creating appropriate information
systems in Government
• Act as a focal point for developing, managing and operating
information system in Government
• Act as a focal point for development of methodologies for
designing and implementing national information systems and
data management techniques
• Act as a focal point for maintaining inventories of primary data
and computer-based systems for data collection and
dissemination
• Train users in information systems, data management and
computing techniques

17
18

Ten information systems were planned for development by NIC in the


following sectors:

• Agriculture
• Construction and Transport
• Education and Manpower
• Energy
• Finance
• Industry
• Small- Scale Industries
• Socio- Economic Index
• Trade and Media
• Government Archival Information

With this, NIC embarked on a grandiose mission to develop various


national databases for use in planning and decision- making by the
government.

Evolution

Starting as a small program under an external stimulus by an UNDP


project in early 1970s, NIC started functioning in 1977 and since
then it has grown incrementally and later exponentially as one of
India’s major S&T Organizations promoting Informatics-led
Development, which has helped to usher in the required
transformation to cope with the trends in the new millennium .

NIC has played an important role of an active catalyst and facilitator


in informatics development program in Governments at the national,
state and district levels, during the last 26 years which made them
take policy decisions to create knowledge societies – societies that
can exploit knowledge to derive competitive advantage using the
opportunities provided by digital technology. NIC has been
instrumental in adopting Information Technology and Communication

18
19

Technology to reach out into India i.e. by implementing IT


applications in Social and Public Administrations.

Services & Products

Computer Aided Design

CollabCAD is a 3D CAD/CAM Software system for the collaborative design &


development of Industrial Designs from the Computer Aided Design (CAD)
Group of National Informatics Centre (NIC), the IT supports professionals from
India.

CollabCAD Advantages:

• Collaborative & Comprehensive


• Economical CAD Solutions
• Flexible & Easy to Use Database Connectivity
• Programmable Scripting Interface
• Powerful Reverse Engineering
• Slicing/Cross sectioning, Generating Cross section points
• Customizable User Interface
• Standard Data Exchange Formats
• VRML Preview
• BAR Code for ERP Solution
• Plot Configurator and BOM
• XML based geometry data storage and Database connectivity
• Multiple language (English, French, German, Spanish, Norwegian and
Italian) support
• Content Management System and Work Flow
• Interface to Enterprise Automation Application

19
20

Geographical Information System (GIS)

Through its GISNIC software, NIC offers to undertake the tasks to generate and
plot various types of thematic maps (Flow Lines maps, Graduated Symbol maps,
Choropleth maps, Pie charts and Bar charts). The various tasks related to geographic
analysis such as creation of buffer zones, performing polygon overlay and
manipulating tabular data, are also carried out using GISNIC.

GOV.IN Domain Registration

This website provides Information & Services with respect to GOV.IN Domain. The
use of GOV.IN Domain is restricted to the constituents of Indian Government at
various levels right from Central, State/UT, and District & Sub-District. National
Informatics Centre (NIC) is the exclusive Registrar for GOV.IN domain names.

20
21

Informatics

1. Biomedical Informatics

A Centre jointly setup by NIC and ICMR to cater to the information needs of
Medical community of India.

2. Patent Informatics
Website: http://patinfo.nic.in
It is one of the most comprehensive databases on the Patent Bibliography.
This database is known as EPIDOS (European Patent Information and
Document Service). European Patent Office (EPO) publishes this
database. EPO has been receiving the bibliography of all the patents filed
and granted in approximately 71 countries since 1968. It contains over 33
millions references from 1968 onwards. Almost 3 millions references are
added each year.

3. Rural Informatics

Since time immmemorial, India has been a land of village communities. With
more than 75 percent people living in rural areas, no development, can be
successful unless it focuses on rural areas and rural people. In 1986,
National Informatics Centre introduced IT to facilitate planning, monitoring
and exchange of information between various agencies in Rural
Development administration.

21
22

The journey towards evolution of Rural Informatics witnessed several ups


and downs.Insight is an effort to Harness Past Experiences, Share Best
Practices and Standardize Processes of Rural Informatics

22
23

Internet Data Centre (IDC)


Website: http://idc.nic.in

With more and more business processes and citizen services operating over the
net, demand for protection of data has risen with efficient backup and recovery
solutions. Thus there is a need to set up a strategic infrastructure that facilitates
high availability, quick scalability, efficient management & optimized utilization
of resources. To fulfill the need, NIC has set up state of art Internet Data Centers
at NIC Hq, New Delhi and 29 small data centers at various state capitals to cater
the services to Government entities. NIC Internet Data Centers combine around-
the-clock systems management with onsite personnel trained in the areas of
Server Administrators, Database Administrators, Internet, and systems
management.

Mathematical Modeling and Simulation

Website: http://modelling.nic.in

In order to propagate and promote, the scientific decision making as a process,


full fledged division, taking care of the following major activities for the
government departments (central and state as well as public sector
undertakings) is operational in NIC Headquarters from its inception.

The Mathematical Modelling & Simulation Division has developed infrastructure


facilities and expertise in the area of computer aided modelling techniques
using state-of-the-art quantitative quantitative and simulation techniques

23
24

besides development of Business Intelligence (BI) applications and providing


consultancy and trainings .

For planning in a dynamic economic environment and choice among strategic


option(s), the use of quantitative, qualitative, management and simulation
techniques for a scenario generation has been well established and been used
world wide . Computer Aided Model(s) and Decision support system (s) DSS
have been widely used by planners, policy makers, administrators and
academicians for strengthening the decision making as a process. Computer
systems linked with powerful computer communication network have further
increased the utility and operationalization of such systems worldwide.

The two major areas of support includes:

Quantitative Modelling & Simulation

Business Intelligence for Competitive Advantage

Networking

Website: http://satcom.nic.in.

National Informatics Center is the nodal Information Technology organization


for informatics development and networking in Government and Government
related Organizations. NICNET facility has been established in all Central
Government departments, 35 States/UTs and about 600 District centers to
facilitate informatics development for decision support and information
exchange. A high speed NICNET National info-Highway, an incremental overlay
over the existing network had been setup with SCPC , FTDMA, TDMA VSATs,
DVB Broadband VSAT technology and Wireless MAN to take advantage of
Internet technology in India.

24
25

Services

• Corporate Communications
• Internet/Intranet
• E-mail
• EDI
• Web enabled database access
• Emergency voice communication
• Data broadcast
• Multimedia broadcast
• Multicasting
• Distance Learning

Office Procedure Automation (OPA)

Easy Tracking System

OPA is a comprehensive package developed to help monitor pendency of


cases and assist in easy tracking of letters and files. It is an integrated package
which gives administrative support right from diarising of receipts, updating its
status, opening of new files, tracking the movement of the files, despatch of
letters/ files and finally record management. It is based on Manual of Office
Procedure and is a proven system for Government / Semi-Government Offices
and Public Sector Organizations.

Highlights

Complete Software Solution for:

• Electronic File System by automating all File related operations


• Diarisation of Receipts/Despatches
• Tracking of Files & Receipts
• Pendency Monitoring
• Task Management
• Report Generation

Features

• Tailor made for Government offices as per Manual of Office Procedure


• Menu-driven user friendly interface
• Screen design for easy data feeding

25
26

• Extensive data validation checks built-in


• Context sensitive help
• Built-in Department of Administrative Reforms file naming concepts
• Authorization checks for data access
• Multi-user data entry & query
• File register, key words and Precedent books to help locate relevant files
• Modular and flexible
• Codification to save time and reduce data entry errors

Benefits

• Easy tracking of receipt and files


• No effort or time required for report preparation
• Monitors pendency across the organization
• Record keeping made easy
• Support for Indian Languages data entry and re-port generation
• Increases efficiency and productivity by timely availability of standard and

uniform reports
• Helps timely disposal of letters
• Summary reports for sectional/divisional/ depart-mental level monitoring
• Enforces a uniform working procedure
• Easy to install, learn and use the system

Web Site Development & Hosting

Website: http://webservices.nic.in.

Amongst the various ways in which the 'Net' has now become a part of our lives
lies 'WWW', or the World Wide Web which has effectively rendered the concept
of International Boundaries and physical distances meaningless.Web presence
today has become a vital element for an organization striving to fulfil its
objectives in an efficient manner. And equally important, if not more, in the
mantra of success is the role of the web service provider. Setting up a powerful

26
27

web presence is a voyage of discovery. And in this journey, you will need a
partner who knows the latest.. in technology and technique.

27
28

2. Project Introduction

28
29

2.1 About Project

The project titled “Student Trainee Management System” is being developed in


Training Division, head office National Informatics center, Delhi, Govt. of India.
National Informatics Centre, Ministry of Communication & Information
Technology enrolls final year students from various educational institutions for
undertaking full semester project work.
Students are selected on the basis of marks obtained in previous semester/years of
the degree under which the project is to be done & availability of suitable projects in
NIC. Selected Students are normally eligible for stipend as per NIC's norms. Till
now trainee’s information are maintained manually this involves large manpower
and consumes a lot of time. The project includes the making of a web based system
so that all the manual work become computerized & easily manageable .The web-
enabled software will help in the new trainee’s to enroll their applications remotely
by using web and will be answer of certain queries and also generating reports that
are to be used by the various other departments time to time.

2.2 Objectives

 Study of existing System

 Enhancement in existing system

 Design of new system

 Design and Development of Database

 Design and Development of web pages.

 Security and Authentication

 Testing and Implementation of the web based TMS.

29
30

2.3 System Study

In the system study we try to analyze the problems of existing systems, define the
objectives to be attained by a solution and evaluate various solution alternatives.

2.3.1 Limitation of Existing System

The existing Training management system suffers from many problems:


• The existing system is manual. Difficult to maintain details of applicant.
• Selection procedure takes too much time.
• Huge amount of data gets collected during data entry.
• Consumes lot of time.
• Delay in declaring selection results.
• Delay in sending selection letters to different institutes.

2.3.2 Proposed System:

In the present project a purely web enabled software will be developed using JAVA
and J2EE with Hibernate as ORM tool and SQL Server 2005 as backend and
iReport as reporting tool. The system will take care of each and every information of
the trainee’s who are doing or have done their project work at NIC. Dynamic web
pages based on client server model are to be developed, so that the trainees can
apply and interact online.

30
31

(Proposed System)

Objectives of the project

 Development of requirements documents.

 Analysis of available database table.

 Design of web pages.

 Development of codes for web pages.

 Validations Implementation.

 Testing of various coding interfaces.

 Implementation of the system.

31
32

Advantage of proposed system

 Fully web based system.

 Easy maintenance of large volume of data.

 Trainees can register themselves online.

 No delay in selection procedure.

 Easily reports will be generated.

 Lesser manpower and manual work.

32
33

2.4 System Feasibility

Preliminary investigation examine project feasibility, the likelihood the system will
be useful to the organization. The main objective of the feasibility study is to test the
Technical, Operational and Economical feasibility for adding new modules and
debugging old running system. All system is feasible if they are unlimited resources
and infinite time. There are aspects in the feasibility study portion of the preliminary
investigation:

• Technical Feasibility
• Operation Feasibility
• Economical Feasibility

2.4.1 Technical Feasibility

The technical issues usually raised during the feasibility stage of the investigation
includes the following
1. Does the necessary technology exist to do what is suggested?
2. Does the proposed equipments have the technical capacity to hold the data
required to use the new system?
3. Will the proposed system provide adequate response to inquiries, regardless
of the number or location of users?
4. Can the system be upgraded if developed?
5. Are there technical guarantees of accuracy, reliability, ease of access and
data security?
The current system developed is technically feasible. It is a web based user interface
for trainees at NIC. Thus it provides an easy access to the users. The database’s
purpose is to create, establish and maintain a workflow among various entities in
order to facilitate all concerned users in their various capacities or roles. Permission
to the users would be granted based on the roles specified. Therefore, it provides
the technical guarantee of accuracy, reliability and security. The software and hard
requirements for the development of this project are not many and are already
available in-house at NIC or are available as free as open source. The work for the

33
34

project is done with the current equipment and existing software technology.
Necessary bandwidth exists for providing a fast feedback to the users irrespective of
the number of users using the system.

2.4.2 Operational Feasibility

Proposed projects are beneficial only if they can be turned out into information
system. That will meet the organization’s operating requirements. Operational
feasibility aspects of the project are to be taken as an important part of the project
implementation. Some of the important issues raised are to test the operational
feasibility of a project includes the following: -

Is there sufficient support for the management from the users?


Will the system be used and work properly if it is being developed and
implemented?
Will there be any resistance from the user that will undermine the possible
application benefits?

The well-planned design would ensure the optimal utilization of the computer
resources and would help in the improvement of performance status.

2.4.3 Economic Feasibility

A system can be developed technically and that will be used if installed must still be
a good investment for the organization. In the economical feasibility, the
development cost in creating the system is evaluated against the ultimate benefit
derived from the new systems. Financial benefits must equal or exceed the costs.
The system is economically feasible. It does not require any addition hardware or
software. Since the interface for this system is developed using the existing
resources and technologies available at NIC, There is nominal expenditure and
economical feasibility for certain.

34
35

. 3 Component Assigned
.

35
36

3.1 Modules Assigned

The project entitled “STUDENT TRAINEES MANAGEMENT SYSTEM” is a web


based application software for online registration of student willing to do full
semester project work at NIC. This Trainees Management System is also for
maintaining the record of students at Training Division and to generate the various
reports acquired by the other departments of NIC.
Reports are portable, printed reports are convenient and even necessary in some
situations. Printed output or reports are also used in the turn around documents
which can be used later on for the same system or for other system.
In Training management system, it consist of four modules as given below:

• Data Entry
• Data Processing
• Reports
• MIS

The components assigned include the enhancement of the existing modules & to
make an interface for generating the reports. The enhancement of the existing
module contains the layout design of web form with addition of Graphical user
interfaces. In enhancement module various changes have to be included as given
below:

• Authentication Form
• New User Sign up.
• Login Form.
• Applicant’s Interfaces Form
• Online Registration Form.

Manipulation Interface Forms For

Trainee’s Project Details.


Institute’s Details.
HOD Details.

Searching Interface Forms For

Student’s Details.

36
37

The Report Module contains the various forms for the generation of reports, as
given below:

Student Reports
Institute Reports
HOD Reports
Miscellaneous Reports

Student Reports

Student report form generates the various reports regarding the applied students,
selected students, Joined students, Recommended Students. In this form, reports will
be generated on the entered value of Batch (Year), semester (January/July) and
selected value (Y/N) by user.

Applied Student Report will provide the list of all the students who have/had applied
for the training at NIC. Student’s Details will be sorted on the basis of marks
obtained by them in their respective university examinations. Applied student does
not require any selected option (Y/N).

Selected Student Report will provide the list of all the students who were /are
selected for the training by NIC training department. Selected Student’s details will
be categorized according to the assigned college’s category and students are sorted
on the basis of marks obtained by them in their respective university examinations.

Similarly the Joined Student Report will list out the details of the student either they
had/have joined their training or not Details of student will include the Student Id,
Name, Discipline ,Marks, Training starting Date, Ending date & Duration of
training in months.
Recommended Students Report will help to know the applicant’s names that are
recommended by some senior official or by any other person. By entering the value
of batch (Year) and semester (January/July) report will be generated with details &
total number of student.

Institute Reports

Institute Report Form generates the report regarding the labels of the Institute, Lists
of institute & the summary of institute’s students applied, selected, joined for the
entered Batch (year).Summary include the details that how many student of an
institute applied in and respective number of student selected by NIC Department in
a year and how many of them joined for training. Labels of institute will remove the
handwork for the writing the colleges address for postal letter’s envelop.

37
38

HOD Reports

Hod report form generates the report regarding the Head Of department detail list,
semester wise requirement, and summary. Hod list report will generate the
document contains the name of all head of department officers with their contact
number & detail information

Miscellaneous Reports

This includes the various other reports which will be helpful for trainees & the staff
of NIC. Clearance Report, Expenditure, Monthly Stipend report, software list,
Sanction letter or student marks report etc.

38
39

4 Technology Environment
.

39
40

4.1 Hardware Software Requirement Specification

This section describes the various hardware & software requirement by the
developer during the development of project & the tools used. It also includes
specification required by the client for implementing & using the system. This
includes the decision about the operating system to be used. The alternatives are
passed through the Mandatory requirements and screening criteria, which is a
combination of the requirements and some implicit requirements that the alternative
should satisfy.

4.1.1 Developing Desktop Requirement

Hardware
• Intel Pentium processor® at 2.66 GHz
• 256 MB RAM minimum, Recommended 512 MB Ram
• And other regular hardware devices

Software:

• Jdk1.5
• JSP2.0
• Hibernate
• Microsoft SQL Server 2005
• JDBC Driver of Microsoft SQL Server 2005

40
41

4.1.2 Software and Hardware Used for Client

Software

 Os independent
 Internet browser

Hardware
 Intel Pentium P III 450MHz or higher
 128 MB RAM, recommended 256 or MB higher
 And other regular hardware devices

4.1.4 Software and Hardware for Server

Software

Operating System:

Os independent

Software:
• Jdk1.5.0
• JSP2.0
• Hibernate
• Microsoft SQL Server 2005
• Tomcat Web Server

Hardware

• Intel Pentium IV ® at 2.66 GHz minimum, recommended 3.02 GHz


• 512 MB RAM minimum, Recommended 1 GB Ram
• And other regular hardware devices

41
42

5. System Requirement
&
Specificatio
n

42
43

5.1 Introduction

SRS task refers to the process of specifying the requirements formally in a


document and get it approved by the client. SRS documents all the ideas into a
formal document that acts as a standard to be referred any time during the software
development process. Requirements and specifications are very important
components in the development of any project. Requirements analysis is the first
step in the system design process, where a user's requirements should be clarified
and documented to generate the corresponding specifications. While it is a common
tendency for designers to be anxious about starting the design and implementation,
discussing requirements with the customer is vital in the construction of safety-
critical systems. For activities in this first stage has significant impact on the
downstream results in the system life cycle. For example, errors developed during
the requirements and specifications stage may lead to errors in the design stage. This
leads not only to more time wasted but also the possibility of other requirements and
specifications Therefore, it is necessary that the requirements are specified correctly
to generate clear and accurate specifications.

The first step toward developing accurate and complete specifications is to establish
correct requirements. In requirements, it is important to specifically establish the
functions, attributes, constraints, preferences, and expectations of the product.
Usually in the process of gaining information, functions are the first ones to be
defined. Functions describe what the product is going to accomplish. It is also
important to determine the attributes of a product. Attributes are characteristics
desired by the client, and while 2 products can have similar functions, they can have
completely different attributes. After all the attributes have been clarified and
attached to functions, we must determine the constraints on each of the attributes.
Preferences, which is a desirable but optional condition placed on an attribute, can
also be defined in addition to its constraints. Finally, we must determine what the
client's expectations are. This will largely determine the success of the product.

43
44

The System Requirement Specification for as system should have the following
characteristics:
• SRS should specify all the functions that the software is supposed to do and
response to various inputs.
• Requirements stated should not be ambiguous. Formal language
specifications should be used.
• Requirements stated should be verifiable & should not conflict with one
other.
• SRS should be flexible enough to incorporate any change to it.

Main components are


• Functional requirements
• Performance requirements
• Design constraints

44
45

System Requirement Specification

45
46

5.2 Functional Requirement Specification:

The development of Training management system is required for removing the


drawback of the existing system. National Informatics Centre, Ministry of
Communication & Information Technology enrolls final year students from various
educational institutions for undertaking full semester project work.

Students are selected on the basis of marks obtained in previous semester/years of


the degree under which the project is to be done & availability of suitable projects in
NIC. Selected Students are normally eligible for stipend as per NIC's norms till now
trainee’s information are maintained manually which involves large manpower, and
consumes a lot of time. The web-enabled software will help in the answer of certain
queries and also generating reports that are to be used by the various other
departments time to time.

Functional requirement specify all the functions of the system and the outputs to be
produced from the given inputs. These requirements explain the input-output
relationship between the entities of the system. Mainly the functions are displayed
with the help of use case or dataflow diagrams.

The existing Training management system suffers from many problems:

• The existing system is manual.


• Selection of student takes too much time.
• Huge data storage during selection
• Consumes lot of time
• Delay in sending selection letters to different institutes
• Report Generation is manually

46
47

So the inputs for the new system are to make the existing system
Fully web based, remotely access, online registration

 Easy maintenance of large volume of data.

 No delay in selection procedure.

 Easily reports will be generated


 Efficient data storage in database
 Efficient utilization of resources.
 Easy manipulation & retrieval of student’s information.

So to meet the requirement as given above we have to develop a web application.


The new system requires various web forms for performing the online registration,
selection task & data retrieval, generating reports.
System Requirements are being categorized in following modules:

• Data Entry
• Data Processing
• Reports
• MIS

47
48

Performance Requirements
These requirements specify the performance characteristics of a system. There are
two types of performance requirements:
• Static Requirements
• Dynamic Requirements

Static Requirements also called as capacity requirements, these do not effect the
executions of the system. While Dynamic requirements specify constraints related to
the time in which the system is able to complete an operation and the number of
operations that a system performs in a unit time.

Design Constraints
Design constraints cover the various aspects as given :
 Software & hardware limitations
 Security
 Standards

48
49

5.2 Technical Architecture

Initial requirement for building the project

• Windows XP or Windows 2003 ,Linux


• Jdk1.5.0
• Hibernate 3.1
• Microsoft SQL Server 2005
• Minimum P III or equivalent. Recommended dual CPU P III, 1200
MHz.
• 512 MB RAM minimum, recommended 1 GB RAM

In project a purely web enabled software will be developed using JSP with
Hibernate is used as ORM tool, SQL Server is used as backend and iReport is used
for reporting purposes. The system will take care of each and every information of
the person who are doing or have done there project work at NIC. Dynamic web
pages based on client server model are to be developed, so that the trainees can
apply and interact online.

JAVA:

Java is a general-purpose class based, object oriented programming language. It is


designed to be the simple enough that many programmers can achieve fluency in the
language. The main Advantages of Java is its platform independent property. This
made Java a powerful tool as it can adapt to any change in environment.

In discussing Java, it is important to distinguish between the Java programming


language, The Java Virtual Machine (JVM), and the Java platform. The Java
programming language is the language in which Java application (applets, servlets
etc.) are written. It is the source code and it’s extension is .java. After compilation it
is converted to byte codes (which have an extension .class) that are portable
machine language of a CPU architecture known as the Java Virtual Machine. The

49
50

JVM is usually implemented in the form of a software program that interprets and
executes these byte codes.

The Java platform is distinct from both Lava language and JVM. The Java platform
is the predefined set of Java classes that exist on every Java installation; these
classes are available for use by all Java programs. TheJava Platform is also
sometimes referred to as the Java runtime environment.

Why is Java used?

 Java is the most powerful language today.


 When properly applied, the features of Java (eg. Encapsulation, inheritance
etc.) combine to produce a programming environment that supports the
development of far more robust and scalable programs.
 A well-designed hierarchy of classes helps programmers in reusing the code.
 Encapsulation allows programmer to migrate his implementation over time
without breaking the code that depends on the public interface of the classes
as in encapsulation public methods can be used to protect private data.
 Inheritance interacts with encapsulation as well.
 Polymorphism ( one interface multiple methods) allow a programmer to
create clean, sensible, readable and resilient code.
 Java is platform independent. Java lets us deploy the same Servlet and JSPs
on many different platforms, be it UNIX, Linux, Windows or Macintosh. In
fact, switching platforms with Servlet/JSP applications can be simple as
copying a single file into the proper directory.

50
51

 Java is web centre. Java is designed for distributed environment of the


internet, thet makes the implementation more convenient in case of online
application.
 Java’s highly object oriented nature encourages developer to write
maintainable and reusable code, which is deal in ever changing nature of
web application.

51
52

JAVA SERVLETS

Java Servlet technology provides web developers with a simple, consistent


mechanism for extending the functionality of a web server and for accessing
existing business systems. A servlet can almost be thought of as an applet that runs
on the server side -- without a face. Java servlets have made many web applications
possible.

Servlets are the Java platform technology of choice for extending and enhancing
web servers. Servlets provide a component-based, platform-independent method for
building web-based applications, without the performance limitations of CGI
programs. And unlike proprietary server extension mechanisms (such as the
Netscape Server API or Apache modules), servlets are server- and platform-
independent. This leaves you free to select a "best of breed" strategy for your
servers, platforms, and tools.

Servlets have access to the entire family of Java APIs, including the JDBC API to
access enterprise databases. Servlets can also access a library of HTTP-specific calls
and receive all the benefits of the mature Java language, including portability,
performance, reusability, and crash protection.

52
53

Portability

Because servlets are written in Java and conform to a well defined and widely
accepted API, they are highly portable across operating systems and server
implementations.With servlets you can truly say “write once, serve everywhere”
reason being a class file is made which is nothing but machine-independent
bytecodes. We can develop a servlet on Windows NT machine running the Java
Web Server and later deploy it effortlessly on a Unix server running Apache.

Safety

Servlets support safe programming practices on a number of levels. Firstly,


servlets inherit the strong type safety of Java language. Secondly, Java’s automatic
garbage collection mean that servlets are safe from memory management problems
like dangling pointers, invalid pointer references and memory leaks.

Etensibility and Flexibility

The servlet API is designed to be easily extensible. The API includes classes that
are optimized for HTTP servlets but at a later date it could be extended and
optimized for another type of servlets by a third party.

Sevlets are also quite flexible. An HTTP servlet can be used to generate a complete
webpage it can be added to a static page using a <SERVLET> tag in what is known
as a server-side include and it can be used in cooperation with any number of
servlets to filter the content in something known as servlet chain.

53
54

Integration

Servlets are tightly integrated with the server. A servlet can use the server to
translate file paths, perform logging, check authorization, perform MIME type
mapping and, in some cases, even add users to the server’s user database.

Elegance

Servlet code is clean, simple, object-oriented, modular and amazingly simple. A


servlet API can include methods and classes to handle many type of routine chores.

Efficiency

Servlet invocation is highly efficient. Once a servlet is loaded, it generally remains


in servers memory as a single object instance so it automatically maintains its state
and can hold on to external sources such as database connections that may otherwise
take several seconds to establish. Unlike with CGI servlet can begin handling the
request immediately. Multiple, concurrent request are handled by multiple threads,
so servlets are highly scalable. Today, servlets are a popular choice for building
interactive web applications.

Java Server Pages (JSP):

Java Server Pages, also known as JSPs are simple but powerful technology used to
generate dynamic HTML on severs side. They are a direct extension of Java Sevlets
and provide a way to separate content generation from content presentation. The JSP
engine is just another Servlet that is mapped to the extension *.jsp.

The source code of a JSP document looks like any other HTML document with
some added tags containing Java code. The source code is stored in a file called
XXX.jsp and copied to the document directory of the Web server. When a request is
made for this document, the server recognizes the *.jsp extension and realizes that
special that special handling is required. The first time the file is requested, it is

54
55

compiled into a Servlet object and stored in the memory, and the output is sent back
to the requesting client. After the first request, the server checks to see whether the
*.jsp file has changed. If it has not changed, then the server invokes the previously
compiled Servlet object.

Steps required for JSP request:

• The user visits a web site made using JSP. He goes to a JSP page (ending
with .jsp). The web browser makes the request via internet.
• The JSP request is sent to the web server.
• The web server recognizes that the file required is special (.jsp), therefore
passes the file to the JSP Sevlet engine.
• If the file has been called for the first time, the JSP file is parsed, other wise
go to step 7.
• The next step is to generate a special Servlet from JSP file. The entire
HTML is converted into ‘println’ statements.
• The Servlet source code is compiled into a class.
• The Servlet is instantiated, calling the init and service methods.
• HTML from the Servlet output sent via Internet.
• HTML results are displayed on the user’s web browser.

55
56

Hibernate:
Hibernate is a free, open source Java package that makes it easy to work with
relational databases. Hibernate makes it seem as if your database contains plain Java
objects like you use every day, without having to worry about how to get them out
of (or back into) mysterious database tables. It liberates you to focus on the objects
and features of your application, without having to worry about how to store them or
find them later

History and Background

Most applications have some need to work with data. Java applications, when
running, tend to encapsulate data as networks of interconnected objects, but those
objects vanish in a puff of logic when the program ends, so there needs to be some

56
57

way to store them. And sometimes the data is already "out there" before the
application is even written, so there needs to be a way to read it in and represent it as
objects. Writing code by hand to perform these tasks is tedious and error-prone, and
can represent a major portion of the effort involved in the overall application.
As good object-oriented developers got tired of this repetitive work, their
typical tendency towards enlightened laziness started to manifest itself in the
creation of tools to help automate the process. When working with relational
databases the culmination of such efforts were object/relational mapping tools.

How Hibernate Works

Rather than utilize bytecode processing or code generation, Hibernate uses runtime
reflection to determine the persistent properties of a class. The objects to be
persisted are defined in a mapping document, which serves to describe the persistent
fields and associations, as well as any subclasses or proxies of the persistent object.
The mapping documents are compiled at application startup time and provide the
framework with necessary information for a class. Additionally, they are used in
support operations, such as generating the database schema or creating stub Java
source files.A SessionFactory is created from the compiled collection of
mapping documents. The SessionFactory provides the mechanism for
managing persistent classes, the Session interface. The Session class provides
the interface between the persistent data store and the application.The Session
interface wraps a JDBC connection,which can be user-managed or controlled by
Hibernate, and is only intended to be used by a single application thread, then closed
and discarded.

57
58

The Configuration File

<?xml version='1.0' encoding='UTF-8'?>


<!DOCTYPE hibernate-configuration PUBLIC
"-//Hibernate/Hibernate Configuration DTD 3.0//EN"
"http://hibernate.sourceforge.net/hibernate-configuration-3.0.dtd">

<!-- Generated by MyEclipse Hibernate Tools. -->


<hibernate-configuration>

<session-factory>
<property name="connection.username">root</property>
<property name="connection.url">
jdbc:sqlserver://CABIIN49\SQLEXPRESS:1433
</property>
<property name="dialect">
org.hibernate.dialect.SQLServerDialect
</property>
<property name="myeclipse.connection.profile">
server2005
</property>
<property name="connection.password">nic123</property>
<property name="connection.driver_class">
com.microsoft.sqlserver.jdbc.SQLServerDriver
</property>
<mapping resource="sumitparihar/Sanction.hbm.xml" />
<mapping resource="sumitparihar/InstCod.hbm.xml" />
<mapping resource="sumitparihar/Stuinfo.hbm.xml" />

</session-factory>

</hibernate-configuration>

58
59

The Mapping Documents

Our example utilizes one trivial class Sanction. The mappings for these class is
shown below.

<?xml version="1.0" encoding="utf-8"?>


<!DOCTYPE hibernate-mapping PUBLIC "-//Hibernate/Hibernate Mapping DTD
3.0//EN"
"http://hibernate.sourceforge.net/hibernate-mapping-3.0.dtd">
<!--
Mapping file autogenerated by MyEclipse - Hibernate Tools
-->
<hibernate-mapping>
<class name="sumitparihar.Sanction" table="sanction" schema="dbo" catalog="hi">
<id name="stuId" type="java.lang.Integer">
<column name="STU_ID" />
<generator class="assigned" />
</id>
<property name="sanDate" type="java.util.Date">
<column name="SAN_DATE" length="23" />
</property>
<property name="sanAmount" type="java.lang.Float">
<column name="SAN_AMOUNT" precision="53" scale="0" />
</property>
<property name="instCode" type="java.lang.Short">
<column name="INST_CODE" />
</property>
</class>
</hibernate-mapping>

59
60

The mapping documents are reasonably clear, but certain areas warrant explanation.
The id

element block describes the primary key used by the persistent class. The attributes
of the id

element are:

name: The property name used by the persistent class.

column: The column used to store the primary key value.

type: The Java data type used. In this case, we’re going to use longs.

unsaved-value: This is the value used to determine if a class has been made

persistent, i.e., stored to the database. If the value of the id attribute is null,
Hibernate

knows that this object has not been persisted. This is important when calling the

60
61

HIBERNATE - Features of Hibernate

Transparent persistence without byte code processing


Transparent persistence
JavaBeans style properties are persisted
No build-time source or byte code generation / processing
Support for extensive subset of Java collections API
Collection instance management
Extensible type system
Constraint transparency
Automatic Dirty Checking
Detached object support
Object-oriented query language
Powerful object-oriented query language
Full support for polymorphic queries
New Criteria queries
Native SQL queries
Object / Relational mappings
Three different O/R mapping strategies
Multiple-objects to single-row mapping
Polymorphic associations
Bidirectional associations
Association filtering
Collections of basic types
Indexed collections
Composite Collection Elements
Lifecycle objects
Automatic primary key generation
Multiple synthetic key generation strategies
Support for application assigned identifiers
Support for composite keys
Object/Relational mapping definition
XML mapping documents
Human-readable format
XDoclet support
HDLCA (Hibernate Dual-Layer Cache Architecture)
Thread safeness
Non-blocking data access

61
62

Session level cache


Optional second-level cache
Optional query cache
Works well with others
High performance
Lazy initialization
Outer join fetching
Batch fetching
Support for optimistic locking with versioning/timestamping
Highly scalable architecture
High performance
No "special" database tables
SQL generated at system initialization time
(Optional) Internal connection pooling and PreparedStatement caching
J2EE integration
JMX support
Integration with J2EE architecture (optional)
New JCA support

62
63

SQL Server 2005

The following table provides an overview of several key enhancements in SQL


Server 2005, focusing on enterprise data management, developer productivity, and
business intelligence..

Enterprise Data Management


Technology Capabilities
High Availability Failover clustering and database mirroring technology in SQL Server 2005 will
enable enterprises to deliver highly reliable, available applications to employees,
customers, and partners.
Management SQL Server 2005 introduces an integrated suite of management tools and
Tools management application programming interfaces (APIs) to provide ease of use,
manageability, and support for operating large-scale SQL Server deployments.
Security SQL Server 2005 has been designed to help provide the highest level of security
Enhancements for enterprise data through features such as database encryption, more secure
default settings, password policy enforcement, granular permissions control, and
an enhanced security model.
Scalability Scalability advancements in SQL Server 2005 include table partitioning,
replication enhancements, and 64-bit support.

Developer Productivity
Technology Capabilities
Common Language SQL Server 2005 introduces the capability to develop database objects
Runtime (CLR) using any Microsoft .NET language.
Integration
Deep XML Integration SQL Server 2005 delivers a new XML data type, enabling the storage of
XML fragments or documents in SQL Server databases.
Transact-SQL New query types and the capability to use error handling in transactions
Enhancements provide developers with more flexibility and control in SQL Server query
development.
SQL Server 2005 Full integration of SQL Server 2005 Compact Edition with SQL Server
Compact Edition 2005 and Visual Studio 2005 provides a platform for developers to rapidly
build applications that extend enterprise data management capabilities to
mobile devices.

Business Intelligence
Technology Capabilities
Analysis Analysis Services provides a unified and integrated view of all your business data as
Services the foundation for all of your traditional reporting, OLAP analysis, Key Performance
Indicator (KPI) scorecards and data mining.
Integration SQL Server Integration Services (SSIS) is a next generation data integration
Services platform that can integrate data from any source. SSIS provides a scalable and

63
64

Business Intelligence
Technology Capabilities
extensible platform that empowers development teams to build, manage, and deploy
integration solutions to meet unique integration needs.
Reporting SQL Server Reporting Services is a comprehensive, server-based reporting solution
Services designed to help you author, manage, and deliver both paper-based and interactive
Web-based reports.
Data Mining SQL Server 2005 Analysis Services (SSAS) provides tools for data mining with which
you can identify rules and patterns in your data, so that you can determine why
things happen and predict what will happen in the future – giving you powerful
insight that will help your company make better business decisions.

64
65

MyEclipse Enterprise Workbench is a commercial Java IDE created and


supported by the company Genuitec, LLC

MyEclipse, first released in 2003, is built upon the Eclipse platform, specifically
using the Web Tools Platform (WTP) for much of its functionality. The MyEclipse
tools are most comparable to the IBM Rational Software toolkit, JetBrains (IntelliJ
IDEA), and BEA Systems tools.

MyEclipse is available in two versions (Standard and Professional.)

65
66

Flow chart :
Start
ssssatraasss

Institute Fills online


registration form in NIC

Selecte
d

Student receives
selection letter from NIC

Branch is allocated to
selected student

HOD and Project guide


allocated

Project is allocated

Stipend is sanctioned at
the end of every month

Student receives Stipend

Stop 66
67

5.4.2 Data Flow Diagrams

Student trainee

Selection Information
Review of Old Cases
Registers View Details

Registratio
n
View Details Data Entry
Data processing
Reports

NIC Training Department

67
68

5.4.3 E-R Diagram

Age Sex
No of
branches

Snam Instco Nic


Sid
e de location

Register NIC
Student in

Mark
s bnam
Work has
e
s in
Works
on Bhod
Branches
Works
under

Blocatio
n
Assign
Project ed by Project guide
age
Name
Id se
Supervi x
No of stud
ses by
Use allocated
s

HOD

S/w tool S/w type No of


traine
es
Technology
Hna
Hid Age
me
Phone
no
68
69

6. System Design

69
70

6.1 Introduction
Systems design is the third phase in the system development life cycle.
Now we are ready to begin the physical design system that will meet the
specification described in the system requirements document

User Interface, Input and Output Design

Interface Issue
User interface, input and output design begins the systems
design phase of the SDLC. The user interface should
include all the tasks, commands and communication
between users and the system. In GUI environment a user
can display and work with multiple windows on the single
screen.

Input Design Issues During input design, determine how data will be captured and
entered into the system. Data capture is the identification and recording of source
data. Data entry is the process of converting source data into computer readable
form and entering it into or from system.

Input Design has six main objectives.

1. To select a suitable input and data entry method

2. To reduce the input volume

3. To design attractive data entry screen

4. To use validation check to reduce input errors

5. To design required source documents

6. To develop effective input control

70
71

Output Design issues

It Includes
• What is the purpose of output?

• Who wants the information, why it is needed and how it will be used?

• Will the output be printed, viewed on screen or both?

• Do security or confidentiality issues exist?

Reports like any other elements of the user-computer interface should be attractive,
professional, and easy to use. System analysts should realize that printed output is
highly visible and manages sometimes judges project by the quality of reports they
receive.

71
72

6.2 Project Module Design:

System Requirement & specification phase’s output takes to the design


step. After going through the requirement & analysis in the last section now have to
design the project.

In Training management system, it consist of four modules as given below:

STMS

Data
Data Entry Processing Reports MIS

Main Form Student Reports


Student Details Institute Reports
Institute Details Hod Reports
Hod Details etc Misc. Reports

72
73

6.3 Database Designing


List of Tables:

 Allocation
 Allocation_st
 Allocation_hod
 Criteria
 Discip
 Hod
 Hodsummary
 Inst_code
 Monthlystipend
 Monthname
 Recommranks
 Relaxation
 Requ
 Sanction
 Studetail
 Stuinfo
 swtools

73
74

Student Database

74
75

The design of various tables used in the database are as follows:


Table 1: stuinfo

Name Type Size Null


SNO int 4 NOT NULL
NAME char 50 NULL

BATCH Smallint 7 NULL

SEMI char 7 NULL

INST_CODE Smallint 2 NULL

ADD_INST1 char 60 NULL

ENT_DATE datetime 8 NULL

SD datetime 8 NULL

DURA smallint 2 NULL

ED datetime 8 NULL

STIPEND char 3 NULL

ST1 smallint 2 NULL

DISCI char 3 NULL

SEM_1 float 8 NULL

SEM_2 float 8 NULL

SEM_3 float 8 NULL

SEM_4 float 8 NULL

SEM_5 float 8 NULL

SEM_6 float 8 NULL

SEM_7 float 8 NULL

75
76

SEM_8 float 8 NULL

PERS float 8 NULL

PERS_ORIG float 8 NULL

SELECTED char 3 NULL

LIST_NO smallint 2 NULL

JOINED char 3 NULL

RECOMM char 20 NULL

NIC char 3 NULL

COURSE_CAT char 13 NULL

CATEGORY char 7 NULL

OS1 char 20 NULL

OS2 char 20 NULL

OS3 char 20 NULL

DB1 char 20 NULL

DB2 char 20 NULL

DB3 char 20 NULL

LANG1 char 20 NULL

LANG2 char 20 NULL

LANG3 char 20 NULL

PER_ADD1 char 65 NULL

PER_ADD2 char 65 NULL

RELAX_PERS float 8 NULL

76
77

SELECTED_LIST smallint 2 NULL

Table 2:Allocation_hod

Name Data Type Size Nulls


SERIAL NO Small int 2 NOT NULL
HOD Char 20 NULL
HDISCI Char 20 NULL
HDB char 20 NULL
HLANG Char 20 NULL
STUDID Int 4 NULL
SDISCI Char 20 NULL
SOS Char 20 NULL
SDB Char 20 NULL
SLANG Char 20 NULL
WEIGHTAGE nvarchar 20 NULL

Table 3: Allocation_st

Name Data type Size Nulls


SNO int 4 NOT NULL
HOD Char 20 NULL
DISCI Char 20 NULL
OS Char 20 NULL
DB Char 20 NULL
LANG Char 20 NULL
STATUS Char 20 NULL
ST_ID int 4 NULL

77
78

WEIGHTAGE Char 20 NULL

Table 4: criteria

Name Data type Size Nulls


BATCH int 4 NULL
SEMESTER char 10 NULL
CUT_OFF_PERCENTAGE float 8 NULL
CDATE1 datetime 8 NULL
CDATE2 datetime 8 NULL
CATA int 4 NULL
CATB int 4 NULL
CATC int 4 NULL
LIST_NO smallint 2 NULL

Table 5:Dicip

Name Data Type Size Nulls


Disc char 20 NULL

Table 6:hod

Name Data Type Size Nulls


HOD Char 8 NULL
HOD_NAME Char 30 NULL
DESIG Char 5 NULL
ADDRESS Char 50 NULL

78
79

DIVISION Char 30 NULL


PHONE_O Decimal 9(18,0) NULL
PHONE_R Decimal 9(18,0) NULL
INTER Char 5 NULL
EMAIL Char 50 NULL

Table 7:hod summary

Name Data Type Size Null


BATCH Smallint 2 NOT NULL
HODNAME Char 50 NULL
TOTALINUSE Smallint 2 NULL
TOTALABS Smallint 2 NULL
TOTALREQ Smallint 2 NULL
TOTALJOIN Smallint 2 NULL

Table 8:inst_code

Name Data Type Size Null


DESIG Char 35 NULL
STATUS Char 3 NULL
ADD_INST1 Char 60 NULL
ADD2 Char 35 NULL
ADD3 Char 35 NULL
ADD4 Char 25 NULL
PIN Char 7 NULL
CATA char 1 NULL
TELNO Numeric 9(18,0) NULL
FAXNO Numeric 9(18,0) NULL
INSTMAIL Char 50 NULL

Table 9: relaxation

Name Data Type Size Null


YEAR smallint 2 NULL
SEMESTER char 7 NULL
RELAX_SC Float 8 NULL

79
80

RELAX_ST Float 8 NULL


RELAX_OBC Float 8 NULL

80
81

Table 10: requ

Name Data Type Size Null


SESSION Char 7 NULL
YEARS int 4 NULL
TOT_NO_RE Smallint 2 NULL
TOT_NO_SA Smallint 2 NULL
TOT_NO_JO smallint 2 NULL
HOD char 8 NULL
DIVISION char 25 NULL
INST_TYPE Char 1 NULL
TOT1 Smallint 2 NULL
DISCI1 char 20 NULL
OS1 Char 20 NULL
DB1 Char 20 NULL
LANG1 Char 20 NULL
TOT2 Smallint 2 NULL
DISCI2 Char 20 NULL
OS2 Char 20 NULL
DB2 Char 20 NULL
LANG2 Char 20 NULL
TOT3 Smallint 2 NULL
DISCI3 Char 20 NULL
OS3 Char 20 NULL
DB3 Char 20 NULL
LANG3 char 20 NULL

Table11:sanction

Name Data Type Size Null


STU_ID Int 4 NULL
SANC_DATE Datetime 8 NULL
SANC_AMNT Float 8 NULL
INST_CODE smallint 2 NULL
PROJ_GUIDE Char 5 NULL

81
82

Table 12: sw_tools

Name Data Type Size Null


SW_TOOL Char 20 NULL
TYPE Char 3 NULL

Table 13:studetail

Name Data Type Size Null


SNO Int 4 NOT NULL
NAME Char 3 NULL
INST_CODE Char 30 NULL
PROJ_TITLE Char 60 NULL
PROJ_LEAD Char 8 NULL
PROJ_GUIDE Char 30 NULL
PROJ_LOC Char 50 NULL
PHONE Numeric 9(18,0) NULL
INTER Char 5 NULL
CLEARANCE Char 3 NULL
IMPLEMENT Char 3 NULL
MOD_USE Char 3 NULL
ABSCONDING Char 3 NULL

82
83

83
84

6.4 Screen Shots

Description:

When you will type the web address(Here http://localhost:8080/now/MAIN.jsp) of


the STMS application, following page will open which is the home page of the
application.
On this page there is an option for new users to sign up. Existing NIC employee can
use their user id & password for log in.

Login Page

84
85

Login Fail

85
86

86
87

Student Registration Form

87
88

88
89

Login Form

89
90

Description:

After Login success NIC Employee will be navigated to the menu form where there
are four modules performing different functions

Menu Form

90
91

Student Information Entery Form

Student Information Entery Form

91
92

Student Detail Form

92
93

HOD Details Search Form

93
94

Hod Requirement

94
95

Sanction Released Form

95
96

Institute Detail Form

96
97

Available Software Detail

97
98

Student Selection

98
99

Student Selection According To HOD Requirement

99
100

MIS

100
101

7. Security Issues

101
102

7.1 Introduction

The protection of computer based resources that includes hardware, software, data,
procedures and people against unauthorized use or natural
Disaster is known as System Security.

System Security can be divided into four related issues:


• Security
• Integrity
• Privacy
• Confidentiality

System Security refers to the technical innovations and procedures applied to the
hardware and operation systems to protect against deliberate or accidental damage
from a defined threat.

Data security is the protection of data from loss, disclosure, modification and
destruction.

System Integrity refers to the power functioning of hardware and programs,


appropriate physical security and safety against external threats such as
eavesdropping and wiretapping.

Privacy defines the rights of the user or organizations to determine what information
they are willing to share with or accept from others and how the organization can be
protected against unwelcome, unfair or excessive dissemination of information
about it.

102
103

Confidentiality is a special status given to sensitive information in a database to


minimize the possible invasion of privacy. It is an attribute of information that
characterizes its need for protection.

7.2 Project Security

System security refers to various validations on data in form of checks and controls
to avoid the system from failing. It is always important to ensure that only valid data
is entered and only valid operations are performed on the system. The system
employees two types of checks and controls:

8.2.1 Client Side validation

If the web browser allows running the Java script then client side validation code is
run otherwise validation is done at the server side automatically. Various client side
validations are used to ensure on the client side that only valid data is entered. Client
side validation saves server time and load to handle invalid data. Some checks
imposed are:

Validation is used to ensure those required fields are filled with suitable data only.
Maximum lengths of the fields of the forms are appropriately defined.
Forms cannot be submitted without filling up the mandatory data so that manual
mistakes of submitting empty fields that are mandatory can be sorted out at the
client side to save the server time and load.
Tab-indexes are set according to the need and taking into account the ease of user
while working with the system.

8.2.2 Server Side Validation

103
104

Some checks cannot be applied at client side. Server side checks are necessary to
save the system from failing and intimating the user that some invalid operation has
been performed or the performed operation is restricted. Some of the server side
checks imposed are:
Server side constraint has been imposed to check for the validity of primary key and
foreign key. A primary key value cannot be duplicated. Any attempt to duplicate the
primary value results into a message intimating the user about that value through the
forms using foreign key can be updated only of the existing foreign key values.
User is intimating through appropriate messages about the successful operations or
exceptions occurring at server side.
• Various Access Control Mechanisms have been built so that one user may not
agitate upon another. Access permissions to various types of users are controlled
according to the organizational structure. Only permitted users can log on to the
system and can have access according to their category. User- name, passwords
and permissions are controlled o the server side.
• Using server side validation, constraints on several restricted operations are
imposed.

104
105

8. System Testing
&
Implementation

105
106

8.1 Introduction

In this phase the system is tested. Normally programs are written as a series of
individual modules, these subjects to separate and detailed test. The system is then
tested as a whole. The separate modules are brought together and tested as a
complete system. The system is tested to ensure that interfaces between modules
work (integration testing), the system works on the intended platform and with the
expected volume of data (volume testing) and that the system does what the user
requires (acceptance/beta testing).
The developed software is tested to the customer to detect the possible errors. A
software test program should aim at detecting maximum number of errors in the
software. The process of testing involves creating the test cases and implementing
those test cases on the software to detect errors. Testing validates that the actual
performances of the software meets the user requirements. The Testing Strategy and
plan TSP document is a formal document that contains the test plan and the list of
all types of test to be done on the software

Test Plan consists of the components to be tested, people involved in testing, test
cases and the acceptance criterion for the software. Some guidelines to be followed
while creating test plan are as follows:

The test planned for the software should be such that they detect the deviation of the
software from client requirements. The test planned in the test plan should begin
from smaller module and move to cover the entire system.

The test plan should assign the task of testing to a third person. This is because a
person from outside the development team has the better chances of detecting errors.
Software testing can be broadly classified into two categories:

 White Box Testing

106
107

 Black Box Testing

A testing strategy describes the steps that are performed during the testing of
software.

 Unit Testing
 Integration Testing
 System Testing
 Functional Testing

8.2 Creating Test Cases

Developing test case is an important task of testing. An efficient test case detects the
maximum number of errors.

General Format for test Cases is given below:

Test Case ID Test Case Expected Output Actual output


Description
1. Fill The Following An Error message
Details… Should be displayed..

107
108

Test Case for Login Form:

Test Test Case Description Expected Output Actual output


Case
ID
1. Fill The Following Details… An Error message
Should be
User Name= Leave Blank displayed.

Password = nic123 “Can’t be Blank”

Click Submit
2 Fill The Following Details… An Error message
Should be
User Name=root displayed

Password = “Access Denied”

Click Submit

108
109

9. Project Legacy

109
110

10.1 Project Enhancements:

While developing software a developer take care of every requirement of user, but it
not fair to say that a project completes ever. Many enhancements & new features are
required by user & added in future. Software is enhanced & marketed with the
version numbers.

At this time the major enhancements which I feel this project require are:

• Security needs to be tightening & password strength should be added.


• More dynamic users interface using flash.
• Client Side validation have to be improved.
• Report formats to be change.
• File Uploading like bio-data provision should be added.

110
111

10. DISCUSSION

111
112

10.1 CONCLUSION

It has been a great pleasure for me to work on this exciting and challenging project.
This project proved good for me as it provided practical knowledge of not only
programming in JAVA as well as working of web based application and no some
extent Windows Application and SQL Server, but also about all handling procedure
related with “Design and Development of Sudent Trainees Management System”. It
also provides knowledge about the latest technology used in developing web
enabled application and ORM Tool such as Hibernate that will be great demand in
future. This will provide better opportunities and guidance in future in developing
projects independently.

Benefits:

The project is identified by the merits of the system offered to the user. The
merits of this project are as follows: -

• It’s a web-enabled project.


• This project offers user to enter the data through simple and interactive web
forms. This is very helpful for the client to enter the desired information
through so much simplicity.
• The user is mainly more concerned about the validity of the data, whatever
he is entering. There are checks on every stages of any new creation, data
entry or updation so that the user cannot enter the invalid data, which can
create problems at later date.
• User is provided the option of monitoring the records he entered earlier. He
can see the desired records with the variety of options provided by him.
• From every part of the project the user is provided with the links through
framing so that he can go from one option of the project to other as per the
requirement. This is bound to be simple and very friendly as per the user is
concerned. That is, we can say that the project is user friendly which is one
of the primary concerns of any good project.

112
113

• Data storage and retrieval will become faster and easier to maintain because
data is stored in a systematic manner and in a single database.
• Decision making process would be greatly enhanced because of faster
processing of information since data collection from information available
on computer takes much less time then manual system.
• Allocating of sample results becomes much faster because at a time the user
can see the records of last years.
• Easier and faster data transfer through latest technology associated with the
computer and communication.
• Through these features it will increase the efficiency, accuracy and
transparency,

113
114

11. REFERENCES

114
115

BIBLIOGRAPHY:

1. Hibernate in action by Christian Bauer and Gavin King

2. Head First Servlets and JSP by Bryan Basham, Kathy Sierra, Bert Bates

3. Beginning JSP 2.0 by Ben Galbraith, Wrox

4. Professional Jsp by Wrox Press Limited

5. Date, C.J (Third edition) An introduction to database system Addition


wesley/ Narosa Publication.

115
116

Websites :

These are various websites which is helpful in developing the project in coding
prospect

• http://www.roseindia.net/hibernate/

• http://www.hibernate.org

• http://pdf.coreservlets.com/

• http://www.w3schools.com/html/

• http://www.echoecho.com/html.htm

116
117

117

You might also like