You are on page 1of 60

CHAPTER - 1

COMPANY PROFILE

COMPANY PROFILE
(THE COMPANIES ACT, 1956)
(COMPANY LIMITED BY SHARES)
M E M O R A N D U M OF A S S O C I A T I O N
OF
SWARNIM INFOSOFT PRIVATE LIMITED

The Name of the Company is SWARNIM INFOSOFT PRIVATE LIMITED

The Registered Office of the Company will be situated in C-41,Sector 2, Noida,


Gautam Budh Nagar, Uttar Pradesh 201301.

The objects for which the Company is established are:-

THE MAIN OBJECTS TO BE PURSUED BY THE COMPANY ON ITS INCORPORATION ARE: -

1.
To carry on the business of providing, designing & engineering services to
domestic & international market such as software design, product design, architectural
design, security system design, acoustic system design, CAD design, 2D/3D rendering,
media designs, off-shore engineering & design services, import & export of all types of
software and hardware.
2.
To develop, produce, alter, acquire, buy, sell, import, export, lease, licence or
otherwise deal in computer software, hardware and programs of all kind and nature and
for all use including but not limited to computer aided engineering, software for micro
processor based systems, manufacturing computer aided graphics, operation
maintenance and service of all plants and equipments and software for banks and/or for
special application and for any other purpose.
3.
To provide consultancy, technical manpower services, educational services, high
end training in software, hardware, networking, ERP, electronics, VLSI, Embedded
Systems, Internet Technologies etc,
establishing training institutes, educational
marketing, appointing franchise of all kinds of software & computer related activities in
India and abroad. To carry on the business of formulating, developing, improving,
designing, marketing, selling, franchise, exporting and licensing software and products of
any description. To carry on the business of consultants, system integrators, network
integrators, system developers, software developers, research on management,
manpower exports in the field of hardware and software skills and other allied activities,
Management and business solution consulting for other companies in the areas of
defining strategy, vision, business restructuring, Management systems planning and
implementation, Business process Modeling and mapping, analysis and solutions,
Research and development for new products and technologies in the various areas of
Information Technology, Internet and communication.

4.
To provide internet or channel services such as web hosting, web designing,
internet training and internet based solutions. To provide training and internet based
solutions and to initiate, undertake, carry on, engage in, promote, assist, encourage, and
conduct research, development, experiments, studies, project analysis, onshore &
offshore projects, back office operations, examinations, surveys and tests of all kinds
related to computers, electronic data processing equipments, electronic data processing
equipments, software and hardware programs solution of all kinds, marketing of other
software products and technologies licensed to the company by others.
5.
To carry on assembling, marketing, operating, altering, converting, processing
importing, designing, buying, selling, exporting, installing, servicing, exchanging, or
otherwise dealing in all types of computer software, hardware, data processing machines,
peripherals, word-processing machines, calculators, computerized systems,
telecommunication, network systems, transmission systems covering all media such as
wireless, satellite and other computer based systems and instruments and their
compounds, devices and spare parts. To carry on the business of maintenance, repair and
reconditions of all types of software and hardware, computers, networks equipments.
6.
To carry on the business of processing of jobs for markets and management
consultancy in the field of computer software, Hardware, Networking, Data Processing,
back office operations, micro processor and VLSI design, micro processor based
intelligent systems and in any other field.
1.1 OUR VISION
We shall define ourselves in the cutting edge technology in the coming era. We
shall create honest working environment with see-through-glass planning.
1.2 OUR MISSION
To create opportunity for growth & self actualization to trainees and provide an
environment of highly conducive works culture.
WORK RELATED AREAS:
1. Web Page designing and hosting
2. Internet and Intranet Solutions
3. Web based applications development
4. Client / Server Applications Development
5. Re-engineering
6. Research & Development in WAP and Web related conversing technologies
7. Corporate training
8. High-end User Training (Vocational)

CHAPTER - 2

Analysis of Proposed System


And
System requirements

2.1-System Analysis:
PROBLEMS IN EXITING SYSTEM

In the current system the main problem of resolving the queries of trainees is taking time delay
due to classes running in weekends or week days. If trainees have any problem regarding their
classes, have to wait for resolving their problem in the next classes. This problem breaks the
flow of study. Another problem is trainees only can communicate if they are at classes so its
create communication gap between trainees.
PROPOSED SYSTEM
We have analysis on the problems in exiting and designed a much simpler system to resolve
the problem.
In this system trainee can submit their question online and can get the solution easily at any
time. Trainees can create Group, join and communicate each other by sending message and
resolve their problem online. Moderator can upload article and Trainees can download article.
To achieve these objectives, Tech Mentro has planned to develop a web application named
etutes.in. etutes.in shall have following functionality:
Students can use etutes for training, submitting their questions, reading answers of
posted queries, search topic and enhancing their skills.
Online courses of various technologies shall be introduced by Tech Mentro using
etutes.
Online upload and download of article.
Analysis is a detailed study of the various operations performed by a system and their relation
within and outside the system. A key question is what must be done to solve the problem.
One aspect of the analysis defining the boundaries of the system and determining whether or
not a candidate system should consider other related system. During analysis data are collected
on the available files decision points and transaction handled by the parent system. Some
logical system models and tools are used in the analysis. Data flow diagrams, interviews,
onsite observation and questionnaires are examples, the interviews commonly used in analysis.
It requires special skill and sensitivity to the subject being interview bias in data collection and
interpretation can be problem.

System Planning and the Initial Investigation:


The most critical phase of managing system projects is planning to launch a system
investigation, we need plan detailing the steps to be taken, the people to be questioned and they
outcome expected. The initial investigation has the objective of determining whether the users
request has potential merit. The major steps are defining user requirements. When the initial
investigations completed. The user receives a proposal summarizing the finding the
recommendation of the analyst.
Information Gathering:
A key part of feasibility analysis is gathering information about the present system. The analyst
knows what information to gather, where to find it, how to collect it and what to make of it.
The proper use of tools for gathering information is the key to successful analysis.
The tools are the traditional interview, questionnaire, and on-site observation. We need to
know, for example how to structure an interview, what makes up a questionnaire, and what to
look for on-site observations. These tools when learned help analysis assess the effectiveness
of the present system and provide the ground work for recommending a candidate system.

H/W & S/W REQUIREMENT (RECOMMENDED)


HARDWARE REQUIREMENT
RAM

1GB

PROCESSOR

PENTIUM IV AND ABOVE

HARD DISK

20GB

KEYBOARD

NORMAL(102/103 keys)

MOUSE

NORMAL

SOFTWARE REQUIREMENT
OPERATING SYSTEM

WIINDOWS XP SP2

WEB SERVER & IDE

APACHE-TOMCAT 6.0,MYECLIPSE 8.0

FRONT-END

JAVA & JSP

BACK-END

ORACLE10G

ADDITIONAL API

APACHE-LUCENE

PLATEFORM (Technology/Tool Selection)


FRONT-END
Introduction to Java
Java is a high-level, third-generation programming language like C, FORTRAN, Perl and many
others. It is a platform for distributed computing a development and run-time environment that
contains built-in support for the World Wide Web.

History of Java
Java development began at Sun Microsystems in 1991, the same year the World Wide Web was
conceived. Javas creator, James Gosling did not design java for the Internet. His Objective was to
create a common development environment for consumer electronic devices which was easily portable
from one device to another. This effort evolved into a language, code named Oak and later renamed
Java that retains much of the syntax and power of c++, but is simpler and more platform-independent.

Java Features

Some of the important features of Java are as follows:


Simplicity
Orientation
Platform Independence
Security
High Performance
Multi Threading
Dynamic linking.
Garbage Collection.

One of the most important features of Java is platform independence, which makes it famous
and suitable language for World Wide Web.

Why Java is Platform Independent?


Java is Platform Independent because of Java Virtual Machine (JVM).

Java Virtual Machine (JVM)


The client application or operating system must have a java byte-code interpreter to execute
byte-code instructions. The interpreter is a part of a larger program called the JVM. The JVM interprets
the byte code into native code and is available on platforms that support Java.
When the user runs a Java program, it is up to the JVM to load, possibly verify, and then execute it. The
JVM can perform this function from within a browser or any other container program or directly on top
of the operating system.

When a browser invokes the JVM to run a Java program, the JVM does a number of things:
It validates the requested byte-code, verifying that they pass various formatting and
security checks.
It allocates memory for the incoming java class files and guarantees that the security of
JVM is not violated. This is known as the class loader module.
It interprets the byte code instructions found in the class files to execute the program.
Interaction of JSP Page with JDBC
Application Server Machine
Client Machine
Browser
with
HTML

Web server

JSP Engine

JDBC Driver

DB Server Machine

RDBMS
Server

Here the browser using the web application is not required to support java at all. The JSP has
full control over how many JDBC connections are made to the server. The client never makes direct
JDBC connection to the server. This solution can work readily through a firewall, only standard HTTP
is used between the web server and the client.
As a bonus this solution sends itself to easily secured information simply by adding secured
socket layer support to the web server. Because of this separation of the presentation from the business
logic, which is separated from the database logic, this sort of system is often called three tiers of the
system. Although the application server and database server can also running on the same server
machine.

There is still one minor problem with this scenario. Project personal accessing the JSP page
containing the embedded JDBC code can easily and inadvertently modify the database access code and
this may result in an erroneous application or even corrupted database. There are solution for this:
Create java beans or java classes that encapsulate all the JDBC operations. This is significantly better
solution. But instantiation, initialization and parameterization of the java class or the beans can still
represent a significant amount of embedded java code within the JSP.

BACK-END
ORACLE 10g
Why we are using Oracle (RDBMS)?
Some of the merits of using Oracle (RDBMS) are as under:
Centralization of database.
Client Server Technology.
Security.
Normalization of Data Base.
Relationship.
Transaction Processor.
It gives some internet related features.
Hence because of these features we are using Oracle as a back-end technology.

Weather you are working on LAN projects or Distributed projects, there are two sides of it:Front End
Back End

Front End remains on client side. Front end is made for end user who uses our application.
Basically in front end, our input-output forms reside which takes the input from the client and gives
output back to client.
Backend remains on server side and has two components viz.
Server side programs
Data Base
Database is the most important thing in this universe as database gives identity to a thing. It
provides us with a repository where we can store ample amount of data, at one place. Without a
database, existence of a thing is impossible.
While working on a project first step is to design a database.
What is a database?
Data Base is a collection of tables and table is a collection of records in a tabular form i.e. in
row and columns format.
Data Base can be divided into two parts: RDBMS
DBMS
We will be using RDBMS (Relational Database Management System) in our project i.e. oracle 10g.

10

Feasibility Study
A feasibility study is conducted to select the best system that meets performance requirement.
This entails an identification description, an evaluation of candidate system and the selection of best
system for he job. The system required performance is defined by a statement of constraints, the
identification of specific system objective and a description of outputs.
The key consideration in feasibility analysis are :
1. Economic Feasibility :
2. Technical Feasibility :
3. Operational Feasibility:

Economical feasibility
It looks at the financial aspects of the project. It determines whether the management has
enough resources and budget to invest in the proposed system and the estimated time for the recovery
of cost incurred. It also determines whether it is worth while to invest the money in the proposed
project. Economic feasibility is determines by the means of cost benefit analysis.The proposed system
is economically feasible because the cost involved in purchasing the hardware and the software are
within approachable. The personal cost like salaries of employees hired are also nominal, because
working in this system need not required a highly qualified professional. The operating-environment
costs are marginal. The less time involved also helped in its economical feasibility. It was observed that
the organization has already using computers for other purpose, so that there is no additional cost to be
incurred for adding this system to its computers.
The backend required for storing other details is also the same database that is Sql. The
computers in the organization are highly sophisticated and dont needs extra components to load the
software. Hence the organization can implement the new system without any additional expenditure.
Hence, it is economically feasible.

Software Cost

Apache Tomcat6.0

Open Source

MyEclipse

20000/-

Oracle

15000/-

J2EE Kit

Free

11

Manpower Cost

Team cost

25000/-

System Cost

40,000/-

Total Cost

100000/-

Technical Feasibility
It is a measure of the practically of a specific technical solution and the availability of
technical resources and expertise

The proposed system uses Java as front-end and Oracle 10g as back-end tool.

Oracle is a popular tool used to design and develop database objects such as table
views, indexes.

The above tools are readily available, easy to work with and widely used for
developing commercial application.

Hardware used in this project are- p4 processor 2.4GHz, 512 MB RAM, 40 GB


hard disk. This hardware was already available on the existing computer system. The
software like Oracle 10g, Weblogic Server, JDK, JSDK, J2EE and operating system
WINDOWS-XP SP2 used were already installed On the existing computer system. So no
additional hardware and software were required to purchase and it is technically feasible. The
technical feasibility is in employing computers to the organization. The organization is

12

equipped with enough computers so that it is easier for updating. Hence the organization has
not technical difficulty in adding this system.

Tools Used

:
1) JDK 1.4
2) J2EE Library
3) MyEclipse 8.0
4) Apache-Tomcat 6.0
5) Oracle 10g.

Duration of Project:-

Time Duration
For study

15 days

Designing

20 days

For development

90 days

Testing

15 days

Total time

140 days

Operational Feasibility
The system will be used if it is developed well then be resistance for users that
undetermined

No major training and new skills are required as it is based on DBMS model.

It will help in the time saving and fast processing and dispersal of user request and
applications.

13

New product will provide all the benefits of present system with better performance.

Improved information, better management and collection of the reports.

User support.

User involvement in the building of present system is sought to keep in mind the user
specific requirement and needs.

User will have control over there own information. Important information such as
pay-slip can be generated at the click of a button.

Faster and systematic processing of user application approval, allocation of IDs,


payments, etc. used had greater chances of error due to wrong information entered by
mistake.

Behavioral Feasibility
People are inherent to change. In this type of feasibility check, we come to know if
the newly developed system will be taken and accepted by the working force i.e. the people
who will use it.

14

2.2- Software Analysis


(A) USECASE DIAGRAMS:
A use case diagram is a diagram that shows a set of use cases and actors and their
relationships. A use case specifies the behavior of a system or a part of a system and is a
description of a set of sequences of actions, including variants that a system performs to yield
an observable result of value to an actor. As mentioned below the use case diagrams are
usually specified along with the
requirements analysis or can be used as an aid in the designing also at ten preliminary levels.

Use Case Diagram (User)

15

Use Case Diagram (Admin/ Moderator)

16

(B) DATA DICTONARY


This part of the Design consists the overall database schema or we can say that tables which consists
various types of records. Table of a database consists attributes,entities,tupels for storing and
manipulating records

Some of the tables are s follows:


(1)

UserDetails: This table shall store general information of the users. It contains following fields.

Field name

Data type

Constraint/Description

userId

Number

Each user have unique userid which is auto generated

mailId

Varchar2

Each user can have unique emailed

Password

Varchar2

Each user have their own password to login in portal

displayName

Varchar2

Name of user which is displayed after login

Role

Varchar2

Different user have different access right

joiningDate

Date

Registration date and time is stored in this field

postCount

Number

Count of posts submitted by the user on all forums

replyCount

Number

Count of replies submitted by the user on all forums

groupsCount

Number

Count of groups joined by the user

forumsCount

Number

Count of forums joined by the user

17

(2)

(3)

(4)

GroupDetails: Th
his table shall store information of all user Groups. It contains following fields.

Field name

Data type

Constraint/Description

groupId

Number

Each group contain unique groupid

groupName

Varchar2

Name of the group

groupOwner

Number

User Id of the group owner

memberCount

Number

Count no of member in a group

Description

Varchar2

Description about group

GroupUsers: Th
his table shall store information of all the members of a Group. It contains
following fields.

Field name

Data type

Constraint/Description

groupId

Number

It contain group id

userId

Number

User id who joined the group

joiningDate

Date

Date of joining the group

ForumDetails: Th
his table shall store information of all the forums. It contains following fields.
Field name

Data type

Constraint/Description

forumId

Number

Each forum have unique forum id

Moderator

Number

Admin or moderator who started the forum

startDate

Date

Date of starting the forum

Topic

Varchar2

Name of the forum

postCount

Number

No of post submitted in the forum

memberCount

Number

No of member s joined in the forum

18

(5)

(6)

ForumUsers: Th
his table shall store information of all the members of a forum. It contains
following fields.

Field name

Data type

Constraint/Description

forumId

Number

This field contain the id of the forum

userId

Number

User id of the joined member s of the forum

joiningDate

Date

Date of joining the forum

Rank

Varchar2

moderator, member

postCount

Number

Count of posts submitted by the user on this forum

replyCount

Number

Count of replies submitted by the user on this forum

PostDetails: Th
his table shall store information post of users on a forum. It contains following
fields.

Field name

Data type

Constraint/Description

Posted

Number

Each submitted post have unique id

Poster

Number

Id of the user who submitted the post

Postdate

Date

Date of posting

Contents

Varchar2

Content of the post

viewCount

Number

No of times the post is viewed

replyCount

Number

No of times reply is sent

Rating

Varchar2

Rating given on the basis of votes.

19

(7)

ReplyDetails: Th
his table shall store information replies of a post on a forum. It contains
following fields.

Field name

Data type

Constraint/Description

replyId

Number

Each reply have unique id

posted

Number

Post id for the reply is submitted

replyPoster

Number

Id of the user who submitted the reply

replyDate

Date

Date when reply is submitted

Contents

Varchar2

Content of the reply

viewCount

Number

No of times reply is viewed

Rating

Varchar2

Rating given to the reply on the basis of votes.

(8) Message Table:- This table shall store information of message


Field name

Data type

Constraint/Description

Mid

Number

Each message have unique id

Toid

Number

Id of the message Receiver

Fromid

Number

Id of the message Sender

Fromeid

Varchar2(400)

Login id of the Sender

Sub

Varchar2(400)

Subject

Mess

Varchar2(400)

Message

(9)Article Table:- This table shall store the information of article.


Field name

Data type

Constraint/Description

Articleid

Number

Each Article Have unique id

Topic

Varchar2(40)

This field contain Article Topic

Artdate

Varchar2(40)

This field contain the date of posting the article

Artpath

Varchar2(40)

This field contain the path of the article file

20

(C) DATA FLOW DIAGRAM

Context Level DFD of etutes.in

Manages Courses

Online Trainees

Register for course

Tech Mentro
Upload tutorials
and Articles

Read Tutorials

Make Payments

Post Answers

etutes . in
Receives
Certificates

View Reports
Receive Payments

Read Replies and


Articles

Submit Queries,
Download tutorials

Current Students

21

1 Level DFD of etutes.in

Trainees

registers

Course info

1.0
Registration

Course storage

Trainee storage
Registration
Details

login Details

Registration Info
login info

2.0
ProfileManager

login storage
role & login Details

Registration Info

tutorial details

Trainee

3.0 Tutor

tutorials

Tutorial storage

view/ download tutorials

Post Articles and


Replies

articles

4.0 Content
Manager

Trainer

Article storage

Quentions, Replies

Trainer

Submit post,
view Replies

Post storage

22

(D)ER-DIAGRAM

23

(E) Process Specification

24

25

26

CHAPTER - 3

Logical and Physical design of system

27

(A) DATABASE DESIGN

USER DETAILS TABLE


Column Name

Data Type

Nullable

USER_ID

NUMBER(5,0)

No

MAILID

VARCHAR2(20)

Yes

PASSWORD

VARCHAR2(20)

Yes

DISPLAYNAME

VARCHAR2(20)

Yes

ROLE

VARCHAR2(20)

Yes

JOININGDATE

VARCHAR2(40)

No

POSTCOUNT

NUMBER(5,0)

Yes

REPLYCOUNT

NUMBER(5,0)

Yes

GROUPSCOUNT

NUMBER(5,0)

Yes

FORUMSCOUNT

NUMBER(5,0)

Yes

FNAME

VARCHAR2(20)

Yes

GENDER

VARCHAR2(20)

Yes

MOBILENO

NUMBER(15,0)

Yes

ADDRESS

VARCHAR2(50)

Yes

CITY

VARCHAR2(20)

Yes

STATE

VARCHAR2(20)

Yes

PINCODE

NUMBER(10,0)

Yes

USER GROUPS TAB LE


Column Name

Data Type

Nullable

JOININGID

NUMBER

No

GROUPID

NUMBER

Yes

USERID

NUMBER

Yes

Primary Key

Primary Key

28

USERMESSAGE T ABLE
Column Name

Data Type

Primary
Key

Nullable

MID

NUMBER

Yes

TOID

NUMBER

Yes

FROMID

NUMBER

Yes

FROMEID

VARCHAR2(400)

Yes

SUB

VARCHAR2(400)

Yes

MESS

VARCHAR2(400)

Yes

COURSEDETAILS TABLE
Column Name

Data Type

Nullable

Primary
Key

COURSEID

NUMBER

No

COURSENAME

VARCHAR2(40)

Yes

DURATION

VARCHAR2(40)

Yes

CONTENTS

VARCHAR2(4000)

Yes

FEE

NUMBER

Yes

FORUMUSERS TABLE
Column Name

Data Type

Nullable

Primary Key

FORUMID

NUMBER

No

MODERATOR

NUMBER

Yes

TOPIC

VARCHAR2(100)

Yes

POSTCOUNT

NUMBER

Yes

MEMBERCOUNT

NUMBER

Yes

FORUMUSERS TABLE
Column Name

Data Type

Nullable

JOININGID

NUMBER

No

FORUMID

NUMBER

No

USERID

NUMBER

No

RANK

VARCHAR2(20)

Yes

POSTCOUNT

NUMBER

Yes

REPLYCOUNT

NUMBER

Yes

Primary Key

29

GROUPDETAILS TABLE
Column Name

Data Type

Nullable

GROUPID

NUMBER

No

GROUPNAME

VARCHAR2(30)

Yes

GROUPOWNER

NUMBER

Yes

DESCRIPTION

VARCHAR2(100)

Yes

MEMBERCOUNT

NUMBER

Yes

Primary
Key

PAYMENTSDETAIL TABLE
Column Name

Data Type

Nullable

PAYMENTID

NUMBER

No

CARDNO

VARCHAR2(50)

Yes

BANKNAME

VARCHAR2(100)

Yes

PAYMENTMODE

VARCHAR2(40)

Yes

PAYMENT TABLE
Column Name

Data Type

Nullable

Primary
Key

Primary Key

PAYMENTID

NUMBER

No

PAYMENTDATE

VARCHAR2(40)

Yes

AMOUNT

NUMBER

Yes

USERID

NUMBER

Yes

COURSEID

NUMBER

Yes

POSTDETAILS TABLE
Column Name

Data Type

Nullable

POSTID

NUMBER

No

POSTERID

NUMBER

Yes

FORUMID

NUMBER

Yes

POSTDATE

VARCHAR2(20)

Yes

CONTENTS

VARCHAR2(80)

Yes

VIEWCOUNT

NUMBER

Yes

REPLYCOUNT

NUMBER

Yes

VOTECOUNT

NUMBER

Yes

Primary Key

30

REPLYDETAILS TABLE
Column Name

Data Type

Nullable

REPLYID

NUMBER

No

REPLIERID

NUMBER

Yes

POSTID

NUMBER

Yes

FORUMID

NUMBER

Yes

REPLYDATE

VARCHAR2(20)

Yes

CONTENTS

VARCHAR2(80)

Yes

VIEWCOUNT

NUMBER

Yes

VOTECOUNT

NUMBER

Yes

Primary Key

Primary
Key

Column Name

Data Type

Nullable

ARTID

NUMBER

No

TOPIC

VARCHAR2(400)

Yes

ARTDATE

VARCHAR2(400)

Yes

ARTILEPATH

VARCHAR2(400)

Yes

31

(B) LAYOUT DESIGN

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

(C) RESPONSIBILITY DESIGN


User Manager: This Module is responsible for collecting and storing user information in the system. It
provides views to users for editing and viewing their profiles. On line trainees can register themselves
for various online courses through this module.
Article Manager: This module is responsible for overall management of articles posted by trainers on
the website. It provides views for trainers to post edit and delete queries.
Post Manager: One of the primary aims of etutes.in is to provide a convenient mechanism to trainees
for interacting with the trainers. This module is responsible for this service. It provides views to trainees
to submit their questions and view their answers. A trainee can keep his/her question private or it can be
made public to be viewed by all users.
Course Manager: This module is responsible for the management of online courses presented by Tech
Mentro. Using this module, Tech Mentro can introduce an online course, edit details of existing
courses, delete existing courses etc. This module provides views for the users to view the details of
various courses. It is also used by the trainers to upload and manage tutorials and by the trainees to
view and download them.
Access Controller: etutes.in shall contains thousands of tutorials, articles, posts and replies. This
module is responsible for the authorization of these resources so that they can be accessed, viewed and
edited by the authorized users.
Payment Handler: This module is responsible for the management of online payments received for
online courses. It shall use API or services of some third party vendor for handling online payments.

47

CHAPTER - 4

System Testing and Implementation

48

4.1 TEST CASE DESIGN


4.1.1 WHITE BOX TESTING
This is a unit testing method, where a unit will be taken at a time and tested thoroughly at a
statement level to find the maximum possible errors.
I tested step wise every piece of code, taking care that every statement in the code is executed
at least once. The white box testing is also called Glass Box Testing.
I have generated a list of test cases, sample data, which is used to check all possible
combinations of execution paths through the code at every module level.
White-box test focuses on the program control structure. Test cases are derived to ensure that all
statement in the program control structure. Test cases are derived to ensure that all statement in the
program control structure. Test cases are derived to ensure that all statement in the program has been
executed at least once during testing and that all logical conditions have been exercised. Basis path
testing, a white box technique, makes use of program graphs (or graph matrices) to derive the set of
linearly independent test that will ensure coverage. Condition and data flow testing further exercising
degrees of complexity.

4.1.2 BLACK BOX TESTING


This testing method considers a module as a single unit and checks the unit at interface and
communication with other modules rather getting into details at statement level. Here the module will
be treated as a block that will take some input and generate output. Output for a given set of input
combinations are forwarded to other modules.
Black-box test are designed to uncover errors functional requirement without regard to the
internal workings of a program. Black-box testing techniques focus on the information domain of the
software, deriving test cases by partitioning the input and output domain of a program in manner that
provides through test coverage. The black-box test is used to demonstrate that software functions are
operational, that input is properly produced, and that the integrity of external information are
maintained. A black-box test examines some fundamental aspect of a system with little or no regard for
the integral logical structure of the software.
Graph based testing methods explore the relationship between and behavior of program objects.
Equivalence partitioning divides the input classes of data are likely to exercise specific software
function. Boundary values analysis probes the programs ability to handle data at the limits of
acceptability.

49

4.2 TEST EXECUTION


4.2.1 UNIT TESTING
Unit testing focuses verification effort on the smallest unit of software i.e. the module. Using
the detailed design and the process specifications, testing is done to uncover errors within the boundary
of the module. All modules must be successful in the unit test before the start of the integration testing
begins.
In this project each service can be thought of a module. There are so many modules like Login,
HR Department, Interviewer Section, etc. Each module has been tested by giving different sets of
inputs. When developing the module as well as finishing the development, the module works without
any error. The inputs are validated when accepting them from the user.

4.2.2 INTEGRATION TESTING


After unit testing, we have to perform integration testing. The goal here is to see if modules can
be integrated properly, the emphasis being on testing interfaces between modules. This testing activity
can be considered as testing the design and hence the emphasis on testing module interactions.
In this project the main system is formed by integrating all the modules. When integrating all
the modules I have checked whether the integration effects working of any of the services by giving
different combinations of inputs with which the two services run perfectly before Integration.

4.3 VALIDATION TESTING


User name Validation- Must Be Alphabets [a-z][A-Z], Must Not Be Empty.
Mail Id- Email Id Must is in the form of a@b.com, Must Not Be Empty.
Mobile No- Must Be Numeric, Must Not Be Empty.
Address- Must Not Be Empty.
State- Must Not Be Empty.
These above are the Validation Testing We Performed in the Application.
Validation is Quality assurance process of establishing evidence that provides a high degree of
assurance that a product, service, or system accomplishes its intended requirements. This often involves
acceptance of fitness for purpose with end users and other product stakeholders.
It is sometimes said that validation can be expressed by the query "Are you building the right
thing?" and verification by "Are you building it right?" "Building the right thing" refers back to the
user's needs, while "building it right" checks that the specifications be correctly implemented by the
system. In some contexts, it is required to have written requirements for both as well as formal
procedures or protocols for determining compliance.

50

4.4 SYSTEM TESTING


Here the System testing involved is the most widely used testing process consisting of five
stages as shown in the figure. In general, the sequence of testing activities is component testing,
integration testing, and then user testing. However, as defects are discovered at any one stage, they
require program modifications to correct them and this may require other stages in the testing process to
be repeated.

Unit testing

Module
testing
Sub-system
testing
System
testing
Acceptance
testing

(Component testing)

(Integration testing)

(User testing)

Testing is the process of detecting errors. Testing performs a very critical role for quality
assurance and for ensuring the reliability of the software. The results of testing are used later on during
maintenance also.
Testing is vital to the success of the system. System testing makes a logical assumption that if the parts
of the system are correct, the goal will be successfully achieved. In adequate testing or non-testing leads

51

to errors that may not appear until months or even years later (Remember the New York three day
power failure due to a misplaced Break statement).

This creates two problems:


1. The time lag between the cause and the appearance of the problem.
2. The time interval effect of the system errors on files and the records on the system.
A small error can conceivably explode into a much larger problem. Effective testing early in the process
translates directly into long term cost savings from a reduced number of errors.
Another reason for system testing is its utility as a user oriented vehicle before implementation. The
best program is worthless if it does not meet the user requirements.Thus in this phase we went to test
the code we wrote. We needed to know if the code compiled with the design or not? Whether the code
gave the desired outputs on given inputs? Whether it was ready to be installed on the users computer or
some more modifications were needed?
Through the web applications are characteristically different from there software counterparts but the
basic approach for testing these web applications is quite similar. These basic steps of testing have been
picked from software engineering practices.

System Testing
Validation Testing
Integration Testing

Validation testing

Code

Design
System
Security

System Engineering

52

CHAPTER - 5
FUTURE SCOPE & CONCLUSION

53

FUTURE SCOPE AND FURTHER ENHANCEMENT:


Any product despite of its meticulous design and features needs enhancement with time. etutes.in being
no exception needs active enhancement of features and functionality. Following features are proposed
to be implemented in future to make the product more feature rich.

Support of video streaming of classes.


Mechanism of receiving user feedback of provided information.
Facility of providing customized online courses.

CONCLUSION
Etutes.in is a fundamental part of the Software Engineering lifecycle process. Effective use of a
Etutes.in will lead to a more structured approach, resulting in a higher quality product while also
reducing development and support costs. Etutes.in most commonly used in the coding and testing
phases of the software development process. However, Etutes.in can in fact be used for many other
purposes such as general chatting with tutor of the company to sovle our problem where the focus is
given on the online aspect rather than to go and study. Even in software development, Etutes.in are
quite often not limited to simply join forum,create group but it is helpful to enlarge our skills

54

BIBLIOGRAPHY

1.
2.
3.
4.
5.

Java 2 Platform Enterprise Edition


(Platform and Component Specification)
The Complete Reference Java2
Pure JSP By
Professional java server programming
J2EE 2.3 Edition
6. E-Web Publishing & Scripting
7. Software Engineering
8. The Complete Reference (Oracle)

Shanon , Happer
Davidson
Herbtz Schildt
James Godwill
Subramanian Allamaraju
& Cedric Buest
MAHE
MAHE

INTERNET REFRENCES
1.
2.
3.

www.javaworld.com
www.sun.java.com
www.hscript.com

55

etutes.in
PROJECT REPORT SUBMITTED TO

RAJIV GANDHI PROUDYOGIKI VISHWA VIDALAYA


BHOPAL (M.P)
IN PARTIAL FULFILLMENT FOR THE AWARD OF DEGREE OF
MASTER OF COMPUTER APPLICATIONS (MCA)

2010
By

Aditya Kumar Richhariya


MCA 6th SEM, Roll no. 0926CA071003

Project guide

Mr. Neeraj Kumar


Undertaken At
Swarnim Infosoft Pvt. Ltd.
C-41, Sector-2, Near Nirulas Hotel , Noida (u.p.) 201301 Ph. 0120-4549462, 9891830644.

DEPARTMENT OF COMPUTER APPLICATIONS

Institute of Technology & Management-MCA, Gwalior (M.P.)

56

INSTITUTE OF TECHNOLOGY AND MANAGEMENTGWALIOR (M.P.)


Department of Computer Science & Engineering
Visit us at Website www.itmuniverse.org
(Approved by AICTE and affiliated to Rajiv Gandhi Proudyogiki Vishwavidyalaya Bhopal)

CERTIFICATE
This is to certify that Aditya Kumar Richhariya, student of MCA Final Semester, January
2010 June 2010 sessions of this institute has completed his final semester project entitled

etutes.in.
He has submitted a satisfactory project report for the award of degree of Master of Computer
Applications (MCA) of R.G.P.V. Bhopal.

Sanjay Jain
Associate Professor & Head,
Institute of Technology & Management-MCA, Gwalior

57

ACKNOWLEDGEMENT
With profound gratitude I praise the God for his abundant blessing.
I would like thank Mr. Sanjay Jain Head of Dept of M.C.A. for his guidance
and support.
At the outset we would like to express our deep sense of gratitude & thankful to
Head of Department of MCA for granting permission & providing the necessary
facilities for successful completion of the project.

etutes.in
I also thank to Mr. Neeraj Kumar for his valuable advice, suggestion and
inspiration in the developing the project.
I am grateful for the co-operation & valuable suggestions rendered
by all the staff members of the Swarnim Infosoft Pvt. Ltd. C-41, Sector-2, Near
Nirulas Hotel , Noida (u.p.).
It gives us immense pleasure to express our sincere and deep regards for our
respectable Project guide Mr. Neeraj Kumar, who gives us his able innovation
guidance & encouragement at every stage of the project.
We express deepest appreciation to all the staff of concerning department, who
really provided us the required information for this project.
We are thankful to all friends who always help us & encourage us to complete
our project.
Finally, Most Importantly I would like to give my heartfelt thanks to my Parents
from where I learnt the importance of hard work, sincerity, and for their love and
encouragement.

Aditya Richhariya
MCA Final Semester
Roll No -0926CA071003
58

PREFACE
Education and Training sector in India has witnessed a paradigm shift in recent past. Cities like
Noida, Pune, Banglore, Hyderabad, Chennai etc have emerged as the hub of high end
Education and Training. In these cities, apart from the big I.T. Companies such as HCL,
Wipro, IBM; a lot of smaller and medium training companies have mushroomed and are
providing training services in various domains. Tech Mentro is one of such training company
that provides training services in Noida. Currently, Tech Mentro uses conventional methods of
imparting training in classroom sessions and wants to use internet as a medium for providing
training.
Tech Mentro has two goals in mind:
To provide round the clock educational support to its existing students.
To use Internet as a medium for imparting training.
.

Number Description
Alternatives (If available)
1
PC with 10 GB hardNot Applicable
disk and 256 MB RAM
Number
1
2
3
4
5

Description
Windows 95/98/XP
Web Browser (IE6.0)
Java 5.0
Apache Tomcat 6.0
Oracle 10g

Alternatives (If available)


Linux
Google Chrome,Mozilla
WebLogic8.1
MySql

59

INDEX
Srno.
1.
2.

3.

4.

Topic
Chapter 1

6.

Remark

Company Profile
1
4

Chapter 2
Analysis of Proposed System and System
requirements
(i) Systems Analysis
(ii) Software Analysis
(a) Use Case Diagram
(b) Data Dictionary
(c) Data flow diagram
(d) Entity relationship diagram
(g) Process specification
Chapter 3 Logical and Physical design of system
(a) Data base design
(b) Layout
(d) Responsibility design

5
11
15
17
21
23
24
27
28
32
47

Chapter 4 System Testing and Implementation


(i)
Test case design
(a) Black Box Testing
(b) White Box Testing

48
49
49
49

(ii)

5.

Page no

Test execution
(a) Unit Testing
(b) Integration Testing
(c) Validation Testing
(d) System Testing

Chapter 5 Future Scope & Conclusion


(a) Future Scope
(b)Conclusion
Chapter 6 Bibliography

50
50
50
51
52
53
54
54
55

60

You might also like