Professional Documents
Culture Documents
Dynamic Intranet plays a typical role and acts like a link between Units of an
Organization usually a corporate company.
The main objective of Information In charge is to introduce computerized
system in a widely spread organization which can be used as a resource for private
network, in order to fulfill the basic needs of an Organization like Information
sharing, Communication, Document Viewing as well as sharing. This also helps to
provide an easy and fast interface for the employees of an Organization to perform
their tasks quickly and efficiently.
By providing this entirely private network the information regarding the
Organization can be fetched from any corner of the world in a highly secured manner.
Features
EXISTING SYSTEM
PROPOSED SYSTEM
Advantages:
Computerizing of an organization whose branches are situated at different locations
and connecting them through Intranet. This provides easy accessing of shared data and
provides communication channel between employees
Above all the overall system can at any time provide consistent and
reliable information authenticated upon its operations.
FEASIBILITY REPORT:
Preliminary investigation examine project feasibility, the likelihood the system
will be useful to the organization. The main objective of the feasibility study is to test the
Technical, Operational and Economical feasibility for adding new modules and
debugging old running system. All system is feasible if they are unlimited resources and
infinite time. There are aspects in the feasibility study portion of the preliminary
investigation:
Technical Feasibility
Operation Feasibility
Economical Feasibility
Technical Feasibility
The technical issue usually raised during the feasibility stage of the investigation includes
the following:
Do the proposed equipments have the technical capacity to hold the data required
to use the new system?
Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?
Are there technical guarantees of accuracy, reliability, ease of access and data
security?
the important issues raised are to test the operational feasibility of a project includes the
following:
Will the system be used and work properly if it is being developed and implemented?
Will there be any resistance from the user that will undermine the possible application
benefits?
NUMBER OF MODULES
Administrator
The activities that are carried out in this module are related to the maintenance of
master records such as Branch master, Department master and Employee master
for the entire organization. This module provides for performing addition,
deletion, updating and viewing the records in the master tables. This module also
provides viewing profiles of branches, departments and employees.
The master entries can only be accessed by the administrator of the organization.
The master entries provides facilities like view, add, delete, edit, update, cancel,
clear functionalities to the administrator to work on the master records which are
fetched from database. The respected changes will be reflected to the database
after saving.
Manager
The activities that are carried out in this module are related to document
viewing, document forwarding to employees, and document updating, document
deleting and conference. He receives documents created by employees. Manager
changes the document if there are any errors in the documents and forwards to
other employees. He can also view his profile to know the details. He can join the
conference to communicate with people in the Organization. He can also intimate
notifications while he was in conference.
Employee
The activities that are carried out in this module are related to document viewing,
document creation, document updating, document deleting and conference. He
can view his profile. He can create documents and submits it to manager for any
error rectification. He can view the documents forwarded by manager which are
created by other employees. He cannot delete or update documents which are
created by other employees. He can join conference to communicate with the staff
in Organization.
6) Enter User id, password and designation, if those are correct he can Login into his
own account.
7) After that he see his own Profile.
8) He can add the Documents.
9) He can see all the Documents List.
10) He can participated into online conferences also.
Non Functional Requirements
All the other requirements which do not form a part of the above specification are
categorized as Non-Functional Requirements.
A system may be required to present the user with a display of the number of records
in a database. This is a functional requirement.
How up-to-date this number needs to be is a non-functional requirement. If
the number needs to be updated in real time, the system architects must ensure that
the system is capable of updating the displayed record count within an acceptably
short interval of the number of records changing.
Sufficient network bandwidth may also be a non-functional requirement of a system.
Other examples:
Accessibility
Availability
Configuration Management
Documentation
version upgrade)
Maintainability
Operability
Performance
Portability
Reliability
Response time
Robustness
Security
Testability
Accessibility is a general term used to describe the degree to which a product, device,
service, or environment is accessible by as many people as possible. Accessibility can
be viewed as the "ability to access" and possible benefit of some system or entity.
Accessibility is often used to focus on people with disabilities and their right of
access to the system.
identifying documents or to the field of study devoted to the study of documents and
bibliographies
Maintenance is the ease with which a software product can be modified in order to:
correct defects
The idea that something is fit for purpose with respect to time;
The probability that a functional unit will perform its required function for a
(a) The instant at which an operator at a terminal enters a request for a response from
a computer and
(b) The instant at which the first character of the response is received at a terminal.
In a data system, the system response time is the interval between the receipt of the
end of transmission of an inquiry message and the beginning of the transmission of a
response message to the station originating the inquiry.
Robustness is the quality of being able to withstand stresses, pressures, or changes in
procedure or circumstance. A system or design may be said to be "robust" if it is
capable of coping well with variations (sometimes unpredictable variations) in its
operating environment with minimal damage, alteration or loss of functionality.
The concept of scalability applies to technology and business settings. Regardless of
the setting, the base concept is consistent - The ability for a business or technology to
accept increased volume without impacting the system.
In telecommunications and software engineering, scalability is a desirable property
of a system, a network, or a process, which indicates its ability to either handle
growing amounts of work in a graceful manner or to be readily enlarged.
Security is the degree of protection against danger, loss, and criminals.
Security has to be compared and contrasted with other related concepts: Safety,
continuity, reliability. The key difference between security and reliability is that
security must take into account the actions of people attempting to cause destruction.
Security as a state or condition is resistance to harm. From an objective perspective,
it is a structure's actual (conceptual and never fully knowable) degree of resistance to
harm.
Usability is a term used to denote the ease with which people can employ a particular
tool or other human-made object in order to achieve a particular goal. In humancomputer interaction and computer science, usability often refers to the elegance and
clarity with which the interaction with a computer program or a web site is designed.
All Key Participants in the system will be represented as actors and the
actions done by them will be represented as use cases.
A typical use case is nothing bug a systematic flow of series of events which
can be well described using sequence diagrams and each event can be
described diagrammatically by Activity as well as state chart diagrams.
So the entire system can be well described using OOAD model, hence this
model is chosen as SDLC model.
INPUT DESIGN
Input design is a part of overall system design. The main objective during the input
design is as given below:
INPUT STAGES:
The main input stages before the information gets stored in the database media:
Data recording
Data transcription
Data conversion
Data verification
Data control
Data transmission
Data validation
Data correction
OUTPUT DESIGN
Outputs from computer systems are required primarily to communicate the results of
processing to users. They are also used to provide a permanent copy of the results for
later consultation. The various types of outputs in general are:
Internal Outputs whose destination is with in organization and they are the
be viewed on the screen. Keeping in view these outputs, the format for the output is
taken from the outputs, which are currently being obtained after manual processing. The
standard printer is to be used as output media for hard copies.
ARCHITECTURAL FLOW
The current application is being developed by taking the 3-tier architecture as a
prototype. The 3-tier architecture is the most common approach used for web applications
today. In the typical example of this model, the web browser acts as the client, IIS
handles the business logic, and a separate tier MS-SQL Server handles database
functions.
Although the 3-tier approach increases scalability and introduces a separation of
business logic from the display and database layers, it does not truly separate the
application into specialized, functional layers. For prototype or simple web applications,
the 3-tier architecture may be sufficient. However, with complex demands placed on web
applications, a 3-tiered approach falls short in several key areas, including flexibility and
scalability. These shortcomings occur mainly because the business logic tier is still too
broad- it has too many functions grouped into one tier that could be separated out into a
finer grained model.
The proposed system can be designed perfectly with the three tier model, as all
layers are perfectly getting set as part of the project. In the future, while expanding the
system, in order to implement integration touch points and to provide enhanced user
interfaces, the n-tier architecture can be used. The following diagram will represent the
typical n-tier architecture.