Professional Documents
Culture Documents
On
“Cellucom”
Submitted in partial fulfillment of the requirement for the
Award of the degree of
Master of Computer Application
2006-2009
U.P.TECHNICALUNIVERSITY
LUCKNOW
website: www.rsmt.ac.in
Ph: +91-542-2281062
Fax: +91─542-2281062
________________________________________________
CERTIFICATE
This is to certify that Mr. Ravi Kumar Maurya, Roll No.0510814032 a
bonafide student of M.C.A.VI Semester of this institute has completed the
Degree Project titled “CELLUCOM” in Arrowline computer Institute of six
months duration in partial fulfillment of Master of Compurter Application
program of U.P.Technical University, Lucknow.
He has completed the assigned project well with in the time frame. He is
sincere, hardworking and his conduct during period is commendable.
Anurag Singh
(Manaager-HR)
This report has not been submitted previously for the award of any other
degrees or diplomas by me or any others to any institute, university to the best
of my knowledge.
1. INTRODUCTION
2. SRS DOCUMENT
4. DESIGN DOCUMENT
6. TESTING
8. LIMITATION
9. CONCLUSION
10. BIBLIOGRAPHY
INTRODUCTION
RSMT, Varanasi deputed a sixth months Industrial Project Training as a point
of curriculum of MCA, Computer. This college is affiliated to U.P. Technical
University, Lucknow. The student of M.C.A. are recorded to attached with
some industries in the sixth semester, where they are to be assigned some
project . The students are supposed to complete these projects and submit the
detailed project report to the concerned official in the industry.
He can create new users and allow or disconnect the users. Admin also
close the Cell session, so that all the users will be disconnected.
4. Log Charts: He can create log charts which contain information of how
Cellucom has taken place.
A client can perform the following set of task related to the requirement of
the user when the user doesn’t know about a new thing in the market then
they are delayed for that particular resource which he doesn’t know get the
detailed information about that resource through this Site they get the
detailed information for the resource.
SOFTWARE
REQUIRMENTS
SPECIFICATION
Software requirement specification (SRS) is the starting point of
the software development activity. Little importance was given to this
phase in the early days of software development. The emphasis was
first on coding and then shifted to design.
Development Environment:
• Web Server:
• Client Browsers:
MONITOR : VGA
makes your computer easier to use, with new and enhanced feature.
Improved Reliability
Integration
hours of fun.
Multitasking Concepts
concurrent applications from each other, making them believe that they
p ro c ess ar e c ap ab l e o f ex e c ut i ng o nl y a si ng l e st r e am o f
SDLC Objectives
Key Principles
System Requirements
Software Requirements
Software Requirements
Review & Validation
Preliminary Design
Review & Validation
Detailed Functional Specifications
Testing
Testing
Review & Validation
Maintenance
Since the world is growing for globalization, every organization wants to beat its
competitors and want to grow. Enterprise Resourceful Planning (ERP) is the need of
today’s organization. Survival on manual system is difficult so, that’s why organization
of the corporate world wants to computerize their departments. The modules should be
complete database driven and interactive that should provide the proper information
to p er fo r m the anal y si s.
Tasks, which are performed as analyst:
employees.
In or d er to r ed uc e t he t i me , t he r e is a ne e d fo r
w or k lo ad
b eg i ns. T hi s ac ti vi ty has t hr e e p ar t s:
Request clarification
Feasible Study
Request approval
Many r eq uests fro m e mp lo y e e s and use r s in t he
o rg ani z ati o n ar e no t c l e ar ly d e fi ne d . T he r e fo r e , it b e co me s
The feasibility study is carried out by a small group of people who are
that will be involved or affected by the project, and are skilled in the
However, those projects that are feasible and desirable should be put
projects are more urgent and schedule them accordingly. After a project
any existing project list. Later on, when the other projects have been
to that problem. System analysis gives us the target for the design and
techniques. Analysis involves interviewing the client and the user. Thee
people and the existing documents about the current mode of operation
that problem. System analysis gives us the target for the design and the
user. These people and the existing document about the current mode
components. Each building block forms a foundation for the next, with
tools sitting as the top of the heap. It is interesting to note that the
database, and to exhibit the same look and feel to the end user (the
integration of CASE tools. However, most CASE tools in use today have
been: constructed using all these building blocks. In fact some CASE
does
not directly communicate with other tools, is not tied into a project
Although this situation is not ideal, a CASE tool can be used quite
solution) tool. When individual tools can provide tools provide facilities
for data exchange, the integration level is improved slightly. Such tools
other tools that can read the format. In some cases, the builder of
complementary CASE tools work together to form a bridge between the
tools (e.g. an analysis and design tool that is coupled with a code
CASE tools vendor integrates a number of different tools and sells them
as a package.
vendors.
5.0 DESIGN
The most creative and challenging phase of the system life cycle is
system design. The term design describes a final system and the
and in what format. Samples for the output (and input) are also
presented.
The second step is input data and master files (data base) have to
points:
Design.
linkage.
identified.
Network Connections.
Program Specification
Function called.
Program Security.
Field Details.
Program Functions.
1
From Analysis
Detailed
Cost
Output System
Justification
Design Documentation
and
Candidate
design
Input
Design Design
submitted to
management
for approval
File
Design
Processing No
Design Design Abandon project
accepted
Yes
Test
Programs
S T E PS I N S Y S T E M D E S I G N
STEPS IN SYSTEM DESIGN
Databases and database technology are having a major impact on the growing use of
computers. It is fair to say that databases will play critical role: in almost all areas
where computers are used. Including business, engineering, medicine, law, education
and library, science to name a few. A database is a collection of related data. By data we
mean known facts that can be recorded and that have implicit meaning for example,
consider, the names, telephone numbers and addresses of the people you know. You
may have recorded this data in an indexed address, book, or you may have stored it on
A database represents some aspects of the real world. Sometimes called the mini-world
or the universe of discourse (UOD). Changes to the mini-world are reflected in the
database.
A database is designed, built and populated with data for the specific people. It has an
intended group of users and some preconceived applications in which the users are
interested.
A database can be of any size and of varying complexity. For example, the list of names
and addresses referred to earlier may consist of only a few hundred records, each with
simple structure. On the other hand the card catalog of a large library may contain half
a million cards stored under different categories by primary author’s last name, by
system.
system that facilities tile processed of defining, constructing and manipulating database
for various applications. Defining a database involves specifying the data types,
structures and constraints for the data to be stored in the database. Constructing the
database is the process of storing the data itself on some storage medium that is
the database to reflect changes in the mini-world, and generating reports form the data.
With the advent of the graphical operating system like windows, the world of imputing
Interfaces that use graphics came to known so graphical user interface (GUI). These
became very popular because the users could identify with images than words. Mention
tile word print to a person and it invokes the image of a printer. The primary
requirements for an interface are that it is easy to use. We must be able react intuitively
to an interface presented to us. This is possible if the interface presented is such that is
• Process
A process transforms data values. The lowest level processes are
pure functions without side effects. An entire data flow graphics high
level process.
Graphical representation:
Graphical Representation:
• Data flows
Graphical Representation:
• Actors
An actor is active object that drives the data flow graph by
producing or consuming values.
• Data store
• External Entity
Graphical Representation:
Graphical Representation:
Information Flow of Data for Testing
Software
Test Results Evaluatio
Configuration
n
Testing Error
Rate Debu
Data g
Expected
Test Results
Reliabilit
Configuration y
Model
Correction
Predicted Reliability
1. Economic Feasibility :
2. Technical Feasibility :
3. Operational Feasibility:
Economical feasibility
and don’t needs extra components to load the software. Hence the
report-a formal document detailing the nature and the scope of the
and the saving that are expressed from a candidate system and
hardware etc. and to what extent it can support the proposed addition.
candidate system requites special efforts to educate, sell, and train the
2.3.4 C h o i c e o f P l a t f o r m ?
Introduction to .net
ASP .NET are middle-ware technologies which are used in web based
projects because they use:-
BACK-END
SqlServer 2000
• Centralization of database.
• Client Server Technology.
• Security.
• Normalization of Data Base.
• Relationship.
• Transaction Processor.
• It gives some internet related features.
• Front End
• Back End
Front End remains on client side. Front end is made for end user
who uses our application. Basically in front end, our input-output forms
reside which takes the input from the client and gives output back to
client.
What is a database?
• RDBMS
• DBMS
• High Availability
• Controlled Availbility
• Manageable Security
To protect against unauthorized database aspects & users,
SqlServer 2000 provides failsafe security features to limit & monitor the
data area. The system makes it easy to manage even the most
completed designs for data assets.
• Portability
• Compatibility
• Improved Scalability
• Improved Security
Some existing data types have been enhanced & new data types
have been introduced.
N- Tier Architecture: -
In this kind of architecture, there is a middle-ware in between the
client and database. Middle ware checks the validity of the client i.e.
weather the client can access the database or not. Hence there is
security in it as well as middle-ware allows multiple clients access.
What is Middle-Ware?
Database Management
Visual Basic allows we to manage databases while directly connected to them at
design time. Depending on the feature of our database and our access
privileges, we can use Visual Basic tools to add, remove, or modify.
Databases
Tables or Columns
Views and synonyms
Relation between Tables
Indexes
Constraints and triggers
Stored procedures, functions, and packages
Queries that return sets of data, or queries that modify a database by
adding, updating, copying, or deleting records.
Data View Window: A window that displays the entire database objects
that we can currently Work with. From the Data View window, we can edit
objects such as tables, views, stored procedures, and triggers.
A window for creating stored procedure that includes a link to the Query Designer
to construct SQL statements.
Script Editor: A window for creating SQL scripts, which are SQL
statements that are independent of any particular database. We can put SQL
scripts under source control as well.
The .NET Framework has two main components: the common language runtime and
the .NET Framework class library. The common language runtime is the foundation of
the .NET Framework. You can think of the runtime as an agent that manages code at
execution time, providing core services such as memory management, thread
management, and remoting, while also enforcing strict type safety and other forms of
code accuracy that ensure security and robustness. In fact, the concept of code
management is a fundamental principle of the runtime. Code that targets the runtime is
known as managed code, while code that does not target the runtime is known as
unmanaged code. The class library, the other main component of the .NET Framework,
is a comprehensive, object-oriented collection of reusable types that you can use to
develop applications ranging from traditional command-line or graphical user interface
(GUI) applications to applications based on the latest innovations provided by
ASP.NET, such as Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load the common
language runtime into their processes and initiate the execution of managed code,
thereby creating a software environment that can exploit both managed and
unmanaged features. The .NET Framework not only provides several runtime hosts,
but also supports the development of third-party runtime hosts.
Internet Explorer is an example of an unmanaged application that hosts the runtime (in
the form of a MIME type extension). Using Internet Explorer to host the runtime
enables you to embed managed components or Windows Forms controls in HTML
documents. Hosting the runtime in this way makes managed mobile code (similar to
Microsoft® ActiveX® controls) possible, but with significant improvements that only
managed code can offer, such as semi-trusted execution and secure isolated file storage.
The following illustration shows the relationship of the common language runtime and
the class library to your applications and to the overall system. The illustration also
shows how managed code operates within a larger architecture.
The following sections describe the main components and features of the .NET
Framework in greater detail.
The common language runtime manages memory, thread execution, code execution,
code safety verification, compilation, and other system services. These features are
intrinsic to the managed code that runs on the common language runtime.
With regards to security, managed components are awarded varying degrees of trust,
depending on a number of factors that include their origin (such as the Internet,
enterprise network, or local computer). This means that a managed component might
or might not be able to perform file-access operations, registry-access operations, or
other sensitive functions, even if it is being used in the same active application.
The runtime enforces code access security. For example, users can trust that an
executable embedded in a Web page can play an animation on screen or sing a song,
but cannot access their personal data, file system, or network. The security features of
the runtime thus enable legitimate Internet-deployed software to be exceptionally
feature rich.
The runtime also enforces code robustness by implementing a strict type- and code-
verification infrastructure called the common type system (CTS). The CTS ensures that
all managed code is self-describing. The various Microsoft and third-party language
compilers generate managed code that conforms to the CTS. This means that managed
code can consume other managed types and instances, while strictly enforcing type
fidelity and type safety.
The runtime also accelerates developer productivity. For example, programmers can
write applications in their development language of choice, yet take full advantage of
the runtime, the class library, and components written in other languages by other
developers. Any compiler vendor who chooses to target the runtime can do so.
Language compilers that target the .NET Framework make the features of the .NET
Framework available to existing code written in that language, greatly easing the
migration process for existing applications.
While the runtime is designed for the software of the future, it also supports software of
today and yesterday. Interoperability between managed and unmanaged code enables
developers to continue to use necessary COM components and DLLs.
The .NET Framework class library is a collection of reusable types that tightly integrate
with the common language runtime. The class library is object oriented, providing
types from which your own managed code can derive functionality. This not only makes
the .NET Framework types easy to use, but also reduces the time associated with learning
new features of the .NET Framework. In addition, third-party components can integrate
seamlessly with classes in the .NET Framework.
• Console applications.
• Scripted or hosted applications.
Server-side applications in the managed world are implemented through runtime hosts.
Unmanaged applications host the common language runtime, which allows your custom
managed code to control the behavior of the server. This model provides you with all
the features of the common language runtime and class library while gaining the
performance and scalability of the host server.
The following illustration shows a basic network schema with managed code running in
different server environments. Servers such as IIS and SQL Server can perform
standard operations while your application logic executes through the managed code.
ASP.NET is the hosting environment that enables developers to use the .NET
Framework to target Web-based applications. However, ASP.NET is more than just a
runtime host; it is a complete architecture for developing Web sites and Internet-
distributed objects using managed code. Both Web Forms and XML Web services use
IIS and ASP.NET as the publishing mechanism for applications, and both have a
collection of supporting classes in the .NET Framework.
INTRODUCTION OF Sql Server 2000
Microsoft the No. one company in the software that produces the most
widely used, front end and Server based Multi user RDBMS. The SQL
Server is a program installed on the Server’s hard disk driver. This program
must be loaded in RAM so that it can process user requests.
The SQL Server Server product is either called SQL Server Professional
Or SQL Server Enterprise.
Once the Sql Server engine is loaded into the server’s memory, users would
have to log into the engine to get work done. Microsoft has several client-based
tools that facilitate this. The client tool most commonly used for Commercial
Application Development is Visual basic.
What is SQL Used for:
Using SQL one can create and maintain data manipulation objects such
as table, views, sequence etc. These data manipulation objects will be
created and stored on the server's hard disk drive, in a table space, to
which the user has been assigned.
Once these data manipulation objects are created, they are used
extensively in commercial applications.
The SQL sentences that are used to create these objects are called DDL's or
Data Definition Language. The SQL sentences used to manipulate data within
these objects are called DML's or Data Manipulation Language. The SQL
sentences, which are used to control the behavior of these objects, are called
DCL's or Data Control Language.
Hence, once access to the SQL*Plus tool is available and SQL syntax is
known, the creation of data storage and the manipulation of data within
the storage system, required by commercial applications, is possible.
Introduction
1) Logical Design
2) Physical Design
A data flow diagram shows the logical flow of the system. For a
system it describes the input (source), output (destination), database
(data stores) and procedures (data flows) all in a format that meets the
user’s requirement. When analysis prepare the logical system design,
they specify the user needs at a level of detail that virtually determines
the information flow into an out of the system and the required data
resources. The logical design also specifies input forms and screen
layouts.
• When and how often output and their format is needed. While
designing output for project based Attendance Compilation
System, the following aspects of outputs designing were
taken into consideration.
These were a few major designing issues, which were taken into
consideration, while deciding the output specifications for the system.
As direct beneficiary of reports is the user community, they were
consulted constantly at every level. Formats and screen design for
various reports were identified, taking into account the user
requirements. Before finalising these were given to users for any
improvement and suggestions. End users issues taken into
consideration were Readability, Relevance and Acceptability.
• Tabular contents
• Graphic format
• Using Icons
Output Definition:
Types of outputs
Data items
The name given to each data item should be recorded and its
characteristics described clearly in a standard form:
• Number of characters
The input design is the link that ties the information system into the
user’s world. Input specifications describe the manner in which data
enters the system for processing. Input design features can ensure the
reliability of the system and produce results from accurate data, or they
can result in the production of erroneous information.
• Avoid delay
a) System Design :
It aims to identify the modules that should be in the system, the
specification of these modules and how they interact with each other to
produce the desired result.
b) Detailed Design :
The internal goal of each of the modules specified in the system design
is decided
DATABASE DESIGN
CODE DESIGN
• Uniqueness
• Versatility
• Stability
• Simplicity
• Consciousness
PROCESS DESIGN
Introduction
• Training Personnel
• Conversion Procedures
TRAINING
CONVERSION:
In thi s ap p r o ac h, t he ol d sy st e m and t he ne w sy st e m ar e
used si mul taneo usl y fo r so me p er io d o f t i me so t hat t he
p er fo r manc e of the ne w sy st e m c an be mo ni t or e d and
c o mp ar ed wi th that o f t he o ld sy st e m. Al so i n c ase o f fai l ur e
o f the new sy stem, the use r c an fal l b ac k o n t he ol d sy st e m.
T he ri sk o f thi s ap p ro ac h i s t hat t he use r may ne ve r w ant to
shi ft to new sy stem.
In t hi s me t ho d , t he use o f t he ol d sy st e m
c eases as soo n as the ne w sy st e m i s i mp l e me nt e d and bo ug ht
i n to p al ac e. T he ol d sy st e m b e c o me s re d und ant fro m t he d ay
o f i mp l ementati o n o f t he ne w sy st e m. T he r e is t he hi g h r i sk
i nvo l ved i n thi s ap p r o ac h i f t he ne w sy st e m is no t t e st e d
r ig o ro usl y . T hi s i s b ec ause o f t he fac t t hat i f t he ne w sy st e m
fai l s, then ther e w il l no t b e any t hi ng to fal l b ac k up o n. T he
ad va ntag e o f thi s ap p ro ac h i s t hat b o t h t he sy st e ms ne e d no t
b e used si mul taneo usl y .
Implementation Tools
The project was implemented using ASP.NET server pages , HTML ,
ASP.NET beans.The implementation work was carried out in Windows
XP/2000 server platform.
• Main emphasis while coding was on style so that the end result
was an optimized code.
Coding Style
The structured programming method was used in all the modules the
project.It incorporated the following features
Naming Convention:-
• As the project size grows,so does the com[plexity of recognizing
the purpose of the variables.Thus the variables were given
meaningful names,whihch would hellp in understanding the
context and the purposse of the variable.
• The function names are also given meaningful names that can be
easily understood by the user.
Indentation
• Blank line is also left between each function definition to make the
code look neat.
MAINTENANCE
• Corrective
• Adaptive
• Perfective.
C or r ec ti ve mai nt e n anc e me ans r e p ai ri ng p ro c e ssi ng or
p er fo r manc e fai l ur es or mak i ng c hang e s b e c ause of
p r evi o usly unc or r ec ted pr o bl e ms or fal se assump t i o ns.
p ro p er ly and i n t i me t o k e e p t he sy st e m i n t une w i t h
user sp ec i fi c atio ns.
T he outc o me sho ul d b e mo r e r e li ab l e so ft w ar e , a
r ed uc ed mai ntenanc e b ac k lo g , and hi g he r sat i sf ac t i o n and
mo r al e amo ng the mai nt e na nc e st aff.
In P RO J EC T , c ar e has b e e n t ak e n to w ar d s
mai nten anc e; Loo p Ho l e s c an b e er ad i c at e d fr o m t he sy st e m
fr o m ti me to ti me ac co r di ng to c hang i ng r e q uir e me nt s wi t h
l esser co st.
EVALUATION
The evaluation phase ranks vendor proposals and determines the one
best suited, Evaluation of the system is performed to identify its
strengths and weaknesses. The actual evaluation can occur along any of
the following dimensions:
CARRERS Form
DATABASE
Introducing .NET
WROX publications.
Websites:
http://www.vbnetdesign.com
http://www.google.com
http://www.microsoft.com/vb.net
http://www.databasejournal.com
GLOSSARY
individual study.
Cost/Benefit Analysis The purpose of the comparing projected savings and benefits to
changed is justified.
the system.
destruction.
Data structure A logically related set of data that can be decomposed into
as a unit.
File Collection of related records organized for a particular purpose also called a dataset.
Flow Chart A graphic picture of the logical steps and sequence involved in
a procedure or a program.
Gantt Chart A static system model used for scheduling; portrays output
system.
system or procedure.
PERT (Project Evaluation & Review Technique) A flow system model used to manipulate
unit.
Source Code A Procedure or format that allow enhancements on a software
package.
SDLC (System Development Life Cycle) A structured sequence of phases for implementing
an information system
System Testing. Testing the whole system by the user after major programs and