Upload
poo1282
View
212
Download
3
Tags:
Embed Size (px)
Citation preview
SubmittedIn The Partial Fulfillment of The
Requirement For The Award of DegreeOf
Master Of Computer Applications (MCA)(Session: 2011-2012)
1
Kurukshetra University, Haryana
Declaration from the student
I, XYZ, a student of Master of Computer Applications (MCA), in
the Directorate of Distance Education, Kurukshetra University,
Kurukshetra, under Regn. No-09DE1418, for the session 2011-
2012, hereby, declare that the project entitled “CITY GUIDE” has
been completed by me under the supervision of Mr. Kumar.
The matter embodied in this project has not been submitted earlier
for award of any degree or diploma to the best of my knowledge
and belief.
Date: xyz
2
CERTIFICATE
It is certified that XYZ, a student of Master of Computer
Applications (MCA) in the Directorate of Distance
Education, Kurukshetra University, Kurukshetra, under
Regn. No.09DE1418 fi=or the session 2011-2012, has
completed the project entitled “CITY GUIDE” under my
supervision.
Guide Name:
Mr. Kumar
3
ACKONWLEDGEMENT
During the entire project I encounter many new experience and problem with
several difficulties. As any project work, this one wouldn’t have been possible without
the contribution of many people behind the scenes .It is not always easy to make and
introduces new things but I am very happy to complete this project.
I extend my sincerest thanks to our respected trainer Mr. Kumar under whose
management and direction this project has been undertaken. He guiding force and prime
motivation to lift me from the initialization state to the successful completion of the
project.
His friendly guidance and discussion over the complexities of a real time project
invoked a deep though in me. Undertaking a project such as this place an equal if not
greater pressure on friends and family members closest to me.
Thanks to although who helped me in one-way or, other to all whose name
unmentioned. The website is developed using Front End C# ASP.NET and MSSQL
Server.
4
INDEX
S. No . Topic Page No.
1. Introduction
About the project About the company
6-7
2. Current System 6
3. Limitations of current system 7
4. Proposed System 7
5. ER-Diagram 10
6. DFDs 11
7. System Flowchart 17
8. Structured Chart 18
9. Gantt Chart 19
10. Menu Tree 20
11. Form Layout 21
12. Table Listing 22
13. Report Listing 24
14. References 25
15. Conclusion 26
5
1. Introduction
1.1 About the project :
Mandi district (earlier known as Mandavya Nagar) is one of the central
districts of Himachal Pradesh state in northern India. Mandi town is the
headquarters of Mandi district Mandi. The town has both mythological and
historical significance and boasts of a unique temple architecture. It is also
referred to as ChhotaKashi as there are many ancient temples in the city and
on the banks of river Beas. The river Beas flows through the town and hills,
which makes this town more scenic.
It has a serene ambiance though the modern development has made its
inroads here in terms of infrastructural developments. The town is an
important commercial hub of the state. It is a major transit route to Kullu-
Manali and other adjoining places from both NH-21 (Chandigarh-Manali
highway) and NH-20 (Pathankot-Mandi highway). Sundarnagar is one of the
emerging towns of the district. Mandi has an educated middle class and people
converse in Mandyali, one of the Pahari languages of Himachal. This web site
contains information about Distt. Mandi, including geography, health studies,
science, history, news, and preparation.
This we site also contains links District Blog, Forum, News & Events,
Industries, Hotels, Tour & Travels, Bank & ATM, Hospitals, Govt. Offices,
Internet & Computers, Bakers &Resturant, Malls & Shops, Studio & Printing,
Jewelers.
1.2 About the company :
Swarniminfosoft Pvt. Ltd. a leading offshore Development Company that
delivers solutions to meet the client's objectives by combining technical expertise,
quality and value has been providing services to its clients from India, Working
with Swarniminfosoft makes life open to a world on innovation, creativity,
6
challenge and style. We are here with the opportunity that gives you continual
career growth and knowledge.
IT Training
Training is often your opportunity to proactively move your IT career
forward.This hunger is driven by the rapid rate of change in all spheres of life that
are now affected by information technology.Cramming for tests and reading text
materials alone are not enough to establish your IT career.If you want to build a
career in IT and you have a degree or certification without practical skills, training
is essential for you. You need to acquire these skills and knowledge to advance
your IT career. SwarnimInfosoft Pvt. Ltd. is specialized in imparting different
types of training according to the needs of the IT Global Market.
SwarnimInfosoft Pvt. Ltd. offers high end industrial training under the brand
Tech Mentro. Tech Mentro is a renowned name in IT training in Noida, Delhi
(NCR).
7
System Analysis and Design:
Systems are created to solve problems. One can think of the systems approach as an
organized way of dealing with a problem. In this dynamic world, the subject System
Analysis and Design (SAD), mainly deals with the software development activities.
OBJECTIVES
After going through this lesson, you should be able to
- define a system
- explain the different phases of system development life cycle
- enumerate the components of system analysis
- explain the components of system designing
DEFINING A SYSTEM
A collection of components that work together to realize some objectives forms a system.
Basically there are three major components in every system, namely input, processing and
output.
Basic System Components
Input Output
Processing
Computer Applications
In a system the different components are connected with each otherand they are
interdependent. For example, human body representsa complete natural system. We are
also bound by many nationalsystems such as political system, economic system,
educational systemand so forth. The objective of the system demands that someoutput is
produced as a result of processing the suitable inputs. Awell-designed system also
includes an additional element referredto as ‘control’ that provides a feedback to achieve
desired objectivesof the system.
SYSTEM LIFE CYCLE
8
System life cycle is an organizational process of developing and maintainingsystems. It
helps in establishing a system project plan, becauseit gives overall list of processes and
sub-processes required fordeveloping a system.System development life cycle means
combination of various activities.In other words we can say that various activities put
togetherare referred as system development life cycle. In the System Analysisand Design
terminology, the system development life cycle alsomeans software development life
cycle.
Following are the different phases of system development life cycle:
Preliminary study
Feasibility study
Detailed system study
System analysis
System design
Coding
Testing
Implementation
Maintenance
Phases of System Development Life Cycle
System Study
Feasibility Study
System Analysis
System Design
Maintenance
Implementation
Testing
Software
Development
Life Cycle
Coding
PHASES OF SYSTEM DEVELOPMENT LIFE CYCLE
Let us now describe the different phases and related activities ofsystem development life
cycle.
9
(a) Preliminary System Study
Preliminary system study is the first stage of system developmentlife cycle. This is a brief
investigation of the system under considerationand gives a clear picture of what actually
the physical systemis? In practice, the initial system study involves the preparation of
a‘System Proposal’ which lists the Problem Definition, Objectives ofthe Study, Terms of
reference for Study, Constraints, Expected benefitsof the new system, etc. in the light of
the user requirements.The system proposal is prepared by the System Analyst (who
studiesthe system) and places it before the user management. The managementmay accept
the proposal and the cycle proceeds to thenext stage. The management may also reject the
proposal or requestsome modifications in the proposal. In summary, we wouldsay that
system study phase passes through the following steps:
problem identification and project initiation background analysis inference or findings
(system proposal)(b) Feasibility StudyIn case the system proposal is acceptable to the
management, the Computer Applicationsnext phase is to examine the feasibility of the
system. The feasibilitystudy is basically the test of the proposed system in the light of its
workability, meeting user’s requirements, effective use of resourcesand of course, the cost
effectiveness. These are categorized as technical,operational, economic and schedule
feasibility. The main goalof feasibility study is not to solve the problem but to achieve
thescope. In the process of feasibility study, the cost and benefits areestimated with
greater accuracy to find the Return on Investment(ROI). This also defines the resources
needed to complete the detailedinvestigation. The result is a feasibility report submitted
tothe management. This may be accepted or accepted with modificationsor rejected. The
system cycle proceeds only if the managementaccepts it.
Detailed System Study
The detailed investigation of the system is carried out in accordancewith the objectives of
the proposed system. This involves detailedstudy of various operations performed by a
system and their relationshipswithin and outside the system. During this process, dataare
collected on the available files, decision points and transactionshandled by the present
system. Interviews, on-site observation andquestionnaire are the tools used for detailed
system study. Usingthe following steps it becomes easy to draw the exact boundary ofthe
new system under consideration:
Keeping in view the problems and new requirements
Workout the pros and cons including new areas of the system
10
All the data and the findings must be documented in the form ofdetailed data flow
diagrams (DFDs), data dictionary, logical data structuresand miniature specification. The
main points to be discussedin this stage are:
Specification of what the new system is to accomplish based onthe user requirements.
Functional hierarchy showing the functions to be performed bythe new system and their
relationship with each other.
Functional network, which are similar to function hierarchy butthey highlight the
functions which are common to more thanone procedure.
List of attributes of the entities – these are the data items whichneed to be held about each
entity (record)Introduction to System Analysis and Design
System Analysis
Systems analysis is a process of collecting factual data, understandthe processes involved,
identifying problems and recommending feasiblesuggestions for improving the system
functioning. This involve studying the business processes, gathering operational data,
understandthe information flow, finding out bottlenecks and evolvingsolutions for
overcoming the weaknesses of the system so as toachieve the organizational goals.
System Analysis also includes subdividingof complex process involving the entire
system, identificationof data store and manual processes.
System Design
Based on the user requirements and the detailed analysis of theexisting system, the new
system must be designed. This is the phaseof system designing. It is the most crucial
phase in the developmentsof a system. The logical system design arrived at as a result of
systems analysis is converted into physical system design. Normally,the design proceeds
in two stages:
Preliminary or General Design
Structured or Detailed Design
Preliminary or General Design: In the preliminary or general design,the features of the
new system are specified. The costs of implementingthese features and the benefits to be
derived are estimated.If the project is still considered to be feasible, we move to the
detaileddesign stage.
Structured or Detailed Design: In the detailed design stage, computeroriented work
begins in earnest. At this stage, the design ofthe system becomes more structured.
11
Structure design is a blueprint of a computer system solution to a given problem having
the Computer Applicationssame components and inter-relationships among the same
componentsas the original problem. Input, output, databases, forms, codificationschemes
and processing specifications are drawn up in detail.
There are several tools and techniques used for describing the system
design of the system. These tools and techniques are:
Flowchart
Data flow diagram (DFD)
Data dictionary
Structured English
Decision table
Decision tree
Each of the above tools for designing will be discussed in detailed in
the next lesson.
The system design involves:
i. Defining precisely the required system output
ii. Determining the data requirement for producing the output
iii. Determining the medium and format of files and databases
iv. Devising processing methods and use of software to produce
output
v. Determine the methods of data capture and data input
vi. Designing Input forms
vii. Designing Codification Schemes
viii. Detailed manual procedures
ix. Documenting the Design
Coding
The system design needs to be implemented to make it a workablesystem. This demands
the coding of design into computer understandablelanguage, i.e., programming language.
This is also calledthe programming phase in which the programmer converts the
proIntroductionto System Analysis and Design gram specifications into computer
instructions, which we refer to asprograms. It is an important stage where the defined
procedures aretransformed into control specifications by the help of a computerlanguage.
The programs coordinate the data movements and controlthe entire process in a system.It
12
is generally felt that the programs must be modular in nature.This helps in fast
development, maintenance and future changes, if required.
Testing
Before actually implementing the new system into operation, a testrun of the system is
done for removing the bugs, if any. It is animportant phase of a successful system. After
codifying the wholeprograms of the system, a test plan should be developed and run ona
given set of test data. The output of the test run should match theexpected results.
Sometimes, system testing is considered a part ofimplementation process.Using the test
data following test run are carried out:
Program test
System test
Program test: When the programs have been coded, compiled andbrought to working
conditions, they must be individually tested withthe prepared test data. Any undesirable
happening must be notedand debugged (error corrections)System Test: After carrying out
the program test for each of theprograms of the system and errors removed, then system
test isdone. At this stage the test is done on actual data. The completesystem is executed
on the actual data. At each stage of the execution,the results or output of the system is
analysed. During theresult analysis, it may be found that the outputs are not matchingthe
expected output of the system. In such case, the errors in theparticular programs are
identified and are fixed and further testedfor the expected output.When it is ensured that
the system is running error-free, the usersare called with their own actual data so that the
system could beshown running as per their requirements.
Implementation
After having the user acceptance of the new system developed, theimplementation phase
begins. Implementation is the stage of a projectduring which theory is turned into
practice. The major steps involvedin this phase are:
l Acquisition and Installation of Hardware and Software
l Conversion
l User Training
l Documentation
The hardware and the relevant software required for running the
system must be made fully operational before implementation. The
13
conversion is also one of the most critical and expensive activities in
the system development life cycle. The data from the old system
needs to be converted to operate in the new format of the new system.
The database needs to be setup with security and recovery procedures
fully defined.
During this phase, all the programs of the system are loaded onto
the user’s computer. After loading the system, training of the user
starts. Main topics of such type of training are:
How to execute the package
How to enter the data
How to process the data (processing details)
How to take out the reports
After the users are trained about the computerized system, workinghas to shift from
manual to computerized working. The process iscalled ‘Changeover’. The following
strategies are followed forchangeover of the system.
(i) Direct Changeover: This is the complete replacement of the oldsystem by the new
system. It is a risky approach and requirescomprehensive system testing and training.
(ii) Parallel run: In parallel run both the systems, i.e., computerizedand manual, are
executed simultaneously for certain definedperiod. The same data is processed by both
the systems. Thisstrategy is less risky but more expensive because of the following:
Manual results can be compared with the results of the computerizedsystem.
Online Medical shop Management
system
Overview:-It is the complete Online medical shop management software is so designed as to ease the work load of medical shop professionals. The main feature includes invoicing, inventory and stock control, accounting, client and vendor management. This software helps you to track all the profits, loss, profitable clients and products of medical shop moreover it’s a medical shop accounting software. Flexible and adaptive software suited to medical shops or stores or pharmacies of any size.
Current system Features:-
14
Menu driven, Key board and mouse navigation
Paperless practice
Improve efficiency, productivity
Cost effective solutions
Graphical User Interface with Context Sensitive Help
Automatic importing of drug list
Inbuilt account group and account ledgers
Option for setting default company
Keep address book / telephone directory for easy access
Option for setting default company
Limitations of current system:-
We can’t view a financial report of past financial year
We can’t created multiple companies with different financial year
Not maintain all financial report and financial statements such as day book, profit and loss amount and balance sheet
It allows only one user therefore it is not provide a high security
Not have a better search option for finding available product of company
It provide only 50 reports~ 15 ~
Proposed system:-It is the complete medical shop management software is so designed as to ease the work load of medical shop professionals. The main feature includes invoicing, inventory and stock control, accounting, client and vendor management. This software helps you to track all the profits, loss, profitable clients and products of medical shop moreover it’s a medical shop accounting software. Flexible and adaptive software suited to medical shops or stores or pharmacies of any size.This System will store the information of medicines & customers in the system. It will also store the information about stock details. This system provides security by granting access rights for changing the sensitive data to administrator only. Customized search
15
options are also available in this system. This system can generate all kinds of reports as per the user’s requirements.
Proposed system feature:-
Multiple companies with different financial year can be created
We can view report of past financial year
Back up and restore facility
Keep record of daily customers
Keep records of salesmen
Tracking sales done by a particular salesman
Manage counter sale
Keep track of instant collecting medicines from near by medical shop and selling directly
Reminders for product low stock, product short expiry
Keeps track of all payment , receipt of company
Creating different users with different privilege level for providing high security
Handle financial accounting.
Provides around 100 reports with maximum filtering option
Better search option for finding available products of company
Search can be filtered by product group, product, shelf,
System Requirements:-
• Required processor :Pentium 90 MHz or faster
• Required RAM :128 MB (256 or more recommended)
• 25 MB of available hard-disk space for installation
• CD-ROM drive (only for installation)
• 1,024x768 display (1,280x800 recommended)
16
Software Specification:-
• Operating system: .Net framework 2.0 version compactable software platform
• Technology: Microsoft .net 2005
• Front end: C#.NET
• Back end: Microsoft SQL Server 2005
INTRODUCTION
C# Language
Welcome to this C# tutorial. With the introduction of the .NET framework, Microsoft
included a new language called C# (pronounced C Sharp). C# is designed to be a simple,
modern, general-purpose, object-oriented programming language, borrowing key
concepts from several other languages, most notably Java.
C# could theoretically be compiled to machine code, but in real life, it's always used in
combination with the .NET framework. Therefore, applications written in C#, requires the
17
.NET framework to be installed on the computer running the application. While the .NET
framework makes it possible to use a wide range of languages, C# is sometimes referred
to as THE .NET language, perhaps because it was designed together with the framework.
C# is an Object Oriented language and does not offer global variables or functions.
Everything is wrapped in classes, even simple types like int and string, which inherits
from the System.Object class.
C# can be written with any text editor, like Windows Notepad, and then compiled with
the C# Command line compiler, csc.exe, which comes with the .NET framework.
However, most people prefer to use an IDE (Integrated Development Environment), and
Microsoft offers several options for this. Their flagship is Visual Studio, which can be
used to work on every possible aspect of the .NET framework. This product is very
advanced, and comes in several editions. Visual Studio is not exactly cheap, and might
even be too advanced for hobby programmers.
With .NET framework 2.0, Microsoft introduced the so-called Express versions, targeted
at hobby programmers and people wanting to try .NET, and they continued this tradition
with the later release of .NET 3.0 and 3.5. The Express versions only work for one
language, like C# or VB.NET, and miss some of the really advanced features of Visual
Studio. However, they are free and will work just fine for learning the languages, which is
why we will use it for this tutorial.
C# and it's Features :-
18
1. C# is a simple, modern, object oriented language derived from C++ and Java.
2. It aims to combine the high productivity of Visual Basic and the raw power of C++.
3. It is a part of Microsoft Visual Studio7.0.
4. Visual studio supports Vb, VC++, C++, Vbscript, Jscript. All of these languages
provide access to the Microsoft .NET platform.
5. .NET includes a Common Execution engine and a rich class library.
6. Microsoft's
JVM equiv. is Common language run time (CLR).
7. CLR accommodates more than one languages such as C#, VB.NET, Jscript, ASP.NET,
C++.
8. Source code --->Intermediate Language code (IL) ---> (JIT Compiler) Native code.
9.The classes and data types are common to all of the .NET languages.
10. We may develop Console application, Windows application, and Web application
using C#.
11. In C# Microsoft has taken care of C++ problems such as Memory management,
pointers etc.
12. It supports garbage collection, automatic memory management and a lot.
MAIN FEATURES OF C#LANGUAGE
1. Pointers are missing in C#.
2. Unsafe operations such as direct memory manipulation are not allowed.
3. In C# there is no usage of ":” or "->" operators.
4. Since it`s on .NET, it inherits the features of automatic memory management and
garbage collection.
5. Varying ranges of the primitive types like Integer, Floats etc.
19
6. Integer values of 0 and 1 are no longer accepted as Boolean values. Boolean values are
pure true or false values in C# so no more errors of "="operator and "=="operator. "==" is
used for comparison operation aC# and its Features.
CHAPTER 9
INTRODUCTION ABOUT ASP .NET AND RDBMS:-
.NET FRAMEWORK
20
Microsoft introduced the .NET Framework with the intention of enhancing
the interoperability of applications. This framework aims at integrating various
programming languages and services. It is designed to make significant improvements in
code reuse, code specialization resource management, Multilanguage development,
security, deployment and administration. It consists of all the technologies that help in
creating and running robust, scalable and distributed applications. .NET offer complete
suit for developing and deploying applications. This suite consist of .NET Products, .NET
Services and the .NET framework.
.NET Product:
Microsoft has already introduced Visual Studio.NET, which is a tool for
developing .NET applications, by using programing language with Visual Basic, Visual
C# and Visual C++.
This product allows developer to create applications that are capable of interacting
seamlessly with each other.
.NET Service:
.NET Framework helps us to create software such as web services. A web
service is an application or business logic that is accessible through slandered Internet
protocol such as HTTP (Hyper Text Transfer Protocol) and Simple object Access
Protocol (SOAP). We can identify the service by a Uniform Resource Locator (URL).
The public Interfaces and binding of
21
the web service are described by using XML. Users can subscribe to such a service and
use it as long as they need it, regardless of their hardware and software platforms.
.NET Framework:
it is the foundation on which you design, develop, and deploy applications. It is a
consistent and simplified programming model that helps you to easily build robust
applications. It is the core of the .NET infrastructure because it exists as a layer
between .NET applications and the underlying operating system. In other words ,
the .NET Framework encapsulates most of the basic functionality, such as debugging and
security services, which were earlier built into various programming languages in the
form of a collection of services and classes.
Common Language Runtime (CLR)
The CLR is one of the essential components of the .NET framework. CLR is the
environment in which all programs that use .NET technologies are executed. It provides
services such as code compilation, memory allocation, and garbage collection. The CLR
allows the execution of code across Different platforms by translating code into
Intermediate Language (IL). IL is a low –level language that the CLR understands.
IL is converted into machine language during execution by the JIT compiler. During JIT
compilation, code is also checked for type safety. Type safety ensures that objects are
always accessed in a compatible way. If you try to assign an 8-byte value to a variable of
size 4 byte, the CLR will detect and trap it.
22
CLR consists of a set of common rules followed by all the languages of the .NET
framework. This set of rules is known as CLS. CLS enables an objects or application to
interact with objects or applications of other languages. The classes that follow the rules
specified by CLS are termed as CLS-compliant classes.
One of the specifications defined in CLS is common Type System (CLS), which provides
a type system that is common across all languages. CTS defines how data types, how data
types are declared, used, and managed in the code during run time.
The CTS also defines the rules that ensure that the data types of objects written in various
languages are table to interact with each other.
The source code needs to be compiled before execution.CLR plays an important role in
the process of compilation and execution of the program.
During execution ,CLR performs the following steps:
Loading assemblies and identifying namespaces: Assemblies are loaded into the
memory.After loading assemblies, CLR identifies namespace for code in assemblies.
Namespace are a collection of classes. The .NET Framework uses namespaces to
organize its classes in a hierarchy.Namespace implicitly have public access and this
cannot be changed.
23
pROProgram code
IL Metadata
JIT compilation: Before execution, IL is converted into machine language by JIT
compiler. Next, during the verification process, the IL code is examined to confirm
the following points:
The memory location that code needs to access is available.
Methods are called only through properly defined types
IL has been correctly generated.
Garbage collection:
The garbage collection process begins after JIT compilation and manages the allocation
and deallocation of memory for an application. Whenever you create an object, the CLR
allocates memory for the object from the managed heap. A managed heap is of the
memory that is available for program execution. If sufficient memory is not available on
the managed heap, the garbage collection process is invoked.
Advantage of the.NET Framework
Some of the advantages of the .NET Framework are:
Consistent programming model :
The .NET Framework provides a common object-oriented programming model across
language. This model can be used to perform severl, and retrieving data.
Multi-platform applications:
There are several versions of Windows most of which run on x86 CPUs. Some
versions, such as Windows CE and the 64-bit Windows, run on non-x86 CPUs as
well. A .NET application can execute on any architecture that is supported by the
CLR. In future, a CLR version could even be built for non-Windows platforms.
24
Multi-language integration:
.NET allows multiple languages to be integrated. For example, it is possible to create
a class in VC# that is derived from a class implemented in VB.NET. To enable objects to
interact with each other regardless of the language used to develop them, a set of
language feature has been defined in CLS.
Automatic resource management:
While creating an application, a programmer may be required to write code for
managing resources such as files, memory, network connections, and database
resources.
Ease of develop:
One of the goals of the .NET Framework is to simplify application
deployment. .NET application can be deployed simply by copying files to the target
computer. Deployment of components has also been simplified. Till now, Microsoft’s
Component Object Model(COM) has been used for creating components. However,
COM sffers from various problems related to deployment. For example, every COM
component needs to be before it can be used in an application.
The .NET framework is a new computing platform that simplifies application
development in the highly distributed environment of the internet. The .NET Framework
25
is designed to fulfill the following objectives: the .NET Framework is an integral
Windows component that supports building and running the next generation of
applications and XML Web services. The key components of the .NET Framework are
the common language runtime and the .NET Framework class library, which include
VB.NET, ADO.NET and Windows Forms. The .NET Framework provides a managed
execution environment, simplified development and deployment, and integration with a
wide variety of programming languages.
To provide a consistent objectives-oriented programming environment whether
object code is stored and executed locally, executed locally but internet-
distributed or executed remotely.
To provide a code-execution environment that minimizes software deployment
and versioning conflicts.
To provide a code-execution environment that guarantees safe execution of code,
including code created by an unknown or semi trusted hired party.
To provide a code-execution environment that eliminates the performance
problems of scripted or interpreted environments.
To build all communication on industry standards to ensure that code based on the
.NET Framework can integrate with any other code.
The .NET Framework has two main components:
26
The common language runtime and
The .NET Framework class library.
ASP (Active Server Pages)
Microsoft Active Server Pages (ASP) was developed by Microsoft on July 16,
1996. It is a powerful and easy technology to create dynamic web pages. The main
purpose of ASP is to decrease the load on the browser by performing many of the tasks
done earlier by the Browser, which increases the response time for each request.
With the help of ASP, you can combine HTML pages, script commands and Active X
components to create interactive web pages.
Server-Side Scripting
ASP is a Server-Side Scripting language. Server-Side Scripting deals with storage
of data, server-side validations, security issues and the management of transactions.ASP
Scripts are processed on the Web Server. The Web Server then generates the Web pages
that are sent to the browser. The benefit of ASP is that users cannot view document,
because only the generated result is sent to the browser.
Working of ASP
27
ASP is process on the web server. So it requires web server application to be executed.
You can use Internet Information Server (IIS) or Personal Web Server (PWS) to process
ASP files.
In executing ASP files following steps are performed:
1. The browser sends a request for an ASP page to the web server by form or URL.
2. The web server receives the request and finds the ASP file from the storage unit.
3. The web server forwards the ASP file to the ASP script engine i.e. ASP.DLL for
processing.
4. ASP engine reads the ASP file to generate an HTML file and sends HTML page
to the server.
5. The web server sends the HTML page to the client.
In this way the ASP file is processed and output is displayed in the browser.
ASP File
An ASP file is a text file with the extension .asp, which contains
HTML tags
Client-Side Scripts
ASP Scripts
Using ASP Scripts
ASP scripts are written simply in the HTML file. It also includes scripting language,
whether it is VB Script or Java Script or other. You can write ASP Scripts in two ways:
Using <Script> and </Script> tags:
28
The <Script> and </Script> tags are normally used in client side scripting to enclose VB
Script or Java Script. Using the attribute RUNAT within the tags can also use these tags
to enclose ASP Scripts. E.g.:
<Script Language= “VBScript” Runat= “Server”>
…………………..
………………….
</Script>
Using the <%and %> delimiters
You can enclose the ASP scripts between the <% and %> delimiters. These delimiters are
used in two ways in the script.
a) If you want to enclose general ASP script, you can use <% and %> delimiters.
b) If you want to display output of variable of expression directly in HTML page,
you can use <%= and %> delimiters.
Accessing ASP Files
ASP files are stored on the web server. So to host the asp files on the web server, you
have to create a virtual directory in the server application. To create virtual directory in
IIS you can follow the steps given below:
1. Open Internet Service Manager, through start menu programs.
2. Click the right button of mouse on the Default Web Site icon and from the context
menu select New option to click Virtual Directory option. This will display New
Virtual Directory Wizard.
29
3. Type the name of the Virtual Directory and Click Next button.
4. Now, type the path of the directory where ASP files are located on the disk (or
you can used Browse button to select the path) and click Next button.
5. Now make sure that read and script permissions are selected for this directory and
click on the Finish button.
This will set the virtual directory to host the asp files on the server.
You can browser the asp file in the Internet Explorer, using the following format:
http://<servername>/<virtual_directory_name>/asp_filename
e.g. http://server/neha/ttt.asp
Scripting Engine
Scripting Engine is a special program that processes the scripting statement in a web
page. A browser can execute a client-side script if the proper runtime script engine is built
into it. To execute server – side script the script engine must b e available with the web
server. ASP scripts are processed by script engine “ASP.DLL” installed in the IIS
application. ASP.DLL executes ASP scripts to generate HTML.
ASP Objects
ASP provides some built in objects, which have methods, properties and collections.
Methods of an object are used to perform some tasks with an object. A property of an
object can be set to a
value to specify the state of object. The collections of an object consist of different sets
of key and value pairs related to the object. The asp objects are:
30
Request: This object is used to specify information about a client request send using http
request through GET or POST method.
Response: This object is used to control the response sent from the server to the client.
Server: This object is used to provide access to the methods and properties of web server.
Application: This object is used for the processes of a web application.
Session: This object is used for storing user information that is needed for a particular
user session.
ASP Error: This Object can be used to trap ASP Error and provide information to the
users.
Object Context:This object is used to link ASP and the Microsoft Transaction Server
ASP.NET
Visual Basic developers have long enjoyed the ease of programming with forms and
controls. Writing a VB form-based application is as simple as dragging some controls
onto a form and writing some event-handling functions. This is one of the reasons VB has
attracted lots of programmers interested in speed of development. Microsoft wisely built
this feature into ASP.NET.
ASP.NET simplifies web page development with form-based Programming. In
ASP.NET, these forms are called Web Formsand are analogous to VB forms, replacing
ASP pages. Similar to VB, Web Forms programming is also event based. We don't have
to write in-line ASP scripts and rely on the top-down parsing interpretation as in ASP
programming. To match the rich set of
31
ActiveX controls that VB programmers love in their toolset, ASP.NET equips ASP
programmers with server controls. To further enhance the productivity of developers,
ASP. Net’s Web Forms also allow for the separation of the application logic and the
presentation layer.
ASP.NET evolves from the ASP programming model with the following
additional benefits:
Clean separation between the application logic (server-side code) and the
presentation layer (HTML markup)—no more spaghetti code
A rich set of server controls that automatically render HTML suitable for any
clients and that additionally manage their states
Enhanced session-state management
An event-based programming model on the server side, which is simpler and more
intuitive
Application logic that can be written in any Microsoft .NET language (VB, C#
etc.); application server-side code is compiled for better performance
Visual Studio.NET as a RAD tool, which simplifies the development process of
Web Forms
32
ASP.NET Architecture
As the illustration shows, all Web clients communicate with ASP.NET
applications through IIS. IIS deciphers and optionally authenticates the request. If Allow
Anonymous is turned
on, no authentication occurs. IIS also finds the requested resource (such as an
ASP.NET application), and, if the client is authorized, returns the appropriate resource.
Internet Information Services (IIS)
Internet Information Services (IIS) is the Windows component that makes it easy to
publish information and bring business applications to the Web. IIS makes it easy for you
to create a strong platform for network applications and communications.
Internet Information Services 5.1 has many features to help Web administrators to create
scalable, flexible Web applications.
Security
Administration
33
Programmability
Internet Standards
Microsoft Internet Information Services 5.0 and 5.1 comply with the HTTP 1.1 standard,
including features such as PUT and DELETE, the ability to customize HTTP error
messages, and support for custom HTTP headers.
IIS 5.1 offers greater protection and increased reliability for your Web
applications. By default, IIS runs all of your applications in a common or pooled process
that is separate from core IIS processes.
In IIS 5.1, administrators and application developers have the ability to add custom
objects, properties, and methods to the existing ADSI provider, giving
Administrators even more flexibility in configuring their sites.
Internet Information Services (IIS) makes it easy for you to publish
information on the Internet or your intranet. IIS includes a broad range of administrative
features for managing
CHAPTER 10
MSSQL SERVER 2005:-
SQL server is a Microsoft Back office product that is deployed on Windows NT,
Windows 95,98,SQL server is a SQL based, client-server, RDBMS.SQL stands for
structured Query Language is used in writing queries to retrieve data from
databases.SOLserver stores data at a central location known as server and delivers it on
34
demand to others locations known as clients. The server is responsible to manage the
databases and memory for multiple requests. The clients are responsible for presenting
data and business logic to the end users. Clients programming interfaces provides the
means for applications to run on separate clients computers and communicate to the
server over a network.
SQL server takes care of the following:
Updating the databases.
Retrieving information from the databases.
Accepting query language statements.
Enforcing security specifications
Enforcing data integrity specifications.
Enforcing transaction consistency.
Managing data sharing.
Optimizing system catalogs.
Query Analyzer
The query analyzer is the interface for passing SQL statements to the SQL servers, view
results or analyze the results or analyze a query plan. The query analyzer can be started
from two places.
From the SQL server program icon.
From command prompt by typing the command.
The first dialog box that is displayed enables you to login.
Once a server name and login name is authenticated by the SQL server, the query
analyzer screen is displayed .once the query analyzer is opened the SQL statements can
35
be typed in it. The SQL statements then need to be submitted to SQL server by using the
F5 key or clicking on the toolbar (Execute query) button.
THE OTHERS TOOLS THAT SQL SERVER IS SHIPPED WITH
ARE:
Service Manager
Client Network
Utility Server
Network Utility
System Analysis
The basic aim of System Analysis is to obtain a clear understanding of the needs of the
clients and the users, what exactly is desired from the software and what the constraints
on the solution are. Analysis leads to actual specification.
Analysis involves interviewing the clients and the actual users. These people and the
existing documents about the current mode of operation are the basic source of
information for the analysis.
There are two approaches to system analysis:
Informal Approach
Structured Approach
36
The informal approach to analysis is one where no defined methodology is used.
The information about the system is obtained by interaction with the client, end, users,
questionnaires, study of existing documents etc.
The structured analysis uses function-based decomposition while modeling the
problem. It focuses on the function performed in the problem domain and the data
consumed and produced by these functions. This method helps the analyst decide what
type of information to obtain at different points in analysis, and it helps organize
information. It is top down refinement approach.
Table: -
MS-Sql 2005 table makes data that should be organized in a table structure. With
the help of tables we can present data organized in raw and columns. The rules of which
elements occurs in a table is called a table model. After we have decided upon the tables
that we will have in our database, we can define the various field and their properties. For
every field we have to decide the
o Field Name
o Field Type
o Field size
Queries:-
We use a query to extract information from a database. A query can select a
group of records that fulfill a certain condition. An example of query is when we want to
see the list of books published Name Publishing. The query feature of access creates a
search based on the criteria that the publisher’s name is “Name Publishing” and displays
37
the selected records in a datasheet format. Most access databases contain more then one
table. We can combine specific fields from multiple tables into one datasheet.
Reports:-
A report is a flexible way of viewing and printing summary information. It
enables us to display information to the required level or detail. The information can be
viewed or printed in any format. Subtotals, statistical evaluations, pictures and graphs can
be inserted into a report.
Database:-
Database is a collection of related items grouped together under a single heading,
for e.g. a customer file, Bank A/C in a Bank, Employee Details etc. According to Oxford
dictionary “a database is organized store of data for computer processing”. A database
can be said as a collection of files containing records of similar nature. Each record
contains all the data relating to one subject in the file. The grouping of such files is called
a Database. Database can be kept manually or electronically.
Components of database
1. Records: A record is a collection of fields containing the alphanumeric characters.
2. Fields: A field is an item, which distinguishes one record, from another. A field can
either be in form of alphabets, numeric, or alphanumeric. Each field is identified by a
field name.
38
3. Key Fields: a key field is a field that is unique to a particular record and is used to
distinguish a file from another in one or the other respect.
4. Entity: A person, place, thing or event about which information must be kept.
5. Attribute: Piece of information describing a particular entity. These are mainly
characteristics about the individual entity.
Data Base Models:-
Database models are broadly classified into two categories, They are:
Object-based logical models
Record-based logical models
Object Based Logical Models
Object based logical models are used in describing data at the logical and view levels.
They are characterized by the fact that they provide fairly flexible structuring capabilities
and allow data constraints to be specified explicitly. There are many different models, and
are likely to come. Several of the widely known ones are
The entity-relationship model
The object-oriented model
The semantic data model
The functional data model
39
Record-Based Logical Model
Record-based logical models are used in describing data at the logical and view level. In
contrast to object-based data models, they are used both to specify the overall logical
structure of the database and to provide a higher-level description of the implementation.
Record-based models are so named because the database is structured in fixed format
record of several types. Each records type defines a fixed number of fields, or attributes,
and each field is usually of a fixed length. The three most widely accepted record-based
models are
The Hierarchical models.
The Network models.
The Relational models.
Hierarchical Database Model
Data storage is in form of child parent relationship. The origin of data tree is root. Data
located at different levels among a particular branch is called node. The last node in tree
is called a leaf. This models support one-to-many relationship.
Network Model
Data in network model is represented by collection of records (in Pascal sense), and
relationships among data are represented by links, which can be viewed as pointers. The
records in the database are organized as collections of arbitrary graphs.
40
The main idea behind the Network Database System model is to bring about Many-to-
Many relationship. The relationship between the different data items is called as sets. This
system also uses pointers to locate a particular record.
The Relation Database System came into existence to overcome all the drawbacks of
these models. Now, let us consider an example of the network model. The network
model differs from the relational model in that data are represented by collections of
records, and relationships among data are represented by links.
Relational Model
Dr E.F Codd first introduced the relational Database model in 1970. The relational model
allows data to be represented in a simple row-column format. Each data field is
considered as a column and each record is considered as a row of a table.
Object Relational Model
As the name implies the object relational model supports both object-oriented and
relational concepts. It eliminates certain discrepancies in the relational model. In this
model it is possible to provide well-defined interfaces for the application. A structure
once created can be reused-this in the fundamental property of the OOP’s concept. By
combining the object oriented and relational concepts Oracle now offers the best of both
worlds.
Components of DBMS
41
Let us now examine the components and structure of a database management system. A
DBMS is a complex software system that is used to manage, store and manipulate data
and the metadata used to describe the data. It is utilized by a large variety of users from
the very naïve user to most sophisticated to retrieve and to manipulate data under its
control. The users could be utilizing the database concurrently from online terminals
and/or in a batch environment via application programs written in a high level language.
Before looking at various components of the DBMS, let us examine its facilities and
classify its users.
Classification of DBMS Users
The primary goal of a database system is to provide an environment for retrieving
information from and storing new information into the database. There are four different
type of database system users differentiated by the way that they expect to interact with
the system.
Naive Users
42
Naïve users are unsophisticated users who interact with the system by invoking one of the
application programs that have been written previously. These are users who are not
aware of the presence of database system or any other system supporting their usage.
Example: A user of an automatic teller machine falls under this category.
Online Users
Online users are the users who may communicate with the database directly. These users
are aware of presence of the database system. The more sophisticated of these users may
also use a data manipulation language (which will dealt in later chapters) to manipulate
the database.
Application Programmers
Application programmers are computer professionals who interact with the system
through Data Manipulation Language calls, which are embedded in a program written in a
host language (for example, COBOL, PL/I, PASCAL, C). These programs are commonly
referred to as application programs.
Example:In banking system include a program that generate payroll checks, that debit
accounts, that credit accounts, or that transfers fund between accounts.
Database Administrator
43
Centralized control of the database –in exerted by a person or group of persons under the
supervision of a high level administrator, this person is referred to as the Data Base
Administrator (D.B.A). He is the user who is most familiar with the database and is
responsible for creating, modifying and maintaining it. He is custodian of the data and
controls the database structure.
Advantages of a RDBMS
One of the main advantages of using a database system is that the organization
can exert, via the DBA, centralized management and control over the data. The database
administrator is the focus of the centralized control. Any application requiring a change in
the structure of a data record requires an arrangement with the DBA, who makes the
necessary modifications.
Reduction in Redundancies
Centralized control of the data by the DBA avoids unnecessary duplication of the data
and effectively reduces the total amount of data storage is required. It also eliminates the
extra processing necessary to trace the required data in large mass of data. Another
advantage of avoiding duplication is the elimination of the inconsistencies that tend to be
present in redundant data files. Any redundancies that exist in the DBMS are controlled
and the system ensures that these multiple copies are consistent.
Shared Data
44
A database allows the sharing of data under its control by any number of applications
programmers or users.
For the sake of an example, let’s consider a situation in the office of a publishing
company, where a data file is shared or worked upon by many users, for instance, the data
is shared by the different departments/sections of the company, like Accounts
Department, Editing Department, Personnel Department, etc. So, a single resource is
shared and used by multiple users.
Integrity
Centralized control can also ensure that adequate checks are incorporated in the DBMS to
provide data integrity. Data integrity means that the data contained in the database is both
accurate and consistent. Therefore, data values being entered for storage could be checked
to ensure that they fall within a specified range and are of the correct format. Another
data integrity check that should be incorporated in the database is to ensure that if there is
a reference to certain object, that object must exist.
In case of Automatic Teller Machine, for example, a user is not allowed to transfer funds
from a nonexistent savings account to a checking account.
Security
Data is of vital importance to an organization and may be confidential. Unauthorized
persons must not access such confidential data. The DBA who has the ultimate
responsibility for the data in the DBMS can ensure that proper access to the RDBMS and
additional checks before permitting access to sensitive data. Different levels of security
should be implemented for various types of data and operations.
Conflict Resolutions
45
Since the database is under the control of the DBA, she or he should resolve the
conflicting requirements of various users and applications. In essence, the DBA chooses
the best file structure and access method to get optimal performance for the response-
critical applications, while permitting less critical applications to continue to use the
database, albeit with a relatively slower application.
Disadvantages of RDBMS
A main disadvantage of the DBMS system is cost. In addition to the cost of
purchasing or developing the software, the hardware has to be upgraded to allow for the
extensive programs and the workspaces required for their execution and storage. The
processing overheads introduced by the DBMS to implement security, integrity, and
sharing of the data causes a degradation of the response and through-put times. An
additional cost is that of the migration from traditionally separate application environment
to an integrated one.While centralization reduces duplication, the lack of duplication
requires that the database be adequately backed up so that in case of failure the data can
be recovered. Backup and recovery operations are fairly complex in DBMS environment,
and this is exacerbated in a concurrent multiuser database system In Summary
Advantages are:-
Centralized control
Data independence allows dynamic changes and growth potential
Data duplication eliminated with controlled redundancy
Data quality enhanced
46
Security enforcement possible
Disadvantages are:-
Problems associated with centralization
Cost of software/hardware and migration
ER-diagram:-
47
Context level diagram:-
48
Context analysis diagram :-
49
LOGICAL DFD:-
50
DFD FRAGMENTATION:-First level DFD:-
51
Second level DFD :-
52
1.3 View specifn Specification
53
Third level DFD:-
System flow chart:-
54
STRUCTURE CHART:-
55
56
57
58
59
60
61
Table layout:-
62
Product:-
Column name Data type
Phar_name Varchar(50)
Phar_id int
Phar_cont_no int
timing int
Date of joining int
Pharmacist:-
63
Column name data typeP_idintP_namevarchar (50)P_gen_namevarchar (50) P_quality floatP_priceint
Company:-
Customer:-
64
Column name Data type
Comp_id int
Comp_name Varchar(50)
Column name Data type
Cust_name Varchar(30)
Cust_ID int
Reference:-
www.projectguidance.com
http://e-library.net/
www.sourcecode online .com
www.developers. net
www.code project .com
65
Conclusion:-
It is the complete online medical shop management software is so designed as to ease the work load of medical shop professionals. The main feature includes invoicing, inventory and stock control, accounting, client and vendor management.
66