report
Post on 25-Nov-2014
12 Views
Preview:
TRANSCRIPT
INTRODUCTION
1. INTRODUCTION
1.1Project Details: Broad specifications of the project work
Project Definition In These Project we basically focus on all the world of people who want to
find their life partner. Our site is made for connect the all these from all over the world.
In this website we provide facilities for all age of member.
What is Matrimonial Web Application?
Matrimonial Web Application will allow a new user to register and after successfully
registration. After completing registration users profile will be visible to other users.
Matrimonial website which will provide platform to a lot of Bride/Groom for finding
perfect match. There are different sectors like Registration, Partner, Search, etc. So the
Bride/Groom can get their interest for find their partner. Bride/Groom can directly search
Partner according to their required criteria.
For This Application, we will provide following capabilities:
(1) Admin Module
(2) User Registration Module
(3) Image Uploading module
(4) Search Module
(5) Success story
(6) Feedback
Considering the security and privacy aspects, Matrimonial Web Application will use
HTTPS protocol (A version of the HTTP protocol that includes data encryption for
security.)
The application will have to be completed using Visual Studio 2008 and SQL Server
2005 with help of other office productivity tools such as Microsoft Visio 2003.
1L.J. Institute of Engineering and Technology
INTRODUCTION
The application testing criteria and installation requirements will be part of the
detailed application architecture document.
1.2 PurposeThe purposes of the Matrimonial Web Application are:
The main purpose of this application is to facilitate matchmaking business by
applying the information in the field.
It helps the user by providing profiles of perspective “Bride” or “Groom” and other
information regarding them online.
User can get information regarding their dream life partner at his/her home at his/her
convenience.
This application also provides a search utility which helps those users who have a
certain criteria of qualities in mind to make online matrimonial easier.
1.3 Scope Matrimonial website which will provide platform to a lot of Bride/Groom for
finding perfect match.
There are different sectors like Registration, Search, etc. So the Bride/Groom can
get their interest for find their partner. Bride/Groom can directly search Partner
according to their required criteria.
1.4Technology and Literature Review1.4.1 The .net framework
A frame work is commonly thought of as a set of class libraries that aid in
the development of applications. The .net framework is more than just a set of
classes. The .net framework is targeted by compliers using a wide variety of
applications. Including everything from small components that run on handheld
devices to large Microsoft ASP.ET application that span web farms, where
multiple web serves act together to improve the performance fault tolerance of a
web site. The .NET framework is responsible for providing a basic platform that
2L.J. Institute of Engineering and Technology
INTRODUCTION
these applications can share. This basic platform includes a runtimes set of
services that oversee the execution of applications. A key responsibility of the
runtime is to manage execution so that software written by different programming
languages uses classes and other types safely.
1.4.2 Microsoft .net framework architecture
Microsoft's .NET Framework is comprised of two main components - the
Common Language Runtime (CLR) and the .NET Framework class libraries. The
CLR is the real foundation of the .NET Framework. It is the execution engine for
all .NET applications. Every target computer requires the CLR to successfully run
a .NET application that uses the .NET Framework. The main features of CLR
include:
Automatic Memory Management
Thread Management
Code Compilation & Execution
Code Verification
High level of security
Remoting
Structured Exception Handling
Interoperability between Managed and Unmanaged code.
Integration with Microsoft Office System
1.4.3 Common Language Specification
To fully interact with other objects regardless of the language they were
implemented in, objects must expose to callers only those features that are common to all
the languages they must interoperate with. For this reason, the Common Language
Specification (CLS), which is a set of basic language features needed by many
applications, has been defined. The CLS rules define a subset of the Common Type
System; that is, all the rules that apply to the common type system apply to the CLS,
except where stricter rules are defined in the CLS. The CLS helps enhance and ensure
3L.J. Institute of Engineering and Technology
INTRODUCTION
language interoperability by defining a set of features that developer can rely on to be
available in a wide variety of languages. The CLS also establishes requirements for CLS
compliance; these help you determine whether your managed code conforms to the CLS
and to what extent a given tool supports the development of managed code that uses CLS
features.
1.4.4 Common Language Runtime
The Common Language Runtime (CLR) is the virtual machine component of
Microsoft's .NET initiative. It is Microsoft's implementation of the Common Language
Infrastructure (CLI) standard, which defines an execution environment for program code.
The CLR runs a form of byte code called the Microsoft Intermediate Language (MSIL),
Microsoft's implementation of the Common Intermediate Language.
The virtual machine aspect of the CLR allows programmers to ignore many
details of the specific CPU that will execute the program. The CLR also provides other
important services, including the following:
• Memory management
• Thread management
• Exception handling
• Garbage collection
• Security
1.4.5 Introduction to ASP.NET
Microsoft, realizing that ASP does posses some significant shortcomings,
developed ASP.net. ASP.net is a set of components that provide developers with a
framework with which to implement complex functionality. Two of the major
improvements of ASP.net over traditional ASP are scalability and availability. ASP.net is
scalable in that it provides state services that can be utilized to manage session variables
across multiple web services in a server farm. Additionally, ASP.net possesses a high
4L.J. Institute of Engineering and Technology
INTRODUCTION
performance process model that can detect application failures and recover from them.
We use the fundamentals of programming with VB using Visual Studio .NET and .NET
framework.
Features of ASP.NET:
(1) Component Infrastructure.
(2) Language Integration.
(3) Internet Interoperation.
(4) Simple Development.
(5) Simple Deployment.
(6) Reliability.
(7) Security
1.4.6 Introduction to Microsoft SQL Server
Microsoft SQL Server enhances the performance, reliability, and scalability
provided by earlier releases of SQL Server by making the processes of developing
applications, managing systems, and replicating data easier than ever.
SQL server also contains many of the front-end tools of PC databases that
traditionally haven’t been available as part of either mainframe or minicomputer
databases. In addition to using a dialect of Structured Query Language (SQL), GUI
applications can be used for the storage, retrieval, and administration of the database.
5L.J. Institute of Engineering and Technology
INTRODUCTION
2. PROJECT MANAGEMENT
2.1 Feasibility Study Feasibility study is a process to check possibilities of system development. It is
a method to check various different requirements and availability of financial &
technical resources.
There are three different ways feasibility can be tested
1) Economical Feasibility
2) Technical Feasibility
3) Operational Feasibility.
2.1.1 Economical Feasibility:
In economical feasibility, analysis of the cost of the system is carried out. The
system should be only developed if it is going to give returned the current manual system
user can get the price only by purchasing the newspapers. In addition if he/she wants to
see archives of particular equity then he has to refer to all the old newspapers. For
research reports he has to buy another magazine. So Instead of buying no of magazines
user has to just go online and with a single click he can get whatever information he
wants. So our project of online share news passes the test of economical feasibility.
2.1.2 Technical Feasibility:
It is basically used to see existing computer, hardware and software etc,
weather it is sufficient or additional equipments are required? Minimum System
Requirement is such that it can be affordable by of the user who is having computer. All
the user requires is compatible browser and .net framework installed so our system is
fully technical feasible.
2.1.3 Operational Feasibility:
Once the system is designed there must be trained and expert operator. If there
are not trained they should given training according to the needs of the system.
6L.J. Institute of Engineering and Technology
INTRODUCTION
From the user’s perspective our system fully operational feasible as it just
requires some knowledge of computer. Operators only need add daily prices of various
equities and there are enough validations available so operator does not require any
special technical knowledge. So our system also passes the test of operational feasibility.
2.2 Project Planning
2.2.1 Project Development Approach and Justification
Waterfall Model has been adopted as an approach for development of project. Most of the requirements of the project are fixed and already thought of very less functionality updation is expected in future. So Waterfall model is the right approach for our project.
Justification: As our application is a matrimonial website the requirements are much clear as we have number of reference matrimonial websites which can be used as reference so by looking that our requirements and functionalities that are to be implemented are clear.
As waterfall model is used for project whose requirements and functionalities are already known and as our project falls in this category we have chosen waterfall model as an approach to develop our project.
2.2.2 Project PlanProject was well planned. Project began with gathering user requirements, than diagrammatic representation of the functionalities was designed. Required Database was designed and normalized as required. Code was written in such a way that maximum functionality was coded with minimum possible lines of code.
2.2.3 Roles and ResponsibilitiesFollowing are our project members with their roles in the project and their responsibilities.
Analysis and design
Nirav Patel
Vishal Patel
Sulabh Gajjar
7L.J. Institute of Engineering and Technology
INTRODUCTION
Coding
Nirav Patel
Vishal Patel
Sulabh Gajjar
Testing
Nirav Patel
Vishal Patel
Sulabh Gajjar
Table 2.1 Roles And Responsibilities.
2.3 Project SchedulingProject scheduling chart
Scheduling the project task is an important project planning activity .It involves deciding which tasks would be taken up when.
Based on the planned duration of required tests and collection of resources to
complete those tasks projected completion date is calculated. We have prepared timeline
Chart shown as below fig.
Fig.2.1 Scheduling.
8L.J. Institute of Engineering and Technology
INTRODUCTION
3. SYSTEM REQUIREMENT STUDY
3.1 User Characteristics Our system will be used by two types of users they are as follows
Admin User: This type of user will be responsible to manage whole site & also content that will be published in site. This type of users will be given special training for doing this if required.
Registered User : This type of user will be able to visit our site and navigate to different pages to get information they will not be able to change any content on website .They will be able to give feedback for improvement of website.
3.2 Hardware and Software Requirements.Minimum software and hardware requirements to run our system are as follows.3.2.1 Hardware requirements:The system should have these hardware requirements:The processor should be at least Pentium 3 or aboveThe processor speed should be greater than 400 MHzThe video device should support graphics Ram should be or greater than 120 mb
3.2.2 Software requirements: Any operating System (windows XP sp2, Vista, etc.) Sql Server 2005 as dbms for managing databaseVisual studio 2008
3.3 Constraints 3.3.1 Hardware LimitationsThere must be a 64 MB on board memory3.3.2 Interfaces to Other ApplicationsNot applicable.3.3.3 Higher Order Language RequirementsASP 3.0 (Language C#)3.3.4 Reliability Requirements
9L.J. Institute of Engineering and Technology
INTRODUCTION
Our system will require a reliable web server which has minimum downtime so that our website is up & running for maximum amount of time .There should be proper facilities available for regular backups.
3.3.5 Safety and Security Consideration Basic security mechanism which prevents any unauthorized access to the system must be implemented and a mechanism to trace any unauthorized access should be there also the log of users who visited our site must be maintained time to time.
3.4 Assumptions and DependenciesRegulatory policies: It is a mandatory that no text book must be left empty or contains insufficient data.Hardware limitations: There must be a 64 MB on board memoryControl functions: The software must be very user-friendly and display appropriate error messages.Interfaces to other applications: Not applicable.Parallel operations: It must support many users simultaneously.Reliability requirements: Data redundancy and use of special/blank characters must be avoided.Safety/security considerations: The application must be exited always normally.Higher order language requirements: ASP 3.0 (Language C#)
10L.J. Institute of Engineering and Technology
INTRODUCTION
4. SYSTEM ANALYSIS
4.1 Study of Current System To update any content or any part of site it requires using FTP and changing the content manually.
4.2 Problem and Weaknesses of Current System The current system has following weaknesses.
1) User interface is not up to professional mark.
4.3 Requirements of New System4.3.1 User Requirements
User requirement are specifies requirement of the user of the system. The user requirements are:
User can register and make an account. For that user has to fill up the registration form and submit the information to the database.
User searches for other user profiles from the homepage without registering using simple search. User can also search after logging in to his account for more detailed information.
User can give feedback about the site using feedback option, which can be after read by the administrator.
4.3.2 System Requirements
Facility to delete profile after admin login. Easy to use for guest & admin users. Should work efficiently even on slow internet connections. Dynamic contents like success story etc are expected.
11L.J. Institute of Engineering and Technology
INTRODUCTION
For Object Oriented Approach.
4.4 Class Diagram:
12L.J. Institute of Engineering and Technology
INTRODUCTION
4.5 Use Case Diagram:
Fig.4.2 Use case Diagram
13L.J. Institute of Engineering and Technology
INTRODUCTION
4.6 Sequence and Collaboration Diagram:
14L.J. Institute of Engineering and Technology
INTRODUCTION
15L.J. Institute of Engineering and Technology
INTRODUCTION
16L.J. Institute of Engineering and Technology
INTRODUCTION
17L.J. Institute of Engineering and Technology
INTRODUCTION
18L.J. Institute of Engineering and Technology
INTRODUCTION
19L.J. Institute of Engineering and Technology
INTRODUCTION
20L.J. Institute of Engineering and Technology
INTRODUCTION
4.7 Data Flow Diagram
21L.J. Institute of Engineering and Technology
INTRODUCTION
4.8 ER Diagram
22L.J. Institute of Engineering and Technology
INTRODUCTION
4.9 Activity Diagram
Activity diagram for registration
23L.J. Institute of Engineering and Technology
INTRODUCTION
Activity diagram for user login
4.10 Features of New System.The new system that is expected to replace this application is expected to have much more features and good design.
The user interface is expected to be of professional level, users shall be able to give their opinions in the Feedback consol and some dynamic contents are also expected to be added.
24L.J. Institute of Engineering and Technology
INTRODUCTION
5. SYSTEM DESIGN
5.1 Database Design/Data Structure Design
5.1.1 Table and Relationship :
25L.J. Institute of Engineering and Technology
INTRODUCTION
5.2 Input Output & Interface Design:5.1.2 Samples of Forms Reports & Interface
Home page:
Registration Form:
26L.J. Institute of Engineering and Technology
INTRODUCTION
Contact us:
Feedback Form:
27L.J. Institute of Engineering and Technology
INTRODUCTION
About us:
User profile:
28L.J. Institute of Engineering and Technology
INTRODUCTION
Search:
29L.J. Institute of Engineering and Technology
INTRODUCTION
5.3 State chart diagram
State chart diagram for registration
State chart diagram for user login
30L.J. Institute of Engineering and Technology
INTRODUCTION
6. IMPLEMENTATION PLANNING
6.1 Implementation Environment (Single vs Multi user, GUI vs
Non GUI)As the application is stand-alone application so there is a no multi user for our application rather than a single user .User can do information entry whenever required and uses different utilities and for that, a better GUI application is needed.
6.2 Program/Modules Specification The main modules of the system are:
RegistrationIn this module user can register a new account.
LoginHere the user can log in to his/her account by inserting his/her user id and password and see his profile page.
Update ProfileUser uses this module to update previously inserted information in profile.
SearchIn this module a user can search another user profiles by inserting appropriate user keywords.
Give FeedbackUser can give feedback about the site in this module.
Delete ProfileThis module is for the administrator. Administrator can delete some specific users’ profiles which have been noticed as fake profiles.
View FeedbackIn this module administrator can read the feedbacks given by the users.
6.3 Security FeaturesWe have basically two types of user with different accessibility rights. They are at
are administrator and the Members. All have their own username and password and all users have different rights to use an application.
There is account lockout policy to protect user’s account. If maximum number of wrong password is made within a specified time window then the account will be locked and will be unlocked by administrator by request.
31L.J. Institute of Engineering and Technology
INTRODUCTION
6.4 Coding StandardsClasses - Class names should always be a noun and, again, should be meaningful. Avoid verbs.class Search{ . . . }
Methods - Always use a verb-noun pair, unless the method operates on its containing class, in which case, use just a verb.public void GetPath();
Methods with return values - The name should reflect the return value.public int GetImageWidth(Bitmap image);
Variables - Do not abbreviate variable names. Variable names should again be descriptive and meaningful.int quantityCount = 0;int index = 0;string temp = "";Pascal Casing - Use PascalCasing for classes, types, methods and constants.public class Search{ public void BookName ();}
32L.J. Institute of Engineering and Technology
INTRODUCTION
7. TESTING
7.1 Testing PlanSimilar to the project plan, due to confidentiality issues, we cannot provide details test
plan to the development team. We will still add the core components that make up our
test plan.
7.2 Testing StrategyA typical screen in asp.net is tested at four levels before it goes for production.
Level 1 is generally the work to be tested by other developers or other interns (this is
typical first level of testing where focus is not on requirement but end user testing) Ratio:
0% end user: 100% Technical
Level 2 is level where a senior programmer comes into the testing cycle of the screen that
was unit tested by the developer in this phase the onus is to test software for technical
requirements specified.
Ratio: 80% Technical: 20% end user
Level 3 is where a tester will come into picture. The tester will test the software for both
end user as well as technical point of view.
The ratio here is: 50% Technical: 50% end user
Level 4 is where we make the code at Release-Ready. Here screen is tested to the core
and each and every standard must be followed and verified.
Ratio here is: 80% User Testing – 20% Technical
This allows us to text a screen at four levels and at the end of four weeks when the screen
goes to production, it is generally bug free because more people have looked at this
screen from different viewpoints.
Unit Testing
Black box and white box testing. Module interfaces are tested for proper information flow. Local data are examined to ensure that integrity is maintained.
33L.J. Institute of Engineering and Technology
INTRODUCTION
Boundary conditions are tested. Basis path testing should be used. All error handling paths should be tested. Drivers and/or stubs need to be developed to test incomplete software.
Integration Testing
Top-down integration testing
Main control module used as a test driver and stubs are substitutes for components directly subordinate to it.
Subordinate stubs are replaced one at a time with real components (following the depth-first or breadth-first approach).
Tests are conducted as each component is integrated. On completion of each set of tests and other stub is replaced with a real
component. Regression testing may be used to ensure that new errors not introduced.
Bottom-up integration testing
Low level components are combined in clusters that perform a specific software function.
A driver (control program) is written to coordinate test case input and output. The cluster is tested. Drivers are removed and clusters are combined moving upward in the program
structure.
7.3 Testing MethodsTesting presents an interesting anomaly for the software engineering activities, the
engineer attempts to build software from an abstract concept to a tangible product. Now
comes testing. The engineer creates a series of test case that are initiated to "demolish"
the software that has been build.
Models of Testing:-
There are different Models of testing. On the basis of testing methods there are
two types of testing:
1. Black-box testing
2. White-box testing
34L.J. Institute of Engineering and Technology
INTRODUCTION
White-box testing
There exist several popular white-box testing methodologies:
Statement coverage Branch coverage Path coverage Condition coverage Mutation testing Data flow-based testing
Statement coverage
Statement coverage methodology focuses on, designing test cases so that,
Every statement in a program is executed at least once. No statement in the program should remain unreachable.
Branch coverage
Test cases are designed such that, different branch conditions
Give true and false values in some execution. All branches are traversed.
Branch testing guarantees statement coverage. It is a stronger testing compared to the
statement coverage-based testing.
Path coverage
Design test cases such that, all linearly independent paths (LIP) in the program are
executed at least once. To understand the path coverage-based testing we need to learn
how to draw control flow graph of a program.
A control flow graph (CFG) describes,
The sequence in which different instructions or statements of a program get executed.
The way control flows through the program.
Condition coverage
Test cases are designed such that, each component of a composite conditional expression
It help us to,
Gives both true and false values.
To check for all combination of conditions.
35L.J. Institute of Engineering and Technology
INTRODUCTION
Black Box Testing:
Equivalence Partitioning
Black-box technique that divides the input domain into classes of data from which test cases can be derived an ideal test case uncovers a class of errors that might require many arbitrary test cases to be executed before a general error is observed
Equivalence class guidelines: If input condition specifies a range, one valid and two invalid equivalence classes are
defined If an input condition requires a specific value, one valid and two invalid equivalence
classes are defined If an input condition specifies a member of a set, one valid and one invalid
equivalence class is defined If an input condition is Boolean, one valid and one invalid equivalence class is
defined
Boundary Value Analysis
Black-box technique that focuses on the boundaries of the input domain rather than its
center
BVA guidelines: If input condition specifies a range bounded by values a and b, test cases should
include a and b, values just above and just below a and b If an input condition specifies and number of values, test cases should be exercise the
minimum and maximum numbers, as well as values just above and just below the minimum and maximum values
Apply guidelines 1 and 2 to output conditions, test cases should be designed to produce the minimum and maxim output reports If internal program data structures have boundaries (e.g. size limitations), be certain to test the boundaries
7.4 Test CasesCase 1. Admin Login
Condition Action
Correct user and correct Password Accepted
Correct user and incorrect Password Rejected
Incorrect user and incorrect Password Rejected
Incorrect user and correct Password Rejected
Table 7.1 Admin Login Test Case
36L.J. Institute of Engineering and Technology
INTRODUCTION
Case 2. E-mail id Validation
Condition Action
Correct e-mail id Accepted
Correct email id & incorrect length Rejected
Incorrect email id & correct length Rejected
Table 7.2 E-mail id validation Test Case
Case 3. User Validation
Condition ActionUnique username, password length more than 6 character and unique and valid Email Id.
Accepted
Conflicted username, password length more than 6 character and unique and valid Email Id.
Rejected
Unique Username, password length less than 6 character and unique and valid Email Id.
Rejected
Unique Username, password length more than 6 character and conflicted or invalid Email Id.
Rejected
Table 7.3 Create User Test Case
37L.J. Institute of Engineering and Technology
INTRODUCTION
8. USER MANUAL Registration
In this module user can register a new account. For this user has to first select the registration option from the home page and then fill up the registration form. In the registration form there are some details about his/her personal information.
LoginHere the user can log in to his/her account by inserting his/her user id and password and see his profile page. Here the user can perform operations like update profile, print profile, etc.
Update ProfileUser uses this module to update previously inserted information in registration form or his/her profile data. Here user has to simply update the field he wants to change and press the update button.
SearchIn this module a user can search another user profiles by inserting appropriate user keywords. We have provided two types of search. User can use simple search to search profiles from the home page. In simple search user don’t need to login to his/her account. In other way the user can login to his/her account and use the search functionality provided into his/her profile.
Give FeedbackThis functionality allows the user to give feedback about the website, which can after be read by the administrator. User has to select give feedback option for that and then he/she has to enter his/her name, email and his feedback about the website. Then he has to simply submit the feedback.
Delete ProfileThis module is specifically designed for the administrator. Administrator can delete some specific users’ profiles which have been noticed as fake profiles. For this administrator has to login to administrator account. Here administrator can see all the details of users’ accounts. Administrator has to just click the delete option in left of the profile details.
View Feedback
38L.J. Institute of Engineering and Technology
INTRODUCTION
This functionality is also designed for the administrator. Here administrator can see the feedback given by the users and he can make changes according to the requirements of the users.
Change Password
Using this function a user can change the password for his/her account. For that he has to select the change password option in the profile.
Forgot PasswordThis function is used when some user has forgotten his/her password and wants to retrieve the password. For this user has to select the forgot password option from the homepage. Here the page requests the security question of the user and corresponding answer to the question. Then this security question and answer are matched in the database. If it matches the password is displayed on the screen.
Change Photo
Using this function user can change the previously updated photo in the profile. For this user has to select the change photo option in the profile and then browse the photo from the his/her computer. User can also crop the photo and then upload the photo.
39L.J. Institute of Engineering and Technology
INTRODUCTION
9. LIMITATION AND FUTURE ENHANCEMENT
Limitation:
Still this application has got its limitations like limited functionality and
somewhat week graphical front end; this is due to lack of time and experience with the
developers.
The current system cannot provide paid membership.
Future Enhancement:
It is possible to provide the web space to the users for creating his portal.
It is possible to create our own mail server.
It is possible to create chat server so that user can communicate with each other.
It is possible to provide facility like create video album.
40L.J. Institute of Engineering and Technology
INTRODUCTION
10. CONCLUSION AND DISCUSSION
10.1 Self Analysis of Projects ViabilityEvery project work, does not matter software project or any other project, could
not be the result of sole effort; even though, developer team consists three member. We think success of any project doesn’t depend only on better software development skills, but also, zeal to listen and help the users. Only user interaction at development phase can give you an idea to fulfill their requirements. Because, software product is of developer’s up to the development or installation phase, but then after it is of user’s. We experienced that do make the software for users not for fame of being better programmer or software developer. Ultimately, users appraise your efforts not your peers.
10.2 Summary of Project WorkWe have completed our project work based on using software engineering and
system analysis and design approach. Work that we have done with preplanning scheduling related with time constrains and result oriented progress in project development.
Our project starts in second week of January and completed this project at the end of April. Initially, there were some problem regarding some phases but we have planned to resolve those problems. We have divided our work in different phases and solved problems and difficulties.
11. REFERENCES Books
41L.J. Institute of Engineering and Technology
INTRODUCTION
ASP.NET(Black Book). Professional ASP.NET(Wrox Publication). ASP.NET Complete Reference. Software engineering Concepts By Roger S.Presman Fundamentals of Software Engineering By Rajib Mall SQL Server 2005 (Wrox Publication).
Web Sites www.bharatmatrimonial.com www.shaadi.com www.jeevansathi.com www.simplymarry.com
42L.J. Institute of Engineering and Technology
top related