Post on 19-Jan-2016
description
Six week summer Training CSE
REPORT ON ALUMNI ASSOCIATION OF SUSCET
Tangori (MOHALI)
(FRONT-END=ASP.NET USING C# LANGUAGE, BACK-END=SQL 2005)
Six Months Industrial Training ReportAt
Royal Institute,Patiala
Submitted in partial fulfillment of the requirements for the award of degree of
BACHELOR OF TECHNOLOGYIN
COMPUTER SCIENCE & ENGINEERING
SUBMITTED TO: SUBMITTED BY:
Dr. Dheerendra Singh Deepanshu KeharHOD CSE 100690309847
100690309847 1 Deepanshu Kehar
Six week summer Training CSE
ACKNOWLEDGEMENT
It gives me immense pleasure to express my deep sense of gratitude to Er. Pertik Garg who
gave me the opportunity to undertake training in his institute. I have appreciation and regards for
his constant encouragement, constructive criticism and sympathetic understanding through out
the course of this training.
I would like give my special thanks to Dr. Dheerendra Singh for guiding me through out the
course of training and providing the crucial knowledge and help required for completion of my
project.
I also extent my warm thanks to my parents, my college staff and institute faculty, who always
encouraged me to work earnestly during the project work.
Deepanshu Kehar
100690309847 2 Deepanshu Kehar
Six week summer Training CSE
INDEX
Sr.No PARTICULARS PAGE NO.
1.Abstract of the project 6,7
2.Project Plan 8
2.1 System 8
3.Product Definition
9
3.1 Problem Statement 93.2 Acceptance Criterion 10
4.Programming Language And Tools 11
4.1 Overview of the .NET Framework 114.2 Features of CLR 114.3 Introduction to ASP.NET 124.4 ASP.NET Compatibilty 13-154.5 Introduction to C# 16-184.6 Microsoft SQL server 18-23
5.Introduction to project
24
5.1 Tables for all the modules 25-275.2 Database Design 28
5.3Hardware & Software Requirements
29
6 Flowchart of the project 307. Application of work 318. Output Screen 32-469. Bibliography 47
OBJECTIVE AND SCOPE OF THE TRAINING
100690309847 3 Deepanshu Kehar
Six week summer Training CSE
OBJECTIVES
It is a community site developed for pass out students.
This website works an interface or bridge among the students.
Through this website, students upload their complete information.
This site helps the students (friends) to share their views by sending scraps.
This site works as an informative site for the pass out students who want updated information
from their college.
This online project working as an entertainment site as student uploads the photograph to
remember their beautiful memories.
This site helpful to the college to collect complete information about the students who are
working in different locations at different companies.
This project helpful for junior students to provide guidance regarding placement, training
from their seniors who have already passed out.
SCOPES
Communities or departments can also be added in this web application.
100690309847 4 Deepanshu Kehar
Six week summer Training CSE
One can send the scraps in groups to which there are some no. of students are added.
The student can even change his/her photos by selecting image in this web application.
For the security purpose of the password, administrator sends the password of his choice to
the student through email to his /her main account that is going to be registered on the site
means it requires validation also. If he/she is present in the bgiet institute, then only the
student will be registered otherwise not.
100690309847 5 Deepanshu Kehar
Six week summer Training CSE
1. ABSTRACT OF THE PROJECT
For the last few years, the Internet has become increasingly commercialized into a worldwide
information super network. Internet is a business and marketing tool having the competitive
advantage in providing better customer service. It is a communication network that bridges the
entire small computer networks world wide as a whole.
Intranet is based on Internet technology, in particular World Wide Web (WWW) to build
information systems within organization or enterprise to accomplish standardization and
automation. It allows a certain organization to build a GroupWare within web environment at low
cost on top of existing network infrastructure.
Intranet Mail Server provides a very effective user interface through which the user can control
and configure the working of the server. It provides authorized access with password, changing
the existing password, configuring the server, displaying the status of mail reception and local
delivery of the server.
100690309847 6 Deepanshu Kehar
Six week summer Training CSE
HARDWARE REQUIREMENTS: The lists of the hardware used currently for the
project are:
Processor : Pentium III
RAM: 128 MB
HARD DISK DRIVE: 20 GB
CD ROM: 42X
Floppy Disk Drive: 1.44”
Monitor: 15” color
Keyboard: Standard 110 keys
Mouse: Scroll
Network Adapter: Internal Ethernet Card
SOFTWARE REQUIREMENTS: The lists of the software used currently for the project
are:
Platform: Microsoft Windows XP
Front End:
Development:
Environment: Microsoft .Net Framework
Application: ASP.Net C#
100690309847 7 Deepanshu Kehar
Six week summer Training CSE
2. PROJECT PLAN
2.1. SYSTEM
The term system is derived from the Greek word ‘Systema’ which means an organized
relationship among functioning units or components. A system exists because it is designed to
achieve one or more objectives.
A system is an orderly grouping of interdependent components linked together according to a
plan to achieve a specific objective.
The study of system concepts has three implications:
1. A system must be designed to achieve a predetermined objective
2. Interrelationships and interdependence must exist among the components
3. The objectives of the organization as the whole have a higher priority than the objective of its
subsystem.
SYSTEM DEVELOPMENT is a process which consists of two major steps:
- SYSTEM ANALYSIS
- SYSTEM DESIGN
100690309847 8 Deepanshu Kehar
Six week summer Training CSE
3. PRODUCT DEFINITION
3.1. PROBLEM STATEMENT
Problem statement was to design a module:
Which will be user friendly?
Which will restrict the user from accessing other user’s data?
Which will help the client in viewing his data and privileges?
Which will help the administrator to change the data of any Student?
In which further additions can be made without changing its design drastically.
Another problem was that the data should be accessed from the administrator and accordingly
changes should be made on the data by the administrator only.
FUNCTIONS TO BE PROVIDED
The various features that the proposed system possesses will be:
The system will be user friendly and completely menu-driven so that users shall have no
problem in using all the options .The system will be efficient and fast in response by
careful programming.
The system will be customized according to the needs of the organization.
It will provide overall security to database both from user as well as administrator side.
100690309847 9 Deepanshu Kehar
Six week summer Training CSE
3.2. ACCEPTANCE CRITERIA
Before designing/developing a new system, it is important to establish the acceptance criteria so
that it can be evaluated according to this criterion.
The performance requirements are:
User Friendly: The designed system should be user friendly, understandable and easy to use so
that even the novice user can easily learn to use the system.
Flexibility: It should be flexible in nature to allow likely changes and alteration in the near
future.
Error handling: The system must give response to errors in clear and precise manner as soon as
an error has occurred.
Integrity: The results produced by the system should be accurate and reliable.
Functional and performance specifications: The performance of the required system should be
good and should fulfill the required functional specifications.
100690309847 10 Deepanshu Kehar
Six week summer Training CSE
4. PROGRAMMING LANGUAGE & TOOLS
4.1. OVERVIEW OF THE .NET FRAMEWORK
The .NET Framework is a new computing platform that simplifies application development in the
highly distributed environment of the Internet. The .NET Framework is designed to fulfill the
following objectives:
To provide a consistent object-oriented programming environment whether object code is
stored and executed locally, executed locally but Internet-distributed, or executed
remotely.
To provide a code-execution environment that minimizes software deployment and
versioning conflicts.
To provide a code-execution environment that guarantees safe execution of code,
including code created by an unknown or semi-trusted third party.
To provide a code-execution environment that eliminates the performance problems of
scripted or interpreted environments.
To make the developer experience consistent across widely varying types of applications,
such as Windows-based applications and Web-based applications.
To build all communication on industry standards to ensure that code based on the .NET
Framework can integrate with any other code.
4.2 . FEATURES OF CLR
.NET Framework has two main components: the Common Language Runtime and the .NET
Framework class library. The common language runtime is the foundation of the .NET
Framework. You can think of the runtime as an agent that manages code at execution time,
providing core services such as memory management, thread management, and remoting, while
also enforcing strict type safety and other forms of code accuracy that ensure security and
robustness.
100690309847 11 Deepanshu Kehar
Six week summer Training CSE
4.3. INTODUCTION TO ASP.NET
ASP.NET is Microsoft’s latest Web development platform. Although ASP.NET has some similarities with the previous version, named ASP (Active Server Pages), ASP.NET has been completely redesigned based on the .NET Framework. Web Forms is the design component of ASP.NET that allows you to create and manage Internet user interfaces, commonly called Web pages or (in a more comprehensive sense) Web applications. By using Web Forms, you can create a Web application that displays a user interface, processes data, and provides many of the commands and features that a standard application for Microsoft Windows might offer.
To create a Web application in Visual Basic .NET, you create a new ASP.NET Web Application project in the Visual Studio development environment, and then use the Web Forms Designer to build one or more Web Forms that will collectively represent your program. Each Web form consists of two pieces—a Web Forms page and a code-behind file. The Web Forms page contains HTML and controls to create the user interface. The code-behind file is a code module that contains program code that “stands behind” the Web Forms page. This division is conceptually much like Windows Forms you’ve been creating in Visual Basic—there’s a user interface component and a code module component. The code for both of these components can be stored in a single .aspx file, but typically the Web Forms page code is stored in an .aspx file and the code-behind file is stored in an .aspx.vb file.
Web Forms is a new programming model for Internet user interfaces based on ASP.NET, the Microsoft Visual Studio .NET Framework component designed to provide state-of-the-art Internet functionality. Web Forms is a replacement for Web Classes and the DHTML Page Designer in Visual Basic 6, and it’s distinct from the Windows Forms components that you’ve used for most of the projects. There’s enough in common between Web Forms and Windows ASP.NET provides a programming model and infrastructure that offers the necessary services for programmers to develop web-based applications. Because ASP.NET is part of the .NET Framework, programmers can use the managed Common Language Runtime (CLR) environment, type safety, inheritance etc. to create web-based applications. Visual C#, or JScript.NET. ASP.NET code is compiled rather than interpreted, which permits early binding, strong typing, and just-in-time (JIT) compiling to native code.
In ASP.NET, deplopment is as simple as copying a component assembly to its desired location. ASP.NET configuration settings are stored in XML-based files, which are human-readable and -writable. ASP.NET automatically applies new configuration settings to web resources whenever it finds any changes to configuration files, without rebooting the server.
There are two core programming models when developing an ASP.NET application:
Web forms Web Services
4.4. ASP.NET Compatibility
ASP is a Microsoft Technology
100690309847 12 Deepanshu Kehar
Six week summer Training CSE
To run IIS you must have Windows NT 4.0 or later To run PWS you must have Windows 95 or later Chili ASP is a technology that runs ASP without Windows OS Instant ASP is another technology that runs ASP without Windows
The Properties Window Use the Properties window to change the characteristics, or property settings, of the user interface elements on a form. A property setting is a quality of one of the objects in your user interface (With Visual Studio .NET, you can display text in any font installed on your system, just as you would in Excel or Word.). You can add program code via the Code Editor to change one or more property settings while your program is running.
Moving and Resizing the Programming Tools
With numerous programming tools to contend with on the screen, the Visual Studio development environment can become a pretty busy place. To give you complete control over the shape and size of the elements in the development environment, Visual Studio lets you move, resize, dock, and auto hide most of the interface elements that you use to build programs.
If you ever want to completely close a window, click the Close button in the upper right corner of the window. You can always open the window again later by clicking the appropriate command on the View menu. If you want an option somewhere between docking and closing a window, you might try auto hiding a tool window to the side of the Visual Studio development environment by clicking the tiny Auto Hide pushpin button on the right side of the tool’s title bar. This action places the title of the tool at the edge of the development environment in a tab that is quite unobtrusive. When you perform the auto hide action, you’ll notice that the tool window will still be visible as long as you keep the mouse in the area of the window. When you move the mouse to another part of the development environment, the window will slide out of view.
ASP.NET File Types
.aspx .ascx
.asmx
.cs
.resx
Global.asax
Web.config
100690309847 13 Deepanshu Kehar
Six week summer Training CSE
.NET
.NET is the Microsoft Web services strategy to connect information, people, systems, and devices through software. Integrated across the Microsoft platform, .NET technology provides the ability to quickly build, deploy, manage, and use connected, security-enhanced solutions with Web services. .NET-connected solutions enable businesses to integrate their systems more rapidly and in a more agile manner and help them to realize the promise of information anytime, anywhere, on any device. The Microsoft platform includes everything a business needs to develop and deploy a Web service-connected IT architecture: servers to host Web services, development tools to create them, applications to use them, and a worldwide network of more than 35,000 Microsoft Certified Partner organizations to provide any help you need.
What’s New in .NET?
If you’re experienced with Visual Basic 6, you’ll notice some new features in .NET, including the following:
A new Internet programming model called Web Forms, which is part of ASP.NET. Web Forms and the Web Forms Designer are a replacement for the Visual Basic 6 Web Classes and DHTML Page Designer, which are no longer supported in Visual Basic .NET.
Although the Web Forms Designer is distinct from the Windows Forms Designer, both user interface tools offer similar controls and support drag-and-drop programming techniques. Because the Web Forms Designer is part of Visual Studio .NET, it’s available to Visual Basic .NET, Microsoft Visual C# .NET, and Microsoft Visual J# .NET.
Web Forms applications are designed to be displayed by Web browsers such as Internet Explorer. The controls on Web Forms are visible in the client’s Web browser (in other words, on the end-user’s computer), but the functionality for the controls resides on the Web server that hosts the actual Web application.
Although many of the Web Forms controls have the same names as the Windows Forms controls, the controls aren’t identical. For example, Web Forms controls have an ID property, rather than a Name property.
Web forms Server controls Web services Caching Configuration improvements State management improvements Security Mobile web application support
100690309847 14 Deepanshu Kehar
Six week summer Training CSE
4.5. INTRODUCTION TO C#
A new member of visual studio family, c# is a descendent of the c language. It’s much like c++, but designed with greater simplicity and ease of use in mind. It’s far easier than c++ and provides nearly all of the power available to c++ developers. It also doesn’t require you to manage the allocation and deallocation of memory, as c++ does. All of the m/m management is taken care of the CLR. This is an important advantage because memory management is one of the troublesome areas of c++ development and is responsible for many application crashes.
VISUAL SUDIO .NET IDE
The Visual Studio.NET environment includes a wide array of tool windows, toolbars and menus to provide developers with a great deal of flexibility in performing development tasks.
IDE Enhancements
The new enhancements we‘ll find in Visual Studio.NET include the following:
Start page: The start page is the default page that displayed each time you start visual studio.NET.
Multilanguage IDE: Unlike visual studio 6, which used diff. IDE’s for each programming language (although Microsoft visual Interdev and Microsoft visual J++ shared an IDE).
Command Window: Lets you execute visual studio command or code statements, depending on the mode of window.
Tabbed documents: Designed to specify the management of multiple file being edited simultaneously. It allow u to see all of the files you r editing at once.
Auto hide: my personal favorite, auto hide works much like the features of the same name in the windows toolbars.
NEW FEATURES
XML editor Dynamic help Support for window installer
IDE Windows
Designer/source editor Solution explorer Class view Server explorer
100690309847 15 Deepanshu Kehar
Six week summer Training CSE
Properties The visual studio.Net toolbox Task list Output
HTML Controls
The HTML controls are a set of older user interface controls that are supported by most Web browsers and conform closely to the early HTML standards developed for managing user interface elements on a typical Web page. They include Button, Text Field, and Checkbox—useful base controls for managing information on a Web page that can be represented entirely with HTML code. Indeed, you might recognize these controls if you’ve coded in HTML before or if you’ve had some experience with the Visual Basic 6 DHTML Page Designer.
Web Forms Controls
Web Forms controls offer more features and capabilities than HTML controls. Web Forms controls are more capable than HTML controls and function in many ways like the Windows Forms controls. Indeed, many of the Web Forms controls have the same names as the Windows Forms controls and offer many of the same properties, methods, and events. In addition to simple controls such as Button, Textbox, and Label, more sophisticated controls such as Data Grid, Calendar, and RequiredFieldValidator are also provided.
Using the Web Forms Designer
Unlike a Windows Form, a Web Forms page can have text added directly to it when it’s in flow layout mode in the Web Forms Designer. In flow layout mode, text appears in top-to-bottom fashion as it does in a word processor such as Microsoft Word. You can type text in flow layout mode, edit it, and then make formatting changes by using the Formatting toolbar. Manipulating text in this way is usually much faster than adding a Web Forms Label control to the Web page to contain the text.
Writing Event Procedures for Web Forms Controls
You write event procedures (or event handlers) for controls on a Web Forms page by double-clicking the objects on the Web Forms page and typing the necessary program code in the Code Editor. Although the user will see the controls on the Web Forms page in his or her own Web browser, the actual code that’s executed is located on the Web server and is run by the Web server. When the user clicks a button, for example, the browser typically sends the button click event back to the server, which processes the event and sends a new Web page back to the browser.
Creating a Link to another Web Page\
If your Web application will feature more than one Web page, you might want to use the Hyperlink control on the Web Forms tab of the Toolbox to let your users jump from the current Web page to a new one. The Hyperlink control places a hyperlink, which the user can click to
100690309847 16 Deepanshu Kehar
Six week summer Training CSE
display another Web page, on the current Web page. When you use a Hyperlink control, you specify the text that will be hyperlinked, and you specify the desired resource to display (either a URL or a local path) by using the Navigate Url property.
DATABASE
Databases are designed to offer an organized mechanism for storing, managing and retrieving information. They do so through the use of tables. If you’re familiar with spreadsheets like Microsoft Excel, you’re probably already accustomed to storing data in tabular form. It’s not much of a stretch to make the leap from spreadsheets to databases. Let’s take a look.
Database Tables
Just like Excel tables, database tables consist of columns and rows. Each column contains a different type of attribute and each row corresponds to a single record.
Databases and Spreadsheets
At this point, you’re probably asking yourself an obvious question – if a database is so much like a spreadsheet, why can’t I just use a spreadsheet? Databases are actually much more powerful than spreadsheets in the way you’re able to manipulate data. Here are just a few of the actions that you can perform on a database that would be difficult if not impossible to perform on a spreadsheet:
Retrieve all records that match certain criteria. Update records in bulk. Cross-reference records in different tables. Perform complex aggregate calculations.
4.6. Microsoft SQL Server
Microsoft SQL Server is a powerful relational database management system catering to high-end users with advanced needs. Along with Oracle, Microsoft SQL Server is widely regarded as one of the two main full-featured database systems on the market today. The structured query language is an industry-standard language used for manipulation of data in a relational database. The major SQL commands of interest to database users are SELECT, INSERT, JOIN and UPDATE.
SQL
Most large-scale databases use the structured query language (SQL) to facilitate user and administrator interactions. This language offers a flexible interface for databases of all shapes and sizes. The first important point to make is that database transactions are made in SQL, whether you realize it or not.
100690309847 17 Deepanshu Kehar
Six week summer Training CSE
There are also quite a few third-party applications that interact with different databases. The front-end translates your mouse clicks and text entries into SQL and then “speaks” to the database in the universal language of SQL.
DDL and DML
SQL commands can be divided into two main sub languages. The Data Definition Language (DDL) contains the commands used to create and destroy databases and database objects. After the database structure is defined with DDL, database administrators and users can use the Data Manipulation Language (DML) to insert, retrieve and modify the data contained within it.
Data Definition Language
The Data Definition Language (DDL) is used to create & destroy databases and database objects. These commands will primarily be used by database administrators during the setup and removal phases of a database project. Let's take a look at the structure and usage of four basic DDL commands:
CREATE
Installing a database management system (DBMS) on a computer allows you to create and manage many independent databases. For example, you may want to maintain a database of customer contacts for your sales department and a personnel database for your HR department.The CREATE command can be used to establish each of these databases on your platform .For example, the command:
CREATE DATABASE employees
creates an empty database named "employees" on your DBMS. After creating the database, your next step is to create tables.
CREATE TABLE personal_info (first_name char (20) not null, last_name char (20) not null, employee_id int not null)
establishes a table titled "personal_info" in the current database. In our example, the table contains three attributes: first_name, last_name and employee_id.
USE
The USE command allows you to specify the database you wish to work within your DBMS. For example, if we're currently working in the sales database and want to issue some commands that
100690309847 18 Deepanshu Kehar
Six week summer Training CSE
will affect the employee’s database; we would preface them with the following SQL command:
USE employees
ALTER
Once you've created a table within a database, you may wish to modify the definition of it. The ALTER command allows you to make changes to the structure of a table without deleting and recreating it. For Example:
ALTER TABLE personal_infoADD salary money null
This example adds new attribute to personal_info table -- an employee's salary. The "money" argument specifies that an employee's salary will be stored using a dollars & cents format &"null" keyword tells the database that it's OK for this field to contain no value for given employee.
DROP
The final command of the Data Definition Language, DROP, allows us to remove entire database objects from our DBMS. For example, if we want to permanently remove the personal_info table that we created, we'd use the following command:
DROP TABLE personal_info
similarly, the command below would be used to remove the entire employees database:
DROP DATABASE employees
Use this command with care. Remember that the DROP command removes entire data structures from your database. If you want to remove individual records, use the DELETE command.
Data Manipulation Language
The Data Manipulation Language (DML) is used to retrieve, insert and modify the database information. These commands will be used by all database users during the routine operation of database.INSERT
The INSERT command in SQL is used to add records to an existing table. Returning to the personal_info example from the previous section, let's imagine that our HR department needs to add a new employee to their database. They could use a command similar to the one shown below:
100690309847 19 Deepanshu Kehar
Six week summer Training CSE
INSERT INTO personal_infovalues ('bart','simpson', 12345, $45000)
Note that there are four values specified for the record. These correspond to the table attributes in the order they were defined: first_name, last_name, employee_id, and salary.
SELECT
The SELECT command is the most commonly used command in SQL. It allows database users to retrieve the specific information they desire from an operational database. Let's take a look at a few examples, again using the personal_info table from our employees database.
The command shown below retrieves all of the information contained within personal_info table. The asterisk is used as a wildcard. This means "Select everything from the personal_info table."
SELECT * FROM personal_info
Finally, the WHERE clause can be used to limit the records that are retrieved to those that meet specified criteria. The CEO might be interested in reviewing the personnel records of all highly paid employees. The following command retrieves all of the data contained within personal_info for records that have a salary value greater than $50,000:
SELECT *FROM personal_info WHERE salary > $50000
UPDATE
The UPDATE command can be used to modify information contained within a table. Each year, our company gives all employees a 3% cost-of-living increase in their salary. The following SQL command could be used to quickly apply this to all of the employees stored in the database:
UPDATE personal_info SET salary = salary * 1.03
DELETE
Finally, let's take a look at the DELETE command. You'll find that the syntax of this command is similar to that of the other DML commands. Unfortunately, our latest corporate earnings report didn't quite meet expectations and poor Bart has been laid off. The DELETE command with a WHERE clause can be used to remove his record from the personal_info table:
DELETE FROM personal_info WHERE employee_id = 12345
100690309847 20 Deepanshu Kehar
Six week summer Training CSE
Primary Keys
The first type of key we’ll discuss is the primary key. Every database table should have one or more columns designated as the primary key. The value this key holds should be unique for each record in the database. For Eg, assume we have a table called Employees that contains personnel information for every employee in our firm. We’d need to select an appropriate primary key that would uniquely identify each employee. Your first thought might be to use the employee’s name.
This wouldn’t work out very well because it’s conceivable that you’d hire two employees with the same name. A better choice might be to use a unique employee ID number that you assign to each employee when they’re hired. Some organizations choose to use Social Security Numbers for this task because each employee already has one and they’re guaranteed to be unique. However, use of Social Security Numbers for this purpose is highly controversial due to privacy concerns once you decide upon a primary key and set it up in the database, the database management system will enforce the uniqueness of the key. If you try to insert a record into a table with a primary key that duplicates an existing record, the insert will fail.
Foreign Keys
The other type of key that we’ll discuss is the foreign key .These keys are used to create relationships between tables. Natural relationships exist between tables in most database structures. Returning to our employees database, let’s imagine that we wanted to add a table containing departmental information to the database. This new table might be called Departments and would contain a large amount of information about the department as a whole. We’d also want to include information about the employees in the department, but it would be redundant to have the same information in two tables (Employees and Departments). Instead, we can create a relationship between the two tables.
Let’s assume that the Departments table uses the Department Name column as the primary key. To create a relationship between the two tables, we add a new column to the Employees table called Department. We then fill in the name of the department to which each employee belongs. We also inform the database management system that the Department column in the Employees table is a foreign key that references the Departments table. The database will then enforce referential integrity by ensuring that all of the values in the Departments column of the Employees table have corresponding entries in the Departments table.
STORED PROCEDURE
100690309847 21 Deepanshu Kehar
Six week summer Training CSE
Definition: Stored procedures are precompiled database queries that improve the security, efficiency and usability of database client/server applications. Developers specify a stored procedure in terms of input and output variables. They then compile the code on the database platform and make it available to application developers for use in other environments, such as web applications. All of the major database platforms, including Oracle, SQL Server and My SQL support stored procedures. The major benefits of this technology are the substantial performance gains from precompiled execution, the reduction of client/server traffic, development efficiency gains from code reuse and abstraction and the security controls inherent in granting users permissions on specific stored procedures instead of the underlying database tables.
Benefits
Precompiled execution . Reduced client/server traffic . Efficient reuse of code and programming abstraction . Enhanced security controls .
Structure
Stored procedures are extremely similar to the constructs seen in other programming languages. They accept data in the form of input parameters that are specified at execution time. These input parameters (if implemented) are utilized in the execution of a series of statements that produce some result. This result is returned to the calling environment through the use of a record set, output parameters and a return code. That may sound like a mouthful, but you'll find that stored procedures are actually quite simple.
Example Here’s the SQL code:
CREATE PROCEDURE sp_GetInventory@location varchar (10) ASSELECT Product, QuantityFROM InventoryWHERE Warehouse = @location
100690309847 22 Deepanshu Kehar
Six week summer Training CSE
5. INTRODUCTION TO PROJECT
ALUMNI ASSOCIATION OF SUSCET:
Process involved in “ALUMNI ASSOCIATION OF SUSCET” is as follows:
Signing up to the site by the student.
After signing up, sign in to the website of SUSCET by the student.
Framing of the websites is also done.
Adding a friend to the login student account is also there.
Viewing the added friends by the login student.
Deleting the added friends (one or several) by the login student.
Sending scraps to all the added friends by the login student.
Viewing the scraps by the sender student (or friend) on the login student account.
At last, logout from the login student account.
100690309847 23 Deepanshu Kehar
Six week summer Training CSE
5.1. Tables for all the modules
TABLE 1: signup
It stores the personal information about the student for signing up.
100690309847 24 Deepanshu Kehar
Six week summer Training CSE
TABLE 2: administrator
It stores the Login Information of Administrator.
COLUMN SIZE TYPE SIZE
Username varchar 50
Password varchar 50
TABLE3: addfriend
It basically stores the student which is added by another login student in his or
her account.
COLUMN NAME TYPE SIZE
ReqSendBy varchar 50
ReqSendTo varchar 50
Status varchar 50
DateTime varchar 50
100690309847 25 Deepanshu Kehar
Six week summer Training CSE
TABLE4:chat
It stores the information about Conference chat done b/w all the students of SUSCET who
are Authorized by Admin.
COLUMN NAME TYPE SIZE
id int
comment varchar 50
person varchar 50
photo varchar 50
time varchar 50
TABLE 5: scrap
It stores the information about the scrap which is send by the login student to
another student.
COLUMN NAME TYPE SIZE
scrapid varchar 50
100690309847 26 Deepanshu Kehar
Six week summer Training CSE
ScrapSendTo varchar 50
ScrapSendBy varchar 50
scrap varchar 50
time varchar 50
5.2. DATABASE DESIGN
Objectives in establishing a database are as follows
Eliminate redundant data as much as possible
Integrate existing data files
Share data among all users
Incorporate changes easily and quickly
Simplify the use of data files
Lower the cost of storing and retrieving data
Improve accuracy and consistency
Provide data security from unauthorized user
Table files are permanent files containing reference data used in processing transactions,
Updating master file or producing output. Table files conserve memory space and make
the program maintenance easier by storing data in a file. The various tables are designed
for the project.
100690309847 27 Deepanshu Kehar
Six week summer Training CSE
5.3.HARDWARE & SOFTWARE REQUIREMENTS
HARDWARE REQUIREMENTS
The lists of the hardware used currently for the project are:
Processor : Intel Pentium dual core CPU
RAM: 512 MB
HARD DISK DRIVE: 20 GB
CD ROM: 42X
Floppy Disk Drive: 1.44”
Monitor: 17” color
Keyboard: Standard 110 keys
Mouse: Scroll
Network Adapter: Internal Ethernet Card
SOFTWARE REQUIREMENTS
The lists of the software used currently for the project are:
Platform: Microsoft Windows XP
Front End:
Development:
Environment: Microsoft Visual Studio 2008
Application: ASP.Net
Back End
Database
SQL 2005
100690309847 28 Deepanshu Kehar
Six week summer Training CSE
Connection
SqlConnection
6. FLOW CHART OF THE PROJECT
100690309847 29 Deepanshu Kehar
Six week summer Training CSE
7.APPLICATIONS OF THE WORK
100690309847 30 Deepanshu Kehar
Login Form Administrator
1 REGISTRATION
ENTER PERSONAL INFO
ENTER BATCH,BRANCH
UPLOAD IMAGE
Primary Key: Roll No
T1 SIGN UP
REGISTRATION
2 SEND SCRAP
SEND SCRAP
VIEW SCRAP
DELETE SCRAP
Primary Key: Scrap ID
T3 SCRAP
3 ADD FRIEND
SEND FRIEND REQUEST
ACCEPT REQUEST
ADD FRIEND
DELETE FRIEND
Primary Key: Friend ID
T4 ADD FRIEND
T2 CHAT
4 CHAT
CONFERENCE CHAT
Primary Key: Chat ID
Six week summer Training CSE
It is a community site developed for pass out students.
This website works an interface or bridge among the students.
Through this website, students upload their complete information.
This site helps the students (friends) to share their views by sending scraps.
This site works as an informative site for the pass out students who want updated
information from their college.
This online project working as an entertainment site as student uploads the photograph to
remember their beautiful memories.
This site helpful to the college to collect complete information about the students who are
working in different locations at different companies.
This project helpful for junior students to provide guidance regarding placement, training
from their seniors who have already passed out.
Home Page-1
100690309847 31 Deepanshu Kehar
Six week summer Training CSE
Home Page-2
100690309847 32 Deepanshu Kehar
Six week summer Training CSE
Signup Form
100690309847 33 Deepanshu Kehar
Six week summer Training CSE
Password Generate
100690309847 34 Deepanshu Kehar
Six week summer Training CSE
Login Form
100690309847 35 Deepanshu Kehar
Six week summer Training CSE
100690309847 36 Deepanshu Kehar
Six week summer Training CSE
Home Page Of Unauthorized Member
Home Page Of Administrator
100690309847 37 Deepanshu Kehar
Six week summer Training CSE
Registration Of Pending Members
100690309847 38 Deepanshu Kehar
Six week summer Training CSE
Registered Members
100690309847 39 Deepanshu Kehar
Six week summer Training CSE
Delete Members
100690309847 40 Deepanshu Kehar
Six week summer Training CSE
Change Password
100690309847 41 Deepanshu Kehar
Six week summer Training CSE
After Login User Main Page
100690309847 42 Deepanshu Kehar
Six week summer Training CSE
100690309847 43 Deepanshu Kehar
Six week summer Training CSE
Accept/Reject Friend Requests
100690309847 44 Deepanshu Kehar
Six week summer Training CSE
Add a New Friend
100690309847 45 Deepanshu Kehar
Six week summer Training CSE
View/Delete Friends
100690309847 46 Deepanshu Kehar
Six week summer Training CSE
Send Message
100690309847 47 Deepanshu Kehar
Six week summer Training CSE
View/Delete Messages
100690309847 48 Deepanshu Kehar
Six week summer Training CSE
Conference Chat
100690309847 49 Deepanshu Kehar
Six week summer Training CSE
9. BIBLIOGRAPHY
1. System Analysis and Design by Elias M.Awad, Galgotia Publications.
2. Software Engineering by Roger S. Pressman, McGraw- Hill Publications.
3. ASP.Net Unleashed.
Developing Web Applications with Microsoft Visual C# .NET
100690309847 50 Deepanshu Kehar
Six week summer Training CSE
Code Efficiency
The library determines the efficiency of code. In this project, I was exposed to C#. That is, C# is
acting as interface between ASP.Net windows Application and backend RDBMS. This ASP.Net
interface used as the underlying data provider. This improves efficiency in terms of fetching
records from the database. With VBScript, the ASP.Net Application sees three objects
a) Connection Object, establishes a connection to the database.
b) Command Object, executes commands against the database.
c) Data reader Object, holds records retrieved from the database or the records to be updated
on the database.
Properties:
Connection String - Allows connecting to the database.
Command Text - Property holds the actual data request query
Open - It is used to open the connection to the database.
Close - It is used to close the connection to the database.
VALIDATION CHECKS
Validation is the process of evaluating software at the end of the software development process to
determine compliance with the requirements. The main objective of validation checks is to
ensure the factors contributing quality of the system
Login table
User id allowed by alphabets only.
Password is allowed by alphabets only.
Testing
For making the software reliable and error free , the complete software must be tested in a
systematic and organized way. It is a vital phase to the success of the candidate system.
The purpose of testing differs somewhat from inspection. The purpose of testing is to verify that
the software works the way it is expected to.
100690309847 51 Deepanshu Kehar
Six week summer Training CSE
Testing Objectives
1. Testing is process of executing a program with the intent of find an error.
2. A good test case is one that has a high probability of founding an as-yet-undiscovered error.
3. A successful test is one that uncovers an as-yet-undiscovered error.
Testing Principles
All tests should be traceable to customer requirements.
Tests should be planned long before testing begins.
Testing should be “in the small” and progress toward testing “in the large.”
Exhaustive testing is not possible.
To be most effective, an independent third party should conduct testing.
Software testing is a process of executing the program with a intent of finding error.
User authentication
The primary goal of authentication is to allow access to legitimate system users and to deny
access to unauthorized persons. The two primary measures of authentication effectiveness are (1)
the false acceptance ratio, that is, the percentage of illegitimate users erroneously admitted, and
(2) the false rejection ratio, that is, the percentage of legitimate users who are denied access due
to failure of the authentication mechanism. The objective is to minimize both the false acceptance
and the false rejection ratios.
In this system the authentication is based on Password. The user, during the time of registration
will specify username and password which will be stored in the USERS table of the Oracle
database. No user having the access to enter into the database.
Restricted privileges
The user restricted to the following privileges.
User cannot change other user’s password or authenticate another user.
User can never look into the Oracle Database.
100690309847 52 Deepanshu Kehar
Six week summer Training CSE
User can never delete a record related to other user.for instance the user cannot delete mails in
some other user’s account.
100690309847 53 Deepanshu Kehar