project report on cellular project
Post on 07-Apr-2018
240 Views
Preview:
TRANSCRIPT
-
8/6/2019 Project Report on Cellular Project
1/88
Project ReportOn
Cellucom Submitted in partial fulfillment of the requirement for the
Award of the degree of
Master of Computer Application2006-2009
U.P.TECHNICALUNIVERSITY LUCKNOW
GUIDED BY: Submitted By: Mrs. Shailesh Pratap Singh Ravi Kumar Maurya Reader M.C.A R.S.M.T 0510814032(Varanasi)
Rajarshi School of Management & Technology(U.P.AUTONOMOUS COLLEGE)
VARANASI-221002
-
8/6/2019 Project Report on Cellular Project
2/88
Project ReportOn
Cellucom Submitted in partial fulfillment of the requirement for the
Award of the degree of
Master of Computer Application2006-2009
U.P.TECHNICALUNIVERSITY LUCKNOW
GUIDED BY: Submitted By: Mrs. Shailesh Pratap Singh Ravi Kumar Maurya Reader M.C.A R.S.M.T 0510814032(Varanasi)
Rajarshi School of Management & Technology
(U.P.AUTONOMOUS COLLEGE)VARANASI-221002 ________________________________________________
-
8/6/2019 Project Report on Cellular Project
3/88
Rajarshi School of Management & Technology(Udai Pratap Autonomous College Campus Varanasi)
Varanasi-221002
website: www.rsmt.ac.inPh: +91-542-2281062
Fax: +91542-2281062 ________________________________________________
CERTIFICATE
This is to certify that Mr. Ravi Kumar Maurya, Roll No.0510814032 a bonafide student of M.C.A.VI Semester of this institute has completed theDegree Project titled CELLUCOM in Arrowline computer Institute of sixmonths duration in partial fulfillment of Master of Compurter Application
program of U.P.Technical University, Lucknow.
(MCA Co-ordinator) (Incharge RSMT)Mrs: Shailesh Pratap Singh Mr. Aman GuptaReader MCA R.S.M.T(VNS) Reader MCA R.S.M.T(VNS)
Date: Date:
-
8/6/2019 Project Report on Cellular Project
4/88
CERTIFICATE
This is to certify that the following student with the nameMr. Ravi Kumar Maurya bearing the H.T.No:0510814032 from RajarshiSchool of Management &Technology, Varanasi has successfully completedthe project titled Cellucom as part of the courseCurriculum in our organization.
He has done the project using ASP.NET 2.0 with C# andSQL Server-2005 during the period 15-Jan-2009 to 22-Jun-2009, under theGuidance and supervision of Mr. Shailesh Pratap Singh, Project Leader,Arrow Line Computer Center, Varanasi.
He has completed the assigned project well with in the time frame. He issincere, hardworking and his conduct during period is commendable.
We wish him all the best in this endeavor.
For Arrow Line Computer Center
Anurag Singh(Manaager-HR)
Flat No. 205, ArrowLine Computer Center, Shivpur,Varanasi-221002
: +91-542-2283025 Date: 15 th Jan 2009
Varanasi.
-
8/6/2019 Project Report on Cellular Project
5/88
Declaration
I here by solemnly declare that this project report entitled Cellucomis bonafied work done by me during the Final year, MCA, and submitted tothe Department of Computer Science , RAJARASHI SHCHOOL OF
MANAGEMENT & TECHNOLOGY (affiliated to U.P. Technical University Lucknow).
This report has not been submitted previously for the award of any other
degrees or diplomas by me or any others to any institute, university to the best of my knowledge .
Ravi Kumar Maurya
-
8/6/2019 Project Report on Cellular Project
6/88
Acknowledgement
In my first major attempt to put my feet firmly on the world of practicalcomputing, I take this opportunity to express my gratitude to all of them whohave helped me out throughout this endeavor.
I am bound to express my gratitude to our project co-ordinator Mrs.Shailesh Pratap Singh for her constant encouragement and guidancethroughout my project.
I am thankful to all the staff of Department of Computer Applications for
their cordial support during my project.
I thank my parents and my friends for their support and constantencouragement during my entire work.
To one and all, I owe acknowledgements, who have directly or indirectlyaided me in completing project.
Ravi Kumar Maurya
-
8/6/2019 Project Report on Cellular Project
7/88
Contents
1. INTRODUCTION
2. SRS DOCUMENT
3. DESIGN PRINCIPLES & EXPLANATION
4. DESIGN DOCUMENT
4.1 SYSTEM DESIGN
5. FORMS & REPORTS
5.1 I/O SPECIMEN
5.2 I/O SAMPLES
6. TESTING
6.1 TEST REPORT & ANALYSIS
7. IMPLEMENTATION & USER MANUALS
8. LIMITATION
9. CONCLUSION
10. BIBLIOGRAPHY
-
8/6/2019 Project Report on Cellular Project
8/88
INTRODUCTION
-
8/6/2019 Project Report on Cellular Project
9/88
RSMT, Varanasi deputed a sixth months Industrial Project Training as a pointof curriculum of MCA, Computer. This college is affiliated to U.P. TechnicalUniversity, Lucknow. The student of M.C.A. are recorded to attached withsome industries in the sixth semester, where they are to be assigned some
project . The students are supposed to complete these projects and submit thedetailed project report to the concerned official in the industry.
During my stay at Varanasi, I worked on the project Cellucom.This is S/W being constructed whose focus is on Cell marketing by internet Is now a-daysvery useful to Mobile, Laptop,Palmtop, are also have many brand and stylesdeign various types of qualities which is shown by internet. Sometimes a new
brand is come in the market which is not know by any person if he search thewebsite www.Cellucom.com then the many options are present here one click
button all the information of cell are broadly described here.
Cellucom is a graphical application that makes choice a pleasant experience.
Cellucom has two types of users: 1. Admin and 2. Client.
Admin can do the following activities:1. User Management: He makes some initial startup tasks while starting the
Cellcom server.
He can create new users and allow or disconnect the users. Admin alsoclose the Cell session, so that all the users will be disconnected.
2. Administrative Client: Admin can also involve in Cellucom as a clientfrom his admin console using this option.
3. Shut Down: He can shut down the Cellucom server.
4. Log Charts: He can create log charts which contain information of howCellucom has taken place.
Client can perform the following tasks:
A client can perform the following set of task related to the requirement of the user when the user doesnt know about a new thing in the market thenthey are delayed for that particular resource which he doesnt know get thedetailed information about that resource through this Site they get thedetailed information for the resource.
http://www.cellucom.com/http://www.cellucom.com/ -
8/6/2019 Project Report on Cellular Project
10/88
SOFTWARE
REQUIRMENTS
SPECIFICATION
-
8/6/2019 Project Report on Cellular Project
11/88
Software requirement specification (SRS) is the starting point of
the software development activity. Little importance was given to this
phase in the early days of software development. The emphasis was
first on coding and then shifted to design.
As systems grew more complex, it became evident that the goals
of the entire system cannot be easily comprehended. Hence the need for
the requirement analysis phase arose. Now, for large software systems,
requirements analysis is perhaps the most difficult activity and also the
most error prone.
Some of the difficulty is due to the scope of this phase. Thesoftware project is initiated by the clients needs. In the beginning
these needs are in the minds of various people in the client
organization. The requirement analyst has to identify the requirements
by talking to these people and understanding their needs. In situations
where the software is to automate a currently manual process, most of
the needs can be understood by observing the current practice.
The SRS is a means of translating the ideas in the minds of the
clients (the input), into formal document (the output of the
requirements phase). Thus, the output of the phase is a set of formally
specified requirements, which hopefully are complete and consistent,
while the input has none of these properties.
-
8/6/2019 Project Report on Cellular Project
12/88
Software and Hardware Tools
Development Environment:
Operating System: Windows XP
The system will be built on windows compatible environment.
The application will be web based developed using ASP.NET
technology.
Web Server:
IIS WEB Server to serve as ASP.NET engine.The systemrequires.
Server side Application Software: ASP.NET Server Pages
(ASP.NET)
Client Side Application Software: Java Script, HTML
Data Base: SqlServer 2000
The system requires SqlServer 2000 as a database; however
the system will be SQL CLIENT complaint to work on any
standard database.
Client Browsers:
Internet Explorer 6.0 or Netscape Navigator 4.7
The system requires Internet Explorer or Netscape Navigator
browser for client side.
-
8/6/2019 Project Report on Cellular Project
13/88
Hardware & Software Requirements
HARDWARE : Pentium III/IV & Above, 128 MB RAM.HARDWARE : Pentium III/IV & Above, 128 MB RAM.
SOFTWARE : c#.net 2.0 frame work,Asp.NetSOFTWARE : c#.net 2.0 frame work,Asp.Net
RDBMSRDBMS :: Sql Server 2000,Sql Server2005Sql Server 2000,Sql Server2005
OPERATING SYSTEM : Windows NT or 2000 or LaterOPERATING SYSTEM : Windows NT or 2000 or Later
BACKUP MEDIA : Hard disk, Floppy, CDBACKUP MEDIA : Hard disk, Floppy, CD
MONITOR MONITOR : VGA: VGA
Windows 2000XP/Windows 2000 NT Operating System
The main responsibility of an operating system is to manage computers
resources. All activities in the system scheduling application programs,
waiting files to disk, sending data across a network and so on should
function as seamlessly and transparently as possible. Windows 98
makes your computer easier to use, with new and enhanced feature.
Improved Reliability
Window 98 improves computer reliability by introducing new wizards,
utilities and resources that keep your system running smoothly.
Faster Operating System
-
8/6/2019 Project Report on Cellular Project
14/88
Windows 98 includes tools that help your computer run faster than Windows 95 with
out adding new hardware. Window 98 includes a suite of programs designed to
optimized youre web.
IntegrationWindows 98 Explorer and Internet Explorer integrate local and Web-
based resources in a single viewer computers efficiency, especially
when used together. Window 98 makes your computer more
entertaining by new hardware. These enhancements provide you with
hours of fun.
Multitasking Concepts
Multitasking in general refers to an operating systems capability to load
and execute several applications concurrently. A multitasking operating
system is consider a robust and reliable one if it successful shields
concurrent applications from each other, making them believe that they
system also shields application from others bugs.
To a l a rg e e x t e n t , m u l t i t a s k i n g o p e r a t i n g s y s t e m r e l a y
on system hardware to implement these capabi l i t ies . Another
i m po r ta n t a s pe c t o f m u lt i ta s ki n g i s p r oc e ss s c he d ul i ng . A s
p ro ce ss a r e c ap ab le o f e xe cu ti ng o nl y a s in gl e s tr e am o f
ins t ruct ion at any given, mult i tasking would obviously not be
p o ss i bl e w i th o ut t h e t e ch n iq u e o f t h e c o nt e xt s w it c hi n g. A
c o nt ex t s wi tc h, t r ig ge re d b y a s pe ci fi c e ve nt ( su ch a s a n
i nt er ru pt f ro m a t im er c ir cui t o r a c all by t he r un ni ng
a pp li ca ti on t o a s pe ci fi c f un ct io n) , e ss en ti al ly c o ns is t o f
s av in g t he p ro ce ss or c on te x t ( i ns tr u ct io n p oi nt er , s ta ck
-
8/6/2019 Project Report on Cellular Project
15/88
p oi nt er , r eg is te r c on te nt s) o f o ne r un ni ng p ro gr am a nd
loading that of another.
In a cooperative multitasking environment, the operating system relies
explicitly on applications to yield control by regularly calling a specific
set of operating system functions. Context switching takes place at
well-defined point during the execution of a program.
In a preemptive multitasking environment, the operating system caninterrupt the execution of an application at any time. This usually
happens when the operating system responds to hardware events, such
as a interrupt from a timer circuit. An applications flow of execution
can be interrupted at any point, not only at predefined spots. This
realizes the complexity of the system.
-
8/6/2019 Project Report on Cellular Project
16/88
System Development Life Cycle
1.2.1 Initiation Phase
The initiation of a system (or project) begins when a business
need or opportunity is identified. A Project Manager should be
appointed to manage the project. This business need is documented in a
Concept Proposal. After the Concept Proposal is approved, the System
Concept Development Phase begins.
1.2.2 System Concept Development
Phase
Once a business need is approved, the approaches for
accomplishing the concept are reviewed for feasibility and
appropriateness. The Systems Boundary Document identifies the scope
of the system and requires Senior Official approval and funding before
beginning the Planning Phase.
1.2.3 Planning Phase
The concept is further developed to describe how the business will
operate once the approved system is implemented, and to assess how
the system will impact employee and customer privacy. To ensure the
products and /or services provide the required capability on-time and
within budget, project resources, activities, schedules, tools, and
reviews are defined. Additionally, security certification and
accreditation activities begin with the identification of system security
requirements and the completion of a high level vulnerability
assessment.
-
8/6/2019 Project Report on Cellular Project
17/88
1.2.4 Requirements Analysis Phase
Functional user requirements are formally defined and delineate the
requirements in terms of data, system performance, security, and
maintainability requirements for the system. All requirements are
defined to a level of detail sufficient for systems design to proceed. All
requirements need to be measurable and testable and relate to the
business need or opportunity identified in the Initiation Phase.
1.2.5 Design Phase
The physical characteristics of the system are designed during this
phase. The operating environment is established, major subsystems and
their inputs and outputs are defined, and processes are allocated to
resources. Everything requiring user input or approval must be
documented and reviewed by the user. The physical characteristics of
the system are specified and a detailed design is prepared. Subsystems
identified during design are used to create a detailed structure of the
system. Each subsystem is partitioned into one or more design units or
modules. Detailed logic specifications are prepared for each software
module.
1.2.6 Development Phase
The detailed specifications produced during the design phase are
translated into hardware, communications, and executable software.
Software shall be unit tested, integrated, and retested in a systematic
manner. Hardware is assembled and tested.
-
8/6/2019 Project Report on Cellular Project
18/88
1.2.7 Integration and Test Phase
The various components of the system are integrated and
systematically tested. The user tests the system to ensure that the
functional requirements, as defined in the functional requirementsdocument, are satisfied by the developed or modified system. Prior to
installing and operating the system in a production environment, the
system must undergo certification and accreditation activities.
1.2.8 Implementation Phase
The system or system modifications are installed and made operational
in a production environment. The phase is initiated after the system has
been tested and accepted by the user. This phase continues until the
system is operating in production in accordance with the defined user
requirements.
1.2.9 Operations and Maintenance Phase
The system operation is ongoing. The system is monitored for continued
performance in accordance with user requirements, and needed system
modifications are incorporated. The operational system is periodically
assessed through In-Process Reviews to determine how the system can
be made more efficient and effective. Operations continue as long as the
system can be effectively adapted to respond to an organizations
needs. When modifications or changes are identified as necessary, the
system may reenter the planning phase.
1.2.10 Disposition Phase
The disposition activities ensure the orderly termination of the system
and preserve the vital information about the system so that some or all
of the
-
8/6/2019 Project Report on Cellular Project
19/88
information may be reactivated in the future if necessary. Particular
emphasis is given to proper preservation of the data processed by the
system, so that the data is effectively migrated to another system or
archived in accordance with applicable records management regulations
and policies, for potential future access.
SDLC Objectives
This guide was developed to disseminate proven practices to system
developers, project managers, program/account analysts and system
owners/users throughout the DOJ. The specific objectives expected
include the following:
To reduce the risk of project failure To consider system and data requirements throughout the entire
life of the system
To identify technical and management issues early
To disclose all life cycle costs to guide business decisions
To foster realistic expectations of what the systems will and will
not provide
To provide information to better balance programmatic, technical,
management, and cost aspects of proposed system development
or modification
To encourage periodic evaluations to identify systems that are no
longer effective
To measure progress and status for effective corrective action
To support effective resource management and budget planning
To consider meeting current and future business requirements
Key Principles
This guidance document refines traditional information system life cycle
management approaches to reflect the principles outlined in the
following subsections. These are the foundations for life cycle
management.
-
8/6/2019 Project Report on Cellular Project
20/88
Life Cycle Management Should be used to Ensure a Structured Approach
to Information Systems Development, Maintenance, and Operation
This SDLC describes an overall structured approach to informationmanagement. Primary emphasis is placed on the information and
systems decisions to be made and the proper timing of decisions. The
manual provides a flexible framework for approaching a variety of
systems projects. The framework enables system developers, project
managers, program/account analysts, and system owners/users to
combine activities, processes, and products, as appropriate, and to
select the tools and methodologies best suited to the unique needs of
each project.
Support the use of an Integrated Product Team
The establishment of an Integrated Product Team (IPT) can aid in the
success of a project. An IPT is a multidisciplinary group of people who
support the Project Manager in the planning, execution, delivery and
implementation of life cycle decisions for the project. The IPT is
composed of qualified empowered individuals from all appropriate
functional disciplines that have a stake in the success of the project.
Working together in a proactive, open communication, team oriented
environment can aid in building a successful project and providing
decision makers with the necessary information to make the right
decisions at the right time.
Each System Project must have a Program Sponsor
To help ensure effective planning, management, and commitment to
information systems, each project must have a clearly identified
program sponsor. The program sponsor serves in a leadership role,
providing guidance to the project team and securing, from senior
management, the required reviews and approvals at specific points in
the life cycle. An approval from senior management is required after the
-
8/6/2019 Project Report on Cellular Project
21/88
completion of the first seven of the SDLC phases, annually during
Operations and Maintenance Phase and six-months after the Disposition
Phase. Senior management approval authority may be varied based on
dollar value, visibility level, congressional interests or a combination of
these.
The program sponsor is responsible for identifying who will be
responsible for formally accepting the delivered system at the end of
the Implementation Phase.
A Single Project Manager must be Selected for Each System
Project
The Project Manager has responsibility for the success of theproject and works through a project team and other supporting
organization structures, such as working groups or user groups, to
accomplish the objectives of the project. Regardless of organizational
affiliation, the Project Manager is accountable and responsible for
ensuring that project activities and decisions consider the needs of all
organizations that will be affected by the system. The Project Manager
develops a project charter to define and clearly identify the lines of
authority between and within the agencys executive management,
program sponsor, (user/customer), and developer for purposes of
management and oversight.
A Comprehensive Project Management Plan is Required for Each System
Project
The project management plan is a pivotal element in the
successful solution of an information management requirement. The
project management plan must describe how each life cycle phase will
be accomplished to suit the specific characteristics of the project. The
project management plan is a vehicle for documenting the project
scope, tasks, schedule, allocated resources, and interrelationships with
-
8/6/2019 Project Report on Cellular Project
22/88
other projects. The plan is used to provide direction to the many
activities of the life cycle and must be refined and expanded throughout
the life cycle.
Specific Individuals Must be Assigned to Perform Key Roles Throughout
the Life Cycle
Certain roles are considered vital to a successful system
project and at least one individual must be designated as
responsible for each key role. Assignments may be made on a
full- or part-time basis as appropriate. Key roles include
program/functional management, quality assurance, security,
telecommunications management, data administration, database
administration, logistics, financial, systems engineering, test and
evaluation, contracts management, and configuration
management. For most projects, more than one individual should
represent the actual or potential users of the system (that is,
program staff) and should be designated by the Program
Manager of the program and organization
-
8/6/2019 Project Report on Cellular Project
23/88
1.0 SYSTEM ANALYSIS
System Requirements
Software Requirements
Review & Validation
Review & Validation
Review & Validation
Review & Validation
Review & Val idation
Review & Validation
Review & Validation
Preliminary Design
Detailed Design
Detailed Functional Specifications
User Requirement Specifications
Code and Debugging
Testing
Maintenance
Testing
Maintenance
Software Requirements
Global Implementation Specifications &
Detailed Implementation Specifications
Coding & Debugging
Process Engineering of Application Software (Software Development Lifecycle)
-
8/6/2019 Project Report on Cellular Project
24/88
1.1 Identification of the need
Since the world is growing for globalization, every organization wants to beat its
competitors and want to grow. Enterprise Resourceful Planning (ERP) is the need of
todays organization. Survival on manual system is difficult so, thats why organization
of the corporate world wants to computerize their departments. The modules should be
complete database driven and interactive that should provide the proper information
about the Placement and Training Organization.
Success of a system depends lar gely on how accurate ly a
p ro bl em i s d ef in ed , t ho ro ug hl y i nv es ti ga te d a nd p ro pe rl y
c a r r i e d o u t t o t h e c h o i c e o f s o l u t i o n . A n a l y s i s i s a p h a s e i n
w h ic h t h e r e qu i re m en t s f o r t h e n e w s y st e m a r e i d en t if i ed .
Sys tem ana lysi s i s a de ta i l ed s tudy of the var ious opera t ions
p er f or me d b y a s ys te m a nd t he ir r el at io ns hi p w it hi n a nd
outs ide of the system. The quest ion is : what must be done to
s o lv e t he p ro bl em ? O ne a sp ec t o f a na ly si s i s d ef in in g t he
boundar ies o f the sys tem and de te rmin ing whether o r no t a
c an di da te s ys te m s ho ul d c on si de r o th er r el at ed s y st em .
D ur i ng a na ly si s d at a a r e c ol le ct ed o n t he a va il ab le f il es ,
d ec is io n p oi nt s a nd t ra ns ac ti on s h an dl ed b y t he p ar en t
sys tem. Data f low d iagram, in te rv iews , ons i t e observa t ions ,
ques t ionna i res a re used as a log ica l sys tem model and too l s
to perform the analysis .
-
8/6/2019 Project Report on Cellular Project
25/88
Tasks, which are performed as analyst:
Gathered all facts about the present system from the
employees.
Studied strength and weakness of the current system.
Determined what must be done to solve the problem.
Prepared a functional specifications document.
In order to reduce the t ime, there is a need for
c o mp u te r iz e d s y st e m t h at c a ns r e t ri e ve d a ta , i n se r t d a ta ,
upda te ex i s t ing da ta o r de le te ex i s t ing da ta . These modules
ar e developed wit the a im of r educing t ime, reducing
m a np o we r, r e du c in g c o st s o t h at t h e r e c o r ds c a n b e e a si l y
maintained. The volume of work and complex i ty are
increasing year by year. Th is sys tem reduces complex ity and
workload
.
1.2 Preliminary Investigation:
A r e qu e st t o t a ke a s si s ta n ce f r om i n fo r m at i on s y st e m
can be made fo r many reasons , bu t in each case some one in
t h e o rga n iz a t io n i n it i at e t h e r e qu e st . W h en t h e r e qu e st i s
made , the f i r s t sys tem ac t iv i ty the p re l iminary inves t iga t ion
begins . This act ivi ty has three par ts :
Request clarification
Feasible Study
Request approval
-
8/6/2019 Project Report on Cellular Project
26/88
Many requests f rom employees and users in the
o rga n iz a t io n a r e n o t c l ea r ly d e fi n ed . T h er e f or e , i t b e co m es
n ec es sa ry t ha t p ro je ct r eq ue st m us t be ex am ine d a nd
clar i f ied proper ly before consider ing systems invest igat ion.
The feasibility study is carried out by a small group of people who are
familiar with information system techniques, understand the parts of
the business or organization
that will be involved or affected by the project, and are skilled in the
system analysis and design process.
Request Approval: It is not necessary that all request projects are
desirable or feasible. Some organizations receive so many projects
request from employees that only a few of them can be purchased.
However, those projects that are feasible and desirable should be put
into a schedule. In some cases, development can start immediately,
although usually system staff members are busy on other ongoing
projects. When such situation arises, management decides which
projects are more urgent and schedule them accordingly. After a project
request is approved, its cost, priority, completion time and personal
requirements are estimated and used to determine where to add it to
any existing project list. Later on, when the other projects have been
completed, the proposed application development can be initiated.
Analysis is a process of studying a problem and to find the best solution
to that problem. System analysis gives us the target for the design and
the implementation. Analysis is one phase, which is important phase for
-
8/6/2019 Project Report on Cellular Project
27/88
system development lie cycle. System development is a problem solving
techniques. Analysis involves interviewing the client and the user. Thee
people and the existing documents about the current mode of operation
are the basic source of information for the analyst.
Analysis is the process of studying a problem to find the best solution to
that problem. System analysis gives us the target for the design and the
implementation. Analysis is one phase of the very important phase of
the system development life cycle. System development is a problem
solving techniques. Analyses involve interviewing the client and the
user. These people and the existing document about the current mode
of operation are the basic source of information for the analyst.
SOFTWARE ENGINEERING PARADIGM APPLIED
Computer Aided Software Engineering can be as simple as a single tool
that support a specific software engineering activity or as complex as a
complete environment that encompasses tools, a database, people,
hardware, a network, operating system, standards, and myriad other
components. Each building block forms a foundation for the next, with
tools sitting as the top of the heap. It is interesting to note that the
foundation for effective CASE environment has relatively little to do for
software engineering tools themselves. Rather, successfulenvironments appropriate hardware and systems software. In addition,
the environment architecture must consider the human work patterns
that are applied during the software engineering process.
The environment composed of the hardware platform and system
support (including networking software, software management, and
-
8/6/2019 Project Report on Cellular Project
28/88
object management services), the groundwork for CASE. But the CASE
environment itself demands other building blocks. A set of portability
services provides a bridge between CASE tools and their integration
framework and the environment architecture. The integration
framework is a collection of specialized programs that enables
individuals CASE tools to communicate one another, to create a project
database, and to exhibit the same look and feel to the end user (the
software engineer). Portability services allow CASE tools and their
integration framework to migrate across different hardware platforms
and operating system with out significant adaptive maintenance.
The building blocks represent a comprehensive foundation for the
integration of CASE tools. However, most CASE tools in use today have
been: constructed using all these building blocks. In fact some CASE
tools remain point solution: That is, a tool is used to assist in a
particular software engineering activity (e.g. analysis modeling) but
does
not directly communicate with other tools, is not tied into a project
database, is not part of an integrated CASE environment (l-CASE).
Although this situation is not ideal, a CASE tool can be used quite
effectively, even if it is a point solution.
At the low end of the integration spectrum is the individual (point
solution) tool. When individual tools can provide tools provide facilities
for data exchange, the integration level is improved slightly. Such tools
produce output in a standard format that should be compatible with
other tools that can read the format. In some cases, the builder of
-
8/6/2019 Project Report on Cellular Project
29/88
complementary CASE tools work together to form a bridge between the
tools (e.g. an analysis and design tool that is coupled with a code
generator). Using this approach, the team develops, synergy between
the tools separately. Single source integration occurs when a single
CASE tools vendor integrates a number of different tools and sells them
as a package.
Although this approach is quite effective, the closed architecture of
most single source environments precludes easy addition from other
vendors.
5.0 DESIGN
The most creative and challenging phase of the system life cycle is
system design. The term design describes a final system and the
process by which it is developed. It refers to the technical specifications
that will be applied in implementing the candidate system.
The first step is to determine how the output is to be produced
and in what format. Samples for the output (and input) are also
presented.
The second step is input data and master files (data base) have to
be designed to meet the requirements of the proposed output. The
operational (processing) phases are handled through program
construction and testing including a list of the programs needed to meet
the systems objective and complete documentation. Finally, details
related to justification of the system on the user and the organization
are documented and evaluated by management as a step toward
-
8/6/2019 Project Report on Cellular Project
30/88
implementation. To design the system we must note the following
points:
To identify the Software Components which satisfy the System
Design.
To design and document the Software Components and their
linkage.
In this component the software components and relevant interfaces
such as, interactions with existing internal and external systems,
network connections, standard input an output formats are to be
identified.
Identify Relevant Interfaces
Interaction with existing internal systems.
Interaction with external systems.
Network Connections.
Standard Input Formats
Standard Output Formats.
Program Specification
Elements of Specifications required are
How it is being accessed.
Function called.
Program Security.
Field Details.
Program Functions.
-
8/6/2019 Project Report on Cellular Project
31/88
1
OutputDesign
InputDesign
FileDesign
ProcessingDesign
DetailedSystem
Documentation
TestPrograms
Design
submitted tomanagementfor approval
Designaccepted
2
Abandon project
CostJustification
andCandidate
design
From Analysis
Yes
STEPS IN SYSTEM DESIGN
-
8/6/2019 Project Report on Cellular Project
32/88
STEPS IN SYSTEM DESIGN
Databases and database technology are having a major impact on the growing use of
computers. It is fair to say that databases will play critical role: in almost all areas
where computers are used. Including business, engineering, medicine, law, education
and library, science to name a few. A database is a collection of related data. By data we
mean known facts that can be recorded and that have implicit meaning for example,
consider, the names, telephone numbers and addresses of the people you know. You
may have recorded this data in an indexed address, book, or you may have stored it on
a diskette. Using a personal computer and software such as DBASE IV or V,
PARADOX, MS EXCEL OR MS ACCESS. This is a collection of related data with an
implicit meaning and hence is a database.
A database is a logically coherent of with some inherent meaning.
A database represents some aspects of the real world. Sometimes called the mini-world
or the universe of discourse (UOD). Changes to the mini-world are reflected in the
database.
A database is designed, built and populated with data for the specific people. It has an
intended group of users and some preconceived applications in which the users are
interested.
A database can be of any size and of varying complexity. For example, the list of names
and addresses referred to earlier may consist of only a few hundred records, each with
simple structure. On the other hand the card catalog of a large library may contain half
a million cards stored under different categories by primary authors last name, by
subject, by book title with each category organized in alphabetic order.
-
8/6/2019 Project Report on Cellular Project
33/88
A database may be generated and maintained or by machine. The library card catalog
is an example of a database that may be created and maintained either by a group of
application programs written specially for that task or by a database management
system.
A database management system (DBMS) is a collection of programs that enables users
to create and maintained a database. The DBMS is hence a general-purpose software
system that facilities tile processed of defining, constructing and manipulating database
for various applications. Defining a database involves specifying the data types,
structures and constraints for the data to be stored in the database. Constructing the
database is the process of storing the data itself on some storage medium that is
controlled by the DBMS. Manipulating a database includes such functions as querying
the database to reflect changes in the mini-world, and generating reports form the data.
With the advent of the graphical operating system like windows, the world of imputing
went through a dramatic change. It opened up a whole new world of graphics.
Interfaces that use graphics came to known so graphical user interface (GUI). These
became very popular because the users could identify with images than words. Mention
tile word print to a person and it invokes the image of a printer. The primary
requirements for an interface are that it is easy to use. We must be able react intuitively
to an interface presented to us. This is possible if the interface presented is such that is
it emulates real life.
-
8/6/2019 Project Report on Cellular Project
34/88
. DATA FLOW DIAGRAM
Data Flow Diagramming is a means of representing a system at
any level of detail with a graphic network of symbols showing data
flows, data stores, data processes, and data sources/destination.
The data flow diagram is analogous to a road map. It is a
network model of all possibilities with different detail shown on
different hierarchical levels. This processes of representing different
details level is called leveling or partitioning by some data flow
diagram advocates. Like a road map, there is no starting point or stop
point, no time or timing, or steps to get somewhere. We just know that
the data path must exist because at some point it will be needed. A road
map shows all existing or planned roads because the road is needed.
Details that is not shown on the different levels of the data
flow diagram such as volumes, timing, frequency, etc. is shown on
supplementary diagrams or in the data dictionary. For example, data
store contents may be shown in the data dictionary.
Data Flow Diagram (DFD) uses a number of symbols to
represent the systems. Data Flow Diagram also known as Bubble Chart
is used to clarify system requirements and identifying the major
transformations that will become programs in system design. So it is
the starting point of the design phase that functionally decomposes the
requirements specifications down to the level of details.
Terms used in DFD
Process
-
8/6/2019 Project Report on Cellular Project
35/88
A process transforms data values. The lowest level processes are
pure functions without side effects. An entire data flow graphics high
level process.
Graphical representation:
Data flows
A data flow connects the output of an object or process to input of
another object or process. It represents the intermediate data value
within a computation. It is represented by an arrow and labeled with a
description of data, usually its name or type.
Actors
An actor is active object that drives the data flow graph by
producing or consuming values.
Data store
A data store is a passive object with in a data flow diagram that
stores data for later access.
Graphical Representation:
Graphical Representation:
-
8/6/2019 Project Report on Cellular Project
36/88
External Entity
A rectangle represents an external entity such as a librarian
,a library member.
OutPut Symbol This box represented data productionduring human computer interaction
Graphical Representation:
Graphical Representation:
Graphical Representation:
-
8/6/2019 Project Report on Cellular Project
37/88
Information Flow of Data for Testing
Testing
Debug
Reliability
Model
Evaluation
SoftwareConfiguration
TestConfigurat ion
ExpectedResults
Correct ion
Error RateData
Predicted Rel iabi l i ty
Information Flow of Data Testing
-
8/6/2019 Project Report on Cellular Project
38/88
2.0 FEASIBILITY STUDY
A feasibility study is conducted to select the best system that
meets performance requirement. This entails an identification
description, an evaluation of candidate system and the selection of best
system for he job. The system required performance is defined by a
statement of constraints, the identification of specific system objective
and a description of outputs.
The key consideration in feasibility analysis are :
1. Economic Feasibility :
2. Technical Feasibility :
3. Operational Feasibility:
Economical feasibility
It looks at the financial aspects of the project. It determines
whether the management has enough resources and budget to invest in
the proposed system and the estimated time for the recovery of cost
incurred. It also determines whether it is worth while to invest the
money in the proposed project. Economic feasibility is determines by
the means of cost benefit analysis.The proposed system is economically
feasible because the cost involved in purchasing the hardware and the
software are within approachable. The personal cost like salaries of
employees hired are also nominal, because working in this system neednot required a highly qualified professional. The operating-environment
costs are marginal. The less time involved also helped in its economical
feasibility. It was observed that the organization has already using
computers for other purpose, so that there is no additional cost to be
-
8/6/2019 Project Report on Cellular Project
39/88
incurred for adding this system to its computers.
The backend required for storing other details is also the same database
that is Sql. The computers in the organization are highly sophisticated
and dont needs extra components to load the software. Hence the
organization can implement the new system without any additional
expenditure. Hence, it is economically feasible
The result of the feasibility study is a formal proposal. This is simply
report-a formal document detailing the nature and the scope of the
proposed solution. The proposals summarize what is known and what is
going to be done. Three key considerations are involved in the
feasibility analysis: economic, technical and operational behavior.
2.3.1 Economic Feasibility:
Economic analysis is the most frequently used method for evaluating
the effectiveness of a candidate system. More determine the benefits
and the saving that are expressed from a candidate system and
compare them costs. If benefits outweigh costs. Otherwise, further
justification or alterations in the proposed system will have to be made
if it is to have a chance of being approved. This is an ongoing effort that
improves in accuracy at each phase of the system life cycle.
2.3.2 Technical Feasibility:
Technical feasibility center around the existing computer system
hardware etc. and to what extent it can support the proposed addition.
For example, if the current computer is operating at 80% capacity an
-
8/6/2019 Project Report on Cellular Project
40/88
-
8/6/2019 Project Report on Cellular Project
41/88
PLATFORM (Technology/Tool Selection)
Introduction to .net
ASP.NET is a high-level, third-generation programming language
like C, FORTRAN, Perl and many others. It is a platform for distributed
computing a development and run-time environment that contains
built-in support for the World Wide Web.
Client Side Interface:
In client side interface we are using:-
ASP .NET for Internet Based Application.
ASP .NET are middle-ware technologies which are used in web based
projects because they use:-
HTTP Protocol to handle Request and Response.
They are invoked through Browser.
They give output in HTML format.
They need Browser Support.
BACK-END
-
8/6/2019 Project Report on Cellular Project
42/88
SqlServer 2000
Why we are using SqlServer 2000 (RDBMS)?
Some of the merits of using SqlServer 2000 (RDBMS) are as under:
Centralization of database.
Client Server Technology.
Security.
Normalization of Data Base.
Relationship.
Transaction Processor.
It gives some internet related features.
Hence because of these features we are using SqlServer 2000 as a back-
end technology.
Weather you are working on LAN projects or Distributed projects,
there are two sides of it:-
Front End
Back End
Front End remains on client side. Front end is made for end user
who uses our application. Basically in front end, our input-output forms
reside which takes the input from the client and gives output back to
client.
Backend remains on server side and has two components viz.
Server side programs
-
8/6/2019 Project Report on Cellular Project
43/88
-
8/6/2019 Project Report on Cellular Project
44/88
Many Concurrent Database Performances
It supports large no of concurrent users executing a variety of
database applications operation on the same data. It minimizes data
connection & guarantees data concurrency.
High Transaction Processing Performance
SqlServer 2000 maintains the processing features with a high
degree of overall system performance. Database users dont suffer from
slow processing performance.
High Availability
SqlServer 2000 works 24 hours a day with no downtime or limited
database throughput. Normal system operation such as database
backup & partial system failure doesnt interrupt database use.
Controlled Availbility
SqlServer 2000 can selectively control the availability of data at
the database level & sub database level. E.g. an administrator can
disallow use of a specific application .Data can be reloaded without
affecting other application.
Industry Accepted Standards
SqlServer 2000 adheres to industry accepted standards for the
data access language operating system, user interface & network
communication protocols.
Manageable Security
-
8/6/2019 Project Report on Cellular Project
45/88
To protect against unauthorized database aspects & users,
SqlServer 2000 provides failsafe security features to limit & monitor the
data area. The system makes it easy to manage even the most
completed designs for data assets.
Database Enforced Integrity
SqlServer 2000 enforces data integrity Business rules, that
dictate the standards for applicable data. As a result, the cost of coding
& managing checks in many database applications is eliminated.
Distributed Database System
For community environment that are connected via networks,
SqlServer 2000 combines the data physically located on different
computers in one logical database that can be accessed by all the
network users. Distributed systems have same degree of user
transparency & data consistency as non-distributed systems, yet receive
the advantages of local database management.
Portability
SqlServer 2000 software is compatible to work under different
operating system & same on all system. Applications developed on
SqlServer 2000 can be used on virtually any system with little or no
more modification.
Compatibility
SqlServer 2000 software is compatible with industry standards,
including most industry standard operating systems. Applications
developed on SqlServer 2000 can be used on virtually any system with
little or no modification.
-
8/6/2019 Project Report on Cellular Project
46/88
Connectivity
SqlServer 2000 software allows different types of computers &
operating system to share information in networks.
NEW FEATURES OF SQLSERVER 2000
Improved Scalability
The maximum size of an SqlServer 2000 database has been
increased to support hundreds of terabytes depending on the operating
system on which it resides.
Improved Security
SqlServer 2000 server now includes password management so
that a password has a limited lifetime & must meet certain complexity
such as minimum length. An account can be locked after a specified
number of failed login attempts.
Improved Performance via Partition
A table of index can be divided into smaller pieces called
partitions, based on the value of one or more columns. A table partitions
can be individually managed so that operation in one partition does not
affect the availability of data on other partitions. Also insert, update,
delete operations against a partitioned table can be processed partially.
-
8/6/2019 Project Report on Cellular Project
47/88
In other words, the SqlServer 2000 8 server can assign a portion
of the work to execute a single DML statement to multiple processes,
which may then be allocated to multiple processes by the server
operating system. As a result, the parallel DML operations are
completed more quickly.
Enhanced Support for Database Replication
The performance & manageability of database replication has
been significantly improved.
Capability to handle a much larger number of concurrent
users
By pooling database connection, the SqlServer 2000 8 server is
able to service a much larger number of concurrent users, up to 3000,
depending on the servers operating system & server hardware
resources.
New & Improved Data Types
Some existing data types have been enhanced & new data types
have been introduced.
Improved Select Statement
A new feature of the select statement allows a sub query to be
used in place of a table in a from clause.
Now when we are discussing Database, there is one more
thing attached to it, i.e. Data Base Models
-
8/6/2019 Project Report on Cellular Project
48/88
Database Models
There are three kinds of database models:-
Single tier architecture.
Two tier architecture.
N- Tier architecture .
Single tier Architecture:
In this kind of architecture, database and client application
remains on one machine i.e. there is no client-server technology, there
is no centralization of database, and basically it is a stand alone system.
Two tier Architecture
In this kind of architecture, database and client application is on
two different machines i.e. Database on one machine and the
application on another machine. In this type of architecture, the
implementation of client-server technology is done and centralization of
data base is there, but it has two demerits:-
Security is not there
Multiple Client access is not there.
N- Tier Architecture: -
In this kind of architecture, there is a middle-ware in between the
client and database. Middle ware checks the validity of the client i.e.
weather the client can access the database or not. Hence there issecurity in it as well as middle-ware allows multiple clients access .
What is Middle-Ware?
Middle-ware is a concept. Middle-ware provides centralization of
business logic i.e. instead of putting logic on each and every client
-
8/6/2019 Project Report on Cellular Project
49/88
machine we put logic on a centralized server. Hence middle ware is
nothing but a server side program where all your business logic and
business methods reside. It remains on server side and it has all the
logical building. Middle ware provides: -
Multiple Client access.
Centralized business logic in case of distributed application.
Because we are working on Distributed Application Based Project we
need platform independent Language like
.NET AND SQL SERVER IS USE MANLY FOR CODE EFFICIENCY
Database ManagementVisual Basic allows we to manage databases while directly connected to them atdesign time. Depending on the feature of our database and our accessprivileges, we can use Visual Basic tools to add, remove, or modify.
DatabasesTables or ColumnsViews and synonymsRelation between TablesIndexesConstraints and triggersStored procedures, functions, and packagesQueries that return sets of data, or queries that modify a database by
adding, updating, copying, or deleting records.
Managing databases is a separate task from adding database functionality to aWeb Application. Therefore to manage databases in Visual Basic, we create adatabase project. To help we perform various database management tasks, a
database project in Visual Basic .net provides the following tools:
Data View Window: A window that displays the entire database objectsthat we can currently Work with. From the Data View window, we can editobjects such as tables, views, stored procedures, and triggers.
Data View window showing available database objects
-
8/6/2019 Project Report on Cellular Project
50/88
Database Designer: A tool that displays our Microsoft SQL server database asa database diagram, which we can edit to add or modify table and columndefinitions, define relationships, create indexes, and add constraints
Database diagram representing a database visually
Query Designer : A designer that, allows we to visually create SQL statements to
query or modify a database.
Query Designer being used to create a SQL statement
View Designer A version of the Query Designer that allowswe to visually create the SQL statement that defines a view.
Stored Procedure Editor:
A window for creating stored procedure that includes a link to the Query Designerto construct SQL statements.
Trigger Editor: A window for creating triggers
Script Editor: A window for creating SQL scripts, which are SQLstatements that are independent of any particular database. We can put SQLscripts under source control as well.
Overview of the .NET Framework
The .NET Framework is a new computing platform that simplifies applicationdevelopment in the highly distributed environment of the Internet. The .NETFramework is designed to fulfill the following objectives:
To provide a consistent object-oriented programming environment whetherobject code is stored and executed locally, executed locally but Internet-distributed, or executed remotely.
To provide a code-execution environment that minimizes software deploymentand versioning conflicts.
To provide a code-execution environment that guarantees safe execution of code,including code created by an unknown or semi-trusted third party.
To provide a code-execution environment that eliminates the performanceproblems of scripted or interpreted environments.
To make the developer experience consistent across widely varying types of applications, such as Windows-based applications and Web-based applications.
-
8/6/2019 Project Report on Cellular Project
51/88
To build all communication on industry standards to ensure that code based onthe .NET Framework can integrate with any other code.
The .NET Framework has two main components: the common language runtime andthe .NET Framework class library. The common language runtime is the foundation of the .NET Framework. You can think of the runtime as an agent that manages code atexecution time, providing core services such as memory management, threadmanagement, and remoting, while also enforcing strict type safety and other forms of code accuracy that ensure security and robustness. In fact, the concept of codemanagement is a fundamental principle of the runtime. Code that targets the runtime isknown as managed code, while code that does not target the runtime is known asunmanaged code. The class library, the other main component of the .NET Framework,is a comprehensive, object-oriented collection of reusable types that you can use todevelop applications ranging from traditional command-line or graphical user interface(GUI) applications to applications based on the latest innovations provided byASP.NET, such as Web Forms and XML Web services.
The .NET Framework can be hosted by unmanaged components that load the commonlanguage runtime into their processes and initiate the execution of managed code,thereby creating a software environment that can exploit both managed andunmanaged features. The .NET Framework not only provides several runtime hosts,but also supports the development of third-party runtime hosts.
For example, ASP.NET hosts the runtime to provide a scalable, server-sideenvironment for managed code. ASP.NET works directly with the runtime to enableWeb Forms applications and XML Web services, both of which are discussed later in
this topic.
Internet Explorer is an example of an unmanaged application that hosts the runtime (inthe form of a MIME type extension). Using Internet Explorer to host the runtimeenables you to embed managed components or Windows Forms controls in HTMLdocuments. Hosting the runtime in this way makes managed mobile code (similar toMicrosoft ActiveX controls) possible, but with significant improvements that onlymanaged code can offer, such as semi-trusted execution and secure isolated file storage.
The following illustration shows the relationship of the common language runtime andthe class library to your applications and to the overall system. The illustration also
shows how managed code operates within a larger architecture.
The following sections describe the main components and features of the .NETFramework in greater detail.
Features of the Common Language Runtime
The common language runtime manages memory, thread execution, code execution,code safety verification, compilation, and other system services. These features areintrinsic to the managed code that runs on the common language runtime.
-
8/6/2019 Project Report on Cellular Project
52/88
With regards to security, managed components are awarded varying degrees of trust,depending on a number of factors that include their origin (such as the Internet,enterprise network, or local computer). This means that a managed component mightor might not be able to perform file-access operations, registry-access operations, orother sensitive functions, even if it is being used in the same active application.
The runtime enforces code access security. For example, users can trust that anexecutable embedded in a Web page can play an animation on screen or sing a song,but cannot access their personal data, file system, or network. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionallyfeature rich.
The runtime also enforces code robustness by implementing a strict type- and code-verification infrastructure called the common type system (CTS). The CTS ensures thatall managed code is self-describing. The various Microsoft and third-party languagecompilers generate managed code that conforms to the CTS. This means that managedcode can consume other managed types and instances, while strictly enforcing typefidelity and type safety.
In addition, the managed environment of the runtime eliminates many commonsoftware issues. For example, the runtime automatically handles object layout andmanages references to objects, releasing them when they are no longer being used. Thisautomatic memory management resolves the two most common application errors,memory leaks and invalid memory references.
The runtime also accelerates developer productivity. For example, programmers canwrite applications in their development language of choice, yet take full advantage of the runtime, the class library, and components written in other languages by otherdevelopers. Any compiler vendor who chooses to target the runtime can do so.Language compilers that target the .NET Framework make the features of the .NETFramework available to existing code written in that language, greatly easing themigration process for existing applications.
While the runtime is designed for the software of the future, it also supports software of today and yesterday. Interoperability between managed and unmanaged code enablesdevelopers to continue to use necessary COM components and DLLs.
The runtime is designed to enhance performance. Although the common languageruntime provides many standard runtime services, managed code is never interpreted.A feature called just-in-time (JIT) compiling enables all managed code to run in thenative machine language of the system on which it is executing. Meanwhile, the memorymanager removes the possibilities of fragmented memory and increases memorylocality-of-reference to further increase performance.
Finally, the runtime can be hosted by high-performance, server-side applications, suchas Microsoft SQL Server and Internet Information Services (IIS). Thisinfrastructure enables you to use managed code to write your business logic, while stillenjoying the superior performance of the industry's best enterprise servers that supportruntime hosting.
-
8/6/2019 Project Report on Cellular Project
53/88
.NET Framework Class Library
The .NET Framework class library is a collection of reusable types that tightly integratewith the common language runtime. The class library is object oriented, providing
types from which your own managed code can derive functionality. This not only makesthe .NET Framework types easy to use, but also reduces the time associated with learningnew features of the .NET Framework. In addition, third-party components can integrateseamlessly with classes in the .NET Framework.
.NET Framework to develop the following types of applications and services:
Console applications. Scripted or hosted applications.
Windows GUI applications (Windows Forms). ASP.NET applications. XML Web services. Windows services.
For example, the Windows Forms classes are a comprehensive set of reusable types thatvastly simplify Windows GUI development. If you write an ASP.NET Web Formapplication, you can use the Web Forms classes.
Client Application Development
Client applications are the closest to a traditional style of application in Windows-basedprogramming. These are the types of applications that display windows or forms on thedesktop, enabling a user to perform a task. Client applications include applicationssuch as word processors and spreadsheets, as well as custom business applications suchas data-entry tools, reporting tools, and so on. Client applications usually employwindows, menus, buttons, and other GUI elements, and they likely access localresources such as the file system and peripherals such as printers.
Server Application Development
Server-side applications in the managed world are implemented through runtime hosts.Unmanaged applications host the common language runtime, which allows your custommanaged code to control the behavior of the server. This model provides you with allthe features of the common language runtime and class library while gaining theperformance and scalability of the host server.
-
8/6/2019 Project Report on Cellular Project
54/88
The following illustration shows a basic network schema with managed code running indifferent server environments. Servers such as IIS and SQL Server can performstandard operations while your application logic executes through the managed code.
Server-side managed code
ASP.NET is the hosting environment that enables developers to use the .NETFramework to target Web-based applications. However, ASP.NET is more than just aruntime host; it is a complete architecture for developing Web sites and Internet-distributed objects using managed code. Both Web Forms and XML Web services useIIS and ASP.NET as the publishing mechanism for applications, and both have acollection of supporting classes in the .NET Framework.
-
8/6/2019 Project Report on Cellular Project
55/88
INTRODUCTION OF Sql Server 2000
Introduction to Oracle and Its Tools:The SQL Server product is primarily divided into:
SQL Server Server ToolsSQL Server Client Tools
SQL Server Server:
Microsoft the No. one company in the software that produces the mostwidely used, front end and Server based Multi user RDBMS. The SQLServer is a program installed on the Servers hard disk driver. This programmust be loaded in RAM so that it can process user requests.
The SQL Server Server product is either called SQL Server ProfessionalOr SQL Server Enterprise.
The SQL Server takes care of the following:
Updating the database.Retrieving information from the database.Accepting query language statements.Enforcing security specifications.Enforcing data integrity specifications.Enforcing transaction consistency.Managing data sharing.Optimizing queries.Managing system catalogs.
Sql Server Client Tools:
Once the Sql Server engine is loaded into the servers memory, users wouldhave to log into the engine to get work done. Microsoft has several client-basedtools that facilitate this. The client tool most commonly used for CommercialApplication Development is Visual basic.
-
8/6/2019 Project Report on Cellular Project
56/88
What is SQL Used for:
Using SQL one can create and maintain data manipulation objects suchas table, views, sequence etc. These data manipulation objects will becreated and stored on the server's hard disk drive, in a table space, to
which the user has been assigned.Once these data manipulation objects are created, they are usedextensively in commercial applications.
DML, DCL, DDL:
In addition to the creation of data manipulation objects, the actualmanipulation of data within these objects is done using SQL .
The SQL sentences that are used to create these objects are called DDL's or Data Definition Language. The SQL sentences used to manipulate data withinthese objects are called DML's or Data Manipulation Language. The SQLsentences, which are used to control the behavior of these objects, are calledDCL's or Data Control Language.
Hence, once access to the SQL*Plus tool is available and SQL syntax isknown, the creation of data storage and the manipulation of data withinthe storage system, required by commercial applications, is possible.
The Data type that a Cell can hold:
Data Typ e Description
CHAR(size) : This data type is used to store character stringsvalues of fixed length. The size in bracketsdetermines the number of characters the cellcan hold. The maximum number of charactersthis data type can hold is 255 characters.
VARCHAR (size) /VARCHAR2 (size)
: This data type is used to store variable lengthalphanumeric data. The maximum this data typecan hold is 2000 character .
NUMBER (P,S) : The NUMBER data type is used to store numbers(fixed or floating point). Numbers of virtuallyany magnitude maybe stored up to 38 digits of
-
8/6/2019 Project Report on Cellular Project
57/88
precision .
DATE : This data type is used to represent data andtime. The standard format is DD-MON-YY as in24-JAN-02. To enter dates other than thestandard format, use the appropriate functions.Date Time stores date in the 24-hour format.
LONG : This data type is used to store variable lengthcharacter strings containing up to 2GB. LONGdata can be store arrays of binary data in ASCIIformat.
-
8/6/2019 Project Report on Cellular Project
58/88
SYSTEM DESIGN
Introduction
System design provides the understandings and procedural details
necessary for implementing the system recommended in the system
study. Emphasis is on the translating the performance requirements
into design specifications. The design phase is a transition from a user-
oriented document (System proposal) to a document oriented to the
programmers or database personnel .
System design goes through two phases of development :
1) Logical Design
2) Physical Design
A data flow diagram shows the logical flow of the system. For a
system it describes the input (source), output (destination), database(data stores) and procedures (data flows) all in a format that meets the
users requirement. When analysis prepare the logical system design,
they specify the user needs at a level of detail that virtually determines
the information flow into an out of the system and the required data
resources. The logical design also specifies input forms and screen
layouts.
The activities following logical design are the procedure followed
in the physical design e.g., producing programs, software, file and a
working system. Design specifications instruct the user about what the
system should do.
-
8/6/2019 Project Report on Cellular Project
59/88
Logical and Output Design :
The logical design of an information system is analogous to an
engineering blue print of an automobile. It shows the major features
and how they are related to one another. The detailed specification for
the new system was drawn on the bases of users requirement data.The outputs inputs and databases are designed in this phase.
Output design is one of the most important features of the
information system. When the outputs is not of good quality the users
will be averse to use the newly designed system and may not use the
system. There are many types of output, all of which can be either
highly useful or can be critical to the users, depending on the manner
and degree to which they are used.
Outputs from computer system are required primarily to
communicate the results of processing to users, They are also used to
provide a permanent hard copy of these results for later consultation.
Various types of outputs required can be listed as below:
External Outputs, whose destination is outside the
organisation
Internal outputs, whose destination is with the organisation Operational outputs, whose use is purely with in the computer
department e.g., program-listing etc.
Interactive outputs, which involve the user is communicating
directly with the computer, It is particularly important to
consider human factor when designing computer outputs. End
user must find outputs easy to use and useful to their jobs,
Without quality output, user may find the entire systemunnecessary and avoid using it. The term Output in any
information system may apply to either printer or displayed
information. During the designing the output for this system,
it was taken into consideration, whether the information to be
presented in the form of query of report or to create
documents etc.
-
8/6/2019 Project Report on Cellular Project
60/88
Other important factors that were taken into consideration
are:
The End user, who will use the output.
The actual usage of the planned information
The information that is necessary for presentation
When and how often output and their format is needed. While
designing output for project based Attendance Compilation
System, the following aspects of outputs designing were
taken into consideration.
The outputs (i.e., well formatted table outputs in the screen
itself) designed are simple to read and interpret.
Format of each output was another important point taken into
consideration. Output media, for each output appropriate
media is decided whether it will be displayed on screen or will
be taken to printer or both.
Other output design related specifications, i.e., how frequently
the outputs will be generated, how many pages or sheets
approximately it will keep up, what is its planned use and
output distribution to users are also taken into account.
These were a few major designing issues, which were taken into
consideration, while deciding the output specifications for the system.
As direct beneficiary of reports is the user community, they were
consulted constantly at every level. Formats and screen design for
various reports were identified, taking into account the user
requirements. Before finalising these were given to users for any
improvement and suggestions. End users issues taken intoconsideration were Readability, Relevance and Acceptability.
Once all the output reports to be generated by ACS system were
identified, they were given to users for their acceptance. For
prototyping various outputs, final outputs models were created with
dummy data, before they were finalised.
-
8/6/2019 Project Report on Cellular Project
61/88
Output Sources:
Output contents originate from these sources:
Retrieval from a data source.
Transmission from a process or system activity.
Directly from an input source.
The information produced in an output can be presented as
Tabular contents
Graphic format
Using Icons
Output Definition:
The output should be defined in terms of:
Types of outputs
Content-headings, numeric, alphanumeric, etc.,
Format-hardcopy, screen, microfilm, etc.,
Location-local, remote, transmitted, etc.,
Frequency-daily, weekly, hourly, etc.,
Response-immediate with in a period, etc.,
Data items
The name given to each data item should be recorded and its
characteristics described clearly in a standard form:
Whether alphanumeric or numeric
Legitimate and specific range of characteristics
Number of characters
Positions of decimal point, arithmetic design, etc.,
-
8/6/2019 Project Report on Cellular Project
62/88
Input Design:
The input design is the link that ties the information system into the
users world. Input specifications describe the manner in which data
enters the system for processing. Input design features can ensure the
reliability of the system and produce results from accurate data, or they
can result in the production of erroneous information.
Input Design consists of
developing specifications and procedures for data preparation
Steps necessary to put data into a usable form for processing.
Data entry, the activity of putting data into the computer
processing .
Objectives of Input design
Five objectives of design input focus on
Controlling the amount of input required
Avoid delay
Avoiding errors in data
Avoiding extra steps.
Keeping the process simple.
Input stages several activities have to be carried out as part of te
overall input process. They include some or all of the following.
Data recording (i.e., collection of data)
Data encapsulation(i.e.,transfer of data)
Data conversion(i.,e.,controlling the flow of data)
-
8/6/2019 Project Report on Cellular Project
63/88
-
8/6/2019 Project Report on Cellular Project
64/88
SOFTWARE DESIGN
The purpose of this phase is to plan a solution for the problem
specified by the requirement document. This is first step in moving from
the problem domain to solution domain. Designing activity is divided
into two parts.
a) System Design :
It aims to identify the modules that should be in the system, the
specification of these modules and how they interact with each other to
produce the desired result.
b) Detailed Design :
The internal goal of each of the modules specified in the system design
is decided
DATABASE DESIGN
A database is a collection of inter-related data stored with a
minimum of redundancy to serve many applications. It minimizes the
artificiality embedded in using separate files. The primary objectives are
fast response time to enquires, more information at low cost, control of
redundancy, clarity and ease of use, accuracy and fast recovery. The
organization of data in a database aims to achieve three major
objectives, they are data integration, data integrity and data
independence. During the design of the database at most care has been
taken to keep up the objectives of the database design.
CODE DESIGN
The process of code is to facilitate the identification and
retrieve of items of information. The code should be simple and easy to
-
8/6/2019 Project Report on Cellular Project
65/88
understandable. The codes were designed in such a way that the
features such as optimum human oriented use and machine efficiency
are unaffected.
For the code to be designed effectively, the following characteristicswere also considered while designing the code.
Uniqueness
Versatility
Stability
Simplicity
Consciousness
The code should be adequate for present and anticipated data
processing for machine and human use. Care was taken to minimize the
clerical effort and computer time required to continue operation.
PROCESS DESIGN
The process can be conceptualized in such a way to keep the
methodology of main module process along with some auxiliary task,
which will run concurrently with the main program.
The top-down approach is maintained so as to keep track of
the process, which satisfies the maintenance reliability testing
requirements. The concurrency of the data is checked during data entry,
by means of validation check for data in each field.
-
8/6/2019 Project Report on Cellular Project
66/88
IMPLEMENTATION
Introduction
System implementation is the stage when the user has thoroughly
tested the system and approves all the features provided by the system.The various tests are performed and the system is approved only after
all the requirements are met and the user is satisfied.
The new system may be totally new, replacing an existing
manual or automated system, or it may be a major modification to an
existing system. In either case, proper implementation is essential to
provide a reliable system to meet organizational requirements.
Successful implementation may not guarantee improvement in theorganization using the new system (that is a design question), but
improper will prevent it.
Implementation is the process of having systems personnel check out
and put new equipment into use, train users, install the new application
and construct any files of data needed to use it. This phase is less
creative than system design. Depending on the size of the organization
that will be involved in using the application and the risk involved in its
use, systems developers may choose to test the operation in only one
area of the firm with only one or two persons. Sometimes, they will run
both old and new system in parallel way to com-pare the results. In still
other situations, system developers stop using the old system one day
and start using the new one the next.
-
8/6/2019 Project Report on Cellular Project
67/88
The implementation of the web based or lan based networked
project has some extra steps at the time of implementation. We need to
configure the system according the requirement of the software.
For the project we need to install and configure Weblogic server
8.1 , database server, and the deployment directory for the project.
Aspects of Implementation
The two aspects of implementation are:
Training Personnel Conversion Procedures
TRAINING
Even wel l des igned and technica l ly e legan t sys tems can
succeed or fa i l because o f the way they a re used . There fore
the qual i ty of the t ra ining received by the personnel involved
w i t h t h e s y s t e m i n v a r i o u s w a y s h e l p s o r h i n d e r s , a n d m a y
even prevent , the successful implementat ion of an
informat ion system.
S in ce , H um an R es ou rc e R ec ru it me nt P ro ce ss i s w eb -
b as ed a nd u se r f ri en dl y, n ot m uc h e ff or t w as r eq ui re d i n
tra ining process .
CONVERSION:
C on ve rs io n i s t he p ro ce ss o f c ha ng in g f ro m t he o ld
sy stem to the new system. Ther e are two methods o f
handl ing systems convers ion:
Parallel Run
Immediate cut-off
-
8/6/2019 Project Report on Cellular Project
68/88
Parallel Run
In this approach, the old system and the new system are
u se d s im ul ta ne ou sl y f or s om e p er io d o f t im e s o t ha t t he
p er fo rma nc e o f t he n ew s ys te m c an b e mo ni tor ed a nd
compared wi th tha t o f the o ld sys tem. Also in case o f fa i lu re
of the new sys tem, the use r can fa l l back on the o ld sys tem.
The r i sk o f th i s approach i s tha t the use r may never want to
shif t to new system.
9.2.2.1 Immediate cut-off
In th i s method , the use o f the o ld sys tem
ceases as soon as the new system is implemented and bought
in to palace. The old system becomes redundant f rom the day
of implementa t ion o f the new sys tem. There i s the h igh r i sk
i nv ol ve d i n t hi s a pp ro ac h i f t he n ew s ys te m i s n ot t es te d
r igorous ly. Th is i s because o f the fac t tha t i f the new sys tem
f a il s , t h e n t h er e w i ll n o t b e a n yt h in g t o f a l l b a ck u p on . T h eadvantage of this approach is that both the systems need not
be used s imultaneously.
Implementation Tools
The project was implemented using ASP.NET server pages , HTML ,
ASP.NET beans.The implementation work was carried out in WindowsXP/2000 server platform.
1) C#.Net and Asp.Net
2) SqlServer 2000
-
8/6/2019 Project Report on Cellular Project
69/88
Coding
This means program construction with procedural specifications has
finished and the coding for the program begins:
Once the design phase was over,coding commenced
Coding is natural consequence of design.
Coding step translate a detailed design representation of
software into a programming languae realization.
Main emphasis while coding was on style so that the end result
was an optimized code.
The following points were kept into cosideration while coding:
Coding Style
The structured programming method was used in all the modules the
project.It incorporated the following features
The code has been written so that the definition and
implementation of each function is contained in one file.
A group of related function was clubbed together in one file to
include it when needed and save us from the labour of writing it
again and again.
Naming Convention:-
-
8/6/2019 Project Report on Cellular Project
70/88
As the project size grows,so does the com[plexity of recognizing
the purpose of the variables.Thus the variables were given
meaningful names,whihch would hellp in understanding the
context and the purposse of the variable.
The function names are also given meaningf
top related