1.1 Purpose
1.1 Purpose
INTRODUCTION
1.1 Purpose:
The main purpose for preparing this document is to give a general insight into
the analysis and requirements of the existing system or situation and for determining
the operating characteristics of the system.
1.2 Scope:
This Document plays a vital role in the development life cycle (SDLC) and it
describes the complete requirement of the system. It is meant for use by the
developers and will be the basic during testing phase. Any changes made to the
requirements in the future will have to go through formal change approval process.
1
2.OVERALL DECRIPTION
Less Security.
GUI’S
In the flexibility of the uses the interface has been developed a graphics
concept in mind, associated through a browses interface. The GUI’S at the top level
have been categorized as
2
The interfaces help the administrations with all the transactional states like Data
insertion, Data deletion and Date updation along with the extensive data search
capabilities.The operational or generic user interface helps the users upon the system
in transactions through the existing data and required services. The operational user
interface also helps the ordinary users in managing their own information helps the
ordinary users in managing their own information in a customized manner as per the
assisted flexibilities.
NUMBER OF MODULES
The system after careful analysis has been identified to be presented with the
following modules:
Admin
Job Seeker
Job Provider
Notification
Search
Report
Authentication
Admin:
In this module Admin will add all the qualifications, skill, experience, city,
state, country and update and delete information about the job provider or job seeker
he can also search for the job seeker and he can send mail to offer the job to job
seeker and he can also see the jobs add by the job provider.
3
Job Seeker:
In this module Job Seeker register himself and upload his resume and fill the profile
give by admin and after login he will search for the job on various conditions and he
can change his
Profiles and resume and he can apply for the jobs based on various conditions.
He can see the response of the company and he can call the company person for the
interview.
Job provider:
In this module Job Provider register himself and his company and after login
he will add new job and he can search for the job seekers on various condition and he
can offerthe job to job seeker according to the job profile and he can also see the
response from the job seekers and send the mail.
Notification:
In this module admin and job provider send the notification to the job seeker
in the form of email.
Reports:
This module contains all the information about the reports generated by the
admin based on the particular job seeker, particular job provider, all job seeker and
job provider, all jobs generated by the job providers.
Authentication:
This module contains all the information about the authenticated user. User
without his username and password can’t enter into the login if he is only the
authenticated user then he can enter to his login.
PROJECTINSTRUCTIONS:
4
the web services, web methods and database infrastructure needed both and client
and server
Provide an environment for upgradation of application for newer versions that are
available in the same domain as web service target.
The main objective of the feasibility study is to test the Technical, Operational
and Economical feasibility for adding new modules and debugging old running
system. All system is feasible if they are unlimited resources and infinite time. There
are aspects in the feasibility study portion of the preliminary investigation:
Technical Feasibility
Operation Feasibility
Economical Feasibility
Technical Feasibility
The technical issue usually raised during the feasibility stage of the
investigation includes the following:
Do the proposed equipment’s have the technical capacity to hold the data required
to use the new system?
Will the proposed system provide adequate response to inquiries, regardless of the
number or location of users?
Are there technical guarantees of accuracy, reliability, ease of access and data
security?
5
Earlier no system existed to cater to the needs of ‘Secure Infrastructure
Implementation System’. The current system developed is technically feasible. It is a
web based user interface for audit workflow at NIC-CSD. Thus it provides an easy
access to the users.
Operational Feasibility
Proposed projects are beneficial only if they can be turned out into information
system. That will meet the organization’s operating requirements. Operational
feasibility aspects of the project are to be taken as an important part of the project
implementation. Some of the important issues raised are to test the operational
feasibility of a project includes the following:
Will the system be used and work properly if it is being developed and
implemented?
Will there be any resistance from the user that will undermine the possible
application benefits?
6
The well-planned design would ensure the optimal utilization of the computer
resources and would help in the improvement of performance status.
Economic Feasibility
A system can be developed technically and that will be used if installed must
still be a good investment for the organization. In the economical feasibility, the
development cost in creating the system is evaluated against the ultimate benefit
derived from the new systems. Financial benefits must equal or exceed the costs.
7
3. SOFTWARE REQUIREMENT SPECIFICATIONS
RAM: 1 GB or higher
ASP.Net 3.0.
C# language.
HTML.
8
3.4 NON-FUNCTIONAL REQUIREMENTS
Hardware Requirements:
Processor : Intel Pentium or more
9
4. LANGUAGES OF IMPLEMENTATION
Asp.net description
10
For example, the ASP.NET page framework allows you to build user
interfaces that cleanly separate application logic from presentation
code and to handle events in a simple, Visual Basic - like forms
processing model.
11
Language Support
The Microsoft .NET Platform currently offers built-in support for three
languages: C#, Visual Basic, and JScript.
ASP.NET Web Forms pages are text files with an .aspx file name extension.
They can be deployed throughout an IIS virtual root directory tree. When a browser
client requests .aspx resources, the ASP.NET runtime parses and compiles the target
file into a .NET Framework class. This class can then be used to dynamically process
incoming requests. (Note that the .aspx file is compiled only the first time it is
accessed; the compiled type instance is then reused across multiple requests).
An ASP.NET page can be created simply by taking an existing HTML file and
changing its file name extension to .aspx (no modification of code is required). For
example, thefollowing sample demonstrates a simple HTML page that collects a
user's name and category preference and then performs a form post back to the
originating page when a button is clicked:
12
ASP.NET provides syntax compatibility with existing ASP pages. This
includes support for <% %> code render blocks that can be intermixed with HTML
content within an .aspx file. These code blocks execute in a top-down manner at page
render time.
ASP.NET supports two methods of authoring dynamic pages. The first is the
method shown in the preceding samples, where the page code is physically declared
within the originating .aspx file. An alternative approach--known as the code-behind
method--enables the page code to be more cleanly separated from the HTML content
into an entirely separate file.
In addition to (or instead of) using <% %> code blocks to program dynamic
content, ASP.NET page developers can use ASP.NET server controls to program
Web pages. Server controls are declared within an .aspx file using custom tags or
intrinsic HTML tags that contain a runat="server" attribute value. Intrinsic HTML
tags are handled by one of the controls in the System.Web.UI.HtmlControls
namespace. Any tag that doesn't explicitly map to one of the controls is assigned the
type of System.Web.UI.HtmlControls.HtmlGenericControl.
1) ASP.NET Web Forms provide an easy and powerful way to build dynamic
Web UI.
2) ASP.NET Web Forms pages can target any browser client (there are no script
library or cookie requirements).
13
3) ASP.NET Web Forms pages provide syntax compatibility with existing ASP
pages.
5) 5. ASP.NET ships with 45 built-in server controls. Developers can also use
controls built by third parties.
6) 6. ASP.NET server controls can automatically project both up level and down-
level HTML.
7) 7. ASP.NET templates provide an easy way to customize the look and feel of
list server controls.
C#.net description.
The language is intended for use in developing software components that can
take advantage of distributed environments.
14
Support for internationalization is very important.
ADO.NET
Dataset:
DataProvider:
15
The DataAdapter object which populates a disconnected Data Set with data
and performs update.
A connection object establishes the connection for the application with the
database. The command object provides direct execution of the command to the
database. If the command returns more than a single value, the command object
returns a Data Reader provide the data. Alternatively, the DataAdapter can be used to
fill the Data Set object. The database can be updated using the command object or the
DataAdapter.
The Connection object creates the connection to provide the database. Microsoft
Visual Studio .NET provides two types of Connection classes: the sqlConnection
object which is designed specifically to connect to Microsoft SQL server 7.0 or later
and the OleDbConnection object which can provide connections to a wide range of
database types like Microsoft Access and Oracle. The Connection object contains all
of the information required to open a connection to the database.
ExecuteNonQuery:
It executes commands that have no return values such as insert, update or delete.
ExecuteScalar:
16
ExecuteReader:
The DataAdapter is the class at the core of ADO .Net’s disconnected data
access. It is essentially the middleman facilitating all communication between the
database and a Data Set. The DataAdapter is used either to fill a Data Table or Data
Set with data has been manipulated; the DataAdapter can commit the changes to the
database by calling the Update method.
Select Command
Insert Command
Delete Command
Update Command
17
Sqlserver description
Database
A database is similar to a data file in that it is a storage place for data. Like a
data file, a database does not present information directly to a user; the user runs an
application that accesses data from the database and presents it to the user in an
understandable format.
A database typically has two components: the files holding the physical
database and the database management system (DBMS) software that applications use
to access data. The DBMS is responsible for enforcing the database structure,
including:
Ensuring that data is stored correctly and that the rules defining data
relationships are not violated.
Recovering all data to a point of known consistency in case of system failures.
Client/Server:
18
Structured Query Language (SQL)
To work with data in a database, you must use a set of commands and
statements (language) defined by the DBMS software. There are several different
languages that can be used with relational databases; the most common is SQL. Both
the American National Standards Institute (ANSI) and the International Standards
Organization (ISO) have defined standards for SQL. Most modern DBMS products
support the Entry Level of SQL-92, the latest SQL standard (published in 1992).
Microsoft SQL Server supports a set of features that result in the following benefits:
Scalability
The same database engine can be used across platforms ranging from laptop
computers running Microsoft Windows® 95/98 to large, multiprocessor servers
running Microsoft Windows NT®, Enterprise Edition.
Data warehousing
SQL Server includes tools for extracting and analyzing summary data for
online analytical processing (OLAP). SQL Server also includes tools for visually
designing databases and analyzing data using English-based questions.
Databases
19
database is usually related to a particular subject or process, such as inventory
information for a manufacturing warehouse.
Unique Constraints
The primary key constraint is similar to the unique key constraint. The
primary key constraint just like the former avoids duplication of values. Its needs it
best felt when a relation has to be set between tables, because in addition to prevent in
duplication it also does not allow null values.
20
5. SOFTWARE DESIGN
The design phase begins with the requirements specification for the software
to be developed. Design is the first step to moving from the problem domain towards
the solution domain. Design is essentially the bridge between requirement
specification and the final solution for satisfying the requirements. It is the most
critical factor affecting the quality of the software.
System Design:
In the system design the focus on the deciding which modules are needed for
the system, the specification of these modules and how these modules should be
interconnected.
Detailed Design:
Verifiability
Completeness
Consistency
Traceability
Simplicity / Understandability
21
5.2 UML Design (state, activity, collaboration also)
UML diagrams
Introduction
Modeling is an activity that has been carried out over the years in software
development. When writing applications by using the simplest languages to the most
powerful and complex languages, you still need to model. Modeling can be as
straightforward as drawing a flowchart listing the steps carried out by an application.
Readability
Reusability
INTRODUCTION TO UML
22
complex systems. The UML is a very important part of developing objects oriented
software and the software development process.
Goals of UML
As the strategic value of software increases for many companies, the industry
looks for techniques to automate the production of software and to improve quality
and reduce cost and time-to-market. These techniques include component technology,
visual programming, patterns and frameworks. Businesses also seek techniques to
manage the complexity of systems as they increase in scope and scale. In particular,
they recognize the need to solve recurring architectural problems, such as physical
distribution, concurrency, replication, security, load balancing and fault tolerance.
Additionally, the development for the World Wide Web, while making some things
simpler, has exacerbated these architectural problems. The Unified Modeling
Language (UML) was designed to respond to these needs.
23
UML Diagrams
The underlying premise of UML is that no one diagram can capture the
different elements of a system in its entirety. Hence, UML is made up of nine
diagrams that can be used to model a system at different points of time in the software
life cycle of a system.
The use case diagram is used to identify the primary elements and processes
that form the system. The primary elements are termed as "actors" and the processes
are called "use cases." The use case diagram shows which actors interact with each
use case.
Class diagram:
The class diagram is used to refine the use case diagram and define a detailed
design of the system. The class diagram classifies the actors defined in the use case
diagram into a set of interrelated classes. The relationship or association between the
classes can be either an "is-a" or "has-a" relationship. Each class in the class diagram
may be capable of providing certain functionalities. These functionalities provided by
the class are termed "methods" of the class. Apart from this, each class may have
certain "attributes" that uniquely identify the class.
Object diagram:
State diagram:
A state diagram, as the name suggests, represents the different states that
objects in the system undergo during their life cycle. Objects in the system change
states in response to events. In addition to this, a state diagram also captures the
24
transition of the object's state from an initial state to a final state in response to events
affecting the system.
Activity diagram:
The process flows in the system are captured in the activity diagram. Similar
to a state diagram, an activity diagram also consists of activities, actions, transitions,
initial and final states, and guard conditions.
Sequence diagram:
Component diagram:
The component diagram represents the high-level parts that make up the
system. This diagram depicts, at a high level, what components form part of the
system and how they are interrelated. A component diagram depicts the
components culled after the system has undergone the development or construction
phase.
Deployment diagram:
25
UML Diagram Classification—Static, Dynamic, and Implementation
Static:
Dynamic:
The behavioral features of a system; for example, the ways a system behaves
in response to certain events or actions are the dynamic characteristics of a
system.
Implementation:
The UML diagrams that fall under each of these categories are:
static
Class diagram
Dynamic
Object diagram
State diagram
Activity diagram
Sequence diagram
Collaboration diagram
26
Implementation:
o Component diagram
o Deployment diagram
Design View:
The dynamic behavior of a system is the structural view of the system. This
gives an idea of what a given system is made up of. Class diagrams and object
diagrams form the design view of the system.
Process View:
The dynamic behavior of a system can be seen using the process view. The
different diagrams such as the state diagram, activity diagram, sequence
diagram, and collaboration diagram are used in this view.
Component View:
Deployment View:
27
Use case View:
Finally, we have the use case view. Use case diagrams of UML are used to
view a system from this perspective as a set of discrete activities or
transactions.
UML Diagrams:
Collaboration Diagrams
Admin Login
DAL : sqlhelper
4 : ExecuteNonQuery()
DataBase
3 : ExecuteNonQuery()
5 : Response To ExecuteNonQuery()
BAL : clsState
2 : InsertCity()
6 : Return Response()
7 : Show Result()
City
1 : Add City()
Admin
28
Registration Collaboration Diagram
DAL : SqlHelper
3 : ExecuteNonQuery()
DataBase
2 : ExecuteNonQuery()
4 : Response to ExecuteNonQuery()
BAL : ClsRegistration
1 : Registration()
Registration
29
JobRecuriter Update Profile
5 : Response To ExecuteNonQuery()
DataBase
BAL : clsJobrecuriterProfile
4 : ExecuteNonQuery() 3 : ExecuteNonQuery()
2 : UpdateProfile()
6 : Return Response()
DAL : sqlhelper
7 : Show Result()
Update JobRecuriter Profile
1 : ModifyProfile()
JobRecuriter
30
City
4 : InsertCities()
3 : btn_Add()
2 : Invalid Data()
frmCity
1 : lnkCity()
Admin
31
Country
DataBase
5 : Execute_Nonquery()
Dal : sqlhelper
4 : InsertCountries()
6 : return response()
Bal : clsCountry
3 : btn_Add()
2 : Invalid Data()
frmCountry
1 : lnkCountry()
Admin
32
User Registration
DataBase 5 : Execute_Nonquery()
Dal : sqlhelper
4 : InsertUserDetails()
6 : return response()
Bal : clsUser
3 : btn_submit()
2 : Invalid Data()
frmUser
1 : lnkUser()
Home
33
Sequence Diagrams:
SEQUENCE DIAGRAMS
Admin Login
1 : Login()
2 : CheckUser()
3 : Execute NonQuery()
4 : Exeute NonQuery()
5 : Response to ExecuteNonQuery()
6 : Get Response()
7 : Show Result()
34
Admin Add Country Sequence Diagram
1 : Add Country()
2 : InsertCountry()
3 : ExecuteNonQuery()
4 : ExecuteNonQuery()
5 : Response To ExecuteNonQuery()
6 : Return Response()
7 : Show Result()
35
Admin Add State Sequence Diagram
1 : Add State()
2 : InsertState()
3 : ExecuteNonQuery()
4 : ExecuteNonQuery()
5 : Response To ExecuteNonQuery()
6 : Return Response()
7 : Show Result()
36
Admin Add City Sequence Diagram
1 : Add City()
2 : InsertCity()
3 : ExecuteNonQuery()
4 : ExecuteNonQuery()
5 : Response To ExecuteNonQuery()
6 : Return Response()
7 : Show Result()
37
Jobseeker Update Profile Sequence Diagram
1 : ModifyProfile()
2 : UpdateProfile()
3 : ExecuteNonQuery()
4 : ExecuteNonQuery()
5 : Response To ExecuteNonQuery()
6 : Return Response()
7 : Show Result()
38
JobRecuriter Update Profile Sequence Diagram
1 : ModifyProfile()
2 : UpdateProfile()
3 : ExecuteNonQuery()
4 : ExecuteNonQuery()
5 : Response To ExecuteNonQuery()
6 : Return Response()
7 : Show Result()
39
Registration Sequence Diagram
DAL :SqlHelper
Registration BAL :ClsRegistration DataBase
1 : Registration()
2 : ExecuteNonQuery()
3 : ExecuteNonQuery()
4 : Response to ExecuteNonQuery()
5 : Return Response()
6 : Show Result()
40
Activity Diagrams:
Login Activity
Get Details
[Submit]
Validate Data
41
Jobseeker Registration Activity
[submit]
Validate Details
[Enter Details]
Get Details
[submit]
Validate Data
Accepted
42
Admin Activity Diagram:
Get Data
[Submit]
Validate Data
No
Yes
[Submit] [Submit]
No
[Successfully Generated]
No
No
Yes
Yes
[Successfully Done]
43
Job Recuriter Activity Diagram:
Get Data
[Submit]
Validate Data
No
Yes
Personal information
Login Information
[Submit]
[Submit]
Validate Data
Validate Data
No
No Yes
Yes
[Successfully Done]
44
5.3 DATA DICTONARY
After carefully understanding the requirements of the client the the entire data storage
requirements are divided into tables. The below tables are normalized to avoid any anomalies
during the course of data entry.
City Detail
Country Detail
Experience Details
Functional Area
45
Job Opening Detail
Location Master
46
Qualification
47
Skill Master
State detais
Student Detail
Admin Login
48
Contact Details
Jobseeker Registration
49
Jobseeker Resume
50
Fig:5.4.2 Administration Job Catagory
51
Fig:5.4.3 JobSeeker Login
52
Fig:5.4.4 TechnicalSkills Details
53
Fig:5.4.5 Academic Details
54
Fig:5.4.6 Career Path
55
Fig:5.4.7 Job Opening Details
56
Fig:Select Location To Select Jobs
57
Fig:View details of Jobseeker
58
Fig: Recruiter Login
59
60
6 TESTING
6.1. INTRODUCTION
A strategy for software testing integrates software test case design methods
into a well-planned series of steps that result in the successful construction of
software. Testing is the set of activities that can be planned in advance and conducted
systematically. The underlying motivation of program testing is to affirm software
quality with methods that can economically and effectively apply to both strategic to
both large and small-scale systems.
A strategy for software testing may also be viewed in the context of the spiral.
Unit testing begins at the vertex of the spiral and concentrates on each unit of the
software as implemented in source code. Testing progress by moving outward along
the spiral to integration testing, where the focus is on the design and the construction
of the software architecture. Talking another turn on outward on the spiral we
encounter validation testing where requirements established as part of software
requirements analysis are validated against the software that has been constructed.
Finally we arrive at system testing, where the software and other system elements are
tested as a whole.
61
UNIT TESTING
MODULE
TESTING
Component SUB-SYSTEM
Testing TESING
SYSTEM
TESTING
Integration Testing
ACCEPTANCE
TESTING
User
Testing
Unit testing focuses verification effort on the smallest unit of software design, the
module. The unit testing we have is white box oriented and some modules the steps
are conducted in parallel.
All logical decisions have been exercised on their true and false sides
62
All loops are executed at their boundaries and within their operational bounds
All internal data structures have been exercised to assure their validity.
To follow the concept of white box testing we have tested each form .we have
created independently to verify that Data flow is correct, All conditions are exercised
to check their validity, All loops are executed on their boundaries.
Use the design of the code and draw correspondent flow graph.
V(G)=E-N+2 or
V(G)=P+1 or
V(G)=Number Of Regions
63
3. CONDITIONAL TESTING
In this part of the testing each of the conditions were tested to both true and
false aspects. And all the resulting paths were tested. So that each path that may be
generate on particular condition is traced to uncover any possible errors.
This type of testing selects the path of the program according to the location of
definition and use of variables. This kind of testing was used only when some local
variable were declared. The definition-use chain method was used in this type of
testing. These were particularly useful in nested statements.
5. LOOP TESTING
In this type of testing all the loops are tested to all the limits possible. The
following exercise was adopted for all loops:
All the loops were tested at their limits, just above them and just below them.
For nested loops test the inner most loop first and then work outwards.
For concatenated loops the values of dependent loops were set with the help of
connected loop.
64
7. SYSTEM SECURITY
7.1. Introduction
Security
Integrity
Privacy
Confidentiality
DATA SECURITY is the protection of data from loss, disclosure, modification and
destruction.
65
7.2. SECURITY IN SOFTWARE
Various client side validations are used to ensure on the client side that only
valid data is entered. Client side validation saves server time and load to handle
invalid data. Some checks imposed are:
VBScript in used to ensure those required fields are filled with suitable data only.
Maximum lengths of the fields of the forms are appropriately defined.
Forms cannot be submitted without filling up the mandatory data so that manual
mistakes of submitting empty fields that are mandatory can be sorted out at the
client side to save the server time and load.
Tab-indexes are set according to the need and taking into account the ease of user
while working with the system.
Some checks cannot be applied at client side. Server side checks are necessary
to save the system from failing and intimating the user that some invalid operation has
been performed or the performed operation is restricted. Some of the server side
checks imposed is:
Server side constraint has been imposed to check for the validity of primary key
and foreign key. A primary key value cannot be duplicated. Any attempt to
duplicate the primary value results into a message intimating the user about those
values through the forms using foreign key can be updated only of the existing
foreign key values.
66
Various Access Control Mechanisms have been built so that one user may not agitate
upon another. Access permissions to various types of users are controlled according to
the organizational structure. Only permitted users can log on to the system and can
have access according to their category. User- name, passwords and permissions are
controlled o the server side.
8.CONCLUSION
It has been a great pleasure for me to work on this exciting and challenging
project. This project proved good for me as it provided practical knowledge of not
only programming in ASP.NET and VB.NET web based application and no some
extent Windows Application and SQL Server, but also about all handling procedure
related with “PROJECT NAME”. It also provides knowledge about the latest
technology used in developing web enabled application and client server technology
that will be great demand in future. This will provide better opportunities and
guidance in future in developing projects independently.
BENEFITS:
The project is identified by the merits of the system offered to the user. The merits of
this project are as follows: -
This project offers user to enter the data through simple and interactive forms.
This is very helpful for the client to enter the desired information through so much
simplicity.
67
The user is mainly more concerned about the validity of the data, whatever he is
entering. There are checks on every stages of any new creation, data entry or
updation so that the user cannot enter the invalid data, which can create problems
at later date.
Data storage and retrieval will become faster and easier to maintain because data
is stored in a systematic manner and in a single database.
Allocating of sample results becomes much faster because at a time the user can
see the records of last years.
Easier and faster data transfer through latest technology associated with the
computer and communication.
LIMITATIONS:
The size of the database increases day-by-day, increasing the load on the database
back up and data maintenance activity.
Training for simple computer operations is necessary for the users working on
the system.
9.FUTURE IMPROVEMENT
68
A console for the data Centre may be made available to allow the personnel to
monitor on the sites which were cleared for hosting during a particular period.
69
70
10. BIBLIOGRAPHY
www.support.mircosoft.com
www.developer.com
www.15seconds.com
FOR SQL
www.msdn.microsoft.com
FOR ASP.NET
www.msdn.microsoft.com/net/quickstart/aspplus/default.com
www.asp.net
www.fmexpense.com/quickstart/aspplus/default.com
www.asptoday.com
www.aspfree.com
www.4guysfromrolla.com/index.aspx
71