Professional Documents
Culture Documents
Details that is not shown on the different levels of the data flow diagram such as
volumes, timing, frequency, etc. is shown on supplementary diagrams or in the data
dictionary. For example, data store contents may be shown in the data dictionary.
Data Flow Diagram (DFD) uses a number of symbols to represent the systems.
Data Flow Diagram also known as Bubble Chart is used to clarify system requirements
and identifying the major transformations that will become programs in system design.
So it is the starting point of the design phase that functionally decomposes the
requirements specifications down to the level of details.
Process
A process transforms data values. The lowest level processes are pure functions
without side effects. An entire data flow graphics high level process.
Graphical representation:
Graphical Representation:
Data flows
A data flow connects the output of an object or process to input of another object
Actors
An actor is active object that drives the data flow graph by producing or
consuming values.
Data store
A data store is a passive object with in a data flow diagram that stores data for
later access.
Graphical Representation:
External Entity
A rectangle represents an external entity such as a librarian ,a library member.
Graphical Representation:
OutPut Symbol
This box represented data production during human computer interaction
Graphical Representation:
V. PROGRAM ARCHITECTURE
This software based on concept of the Model View Controller (MVC)
design pattern.
MVC gives you a nice separation between your data (model), logic/business layer
(controller) and display (view). In theory, this allows you to change individual layers
without affecting the other layers. You could have a configurable data source (MYSQL
Server, XML, etc.) or have various controllers depending on the user (admin, anon, etc.)
or have various views (console, webform, winform). MVC makes it really easy to
implement change which is what programming in the real world is all about. These
three objects are known as Model, View and Controller.
VIEW
View is the graphical data presentation (outputting) irrespective of
the real data processing. View is the responsible for look and feel, some custom
formatting, sorting etc. View is completely isolated from actual complex data operations.
It simply gets final row-data from the model and puts some cosmetics and formatting
before displaying it in browser. View provides interface to interact with the system. The
beauty of MVC approach is that it supports any kind of view, which is challenging in
todays distributed and multi-platform environment.
A MVC model can have multiple views, which are controlled by controller. View
interface can be of WEB-FORMS, HTML, XML/XSLT, XTML, and WML or can be
Windows forms etc.
MODEL
It is the domain-specific representation of the information on
which the application operates. Domain logic adds meaning to raw data.
Many applications use a persistent storage mechanism (such as a database) to store data.
MVC does not specifically mention the data access layer because it is understood to be
underneath or encapsulated by the Model.
SQL Server
2005
CONTROLLER
Controller is responsible for Notice of action. Controller responds
to the mouse or keyboard input to command model and view to change. Controllers are
associated with views. User interaction triggers the events to change the model, which in
turn calls some methods of model to update its state to notify other registered views to
refresh their display.
Since MVC handles the multiple views using the same enterprise
model it is easier to maintain, test and upgrade the multiple system.
It will be easier to add new clients just by adding their views and
controllers.
.
aspx.c
s
Busine
ss
Logic
Layer
Presentation
Layer
.
asp
x
PROJECT
Data
Acces
s
Layer
Database
REQUIREMENTS
Client Side
Internet
Explorer
6.0
Server Side
wamp
MYSQL
Processor
Pentium II at 500
MHz
Pentium IV at 1
GHz
Pentium IV at 1
GHz
Organization profile
RAM
64 MB
Disk Space
1 GB
1. Click on login
(STUDENT &
2. Enter User Id
3. Enter Password
4. Validate
check
7. Wrong Password
5. Verify UID
password
6. Control goes to
respective pages
8. Forget Password
9. Control goes to
respective pages
10. Login Record
Update
RECRUITERS PAGE
The main objective of this project is building a website which will help Indian farmers to
make the effective cultivation by providing up-to-date information and make a path to
earn more money from Indian villages by sell their products to different cities online.
Here if suppose some village farmers want to use this facility and want to learn how is it
possible and how they can use e-farming to sell their products, If they have knowledge of
computer then they can directly register in the site and sell their product otherwise they
can contact company's computer professional who will schedule classes to teach them
basics of computers and internet like how they can open this site and register with it and
sell their products online etc.
On the other side, wholesaler from town can also register and buy products as per their
needs.
Modules
1. News
2. Weather
3. Classifieds
4. New products
5. Trails & Info
6.Research
7.Loan
8. Market
News:
It provides needed latest news for farmers. It contains 2 modules
i.
E-farming news
ii.
Agricultural news
iii.
E-farming announcements
Weather:
i.
Rain Gauge
ii.
Weather & observations
iii.
Wind & marine forecasts
Classifieds:
i.
Property
ii.
Machinery
iii.
Produce
iv. General
New products:
This module contains the information about the new inventions for agriculture.
Trails & info:
This module gives the information about researches in agric and new useful inventions
for best and effective cultivation.
Community:
This module specially made for the articles based on agric information from the
important news points.
Market:
This is the place for selling goods online by former without any inter mediator.
i.
Admin Module
ii.
Users Farmers, wholesaler
iii.
Inventory
iv. cold storage
v. Product acceptance
vi.
Order form
vii.
Taking the consumer's credit card
viii.
Acknowledging receipt of the order
ix.
Delivery
Level 0
Admin
Login
Add News
Store Data
Add Weather
information
Product
details
Level 1
User
Register
Store Data
Login
View
News
Gather about
E-Farming
Level 2
Retireve
Data
User
Purchase
Store Data
Order details
Payment details
days E-Business and online Shopping is very growing industry. So everybody wants that
his business is becomes global and worldwide. Our client wants to develop the website
that can provide facility to their customer to buy the product online. For the website an
extra-ordinary and attractive look is very much necessary for attract the new customer
and second thing is very goof functionalities. The user can easily find the product through
the category and subcategory wise. The user can also show the full description about the
product and also it is place order, and pay the bill online. Like this various other features
can be executed with the minimum efforts and accordingly database design has been
setup for this website.
Project Planning
Schedule representation
another party avoiding the risk, reducing the negative effect of the risk, and
accepting some or all of the consequences of a particular risk. Traditional risk
management focuses on risks stemming from physical or legal causes (e.g. natural
disaster or fires, accidents, death and lawsuits). Financial risk management, on the
other hand, focuses on risk that can be managed using traded financial
instruments.
In ideal risk management, a prioritization process is followed whereby the
risks with lower probability of occurring are handled first, and risk with lower
probability of occurrence and lower loss are handled later.
Step in the risk management process establishing the context involves
Planning the remainder of the process.
Mapping out the following: the scope of the exercise, the identity and objectives
of stakeholders and the basis upon which risks will be evaluated.
Defining a framework for the process and an agenda for the Identification.
Developing an analysis of risk involved in the process.
Once risks have been identified, they must then be assessed as to their
potential severity of loss and to the probability of occurrence. Regardless of the
prevention techniques employed, possible threats that could arise inside and
outside the organization need to be assessed. Regardless of the type of threat, the
goals of the business recovery planning are to ensure the safety of customers,
employees and other personal during the following a disaster.
The relative probability of a disaster occurring should be determined. Here
by the first risk can occur because of the less of communication with all branches
of Apollo for requirement fulfillment. For example, the company may not have
interacted with the branch of Apollo in U.S.A. and that branch needs some
additional functionality of the software.
If by mistake any person threat Administrator password then he can
change the data in software and can leak information. Same thing occurs if the
wrong user is authorized. The software may be in problem by natural threat e.g.
internal flooding,
External flooding, internal fire, external fire etc.
2.2.3 Disaster Prevention:
Because a goal of business recovery planning is to ensure the safety of
personnel and assets during the following a disaster, a critical aspect of the risk
analysis process is to identify the preparedness and preventive measures in place
at any point in time. Once the potential areas of high exposure to the organization
are
identify, additional
preventative
measures
can
be considered
for
implementation.
Disaster prevention and preparedness begins at the top of organization.
The attitude of senior management toward security and prevention should
Ideal use of these strategies may not be possible. Some of them may involve
tread-offs that are not acceptable to the organization or a person making the risk
management decisions.
2.2.5 Risk avoidance:
Includes not performing an activity that could carry risk. An example
would be not buying a property or business in order to not take on the liability that
comes with it. Another would be not flying in order to not to take the risk that the
airplanes was to be hijacked. Avoidance may seem the answer to all risk, but
avoiding risk also means losing out on the potential gain that accepting (retaining)
the risk may have allowed, not entering a business to avoid the risk of loss also
avoid the possibility of earning profits.
2.2.6 Risk reduction:
Involves methods that reduce the severity of the loss. Examples include
sprinklers designed to put out a fire to reduce the risk of loss by fire. This method
may cause a greater loss by water damage and therefore may not be suitable. Hal
on fire suppression systems may mitigate that risk, but the cost may be prohibitive
as a strategy. Modern software development methodologies reduce risk by
developing and delivering software incrementally. Early methodologies suffered
from the fact that they only delivered software in the final phase of development;
any problems encountered in earlier phases meant costly rework and often
jeopardized the whole project. By developing in iteration, software project can
limit effort wasted to a single iteration. A current trend in software development,
spearheaded by the extreme programming community, is to reduce the size of
iteration to the smallest size possible, sometimes as little as one week is allocated
to an iteration.
1 . - System Analysis
1.2
Objective
A key objective of this system is that it consolidates the data in one central
location. This will enable easy management of all information and ensure data
integrity across the entire breadth of the system. The online order management
system will provide such a facility for ordering any product so that he can easily
get the product and also can inquiry online. And it is also very useful to
customers because it saves their time and money.
Customer can see all the items which available in the shop. And get the
full detail information about the particular product.
To provide facility for if product not found then give detail of this product to
admin. Admin best try for provide that product.
The main objective of the project is to create a system that allows users to
order the product based on name of that product. The selected products are
displayed in a tabular format and the user can order their products online through
credit card Payment.
1.3
Current Scenario
Currently the system is static so the customer can just see the product
online but they cant order it. Customer has to do it manually and payment is
also manually done. So we are trying to make it dynamic and we will replace
the current ordering system to the latest technology.
Drawback of current system
Since the ordering of the products is done offline currently it is time consuming.
Customer has to pay somewhat more also.
1.4
Proposed solution
The system will be made such that the customer can order the product
online and payment of that can also be done online through credit card, visa card
etc. So the new system will save time and money of the customer.
1.5
Preliminary Analysis
1.1.1
Scope
Due to Internet access customers uses Internet more and more for their
shopping needs. They also save time and money by doing so, and for
more of their work related activity.
This system should provide facility to register online for online ordering.
The system should provide the facility for inquiry if the customer has any
query.
The system should provide facility for online payment.
This System should be able to generate customer related report.
1.1.2
Feasibility Study
A feasibility study is carried out to select the best system that meets
performance requirements. A feasibility study is designed to provide an over view
of the primary issues related to a business idea. The purpose is to identify any
make or break issues that would prevent your business from being successful in
the market place. In other words, a feasibility study determines whether the ideas
make sense.
Feasibility study provides a lot of information necessary for the business
plan. For example a good market is necessary in order to determine the projects
feasibility. This information provides the basis for the market section of the
business plan.
Technical Feasibility
The system will be hosted on the internet so company need internet
connection in that organization, as well as they need MS access to store the data
related to products and customers.
System can be accessed by any platform no concern with open source
community or Microsoft Technology, only thing needed is that .Net Framework
must be installed at application server. I am able to complete the project within
specified time.
This system can be easily supported by the hardware and software
requirements of any system. The system can also produce its required output.
The proposed system must provide adequate responses to inquires,
regardless of the number or locations of the users. There must be technical
guarantees of accuracy, reliability, ease of access, and data security.
Economical Feasibility:
Economical feasibility addresses to the following issues:
software resource requirement of the proposed system is .NET Framework
2.0 and MS Access that are already owned by the organization and do not require
additional Investment.
For declaring that the system is economically feasible, the benefits obtain
from the system has to be related against the cost incurred to actually develop the
system because the software which are used here is already owned by the
company. It needs the server which can run this system which is already company
has.
The hardware requirement of the system is at least a PC for an
administrator to handle the site from admin panel. The development cost of the
project is not much higher.
Behavioral Feasibility:
Proposed system will behave according to the requirement made or not.
Responses time of the system must be noticed because it is a web based system
whether it takes too much time to response or give quick response or response in
the specific period of time this consideration is most important. Time consuming
processes are possible to run on this environment or not it is also important.
Operational Feasibility:
The proposed system will meet the operational requirements like system
Performance, accessibility of information, client acceptance and efficient
solutions to the queries of the user.
If user has some basic knowledge of Internet, user can operate this application
easily. It provides easy user interface.
Operational feasibility has been considered from the users point of view.
This application once deployed, can run easily without any maintenance at this
point of time. After the inclusion of database in future, the database might need
some clean up after some period of time. If the database size becomes large, then
it might need some changes in handling of the application and might require some
optimization so that application runs faster and retrieves data faster.
1.6
System Requirements
Hardware Configuration:
Server Configuration:
Standard Pentium series processor.
Minimum 4 MB RAM.
HDD storage capacity of 360GB with 5400 rpm or more.
Client Configuration:
Any computer system with normal speed.
Internet Connectivity
Software Requirements:
Server Software:
Visual Studio .Net 2005 (Frame work 2.0)
Windows 2000 or higher OS.
Client Software:
VGA or higher resolution monitor,
IE 6.0+,Fire fox 2.0+, Flash.
User should never be surprised by the behavior of the system and it should
also provide meaningful feedback when occur and provide context sensitive user
help facility so that user can recover from the errors. The system should be
available whenever user demanding for the service.
Portability
The system must be platform independent, network independent, and
hardware independent. For example for running the system not any extra
hardware is required.
Constraints:
Payment through e-check/DD needs gateway services as of high cost.
In credit card validation, all the visa card, master card and American express card
provided primary level validation but secondary level validation is of high cost.
The user has to agree with the policies of the retailer.
The Customer must have some ID like passport, Social security number, voting
card, PAN card etc.
There is wide use of images low range of RAM is little inconvenient to make it
faster. To get result very fast and appropriate it needs to have high speed of RAM.
2 .- Technology Used
Introduction to .NET
Clients
Web Form
Applications
Web Service
.NET Framework
Windows
The Internal
Web Service
.NET
Foundation
Web Services
Third-Party
Web Services
.NET Enterprise
Servers
To build all communication on industry standards to ensure that code based on the
.NET Framework can integrate with any other code.
The .NET Framework has two main components: the common
language runtime and the .NET Framework class library. The common
language runtime is the foundation of the .NET Framework. You can think of
the runtime as an agent that manages code at execution time, providing core
services such as memory management, thread management, and remoting,
while also enforcing strict type safety and other forms of code accuracy that
promote security and robustness. In fact, the concept of code management is
a fundamental principle of the runtime. Code that targets the runtime is
known as managed code, while code that does not target the runtime is
known as unmanaged code. The class library, the other main component of
the .NET Framework, is a comprehensive, object-oriented collection of
reusable types that you can use to develop applications ranging from
traditional command-line or graphical user interface (GUI) applications to
applications based on the latest innovations provided by ASP.NET, such as
Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that
load the common language runtime into their processes and initiate the
execution of managed code, thereby creating a software environment that
can exploit both managed and unmanaged features. The .NET Framework not
only provides several runtime hosts, but also supports the development of
third-party runtime hosts.
For example, ASP.NET hosts the runtime to provide a scalable, serverside environment for managed code. ASP.NET works directly with the runtime
to enable ASP.NET applications and XML Web services, both of which are
discussed later in this topic.
two most common application errors, memory leaks and invalid memory
references.
The runtime also accelerates developer productivity. For example,
programmers can write applications in their development language of choice,
yet take full advantage of the runtime, the class library, and components
written in other languages by other developers. Any compiler vendor who
chooses to target the runtime can do so. Language compilers that target
the .NET Framework make the features of the .NET Framework available to
existing code written in that language, greatly easing the migration process
for existing applications.
While the runtime is designed for the software of the future, it also
supports software of today and yesterday. Interoperability between managed
and unmanaged code enables developers to continue to use necessary COM
components and DLLs.
The runtime is designed to enhance performance. Although the
common language runtime provides many standard runtime services,
managed code is never interpreted. A feature called just-in-time (JIT)
compiling enables all managed code to run in the native machine language of
the system on which it is executing. Meanwhile, the memory manager
removes the possibilities of fragmented memory and increases memory
locality-of-reference to further increase performance.
Source Code in
VB 2005
VB 2005 Compiler
(vbc.exe)
Source Code in
C#
C# Compiler
(csc.exe)
Appropriate
Compiler
JIT (just-in-time
compiler)
Native Machine
Code
Execute
Figure 2 Language Compilation in .NET
Console applications.
ASP.NET applications.
Windows services.
For example, the Windows Forms classes are a comprehensive set of
reusable types that vastly simplify Windows GUI development. If you write
an ASP.NET Web Form application, you can use the Web Forms classes.
exposed to the user in an ad-hoc manner, combined with data from multiple
sources, or remote between tiers. The ADO.NET Dataset object can also be
used independently of a .NET Framework data provider to manage data local
to the application or sourced from XML.
The ADO.NET classes are found in System.Data.dll, and are integrated
with the XML classes found in System.Xml.dll. When compiling code that uses
the
System.Data
namespace,
reference
both
System.Data.dll
and
System.Xml.dll.
ADO.NET provides functionality to developers writing managed code
similar to the functionality provided to native COM developers by ADO.
ADO.NET Components
The ADO.NET components have been designed to factor data access
from data manipulation. There are two central components of ADO.NET that
accomplish this: the Dataset, and the .NET Framework data provider, which
is a set of components including the Connection, Command, DataReader,
and DataAdapter objects.
The ADO.NET Dataset is the core component of the disconnected
architecture of ADO.NET. The Dataset is explicitly designed for data access
independent of any data source. As a result it can be used with multiple and
differing data sources, used with XML data, or used to manage data local to
the application. The Dataset contains a collection of one or more DataTable
objects made up of rows and columns of data, as well as primary key, foreign
key, constraint, and relation information about the data in the DataTable
objects.
The other core element of the ADO.NET architecture is the .NET
Framework data provider, whose components is explicitly designed for data
manipulation
and
fast,
forward-only,
read-only
access
to
data.
The
following
diagram
illustrates
architecture.ADO.NET architecture
the
components
of
ADO.NET
Features of C#.Net:
Data Types: C Sharp .Net introduces three new data types. The char data type
is and unsigned 16-bit quantity used to store Unicode characters. It is
equivalent to the .Net Framework System. Char data type.
you to declare interfaces, while the implements statement lets you write code
that puts the items described in the interface into practice.
Shared Members: Shared members are properties, procedures, and fields that
are shared by all instances of a class. Shared data members are useful when
multiple by objects need to use information that is common to all. Shared
class methods can be used without first creating and object form a class.
Bit Shift Operators: C Sharp .Net now supports arithmetic left and right shift
operations on integral data types. Arithmetic shifts are not circulars, which
means the bits shifted off one end of the result are not reintroduced at the
other and. The corresponding assignment operators are provided as well.
Overview
Microsoft
SQL
Server
2005
Express
Edition
extends
the
SQL
Server
2005
Express
Edition
is
set
of
components that work together to meet the data storage and analysis
needs of the largest Web sites and enterprise data processing systems.
The topics in SQL Server Architecture describe how the various
components work together to manage data effectively.
Internet Integration
The SQL Server 2005 Express Edition database engine includes integrated
XML support. It also has the scalability, availability, and security features
required to operate as the data storage component of the largest Web sites. The
SQL Server2005 Express Edition programming model is integrated with the
Windows DNA architecture for developing Web applications, and SQL Server
2005 Express Edition supports features such as English Query and the Microsoft
Search Service to incorporate user-friendly queries and powerful search
capabilities in Web applications.
Scalability and Availability
The same database engine can be used across platforms ranging from
laptop computers running Microsoft Windows 98 through large, multiprocessor
servers running Microsoft Windows 2000 Data Center Edition. SQL Server 2005
Express Edition supports features such as federated servers, indexed views, and
large memory support that allow it to scale to the performance levels required by
the largest Web sites.
Enterprise-Level Database Features
The SQL Server 2005 Express Edition relational database engine supports
the features required to support demanding data processing environments. The
database engine protects data integrity while minimizing the overhead of
managing thousands of users concurrently modifying the database.
SQL Server 2005 Express Edition includes a set of administrative and
development tools that improve upon the process of installing, deploying,
managing, and using SQL Server across several sites. SQL Server 2000 also
supports a standards-based programming model integrated with the Windows
DNA, making the use of SQL Server databases.
Data warehousing
SQL Server 2005 Express Edition includes tools for extracting and
analyzing summary data for online analytical processing. SQL Server also
includes tools for visually designing databases and analyzing data using Englishbased questions.
Database Architecture
database
administrator
needs
to
work
with
the
physical
implementation.
Each instance of SQL Server has four system databases (master,
model, tempdb, and msdb) and one or more user databases. Some
organizations have only one user database, containing all the data for
their organization. Some organizations have different databases for
each group in their organization, and sometimes a database used by a
single application.
It is not necessary to run multiple copies of the SQL Server
database engine to allow multiple users to access the databases on a
server. An instance of the SQL Server Standard or Enterprise Edition is
capable of handling thousands of users working in multiple databases
at the same time.
A database is similar to a data file in that it is a storage place for data. Like
a data file, a database does not present information directly to a user; the user runs
an application that accesses data from the database and presents it to the user in an
understandable format. Database systems are more powerful than data files in that
data is more highly organized.
In a well-designed database, there are no duplicate pieces of data that the
user or application must update at the same time. Related pieces of data are
grouped together in a single structure or record, and relationships can be defined
between these structures and records.
Relational Database
Scalable
SQL Server 2005 Express Edition supports having a wide range of users
access it at the same time. An instance of SQL Server 2005 Express Edition
includes the files that make up a set of databases and a copy of the DBMS
software. Applications running on separate computers use a SQL Server 2005
To work with data in a database, the user have to use a set of commands
and statements (language) defined by the DBMS software. Several different
languages can be used with relational databases; the most common is SQL. The
American National Standards Institute (ANSI) and the International Standards
Organization (ISO) define software standards.
Extensible Markup Language
Database Architecture
using
database,
you
work
primarily
with
the
logical
For example, an organization could have one database for sales, one for
payroll, one for a document management application, and so on. Sometimes
an application uses only one database; other applications may access several
databases.
It is not necessary to run multiple copies of the SQL Server database
engine to allow multiple users to access the databases on a server. An
instance of the SQL Server Standard or Enterprise Edition is capable of
handling thousands of users working in multiple databases at the same time.
Each instance of SQL Server makes all databases in the instance available to
all users that connect to the instance, subject to the defined security
permissions.
When connecting to an instance of SQL Server, your connection is
associated with a particular database on the server. This database is called
the current database. You are usually connected to a database defined as
your default database by the system administrator, although you can use
connection options in the database APIs to specify another database. You can
switch from one database to another using either the Transact-SQL USE
database_name statement, or an API function that changes your current
database context.
SQL Server 2000 allows you to detach databases from an instance of
SQL Server, then reattach them to another instance, or even attach the
database back to the same instance. If you have a SQL Server database file,
you can tell SQL Server when you connect to attach that database file with a
specific database name.
MS Visio 2003
Microsoft Visio is a Graphical tool used for the Flow chart, DFD and ER. It
contains all the shapes for the Flow chart, DFD, ER etc. that a user can drag and drop
onto the drawing page to create a drawing, without having to draw anything manually.
Shapes can have online Help to assist a user in using them correctly.
The following visual solutions are included:
Block Diagram Includes the Basic, Block, and Block with Perspective templates.
These are useful for showing all types of relationships and hierarchies and provide
the basic arsenal of information graphics tools.
Brainstorming
more linear view, or to an Extensible Markup Language (XML) file for reuse
elsewhere.
Building Plan Provides a quick way to design accurate, to-scale office and
furniture layouts.
Charts and Graph Formerly Forms and Charts. Includes templates for designing
business forms; creating quick pie, line, and bar charts and graphs; and creating
marketing diagrams.
Flowchart Includes templates for creating audit diagrams, basic flowcharts, cause
and effect diagrams, cross-functional flowcharts, mind mapping diagrams, total
quality management (TQM) charts, and workflow diagrams.
Map Includes templates for creating simple street maps and attractive 3-D maps.
Project Schedule Includes templates for creating PERT charts, Gantt charts,
timelines, and calendars, so you can keep your projects on track.
Network Includes further templates for creating high-level, logical diagrams and
for designing local area networks (LANs), wide area networks, wiring closets,
server rooms, and telecommunications structures. In addition, you can create
diagrams of Microsoft Active Directory, Novell Directory Services (NDS), and
other LDAP-based directory structures.
Web Diagram Includes templates for automatically mapping Web sites and
conceptual shapes for planning new designs