mba project

73
1 INTRODUCTION OF THE ORGANIZATION Overview : CMC Limited a Tata Enterprise is a premier information technology company with an all India presence having ISO 9001-2000 certification for its R&D center & System Integration (NR group). CMC Limited has been conducting computer-training program for various organizations since 1978. Large and complex project management capabilities since its incorporation in 1975, CMC has an enviable record of successfully building IT solutions for massive and complex infrastructure and market projects. Departmental Functions: Take, for instance, just three of the many major projects undertaken by CMC: A passenger ticketing and reservations system for Indian Railways, which runs 6,000 passenger trains carrying over 10million passengers a day, on a 90,000-km railway network covering around 8,000 railway stations. Cargo handling system is a comprehensive online real time cargo handling system to integrate all complex and varied activities of container terminals. This system has been implemented for several Indian and International ports.

description

prjoect mba

Transcript of mba project

Introduction of the Organization

Overview :CMC Limited a Tata Enterprise is a premier information technology company with an all India presence having ISO 9001-2000 certification for its R&D center & System Integration (NR group). CMC Limited has been conducting computer-training program for various organizations since 1978. Large and complex project management capabilities since its incorporation in 1975, CMC has an enviable record of successfully building IT solutions for massive and complex infrastructure and market projects. Departmental Functions:Take, for instance, just three of the many major projects undertaken by CMC: A passenger ticketing and reservations system for Indian Railways, which runs 6,000 passenger trains carrying over 10million passengers a day, on a 90,000-km railway network covering around 8,000 railway stations.

Cargo handling system is a comprehensive online real time cargo handling system to integrate all complex and varied activities of container terminals. This system has been implemented for several Indian and International ports.

An online transaction processing system for the Bombay Stock Exchange, which handles millions of securities trading transactions every day.

CMC LTD has been imparting corporate trainings for the renowned leading organizations like Tech Mahindra, HCL Technologies, Tata Consultancy Services Tata motors and so on. We have already Trained 400 employees of Tech Mahindra & more than 800 employees of HCL under ILP since July 2006. We are also proud to have world-class trainers for providing in-depth understanding of the topics. Apart from that we have tie-ups with various academic institutions imparting technical education such as engineering colleges pan India for Project based Industrial training on .Net / JAVA / PHP / Embedded Systems and Oracle

Operating System

Windows Seven is a line of operating systems developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs. Prior to its announcement on July 22, 2008R2, Windows Seven was known by its codename "Longhorn. The release of Windows Seven came more than five years after the introduction of its predecessor, Windows XP, the longest time span between successive releases of Microsoft Windows desktop operating systems.Windows Seven contains many changes and new features, including an updated graphical user interface and visual style dubbed Aero, a redesigned search function, multimedia tools including Windows DVD Maker, and redesigned networking, audio, print, and display sub-systems. Seven aims to increase the level of communication between machines on a home network, using peer-to-peer technology to simplify sharing files and media between computers and devices. Windows Seven includes version 3.0 of the .NET Framework, allowing software developers to write applications without traditional Windows APIs.Microsoft's primary stated objective with Windows Seven has been to improve the state of security in the Windows operating system. One common criticism of Windows XP and its predecessors is their commonly exploited security vulnerabilities and overall susceptibility to malware, viruses and buffer overflows. NEW OR CHANGED FEATURES:Windows Seven developed features and functionalities not present in its predecessors, especially those from Windows XP. Few of them are:

Windows Aero: The new hardware-based graphical user interface is named Windows Aero, which Jim Allchin stated is an acronym for Authentic, Energetic, Reflective, and Open. The new interface is intended to be cleaner and more aesthetically pleasing Laptop users report, however, that battery life is shortened with the feature enabled.

Windows Shell: The new Windows shell is significantly different from Windows XP. Windows Explorer's task pane has been removed, integrating the relevant task options into the toolbar. A "Favorite links" pane has been added, enabling one-click access to common directories. The address bar has been replaced with a breadcrumb navigation system. The Start menu has changed as well; it no longer uses ever-expanding boxes when navigating through Programs. The word "Start" itself has been removed in favor of a blue Windows Pearl.

Instant Search (also known as search as you type) : Windows Seven features a new way of searching called Instant Search, which is significantly faster and more in-depth (content-based) than the search features found in any of the previous versions of Windows.

Windows Sidebar: A transparent panel anchored to the side of the screen where a user can place Desktop Gadgets, which are small applets designed for a specialized purpose (such as displaying the weather or sports scores). Gadgets can also be placed on other parts of the desktop.

Windows Internet Explorer 8: IE8 in Windows Seven runs in isolation from other applications in the operating system (protected mode); exploits and malicious software are restricted from writing to any location beyond Temporary Internet Files without explicit user consent.

Disk Management: The Logical Disk Manager in Windows Seven supports shrinking and expanding volumes on-the-fly.

Parental controls: Allows administrators to control which websites, programs and games each Limited user can use and install. This feature is not included in the Business or Enterprise editions of seven.

Games and Games Explorer: Games included with Windows have been modified to showcase Seven's graphics capabilities. New games are Chess Titans, Mahjong Titans and Purble Place. A new Games Explorer special folder contains shortcuts and information to all games on the user's computer.

Windows Side Show: Enables the auxiliary displays on newer laptops or on supported Windows Mobile devices. It is meant to be used to display device gadgets while the computer is on or off.

Windows Mail: A replacement for Outlook Express that includes a new mail store that improves stability, and features integrated Instant Search. It has the Phishing Filter like IE8 and Junk mail filtering that is enhanced through regular updates via Windows Update.

Windows Photo Gallery: A photo and movie library management application. It can import from digital cameras, tag and rate individual items, adjust colors and exposure, create and display slideshows (with pan and fade effects) and burn slideshows to DVD.

Windows Media Player 11: New features in this version include word wheeling (or "search as you type"), a new GUI for the media library, photo display and organization, the ability to share music libraries over a network with other Windows Seven machines, Xbox 360 integration, and support for other Media Center Extenders.

Security-related:Improved security was a primary design goal for seven. User Account Control, or UAC is perhaps the most significant and visible of these changes. UAC is a security technology that makes it possible for users to use their computer with fewer privileges by default, with a view to stopping malware from making unauthorized changes to the system. This was often difficult in previous versions of Windows, as the previous "limited" user accounts proved too restrictive and incompatible with a large proportion of application software, and even prevented some basic operations such as looking at the calendar from the notification tray. In Windows Seven, when an action is performed that requires administrative rights (such as installing/uninstalling software or making system-wide configuration changes), the user is first prompted for an administrator name and password; in cases where the user is already an administrator, the user is still prompted to confirm the pending privileged action. Regular use of the computer such as running programs, printing, or surfing the Internet does not trigger UAC prompts. User Account Control asks for credentials in a Secure Desktop mode, in which the entire screen is dimmed, and only the authorization window is active and highlighted.

Back End

SQL Server 2008R2SQL Server is SQL-compliant RDBMS. SQL-compliant means it use the ANSI (American National Standard Institute) version of Structured Query Language or SQL. Structured Query Language is a command that allow us to modify or retrieve information from the database.Client /Server mean that SQL Server is designed to store data in the central location (the server) and deliver it on demand to numerous other locations (the client). SQL Server is also a Relational Database Management System (RDBMS).

FEATURES OF SQL SERVER 2008R2For Database Administration:Online Restore: With SQL Server 2008R2, database administrators are able to perform a restore operation while an instance of SQL Server is running. Online restore improves the availability of SQL Server because only the data being restored is unavailable; the rest of the database remains online and available.Fast Recovery: A new faster recovery option improves availability of SQL Server databases. Administrators can reconnect to a recovering database after the transaction log has been rolled forward.SQL Server Management Studio: SQL Server 2008R2 includes SQL Server Management Studio, a new integrated suite of management tools with the functionality to develop, deploy, and troubleshoot SQL Server databases, as well as enhancements to previous functionality. Data Partitioning: Data partitioning is enhanced with native table and index partitioning that enables efficient manageability of large tables and indexes.For Development:Hosted Common Language Runtime: With SQL Server 2008R2 developers can create database objects using familiar languages such as Microsoft Visual C# .NET and Microsoft Visual Basic .NET. Developers can also create two new objectsuser-defined types and aggregates.Native XML Support: Native XML data can be stored, queried, and indexed in a SQL Server databaseallowing developers to build new classes of connected applications around Web services and across any platform or device. ADO.NET version 2.0: From new support for SQL Types to Multiple Active Result Sets (MARS), ADO.NET in SQL Server 2008R2 evolves dataset access and manipulation to achieve greater scalability and flexibility. Security Enhancements: The security model in SQL Server 2008R2 separate users from objects, provides fine-grain access, and enables greater control of data access. Additionally, all system tables are implemented as views, providing more control over database system objects.ENTERPRISE MANAGERSQL Server Enterprise Manager is a graphical tool that allows easy configuration and management of Microsoft SQL Server and SQL 2008R2 program group.SQL Server Enterprise Manager can also be used to Manage Logins, permission and users. Create a database Take back-up of database and transaction logs Manage tables

Query AnalyzerThe SQL Server Query Analyzer allows us to create adhoc queries and run them interactively. We may also execute Transact-SQL statements stored in text file and view the result in result plane or result grid. The Query Analyzer also has a color-coded editor to assist the user with checking of syntax. It also has context sensitive help.Queries are processed in two steps Interpret First the queries are checked for syntax. Execute - Then the processing take place.

SQL Stored Procedures

A precompiled collection of Transact-SQL statements stored under a name and processed as unit. SQL SERVER supplies stored procedures for managing SQL SERVER and displaying information about databases and users. SQL SERVER supplied stored procedures are called System stored procedures. A stored procedure is a group of Transact-SQL statements compiled into a single execution plan.Benefits of Stored Procedures Precompiled execution: SQL Server compiles each stored procedure once and then reutilizes the execution plan. This results in tremendous performance boosts when stored procedures are called repeatedly. Reduced client/server traffic: If network bandwidth is a concern in your environment, you'll be happy to learn that stored procedures can reduce long SQL queries to a single line that is transmitted over the wire. Efficient reuse of code and programming abstraction: Stored procedures can be used by multiple users and client programs. If you utilize them in a planned manner, you'll find the development cycle takes less time. Enhanced security controls: You can grant users permission to execute a stored procedure independently of underlying table permissions.

Front End

Microsoft Visual Studio is an integrated development environment (IDE) from Microsoft. It is used to develop console and graphical user interface applications along with Windows forms applications ,web sites, web applications, and web services in both native code together with managed code for all platforms supported by Microsoft Windows, Windows mobile, Windows CE, .NET Framework, .NET compact framework and Microsoft Silverlight.

Features of Visual Studio 2010: Multi-Targeting support. Web Designer and CSS support. ASP.NET AJAX and JavaScript support. Project Designer. JavaScript Intellisense. LINQ Language Integrated Query. Windows Presentation Foundation (WPF). Enhanced Debugger. New Reporting Features. Organize your "using" statements Editing Nested Master Pages Visual Studio 2010 Split View..NET FRAMEWORKWe'll close our introductory look at the .NET platform with a list of new features that are unique to ASP.NET and the chapter in which each will be discussed.Web Forms A new feature that, in combination with an editor such as Visual Studio .NET provides the ASP.NET developer the same drag and drop development convenience enjoyed by Visual Basic developers for years. Web Forms improve the speed of development by encapsulating frequently used features into server controls, which are declared using a tag-based syntax similar to HTML and XML.Web servicesWeb services allow developers to expose the functionality of their applications via HTTP and XML so that any client who understands these protocols can call them. Web services can make the task of application integration easier, particularly in situations in which application-to-application integration is made difficult by firewalls and/or differing platforms.Server controlsServer controls are declared using an HTML-like syntax, making them easier to work with for page UI designers. They are executed on the server, returning HTML to the browser. Server controls may be manipulated on the server programmatically and provide power and flexibility for applications that must support a variety of browsers.

ValidationOne group of server controls is designed to simplify the task of validating user input. It includes controls to validate required fields, to compare one field to another or to a specific value for validation, and to validate user input using regular expressions, which allow you to specify a format that user input must follow to be valid.Improved securityASP.NET offers tighter integration with Windows-based authentication, as well as two new authentication modes: forms-based authentication (which allows users to enter authentication credentials in a standard HTML form, with the credentials validated against your choice of backend credential store) and Passport authentication (which makes use of Microsoft's Passport authentication service).Features in ASP.NET v1.1In Version 1.1 of the .NET Framework, several features have been added that are of interest to ASP.NET developers. These include:Request ValidationRequest Validation, when enabled (the default), checks all forms of posted input (form fields, query string, etc.) and raises an exception if any HTML or script code is found. This can help prevent cross-site scripting attacks in your applications.Side by side executionStarting with ASP.NET 1.1, you can choose which version of the .NET Framework your application will run against. Assuming you have both Version 1.0 and Version 1.1 installed, you can configure individual applications to run against either version.Built-in mobile control supportIn Version 1.0, support for targeting mobile devices such as cell phones and PDAs was provided via a set of controls available as a separate download. In Version 1.1, these controls have been fully integrated into the .NET Framework, and a new application type has been added to Visual Studio .NET 2003 to support development of ASP.NET applications for mobile devices.ADO.NET enhancementsIn Version 1.0, developers wishing to access data from Oracle and/or ODBC data sources had to download and install a separate data provider for these data sources. In Version 1.1, the ODBC and Oracle data providers have been integrated into the .NET Framework.ASP.NET Web ApplicationsThe ASP.NET Web Application is the type of application most developers will work with on a regular basis. The terminology comes from the description used in the Visual Studio .NET environment to describe the project type used to create this type of application. You may also hear this type of application described as an ASP.NET Web Forms Application. For reasons we'll explore in the next chapter, we prefer the former term.An ASP.NET Web Application, in its simplest form, consists of a directory made available via HTTP using the IIS administration tool or through the Web Sharing tab of a folder's Properties dialog (or by creating a web application project in Visual Studio .NET) and at least one ASP.NET page, designated by the .aspx file extension. This file (or files), whose structure we'll discuss in detail in the next chapter, typically contains a mix of HTML and server-side code. This HTML and server-side code combine to create the final output of the page, typically consisting of HTML markup that is sent to the client browser.ASP.NET Mobile Web ApplicationsThe ASP.NET Mobile Web Application is a subtype of Web Application specific to developing for mobile devices such as cell phones and PDAs. The primary thing that distinguishes a mobile web application from a standard web application in ASP.NET is the use of the ASP.NET mobile controls, which are built into the .NET Framework as of Version 1.1. These include the mobile Form control and standard controls such as labels, textboxes, and panels, as well as mobile-specific controls such as the TextView, PhoneCall, and Selection List controls. Note that both mobile Web Forms pages (those that use the mobile controls) and standard Web Forms pages can coexist within the same application, if desired.To simplify development of ASP.NET applications for mobile devices, Visual Studio .NET 2003 provides an ASP.NET Mobile Web Application project template. This template includes a default mobile Web Form, as well as a special section added to the Web.config file called , which contains settings for device-specific rendering.ASP.NET Web ServicesThe other type of application available to ASP.NET developers is the ASP.NET Web Service. Like ASP.NET Web Applications, there are a number of terms floating around for this type of application. (Microsoft refers to web services as "XML Web Services," perhaps in hopes of a positive association between web services and the XML standard.) A web service is an application that exposes programmatic functionality to clients over the Internet or an intranet using the underlying plumbing of a developing W3C standard called SOAP. In simple terms, it can be seen as a simple function call across the Internet..aspx Files. aspx files, also known as ASP.NET pages or Web Forms, are the meat and potatoes of an ASP.NET Web Application. These files contain the HTML tags, server controls, and code that present a user interface to your users, and process their requests (or call helper functions in business-tier components to do so). Like the global.asax file, .aspx files may either contain code directly or refer to a code-behind class that contains the code for that page. Note that the code-behind used, if any, must inherit from the Page class in the System.Web.UI namespace..ascx Files.ascx files are used to implement what are known as ASP.NET user controls. User controls are a technique for code reuse that lies somewhere between the function of the #Include directive in classic ASP (which you can still use in ASP.NET, if you choose) and the function of custom ASP.NET Server Controls. User controls are made up of HTML tags, server controls, and code (or any combination of the above), and can be reused through a simple tag-based syntax. They have the advantages of being simpler to develop than custom server controls, as well as offering greater functionality than includes (such as the ability to expose properties and methods).Web Forms are an ASP.NET technology used to create programmable web pages. They are the primary building block of ASP.NET Web Applications. The main goal of Web Forms is to bring the same productivity to web applications that Visual Basic brought to Windows applications. Web Forms consist of the user interface (UI) and the UI logic written on the server side. The UI and UI logic can reside either in the same file or in separate files.Web Forms in ASP.NET offer a number of advantages over ASP and other technologies for generating web applications. ASP.NET Web Forms: Provide support for any HTML 3.2-compliant browser. Even ASP.NET Server Controls that provide advanced client-side functionality will gracefully degrade for browsers that do not support DHTML or script. These controls will, however, take advantage of such support in browsers such as Internet Explorer 5.0 or later. Are built on the Common Language Runtime and provide all the benefits of the runtime, such as managed execution, type safety, and inheritance. Can be built with any Common Language Runtime language, including C#, Visual Basic .NET, and JScript .NET. Can be created using rapid application development tools such as Visual Studio .NET. You can build a Web Forms page simply by dragging and dropping controls from the VS.NET toolbox onto the page. Provide a rich set of server controls that provide almost all the functionality required for a web application. ASP.NET ships with a broad array of built-in server controls. Offer a flexible programming model, in which code may be included in the same file as the Web Form, as in the classic ASP model or in separate module files, referred to as code-behind files. Code-behind promotes the separation of code and content, which can improve your code's readability, maintainability, and reusability. Preserve the state of the page and its controls between requests with the inclusion of state management features. Provide an extensible model that allows you to develop your own controls or purchase third-party controls to add functionality to your application.Web ServicesThe primary purpose of ASP.NET web services is to provide access to application functionality through standard web protocols (including HTTP and XML), regardless of the application's location or the platform on which it is built. When your application exposes functionality as a web service, that functionality can be consumed by clients on any platform, presuming the clients understand XML and SOAP and can communicate via the HTTP protocol. More plainly, a web service is a function that is called over the Internet.An ASP.NET web service can be very simple or it can provide complex functionality. It can return a variety of data typesfrom simple strings and integer values to complex data types such as classes and datasets.Web services are traditionally thought of as providing only business services (e.g., you call a method, perhaps passing in some parameters, and you receive a return value), but there's no reason why you can't create a web service that returns a chunk of HTML. Doing so would allow you to provide cross-platform access to functionality similar to that provided by ASP.NET Server Controls, albeit with some performance overhead.ASP.NET ConfigurationWhen working with ASP.NET, you'll be called on to configure your ASP.NET applications. One major advantage that ASP.NET has over classic ASP is that most of the important configuration options for ASP.NET applications are stored in configuration files that reside in the web application directory. This makes it considerably easier to deploy an application from one server to another or to replicate an application across a web farm, since the application's configuration information will be copied along with the Web Form Pages, code-behind classes, and assemblies that make up the application.ASP.NET SecuritySecurity is an extremely complicated subject, and ASP.NET security is no exception. This chapter discusses the approaches you can take to secure your ASP.NET applications. Absent from the discussion are the topics of network, server, and infrastructure security. This should not be interpreted to mean these topics are unimportant. On the contrary, without properly securing any supporting servers and infrastructure, the measures you take to secure your application with the tools made available by the .NET Framework will be for naught. A discussion of these topics, however, is beyond the scope of this book. The security section of the Microsoft TechNet web site, referenced at the end of this chapter, contains a wealth of information on how to secure your servers and network properly, including tools to assist you in this important task.The importance of securing your applications cannot be stressed enough. Failure to devote the time and resources to get security right can result in data loss, application failure or hijacking, as well as loss of revenue and/or reputation. And it's important that security be considered from the very beginning. Application security added as an afterthought is little better than no security at all.Securing access to an application or to the resources belonging to an application involves two processes: authentication and authorization. This chapter explains how these processes relate to ASP.NET and how each fits into the overall scheme of allowing or preventing access to ASP.NET application resources.The discussion focuses on the three authentication methods the ASP.NET runtime provides: Windows, Forms, and Passport. The chapter also discusses ACL-based and URL authorization, as well as strategies for obtaining secure access to data and securing web services. The discussion also touches briefly on code access security, which underlies the ASP.NET security model.Error Handling, Debugging, and TracingMost code samples in this book don't include code intended to handle errors. It's not that error handling isn't important, but error handling can add complexity, and for the most part we've tried to keep the sample code as simple and clear as possible. Since you'll need to deal with errors in the real world of application programming, the first part of this chapter discusses the variety of techniques available in ASP.NET for handling errors, including custom error pages and structured exception handlinga new feature of Visual Basic .NET.In addition to handling errors in ASP.NET applications, most developers want to figure out what's causing those errors. To that end, the latter part of this chapter discusses debugging using either the .NET Framework SDK debugger or Visual Studio .NET. The chapter also covers use of the ASP.NET trace feature to troubleshoot application problems.Code Access SecurityCode access security is a new .NET runtime feature that can dramatically reduce the likelihood of applications performing damaging actions by putting significant restrictions in place on untrusted or partially trusted code.Microsoft developed the Object Oriented Programming language C# (C Sharp). It created just-in-time C# compilers and a rich layer of standard data types and services it calls the Common Language Infrastructure (CLI). The combination of C# and the CLI, as packaged in June's beta 2 release of the .NET software developer's kit, supports the creation of text and graphical applications, server-side Web apps, components, and Web services. C# follows the time-honored Microsoft practice of invention through improvement. C# weaves together the best traits of C++, Java, JavaScript (now ECMAScript), and Visual Basic (VB). C#'s varied lineage makes it elegant, safe, and easy to learn. C# was developed to provide portability for distributed applications over network and internet. The language alone isn't enough to make an application: The accompanying CLI ensures that all C# programs will have a standard set of data types and classes covering everything from output formatting to network I/O. Microsoft's CLI is a key part of .NET. It standardizes data types so that all CLI-compliant software, regardless of programming language or platform, can share data without subjecting it to compute-intensive, error-prone translation. The CLI's closest relative is the Java Runtime Environment and its standard classes, but the difference is key: The CLI is built to support any programming language. Programmers involved in a project can code in the languages they like best.

Problem Definition

Today the organizations are growing fast and are increasing in size also. The digital age has created a worldwide economy, where customers, suppliers, partners are found around the globe. To compete, a company must find ways to communicate instantly and share knowledge across boundaries of time and distance that were once almost impossible to bridge. INTRA MAILING SYSTEM provides fast, easy and secure access tools for communicating within the organization network through mail, text, images and instant messages. It aims at connecting all the people within an organization in its various departments. INTRA MAILING SYSTEM meets the need of the employees in the organization for communicating with each other within their units without the use of internet connection. Problem Definition in Brief At connecting all the people in an organization and within its multiple branches. We can reduce the number of workers and speed up the information transferring by providing the computer based system for their needs. It also provides high security for the information. Problem in DetailIf an employee sends a request to another employee for transferring some information and the respective employee does not respond to his request in the first chance. The employee has to request again and there is no system to claim the higher authorities about the respective employee using the same system. Also the data was sent in the form of complete FORMS as there was no possibility of sending data in the form of partial pages .If Administrator wants to add new record of any user then the blank control is Present already even if he or she doesnt want to add new user then also that control of the add new is always displayed.ROLES TO BE ASSIGNEDThere will be two roles in this application, namely ADMIN MEMBER

ROLE OF ADMIN:In Brief:Login:-The user and the Administrator needs to login for their respective Accounts .Every user has its own user id and password. if the user id and password of the user Administrator Module: In administrator module we have five options:1. Compose Mail.2. Inbox3. Sent Mail.4. Record Book5. Delete User.

Compose mail:

When the Administrator selects the Compose mail option, then the form will be opened for composing a mail. After composing a mail .user clicks the Send Button. Then the user can send mail to any other user who has a user id in the organization.

Inbox:

In Inbox option, the user can check for the mails. If the user has any mails, then the mails are displayed. He will check the mails and can delete the unnecessary mails. If the user has no mails then the message No Mails is displayed.

Sent Mail:In Sent Mail option, the user can check for the sent mails from his account. If the user has any mails, then the mails are displayed. He will check the mails and can delete the unnecessary mails. If the user has no mails then the message No Mails is displayed. Draft:

In Draft option, the user can check for the mails. If the user has any mails, then the mails are displayed. He will check the mails and can delete the unnecessary mails. If the user has no mails then the message No Mails is displayed. In this only those messages are stored which are saved to draft.

Profile:

In Profile option, the user can check for his personal information If the user wants to update his personal information or wants to change the password of his own account, he can update by just clicking on the update button.

Record Book:

When the admin selects the Record Book tree list option, then the no. of users who currently are using the system are displayed. If the administrator has to see the records of the security etc. He has to just click the respective names under the record book and the respective record will be shown in the grid view.

Delete User:

When the administrator selects the option Delete User, he will delete an existing user, if any.

Create Account:

When the Administrator selects the Create Account a form will open in which the Administrator fills all the details related the new user.Record Book:-The record book option is a tree list in which I have kept the options to show the records of all the users from the different departments which helps the administrator to view the e_ids .if the administrator has to send the mail to a particular employee he can send the mail by just typing the e_id of the employee in the compose mail box. Normal User:In user module we have two options.1. Compose Mail2. Inbox3. Sent Mail4. Draft5. Profile Compose mail:When the user selects the Compose mail option, then the form will be opened for composing a mail. After composing a mail .user clicks the Send Button. Then the user can send mail to any other user who has a use id in the organization. In this Compose mail page user can send mail to all the HRs, security personals etc. if the user has to send the mail to a particular employee he can type the employee id of that particular person in the text box of the employee id and click send. Also the user has the option of saving the composed mail to draft. Inbox:In Inbox option, the user can check for the mails. If the user has any mails, then the mails are displayed. He will check the mails and can delete the unnecessary mails. If the user has no mails then the message No Mails is displayed.If the user wants to delete any mail from the inbox he has to just select the check box of that particular mail .If the user wants to read any particular email in detail he has to just click on the subject of the mail a new page will open and the user will see the message in detail. if the user needs to print all the mails from a particular Id he can click on the show details link button and the report will be shown .The user needs to click the print icon and the report will be printed to pdf. Sent Mail:In Sent Mail option, the user can check for the sent mails from his account. If the user has any mails, then the mails are displayed. He will check the mails and can delete the unnecessary mails. If the user has no mails then the message No Mails is displayed.

Draft:In Draft option, the user can check for the mails. If the user has any mails, then the mails are displayed. He will check the mails and can delete the unnecessary mails. If the user has no mails then the message No Mails is displayed. Profile:In Profile option, the user can check for his personal information If the user wants to update his personal information or wants to change the password of his own account, he can update by just clicking on the update button.After editing all the information the user likes, can click the update button and all the information is saved to database. Next time when the user clicks the profile menu it will show the latest information.

FOR MEMBER:Each member will also have a unique username and password so that no unauthorized user can access the database. The member may change respective password if desired.

FEASIBILITY STUDY

Feasibility is the measure of how beneficial or practical development of the system will be to a user. The main aim of feasibility study that we carried out was to explore whether the site satisfies to be technical, economically, and operationally feasible or not keeping this aspects in mind, we carefully evaluated our project to be technically, economically and operationally best applicable and well organized.

SYSTEM ANALYSIS:

We have carried out the following feasibility checks:Technical FeasibilityAs all the required software and hardware technologies are available, it is technically feasible to develop the system.Time Scheduling FeasibilityAs by knowing the requirements and the technology it can be completed within the specified time.Operational FeasibilityAs the operations or functions of the new system can easily fit in the working environment and the user can adapt to the system with little training, it is operationally feasible to implement this system.Economic FeasibilityThe organization can afford to implement this system; it is economically feasible to develop this system.

Proposed System Overview

The main objective of this system (Intra Mailing System) is to develop a communication interface for the organization. Intra Mailing System meets the needs of the employees in the org. for communicating with each other within their units. This application provides basic requirements such as

Mail Management File transfer Also enhanced features like Web Browsing & utilities.

The Intra Mailing System is very User-Friendly application. Only certain applications like System Monitoring, instant Messaging, and Chatting between two users need little training. Objectives and success criteria of the project:The success of the application depends upon meeting the following core set of objectives: The product will assist the organization in maintaining record of every project it undertakes. All the information relevant to the projects like size, time, effort and departments involved, etc is maintained by this tool. Advantages of Proposed System Data will be entered online. Data will not be outdated. Reduction in errors. Easy and effective analysis and compilation of data. Effective use of resources and administrative cost. Time Saving

System Design

System design is more creative process than system analysis because it deals with the development of the actual mechanics for a new workable system. System design is the highly significant phase in the software development where the designer plans how a system should be produced in order to make it functional, reliable and reasonably easy to understand, modify and maintain. Designing software systems means determining how requirements are realized and result is a software design document.A well-designed system is easy to implement, understandable and reliable and allows for smooth evolution. Without design, we risk building an unstable system. There are three characteristics that serve as a guide for the evolution of a good design: The design must implement all of the explicit requirements contained in the analysis model and must accommodate all of implicit requirements desired by the customer. The design must be readable, understandable guide for those who generate code and for those who test and subsequently support the software. The design should provide a complete picture of the software, addressing the data, functional and behavioral domain from an implementation perspective.

Design Phase includes:- Data Flow Diagrams Flowcharts

Data flow diagrams

DFD for present system:-A data flow diagram (DFD) is a graphical representation of the "flow" of data through an information system. A data flow diagram can also be used for the visualization of data processing (structured design). It is common practice for a designer to draw a context-level DFD first which shows the interaction between the system and outside entities. This context-level DFD is then "exploded" to show more detail of the system being modeled.

Level 0 DFD

Database Intra Mailing SystemUserAdmin

SendMail

Receive Mail Receive Mail At this point, you should have a good idea of the system boundary. All components within the system boundary are included within a single system/process box in the DFD. External entities lie outside the system boundary; internal entities will become locations for processes. The data flow arrows to and from the external entities will indicate the systems relationship with its environment. Remember that information always flows to or from a process, an external entity, or a data store. You can use a dashed line to show data flows between external entities that are strictly external to the system at hand if it will help make the DFD easier to understand.

LEVEL 1 DFD LogInManage MailAccount Admin Enter

Login Success

Enteruser name andPassword Mail Info Signout

Check Mail

Reply/Forwa-rd Email

Compose Mail Enter Subject & Body

Send Mail

User Account

User Account :Level 1Level 1 DFD It is important that the system relationship with its environment be preserved no matter how many levels deep you model. In other words, you cant have new data flows crossing the system boundary in Level 1. The next section deals with such non-valid data flows.The Level 1 DFD provides a high-level view of the system that identifies the major processes and data stores. Identify or list each incoming and outgoing data flow with a corresponding process that receives or generates data. Make sure you refer to your data item table for any missing internal data flows and to identify data stores. If your table contains documents with the same source and destination, they might be data stores. Some processes share data stores while some data stores are used by one process. It may be possible to move the single process data store inside the process itself. Identify those processes that only address internal Outputs and outputs, and use one process for each source or destination from the DFD.Database DesignAs a system data model is derived, many named entities, relationships and so forth will be identified. The names given to the entities should be chosen to give the reader some clues to their meaning. However, further description of the named entities is usually needed to make the model understandable. The description can be normal or formal. Whatever approach is used, it is always worth collecting all descriptions in single repository or data dictionary.

A data dictionary is simplistically a list of names used by the system arranged alphabetically. As well as the name, the dictionary should include description of the named entity and if the name represents a composite object, there may be a description of the composition. Other information such as the dare of creation, the creator and the representation of the entity may also be included depending on the type of model which is being developed.

Table:- User profile: Creating a new User account.

Primary key: Sr. No.FieldTypeNullKeyDefault

Idint(10)NONOAUTO

First NameVar char(200)YESNONULL

Middle Namevarchar(200)YESNONULL

Born onInt(20)YESNONULL

Gendervarchar(200)YESNONULL

DnameVarchar(50)YesNoNull

Addressvarchar(50)YESNONULL

Emailvarchar(50)YESNONULL

Cityvarchar(50)YESNONULL

Statevarchar(50)YESNONULL

E_idNvarchar(50)NOPrimary key

Passwordvarchar(50)YESNONULL

Confirm passwordvarchar(50)YESNONULL

Table:-Administrator: to check the authenticate administrator. FieldTypeNullKeyDefault

E_idIntNPk

Namevarchar(50)YNoNULL

F_namevarchar(50)YNoNULL

Dobvarchar(50)YNoNULL

Statevarchar(50)YNoNULL

Gendervarchar(50)YNoNULL

Adressvarchar(50)YNoNULL

Cityvarchar(50)YNoNULL

Dnamevarchar(50)YNoNULL

Emailvarchar(50)YNoNULL

PassNvarchar(50)YNoNULL

PhotoImageYNoNULL

Primary key: Sr. No.

Table:-City: Store cities information.

FieldTypeNullKeyDefault

City nameVarchar(50)Allow-Null

SIDIntAlowFkNull

Primary key: Sr. No.

FieldTypeNullKeyDefault

SIDIntNoPk-

StateVarchar(50)YesNoNull

Table:-State: Stores state information.Primary key: Sr. No.

Table: Draft: Stores information about the mail that not to be sent.

FieldTypeNullKeyDefault

S_noInt-PkNull

E_idnVarchar(50)Allow-Null

SubjectVarchar(50)Allow-Null

Message Varchar(max)Allow-Null

TimeVarchar(50)Allow-Null

AttachmentnVarchar(50)Allow-Null

Primary key: Sr. No.

Table:-Inbox: Shows mail stored. FieldTypeNullKeyDefault

S_noInt-PkAuto

E_idNvarchr(50)Allow-Null

SubjectVarchar(50)Allow-Null

MessageVarchar(max)Allow-Null

TimeVarchar(50)Allow-Null

AttachmentNvarchar(50)allow-Null

Primary key: Sr. No.

Table:-Sent Mail: Send mail to the appropriate user. FieldTypeNullKeyDefault

S_noInt-PkAuto

E_idNvarchr(50)Allow-Null

SubjectVarchar(50)Allow-Null

MessageVarchar(max)Allow-Null

TimeVarchar(50)Allow-Null

AttachmentNvarchar(50)allow-Null

Primary key: Sr. No.

Activity Diagram of Administrator

Activity of Admin Log in

Administrator Mode

After Authentication

Delete User Create User Send Mail Compose Mail

Sign Out

The above figure is the activity diagram of the administrator and explains all the specified functionalities in a pictographic view. To establish as an administrator, he should prove his authentication and then is allowed to perform the administration activities.The administrator has all the privilege of accessing all the mailboxes. He is also authorized to create new accounts for the users, delete the existing users. First the administrator should know the password of the server host (i.e. he should be the root user) and should know the password.

Activity Diagram of the User

Activity of User

Login

Sent mailsInbox sentInbox

Compose

DeleteInbox Draft

Save as draftMessage

Sign Out

It is an activity diagram of the general user. First of all, the user encounters a welcome page that prompts him to enter the valid user name (or valid user-id) and the corresponding password. After a successful user login, he is allowed to read his mails from the Inbox mailbox. He then can read the mails from the other mailboxes -Sent, Draft. He can also organize mails between the existing folders (or mail boxes).Apart from composing mails, he is also allowed to save the in-complete mails in the Draft mailbox.He then can logout from the mail service after the successful transactions. Once the user is logged out, he is only allowed through the login page.

Flow Chart of Admin

Start

LoginUser NamePassword

ValidNoHome

Yes

SelectLog out StopSearch userView MailSent MailCompose MailView userDelete existing userShow Details of user Start

Flow Chart of User

LoginUser NamePasswordValidNoHome

Yes

SelectLog out StopSearch userView MailSent MailCompose Mail

Hardware and software requirements

Windows Seven System RequirementsSeven CapableSeven Premium Ready

Processor800 MHz1 GHz

Memory512 MB1 GB

Graphics CardDirectX 9.0 capableDirectX 9.0 capable and WDDM 1.0 driver support

Graphics Memory32 MB128 MB

HDD Capacity20 GB40 GB

HDD Free Space15GB

Other DrivesDVD-ROM

Sql server Hardware Requirements (32-Bit)This table shows hardware requirements for installing and running SQL Server 2008R2 on the 32-bit platform.SQL Server 2008R2 (32-bit)Processor type1Processor speed2Memory (RAM)3

SQL Server 2008R2

Pentium III-compatible processor or higherMinimum: 600 MHz

Recommended: 1 GHz or higherMinimum: 512 MBRecommended: 1 GB or moreMaximum: Operating system maximum

Microsoft Visual Studio 2010 RequirementsSystem software required and used in the development of web applicationI. Operating SystemWindows Seven

II. Environment.NET Frame Work 3.5,4.0

III. Development ToolVisual Studio 2010

IV. Front-end ToolASP.NET using C#

V. Technology.NET

VI. Backend ToolSQL Server 2008R2

VII. BrowserGoogle Chrome and Mozilla Firefox

It's a web based application, so a robust hardware configuration is required.

I/O Screens

Welcome Page:Default.aspx is the welcome page of our project. This page gives information about the department. This page contains various links that direct to pages that contain information.

Login Page:- The user and the Administrator needs to login for their respective Accounts .Every user has its own user id and password .if the user id and password of the user.

Inbox Page: In Inbox option, the user can check for the mails. If the user has any mails, then the mails are displayed.

Sent Mail Page: In Sent Mail option, the user can check for the sent mails from his account.

Draft Page: In Draft option, the user can check for the mails. If the user has any mails, then the mails are displayed.

Admin Profile Page: In Profile option, the Admin can check for his personal information If the user wants to update his personal information.

Record Page: Record Book tree list options, then the no. of users who currently are using the system are displayed.

Create Account Page: When the Administrator selects the Create Account a form will open in which the Administrator fills all the detail.

Compose Mail Page: Compose mail option, and then the form will be opened for composing a mail. After composing the mail User can clicks the Send Button.

Message Detail Page: The user wants to read any particular email in detail he has to just click on the subject of the mail a new page will open and the user will see the message in detail.

User Profile Page: User Profile option, the user can check for his personal information if the user wants to update his personal information.

Limitations

There are some problems in the Existing System, which decrease its usability in very rapid fashion. User can only use this application from the computer which is connected to WAN. If the Main Server has some problem user has to wait till it solve to use application.

Conclusion

The project is able to successfully incorporate all the requirements specified by the user. Proper care has been taken during database design to maintain data integrity and to avoid redundancy. A client side validation has also been done with utmost care by considering all the possibilities and requirements of different users to avoid data inconsistency.The project is designed and coded in such a way that any further modification that are needed in future can be easily implemented without affecting the functionality of the system. The technical documentation provided in the project report helps the application developers understand the internal architecture of the system and thus assist them in enhancing the system.

Bibliography

BOOKS: C.J.Date, An Introduction to Database System,Narosa Publications- 1998, ISBN: 978-81-85015-58-3. David Cockmen, Oracle Database Development- Tech Media , Publications-1997, ISBN:10, 0672310252. Joseph Schmuller, Teach Yourself UML in 24 Hours, Techmedia Publications-1999, ISBN:10: 067232640X. Pankaj Jalote, Integrated Approach to Software Engineering, Narosa Publication- 1998, ISBN: 038720881X. Matthew MacDonnald, Beginning ASP.NET 3.5 in C# 2010, Appress Second Edition, ISBN: 1430226080. Bipin C.Desai, Introduction to Database System, Galgotia Publications, Revised Edition, ISBN: 0538749547. Bill Evjen, Scott Hanselman, Devin Rader, ASP.NET 3.5 In C# and VB, Wrox Publications, ISBN: 9780470187579. Damien Foggon, Beginning ASP.NET 2.0 Databases, Apress Second Edition, ISBN:10: 1430243805. E Balagurusamy, Programming in C#, Tata McGraw-Hill Second Edition 2008, ISBN: 0070667578. Elias M.Awad, System Analysis and Design, Galgotia Publications 2000, ISBN:81-85989-45-1.

WEB REFERENCES: www.google.com accessed on 22.01.13 www.codeproject.com accessed on 25.01.13 www.himachaldit.gov.in accessed on 02.02.13 www.w3schools.com/html accessed on 15.02.13 www.w3schools.com/aspnet accessed on 28.02.13 www.microsoft.com/sqlserver/2008R2/en/us/top-30-features.aspx accessed on 04.03.13 http://databases.about.com/od/sqlserver/a/storedprocedure.htm accessed on 017.03.13 www.msdn.com accessed on 01.04.13 www.c-sharpcorner.com accessed on 12.05.13