star bus report

Upload: ntestinfoonfb

Post on 13-Oct-2015

29 views

Category:

Documents


0 download

DESCRIPTION

In bus reservation system there has been a collection of buses, agent whoare booking tickets for customer’s journey which give bus number and departuretime of the bus. According to its name it manages the details of all agent, tickets,rental details, and timing details and so on. It also manages the updating of theobjects.

TRANSCRIPT

  • For more details please visit http://techbrij.com

    A

    PROJECT REPORT

    ON

    BUS RESERVATION SYSTEM

    Submitted in partial fulfillment for the

    Award of degree of

    Post Graduate Diploma

    In Information Technology

    (2008-10)

    Submitted By:

    BRIJ MOHAN DAMMANI

    200852200

    Submitted to:

    Symbiosis Centre for Distance Learning,

    Pune 411016, Maharashtra, India

  • For more details please visit http://techbrij.com

    ACKNOWLEDGEMENT

    A project like this takes quite a lot of time to do properly. As is often the case, this

    project owes its existence and certainly its quality to a number of people, whose name

    does not appear on the cover. Among them is one of the most extra ordinary

    programmers it has been my pleasure to work with Mr. Ankur Kaushik, who did more

    than just check the facts by offering thoughtful logic where needed to improve the project

    as a whole.

    We also thank to Mr. Sh. Hardayal Singh (H.O.D. -MCA Deptt. Engineering College

    Bikaner) who deserves credit for helping me done the project and taking care of all the

    details that most programmers really dont think about. Errors and confusions are my

    responsibility, but the quality of the project is to their credit and we can only thank them.

    We are highly thankful and feel obliged to Milan Travels staff members for nice Co-

    Operation and valuable suggestions in my project work.

    We owe my obligation to my friends and other colleagues in the computer field for their

    co-operation and support.

    We thank God for being on my side.

  • For more details please visit http://techbrij.com

    Contents

    Chapter 1 Introduction

    Chapter 2 Development model

    Chapter 3 System Study

    Chapter 4 Project Monitoring System

    Chapter 5 System Analysis

    Chapter 6 Operating Environment

    Chapter 7 System Design

    Chapter 8 System Testing

    Chapter 9 System Implementation

    Chapter 10 Conclusion

    Chapter 11 Scope of the Project

  • For more details please visit http://techbrij.com

    Introuction

    In bus reservation system there has been a collection of buses, agent who

    are booking tickets for customers journey which give bus number and departure

    time of the bus. According to its name it manages the details of all agent, tickets,

    rental details, and timing details and so on. It also manages the updating of the

    objects.

    In the tour detail there is information about bus, who has been taking

    customers at their destination, it also contain the detailed information about the

    customer, who has been taken from which bus and at what are the number of

    members he or she is taking his/her journey.

    This section also contain the details of booking time of the seat(s) or

    collecting time of the tickets, this section also contain the booking date and the

    name of agent which is optional, by which the customer can reserve the seats for

    his journey

    In Bus no category it contains the details of buses which are old/new. New

    buses are added with the details with bus no, from city to the city, type of the bus,

    rent of a single seat, if the bus has sleeper than the cost of sleeper, if the cabin has

    the facility for sitting than the cost of cabin seats, tour timings of the new bus has

    also been stored. How many buses are currently given and available in office?

    In seats specification, it gives the list of given issued and currently available

    seats and contain the information about seats like sleeper, cabin etc.

    The main objective of this project is to provide the better work efficiency,

    security, accuracy, reliability, feasibility. The error occurred could be reduced to

    nil and working conditions can be improved.

  • For more details please visit http://techbrij.com

    Development model

    Software Process Model

    Our project life cycle uses the waterfall model, also known as classic life cycle

    model or linear sequential model.

    The Waterfall Model

    The waterfall model encompasses the following activities:

    1. System/information Engineering and Modeling

    System Engineering and Analysis encompass requirements gathering at the system

    level with a small amount of Top-level design and analysis. Information

    Engineering encompasses requirements gathering at the strategic business level

    and at the business area level.

    2. Software requirements analysis

    System/Information

    Engineering

    Analysis Design Code Test

  • For more details please visit http://techbrij.com

    Software requirements analysis involves requirements for both the system and the

    software to be document and reviewed with the customer.

    3. Design

    Software design is actually a multi-step process that focuses on for distinct

    attributes of a program: data structure, software architecture, interfaces

    representation and procedural detail. The design process translates requirements

    into a representation of the software that can be accessed for quality before coding

    begins.

    4. Code Generation

    Code-Generation phase translates the design into a machine-readable form.

    5. Testing

    Once code has been generated, program testing begins. The testing focuses on the

    logical internals of the software, ensuring that all statement have been tested, and

    on the functional externals; that is, conducting test to uncover errors and ensure

    that define input will produce actual results that agree with required results.

    6. Support

    Software will undoubtedly undergo change after it is delivered to the customer.

    Change will occur because errors have been encountered, because the software

    must be adapted to accommodate changes in its external environment or because

    the customer requires functional or performance enhancements.

  • For more details please visit http://techbrij.com

    System Study

    Before the project can begin, it becomes necessary to estimate the work to be done, the

    resource that will be required, and the time that will elapse from start to finish. During

    making such a plan we visited site many more times.

    3.1 Project planning objectives

    The objective of software project planning is to provide a framework that enables

    the management to make reasonable estimates of resources, cost, and schedule.

    These estimates are made within limited time frame at the beginning of a software

    project and should be updated regularly as the project progresses. In addition,

    estimates should attempt to define best case and worst case scenarios so that

    project outcomes can be bounded.

    3.2 Software Scope

    The first activity in software project planning is the determination of software

    scope. Software scope describes the data and control to be processed, function,

    performance, constraints, interfaces, and reliability.

    3.2.1 Gathering Information Necessary for Scope

    The most commonly used technique to bridge communication gap between

    customer and the software developer to get the communication process started is

    to conduct a preliminary meeting or interview. When I visited the site we have

    been introduced to the Manager of the center, there were two other persons out of

    one was the technical adviser and another one was the cost accountant. Neither of

    us knows what to ask or say; we were very much worried that what we say will be

    misinterpreted.

  • For more details please visit http://techbrij.com

    We started to asking context-free questions; that is, a set of questions that will lead

    to a basic understanding of the problem. The first set of context-free questions was

    like this:

    What do you want to be done?

    Who will use this solution?

    What is wrong with your existing working systems?

    Is there another source for the solution?

    Can you show us (or describe) the environment in which the solution will

    be used?

    After first round of above asked questions. We revisited the site and asked many

    more questions considering to final set of questions.

    Are our questions relevant to the problem that you need to be solved?

    Are we asking too many questions?

    Should we be asking you anything else?

    3.2.2 Feasibility

    Not everything imaginable is feasible, not even in software. Software feasibility

    has four dimensions:

    Technologyis a project technically feasible? Is it within the state of the art?

    Finance Is it financially feasible?

    Timewill the project be completed within specified time?

    Resourcesdoes the organization have the resources needed to succeed?

    After taking into consideration of above said dimensions, we found it could be

    feasible for us to develop this project.

  • For more details please visit http://techbrij.com

    3.3 Software Project Estimation

    Software cost and effort estimation will never be an exact science. Too may

    variableshuman, technical, environmental, politicalcan affect the ultimate

    cost of software and effort applied to develop it. However, software project

    estimation can be transformed a black art to a series of systematic steps that

    provide estimates with acceptable risk.

    To achieve reliable cost and effort estimates, a number of options arise:

    1. Delay estimation until late in the project (since, we can achieve 100%

    accurate estimates after the project is complete!)

    2. Base estimates on similar projects that have already been completed.

    3. Use relatively simple decomposition techniques to generate project cost

    and effort estimates.

    4. Use one or more empirical models for software cost and effort

    estimation.

    Unfortunately, the first option, however attractive, is not practical. Cost estimates

    must be provided Up front. However, we should recognize that the longer we

    wait, the more we know, and the more we know, the less likely we are to make

    serious errors in our estimates.

    The second option can work reasonably well, if the current project is quite

    similar to past efforts and other project influences (e.g., the customer, business

    conditions, the SEE, deadlines) are equivalent. Unfortunately past experience has

    not always been a good indicator of future results.

    The remaining options are viable approaches the software project estimation.

    Ideally, the techniques noted for each option be applied in tandem; each used as

    cross check for the other. Decomposition techniques take a divide and conquer

    approach to software project estimation. By decomposing a project into major

    functions and related software engineering activities, cost and effort estimation can

    be performed in the stepwise fashion.

  • For more details please visit http://techbrij.com

    Empirical estimation models can be used to complement decomposition

    techniques and offer a potentially valuable estimation approach in their own right. A

    model based on experience (historical data) and takes the form

    D = f (vi)

    Where d is one of a number of estimated values (e.g., effort, cost, project

    duration and we are selected independent parameters (e.g., estimated LOC (line of

    code)).

    Each of the viable software cost estimation options is only as good as the

    historical data used to seed the estimate. If no historical data exist, costing rests on a

    very shaky foundation.

  • For more details please visit http://techbrij.com

    Project Monitoring System

    4.1 PERT Chart:

    Program evaluation and review technique (PERT) and critical path method

    (CPM) are two project scheduling methods that can be applied to software

    development. These techniques are driven by following information:

    Estimates of Effort

    A decomposition of the product function

    The selection of the appropriate process model and task set

    Decomposition of tasks

    PERT chart for this application software is illustrated in figure 3.1. The critical

    Path for this Project is Design, Code generation and Integration and testing.

    Figure 4.1 PERT charts for Bus Reservation System.

    Integration

    and test

    July 20, 2010

    Design

    May 24, 2010

    Requirement

    Analysis

    May 17, 2010

    Start

    Coding

    June 10, 2010

    Documentation and

    Report

    Aug 1, 2010

    Finish

    Aug 15, 2010

  • For more details please visit http://techbrij.com

    4.2 Gantt Chart:

    Gantt chart which is also known as Timeline chart contains the information

    like effort, duration, start date, completion date for each task. A timeline chart can

    be developed for the entire project.

    Below in figure 4.2 we have shown the Gantt chart for the project. All project

    tasks have been listed in the left-hand column.

    Start: May 17, 2010.

    Work tasks Planned

    start

    Actual

    start

    Planned

    complete

    Actual

    Complete

    Notes

    1.1 Identify needs and benefits

    Meet with customers

    Identified needs and constraints

    Established Product Statement

    Milestone: Product statement defined

    1.2 Defined

    Desiredoutput/control/input (OCI)

    Scope modes of interacton

    Documented (OCI)

    FTR: reviewed OCI with customer

    Revised OCI as required

    Milestone: OCI defined

    1.3 Defined the function/behavior

    Milestone: Data Modeling completed

    1.4 Isolation software elements

    Coding

    Reports

    Wk1,d1

    Wk1,d2

    Wk1,d3

    Wk1,d3

    Wk2,d1

    Wk2,d1

    Wk3,d3

    Wk4,d1

    Wk4,d3

    Wk5,d1

    Wk5,d1

    Wk1,d1

    Wk1,d2

    Wk1,d3

    Wk1,d3

    Wk5,d2

    Wk6,d1

    Wk7,d6

    Wk1,d2

    Wk1,d2

    Wk1,d3

    Wk1,d3

    Wk2,d2

    Wk2,d3

    Wk3,d5

    Wk4,d2

    Wk4,d5

    Wk1,d2

    Wk1,d2

    Wk1,d3

    Wk1,d3

    Wk5,d5

    W7,d5

    W8,d6

    Analysis

    and design

    is more

    time

    consuming.

  • For more details please visit http://techbrij.com

    1.5 Integration and Testing

    W9,d1 W9,d3 W11,d3

    Finish: Aug 15, 2010

    Figure: 4.2 Gant chart for the Bus reservation System.

    Note: Wk1week1, d1day1.

  • For more details please visit http://techbrij.com

    System Analysis

    Software requirements analysis is a process of discovery, refinement,

    modeling, and specification. Requirement analysis proves the software designer

    with a representation of information, function, and behavior that can be translated

    to data, architectural interface, and component -level designs. To perform the job

    properly we need to follow as set of underlying concepts and principles of

    Analysis.

    5.1 Analysis Principles

    Over the past two decades, a large number of analysis modeling methods

    have been developed. Investigators have identified analysis problems and their

    caused and have developed a variety of modeling notations and corresponding sets

    of heuristics to overcome them. Each analysis method has a unique point of view.

    However, all analysis methods are related by a set of operational principles:

    1. The information domain of a problem must be represented and understood.

    2. The functions that the software is to perform must be defined.

    3. The behavior of the software (as a consequence of external events) must be

    represented.

    4. The models that depict information function and behavior must be partitioned

    in a manner that uncovers detail in layered (or hierarchical) fashion.

    5. The analysis process should move from essential information toward

    implementation detail.

    By applying these principles, we approach the problem systematically. The

    information domain is examined so that function may be understood more completely.

    Models are used so that the characteristics of function and behavior can be communicated

    in a compact fashion. Partitioning is applied to reduce complexity. Essential and

    implementation vies of the software are necessary to accommodate the logical constraints

    imposed any processing requirements and the physical constraints imposed by other

  • For more details please visit http://techbrij.com

    system elements.We have tried to takes above said principles to heart so that we could

    provide an excellent foundation for design.

    5.1.1 The Information Domain

    All software applications can be collectively called data processing. Software is

    built to process data, to transform data from one form to another; that is, to accept

    input, manipulate it in some way, and produce output. This fundamental statement

    of objective is true whether we build batch software for a payroll system or real-

    time embedded software to control fuel flow to an automobile engine.

    The first operational analysis principle requires an examination of the information

    domain and the creation of a data model. The information domain contains three

    different views of the data and control as each is processed by a computer

    program:

    (1) information contend and relationships (the data model)

    (2) information flow, and

    (3) Information structure.

    To fully understand the information domain, each of these views should be

    considered.

    Information content represents the individual data and control objects that

    constitute some larger collection of information transformed by the software. For

    example, the data object, Status declare is a composite of a number of important

    pieces of data: the aircrafts name, the aircrafts model, ground run, no of hour

    flying and so forth. Therefore, the content of Status declares is defined by the

    attributes that are needed to create it. Similarly, the content of a control object

    called System status might be defined by a string of bits. Each bit represents a

    separate item of information that indicates whether or not a particular device is on-

    or off-line.

  • For more details please visit http://techbrij.com

    Data and control objects can be related to other data and control objects.

    For example, the date object Status declare has one or more relationships with the

    objects like total no of flying, period left for the maintenance of aircraft an others.

    Information flow represents the manner in which date and control change as

    each moves through a system. Referring to figure 6.1, input objects are

    transformed to intermediate information (data and / or control), which is further

    transformed to output. Along this transformation path, additional information may

    be introduced from an existing date store ( e.g., a disk file or memory buffer). The

    transformations applied to the date are functions or sub functions that a program

    must perform. Data and control that move between two transformations define the

    interface for each function.

    Figure 5.1 Information flow and transformation.

    Transform

    #1 Transform

    #2

    Data/Control

    Store

    Input

    Objects

    Intermediate

    data and

    control

    Output

    Object(s)

  • For more details please visit http://techbrij.com

    5.1.2 Modeling

    The second and third operational analysis principles require that we build models

    of function and behavior.

    Functional models. Software transforms information, and in order to accomplish

    this, it must perform at lease three generic functions:

    Input

    Processing

    And output.

    The functional model begins with a single context level model (i.e., the name of

    the software to be built). Over a series of iterations, more and more functional

    detail is gathered, until a through delineation of all system functionality is

    represented.

    Behavioral models. Most software responds to events from the outside

    world. This stimulus/response characteristic forms the basis of the behavioral

    model. A computer program always exists in some state- an externally observable

    mode of behavior (e.g., waiting, computing, printing, and polling) that is changed

    only when some even occurs. For example, in our case the project will remain in

    the wait state until:

    We click OK command button when first window appears

    An external event like mouse click cause an interrupt and consequently

    main window appears by asking the username and password.

    This external system (providing password and username) signals the

    project to act in desired manner as per need.

  • For more details please visit http://techbrij.com

    A behavioral model creates a representation of the states of the software and the

    events that cause software to change state.

    5.1.2 Partitioning (Divide)

    Problems are often too large and complex to be understood as a whole, for

    this reason, se tend to partition (divide) such problems into parts that can be easily

    under stood and establish interfaces between the part so that overall function can

    be accomplished. The fourth operational analysis principle suggests that the

    information, functional, and behavioral domains of software can be partitioned.

    In essence, partitioning decomposes problem intoits constituent parts.

    Conceptually, we establish a hierarchical representation of function or information

    and then partition and uppermost element by

    (1) exposing increasing detail by moving vertically in the hierarchy or

    (2) Functionally decomposing the problem my moving horizontally in

    the hierarchy.

    To issulstate these partitioning approaches let us consider our project

    BBuuss RReesseerrvvaattiioonn SSyysstteemm.. Horizontal partitioning and vertical partitioning of

    BBuuss RReesseerrvvaattiioonn ssyysstteemm is shown below.

    Horizontal partitioning:

    BBuuss RReesseerrvvaattiioonn SSyysstteemm

    System configuration Password acceptance Interact with user

  • For more details please visit http://techbrij.com

    During installation, the software (Bus Reservation System) used to

    program and configure the system. A master password is programmed for getting

    in to the software system. After this step only user can work in the environments

    (right cornor naming operation, administration and maintenance) only.

    Vertical partitioning of BBuuss RReesseerrvvaattiioonn SSyysstteemm function:

    BBuuss RReesseerrvvaattiioonn SSyysstteemm

    Configure system Username and Password

    Acceptance Rejection

    Interact with user Fail Retry

  • For more details please visit http://techbrij.com

    Operating Environment

    6.1 Hardware Specification:

    Server Side:

    Core 2 Due 2.4GHz and Above

    2 GB of Random Access Memory and Above

    160 GB Hard Disk

    Client Side:

    Pentium-IV 1.5MHs and Above

    512 MB of Random Access Memory and Above

    80 GB Hard Disk

    Software Specification: Environment: .NET Framework 3.5

    Technologies: ASP.NET, C#

    Database: MS Access

    Software: Visual Studio 2008, Notepad ++

    OS: Windows server 2003 R2, Windows XP SP2

    Browser: IE7, IE8, FF 3.5

    6.2.1 Front-end Environment (.NET Framework)

    The Internet revolution of the late 1990s represented a dramatic shift in the way

    individuals and organizations communicate with each other. Traditional

    applications, such as word processors and accounting packages, are modeled as

    stand-alone applications: they offer users the capability to perform tasks using data

    stored on the system the application resides and executes on. Most new software,

    in contrast, is modeled based on a distributed computing model where applications

    collaborate to provide services and expose functionality to each other. As a result,

  • For more details please visit http://techbrij.com

    the primary role of most new software is changing into supporting information

    exchange (through Web servers and browsers), collaboration (through e-mail and

    instant messaging), and individual expression (through Web logs, also known as

    Blogs, and e-zines Web based magazines). Essentially, the basic role of

    software is changing from providing discrete functionality to providing services.

    The .NET Framework represents a unified, object-oriented set of services and

    libraries that embrace the changing role of new network-centric and network-

    aware software. In fact, the .NET Framework is the first platform designed from

    the ground up with the Internet in mind.

    Microsoft .NET Framework is a software component that is a part of several

    Microsoft Windows operating systems. It has a large library of pre-coded solutions

    to common programming problems and manages the execution of programs

    written specifically for the framework. The .NET Framework is a key Microsoft

    offering and is intended to be used by most new applications created for the

    Windows platform.

    Benefits of the .NET Framework

    The .NET Framework offers a number of benefits to developers:

    A consistent programming model

    Direct support for security

    Simplified development efforts

    Easy application deployment and maintenance

    The .NET Class Library is a key component of the .NET Framework it is

    sometimes referred to as the Base Class Library (BCL). The .NET Class Library

    contains hundreds of classes you can use for tasks such as the following:

    Processing XML

    Working with data from multiple data sources

    Debugging your code and working with event logs

  • For more details please visit http://techbrij.com

    Working with data streams and files

    Managing the run-time environment

    Developing Web services, components, and standard Windows applications

    Working with application security

    Working with directory services

    The functionality that the .NET Class Library provides is available to all .NET

    languages, resulting in a consistent object model regardless of the programming

    language developers use.

    Elements of the .NET Framework

    The .NET Framework consists of three key elements as show in below diagram

    VB.NET VC#.NET VC++.NET JSCRIPT.NET

    ASP.NET

    Web Server Web Form

    Window Forms

    .NET Class Library

    System Data I/O Security

    Common Language Runtime

    Common Type System

    Operating System

    Visual

    Studio.NET

  • For more details please visit http://techbrij.com

    Components of the .NET Framework

    Common Language Runtime

    .NET Class Library

    Unifying components

    1. Common Language Runtime

    The Common Language Runtime (CLR) is a layer between an application and the

    operating system it executes on. The CLR simplifies an application's design and

    reduces the amount of code developers need to write because it provides a variety

    of execution services that include memory management, thread management,

    component lifetime management, and default error handling.

    The CLR is also responsible for compiling code just before it executes. Instead of

    producing a binary representation of your code, as traditional compilers do, .NET

    compilers produce a representation of your code in a language common to the

    .NET Framework: Microsoft Intermediate Language, often referred to as IL. When

    your code executes for the first time, the CLR invokes a special compiler called a

    Just In Time (JIT) compiler, Because all .NET languages have the same compiled

    representation, they all have similar performance characteristics. This means that a

    program written in Visual Basic .NET can perform as well as the same program

    written in Visual C++ .NET.

    2 .NET Class Library

    The .NET Class Library containing hundreds of classes that model the system and

    services it provides. To make the .NET Class Library easier to work with and

    understand, it's divided into namespaces. The root namespace of the .NET Class

  • For more details please visit http://techbrij.com

    Library is called System, and it contains core classes and data types, such as Int32,

    Object, Array, and Console. Secondary namespaces reside within the System

    namespace.

    Examples of nested namespaces include the following:

    System.Diagnostics: Contains classes for working with the Event Log

    System.Data: Makes it easy to work with data from multiple data sources

    System.IO: Contains classes for working with files and data streams

    The benefits of using the .NET Class Library include a consistent set of services

    available to all .NET languages and simplified deployment, because the .NET

    Class Library is available on all implementations of the .NET Framework.

    3. Unifying components

    Until this point, this chapter has covered the low-level components of the .NET

    Framework. The unifying components, listed next, are the means by which you

    can access the services the .NET Framework provides:

    ASP.NET

    Windows Forms

    Visual Studio .NET

    ASP.NET

    After the release of Internet Information Services 4.0 in 1997, Microsoft began

    researching possibilities for a new web application model that would solve

    common complaints about ASP.

    . ASP.NET introduces two major features: Web Forms and Web Services.

    1. Web Forms

  • For more details please visit http://techbrij.com

    Developers not familiar with Web development can spend a great deal of time, for

    example, figuring out how to validate the e-mail address on a form. You can

    validate the information on a form by using a client-side script or a server-side

    script. Deciding which kind of script to use is complicated by the fact that each

    approach has its benefits and drawbacks, some of which aren't apparent unless

    you've done substantial design work. If you validate the form on the client by

    using client-side JScript code, you need to take into consideration the browser that

    your users may use to access the form. Not all browsers expose exactly the same

    representation of the document to programmatic interfaces. If you validate the

    form on the server, you need to be aware of the load that users might place on the

    server. The server has to validate the data and send the result back to the client.

    Web Forms simplify Web development to the point that it becomes as easy as

    dragging and dropping controls onto a designer (the surface that you use to edit a

    page) to design interactive Web applications that span from client to server.

    2. Web Services

    A Web service is an application that exposes a programmatic interface through

    standard access methods. Web Services are designed to be used by other

    applications and components and are not intended to be useful directly to human

    end users. Web Services make it easy to build applications that integrate features

    from remote sources. For example, you can write a Web Service that provides

    weather information for subscribers of your service instead of having subscribers

    link to a page or parse through a file they download from your site. Clients can

    simply call a method on your Web Service as if they are calling a method on a

    component installed on their system and have the weather information

    available in an easy-to-use format that they can integrate into their own

    applications or Web sites with no trouble.

    Introducing ASP.NET

  • For more details please visit http://techbrij.com

    ASP.NET, the next version of ASP, is a programming framework that is used to

    create enterprise-class Web applications. The enterprise-class Web applications

    are accessible on a global basis, leading to efficient information management.

    However, the advantages that ASP.NET offers make it more than just the next

    version of ASP. ASP.NET is integrated with Visual Studio .NET, which provides

    a GUI designer, a rich toolbox, and a fully integrated debugger. This allows the

    development of applications in a What You See is What You Get (WYSIWYG)

    manner. Therefore, creating ASP.NET applications is much simpler.

    Unlike the ASP runtime, ASP.NET uses the Common Language Runtime (CLR)

    provided by the .NET Framework. The CLR is the .NET runtime, which manages

    the execution of code. The CLR allows the objects, which are created in different

    languages, to interact with each other and hence removes the language barrier.

    CLR thus makes Web application development more efficient.

    In addition to simplifying the designing of Web applications, the .NET CLR offers

    many advantages.

    Some of these advantages are listed as follows.

    Improved performance:

    The ASP.NET code is a compiled CLR code instead of an interpreted code. The

    CLR provides just-in-time compilation, native optimization, and caching. Here, it

    is important to note that compilation is a two-stage process in the .NET

    Framework. First, the code is compiled into the Microsoft Intermediate Language

    (MSIL). Then, at the execution time, the MSIL is compiled into native code. Only

    the portions of the code that are actually needed will be compiled into native code.

    This is called Just In Time compilation. These features lead to an overall improved

    performance of ASP.NET applications.

    Flexibility:

  • For more details please visit http://techbrij.com

    The entire .NET class library can be accessed by ASP.NET applications. You can

    use the language that best applies to the type of functionality you want to

    implement, because ASP.NET is language independent.

    Configuration settings:

    The application-level configuration settings are stored in an Extensible Markup

    Language (XML) format. The XML format is a hierarchical text format, which is

    easy to read and write. This format makes it easy to apply new settings to

    applications without the aid of any local administration tools.

    Security:

    ASP.NET applications are secure and use a set of default authorization and

    authentication schemes. However, you can modify these schemes according to the

    security needs of an application. In addition to this list of advantages, the

    ASP.NET framework makes it easy to migrate from ASP applications.

    Creating an ASP.NET Application

    After you've set up the development environment for ASP.NET, you can create

    your first ASP.NET Web application. You can create an ASP.NET Web

    application in one of the following ways:

    Use a text editor:

    In this method, you can write the code in a text editor, such as Notepad, and save

    the code as an ASPX file. You can save the ASPX file in the directory

    C:\inetpub\wwwroot. Then, to display the output of the Web page in Internet

    Explorer, you simply need to type http://localhost/.aspx in the Address

    box. If the IIS server is installed on some other machine on the network,

    replace"localhost" with the name of the server. If you save the file in some other

    directory, you need to add the file to a virtual directory in the Default WebSite

  • For more details please visit http://techbrij.com

    directory on the IIS server. You can also create your own virtual directory and add

    the file to it.

    Use the VS.NET IDE:

    In this method, you use the IDE of Visual Studio .NET to create a Web page in a

    WYSIWYG manner. Also, when you create a Web application, the application is

    automatically created on a Web server (IIS server). You do not need to create a separate

    virtual directory on the IIS server.

    Characteristics

    Pages

    ASP.NET pages, known officially as "web forms", are the main building block for

    application development. Web forms are contained in files with an ASPX

    extension; in programming jargon, these files typically contain static (X)HTML

    markup, as well as markup defining server-side Web Controls and User Controls

    where the developers place all the required static and dynamic content for the web

    page. Additionally, dynamic code which runs on the server can be placed in a page

    within a block which is similar to other web

    development technologies such as PHP, JSP, and ASP, but this practice is

    generally discouraged except for the purposes of data binding since it requires

    more calls when rendering the page.

    Note that this sample uses code "inline", as opposed to code behind.

    protected void Page_Load(object sender, EventArgs e)

    {

    Label1.Text = DateTime.Now.ToLongDateString();

    }

  • For more details please visit http://techbrij.com

    Sample page

    The current time is:

    Code-behind model

    It is recommended by Microsoft for dealing with dynamic program code to use the

    code-behind model, which places this code in a separate file or in a specially

    designated script tag. Code-behind files typically have names like MyPage.aspx.cs

    or MyPage.aspx.vb based on the ASPX file name (this practice is automatic in

    Microsoft Visual Studio and other IDEs). When using this style of programming,

    the developer writes code to respond to different events, like the page being

    loaded, or a control being clicked, rather than a procedural walk through the

    document.

    ASP.NET's code-behind model marks a departure from Classic ASP in that it

    encourages developers to build applications with separation of presentation and

    content in mind. In theory, this would allow a web designer, for example, to focus

    on the design markup with less potential for disturbing the programming code that

    drives it. This is similar to the separation of the controller from the view in model-

    view-controller frameworks.

  • For more details please visit http://techbrij.com

    Example

    The above tag is placed at the beginning of the ASPX file. The CodeFile property

    of the @ Page directive specifies the file (.cs or .vb) acting as the code-behind

    while the Inherits property specifies the Class the Page derives from. In this

    example, the @ Page directive is included in SamplePage.aspx, then

    SampleCodeBehind.aspx.cs acts as the code-behind for this page:

    using System;

    namespace Website

    {

    public partial class SampleCodeBehind : System.Web.UI.Page

    {

    protected override void Page_Load(EventArgs e)

    {

    base.OnLoad(e);

    }

    }

    }

    In this case, the Page_Load () method is called every time the ASPX page is

    requested. The programmer can implement event handlers at several stages of the

    page execution process to perform processing.

    User controls

    ASP.NET supports creating reusable components through the creation of User

    Controls. A User Control follows the same structure as a Web Form, except that

    such controls are derived from the System.Web.UI.UserControl class, and are

    stored in ASCX files. Like ASPX files, a ASCX contains static HTML or

  • For more details please visit http://techbrij.com

    XHTML markup, as well as markup defining web control and other User Controls.

    The code-behind model can be used.

    Programmers can add their own properties, methods, and event handlers. An event

    bubbling mechanism provides the ability to pass an event fired by a user control

    up to its containing page.

    Template engine

    When first released, ASP.NET lacked a template engine. Because the .NET

    framework is object-oriented and allows for inheritance, many developers would

    define a new base class that inherits from "System.Web.UI.Page", write methods

    here that render HTML, and then make the pages in their application inherit from

    this new class. While this allows for common elements to be reused across a site,

    it adds complexity and mixes source code with markup. Furthermore, this method

    can only be visually tested by running the application - not while designing it.

    Other developers have used include files and other tricks to avoid having to

    implement the same navigation and other elements in every page.

    ASP.NET 2.0 introduced the concept of "master pages", which allow for template-

    based page development. A web application can have one or more master pages,

    which can be nested. Master templates have place-holder controls, called

    ContentPlaceHolders to denote where the dynamic content goes, as well as HTML

    and JavaScript shared across child pages.

    Child pages use those ContentPlaceHolder controls, which must be mapped to the

    place-holder of the master page that the content page is populating. The rest of the

    page is defined by the shared parts of the master page, much like a mail merge in a

    word processor. All markup and server controls in the content page must be placed

    within the ContentPlaceHolder control.

  • For more details please visit http://techbrij.com

    When a request is made for a content page, ASP.NET merges the output of the

    content page with the output of the master page, and sends the output to the user.

    The master page remains fully accessible to the content page. This means that the

    content page may still manipulate headers, change title, configure caching etc. If

    the master page exposes public properties or methods (e.g. for setting copyright

    notices) the content page can use these as well.

    Performance

    ASP.NET aims for performance benefits over other script-based technologies

    (including Classic ASP) by compiling the server-side code to one or more DLL

    files on the web server. This compilation happens automatically the first time a

    page is requested (which means the developer need not perform a separate

    compilation step for pages). This feature provides the ease of development offered

    by scripting languages with the performance benefits of a compiled binary.

    However, the compilation might cause a noticeable but short delay to the web user

    when the newly-edited page is first requested from the web server, but won't again

    unless the page requested is updated further.

    The ASPX and other resource files are placed in a virtual host on an Internet

    Information Services server (or other compatible ASP.NET servers; see Other

    Implementations, below). The first time a client requests a page, the .NET

    framework parses and compiles the file(s) into a .NET assembly and sends the

    response; subsequent requests are served from the DLL files. By default ASP.NET

    will compile the entire site in batches of 1000 files upon first request. If the

    compilation delay is causing problems, the batch size or the compilation strategy

    may be tweaked.

    Developers can also choose to pre-compile their code before deployment, eliminating the

    need for just-in-time compilation in a production environment.

  • For more details please visit http://techbrij.com

    Database Queries

    The most common operation in SQL databases is the query, which is performed

    with the declarative SELECT keyword. SELECT retrieves data from a specified

    table, or multiple related tables, in a database. While often grouped with Data

    Manipulation Language (DML) statements, the standard SELECT query is

    considered separate from SQL DML, as it has no persistent effects on the data

    stored in a database. Note that there are some platform-specific variations of

    SELECT that can persist their effects in a database, such as the SELECT INTO

    syntax that exists in some databases.

    SQL queries allow the user to specify a description of the desired result set, but it

    is left to the devices of the database management system (DBMS) to plan,

    optimize, and perform the physical operations necessary to produce that result set

    in as efficient a manner as possible. An SQL query includes a list of columns to be

    included in the final result immediately following the SELECT keyword. An

    asterisk ("*") can also be used as a "wildcard" indicator to specify that all

    available columns of a table (or multiple tables) are to be returned. SELECT is the

    most complex statement in SQL, with several optional keywords and clauses,

    including:

    The FROM clause which indicates the source table or tables from which the data

    is to be retrieved. The FROM clause can include optional JOIN clauses to join

    related tables to one another based on user-specified criteria.

    The WHERE clause includes a comparison predicate, which is used to restrict the

    number of rows returned by the query. The WHERE clause is applied before the

    GROUP BY clause. The WHERE clause eliminates all rows from the result set

    where the comparison predicate does not evaluate to True.

  • For more details please visit http://techbrij.com

    The GROUP BY clause is used to combine, or group, rows with related values

    into elements of a smaller set of rows. GROUP BY is often used in conjunction

    with SQL aggregate functions or to eliminate duplicate rows from a result set.

    The HAVING clause includes a comparison predicate used to eliminate rows after

    the GROUP BY clause is applied to the result set. Because it acts on the results of

    the GROUP BY clause, aggregate functions can be used in the HAVING clause

    predicate.

    The ORDER BY clause is used to identify which columns are used to sort the

    resulting data, and in which order they should be sorted (options are ascending or

    descending). The order of rows returned by an SQL query is never guaranteed

    unless an ORDER BY clause is specified.

    The following is an example of a SELECT query that returns a list of expensive

    books. The query retrieves all rows from the Book table in which the price column

    contains a value greater than 100.00. The result is sorted in ascending order by

    title. The asterisk (*) in the select list indicates that all columns of the Book table

    should be included in the result set.

    SELECT *

    FROM Book

    WHERE price > 100.00

    ORDER BY title;

    The example below demonstrates the use of multiple tables in a join, grouping,

    and aggregation in an SQL query, by returning a list of books and the number of

    authors associated with each book.

    SELECT Book.title, count (*) AS Authors

  • For more details please visit http://techbrij.com

    FROM Book

    JOIN Book_author

    ON Book.isbn = Book_author.isbn

    GROUP BY Book.title;

    Example output might resemble the following:

    Title Authors

    ---------------------- -------

    SQL Examples and Guide 3

    The Joy of SQL 1

    How to use Wikipedia 2

    Pitfalls of SQL 1

    How SQL Saved my Dog 1

    (The underscore character "_" is often used as part of table and column names to

    separate descriptive words because other punctuation tends to conflict with SQL

    syntax. For example, a dash "-" would be interpreted as a minus sign.)

    Under the precondition that isbn is the only common column name of the two

    tables and that a column named title only exists in the Books table, the above

    query could be rewritten in the following form:

    SELECT title, count (*) AS Authors

    FROM Book

    NATURAL JOIN Book_author

  • For more details please visit http://techbrij.com

    GROUP BY title;

    However, many vendors either do not support this approach, or it requires certain

    column naming conventions. Thus, it is less common in practice.

    Data retrieval is very often combined with data projection when the user is looking

    for calculated values and not just the verbatim data stored in primitive data types,

    or when the data needs to be expressed in a form that is different from how it's

    stored. SQL allows the use of expressions in the select list to project data, as in the

    following example which returns a list of books that cost more than 100.00 with

    an additional sales_tax column containing a sales tax figure calculated at 6% of

    the price.

    SELECT isbn, title, price, price * 0.06 AS sales_tax

    FROM Book

    WHERE price > 100.00

    ORDER BY title;

    Some modern day SQL queries may include extra WHERE statements that are

    conditional to each other. They may look like this example:

    SELECT isbn, title, price, date

    FROM Book

    WHERE price > 100.00

    AND (date = '16042004' OR date = '16042005')

    ORDER BY title;

  • For more details please visit http://techbrij.com

    Chapter 7

  • For more details please visit http://techbrij.com

    System Design

    E-R DIAGRAM:

    BUSES

    Work

    area

    Give

    services

    Care of

    Divided

    BUS RESERVATION

    SYSTEM

  • For more details please visit http://techbrij.com

    The following DFD shows how the working of a reservation system could be

    smoothly managed:

    Works

    SLEEPER

    OR

    WITHOUT

    SLEEPER

    DEPARTMENT

    Full of DIFFERENT

    TYPE OF

    BUSES

    SEATS

    examine

    WORK AREAS

    DEPTT WITH ITS

    BUSES

    AGENT

    BUSES

    RECORDS

    DAILY

    ENTRY REC

    RESERVED

    AGENT

    VISITING

    AGENT

    AGENT

    DETAILS

    REPORT

  • For more details please visit http://techbrij.com

    DETAIL DESCRIPTION OF DATA FLOW DIAGRAM:

    We have STARBUS as our database and some of our tables (relation) are

    such as AGENT_BASIC_INFO, FEEDBACK, PASSANGER_INFO, STATIS and

    TIMELIST

    STARBUS

    AGENTBASICINFO

    FEEDBACK

    PASSANGERIFNO

    STATIS

    TIMELIST

  • For more details please visit http://techbrij.com

    In our table AGENT_BASIC_INFO we have following field such as agent_id,

    agent_name, agent_name, agent_fname, agent_shop_name, agent_shop_address,

    agent_shop_city, agent_phon_number etc.

    AGENT_BASIC_INFO

    AGENT_ID

    AGENT_NAME

    AGENT_FNAME

    AGENT_SHOP_NAME

    AGENT_SHOP_ADDRESS

    AGENT_SHOP_CITY

    AGENT_PHON_NUMBER

    AGENT_MOBIL_NUMBER

    AGENT_CURRENT_BAL

  • For more details please visit http://techbrij.com

    In our FEEDBACK table we have fields like name, Email, Phon, Subject,

    Comment, and User_type.

  • For more details please visit http://techbrij.com

    In our table PASSANGER_INFO we have filed like bill_no, c_name, c_phone,

    c_to, c_from, c_time, Ttalseat, Seatnumber, Amount, Agent_id and Status.

    FEEDBACK

    Name

    Email

    Comment

    User_type

    Phone

    Subject

  • For more details please visit http://techbrij.com

    In the table of TIME_LIST we have fields such as Sno, Satation_name,

    Rate_per_seat, Time, Reach_time and Bus_number.

    PASSANGER

    _INFO

    Bill_no

    C_name

    Amount Seat_no

    C_to

    C_time

    C_phon

    C_from

    Total_seat

    Status

    Agent_id

  • For more details please visit http://techbrij.com

    PROCESS LOGIC::

    TIME_LIST

    Sno

    Station_name

    Bus_number

    Reach_time

    Rate_perSeat

    Time

  • For more details please visit http://techbrij.com

    As the privatization of buses is increasing thus the need of its smooth

    management is also increasing the more we could facilitate the customers,

    the more they are comfortable with us, the more customers we have visiting

    our reservation unit .the above tables and modules facilitates many logics

    like:

    Number of buses in one unit

    Number of computers in particular department

    Number of users in a department

    Which bus has what tour on which day

    What are time table for different buses of different department

    What are the schedule for buses

    Schedule of a particular bus

    How many buses are there

    Each bus has how many seats

    How many seats are occupied

    Advance booking for seat

    How much money is collected in a particular day

    Bills for different customers

    Which seat has booked by agent

  • For more details please visit http://techbrij.com

    1. Index page

    This webpage is the starting page of the Website. It gives the followings:

    TollFree number of the other city. Display advantage of the StarBus Links for Agent list and seat status. Links for Feedback, FAQ, Terms and Conditions.

  • For more details please visit http://techbrij.com

    2. Status.

    As in the above image the Status webpage is displaying:

    Accessed by anyone. Information about the booking which seat is booked and which

    is empty.

  • For more details please visit http://techbrij.com

    3. Agent name.

    As in the above image the Agent name webpage is displaying:

    Accessed by anyone. Contains information about name, address and phone number

    of the agent.

  • For more details please visit http://techbrij.com

    4. Feedback

    As in the above image Feedback webpage is displaying:

    This page is access by any user Anyone can give feedback related to the site or services. Links for Terms and Conditions and Policy and Privacy.

  • For more details please visit http://techbrij.com

    5. FAQ

    As in the above image FAQ webpage is displaying:

    This page is access by any user Contain information about tour and services of web site.

    Such as how many agent office are there and what is the mode

    Of the pament.

  • For more details please visit http://techbrij.com

    6. Privacy Policy:

    As in the above image the Privacy and Policy webpage is displaying:

    This page is access by any user This page say that when customer using our services, we required

    information about customer his/her name, age, route and email so that we

    can inform them to there email also.

  • For more details please visit http://techbrij.com

    7. Terms and Conditions.

    As in the above image the Terms and Conditions webpage is displaying:

    Accessed by anyone. Useful for customer Contain information when to reach the starting point and what should do, in

    case when our ticket is lost.

  • For more details please visit http://techbrij.com

    8. Login page

    As in the image Login webpage is

    displaying:

    Accessed by the agent. Agent entered its user name and

    password and click on login.

    Contain link for Forget Password.

    9. Forget Password Page

    As in the image Forget

    Password webpage is

    displaying:

    It required user name who forget its password and then click on Next button.

    And also provide link for administration and other.

    10. Identity Confirmation.

    As in the above image Identify Confirmation for user webpage is displaying:

    The Question you have select at the time of registration.

  • For more details please visit http://techbrij.com

    You need to enter the answer for that question. After click on Next button. You will get your password on the

    show password webpage.

    11. Ticket Booking page.

    As in the above image the ticket booking page is displaying:

    Only accessed by the agent. Select the destination, departure date and time.

  • For more details please visit http://techbrij.com

    11. Select Seat page

    As in the above image the Select Seat page is displaying:

    Only accessed by the agent. Red seat indicates booked seat. You can choose rest of the seat.

    It will be converted into green seat.

  • For more details please visit http://techbrij.com

    12. Customer Information page

    As in the above image the Customer Information webpage is displaying:

    After selecting the seat. Agent enters the name and phnumber of the customer. Click on Go button for printing the ticket.

  • For more details please visit http://techbrij.com

    13. Ticket Print page

    As in the above image the Ticket print webpage is displaying:

    This page prints the Customer ticket. This contain customer information such as name, destination, Number of seat.

    These also reduce the agent balance.

  • For more details please visit http://techbrij.com

    14. Search Ticket.

    As in the above image the Ticket Search webpage is displaying:

    Only accessed by the Agent and Administration. Using PNR number, Agent can search the ticket.

  • For more details please visit http://techbrij.com

    15. Ticket Cancellation

    As in the above image the Ticket cancellation webpage is displaying

    Only accessed by the Agent and Administration

    Using PNR number, Agent can see the status ticket.

  • For more details please visit http://techbrij.com

    16. Change Password

    As in the above image the Change password web page is displaying:

    Only accessed by the Agent Agent can change password by entering the old and new password

    Administrator Section:

    17. Create Agent:

  • For more details please visit http://techbrij.com

    As in the above image the Change password web page is displaying:

    Only accessed by the Administrator. New agents are added by this page Required following information:-

    Username Password Email Security Question. Security Answer.

    After click on Create user button it will send you on Agent Basic Information webpage.

  • For more details please visit http://techbrij.com

    18. Agent Basic Information page

    As in the above image the agents Basic information web page is displaying:

    Agents Basic Information are added by this page Required following information are :-

    Name Fathers Name Shop Name Shop City Shop phone number Mobile Number Deposit amount

    19. Agent List page

  • For more details please visit http://techbrij.com

    As in the above image the agents List web page is displaying:

    Only accessed by the Administrator. Displaying Agent information such as:-

    Agent ID Name Shop Name Shop City Current Balance Mobile Number

    20. Agent Deposit Amount Page

  • For more details please visit http://techbrij.com

    As in the above image the agents Deposit Amount web page is displaying:

    Only accessed by the Administrator. Requires agent name and amount he wants to deposit.

    21. Search Agent Page

  • For more details please visit http://techbrij.com

    Bus List:

    Feedback List:

  • For more details please visit http://techbrij.com

  • For more details please visit http://techbrij.com

    Chapter 8

    System Testing

  • For more details please visit http://techbrij.com

    System Testing

    Once source code has been generated, software must be tested to uncover (and

    correct) as many errors as possible before delivery to customer. Our goal is to

    design a series of test cases that have a high likelihood of finding errors. To

    uncover the errors software techniques are used. These techniques provide

    systematic guidance for designing test that

    (1) Exercise the internal logic of software components, and

    (2) Exercise the input and output domains of the program to uncover errors

    in program function, behavior and performance.

    8.1 Steps. Software is tested from two different perspectives:

    (1) Internal program logic is exercised using White box test case design

    techniques.

    (2) Software requirements are exercised using block box test case

    design techniques.

    In both cases, the intent is to find the maximum number of errors with the

    minimum amount of effort and time.

    8.2 Strategies

    A strategy for software testing must accommodate low-level tests that are

    necessary to verify that a small source code segment has been correctly

    implemented as well as high-level tests that validate major system functions

    against customer requirements. A strategy must provide guidance for the

    practitioner and a set of milestones for the manager. Because the steps of the test

    strategy occur at a time when deadline pressure begins to rise, progress must be

    measurable and problems must surface as earl as possible.

  • For more details please visit http://techbrij.com

    Following testing techniques are well known and the same strategy is adopted

    during this project testing.

    8.2.1 Unit testing: Unit testing focuses verification effort on the smallest unit of

    software design- the software component or module. The unit test is white-box

    oriented. The module interface is tested to ensure that information properly flows

    into and of the program unit under test the local data structure has been examined

    to ensure that data stored temporarily maintains its integrity during all steps in an

    algorithms execution. Boundary conditions are tested to ensure that the module

    operated properly at boundaries established to limit or restrict processing. All

    independent paths through the control structure are exercised to ensure that all

    statements in a module haven executed at least once.

    8.2.2 Integration testing: Integration testing is a systematic technique for

    constructing the program structure while at the same time conducting tests to

    uncover errors associated with interfacing. The objective of this test is to take unit

    tested components and build a program structure that has been dictated by design.

    8.2.3 Validation testing: At the culmination of integration testing, software is

    completely assembled as a package, interfacing errors have been uncovered and

    corrected, and a final series of software testsvalidation testing-may begin.

    Validation can be defined in many ways, but a simple definition is that validation

    succeeds when software functions in a manner that can be reasonably expected by

    the customer.

    8.2.4 System testing: System testing is actually a series of different tests whose

    primary purpose is to fully exercise the computer-based system. Below we have

    described the two types of testing which have been taken for this project.

  • For more details please visit http://techbrij.com

    8.2.4.1 Security testing

    Any computer-based system that manages sensitive information causes actions

    that can improperly harm (or benefit) individuals is a target for improper or illegal

    penetration. Penetration spans a broad range of activities: hackers who attempt to

    penetrate system for sport; disgruntled employees who attempt to penetrate for

    revenge; dishonest individuals who attempt to penetrate for illicit personal gain.

    For security purposes, when anyone who is not authorized user cannot

    penetrate this system. When programs first load it check for correct username and

    password. If any fails to act according will be simply ignored by the system.

    8.2.4.2 Performance Testing

    Performance testing is designed to test the run-time performance of software

    within the context of an integrated system. Performance testing occurs throughout

    all steps in the testing process. Even at the unit level, the performance of an

    individual module may be assessed as white-box tests are conducted.

    8.3. Criteria for Completion of Testing

    Every time the customer/user executes a compute program, the program is being

    tested. This sobering fact underlines the importance of other software quality

    assurance activities.

    As much time we run our project that is still sort of testing as Musa and Ackerman

    said. They have suggested a response that is based on statistical criteria: No, we

    cannot be absolutely certain that the software will never fail, but relative to a

    theoretically sound and experimentally validated statistical model, we have done

    sufficient testing to say with 95 percent confidence that the probability of 1000

    CPU hours of failure free operation in a probabilistically defined environment is at

    least 0.995.

  • For more details please visit http://techbrij.com

    8.4 Validation Checks

    Software testing is one element of broader topic that is often referred to as

    verification and validation. Verification refers to the set of activities that ensure

    that software correctly implements a specific function. Validation refers to a

    different set of activities that ensure that the software that has been built is

    traceable to customer requirements. Boehm state this another way:

    Verification: Are we building the product right?

    Validation: Are we building the right product?

    Validation checks are useful when we specify the nature of data input. Let us

    elaborate what I mean. In this project while entering the data to many text box you

    will find the use of validation checks. When you try to input wrong data. Your

    entry will be automatically abandoned.

    In the very beginning of the project when user wishes to enter into the project, he

    has to supply the password. This password is validated to certain string, till user

    wont supply correct word of string for password he cannot succeed. When you try

    to edit the record for the trainee in Operation division you will find the validation

    checks. If you supply the number (digits) for name text box, you wont get the

    entry; similarly if you data for trainee code in text (string) format it will be simply

    abandoned.

    A validation check facilitates us to work in a greater way. It become necessary for

    certain Applications like this.

  • For more details please visit http://techbrij.com

    Chapter 9

    System Implementation

  • For more details please visit http://techbrij.com

    Specification, regardless of the mode through which we accomplish it, may

    be viewed as a representation process. Requirements are represented in manner

    that ultimately leads to successful software implementation.

    9.1 Specification principles

    A number of specification principles, adapted from the work of balzer and

    Goodman can be proposed:

    1. Separate functionality from implementation.

    2. Develop a model of the desired behavior of a system that encompasses date

    and the functional responses of a system to various stimuli from the

    environment.

    3. Establish the context in which software operates by specifying the manner in

    which other system components interact with software.

    4. Define the environment in which the system operates.

    5. Create a cognitive model rather than a design or implementation model. The

    cognitive model describes a system as perceived by its user community.

    6. Recognize that the specifications must be tolerant of incompleteness and

    augmentable.

    7. Establish the content and structure of a specification in a way that will enable it

    to be amenable to change.

    This list of basic specification principles provides a basis for representing

    software requirements. However, principles must be translated into realization.

  • For more details please visit http://techbrij.com

    9.1.2 Representation

    As we know software requirement may be specified in a variety of ways.

    However, if requirements are committed to paper a simple set of guidelines is well

    worth following:

    Representation format and content should be relevant to the

    problem. A general outline for the contents of a Software Requirements

    Specification can be developed. However, the representation forms contained

    within the specification are likely to vary with the application area. For example,

    for our automation system we used different symbology, diagrams.

    Information contained within the specification should be nested.

    Representations should reveal layers of information so that a reader can move to

    the level of detail required. Paragraph and diagram numbering schemes should

    indicate the level of detail that is being presented. It is sometimes worthwhile to

    present the same information at different levels of abstraction to aid in

    understanding. Similar guidelines are adhered for my project.

  • For more details please visit http://techbrij.com

    Chapter 10

    Conclusion

  • For more details please visit http://techbrij.com

    To conclude, Project Grid works like a component which can access all the

    databases and picks up different functions. It overcomes the many limitations

    incorporated in the .NET Framework. Among the many features availed by the

    project, the main among them are:

    Simple editing

    Insertion of individual images on each cell

    Insertion of individual colors on each cell

    Flicker free scrolling

    Drop-down grid effect

    Placing of any type of control anywhere in the grid

  • For more details please visit http://techbrij.com

    Chapter 11

    Scope of the Project

  • For more details please visit http://techbrij.com

    Future scope of the project: -

    The project has a very vast scope in future. The project can be implemented on

    internet in future. Project can be updated in near future as and when requirement

    for the same arises, as it is very flexible in terms of expansion. With the proposed

    software of Web Space Manager ready and fully functional the client is now able

    to manage and hence run the entire work in a much better, accurate and error free

    manner. The following are the future scope for the project: -

    The number of levels that the software is handling can be made unlimited

    in future from the current status of handling up to N levels as currently laid

    down by the software. Efficiency can be further enhanced and boosted up to

    a great extent by normalizing and de-normalizing the database tables used

    in the project as well as taking the kind of the alternative set of data

    structures and advanced calculation algorithms available.

    We can in future generalize the application from its current customized

    status wherein other vendors developing and working on similar

    applications can utilize this software and make changes to it according to

    their business needs.

    Faster processing of information as compared to the current system with

    high accuracy and reliability.

    Automatic and error free report generation as per the specified format with

    ease.

    Automatic calculation and generation of correct and precise Bills thus

    reducing much of the workload on the accounting staff and the errors

    arising due to manual calculations.

    With a fully automated solution, lesser staff, better space utilization and

    peaceful work environment, the company is bound to experience high

    turnover.

    A future application of this system lies in the fact that the proposed system would

    remain relevant in the future. In case there be any additions or deletion of the

  • For more details please visit http://techbrij.com

    services, addition or deletion of any reseller in any type of modification in future

    can be implemented easily. The data collected by the system will be useful for

    some other purposes also.

    All these result in high client-satisfaction, hence, more and more business for the

    company that will scale the company business to new heights in the forthcoming

    future.

  • For more details please visit http://techbrij.com

    References

  • For more details please visit http://techbrij.com

    References:

    Complete Reference of C#

    Programming in C# - Deitel & Deitel

    www.w3schools.com

    http://en.wikipedia.org

    The principles of Software Engineering Roger S.Pressman

    Software Engineering Hudson

    MSDN help provided by Microsoft .NET

    Object Oriented Programming Deitel & Deitel