project report on bookworm
TRANSCRIPT
LINUXSOFT TECHNOLOGIES PVT. LTD.
A Project Report On
“www.BookWorm.com”
Online Book Details and Book ManagementBusiness Rules and Requirements Document
Rajasthan Technical University, Kota (Raj.)
Guide & Project Coordinator: - Submitted By:-
MR. DINESH SUMAN ANKIT SHARMA
PRASKANDAN NAGAR
Table of Contents .
1. Overview Project Overview
Introduction of Project Objective and Scope of the Project
2. Company Profile 2.1 Key Services 2.1.1 Website Design And
Development 2.1.2 Application Development 2.1.3 Corporate Training 2.1.4 Enterprises Solutions 2.1.5 Networking 2.1.6 Software Consultancy 2.1.7 Database Driven Solutions 2.1.8 Web Hosting 2.1.9 Web Programming And Scripts 2.1.10 Multilingual Sites 2.1.11 Web Promotion & Marketing
3. Methodology(SDLC) 3.1 Survey 3.2 Feasibility Study 3.3 Analysis 3.4 Preliminary Design 3.5 System Design 3.6 Implementation 3.7 Acceptance Test Generation 3.8 Quality Assurance 3.9 Database Conversion 3.10 Installation
4. Tools And Technologies 4.1 Introduction to .NET 4.2 Introduction to ASP.NET 4.3 Advantages of ASP.NET
2
4.4 Features of ASP.NET 4.6 Hardware & Software Specificaion
5. System Implementation 5.1 Outputs/Snapshots 5.2 Database Design
6. Acceptance test Generation 6.1 System Testing And Debugging 6.2 Types Of Testing
7. Implementation 7.1 Description
8. Conclusion
9. Bibliography
Declaration__________________
3
I express my warmest thanks & deep sense of gratitude to the individuals for their generous help in discussing the project and giving their valuable time in successful completion of this project. Time to time I got constructive suggestions, guidance and encouragement.
First of all, with much pride and delight I would like to express my sincere thanks to Mr. Rohit Gupta, Director, LinuxSoft Technologies Pvt. Ltd. , Jaipur, for valuable suggestions throughout the project work and I would like to express my special thanks to Mr.Dinesh Suman,Project Guide, , LinuxSoft Technologies Pvt. Ltd. for her excellent guidance and Without her sustained interest and encouragement, this work could not have been possible to reach the state of completion with satisfaction. In fact it is real devotion to the development work, which instilled in me, the need of a passionate commitment to pursue this dissertation.
The project training here at, LinuxSoft Technologies Pvt. Ltd, Jaipur has been very useful and enlightening experience for me. The knowledge I gained here in the field of Software Development would greatly help me in developing the software in future for the organization.
This is a Project work undertaken in context of partial fulfillment of the degree of Bachelors in Technology (B.tech) by Rajasthan Technical University (R.T.U). The project has been prepared jointly by Ankit Sharma and Praskandan Nagar who both are pursuing their Bachelors in Technology in the field of Information Technology. The students are presently studying in their VII semester from Uttam Devi Mohan Lal College of Engineering (A reputed institute of JECRC foundation), Jaipur.
PROJECT OVERVIEW
ABSTRACT OF THE PROJECT:-
The main aim of the project is to make the working of Online Book Store very simple and easily achievable.
4
The major objective of the project is to make the process of Online Book Store easy and user friendly
Also, an utmost care has been taken to make this project totally system efficient. This project intends to introduce more user friendliness in the various activities such as- book updating, maintenance, and searching.
The process of book maintenance and updation can also be accomplished by the admin. The entire information is maintained in the database or files and has been secured with security measures; only authorized user can retrieve the necessary information which can easily be accessible from the file.
“Online Book Store” has been designed to computerize the following functions -
Creating new account Providing a specific Books Show the Category Modification to existing Category Modification to existing Details Updation of Books Deletion of existing Books, Author and Publisher Administrative Login Change Password Addition of New User Feedback Help Section
COMPANY PROFILE
Linux Soft Technologies Pvt. Ltd., Jaipur is the Redhat Authorized training partner, exam centre & Registered with Govt. of India. We are the leading Training–Solution-Development organization of Redhat Linux, Oracle, Cisco, Microsoft, Sun Microsystems, VHDL / VLSI & ROBOMAKING-EMBEDDED SYSTEMS. We have been providing services in
5
imparting training and solution in Networking domain & Programming covering LAN, MAN, WAN with the complete offerings in Internet Security.
Based on our extensive support experience with a variety of customers, Linux Soft Technologies Pvt. Ltd. has developed a unique approach for technical support. We offer consulting and planning, integration and maintenance services for many open source projects, allowing you to deploy them across your network with complete peace of mind. With growing popularity and acceptance of Linux, RoboMaking, VLSI, Oracle, and Routers in the govt. sector we started a company, The Linux Soft Technologies Pvt. Ltd. to provide all Computer based solutions under one roof.
Linux Soft Technologies Pvt. Ltd. is
1) An Authorized Redhat Training partner & Exam Centre from USA, Microsoft Certified Solution Provider (MCSP) & Cisco Solution Provider.
2) Training, Solution & Development Company Registered by Govt. of INDIA.
Background
Linux Soft TECHNOLOGIES Pvt. Ltd. is providing full service security and data networking solutions provider & Training centre for all major I.T Certifications. We provide complete, reliable, and dynamic network
6
solutions, Web Solution & Security Solution to our clients. We design, develop, train, and deploy state - of - the - art information and communication system that are best suited to the needs of our customers.
Philosophy
Linux Soft TECHNOLOGIES Pvt. Ltd. is committed to addressing each and every customer opportunity with a partnering approach. Based upon the customer's requirements, we design a solution that meets their business objectives. We ensure that our solution will provide growth and migration plans for the future. Linux Soft TECHNOLOGIES Pvt. Ltd. incorporates only the highest quality products and services in its solutions.
This approach guarantees that all of our solutions meet the following criteria: overall quality, cost effectiveness, reliability, availability, maintainability, and are standards based.
People
The Linux Soft TECHNOLOGIES Pvt. Ltd. family is a team of qualified, skilled, highly trained and highly motivated professionals.
We believe in the adage that a company is best defined by its people- dedicated, enthusiastic and innovative.
There are no "Sales people" at Linux Soft TECHNOLOGIES Pvt. Ltd. Each employee is responsible for creating new business opportunities through a creative approach which combines cutting edge technology skills with expertise in the domain of networks.
Network Security Solution
The number of intrusions/hacking into private computer networks from the Internet is growing rapidly, in parallel with the explosive growth of the Internet; the extent of criminal activities within the Internet is expected to
7
grow at an alarming rate. As businesses make increasing use of the Internet, this has also led to a spurt in deliberate abuse and criminal activities in this new medium.
To protect your network from internal and external threats, Linux Soft Technologies Pvt. Ltd. Provides the most complete and comprehensive security solution from start to finish. If your company houses proprietary data and you have not addressed security, contact Linux Soft Technologies Pvt. Ltd. immediately. Security is not just a firewall.
Network Security
Linux Soft Technologies Pvt. Ltd. prides itself on its ability to offer scalable, turnkey security solutions, which includes the following process.
*Define Security Plan*Create network security design*Provide hardware and software *Implementation of security Architecture*Configuration of hardware and software*Ongoing security consulting services
Linux / Windows Server-Setup Solution
Linux Soft Technologies have implemented many Linux – Windows Solution. In Linux & Windows we provide Solution for DNS, DHCP, WEB, MAIL, FIREWALL, PROXY, NETWORK INSTALLATION, ADS, BACKUP-RESTORE & Troubleshooting.
Security Services
Linux Soft Technologies Pvt. Ltd. security audit looks at the current state of your information security and evaluates it against a benchmark - as directed by your internal policies, industry standards or applicable legislation. At the end of this audit, Linux Soft Technologies Pvt. Ltd. will prepare a paper and discuss the "GAP ANALYSIS" along with options to "plug" the gaps. Linux Soft Technologies Pvt. Ltd. will then work with your team to come to a level of risk and cost of security which you feel happy with.
8
Firewall Services
A firewall is protective fence around your network. Linux Soft Technologies Pvt. Ltd. range of firewall services is one of the most comprehensive in the market today. Our firewall solutions are not simply of the shelf, but are designed and implemented after a complete security audit of the organization's network. Linux Soft Technologies Pvt. Ltd. firewall suite has products from all leading vendors.
Anti-Virus Services
We monitor your gateway to the Internet for viruses, worms and Trojan horse programs, which continue to cause significant losses to organizations. Our continuous monitoring allows us to update patches remotely and immediately from our 24x7 secure lab- thus ensuring you are protected to highest level at all times.
VPN Services
We create a secure VPN tunnel from your corporate networks to your clients. We achieve confidentiality, integrity and authenticity for your network users by implementing IPSec with IKE options and using AES or 3DES or IDEA algorithms.
WAN Services
9
Linux Soft Technologies Pvt. Ltd. range of WAN solutions runs the entire gamut from leased lines, ISDN, Broadband & Frame Relay. From large corporations to small home offices to mobile users we have the WAN Technology to suite every need. Our WAN Solutions are a byword for efficiency, robustness, flexibility and maintainability. .
Linux Soft Technologies Pvt. Ltd. undertakes total consultancy for WAN's including the supply and configuration of Modems, CSU/DSU, Remote Access Servers, Routers, Firewalls, etc. We coordinate installation of all necessary cabling and ancillary support infrastructure to insure all elements necessary for a robust network are in place.
Leased Lines
Linux Soft Technologies Pvt. Ltd. has setup many Leased lines with speeds ranging from 64Kbps to 512kbps, to provide dedicated connectivity to customers.
ISDN
10
Linux Soft Technologies Pvt. Ltd. is a virtual powerhouse of ISDN solutions, with unsurpassed proficiency in ISDN BRI, ISDN Leased Lines to ISDN Backups to Telecommuter ISDN Dial Ups.
We configure ISDN BRI routers, NT Boxes and TA's.
Linux Soft Technologies Pvt. Ltd. Is providing Training program on following Technologies –
Red Hat Linux – RHCT, RHCE
Cisco System – CCNA, CCNP, CSPFA
Microsoft – MCP, MCSA, MCSE 2003, VB.Net, ASP.Net, C#.Net
CompTia – A+, Network+
Sun Microsystems – Java, J2EE
Oracle – Oracle DBA/Developer
VHDL/VLSI, Robomaking / Embedded Systems
Security – CEH, CCSA
Linux Soft Technologies Pvt. Ltd. Is providing Solution on following Technologies –
1) Redhat Linux
2) Cisco Router – Switch Implementation
3) Windows Server Installation & Configuration
4) Cisco Pix Firewall Implementation
5) Web Hosting, Domain Registration
6) Web Site Development, Web Solution
7) Software Development
8) Electronic Projects
9) Database Solution
11
Contact Us
Contact: Linux Soft TECHNOLOGIES Pvt. Ltd.
Address:5 Lal Kothi Scheme, Vidhan Sabha Road, Behind Apex Mall , Jaipur
(Raj.).
Phone Number: 0141-5531790 , +91 9828112636
Website: www.linuxsoftjpr.org
Email Address: [email protected]
12
: Software Development Life Cycle :
Software Development Life Cycle (SDLC) is a structured sequence of
phases for implementing an information system.
A System/Software development life cycle (SDLC) is a logical process by
which systems analysts, software engineers, programmers and end-users build
information systems and computer application to solve business problems and
needs.
The System/Software development life cycle (SDLC) is a conceptual
model used in project management that describes the stages involved in an
information system development project, from an initial feasibility study through
maintenance of the completed application.
In the software development process we focus on the activities
directly related to the production of the software, for example, design, coding, and
testing. A development process is a sequence of steps. Each step performs a well-
defined activity leading towards the satisfaction of the project goals, with the
output of one step forming the input of the next one.
We have followed the concept of SDLC in the following way:
Survey Feasibility Study Analysis Preliminary Design System Design Implementation Acceptance Test Generation Quality Assurance Database Conversion Installation
: Requirement Analysis :
13
Requirement Analysis is the first phase of the SDLC. First, we need to figure out
what the problem is (analysis)? We must know exactly what we want to do before
we can begin to do it. A clear understanding of exactly what is needed is necessary
for creating a solution.
In this phase Business Analysts (BA), find out what is the problem and what are requirements and so on.It begins with a request from the user for a new system. It involves the following:
Identify the requirement for the system. Clarify deficiencies in the current system. Identify deficiencies in the current system. Establish goals and objectives for the new system. Determine the feasibility for the new system.
Prepare a project charter that will be used to guide the reminder of the project.
: Feasibility Study :
Feasibility Study is basically the test of the proposed system in the light of its
workability, meeting user’s requirements, effective use of resources and of course,
the cost effectiveness.
It is a set of manual & computerized components for
gathering, storing & processing business data for an organization. It also converts
such data useful decision oriented information.
The main goal of feasibility study is not to solve the
problem but to achieve the scope. In the process of feasibility study, the cost and
benefits are estimated with greater accuracy. It has three types:
Operational Feasibility
Technical Feasibility
Economic Feasibility
Through Feasibility Study, we can specify User Requirement
Specification (URS) and Software Requirement Specification (SRS).
14
Depending on the results of the initial investigation, the survey is
expanded to a more detailed feasibility study.
Formation of a project form and appointment of a project leader.
Preparation of System Flow Charts.
Enumerate proposed candidate system.
Describe the characteristics of that candidate system.
Determine and evaluate the performance of that candidate system.
Weight system performance and cost data.
Selection of the best candidate system.
.
ANALYSIS .
Analysis is a detailed study of the various operations performed by a
system and their relationships within and outside of the system. This
activity is also used to study the system in details. The objective of this
step is to develop structured system specifications for the proposed
system. The structured system specification will be called the Essential
Model. It involves:
Detailed study of the system.
Understand the procedure of the system.
Determine the scope of the system.
Define the goals of the proposed system.
PRELIMINARY DESIGN .
The most creative and challenging phase of the system life cycle is
System Design. The term design describes the final system and the
process by which it is developed. This activity deals with certain design
issues that are to be finalized in consultation with the user. The two
15
most important issues of relevance to the user are the automation
boundary & the human machine interface. The output of this activity is
the user implementation model. This model, in addition to the essential
model defines the following for the system:
Automation Boundary
Report Layout
Workable plan for implementing the candidate system.
Screen layouts for the data entry forms
Menus
Information on personnel, money, hardware, facilities, and their
estimated cost must also be available.
DESIGN .
System Design involves the transformation of the user implementation
model into software design. The first step is to determine how the
output is to be produced and in what format. Second, input data and
master files (database) have to be designed to meet the requirements
of the proposed output.
The design specification of the proposed system consists of the
following:
Database schema
Pseudo code for all the modules.
CODING .
After designing the new system/software, the whole
system/software is required to be converted into computer language. Coding the
new system/software into computer programming language does this. It is an
important stage where the defined procedures are transformed into control
specifications by the help of a computer language. This is also called the
16
Programming Phase in which the programmer converts the program
specifications into computer instructions, which we refer as programs. The
programs coordinate the data movement as and control the entire process in a
system/software.
TESTING .
Before actually implementing the new system/software into operations, a test run
of the system/software is done removing all the bugs, if any. It an important
phase of a successful system. After codifying the whole programs of the system,
a test plan should be developed and run on a given set of test data.
In the system/software testing stage, we check the overall
behavior of the system/software against the functional and the performance
requirements. There are two type of testing:
White-Box: Internal part (code) of the project is testing.
Black-Box: System behavior (input/output) is checked.
IMPLEMENTATION .
After having the user acceptance of the new system/software developed, the Implementation phase begins.
Implementation is the stage of a project during which
theory is turned into practice. In this phase, user can know how to execute the
package, how to enter data and so on.
The implementation phase is less creative then system design. This activity includes programming, testing & integration of modules into progressively more complete system.
It is primarily concerned with user training, site preparation, and file conversion. During the final testing user acceptance is tested, followed by user training.
System testing checks the readiness and accuracy of the system to access, update, and retrieve data from new files. The output of this activity is the complete integrated system.
17
Major sub activities Coding Integration Testing Debugging
Inputs Project character Design specification
Outputs Integrated Systems
MAINTENANCE .
When the implementation report is submitted, an Maintenance should be made to
determine whether the system/software meets the objectives stated in the general
design report.
In this phase, users may be able to suggest the easy-to-
implement improvements.
ACCEPTANCE TEST GENERATION .
This activity generated a set of test data that can be used to test the new system before accepting it. If successful, the program(s) is then run with “live” data. Otherwise a diagnostic procedure is used to locate and correct errors in the program.
Input Project Character
Output Quality Assurance test set
DATABASE CONVERSION .
18
This activity involves conversion of data from the existing system (if any) to the new system.
PROCEDURE DESCRIPTION .
The objective of this step is to produce a manual, which may be used as a guide for operating the system.InputsProject CharacterUser implementation modelOutputsUser manual (guide for end user)
INSTALLATION .
This is another activity of the System Development Life Cycle. The change over from the current system to the new system is done.
InputsProject CharacterUser manualOutputsInstalled system This project involves all the activities of the System Development Life Cycle except for the database conversion and installation.
: TOOLS AND TECHNOLOGY :
19
ASP.NET
ASP.net is the latest version of Microsoft’s Active Server pages Technology (ASP).
ASP.NET is a unified Web development model that includes the services necessary
for you to build enterprise class web application with a minimum of coding. ASP.net
is part of .net framework, and when coding ASP.net you have access to classes in
the .net framework. You can code your applications in any language compatible
with the common language runtime (CLR), including Microsoft Visual Basic, C#,
and Jscript, .Net and J #. These languages enable you to develop ASP.Net
applications that benefit from the common language runtime, type safety and
inheritance and so on.
ASP.NET Includes A page and control framework.
The ASP.NET compiler.
Security Infrastructure.
State-management facilities.
Application configuration.
Health monitoring and performance features.
Debugging support.
An XML web service framework.
Extensible hosting environment and application life cycle management.
An extensible designer environment.
ASP is a server side scripting technology that enables scripts (embedded in web pages) to be executed by an Internet Server.
ASP is a Microsoft technology.
ASP stands for Active Server Pages.
ASP is a program that runs inside IIS.
IIS stands for Internet Information Services.
IIS comes a free component with Windows 2000.
IIS is also a part of the Windows NT 4.0 Option pack.20
PWS is a smaller – but fully functional version of IIS.
PWS can be found on your windows 95/98 CD.
ASP file
An ASP file is just the same as an HTML file. An ASP file can contain text, HTML, XML and scripts. Scripts in an ASP file are executed on the server. An ASP file has the file extension “.asp”.
ABOUT ASP.NET
ASP 3.0 is the latest version of ASP, but there will never be an ASP 4.0 version .
ASP.NET is the next generation ASP, but it’s not an upgraded version of
ASP.ASP.NET Framework. Microsoft spent three years rewriting ASP.NET from the
ground up, and ASP.NET is not fully backward compatible with ASP 3.0.
.NET FRAMEWORK
The .NET framework is the infrastructure for the Microsoft .NET platform. The .NET
Framework is an environment for building, deploying and running web applications
and the .NET framework contains a common language runtime and common class
libraries like ADO.NET, ASP.NET and Windows Forms – to provide advanced
standard services that can be integrated into a variety of computer systems.
The.NET framework provides a feature-rich application environment, simplified
development and easy integration between a numbers of different development
languages.
The .NET framework is language neutral. Currently it supports C++, C#, Visual Basic and Jscript.Microsoft Visual Studio .Net is a common development for the .net framework.
Differences between ASP and ASP.NET
ASP .NET has a better language support, a large set of new
controls and XML based components and better user authentication.
21
ASP.NET provides increased performance by running compiled
code.
ASP.NET is not fully backward compatible with ASP.
New in ASP.NET
Better language support Programmable controls. Event –Driven programming. XML-Based components. User authentication, with accounts and roles. Higher scalability. Increased performance – compiled code . Easier configuration and deployment. Not fully ASP compatible.
Language Support
ASP.NET uses the new ADO.NET.
ASP.NET supports full Visual Basic , not VB script.
ASP.NET supports C# and C++.
ASP.NET supports Jscript as before.
ASP.NET Controls
ASP.NET contains a large set of HTML controls. Almost all HTML controls on a page
can be defined as ASP.NET control objects that can be controlled by
scripts .ASP.NET also contains a new set of object oriented input controls , like
programmable list boxes and validation controls. A new data grid control supports
sorting, data paging and everything you expect from a dataset control.
22
Software & Hardware Specification
Hardware Specification:
Processor :
Minimum: 600 megahertz (MHz) Pentium processor.
Recommended: 1 gigahertz (GHz) Pentium processor or higher.
Random Access Memory :
Minimum: 256 megabytes (MB).
Recommended: 512 MB or higher.
Hard Disk:
Without MSDN: 2 GB of available space required on installation drive.
1 GB of available space required on system drive.
With MSDN: 3.8 GB of available space required on installation drive with a
full MSDN install or 2.8 GB of available space required on installation drive
with a default MSDN install. 1 GB of available space required on system
drive.
Display:
Minimum: 800 X 600 256 colors.
Recommended: 1024 X 768 High Color - 16-bit.
Software Specification:
23
Operating System:
Minimum:-
Microsoft Windows 2000 SP4.
Recommended:-
Microsoft Windows XP SP2 (All Edition).
Microsoft Windows Server 2003 SP1 (All Edition).
Web Browsers:
Minimum: Internet Explorer 5, Mozilla 5, Firefox 2, Netscape 7.
DATABASE:
Microsoft SQL Server 2005.
SOFTWARE TOOLS:
Language : ASP.NET 2008 or Visual Studio 2008
Server Language : C#
: FRONT - END :
24
The frontend that has been used for developing this project is ASP.NET 3.5 with C#(C Sharp) as the programming language for writing the source code. Now, let us take a brief look at this two frontend tools.
: BACK- END :
The backend that has been used for developing this project is SQL SERVER2005.SQL pronounced as “sequel” stands for structured query language. SQL is used to communicate with the database according to ANSI. It is a standard language for a relational database management system that use SQL are oracle, Sybase, Microsoft SQL SERVER, access interface etc.Standard SQL command such as “Select”, “Insert”, “Delete”, “Update”, “Create” and “Drop” can be used to accomplish almost everything that one needs to do with the database.
: SYSTEM ANALYSIS AND DESIGN :
DATA FLOW DIAGRAM:-
Graphical description of a system’s data and how the processes transform the data
is known as Data Flow Diagram (DFD). A DFD shows the flow of data through a
system. It views a system as a function that transforms the inputs into desired
outputs. Any complex system will not perform this transformation in a “Single
Stop”, and the data will typically undergo a series of transformations before it
becomes the output. The DFD aims to capture the transformations that take place 25
within a system to the input data so that eventually the output data is produces.
The agent that performs the transformation of data form one state to another is
called processes. So the DFD show the movement of data through the different
transformations of processes in the system.
Control information such as record counts, passwords and validation requirements
is not pertinent to a data flow diagram. Meaning full names for data flows,
processes and data stores must be chosen.
To construct the data flow diagrams, we use
Arrows: An arrow identifies the data flow- data in motion. It is a pipeline through
which information flows. All data flow are identified by unique names. These
names are chosen so that they convey some meaning about what the data is.
Circles: Circles stands for processes that convert data into information.
Open ended boxes: An open-ended box represents a data store or a temporary
repository of data.
Squares: A square defines a source (originator) or destination of system data.
There are three types level of DFD these are as flows-
: “1” Level DATA FLOW DIAGRAM :
At this level of D.F.D. all the process together with all the data stores (tables). It shows the true data flow i.e. how data is actually flowing in the system .Data is coming from which table and going into which table is clearly shown by this DFD.
26
This DFD is the main reference for the development of the system. After understanding the whole system, The application developer will fall back upon this DFD during the development phase.
27
Executive Summary : -
BookWorm is Book providing company site. User can see different BOOKS available , by different Authors and Publisher etc. User can select his book of interest and can order online and pay online.
This Web Application is developed for make easiest communication and
share the information between Book company & User Of The Web Site.
Having studied the various requirements of the customer, Our Team concluded the
following requirements of the Application:
BookWorm Website is the Book Search Engine.
It share the informations related to most famous books, new books, Books of
particular category.
The user of the site:
a. Administrator: Administrator will access all the page of site. Admin
can modify any information about the Books, Category , Author,
Pubisher etc any time.
b. Guest User : Guest user has interaction with all the information of
site related to any Book, Author, Publisher etc. He can store his
feedback on the website
28
: Web Page Description :
ADMIN LOGIN PAGE :-
Web Page Description
Name Details
Admin
User-ID
Tab Order: 1
Control: Text Field
Default: “Blank”
Function Description: Administrator will enter there Id. It will
accept nvarchar type value. It should not be blank otherwise
an error message will be displayed i.e. “Enter :Login Id”. If
Login Id not exist into database, an error message should be
displayed i.e. “Login Id Not Exist, Please type another Login Id.
Password Tab Order: +1
Control: Text Field
Default: “Blank”
Function Description: User will enter their password and it
29
should be masked.
Login Control: Button
Default: Enable
Function Description: If Login Id and Password is correct,
Index page of Administrator section Open.
Validation in Login Process: When Administrator wants to Login, the
following checks are carried out.
Administrator have to fill LoginId otherwise an error message should be
displayed i.e. “Enter Login Id”.
Administrator must have to enter Password otherwise an error message
should be displayed i.e. “Enter Password”.
LoginId and Password should be correct otherwise an error message will
be displayed i.e. “Either Login Id or Password is incorrect.”
ADMIN PANEL :-
Web Page Description
Name Details
30
Main Page Options:
ADMIN HOME
Category Management
Author Management
Publisher Management
Book Management
Account Manager
Help
Contact Us
About Us
FAQ
ADMIN HOME Control: HyperLink
Function Description: This option displays new page
that have the options to manage the available Contents.
Category
Management
Control: Hyper Link
Function Description: This option displays new page
that have the options to manage the Category.
Author
Management
Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Author.
Publisher
Management
Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Publisher.
Book
Management
Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Books.
Account Manager Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Admin Accounts.
Help Control: Hyper Link
31
Function Description: This option display new page that
have the options to manage the States in which Tours are
available.
Contact Us Control: Hyper Link
Function Description: This option display new page that
have the Contact Details
About Us Control: Hyper Link
Function Description: This option display new page that
have the About us Details.
FAQ Control: Hyper Link
Function Description: This option display new page that
have the options to manage the Frequently Asked
Questions.
BOOK MANAGEMENT :-
Web Page Description
Name Details
Select Category Control: Drop Down List
32
Function Description: This control the Category
Selection.
Book Display Control: Grid View
Function Description: This Grid View control the Books
of selected Category
Add Book Control: Button
Function Description: This Opens a a new view which
is use to Add New Books
Delete Control: Button into Grid View
Default: Enable
Function Description: This button delete the selected
Book from the database.
ADD BOOK :-
Web Page DescriptionName Details
Select
Category
Control: DropDownList
Default: Blank
33
Function Description: This field enables us to enter the
category name from the list.
Book Name Control: Text Box
Default: Blank
Function Description: This field accepts nvarchar type value.
Author Control: DropDownList
Default: Blank
Function Description This field enables us to enter the Author
name from the list.
Publisher Control: DropDownList
Default: Blank
Function Description: This field enables us to enter the
Publisher name from the list.
Edition Control: Text Box
Default: Select City
Function Description: This field accepts nvarchar type value.
Price Control: Text Box
Default: Blank
Function Description: This field accepts nvarchar type value..
Image Control: File Upload
Default: Blank
Function Description: This field accepts the image Url.
Submit Control: Button
Default: Enable
Function Description: This button have the functionality to
enter all the values into the database.
Reset Control: Button
Default: Enable
Function Description: Reset all the controls.
Finish Control: Link Button
34
Default: Back
Function Description: This have the functionality to go one
step back from the current page.
CATEGORY MANAGEMENT :-
Web Page Description
Name Details
Add
Category
Control: Link Button
Default: Enable
Function Description: This button navigate to new page that
have the options to add the new Category
35
Delete Control: Button of GridView
Default: Enable
Function Description: This button have the functionality to
delete the particular schedule.
Edit Control: Button of GridView
Default: Enable
Function Description: This button have the functionality to
navigate on new page that have the functionality to edit selected
schedule.
ADD CATEGORY :-
Web Page Description
Category
Name
Control: Text Box
Function Description: This field accepts nvarchar type value.
Submit Control: Button
Function Description: This button have the functionality to
enter all the values into the database.
36
Reset Control: Button
Function Description: Reset all the controls.
Finish Control: Button
Function Description: This have the functionality to go one
step back from the current page
AUTHOR MANAGEMENT :-
Web Page Description :
Name Details
Author
Managemen
t
Control: Grid View
Default: Enable
Function Description: The gridview shows the Author .
Delete Control: Button of GridView
Default: Enable
37
Function Description: This button has the functionality to
delete.
Edit Control: Button of GridView
Default: Enable
Function Description: This button have the functionality to
navigate on new page that have the functionality to edit
ADD AUTHOR : -
Web Page Description
Author
Name
Control: Text Box
Function Description: This field accepts nvarchar type value.
Author
Details
Control: Text Box
Function Description: This field accepts nvarchar type value.
E-Mail Control: Text Box
Function Description:. This field accepts nvarchar type value.
Website Control: Text Box
38
Function Description: This field accepts nvarchar type value.
Submit Control: Button
Function Description: This button have the functionality to
enter all the values into the database.
PUBLISHER MANAGEMENT :-
Web Page Description
Name Details
Publisher
Managemen
t
Control: Grid View
Default: Enable
Function Description: The gridview shows the Publisher
Delete Control: Button of GridView
Default: Enable
Function Description: This button has the functionality to
39
delete.
Edit Control: Button of GridView
Default: Enable
Function Description: This button have the functionality to
navigate on new page that have the functionality to edit.
ADD PUBLISHER :-
Web Page Description
Publisher
Name
Control: Text Box
Function Description: This field accepts nvarchar type value.
Publisher
Address
Control: Text Box
Function Description: This field accepts nvarchar type value.
Contact No. Control: Text Box
Function Description: This field accepts nvarchar type value.
E-MAIL Control: Text Box
40
Function Description: This field accepts nvarchar type value.
Website Control: Text Box
Function Description: This field accepts nvarchar type value.
Reset Control: Button
Default: Enable
Function Description: Reset all the controls.
Submit Control: Button
Function Description: This button have the functionality to
enter all the values into the database.
Finish Control: Button
Default: Back
Function Description: This have the functionality to go one
step back from the current page.
ACCOUNT MANAGER :-
41
Web Page Description
Name Details
Change
Password
Control: Button
Function Description: This button navigate to new page that
have the options to Change Password
Add New
Admin
Control: Button
Function Description: This button navigate to new page that
have the options to Add New Admin
Welcome To
Admin
Account
Manager
Control: Label
Function Description:
Welcome To Admin Account Manager
CHANGE PASSWORD :-
42
Web Page Description
Name Details
User Name Control: Text Box
Function Description: This field accepts nvarchar type value.
Enter
Password
Control: Text Box
Function Description: This field accepts nvarchar type value.
New
Password
Control: Text Box
Function Description: This field accepts nvarchar type value.
Confirm
Password
Control: Text Box
Function Description : This field accepts nvarchar type value.
ADMIN HELP SECTION :-
43
USER HOMEPAGE :-
ABOUT US :-
44
CONTACT US :-
FAQ :-
45
BOOKS PAGE :-
Web Page Description
46
Name Details
Select
Category
Control: Drop Down List
Function Description: helps to select the desired Category of
books
Books Control: Datalist
Function Description: Helps to Show the books of the selected
category
Buy Control: Button
Function Description: this button navigates you to the buy
section of the website
AUTHOR PAGE :-
Web Page Description
Name Details
47
Authors Control: Datalist
Function Description: Helps to Show the various Authors
stored in the database
: Database Design :
Once the input data is captured in the system, these may have to be
preserved either for a short or long period. These data will generally be stored in
files or databases in logical manner. The designer will have to advise the
techniques of sorting and retrieving data from these files. The system uses
database, which is described as follows.
1. Table Name : author
2.Table Name : category
3.Table Name : book
48
4.Table Name : login
5.Table Name : publisher
DATABASE SNAPSHOTS :-
49
Category Table :-
Author Table :-
Publisher Table :-
Book Table :-
Login Table :-
50
SECURITY FEATURES
Authentication is the process of identifying users. Authorization is the process of
granting access to users based on identity. Together, authentication and
authorization provide the means to keep your application secure from intruders.
The kind of security measures used in our System are as follows:
User Authentication
Only the Valid users, who are present in the pre defined list of Users stored
in User Master table are granted permissions to enter the System . Any user apart
from Record of users are denied access.
User Session Creation :-
This helps in the creation of isolated Login which reduces the chance of
trespassing into the Admin Panel……or any other restricted part.
CONCLUSION
51
The main objective of this package is to assist an online Book Management System or Search Engine in dealing with the customer of the Books for Ordering and Searching of the books with just a very less span of time..The chance of making mistake is negligible as with every transaction the database is updated. It also reduces service time.
With this Website the workload is reduced and hence the efficiency is increased due to the User Friendlyness of this website, the chance of error is Negligiable. The accuracy of this Website is optimum.
BIBLIOGRAPHY
ASP.NET in 21 days
Programming in C#
Essential Asp.Net with examples in C#
Professional ASP.NET 3.5
A First Look At Sql Server 2005
52