Cybertel Software Limited

download Cybertel Software Limited

of 60

Transcript of Cybertel Software Limited

  • 8/2/2019 Cybertel Software Limited

    1/60

    A Project Report on

    CYBERTEL SOFTWARE LIMITED

    Submitted in partial fulfillment of the requirementsfor the award of degree of

    BACHELOR OF TECHNOLOGY

    IN

    INFORMATION TECHNOLOGY

    By

    ABHISHEK BHARDWAJ 08C91A1202

    D.NASARA REDDY 08C91A1220

    H.N BHADRI NATH 08C91A1223

    N.UDAY 08C91A1233

    T. SAI KIRAN 08C91A1250

    Under the Esteemed Guidance of

    MR.B.NARSIMHA Asst. Professor

    DEPARTMENT OF INFORMATION TECHNOLOGY

    HOLYMARY INSTITUTE OF TECHNOLOGY AND SCIENCE(Approved by AICTE New Delhi, Affiliated to jntu, Hyderabad)

    BOGARAM (V), KEESARA (M), RR DISTRICT-501301

    2011-12

  • 8/2/2019 Cybertel Software Limited

    2/60

    HOLY MARY INSTITUTE OF TECHNOLOGY & SCIENCE

    (COLLEGE OF ENGINEERING)

    (HOLY TRINITY EDUCATIONAL SOCIETY)

    (Approved by A.I.C.T.E., New Delhi, Affiliated to JNTU, Hyderabad)

    Bogaram (Village), Keesara (Mandal), R.R.Dist. Pin501 301.

    Phones: 08415325953, 08415325958, 08415329583 FAX: 04023813102

    DEPARTMENT OF INFORMATION TECHNOLOGY

    CERTIFICATE

    This is to certify that the project entitled CYBERTEL SOFTWARE LIMITED is being

    submitted BY ABHISHEK BHARDWAJ (08C91A1202), D.NASARA REDDY

    (08C91A1202), H.N BHADRI NATH (08C91A1223), N.UDAY (08C91A1233), T.SAI

    KIRAN (08C91A1250) in the partial fulfillment for the award of the Bachelor of Technology

    in Information Technology to Jawaharlal Nehru Technological University is a record if

    Bonafide work carried out by them.

    INTERNAL GUIDE HEAD OF DEPT

    MR.B.NARSIMHA Prof. V.KRISHNA

    Asst. Professor

    EXTERNAL EXAMINER

  • 8/2/2019 Cybertel Software Limited

    3/60

    ACKNOWLEDGEMENT

    An endeavor of a long period can be successful only with the advice of many well wishers.

    We take this opportunity to express my deep gratitude and appreciation to all those whoencouraged me for successfully completion of the project work.

    We wish to express my sincere gratitude to Dr.N.Subhash Chandra, Principal of Holy mary

    Institute of Technology and Sciences, Bogaram for his consistent help and encouragement to

    complete the project work.

    Our special thanks to Prof. V.Krishna,Head of information technology Department, for his

    timely suggestions and help during the progress of project work inspite of his busy schedule.

    We are thankful to my Guide Sri. B. narasimha, Assistant Professor in IT. Department,

    Holy Mary Institute of Technology and Science for his valuable guidance and suggestions in

    analyzing and testing throughout the period till the end of project work completion.

    Finally, we would like to express my sincere thanks to faculty members of IT department,

    batch-mates, friends, and lab technicians, one and all who have helped me to complete the

    project work successfully.

    As a gesture of respect for myfamily members and for the support we received from them we

    are dedicating this work to them.

    By

    ABHISHEK BHARDWAJ (08C91A1202)

    D.NASARA REDDY (08C91A1220)

    H.N BHADRI NATH (08C91A1223)

    N.UDAY (08C91A1233)

    T.SAI KIRAN (08C91A1250)

  • 8/2/2019 Cybertel Software Limited

    4/60

    CONTENTS

    CHAPTER Page Number

    Abstract..i

    List of figures. iiList of tables...iii

    List of screens ..iv

    1. INTRODUCTION.11.1Motivation1 1.2Problem definition....11.3Objective of Project. 11.4Limitations of Project.. 2

    2. LITERATURE SURVEY..32.1Introduction. .32.2Existing System.. .32.3Proposed System. 32.4Features of the project. 4

    3. ANALYSIS 53.1Introduction. 53.2Requirement Specification.. 9

    3.2.1 User requirement..103.2.1.1Functional requirements....103.2.1.2Non-functional requirements... 13

    3.3Context diagrams ... 154. DESIGN 16

    4.1Introduction. 164.1.1 Object Oriented System... 164.1.2 Object Oriented Analysis 174.1.3 Object Oriented Design.. 11

    4.2UML diagrams 184.2.1 Class 184.2.2 Use case.. 204.2.3 Sequence. 224.2.4 Collaboration.. 24

    4.3Module Design and Organization.. 254.4Tables.. 27

  • 8/2/2019 Cybertel Software Limited

    5/60

    5. IMPLEMENTATION 325.1Introduction. 325.2Key Function 325.3Method of Implementation.. 34

    5.3.1 Output Screen.. 365.4Technical Specification.42

    6. TESTING, VALIDATION AND RESULTS456.1Introduction. 456.2Testing Methodologies 456.3Design For Test Case and Scenario. 476.4Validation.486.5Test Cases 49

    7.

    CONCLUSION. 507.1Conclusion.. 507.2Future Enhancement 50

    8. BIBLIOGRAPHY. 51

  • 8/2/2019 Cybertel Software Limited

    6/60

    i

    ABSTRACT

    This Software project is aimed at automation of process of training Institute. The Objective

    of the project is to develop customized software package for IT / Non-IT Training Institutes.

    This technology enables the management feel easy in maintaining their daily operations

    effectively and instantly. And at the same time students who are enrolled for various courses,

    they can get instant response for their queries. And also it takes care of Employees pay roll and

    Students fee payments. And it also helps the Marketing Executives/ Counselors by getting each

    days follow-ups to the desktop.

    Institutes will be offering different courses with different durations. There will be employees

    working in the institute with different designations. There will be students undergoing training in

    different courses. The current project is to automate the overall institute management. This also

    can be used to process the pay roll of the employees.

    And at the same time if any user who want to know about last year placement detail course

    detail, faculty detail, course duration, fee, batch timing. The user can get the all information

    through particular web site. And also it takes care of Employees pay roll and student fee

    payment. And it also helps the Marketing Executives Counselors by getting each days follow-

    ups to the desktop

  • 8/2/2019 Cybertel Software Limited

    7/60

    ii

    List Of figures

    Figures Page Number

    1. Class Diagram182. Use Case Diagram...203. Sequence Diagram...224. Collaboration Diagram24

  • 8/2/2019 Cybertel Software Limited

    8/60

    iii

    List of Tables

    Tables Page Number

    1. Course.......................................................................................... 382. Faculty......................................................................................... 393. Placement.................................................................................... 404. Feed Back.................................................................................... 415. Contact................................................................. ............. 42

  • 8/2/2019 Cybertel Software Limited

    9/60

    iv

    List of Screens

    Screens Page Number

    1. Main Page..622. Available Course 633. Contact.. 644. Admin Home. . 655. Delete Faculty66

  • 8/2/2019 Cybertel Software Limited

    10/60

    1

    1. INTRODUCTION

    1.1 MOTIVATION

    CYBERTELSoftware Limited (CTSL) is an IT Solution Provider for a dynamic environment

    where business and technology strategies converge. Our approach focuses on new ways of

    business combining IT innovation and adoption while also leveraging an organization's current

    IT assets. We work with large global corporations and new generation technology companies - to

    build new products or services and to implement prudent business and technology strategies in

    today's environment.

    1.2 PROBLEM DEFINITION

    Cybertel range of expertise includes:

    Software Development Services Engineering Services Systems Integration Customer Relationship Management Supply Chain Management Product Development Electronic Commerce Consulting IT Outsourcing

    1.3 OBJECTIVE OF THE PROJECT

    We apply technology with innovation and responsibility to achieve two broad objectives.

    Effectively address the business issues our customers face today

  • 8/2/2019 Cybertel Software Limited

    11/60

    2

    Generate new opportunities that will help them stay ahead in the future

    This approach rests on:

    A strategy where we Architect, Integrate and Manage technology services andsolutionswe call it AIM for success.

    A robust offshore development methodology and reduced demand on customerresources

    A focus on the use of reusable frameworks to provide cost and time benefits Wecombine the best people, processes and technology to achieve excellent results

    consistently.

    1.4 ORGANISATION OF DOCUMENTATION

    In this project documentation we have initially put the definition and objective of the project

    as well as the design of the project which is followed by the implementation and testing phases.

    Finally the project has been concluded successfully and also the future enhancements of the

    project were given in this documentation.

  • 8/2/2019 Cybertel Software Limited

    12/60

    3

    2. LITERATION SURVEY

    2.1 INTRODUCTION

    Software Limited (CTSL) is an IT Solution Provider for a dynamic environment where

    business and technology strategies converge. Our approach focuses on new ways of business

    combining IT innovation and adoption while also leveraging an organization's current IT assets.

    2.2 EXISTING SYSTEM

    The Administrator should be able to add/modify/delete the details of courses andtheir fees structures.

    Counselors should be able to maintain each days enquiries about various courses. They should be able to get each days follow-ups.

    2.3 PROPOSED SYSTEM

    The aim of this system is to take care of Faculties and their Batch details. The Administrator should be able to add/modify/delete the placement detail of the

    student and their minimum and maximum package according to their course for

    every year.

    The user should be able to give his feedback about institution. The administrator should also be able to see the feedback of the user. The user can get the information about placement, faculty, course duration and

    batch time

  • 8/2/2019 Cybertel Software Limited

    13/60

    4

    2.4 FEATURES OF THE PROJECT

    Speed: We understand the importance of timing, of getting there before the competition. A rich

    portfolio of reusable, modular frameworks helps in jump-start projects. Tried and testedmethodology ensures that we follow a predictable, low-risk path to achieve results. Our track

    record is testimony to complex projects delivered within and even before schedule

    Expertise: Our teams combine cutting edge technology skills with rich domain expertise. What's

    equally important we share a strong customer orientation that means we actually start by

    listening to the customer. We're focused on coming up with solutions that serve customer

    requirements today and anticipate future needs.

    A Full Service Portfolio: We offer customers the advantage of being able to Architect, Integrate

    and Manage technology services. This means that they can rely on one, fully accountable source

    instead of trying to integrate disparate multi-vendor solutions.

  • 8/2/2019 Cybertel Software Limited

    14/60

    5

    3. ANALYSIS

    3.1 INTRODUCTION

    After analyzing the requirements of the task to be performed, the next step is to analyze the

    problem and understand its context. The first activity in the phase is studying the existing system

    and other is to understand the requirements and domain of the new system. Both the activities are

    equally important but the first activity serves as a basis of giving the functional specifications

    and then successful design of the proposed system. Understanding the properties and

    requirements of a new system is more difficult and requires creative thinking as well as

    understanding of existing system is also difficult. Improper understanding of present system can

    lead diversion from solution.

    Analysis Model

    The model that is basically being followed is WATER FALL Model which states that the

    phases are organized in a linear order. First of all, the feasibility study is done. Once that part is

    over, the requirement analysis and project planning begins. If system exists as a whole but

    modification and addition of new module is needed, analysis of present system can be used as

    basic model. The design starts after the requirement analysis is complete and the coding begins

    after the design is complete. Once the programming is completed, the testing is done. In this

    model the sequence of activities performed in a software development project are:

    Requirement Analysis Project Planning System Design Detail Design Coding Unit Testing System Integration & Testing

    Here the linear ordering of these activities is critical. At the end of the phase, the output of

    one phase is the input to other phase. The output of each phase should be consistent with the

    overall requirement of the system. Some of the qualities of spiral model are also incorporated

  • 8/2/2019 Cybertel Software Limited

    15/60

    6

    like after the people concerned with the project review completion of each of the phase the work

    done.

    WATER FALL Model has been chosen because all requirements were known before and the

    objective of our software development is the computerization/automation of an already existing

    manual working system.

  • 8/2/2019 Cybertel Software Limited

    16/60

    7

    Study of the system

    GUIS

    For flexibility, the User Interface has been developed with a graphics concept in Mind,

    Associated through a browser interface. The GUIS at the top level have been categorized as:

    Administrative User Interface. The Operational/Generic User Interface.

    The Administrative User Interface concentrates on the consistent information that is

    practically, part of the organizational activities and which needs proper authentication for the

    data collection. This interface helps the administration with all the transactional states like Data

    Insertion, Data Deletion and Data Updating along with the extensive Data Search capabilities.

    The Operational/Generic User Interface helps the users upon the system in transactions

    through the existing data and required services. The Operational User Interface also helps the

    ordinary users in managing their own information in a customized manner as per the assisted

    flexibilities.

    Project Instructions

    Based on the given requirements, conceptualize the Solution Architecture. Choose the domain

    of your interest otherwise develop the application for ultimatedotnet.com. Depict the various

    architectural components, show interactions and connectedness and show internal and external

    elements. Design the web services, web methods and database infrastructure needed both and

    client and server. Provide an environment for up gradation of application for newer versions that

    are available in the same domain as web service.

    Feasibility Report

    Preliminary investigation examine project feasibility, the likelihood the system will be useful

    to the organization. The main objective of the feasibility study is to test the Technical,

    Operational and Economical feasibility for adding new modules and debugging old running

    system. All system is feasible if they are unlimited resources and infinite time. There are aspects

    in the feasibility study portion of the preliminary investigation:

    Technical Feasibility

  • 8/2/2019 Cybertel Software Limited

    17/60

    8

    Operation Feasibility Economical Feasibility

    Technical Feasibility

    The technical issue usually raised during the feasibility stage of the investigation includes the

    following:

    Does the necessary technology exist to do what is suggested? Do the proposed equipments have the technical capacity to hold the data required To use the new system? Will the proposed system provide adequate response to inquiries, regardless of the Number or location of users? Can the system be upgraded if developed? Are there technical guarantees of accuracy, reliability, ease of access and data Security?

    Earlier no system existed to cater to the needs of Secure Infrastructure Implementation

    System. The current system developed is technically feasible. It is a web based user interface for

    audit workflow at NIC-CSD. Thus it provides an easy access to the users. The databasespurpose is to create, establish and maintain a workflow among various entities in order to

    facilitate all concerned users in their various capacities or roles. Permission to the users would be

    granted based on the roles specified. Therefore, it provides the technical guarantee of accuracy,

    reliability and security. The software and hard requirements for the development of this project

    are not many and are already available in-house at NIC or are available as free as open source.

    The work for the project is done with the current equipment and existing software technology.

    Necessary bandwidth exists for providing a fast feedback to the users irrespective of the number

    of users using the system.

  • 8/2/2019 Cybertel Software Limited

    18/60

    9

    Operational Feasibility

    Proposed projects are beneficial only if they can be turned out into information system. That

    will meet the organizations operating requirements. Operational feasibility aspects of the project

    are to be taken as an important part of the project implementation. Some of the important issuesraised are to test the operational feasibility of a project includes the following:

    Is there sufficient support for the management from the users? Will the system be used and work properly if it is being developed and implemented? Will there be any resistance from the user that will undermine the possible application

    Benefits?

    This system is targeted to be in accordance with the above-mentioned issues. The well-

    planned design would ensure the optimal utilization of the computer resources and would help in

    the improvement of performance status.

    Economic Feasibility

    A system can be developed technically and that will be used if installed must still be a good

    investment for the organization. In the economical feasibility, the development cost in creating

    the system is evaluated against the ultimate benefit derived from the new systems. Financial

    benefits must equal or exceed the costs. The system is economically feasible. It does not require

    any addition hardware or software. Since the interface for this system is developed using the

    existing resources and technologies available at NIC, There is nominal expenditure and

    economical feasibility for certain.

    3.2 SOFTWARE REQUIREMENT SPECIFICATION

    Purpose: The main purpose for preparing this document is to give a general insight into the

    analysis and requirements of the existing system or situation and for determining the operating

    characteristics of the system.

    Scope: This Document plays a vital role in the development life cycle (SDLC) and it describes

    the complete requirement of the system. It is meant for use by the developers and will be the

  • 8/2/2019 Cybertel Software Limited

    19/60

    10

    basic during testing phase. Any changes made to the requirements in the future will have to go

    through formal change approval process.

    The developer is responsible for:

    Developing the system, which meets the SRS and solving all the requirements of thesystem?

    Demonstrating the system and installing the system at client's location after the Acceptance testing is successful. Submitting the required user manual describing the system interfaces to work on it and

    also the documents of the system.

    Conducting any user training that might be needed for using the system. Maintaining the system for a period of one year after installation.

    3.2.1 User Requirements

    User name and Password for the website for the purpose of Job Search Administrator. Internet connection

    3.2.1.1 Functional Requirements

    Output Design

    Outputs from computer systems are required primarily to communicate the results of

    processing to users. They are also used to provide a permanent copy of the results for later

    consultation. The various types of outputs in general are:

    External Outputs whose destination is outside the organization. Internal Outputs whose destination is within organization and they are the users main

    interface with the computer.

    Operational outputs whose use is purely within the computer department. Interface outputs, which involve the user in communicating directly with system.

  • 8/2/2019 Cybertel Software Limited

    20/60

    11

    Output Definition

    The outputs should be defined in terms of the following points:

    Type of the output. Content of the output. Format of the output. Location of the output. Frequency of the output. Volume of the output. Sequence of the output.It is not always desirable to print or display data as it is held on a computer. It should be

    decided as which form of the output is the most suitable. For Example

    Will decimal points need to be inserted Should leading zeros be suppressed.

    Output Media

    In the next stage it is to be decided that which medium is the most appropriate for the output.

    The main considerations when deciding about the output media are:

    The suitability for the device to the particular application.

    The need for a hard copy. The response time required. The location of the users The software and hardware available.

    Keeping in view the above description the project is to have outputs mainly coming under the

    category of internal outputs. The main outputs desired according to the requirement specification

    are:

    The outputs were needed to be generated as a hot copy and as well as queries to be viewed on the

    screen. Keeping in view these outputs, the format for the output is taken from the outputs, which

    are currently being obtained after manual processing. The standard printer is to be used as output

    media for hard copies.

  • 8/2/2019 Cybertel Software Limited

    21/60

    12

    Input Design

    Input design is a part of overall system design. The main objective during the input design is

    as given below:

    To produce a cost-effective method of input. To achieve the highest possible level of accuracy. To ensure that the input is acceptable and understood by the user.

    Input Stages

    The main input stages can be listed as below:

    Data recording Data transcription Data conversion Data verification Data control Data transmission Data validation Data correction

    Input Types

    It is necessary to determine the various types of inputs. Inputs can be categorized as follows:

    External inputs, which are prime inputs for the system. Internal inputs, which are user communications with the system. Operational, which are computer departments communications to the system? Interactive, which are inputs entered during a dialogue.

    Input Media

    At this stage choice has to be made about the input media. To conclude about the input media

    consideration has to be given to:

    Type of input Flexibility of format Speed

  • 8/2/2019 Cybertel Software Limited

    22/60

    13

    Accuracy Verification methods Rejection rates Ease of correction Storage and handling requirements Security Easy to use Portability

    Keeping in view the above description of the input types and input media, it can be said that

    most of the inputs are of the form of internal and interactive. As Input data is to be the directly

    keyed in by the user, the keyboard can be considered to be the most suitable input device.

    Error Avoidance

    At this stage care is to be taken to ensure that input data remains accurate form the stage at

    which it is recorded up to the stage in which the data is accepted by the system. This can be

    achieved only by means of careful control each time the data is handled.

    Error Detection

    Even though every effort is make to avoid the occurrence of errors, still a small Proportion of

    errors is always likely to occur; these types of errors can be discovered by Using validations to

    check the input data.

    Data Validation

    Procedures are designed to detect errors in data at a lower level of detail. Data validations

    have been included in the system in almost every area where there is a possibility for the user to

    commit errors. The system will not accept invalid data. Whenever an invalid data is keyed in, the

    system immediately prompts the user and the user has to again key in the data and the system

    will accept the data only if the data is correct. Validations have been included where necessary.

    The system is designed to be a user friendly one. In other words the system has been designed to

    communicate effectively with the user. The system has been designed with popup menus.

    3.2.1.2Non-Functional Requirements

    Performance is measured in terms of the output provided by the application. Requirement

    specification plays an important part in the analysis of a system. Only when the requirement

  • 8/2/2019 Cybertel Software Limited

    23/60

    14

    specifications are properly given, it is possible to design a system, which will fit into required

    environment. It rests largely in the part of the users of the existing system to give the requirement

    specifications because they are the people who finally use the system. This is because the

    requirements have to be known during the initial stages so that the system can be designed

    according to those requirements. It is very difficult to change the system once it has been

    designed and on the other hand designing a system, which does not cater to the requirements of

    the user, is of no use. The requirement specification for any system can be broadly stated as

    given below:

    The system should be able to interface with the existing system The system should be accurate The system should be better than the existing system

  • 8/2/2019 Cybertel Software Limited

    24/60

    15

    3.3 CONTEXT DIAGRAMS

    Faculty details

    Admin

    module

    Course details

    Enquiry Enquiry details

    Placement details

    Follow

    details

    Specific

    Person

    numberuser

    context

    Institution details

    AdminCourse

    offered

    Course/

    placement

    details

    Faculty

    details

    enquiry details course

    Company

    Name

    package

    followPlacement

    detailsFollow

    details

  • 8/2/2019 Cybertel Software Limited

    25/60

    16

    4. DESIGN

    4.1 INTRODUCTION

    Object-oriented analysis and design (OOAD) is a software engineering approach that models

    a system as a group of interacting objects. Each object represents some entity of interest in the

    system being modeled, and is characterized by its class, its state (data elements), and its

    behavior. Various models can be created to show the static structure, dynamic behavior, and run-

    time deployment of these collaborating objects. There are a number of different notations for

    representing these models, such as the Unified Modeling Language (UML).

    Object-oriented analysis (OOA) applies object-modeling techniques to analyze the functional

    requirements for a system. Object-oriented design (OOD) elaborates the analysis models to

    produce implementation specifications. OOA focuses on what the system does, OOD on how the

    system does it.

    Object-oriented system is an composed of objects. The behavior of the system results from

    the collaboration of those objects. Collaboration between objects involves those sending

    messages to each other. Sending a message differs from calling a function in that when a target

    object receives a message, it itself decides what function to carry out to service that message.

    The same message may be implemented by many different functions, the one selected depending

    on the state of the target object.

    The implementation of "message sending" varies depending on the architecture of the system

    being modeled, and the location of the objects being communicated with.

    4.1.1 Object Oriented Systems:

    An object-oriented system is composed of objects. The behavior of the system is achieved

    through collaboration between these objects, and the state of the system is the combined state of

    all the objects in it. Collaboration between objects involves those sending messages to each

    other. The exact semantics of message sending between objects varies depending on what kind

    of system is being modeled. In some systems, "sending a message" is the same as "invoking a

    method". In other systems, "sending a message" might involve sending data via a socket.

  • 8/2/2019 Cybertel Software Limited

    26/60

    17

    4.1.2. Object-Oriented Analysis:

    Object-oriented analysis (OOA) looks at the problem domain, with the aim of producing a

    conceptual model of the information that exists in the area being analyzed. Analysis models do

    not consider any implementation constraints that might exist, such as concurrency, distribution,

    persistence, or how the system is to be built. Implementation constraints are dealt with during

    object-oriented design (OOD). Analysis is done before the Design.

    The sources for the analysis can be a written requirements statement, a formal vision

    document, and interviews with stakeholders or other interested parties. A system may be divided

    into multiple domains, representing different business, technological, or other areas of interest,

    each of which are analyzed separately.

    The result of object-oriented analysis is a description of what the system is functionally

    required to do, in the form of a conceptual model. That will typically be presented as a set of use

    cases, one or more UML class diagrams, and a number of interaction diagrams. It may also

    include some kind of user interface mock-up.

    4.1.3. Object Oriented Design:

    Object-Oriented Design (OOD) is an activity where the designers are looking for logical

    solutions to solve a problem, using objects.

    Object-oriented design takes the conceptual model that is the result of object-oriented

    analysis, and adds implementation constraints imposed by the environment, the programming

    language and the chosen tools, as well as architectural assumptions chosen as basis of design.

    The concepts in the conceptual model are mapped to concrete classes, to abstract interfaces in

    APIs and to roles that the objects take in various situations. The interfaces and their

    implementations for stable concepts can be made available as reusable services. Concepts

    identified as unstable in object-oriented analysis will form basis for policy classes that make

    decisions, implement environment-specific or situation specific logic or algorithms. The result of

    the object-oriented design is a detail description how the system can be built, using objects.

  • 8/2/2019 Cybertel Software Limited

    27/60

    18

    4.2 UML:

    The Unified Modeling Language (UML) is a standardized specification language for object

    modeling. UML is a general-purpose modeling language that includes a graphical notation used

    to create an abstract model of a system, referred to as a UML model.

    4.2.1 Class Diagram

    Class diagram in the Unified Modeling Language (UML) is a type of static structure diagram

    that describes the structure of a system by showing the system's classes, their attributes, and the

    relationships between the classes. It is the main building block in object oriented modeling. It is

    being used both for general conceptual modeling of the systematic of the application, and for

    detailed modeling translating the models into programming code.

    The classes in a class diagram represent both the main objects and interactions in the

    application and the objects to be programmed. In the class diagram these classes are represented

    with boxes which contain three parts:

    The upper part holds the name of the class. The middle part contains the attributes of the class, and The bottom part gives the methods or operations the class can take.In the conceptual design of a system, a number of classes are identified and grouped together

    in a class diagram which helps to determine the statically relations between those objects. With

    detailed modeling, the classes of the conceptual design are often split in a number of subclasses.

  • 8/2/2019 Cybertel Software Limited

    28/60

    19

  • 8/2/2019 Cybertel Software Limited

    29/60

    20

    4.2.2 Use case Diagram

    A Use case diagram in the Unified Modeling Language (UML) is a type of behavioral

    diagram defined by and created from a Use-case analysis. Its purpose is to present a graphical

    overview of the functionality provided by a system in terms of actors, their goals (represented as

    use cases), and any dependencies between those use cases. The main purpose of a use case

    diagram is to show what system functions are Performed for which actor. Roles of the actors in

    the system can be depicted.

    Actors:

    An actor portrays any entity (or entities) that perform certain roles in a given system. The

    different roles the actor represents are the actual business roles of users in a given system.

  • 8/2/2019 Cybertel Software Limited

    30/60

    21

    course

    open

    faculty details

    placement details

    feed back

    user

    contact

    update placement

    view/check feedback

    logout

    login

    home

    Admin

    update course/faculty details

  • 8/2/2019 Cybertel Software Limited

    31/60

    22

    4.2.3 Sequence Diagram

    A sequence diagram in Unified Modeling Language (UML) is a kind of interaction diagram

    that shows how processes operate with one another and in what order. It is a construct of a

    Message Sequence Chart.

    A sequence diagram shows, as parallel vertical lines (lifelines), different processes or objects

    that live simultaneously, and, as horizontal arrows, the messages exchanged between them, in the

    order in which they occur. This allows the specification of simple runtime scenarios in a

    graphical manner.

    Object: A concrete manifestation of abstraction; an instance of a class.

  • 8/2/2019 Cybertel Software Limited

    32/60

    23

    user home admin

    open

    login

    open course details

    open faculty details

    modi fy faculty & course details

    open placement details

    modify placement deatils

    send feedback

    view/check feed back

    view contact

    logout

    close

  • 8/2/2019 Cybertel Software Limited

    33/60

    24

    4.2.4 Collaboration Diagram

    A Collaboration Diagram is an interaction Diagram that emphasizes the structural

    organization of the objects that send and receive messages. It shows a set of objects, links among

    those objects and messages sent & received by those objects.

    user home

    admin

    1: open

    2: login

    3: open course details4: open faculty details

    5: modify faculty & course details

    6: open placement details

    7: modify placement deatils

    8: send feedback

    9: view/check feed back

    10: view contact

    11: logout

    12: close

  • 8/2/2019 Cybertel Software Limited

    34/60

    25

    4.3 MODULES DESIGN AND ORGANIZATION

    1. User Module2. Admin Module

    User Module

    In this module there are 5 sub modules that are-

    Available Course Faculty Placement Feed Back Contact

    Available Course

    In this module user can able to see details of the entire available course.

    Faculty

    In this module user can able to see details of the faculty.

    Feed Back

    The module allows you to create and conduct surveys to collect feedback. Unlike

    the Survey tool it allows you to write your own questions, rather than choose from a list of pre-

    written questions and unlike the Quiz tool, you can create non-graded questions. The Feedback

    activity is ideal for the likes of course or teacher evaluations.

    Admin Module

    In this module there are 5 sub modules that are

    View Feed Back View User Profile Delete User

  • 8/2/2019 Cybertel Software Limited

    35/60

    26

    View Feed Back

    In this module admin can able to view the feedback given by the user and according to the

    user requirement admin can change the modifications.

    View User Profile

    In this module admin can able to see the details of the user which are displayed and admin

    cant edit the details, and admin will match the user profile with the job openings.

    Delete User

    In this module admin can delete the user who are not accessing site for long time.

  • 8/2/2019 Cybertel Software Limited

    36/60

    27

    4.4 DATA BASE TABLES

    Course Table

    Name Type Constraint

    CID NUMBER(5) Primary Key

    CNAME VARCHAR2(15) Represents the

    name of the course

    TOTFEE NUMBER(6) Total fee

    DURATION VARCHAR2(10) Duration Of Course

    LANGUAGE NUMBER(6) Language

  • 8/2/2019 Cybertel Software Limited

    37/60

    28

    Faculty Table

    Name Type Constraint

    FID NUMBER(5) Primary Key

    FNAME VARCHAR2(15) Represents the

    name of the faculty

    BASIC NUMBER(6) Basic salary

    DESIGNATION VARCHAR2(15) Designation

    ADDRESS VARCHAR2 (6) Address of faculty

  • 8/2/2019 Cybertel Software Limited

    38/60

    29

    Placement Table

    Name Type Constraint

    CID NUMBER(5) Primary Key

    CNAME VARCHAR2(15) Represents the

    name of the faculty

    Years NUMBER(6) Basic salary

    NO.OF SELECTION VARCHAR2(15) Designation

    Language Varchar(6) Address of faculty

    MIN package Number(5) salary

    Max package Number(5) salary

  • 8/2/2019 Cybertel Software Limited

    39/60

    30

    Feed Back Table

    Name Type Constraint

    Fname varchar5) Primary Key

    LNAME VARCHAR2(15) Represents the

    name of the course

    Email varchar(6) Total fee

    Phone no number(10) Duration Of Course

    Post comment varchar(6) Language

  • 8/2/2019 Cybertel Software Limited

    40/60

    31

    Contact table

    Name Type Constraint

    name Varchar(5) Primary Key

    Designation VARCHAR2(15) Represents the

    name of the course

    Email varchar(6) Total fee

    Phone no number(10) Duration Of Course

    fax varchar(6) Language

  • 8/2/2019 Cybertel Software Limited

    41/60

    32

    5. IMPLEMENTATION AND RESULTS

    5.1 INTRODUCTION

    The implementation part is the most important phase of the project. In this phase, we code the

    entire project in the chosen software according to the design laid during the previous phase. The

    code has to be in such a way that the user requirements are satisfied and also not complicated for

    the user i.e., the user interface or GUI has to be easy to navigate. The code should be efficient in

    all terms like space, easy to update, etc. In this manner, we can complete the coding part of the

    project and later it can be sent for testing before being delivered to the customer.

    5.2 EXPLANATION OF KEY FUNCTIONS

    Database Connectivity using jdbc

    The following code gives the database connectivity using jdbc i.e., the way the My SQL

    database is synchronized with the project which is developed using Java.

    Sample Coding For Data Base Connection

    JSP Page

  • 8/2/2019 Cybertel Software Limited

    42/60

    33

    0){

    out.println("Update Successfully");

    }

    else{

    out.println("Update Fail");

    } %>

  • 8/2/2019 Cybertel Software Limited

    43/60

    34

    5.3 METHOD OF IMPLEMENTATION

    Installing Software First of all install Java 1.6 and then Tomcat Apache 5.1 by specifying

    port number as 8080. After that install oracle database in your system. After installing oracle,

    you can install an IDE like Net Beans ECLIPSE or an Edit Plus editor to write Java programs

    (optional). You can even write them in notepad also.

    Enable Path Settings

    Now the path settings have to be enabled so that your system will be able to recognize the above

    installed softwares. Note that correct path have to be given otherwise it may raise an error. The

    following picture depicts the method of setting path:

    (Right click on My Computer)

    (Select Advanced tab and Environment variables)

  • 8/2/2019 Cybertel Software Limited

    44/60

    35

    (Setting User Variables) (Setting System Variables)

  • 8/2/2019 Cybertel Software Limited

    45/60

    36

    5.3.1 Output Screen

    Main Page

  • 8/2/2019 Cybertel Software Limited

    46/60

    37

    Available Course

  • 8/2/2019 Cybertel Software Limited

    47/60

    38

    Contact

  • 8/2/2019 Cybertel Software Limited

    48/60

    39

    Admin Home

  • 8/2/2019 Cybertel Software Limited

    49/60

    40

    Add Faculty

  • 8/2/2019 Cybertel Software Limited

    50/60

    41

    Delete Faculty

  • 8/2/2019 Cybertel Software Limited

    51/60

    42

    5.4 TECHNOLOGY SPECIFICATION

    One of the most difficult tasks is that, the selection of the software, once system requirement is

    known is determining whether a particular software package fits the requirements. After initial

    selection further security is needed to determine the desirability of particular software compared

    with other candidates.

    Initially the language was called as oak but it was renamed as Java in 1995. The primary

    motivation of this language was the need for a platform-independent (i.e., architecture neutral)

    language that could be used to create software to be embedded in various consumer electronic

    devices.

    Java is a programmers language. Java is cohesive and consistent. Except for those constraints imposed by the Internet environment, Java gives the

    programmer, full control.

    Finally, Java is to Internet programming where C was to system programming.Java Virtual Machine (JVM)

    Beyond the language, there is the Java virtual machine. The Java virtual machine is an

    important element of the Java technology. The virtual machine can be embedded within a web

    browser or an operating system. Once a piece of Java code is loaded onto a machine, it is

    verified. As part of the loading process, a class loader is invoked and does byte code verification

    makes sure that the code thats has been generated by the compiler will not corrupt the machine

    that its loaded on. Byte code verification takes place at the end of the compilation process to

    make sure that is all accurate and correct. So byte code verification is integral to the compiling

    and executing of Java code.

  • 8/2/2019 Cybertel Software Limited

    52/60

    43

    JAVA SERVER PAGESIntroduction:

    Jsp technology enables you to mix regular static html with dynamically generated content

    from servlets. Separating the static html from the dynamic content provides a number of benefits

    over servlets alone.

    Why use Jsp:

    Jsp is easy to learn and allows developers to quickly produce wed sites and application in an

    open and standard way. Jsp is based on java, an object-oriented language. Jsp offers a robust

    platform for web development.

    Java Data Base Connectivity (JDBC)

    Most of the web based application programs need to interact with database

    management systems (DBMS). These DBMSs are repositionaries of the information used

    by applications.

    Database Management:

    A database is a collection of related information and a DBMS is software that provides you

    with a mechanism to retrieve, modify, and add data to the database.

    Database Connectivity:

    For an application to communicate with the database, it needs to have the following

    information:

    The RDBMS/DBMS product using which the database is created. The location of the database. The name of the database.

  • 8/2/2019 Cybertel Software Limited

    53/60

    44

    JDBC API:

    JDBC provides a database-programming API for Java programs. Java Soft created the JDBC-

    ODBC bridge driver that translates the JDBC API to the ODBC API. It is used with ODBC

    drivers.

    JDBC Driver Manager:

    The JDBC driver manager is the backbone of JDBC architecture. Its function is to connect a

    Java application to the appropriate driver specified in the Java program.

    JDBC-ODBC Bridge:

    As a part of JDBC, Sun Microsystems provides a driver to access ODBC data sources from

    JDBC. This driver is called the JDBC-ODBC Bridge.

    Connecting To a Database:

    The java.sql package contains classes that help in connecting to a database, sending

    embedded SQL statements to the database, and processing query results.

    The connection Object:

    The connection object represents a connection with a database. To establish a connection

    with a database, you need to register the ODBC-JDBC driver by calling the for Name () method

    from the Class and then calling the get Connection () method from the Driver Manager class.

    ABOUT ORACLE

    DATABASE

    A database management, or DBMS, gives the user access to their data and helps them

    transform the data into information. Such database management systems include dBase, paradox,

    IMS, and Oracle. These systems allow users to create, update and extract information from their

    database.

  • 8/2/2019 Cybertel Software Limited

    54/60

    45

    6. TESTING AND VALIDATION

    6.1 INTRODUCTION

    Software testing is a critical element of software quality assurance and represents the ultimate

    review of specification, design and coding. In fact, testing is the one step in the software

    engineering process that could be viewed as destructive rather than constructive.

    A strategy for software testing integrates software test case design methods into a well-

    planned series of steps that result in the successful construction of software. Testing is the set of

    activities that can be planned in advance and conducted systematically. The underlying

    motivation of program testing is to affirm software quality with methods that can economically

    and effectively apply to both strategic to both large and small-scale systems.

    The following are the Testing Objectives:

    Testing is a process of executing a program with the intent of finding an error. A good test has a high probability of finding an as yet undiscovered error. A successful test is one that uncovers an as yet undiscovered error.

    6.2 TESTING METHODOLOGIES

    There are two test case design methods. They are:

    Black Box Testing White Box Testing

    Black Box Testing

    Knowing the specified function that a system has been designed to perform, tests can be

    conducted that demonstrates each function is fully operational, at the same time searching for

    errors in each function. Block-box testing is not an alternative to white-box testing. Rather, it is

    complimentary approach that is likely to uncover a different class of errors than white-box

    testing.

  • 8/2/2019 Cybertel Software Limited

    55/60

    46

    Black-box testing attempts to find errors in the following categories:

    1. Incorrect missing function.2. Interface errors3. Errors in data structures or external data base access4. Performance errors, Initialization and Termination errors.

    Unlike white-box testing, which is performed early in the testing process, black-box testing

    tends to be applied during later stages of testing. Because black-box testing purposely disregards

    control structure, attention focused on the information domain.

    White Box Testing

    White box testing, sometimes called glass-box testing is a test case design method that uses

    the control structure of the procedural design to derive test cases. Using white box testing

    methods, the software engineer can derive test cases that

    1. Guarantee that all independent paths with in a module have been exercised at leastonce.

    2. Exercise all logical decisions on their true and false sides.3. Execute all loops at their boundaries and within their operational bounds.Logical errors and incorrect assumptions are inversely proportional to the probability that a

    program path will be executed. Errors tend to creep into our work when we design and

    implement function, conditions or control that is out of main stream. Every day processing tends

    to be well understood while special case processing tends to fall into the cracks.

    .

  • 8/2/2019 Cybertel Software Limited

    56/60

    47

    6.3 DESIGN OF TEST CASES & SCENARIO

    The objective is to design tests that systematically uncover different classes of errors and do

    so with a minimum amount of time and effort. Testing cannot show the absence of defects, it can

    only show that software defects are present.

    Unit Testing

    Interface Number of input parameters should be equal to number of arguments. Parameter and argument attributes must match. Parameters passed should be in correct order. Global variable definitions consistent across module.If module does I/O

    Open/Close statements must be correct Buffer Size should match record size. Files should be opened before use. End of file condition should be handled. I/O errors should be handled. Any textual errors in output information must be checked.

    Error noted does not correspond to error encountered.

    Error condition handled by system run-time before error handler gets Control. Exception condition processing incorrect.

    Integration Testing

    Modules integrated by moving down the program design hierarchy. Can use depth first or

    breadth first top down integration verifies major control and decision points early in design

    process. Top-level structure tested most. Depth first implementation allows a complete function

    to be implemented, tested and demonstrated and does depth first implementation of critical

    functions early. Top down integration forced (to some extent) by some development tools in

    programs with graphical user interfaces.

  • 8/2/2019 Cybertel Software Limited

    57/60

    48

    6.4 VALIDATION TESTING

    Validation testing is aims to demonstrate that the software functions in a manner that can be

    reasonably expected by the customer. This tests conformance the software to the Software

    Requirements Specification.

    Validation Test Criteria

    A set of black box test is to demonstrate conformance with requirements. To check that all

    functional requirements satisfied, all performance requirements achieved, documentation is

    correct and ' human-engineered', and other requirements are met (e.g. compatibility, error

    recovery, and maintainability).

    When validation tests fail it may be too late to correct the error prior to scheduled delivery. Need

    to negotiate a method of resolving deficiencies with the customer.

    Configuration Review

    An audit to ensure that all elements of the software configuration are properly developed

    catalogued and has all the necessary detail to support maintenance.

    System Testing:

    System testing is actually a series of different tests whose primary purpose is to fully exercise

    the computer-based system. Although each test has a different purpose, all work to verify that all

    system elements have been properly integrated to perform allocated functions.

    Security Testing:

    Attempts to verify the protection mechanisms built into the system.

    Performance Testing:

    This method is designed to test runtime performance of software within the context of an

    integrated system.

  • 8/2/2019 Cybertel Software Limited

    58/60

    49

    6.5 TEST CASES

    Sl.

    no

    Test

    Case

    Name

    Test Procedure Pre

    Conditio

    n

    Expected Result Outpu

    t(resul

    t)

    Specificatio

    n

    document

    1. Check

    Services

    Enter the url of

    cybertel software

    limited

    - Display User

    home page

    Succes

    s

    Check\

    Services

    2. Check

    Services

    Select available

    course

    - Display view file

    page

    Succes

    s

    Check\

    Services

    3 Check

    Services

    Select faculty

    details

    - Display faculty

    details

    Succes

    s

    Check\

    Services

    4 Check

    Services

    Select placement

    details

    - Display

    placement details

    Succes

    s

    Check\

    Services

    5 Check

    Services

    Select feedback

    file

    User

    must

    enter

    details

    before

    give feed

    back

    Display View File

    page

    Succes

    s

    Check

    Services

    6 Login

    perform

    Enter the Admin no

    and password and

    click submit button

    Display Admin

    home page

    Succes

    s

    Test Login

    7 Check

    Services

    Add, Delete, Edit

    placement details

    Admin

    must be

    logged in

    Query message is

    File inserted

    successfullySucces

    Query

    insertion

  • 8/2/2019 Cybertel Software Limited

    59/60

    50

    7. CONCLUSION

    7.1 CONCLUSIONS

    The INSTITUTE MANAGEMENT has been successfully completed. The goal of the

    system is achieved and problems are solved. Final reports are generated as per the specification

    of the client. The package is developed in a manner that it is user friendly and required help is

    provided at different levels.

    The project can be easily used in the process of decision making. Different types of reports

    can be generated which help the management to take correct decision and reduce the time delay

    which automatically increases the companys work standards as well as the economical state of

    the company.

    This system never decreases the manpower but helps the development of available manpower

    and optimizes the manpower by which companys standards and capabilities can be scaled to

    higher dimensions.

    7.2FURTHER ENHANCEMENTS

    We can also add a new Sub module i.e. Registration, the user can directly login and ask

    Queries to the Faculty.

    User can also get the job information according to his course..

    The user can also get the guide line from Faculty about his particular subject.

  • 8/2/2019 Cybertel Software Limited

    60/60

    8. BIBLIOGRAPHY

    References:-

    The following books were referred during the analysis and execution phase of the project

    ORACLE 8 THE COMPLETE REFERENCE

    By Oracle Press

    SOFTWARE ENGINEERING

    By Roger.S.Pressman

    SQL FOR PROFESSIONALS

    By Jain

    CORE JAVA 2 (VOL 1 and VOL 2)

    By Cay S. Hortsman.

    JAVADOC

    By Sun Microsystems.